<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 17 May 2026 13:51:48 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Php”</title>
    <link>https://www.bsdnow.tv/tags/php</link>
    <pubDate>Wed, 14 Jan 2015 08:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>72: Common *Sense Approach</title>
  <link>https://www.bsdnow.tv/72</link>
  <guid isPermaLink="false">efe89103-4a81-4974-89f3-cb650975dace</guid>
  <pubDate>Wed, 14 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/efe89103-4a81-4974-89f3-cb650975dace.mp3" length="57654580" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We'll learn some of the backstory and see what they've got planned for the future. We've also got all this week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we'll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We'll learn some of the backstory and see what they've got planned for the future. We've also got all this week's news and answers to all your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Be your own VPN provider with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don't trust any VPN company?&lt;/li&gt;
&lt;li&gt;It's easy for anyone to say "of course we don't run a modified version of OpenVPN that logs all your traffic... what are you talking about?"&lt;/li&gt;
&lt;li&gt;The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk&lt;/li&gt;
&lt;li&gt;With this guide, you'll be able to cut out the middleman and create your own VPN, using OpenBSD&lt;/li&gt;
&lt;li&gt;It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" target="_blank" rel="nofollow noopener"&gt;FreeBSD vs Gentoo comparison&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software&lt;/li&gt;
&lt;li&gt;This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems&lt;/li&gt;
&lt;li&gt;The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things&lt;/li&gt;
&lt;li&gt;If you're a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Kernel W&lt;sup&gt;X&lt;/sup&gt; in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;W&lt;sup&gt;X,&lt;/sup&gt; "&lt;a href="https://en.wikipedia.org/wiki/W%5EX" target="_blank" rel="nofollow noopener"&gt;Write XOR Execute&lt;/a&gt;," is a security feature of OpenBSD with a rather strange-looking name&lt;/li&gt;
&lt;li&gt;It's meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time&lt;/li&gt;
&lt;li&gt;This helps prevent some types of buffer overflows: code injected into it &lt;em&gt;won't&lt;/em&gt; execute, but &lt;em&gt;will&lt;/em&gt; crash the program (quite obviously the lesser of the two evils)&lt;/li&gt;
&lt;li&gt;Through some recent work, OpenBSD's kernel now has no part of the address space without this feature - whereas it was only enabled in the userland &lt;a href="http://www.openbsd.org/papers/ru13-deraadt/" target="_blank" rel="nofollow noopener"&gt;previously&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Doing this incorrectly in the kernel could lead to &lt;strong&gt;far worse&lt;/strong&gt; consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that's been in the works for a while&lt;/li&gt;
&lt;li&gt;More technical details can be found in some &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141917924602780&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;recent CVS commits&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" target="_blank" rel="nofollow noopener"&gt;Building an IPFW-based router&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've covered building &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;routers with PF&lt;/a&gt; many times before, but what about &lt;a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" target="_blank" rel="nofollow noopener"&gt;IPFW&lt;/a&gt;?&lt;/li&gt;
&lt;li&gt;A certain host of a certain podcast decided it was finally time to replace his &lt;a href="https://github.com/jduck/asus-cmd" target="_blank" rel="nofollow noopener"&gt;disappointing&lt;/a&gt; consumer router with something BSD-based&lt;/li&gt;
&lt;li&gt;In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall&lt;/li&gt;
&lt;li&gt;He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit&lt;/li&gt;
&lt;li&gt;If you're an IPFW fan and are thinking about putting together a new router, give this post a read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jos Schellevis - &lt;a href="mailto:project@opnsense.org" target="_blank" rel="nofollow noopener"&gt;project@opnsense.org&lt;/a&gt; / &lt;a href="https://twitter.com/opnsense" target="_blank" rel="nofollow noopener"&gt;@opnsense&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The birth of &lt;a href="http://opnsense.org" target="_blank" rel="nofollow noopener"&gt;OPNsense&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" target="_blank" rel="nofollow noopener"&gt;On profiling HTTP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd, who &lt;a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" target="_blank" rel="nofollow noopener"&gt;we've had on the show before&lt;/a&gt;, has been doing some more ultra-high performance testing&lt;/li&gt;
&lt;li&gt;Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools&lt;/li&gt;
&lt;li&gt;According to him, it's "not very pretty"&lt;/li&gt;
&lt;li&gt;He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process&lt;/li&gt;
&lt;li&gt;You can check out his new code &lt;a href="https://github.com/erikarn/libevhtp-http/" target="_blank" rel="nofollow noopener"&gt;on Github&lt;/a&gt; right now
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&amp;amp;t=8846" target="_blank" rel="nofollow noopener"&gt;Using divert(4) to reduce attacks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We talked about using &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" target="_blank" rel="nofollow noopener"&gt;divert(4)&lt;/a&gt; with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)&lt;/li&gt;
&lt;li&gt;It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you're running&lt;/li&gt;
&lt;li&gt;PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won't work&lt;/li&gt;
&lt;li&gt;The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious&lt;/li&gt;
&lt;li&gt;Consider setting this up to reduce the attack spam in your logs if you run public services
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" target="_blank" rel="nofollow noopener"&gt;ChaCha20 patchset for GELI&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the &lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;disk encryption&lt;/a&gt; system&lt;/li&gt;
&lt;li&gt;There are also some benchmarks that look pretty good in terms of performance&lt;/li&gt;
&lt;li&gt;Currently, GELI defaults to AES &lt;a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" target="_blank" rel="nofollow noopener"&gt;in XTS mode&lt;/a&gt; with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)&lt;/li&gt;
&lt;li&gt;There's &lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" target="_blank" rel="nofollow noopener"&gt;some discussion&lt;/a&gt; going on about whether a &lt;a href="https://en.wikipedia.org/wiki/Stream_cipher" target="_blank" rel="nofollow noopener"&gt;stream cipher&lt;/a&gt; is &lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" target="_blank" rel="nofollow noopener"&gt;suitable or not&lt;/a&gt; for disk encryption though, so this might not be a match made in heaven just yet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" target="_blank" rel="nofollow noopener"&gt;PCBSD update system enhancements&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The PCBSD update utility has gotten an update itself, now supporting automatic upgrades&lt;/li&gt;
&lt;li&gt;You can choose what parts of your system you want to let it automatically handle (packages, security updates)&lt;/li&gt;
&lt;li&gt;The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality&lt;/li&gt;
&lt;li&gt;There's also a new graphical frontend available for it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2XJhAsffU" target="_blank" rel="nofollow noopener"&gt;Mat writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20qnSHujZ" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21O0MShqi" target="_blank" rel="nofollow noopener"&gt;Andy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2LutVQOXN" target="_blank" rel="nofollow noopener"&gt;Beau writes in&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21Esexdrc" target="_blank" rel="nofollow noopener"&gt;Kutay writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" target="_blank" rel="nofollow noopener"&gt;Wait, a real one?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=142125454022458&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;What's that glowing...&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, bsd, interview, opnsense, pfsense, m0n0wall, firewall, gateway, router, php, fork, deciso, netgate, portage, owncloud, soekris, apu, pcengines, alix, vpn, ipfw</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We&#39;ll learn some of the backstory and see what they&#39;ve got planned for the future. We&#39;ve also got all this week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" rel="nofollow">Be your own VPN provider with OpenBSD</a></h3>

<ul>
<li>We&#39;ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don&#39;t trust any VPN company?</li>
<li>It&#39;s easy for anyone to say &quot;of course we don&#39;t run a modified version of OpenVPN that logs all your traffic... what are you talking about?&quot;</li>
<li>The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk</li>
<li>With this guide, you&#39;ll be able to cut out the middleman and create your own VPN, using OpenBSD</li>
<li>It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***</li>
</ul>

<h3><a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" rel="nofollow">FreeBSD vs Gentoo comparison</a></h3>

<ul>
<li>People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software</li>
<li>This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems</li>
<li>The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things</li>
<li>If you&#39;re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">Kernel W<sup>X</sup> in OpenBSD</a></h3>

<ul>
<li>W<sup>X,</sup> &quot;<a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">Write XOR Execute</a>,&quot; is a security feature of OpenBSD with a rather strange-looking name</li>
<li>It&#39;s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time</li>
<li>This helps prevent some types of buffer overflows: code injected into it <em>won&#39;t</em> execute, but <em>will</em> crash the program (quite obviously the lesser of the two evils)</li>
<li>Through some recent work, OpenBSD&#39;s kernel now has no part of the address space without this feature - whereas it was only enabled in the userland <a href="http://www.openbsd.org/papers/ru13-deraadt/" rel="nofollow">previously</a></li>
<li>Doing this incorrectly in the kernel could lead to <strong>far worse</strong> consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that&#39;s been in the works for a while</li>
<li>More technical details can be found in some <a href="https://www.marc.info/?l=openbsd-cvs&m=141917924602780&w=2" rel="nofollow">recent CVS commits</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">Building an IPFW-based router</a></h3>

<ul>
<li>We&#39;ve covered building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">routers with PF</a> many times before, but what about <a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" rel="nofollow">IPFW</a>?</li>
<li>A certain host of a certain podcast decided it was finally time to replace his <a href="https://github.com/jduck/asus-cmd" rel="nofollow">disappointing</a> consumer router with something BSD-based</li>
<li>In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall</li>
<li>He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit</li>
<li>If you&#39;re an IPFW fan and are thinking about putting together a new router, give this post a read
***</li>
</ul>

<h2>Interview - Jos Schellevis - <a href="mailto:project@opnsense.org" rel="nofollow">project@opnsense.org</a> / <a href="https://twitter.com/opnsense" rel="nofollow">@opnsense</a></h2>

<p>The birth of <a href="http://opnsense.org" rel="nofollow">OPNsense</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" rel="nofollow">On profiling HTTP</a></h3>

<ul>
<li>Adrian Chadd, who <a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" rel="nofollow">we&#39;ve had on the show before</a>, has been doing some more ultra-high performance testing</li>
<li>Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools</li>
<li>According to him, it&#39;s &quot;not very pretty&quot;</li>
<li>He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process</li>
<li>You can check out his new code <a href="https://github.com/erikarn/libevhtp-http/" rel="nofollow">on Github</a> right now
***</li>
</ul>

<h3><a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&t=8846" rel="nofollow">Using divert(4) to reduce attacks</a></h3>

<ul>
<li>We talked about using <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" rel="nofollow">divert(4)</a> with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)</li>
<li>It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you&#39;re running</li>
<li>PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won&#39;t work</li>
<li>The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious</li>
<li>Consider setting this up to reduce the attack spam in your logs if you run public services
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" rel="nofollow">ChaCha20 patchset for GELI</a></h3>

<ul>
<li>A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">disk encryption</a> system</li>
<li>There are also some benchmarks that look pretty good in terms of performance</li>
<li>Currently, GELI defaults to AES <a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" rel="nofollow">in XTS mode</a> with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)</li>
<li>There&#39;s <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" rel="nofollow">some discussion</a> going on about whether a <a href="https://en.wikipedia.org/wiki/Stream_cipher" rel="nofollow">stream cipher</a> is <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" rel="nofollow">suitable or not</a> for disk encryption though, so this might not be a match made in heaven just yet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" rel="nofollow">PCBSD update system enhancements</a></h3>

<ul>
<li>The PCBSD update utility has gotten an update itself, now supporting automatic upgrades</li>
<li>You can choose what parts of your system you want to let it automatically handle (packages, security updates)</li>
<li>The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality</li>
<li>There&#39;s also a new graphical frontend available for it
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XJhAsffU" rel="nofollow">Mat writes in</a></li>
<li><a href="http://slexy.org/view/s20qnSHujZ" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s21O0MShqi" rel="nofollow">Andy writes in</a></li>
<li><a href="http://slexy.org/view/s2LutVQOXN" rel="nofollow">Beau writes in</a> </li>
<li><a href="http://slexy.org/view/s21Esexdrc" rel="nofollow">Kutay writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" rel="nofollow">Wait, a real one?</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142125454022458&w=2" rel="nofollow">What&#39;s that glowing...</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We&#39;ll learn some of the backstory and see what they&#39;ve got planned for the future. We&#39;ve also got all this week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" rel="nofollow">Be your own VPN provider with OpenBSD</a></h3>

<ul>
<li>We&#39;ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don&#39;t trust any VPN company?</li>
<li>It&#39;s easy for anyone to say &quot;of course we don&#39;t run a modified version of OpenVPN that logs all your traffic... what are you talking about?&quot;</li>
<li>The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk</li>
<li>With this guide, you&#39;ll be able to cut out the middleman and create your own VPN, using OpenBSD</li>
<li>It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***</li>
</ul>

<h3><a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" rel="nofollow">FreeBSD vs Gentoo comparison</a></h3>

<ul>
<li>People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software</li>
<li>This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems</li>
<li>The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things</li>
<li>If you&#39;re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">Kernel W<sup>X</sup> in OpenBSD</a></h3>

<ul>
<li>W<sup>X,</sup> &quot;<a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">Write XOR Execute</a>,&quot; is a security feature of OpenBSD with a rather strange-looking name</li>
<li>It&#39;s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time</li>
<li>This helps prevent some types of buffer overflows: code injected into it <em>won&#39;t</em> execute, but <em>will</em> crash the program (quite obviously the lesser of the two evils)</li>
<li>Through some recent work, OpenBSD&#39;s kernel now has no part of the address space without this feature - whereas it was only enabled in the userland <a href="http://www.openbsd.org/papers/ru13-deraadt/" rel="nofollow">previously</a></li>
<li>Doing this incorrectly in the kernel could lead to <strong>far worse</strong> consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that&#39;s been in the works for a while</li>
<li>More technical details can be found in some <a href="https://www.marc.info/?l=openbsd-cvs&m=141917924602780&w=2" rel="nofollow">recent CVS commits</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">Building an IPFW-based router</a></h3>

<ul>
<li>We&#39;ve covered building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">routers with PF</a> many times before, but what about <a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" rel="nofollow">IPFW</a>?</li>
<li>A certain host of a certain podcast decided it was finally time to replace his <a href="https://github.com/jduck/asus-cmd" rel="nofollow">disappointing</a> consumer router with something BSD-based</li>
<li>In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall</li>
<li>He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit</li>
<li>If you&#39;re an IPFW fan and are thinking about putting together a new router, give this post a read
***</li>
</ul>

<h2>Interview - Jos Schellevis - <a href="mailto:project@opnsense.org" rel="nofollow">project@opnsense.org</a> / <a href="https://twitter.com/opnsense" rel="nofollow">@opnsense</a></h2>

<p>The birth of <a href="http://opnsense.org" rel="nofollow">OPNsense</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" rel="nofollow">On profiling HTTP</a></h3>

<ul>
<li>Adrian Chadd, who <a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" rel="nofollow">we&#39;ve had on the show before</a>, has been doing some more ultra-high performance testing</li>
<li>Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools</li>
<li>According to him, it&#39;s &quot;not very pretty&quot;</li>
<li>He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process</li>
<li>You can check out his new code <a href="https://github.com/erikarn/libevhtp-http/" rel="nofollow">on Github</a> right now
***</li>
</ul>

<h3><a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&t=8846" rel="nofollow">Using divert(4) to reduce attacks</a></h3>

<ul>
<li>We talked about using <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" rel="nofollow">divert(4)</a> with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)</li>
<li>It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you&#39;re running</li>
<li>PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won&#39;t work</li>
<li>The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious</li>
<li>Consider setting this up to reduce the attack spam in your logs if you run public services
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" rel="nofollow">ChaCha20 patchset for GELI</a></h3>

<ul>
<li>A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">disk encryption</a> system</li>
<li>There are also some benchmarks that look pretty good in terms of performance</li>
<li>Currently, GELI defaults to AES <a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" rel="nofollow">in XTS mode</a> with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)</li>
<li>There&#39;s <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" rel="nofollow">some discussion</a> going on about whether a <a href="https://en.wikipedia.org/wiki/Stream_cipher" rel="nofollow">stream cipher</a> is <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" rel="nofollow">suitable or not</a> for disk encryption though, so this might not be a match made in heaven just yet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" rel="nofollow">PCBSD update system enhancements</a></h3>

<ul>
<li>The PCBSD update utility has gotten an update itself, now supporting automatic upgrades</li>
<li>You can choose what parts of your system you want to let it automatically handle (packages, security updates)</li>
<li>The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality</li>
<li>There&#39;s also a new graphical frontend available for it
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XJhAsffU" rel="nofollow">Mat writes in</a></li>
<li><a href="http://slexy.org/view/s20qnSHujZ" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s21O0MShqi" rel="nofollow">Andy writes in</a></li>
<li><a href="http://slexy.org/view/s2LutVQOXN" rel="nofollow">Beau writes in</a> </li>
<li><a href="http://slexy.org/view/s21Esexdrc" rel="nofollow">Kutay writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" rel="nofollow">Wait, a real one?</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142125454022458&w=2" rel="nofollow">What&#39;s that glowing...</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>25: A Sixth pfSense</title>
  <link>https://www.bsdnow.tv/25</link>
  <guid isPermaLink="false">dad040a2-8866-4876-88fb-43b036b3e691</guid>
  <pubDate>Wed, 19 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/dad040a2-8866-4876-88fb-43b036b3e691.mp3" length="48903556" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon and AsiaBSDCon&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year, EuroBSDCon will be in September in Sofia, Bulgaria&lt;/li&gt;
&lt;li&gt;They've got a call for papers up now, so everyone can submit the talks they want to present&lt;/li&gt;
&lt;li&gt;There will also be a tutorial section of the conference&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://2014.asiabsdcon.org/timetable.html.en" target="_blank" rel="nofollow noopener"&gt;AsiaBSDCon&lt;/a&gt; will be next month, in March!&lt;/li&gt;
&lt;li&gt;All the info about the registration, tutorials, hotels, timetable and location have been posted&lt;/li&gt;
&lt;li&gt;Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://rtfm.net/FreeBSD/ERL/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10 on Ubiquiti EdgeRouter Lite&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU&lt;/li&gt;
&lt;li&gt;This article goes through the process of installing and configuring FreeBSD on it to use as a home router&lt;/li&gt;
&lt;li&gt;Lots of good pictures of the hardware and specific details needed to get you set up&lt;/li&gt;
&lt;li&gt;It also includes the scripts to create your own images if you don't want to use the ones rolled by someone else&lt;/li&gt;
&lt;li&gt;For such a cheap price, might be a really fun weekend project to replace your shitty consumer router&lt;/li&gt;
&lt;li&gt;Of course if you're more of an OpenBSD guy, you can always see &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;our tutorial&lt;/a&gt; for that too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.saveosx.org/signed-packages/" target="_blank" rel="nofollow noopener"&gt;Signed pkgsrc package guide&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up&lt;/li&gt;
&lt;li&gt;It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)&lt;/li&gt;
&lt;li&gt;He goes through the process of signing packages with a public key and how to verify the packages when you install them&lt;/li&gt;
&lt;li&gt;The author also happens to be an EdgeBSD developer
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140212083627" target="_blank" rel="nofollow noopener"&gt;Big batch of OpenBSD hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140213065843" target="_blank" rel="nofollow noopener"&gt;the second&lt;/a&gt;, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140213173808" target="_blank" rel="nofollow noopener"&gt;the third&lt;/a&gt;, jsg updated libdrm and mesa and did various work on xenocara&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140214070023" target="_blank" rel="nofollow noopener"&gt;the fourth&lt;/a&gt;, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he's done&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140214130039" target="_blank" rel="nofollow noopener"&gt;the fifth&lt;/a&gt;, claudio talks about some stuff he did for routing tables and misc. other things
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Chris Buechler - &lt;a href="mailto:cmb@pfsense.com" target="_blank" rel="nofollow noopener"&gt;cmb@pfsense.com&lt;/a&gt; / &lt;a href="https://twitter.com/cbuechler" target="_blank" rel="nofollow noopener"&gt;@cbuechler&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;pfSense&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;pfSense walkthrough&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" target="_blank" rel="nofollow noopener"&gt;FreeBSD challenge continues&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy from the Linux foundation continues his switching to BSD journey&lt;/li&gt;
&lt;li&gt;In day 13, he covers some tips for new users, mentions trying things out in a VM first&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" target="_blank" rel="nofollow noopener"&gt;day 14&lt;/a&gt;, he starts setting up XFCE and X11, feels like he's starting over as a new Linux user learning the ropes again - concludes that ports are the way to go&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" target="_blank" rel="nofollow noopener"&gt;day 15&lt;/a&gt;, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" target="_blank" rel="nofollow noopener"&gt;day 16&lt;/a&gt;, he dives into the world of &lt;a href="http://www.bsdnow.tv/tutorials/jails" target="_blank" rel="nofollow noopener"&gt;FreeBSD jails&lt;/a&gt;!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/1962" target="_blank" rel="nofollow noopener"&gt;BSD books in 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSD books are some of the highest quality technical writings available, and MWL has written a good number of them&lt;/li&gt;
&lt;li&gt;In this post, he details some of his plans for 2014&lt;/li&gt;
&lt;li&gt;In includes at least one OpenBSD book, at least one FreeBSD book and...&lt;/li&gt;
&lt;li&gt;Very strong possibility of Absolute FreeBSD 3rd edition (watch &lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;our interview with him&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Check the link for all the details
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" target="_blank" rel="nofollow noopener"&gt;How to build FreeBSD/EC2 images&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" target="_blank" rel="nofollow noopener"&gt;Colin Percival&lt;/a&gt; details how to build EC2 images in a new blog post&lt;/li&gt;
&lt;li&gt;Most people just use the images he makes on their instances, but some people will want to make their own &lt;a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" target="_blank" rel="nofollow noopener"&gt;from scratch&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;You build a regular disk image and then turn it into an AMI&lt;/li&gt;
&lt;li&gt;It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This time around we discuss how you can become a developer&lt;/li&gt;
&lt;li&gt;Kris also details the length of supported releases&lt;/li&gt;
&lt;li&gt;Expect lots of new features in 10.1
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216xJoCVG" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2gLrR3VVf" target="_blank" rel="nofollow noopener"&gt;Jake writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gfG3Iho" target="_blank" rel="nofollow noopener"&gt;Niclas writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JNyw5BCn" target="_blank" rel="nofollow noopener"&gt;Steffan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2kg3zoRfm" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2ZwSIfRjm" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pfsense, pf, firewall, gateway, router, hangout, webui, web interface, php, ipfw, ipfilter, gateway, graphs, bandwidth, edgerouter, edgerouter lite, eurobsdcon, eurobsdcon2014, edge router, 2014, books, michael w lucas, freebsd journal, fosdem, asiabsdcon, mips, hackathon, new zealand, pkgsrc, signed packages, edgebsd, smp, ec2, amazon, images, instance, build, custom</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
