<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 20 Apr 2026 08:49:27 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Pkgng”</title>
    <link>https://www.bsdnow.tv/tags/pkgng</link>
    <pubDate>Wed, 24 Jun 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>95: Bitrot Group Therapy</title>
  <link>https://www.bsdnow.tv/95</link>
  <guid isPermaLink="false">e712bc93-a45f-45ce-9d3a-e58ee627200c</guid>
  <pubDate>Wed, 24 Jun 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e712bc93-a45f-45ce-9d3a-e58ee627200c.mp3" length="54443956" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking some ZFS with Sean Chittenden. He's been using it on FreeBSD at Groupon, and has some interesting stories about how it's saved his data. Answers to your emails and all of this week's headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:15:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking some ZFS with Sean Chittenden. He's been using it on FreeBSD at Groupon, and has some interesting stories about how it's saved his data. Answers to your emails and all of this week's headlines, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
More BSDCan 2015 videos (https://www.bsdcan.org/2015/schedule/)
Almost as if we said it would happen last week, more BSD-related presentation videos have been uploaded
Alexander Motin, Feature-rich and fast SCSI target with CTL and ZFS (https://www.youtube.com/watch?v=lBE4BfxVDQc)
Daichi Goto, FreeBSD for High Density Servers (https://www.youtube.com/watch?v=r2BoQ70bwK4)
Ken Moore, Lumina-DE (https://www.youtube.com/watch?v=Qh_YK9y4_Os)
Kevin Bowling, FreeBSD Operations at (https://www.youtube.com/watch?v=4l2rlRjkGhk) Limelight Networks (https://www.youtube.com/watch?v=K1-ZyiY5z48)
Maciej Pasternacki, Jetpack, a container (https://www.youtube.com/watch?v=8phbsAhJ-9w) runtime for FreeBSD (https://www.youtube.com/watch?v=kJ74mgkzLxc)
Ray Percival, Networking with OpenBSD in a virtualized environment (https://www.youtube.com/watch?v=gx5FILdSp2w)
Reyk Floeter, Introducing OpenBSD's (https://www.youtube.com/watch?v=DV1-EfdIp8I) new httpd (https://www.youtube.com/watch?v=_v0lI6qDWFs)
Still more to come, hopefully
***
OpenBSD httpd rewrite support (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143480475721221&amp;amp;w=2)
One of the most-requested features of OpenBSD's new HTTP daemon (in fact, you can hear someone asking about it in the video just above) is rewrite support
There were concerns about regex code being too complicated and potentially allowing another attack surface, so that was out
Instead, Reyk ported over an implementation of lua pattern matching while on the flight back from BSDCan, turning it into a C API without the lua bindings
In the mailing list post, he shows an example of how to use it for redirects and provides the diff (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143489473103114&amp;amp;w=2) if you'd like to give it a try now
It's since been committed (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143507301715409&amp;amp;w=2) to -current, so you can try it out with a snapshot too
***
SSH 2FA on FreeBSD (http://sysconfig.org.uk/two-factor-authentication-with-ssh.html)
We've discussed different ways to lock down SSH access to your BSD boxes before - use keys instead of passwords, whitelist IPs, or even use two-factor authentication
This article serves as a sort of "roundup" on different methods to set up two-factor authentication on FreeBSD
It touches on key pairs with a server-side password, google authenticator and a few other variations
While the article is focused on FreeBSD, a lot of it can be easily applied to the others too
OpenSSH has a great security record, but two-factor authentication is always a good thing to have for the most important systems
***
NetBSD 7.0-RC1 released (https://blog.netbsd.org/tnf/entry/netbsd_7_0_rc1_binaries)
NetBSD has just announced the first release candidate for the 7.0 branch, after a long delay since the initial beta (11 months ago (http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv))
Some of the standout features include: improved KMS/DRM with support for modern GPUs, SMP support on ARM, lots of new ARM boards officially supported, GPT support in the installer, Lua kernel scripting, a multiprocessor USB stack, improvements to NPF (their firewall) and, optionally, Clang 3.6.1
They're looking for as much testing as possible, so give it a try and report your findings to the release engineering team
***
Interview - Sean Chittenden - seanc@freebsd.org (mailto:seanc@freebsd.org) / @seanchittenden (https://twitter.com/seanchittenden)
FreeBSD at Groupon, ZFS
News Roundup
OpenSMTPD and Dovecot (http://www.tumfatig.net/20150620/opensmtpd-and-dovecot-on-openbsd-5-7/)
We've covered a number of OpenSMTPD mail server guides on the show, each with just a little something different to offer than the last
This blog post about it has something not mentioned before: virtual domains and virtual users
This means you can easily have "user1@domain.com" and "user2@otherdomain.com" both go to a local user on the box (or a different third address)
It also covers SSL certificates, blocking spam and setting up IMAP access, the usual
Now might also be a good time to test out OpenSMTPD 5.7.1-rc1 (https://www.mail-archive.com/misc@opensmtpd.org/msg02177.html), which we'll cover in more detail when it's released...
***
OctoPkg, a QT frontend to pkgng (https://github.com/aarnt/octopkg)
A PC-BSD user has begun porting over a graphical package management utility from Arch linux called Octopi (https://octopiproject.wordpress.com/about/)
Obviously, it needed to be rewritten to use FreeBSD's pkg system instead of pacman
There are some basic instructions on how to get it built and running on the github page
After some testing, it'll likely make its way to the FreeBSD ports tree
Tools like this might make it easier for desktop users (who are used to similar things in Ubuntu or related distros) to switch over
***
AFL vs. mandoc, a quantitative analysis (http://undeadly.org/cgi?action=article&amp;amp;sid=20150619071929)
Ingo Schwarze has written a pretty detailed article about how he and other OpenBSD developers have been fuzzing mandoc with AFL
It's meant to be accompanying material to his BSDCan talk, which already covered nine topics
mandoc is an interesting example to stress test with fuzzing, since its main job is to take and parse some highly varying input
The article breaks down the 45 different bugs that were found, based on their root cause
If you're interested in secure coding practices, this'll be a great one to read
***
OpenZFS conference videos (https://www.youtube.com/playlist?list=PLaUVvul17xScvtic0SPoks2MlQleyejks)
Videos from the second OpenZFS conference have just started to show up
The first talk is by, you guessed it, Matt Ahrens
In it, he covers some ZFS history, the Oracle takeover, the birth of illumos and OpenZFS, some administration basics and also some upcoming features that are being worked on
There are also videos from Nexenta (https://www.youtube.com/watch?v=5ciV4z7WWmo) and HGST (https://www.youtube.com/watch?v=a2lnMxMUxyc), talking about how they use and contribute to OpenZFS
***
Feedback/Questions
Bryson writes in (http://slexy.org/view/s2FqJfmeK3)
Kevin writes in (http://slexy.org/view/s20erRHahQ)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, fuzzing, mandoc, httpd, 7.0, opensmtpd, dovecot, bsdcan 2015, pkgng, groupon, ecommerce, zfs, bitrot, zpool, afl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking some ZFS with Sean Chittenden. He&#39;s been using it on FreeBSD at Groupon, and has some interesting stories about how it&#39;s saved his data. Answers to your emails and all of this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">More BSDCan 2015 videos</a></h3>

<ul>
<li>Almost as if we said it would happen last week, more BSD-related presentation videos have been uploaded</li>
<li>Alexander Motin, <a href="https://www.youtube.com/watch?v=lBE4BfxVDQc" rel="nofollow">Feature-rich and fast SCSI target with CTL and ZFS</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=r2BoQ70bwK4" rel="nofollow">FreeBSD for High Density Servers</a></li>
<li>Ken Moore, <a href="https://www.youtube.com/watch?v=Qh_YK9y4_Os" rel="nofollow">Lumina-DE</a></li>
<li>Kevin Bowling, <a href="https://www.youtube.com/watch?v=4l2rlRjkGhk" rel="nofollow">FreeBSD Operations at</a> <a href="https://www.youtube.com/watch?v=K1-ZyiY5z48" rel="nofollow">Limelight Networks</a></li>
<li>Maciej Pasternacki, <a href="https://www.youtube.com/watch?v=8phbsAhJ-9w" rel="nofollow">Jetpack, a container</a> <a href="https://www.youtube.com/watch?v=kJ74mgkzLxc" rel="nofollow">runtime for FreeBSD</a></li>
<li>Ray Percival, <a href="https://www.youtube.com/watch?v=gx5FILdSp2w" rel="nofollow">Networking with OpenBSD in a virtualized environment</a></li>
<li>Reyk Floeter, <a href="https://www.youtube.com/watch?v=DV1-EfdIp8I" rel="nofollow">Introducing OpenBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=_v0lI6qDWFs" rel="nofollow">new httpd</a></li>
<li>Still more to come, hopefully
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143480475721221&w=2" rel="nofollow">OpenBSD httpd rewrite support</a></h3>

<ul>
<li>One of the most-requested features of OpenBSD&#39;s new HTTP daemon (in fact, you can hear someone asking about it in the video just above) is rewrite support</li>
<li>There were concerns about regex code being too complicated and potentially allowing another attack surface, so that was out</li>
<li>Instead, Reyk ported over an implementation of lua pattern matching while on the flight back from BSDCan, turning it into a C API without the lua bindings</li>
<li>In the mailing list post, he shows an example of how to use it for redirects and provides <a href="https://www.marc.info/?l=openbsd-tech&m=143489473103114&w=2" rel="nofollow">the diff</a> if you&#39;d like to give it a try now</li>
<li>It&#39;s since <a href="https://www.marc.info/?l=openbsd-cvs&m=143507301715409&w=2" rel="nofollow">been committed</a> to -current, so you can try it out with a snapshot too
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/two-factor-authentication-with-ssh.html" rel="nofollow">SSH 2FA on FreeBSD</a></h3>

<ul>
<li>We&#39;ve discussed different ways to lock down SSH access to your BSD boxes before - use keys instead of passwords, whitelist IPs, or even use two-factor authentication</li>
<li>This article serves as a sort of &quot;roundup&quot; on different methods to set up two-factor authentication on FreeBSD</li>
<li>It touches on key pairs with a server-side password, google authenticator and a few other variations</li>
<li>While the article is focused on FreeBSD, a lot of it can be easily applied to the others too</li>
<li>OpenSSH has a great security record, but two-factor authentication is always a good thing to have for the most important systems
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_7_0_rc1_binaries" rel="nofollow">NetBSD 7.0-RC1 released</a></h3>

<ul>
<li>NetBSD has just announced the first release candidate for the 7.0 branch, after a long delay since the initial beta (<a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">11 months ago</a>)</li>
<li>Some of the standout features include: improved KMS/DRM with support for modern GPUs, SMP support on ARM, lots of new ARM boards officially supported, GPT support in the installer, Lua kernel scripting, a multiprocessor USB stack, improvements to NPF (their firewall) and, optionally, Clang 3.6.1</li>
<li>They&#39;re looking for as much testing as possible, so give it a try and report your findings to the release engineering team
***</li>
</ul>

<h2>Interview - Sean Chittenden - <a href="mailto:seanc@freebsd.org" rel="nofollow">seanc@freebsd.org</a> / <a href="https://twitter.com/seanchittenden" rel="nofollow">@seanchittenden</a></h2>

<p>FreeBSD at Groupon, ZFS</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tumfatig.net/20150620/opensmtpd-and-dovecot-on-openbsd-5-7/" rel="nofollow">OpenSMTPD and Dovecot</a></h3>

<ul>
<li>We&#39;ve covered a number of OpenSMTPD mail server guides on the show, each with just a little something different to offer than the last</li>
<li>This blog post about it has something not mentioned before: virtual domains and virtual users</li>
<li>This means you can easily have &quot;<a href="mailto:user1@domain.com" rel="nofollow">user1@domain.com</a>&quot; and &quot;<a href="mailto:user2@otherdomain.com" rel="nofollow">user2@otherdomain.com</a>&quot; both go to a local user on the box (or a different third address)</li>
<li>It also covers SSL certificates, blocking spam and setting up IMAP access, the usual</li>
<li>Now might also be a good time to test out OpenSMTPD <a href="https://www.mail-archive.com/misc@opensmtpd.org/msg02177.html" rel="nofollow">5.7.1-rc1</a>, which we&#39;ll cover in more detail when it&#39;s released...
***</li>
</ul>

<h3><a href="https://github.com/aarnt/octopkg" rel="nofollow">OctoPkg, a QT frontend to pkgng</a></h3>

<ul>
<li>A PC-BSD user has begun porting over a graphical package management utility from Arch linux called <a href="https://octopiproject.wordpress.com/about/" rel="nofollow">Octopi</a></li>
<li>Obviously, it needed to be rewritten to use FreeBSD&#39;s pkg system instead of pacman</li>
<li>There are some basic instructions on how to get it built and running on the github page</li>
<li>After some testing, it&#39;ll likely make its way to the FreeBSD ports tree</li>
<li>Tools like this might make it easier for desktop users (who are used to similar things in Ubuntu or related distros) to switch over
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150619071929" rel="nofollow">AFL vs. mandoc, a quantitative analysis</a></h3>

<ul>
<li>Ingo Schwarze has written a pretty detailed article about how he and other OpenBSD developers have been fuzzing mandoc with AFL</li>
<li>It&#39;s meant to be accompanying material to his BSDCan talk, which already covered nine topics</li>
<li>mandoc is an interesting example to stress test with fuzzing, since its main job is to take and parse some highly varying input</li>
<li>The article breaks down the 45 different bugs that were found, based on their root cause</li>
<li>If you&#39;re interested in secure coding practices, this&#39;ll be a great one to read
***</li>
</ul>

<h3><a href="https://www.youtube.com/playlist?list=PLaUVvul17xScvtic0SPoks2MlQleyejks" rel="nofollow">OpenZFS conference videos</a></h3>

<ul>
<li>Videos from the second OpenZFS conference have just started to show up</li>
<li>The first talk is by, you guessed it, Matt Ahrens</li>
<li>In it, he covers some ZFS history, the Oracle takeover, the birth of illumos and OpenZFS, some administration basics and also some upcoming features that are being worked on</li>
<li>There are also videos <a href="https://www.youtube.com/watch?v=5ciV4z7WWmo" rel="nofollow">from Nexenta</a> <a href="https://www.youtube.com/watch?v=a2lnMxMUxyc" rel="nofollow">and HGST</a>, talking about how they use and contribute to OpenZFS
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2FqJfmeK3" rel="nofollow">Bryson writes in</a></li>
<li><a href="http://slexy.org/view/s20erRHahQ" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking some ZFS with Sean Chittenden. He&#39;s been using it on FreeBSD at Groupon, and has some interesting stories about how it&#39;s saved his data. Answers to your emails and all of this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">More BSDCan 2015 videos</a></h3>

<ul>
<li>Almost as if we said it would happen last week, more BSD-related presentation videos have been uploaded</li>
<li>Alexander Motin, <a href="https://www.youtube.com/watch?v=lBE4BfxVDQc" rel="nofollow">Feature-rich and fast SCSI target with CTL and ZFS</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=r2BoQ70bwK4" rel="nofollow">FreeBSD for High Density Servers</a></li>
<li>Ken Moore, <a href="https://www.youtube.com/watch?v=Qh_YK9y4_Os" rel="nofollow">Lumina-DE</a></li>
<li>Kevin Bowling, <a href="https://www.youtube.com/watch?v=4l2rlRjkGhk" rel="nofollow">FreeBSD Operations at</a> <a href="https://www.youtube.com/watch?v=K1-ZyiY5z48" rel="nofollow">Limelight Networks</a></li>
<li>Maciej Pasternacki, <a href="https://www.youtube.com/watch?v=8phbsAhJ-9w" rel="nofollow">Jetpack, a container</a> <a href="https://www.youtube.com/watch?v=kJ74mgkzLxc" rel="nofollow">runtime for FreeBSD</a></li>
<li>Ray Percival, <a href="https://www.youtube.com/watch?v=gx5FILdSp2w" rel="nofollow">Networking with OpenBSD in a virtualized environment</a></li>
<li>Reyk Floeter, <a href="https://www.youtube.com/watch?v=DV1-EfdIp8I" rel="nofollow">Introducing OpenBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=_v0lI6qDWFs" rel="nofollow">new httpd</a></li>
<li>Still more to come, hopefully
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143480475721221&w=2" rel="nofollow">OpenBSD httpd rewrite support</a></h3>

<ul>
<li>One of the most-requested features of OpenBSD&#39;s new HTTP daemon (in fact, you can hear someone asking about it in the video just above) is rewrite support</li>
<li>There were concerns about regex code being too complicated and potentially allowing another attack surface, so that was out</li>
<li>Instead, Reyk ported over an implementation of lua pattern matching while on the flight back from BSDCan, turning it into a C API without the lua bindings</li>
<li>In the mailing list post, he shows an example of how to use it for redirects and provides <a href="https://www.marc.info/?l=openbsd-tech&m=143489473103114&w=2" rel="nofollow">the diff</a> if you&#39;d like to give it a try now</li>
<li>It&#39;s since <a href="https://www.marc.info/?l=openbsd-cvs&m=143507301715409&w=2" rel="nofollow">been committed</a> to -current, so you can try it out with a snapshot too
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/two-factor-authentication-with-ssh.html" rel="nofollow">SSH 2FA on FreeBSD</a></h3>

<ul>
<li>We&#39;ve discussed different ways to lock down SSH access to your BSD boxes before - use keys instead of passwords, whitelist IPs, or even use two-factor authentication</li>
<li>This article serves as a sort of &quot;roundup&quot; on different methods to set up two-factor authentication on FreeBSD</li>
<li>It touches on key pairs with a server-side password, google authenticator and a few other variations</li>
<li>While the article is focused on FreeBSD, a lot of it can be easily applied to the others too</li>
<li>OpenSSH has a great security record, but two-factor authentication is always a good thing to have for the most important systems
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_7_0_rc1_binaries" rel="nofollow">NetBSD 7.0-RC1 released</a></h3>

<ul>
<li>NetBSD has just announced the first release candidate for the 7.0 branch, after a long delay since the initial beta (<a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">11 months ago</a>)</li>
<li>Some of the standout features include: improved KMS/DRM with support for modern GPUs, SMP support on ARM, lots of new ARM boards officially supported, GPT support in the installer, Lua kernel scripting, a multiprocessor USB stack, improvements to NPF (their firewall) and, optionally, Clang 3.6.1</li>
<li>They&#39;re looking for as much testing as possible, so give it a try and report your findings to the release engineering team
***</li>
</ul>

<h2>Interview - Sean Chittenden - <a href="mailto:seanc@freebsd.org" rel="nofollow">seanc@freebsd.org</a> / <a href="https://twitter.com/seanchittenden" rel="nofollow">@seanchittenden</a></h2>

<p>FreeBSD at Groupon, ZFS</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tumfatig.net/20150620/opensmtpd-and-dovecot-on-openbsd-5-7/" rel="nofollow">OpenSMTPD and Dovecot</a></h3>

<ul>
<li>We&#39;ve covered a number of OpenSMTPD mail server guides on the show, each with just a little something different to offer than the last</li>
<li>This blog post about it has something not mentioned before: virtual domains and virtual users</li>
<li>This means you can easily have &quot;<a href="mailto:user1@domain.com" rel="nofollow">user1@domain.com</a>&quot; and &quot;<a href="mailto:user2@otherdomain.com" rel="nofollow">user2@otherdomain.com</a>&quot; both go to a local user on the box (or a different third address)</li>
<li>It also covers SSL certificates, blocking spam and setting up IMAP access, the usual</li>
<li>Now might also be a good time to test out OpenSMTPD <a href="https://www.mail-archive.com/misc@opensmtpd.org/msg02177.html" rel="nofollow">5.7.1-rc1</a>, which we&#39;ll cover in more detail when it&#39;s released...
***</li>
</ul>

<h3><a href="https://github.com/aarnt/octopkg" rel="nofollow">OctoPkg, a QT frontend to pkgng</a></h3>

<ul>
<li>A PC-BSD user has begun porting over a graphical package management utility from Arch linux called <a href="https://octopiproject.wordpress.com/about/" rel="nofollow">Octopi</a></li>
<li>Obviously, it needed to be rewritten to use FreeBSD&#39;s pkg system instead of pacman</li>
<li>There are some basic instructions on how to get it built and running on the github page</li>
<li>After some testing, it&#39;ll likely make its way to the FreeBSD ports tree</li>
<li>Tools like this might make it easier for desktop users (who are used to similar things in Ubuntu or related distros) to switch over
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150619071929" rel="nofollow">AFL vs. mandoc, a quantitative analysis</a></h3>

<ul>
<li>Ingo Schwarze has written a pretty detailed article about how he and other OpenBSD developers have been fuzzing mandoc with AFL</li>
<li>It&#39;s meant to be accompanying material to his BSDCan talk, which already covered nine topics</li>
<li>mandoc is an interesting example to stress test with fuzzing, since its main job is to take and parse some highly varying input</li>
<li>The article breaks down the 45 different bugs that were found, based on their root cause</li>
<li>If you&#39;re interested in secure coding practices, this&#39;ll be a great one to read
***</li>
</ul>

<h3><a href="https://www.youtube.com/playlist?list=PLaUVvul17xScvtic0SPoks2MlQleyejks" rel="nofollow">OpenZFS conference videos</a></h3>

<ul>
<li>Videos from the second OpenZFS conference have just started to show up</li>
<li>The first talk is by, you guessed it, Matt Ahrens</li>
<li>In it, he covers some ZFS history, the Oracle takeover, the birth of illumos and OpenZFS, some administration basics and also some upcoming features that are being worked on</li>
<li>There are also videos <a href="https://www.youtube.com/watch?v=5ciV4z7WWmo" rel="nofollow">from Nexenta</a> <a href="https://www.youtube.com/watch?v=a2lnMxMUxyc" rel="nofollow">and HGST</a>, talking about how they use and contribute to OpenZFS
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2FqJfmeK3" rel="nofollow">Bryson writes in</a></li>
<li><a href="http://slexy.org/view/s20erRHahQ" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>84: pkg remove freebsd-update</title>
  <link>https://www.bsdnow.tv/84</link>
  <guid isPermaLink="false">88c9bd14-b1bf-4d45-96b6-9af12b44d40b</guid>
  <pubDate>Wed, 08 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/88c9bd14-b1bf-4d45-96b6-9af12b44d40b.mp3" length="53948308" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this week's mini-episode, we'll be talking with Baptiste Daroussin about packaging the FreeBSD base system with pkgng. Is this the best way going forward, or are we getting dangerously close to being Linux-like? We'll find out, and also get to a couple of your emails while we're at it, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:14:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>On this week's mini-episode, we'll be talking with Baptiste Daroussin about packaging the FreeBSD base system with pkgng. Is this the best way going forward, or are we getting dangerously close to being Linux-like? We'll find out, and also get to a couple of your emails while we're at it, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Xen dom0 in FreeBSD 11-CURRENT (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=382965)
FreeBSD has just gotten dom0 (http://wiki.xen.org/wiki/Dom0) support for the Xen hypervisor, something NetBSD has had (http://wiki.netbsd.org/ports/xen/howto/#netbsd-dom0) for a while now
The ports tree will now have a Xen kernel and toolstack, meaning that they can be updated much more rapidly than if they were part of base
It's currently limited to Intel boxes with EPT and a working IOMMU, running a recent version of the -CURRENT branch, but we'll likely see it when 11.0 comes out
How will this affect interest in Bhyve?
***
A tale of two educational moments (http://blog.anthrobsd.net/044.html)
Here we have a blog post from an OpenBSD developer about some experiences he had helping people get involved with the project
It's split into two stories: one that could've gone better, and one that went really well
For the first one, he found that someone was trying to modify a package from their ports tree to have fewer dependencies
Experience really showed its worth, and he was able to write a quick patch to do exactly what the other person had been working on for a few hours - but wasn't so encouraging about getting it committed
In the second story, he discussed updating a different port with a user of a forum, and ended up improving the new user's workflow considerably with just a few tips
The lesson to take away from this is that we can all help out to encourage and assist new users - everyone was a newbie once
***
What's coming in NetBSD 7 (http://saveosx.org/NetBSD7/)
We first mentioned NetBSD 7.0 on the show in July of 2014, but it still hasn't been released and there hasn't been much public info about it
This blog post outlines some of the bigger features that we can expect to see when it actually does come out
Their total platform count is now over 70, so you'd be hard-pressed to find something that it doesn't run on
There have been a lot of improvements in the graphics area, particularly with DRM/KMS, including Intel Haswell and Nouveau (for nVidia cards)
Many ARM boards now have full SMP support
Clang has also finally made its way into the base system, something we're glad to see, and it should be able to build the base OS on i386, AMD64 and ARM - other architectures are still a WIP
In the crypto department: their PNRG has switched from the broken RC4 to the more modern ChaCha20, OpenSSL has been updated in base and LibreSSL is in pkgsrc
NetBSD's in-house firewall, npf, has gotten major improvements since its initial debut in NetBSD 6.0
Looking to the future, NetBSD hopes to integrate a stable ZFS implementation later on
***
OpenZFS office hours (https://www.youtube.com/watch?v=mS4bfbEq46I)
We mentioned a couple weeks back that the OpenZFS office hours series was starting back up
They've just uploaded the recording of their most recent freeform discussion, with Justin Gibbs (http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii) being the main presenter
In it, they cover how Justin got into ZFS, running in virtualized environments, getting patches into the different projects, getting more people involved, reviewing code, spinning disks vs SSDs, defragging, speeding up resilvering, zfsd and much more
***
Interview - Baptiste Daroussin - bapt@freebsd.org (mailto:bapt@freebsd.org)
Packaging the FreeBSD base system with pkgng
Discussion
Packaging the FreeBSD base system with pkgng (follow-up)
Feedback/Questions
Jeff writes in (http://slexy.org/view/s20AWp6Av1)
Anonymous writes in (http://slexy.org/view/s20QiFcdh8)
Alex writes in (http://slexy.org/view/s2YzZlswaB)
Joris writes in (http://slexy.org/view/s21Mx9TopQ)
***
Mailing List Gold
ok feedback@ (https://www.marc.info/?l=openbsd-ports&amp;amp;m=142679136422432&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkg, poudriere, pkgng, freebsd-update, packaging base, presentation, asiabsdcon, xen, dom0, domu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this week&#39;s mini-episode, we&#39;ll be talking with Baptiste Daroussin about packaging the FreeBSD base system with pkgng. Is this the best way going forward, or are we getting dangerously close to being Linux-like? We&#39;ll find out, and also get to a couple of your emails while we&#39;re at it, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=382965" rel="nofollow">Xen dom0 in FreeBSD 11-CURRENT</a></h3>

<ul>
<li>FreeBSD has just gotten <a href="http://wiki.xen.org/wiki/Dom0" rel="nofollow">dom0</a> support for the Xen hypervisor, something <a href="http://wiki.netbsd.org/ports/xen/howto/#netbsd-dom0" rel="nofollow">NetBSD has had</a> for a while now</li>
<li>The ports tree will now have a Xen kernel and toolstack, meaning that they can be updated much more rapidly than if they were part of base</li>
<li>It&#39;s currently limited to Intel boxes with EPT and a working IOMMU, running a recent version of the -CURRENT branch, but we&#39;ll likely see it when 11.0 comes out</li>
<li>How will this affect interest in Bhyve?
***</li>
</ul>

<h3><a href="http://blog.anthrobsd.net/044.html" rel="nofollow">A tale of two educational moments</a></h3>

<ul>
<li>Here we have a blog post from an OpenBSD developer about some experiences he had helping people get involved with the project</li>
<li>It&#39;s split into two stories: one that could&#39;ve gone better, and one that went really well</li>
<li>For the first one, he found that someone was trying to modify a package from their ports tree to have fewer dependencies</li>
<li>Experience really showed its worth, and he was able to write a quick patch to do exactly what the other person had been working on for a few hours - but wasn&#39;t so encouraging about getting it committed</li>
<li>In the second story, he discussed updating a different port with a user of a forum, and ended up improving the new user&#39;s workflow considerably with just a few tips</li>
<li>The lesson to take away from this is that we can all help out to encourage and assist new users - everyone was a newbie once
***</li>
</ul>

<h3><a href="http://saveosx.org/NetBSD7/" rel="nofollow">What&#39;s coming in NetBSD 7</a></h3>

<ul>
<li>We first mentioned NetBSD 7.0 on the show in July of 2014, but it still hasn&#39;t been released and there hasn&#39;t been much public info about it</li>
<li>This blog post outlines some of the bigger features that we can expect to see when it actually does come out</li>
<li>Their total platform count is now over 70, so you&#39;d be hard-pressed to find something that it doesn&#39;t run on</li>
<li>There have been a lot of improvements in the graphics area, particularly with DRM/KMS, including Intel Haswell and Nouveau (for nVidia cards)</li>
<li>Many ARM boards now have full SMP support</li>
<li>Clang has also finally made its way into the base system, something we&#39;re glad to see, and it should be able to build the base OS on i386, AMD64 and ARM - other architectures are still a WIP</li>
<li>In the crypto department: their PNRG has switched from the broken RC4 to the more modern ChaCha20, OpenSSL has been updated in base and LibreSSL is in pkgsrc</li>
<li>NetBSD&#39;s in-house firewall, npf, has gotten major improvements since its initial debut in NetBSD 6.0</li>
<li>Looking to the future, NetBSD hopes to integrate a stable ZFS implementation later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mS4bfbEq46I" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>We mentioned a couple weeks back that the OpenZFS office hours series was starting back up</li>
<li>They&#39;ve just uploaded the recording of their most recent freeform discussion, with <a href="http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii" rel="nofollow">Justin Gibbs</a> being the main presenter</li>
<li>In it, they cover how Justin got into ZFS, running in virtualized environments, getting patches into the different projects, getting more people involved, reviewing code, spinning disks vs SSDs, defragging, speeding up resilvering, zfsd and much more
***</li>
</ul>

<h2>Interview - Baptiste Daroussin - <a href="mailto:bapt@freebsd.org" rel="nofollow">bapt@freebsd.org</a></h2>

<p>Packaging the FreeBSD base system with pkgng</p>

<hr>

<h2>Discussion</h2>

<h3>Packaging the FreeBSD base system with pkgng (follow-up)</h3>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20AWp6Av1" rel="nofollow">Jeff writes in</a></li>
<li><a href="http://slexy.org/view/s20QiFcdh8" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s2YzZlswaB" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s21Mx9TopQ" rel="nofollow">Joris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=142679136422432&w=2" rel="nofollow">ok feedback@</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this week&#39;s mini-episode, we&#39;ll be talking with Baptiste Daroussin about packaging the FreeBSD base system with pkgng. Is this the best way going forward, or are we getting dangerously close to being Linux-like? We&#39;ll find out, and also get to a couple of your emails while we&#39;re at it, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=382965" rel="nofollow">Xen dom0 in FreeBSD 11-CURRENT</a></h3>

<ul>
<li>FreeBSD has just gotten <a href="http://wiki.xen.org/wiki/Dom0" rel="nofollow">dom0</a> support for the Xen hypervisor, something <a href="http://wiki.netbsd.org/ports/xen/howto/#netbsd-dom0" rel="nofollow">NetBSD has had</a> for a while now</li>
<li>The ports tree will now have a Xen kernel and toolstack, meaning that they can be updated much more rapidly than if they were part of base</li>
<li>It&#39;s currently limited to Intel boxes with EPT and a working IOMMU, running a recent version of the -CURRENT branch, but we&#39;ll likely see it when 11.0 comes out</li>
<li>How will this affect interest in Bhyve?
***</li>
</ul>

<h3><a href="http://blog.anthrobsd.net/044.html" rel="nofollow">A tale of two educational moments</a></h3>

<ul>
<li>Here we have a blog post from an OpenBSD developer about some experiences he had helping people get involved with the project</li>
<li>It&#39;s split into two stories: one that could&#39;ve gone better, and one that went really well</li>
<li>For the first one, he found that someone was trying to modify a package from their ports tree to have fewer dependencies</li>
<li>Experience really showed its worth, and he was able to write a quick patch to do exactly what the other person had been working on for a few hours - but wasn&#39;t so encouraging about getting it committed</li>
<li>In the second story, he discussed updating a different port with a user of a forum, and ended up improving the new user&#39;s workflow considerably with just a few tips</li>
<li>The lesson to take away from this is that we can all help out to encourage and assist new users - everyone was a newbie once
***</li>
</ul>

<h3><a href="http://saveosx.org/NetBSD7/" rel="nofollow">What&#39;s coming in NetBSD 7</a></h3>

<ul>
<li>We first mentioned NetBSD 7.0 on the show in July of 2014, but it still hasn&#39;t been released and there hasn&#39;t been much public info about it</li>
<li>This blog post outlines some of the bigger features that we can expect to see when it actually does come out</li>
<li>Their total platform count is now over 70, so you&#39;d be hard-pressed to find something that it doesn&#39;t run on</li>
<li>There have been a lot of improvements in the graphics area, particularly with DRM/KMS, including Intel Haswell and Nouveau (for nVidia cards)</li>
<li>Many ARM boards now have full SMP support</li>
<li>Clang has also finally made its way into the base system, something we&#39;re glad to see, and it should be able to build the base OS on i386, AMD64 and ARM - other architectures are still a WIP</li>
<li>In the crypto department: their PNRG has switched from the broken RC4 to the more modern ChaCha20, OpenSSL has been updated in base and LibreSSL is in pkgsrc</li>
<li>NetBSD&#39;s in-house firewall, npf, has gotten major improvements since its initial debut in NetBSD 6.0</li>
<li>Looking to the future, NetBSD hopes to integrate a stable ZFS implementation later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mS4bfbEq46I" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>We mentioned a couple weeks back that the OpenZFS office hours series was starting back up</li>
<li>They&#39;ve just uploaded the recording of their most recent freeform discussion, with <a href="http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii" rel="nofollow">Justin Gibbs</a> being the main presenter</li>
<li>In it, they cover how Justin got into ZFS, running in virtualized environments, getting patches into the different projects, getting more people involved, reviewing code, spinning disks vs SSDs, defragging, speeding up resilvering, zfsd and much more
***</li>
</ul>

<h2>Interview - Baptiste Daroussin - <a href="mailto:bapt@freebsd.org" rel="nofollow">bapt@freebsd.org</a></h2>

<p>Packaging the FreeBSD base system with pkgng</p>

<hr>

<h2>Discussion</h2>

<h3>Packaging the FreeBSD base system with pkgng (follow-up)</h3>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20AWp6Av1" rel="nofollow">Jeff writes in</a></li>
<li><a href="http://slexy.org/view/s20QiFcdh8" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s2YzZlswaB" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s21Mx9TopQ" rel="nofollow">Joris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=142679136422432&w=2" rel="nofollow">ok feedback@</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>82: SSL in the Wild</title>
  <link>https://www.bsdnow.tv/82</link>
  <guid isPermaLink="false">530c2987-381d-4c49-bfb9-b78872dd2e03</guid>
  <pubDate>Wed, 25 Mar 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/530c2987-381d-4c49-bfb9-b78872dd2e03.mp3" length="63405364" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He's been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:28:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He's been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
EuroBSDCon 2015 call for papers (https://2015.eurobsdcon.org/call-for-papers/)
The call for papers has been announced for the next EuroBSDCon (http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur), which is set to be held in Sweden this year
According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April
If giving a full talk isn't your thing, there's also a call for tutorials - if you're comfortable teaching other people about something BSD-related, this could be a great thing too
You're not limited to one proposal - several speakers gave multiple in 2014 - so don't hesitate if you've got more than one thing you'd like to talk about
We'd like to see a more balanced conference schedule than BSDCan's having this year, but that requires effort on both sides - if you're doing anything cool with any BSD, we'd encourage you submit a proposal (or two)
Check the announcement for all the specific details and requirements
If your talk gets accepted, the conference even pays for your travel expenses
***
Making security sausage (http://www.tedunangst.com/flak/post/making-security-sausage)
Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD
"Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!"
The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review
It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug
Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions
The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them
Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute
It was because of this that FreeBSD actually had to release a security update to their security update (https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html)
He concludes with "My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note 'oh, and some security too' creates downstream mayhem."
***
Running FreeBSD on the server, a sysadmin speaks (http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks)
More BSD content is appearing on mainstream technology sites, and, more importantly, BSD Now is being mentioned
ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)
They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor
It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers
If you've been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***
NetBSD ported to Hardkernel ODROID-C1 (https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid)
In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the Hardkernel ODROID-C1 (http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433)
This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35
There's a special kernel config file for this board's hardware, available in both -current and the upcoming 7.0
More info can be found on their wiki page (https://wiki.netbsd.org/ports/evbarm/odroid-c1/)
After this was written, basic framebuffer console support was also committed (http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html), allowing a developer to run XFCE (https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large) on the device
***
Interview - Bernard Spil - brnrd@freebsd.org (mailto:brnrd@freebsd.org) / @sp1l (https://twitter.com/sp1l)
LibreSSL adoption in FreeBSD ports (https://wiki.freebsd.org/LibreSSL) and the wider software ecosystem
News Roundup
Monitoring pf logs with Gource (http://www.echothrust.com/blogs/monitoring-pf-logs-gource)
If you're using pf (http://www.bsdnow.tv/tutorials/pf) on any of the BSDs, maybe you've gotten bored of grepping logs and want to do something more fancy
This article will show you how to get set up with Gource for a cinematic-like experience
If you've never heard of Gource, it's "an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories"
When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic
One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend's phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***
pkgng 1.5.0 alpha1 released (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=381573)
The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1
This update introduces support for provides/requires, something that we've been wanting for a long time
It will also now print which package is the reason for direct dependency change
Another interesting addition is the "pkg -r" switch, allowing cross installation of packages
Remember this isn't the stable version, so maybe don't upgrade to it just yet on any production systems
DragonFly will also likely pick up this update once it's marked stable
***
Welcome to OpenBSD (http://devio.us/~bcallah/rcos2015.pdf)
We mentioned last week that our listener Brian was giving a talk in the Troy, New York area
The slides from that talk are now online, and they've been generating quite a bit of discussion (https://news.ycombinator.com/item?id=9240533) online (https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/)
It's simply titled "Welcome to OpenBSD" and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)
Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved
As you may know, NetBSD has almost 60 supported platforms (https://www.netbsd.org/ports/) and their slogan is "of course it runs NetBSD" - Brian says, with 17 platforms (http://www.openbsd.org/plat.html) over 13 CPU architectures, "it probably runs OpenBSD"
No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet
Try to guess which font he used...
***
BSDTalk episode 252 (http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html)
And somehow Brian has snuck himself into another news item this week
He makes an appearance in the latest episode of BSD Talk (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk), where he chats with Will about running a BSD-based shell provider
If that sounds familiar, it's probably because we did the same thing (http://www.bsdnow.tv/episodes/2014_06_18-devious_methods), albeit with a different member of their team
In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people
They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***
Feedback/Questions
Christian writes in (http://slexy.org/view/s2O81pixhq)
Stefan writes in (http://slexy.org/view/s2dhr2WfVc)
Possnfiffer writes in (http://slexy.org/view/s2Kisq2EqT)
Ruudsch writes in (http://slexy.org/view/s2Xr0e5YAJ)
Shane writes in (http://slexy.org/view/s2Xz7BNoJE)
***
Mailing List Gold
Accidental support (https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html)
Larry's tears (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142686812913221&amp;amp;w=2)
The boy who sailed with BSD (https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgng, poudriere, eurobsdcon, 2015, mg, emacs, libressl, openssl, ports, tls, heartbleed, freak attack, pkgng, hardkernel, gource</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He&#39;s been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://2015.eurobsdcon.org/call-for-papers/" rel="nofollow">EuroBSDCon 2015 call for papers</a></h3>

<ul>
<li>The call for papers has been announced for the next <a href="http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur" rel="nofollow">EuroBSDCon</a>, which is set to be held in Sweden this year</li>
<li>According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April</li>
<li>If giving a full talk isn&#39;t your thing, there&#39;s also a call for tutorials - if you&#39;re comfortable teaching other people about something BSD-related, this could be a great thing too</li>
<li>You&#39;re not limited to one proposal - several speakers gave multiple in 2014 - so don&#39;t hesitate if you&#39;ve got more than one thing you&#39;d like to talk about</li>
<li>We&#39;d like to see a more balanced conference schedule than BSDCan&#39;s having this year, but that requires effort on both sides - if you&#39;re doing <em>anything</em> cool with <em>any</em> BSD, we&#39;d encourage you submit a proposal (or two)</li>
<li>Check the announcement for all the specific details and requirements</li>
<li>If your talk gets accepted, the conference even pays for your travel expenses
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/making-security-sausage" rel="nofollow">Making security sausage</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD</li>
<li>&quot;Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!&quot;</li>
<li>The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review</li>
<li>It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug</li>
<li>Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions</li>
<li>The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them</li>
<li>Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute</li>
<li>It was because of this that FreeBSD actually had to release <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html" rel="nofollow">a security update to their security update</a></li>
<li>He concludes with &quot;My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note &#39;oh, and some security too&#39; creates downstream mayhem.&quot;
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks" rel="nofollow">Running FreeBSD on the server, a sysadmin speaks</a></h3>

<ul>
<li>More BSD content is appearing on mainstream technology sites, and, <strong>more importantly</strong>, BSD Now is being mentioned</li>
<li>ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)</li>
<li>They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor</li>
<li>It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers</li>
<li>If you&#39;ve been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid" rel="nofollow">NetBSD ported to Hardkernel ODROID-C1</a></h3>

<ul>
<li>In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the <a href="http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433" rel="nofollow">Hardkernel ODROID-C1</a></li>
<li>This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35</li>
<li>There&#39;s a special kernel config file for this board&#39;s hardware, available in both -current and the upcoming 7.0</li>
<li>More info can be found on <a href="https://wiki.netbsd.org/ports/evbarm/odroid-c1/" rel="nofollow">their wiki page</a></li>
<li>After this was written, basic framebuffer console support was <a href="http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html" rel="nofollow">also committed</a>, allowing a developer to <a href="https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large" rel="nofollow">run XFCE</a> on the device
***</li>
</ul>

<h2>Interview - Bernard Spil - <a href="mailto:brnrd@freebsd.org" rel="nofollow">brnrd@freebsd.org</a> / <a href="https://twitter.com/sp1l" rel="nofollow">@sp1l</a></h2>

<p>LibreSSL adoption <a href="https://wiki.freebsd.org/LibreSSL" rel="nofollow">in FreeBSD ports</a> and the wider software ecosystem</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/monitoring-pf-logs-gource" rel="nofollow">Monitoring pf logs with Gource</a></h3>

<ul>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">using pf</a> on any of the BSDs, maybe you&#39;ve gotten bored of grepping logs and want to do something more fancy</li>
<li>This article will show you how to get set up with Gource for a cinematic-like experience</li>
<li>If you&#39;ve never heard of Gource, it&#39;s &quot;an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories&quot;</li>
<li>When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic</li>
<li>One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend&#39;s phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=381573" rel="nofollow">pkgng 1.5.0 alpha1 released</a></h3>

<ul>
<li>The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1</li>
<li>This update introduces support for provides/requires, something that we&#39;ve been wanting for a long time</li>
<li>It will also now print which package is the reason for direct dependency change</li>
<li>Another interesting addition is the &quot;pkg -r&quot; switch, allowing cross installation of packages</li>
<li>Remember this isn&#39;t the stable version, so maybe don&#39;t upgrade to it just yet on any production systems</li>
<li>DragonFly will also likely pick up this update once it&#39;s marked stable
***</li>
</ul>

<h3><a href="http://devio.us/%7Ebcallah/rcos2015.pdf" rel="nofollow">Welcome to OpenBSD</a></h3>

<ul>
<li>We mentioned last week that our listener Brian was giving a talk in the Troy, New York area</li>
<li>The slides from that talk are now online, and they&#39;ve been generating quite a bit of <a href="https://news.ycombinator.com/item?id=9240533" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/" rel="nofollow">online</a></li>
<li>It&#39;s simply titled &quot;Welcome to OpenBSD&quot; and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)</li>
<li>Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved</li>
<li>As you may know, NetBSD has almost 60 <a href="https://www.netbsd.org/ports/" rel="nofollow">supported platforms</a> and their slogan is &quot;<em>of course</em> it runs NetBSD&quot; - Brian says, with <a href="http://www.openbsd.org/plat.html" rel="nofollow">17 platforms</a> over 13 CPU architectures, &quot;it <em>probably</em> runs OpenBSD&quot;</li>
<li>No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet</li>
<li>Try to guess which font he used...
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html" rel="nofollow">BSDTalk episode 252</a></h3>

<ul>
<li>And somehow Brian has snuck himself into <em>another</em> news item this week</li>
<li>He makes an appearance in the latest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSD Talk</a>, where he chats with Will about running a BSD-based shell provider</li>
<li>If that sounds familiar, it&#39;s probably because <a href="http://www.bsdnow.tv/episodes/2014_06_18-devious_methods" rel="nofollow">we did the same thing</a>, albeit with a different member of their team</li>
<li>In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people</li>
<li>They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2O81pixhq" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s2dhr2WfVc" rel="nofollow">Stefan writes in</a></li>
<li><a href="http://slexy.org/view/s2Kisq2EqT" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s2Xr0e5YAJ" rel="nofollow">Ruudsch writes in</a></li>
<li><a href="http://slexy.org/view/s2Xz7BNoJE" rel="nofollow">Shane writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html" rel="nofollow">Accidental support</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142686812913221&w=2" rel="nofollow">Larry&#39;s tears</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html" rel="nofollow">The boy who sailed with BSD</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He&#39;s been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://2015.eurobsdcon.org/call-for-papers/" rel="nofollow">EuroBSDCon 2015 call for papers</a></h3>

<ul>
<li>The call for papers has been announced for the next <a href="http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur" rel="nofollow">EuroBSDCon</a>, which is set to be held in Sweden this year</li>
<li>According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April</li>
<li>If giving a full talk isn&#39;t your thing, there&#39;s also a call for tutorials - if you&#39;re comfortable teaching other people about something BSD-related, this could be a great thing too</li>
<li>You&#39;re not limited to one proposal - several speakers gave multiple in 2014 - so don&#39;t hesitate if you&#39;ve got more than one thing you&#39;d like to talk about</li>
<li>We&#39;d like to see a more balanced conference schedule than BSDCan&#39;s having this year, but that requires effort on both sides - if you&#39;re doing <em>anything</em> cool with <em>any</em> BSD, we&#39;d encourage you submit a proposal (or two)</li>
<li>Check the announcement for all the specific details and requirements</li>
<li>If your talk gets accepted, the conference even pays for your travel expenses
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/making-security-sausage" rel="nofollow">Making security sausage</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD</li>
<li>&quot;Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!&quot;</li>
<li>The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review</li>
<li>It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug</li>
<li>Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions</li>
<li>The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them</li>
<li>Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute</li>
<li>It was because of this that FreeBSD actually had to release <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html" rel="nofollow">a security update to their security update</a></li>
<li>He concludes with &quot;My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note &#39;oh, and some security too&#39; creates downstream mayhem.&quot;
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks" rel="nofollow">Running FreeBSD on the server, a sysadmin speaks</a></h3>

<ul>
<li>More BSD content is appearing on mainstream technology sites, and, <strong>more importantly</strong>, BSD Now is being mentioned</li>
<li>ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)</li>
<li>They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor</li>
<li>It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers</li>
<li>If you&#39;ve been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid" rel="nofollow">NetBSD ported to Hardkernel ODROID-C1</a></h3>

<ul>
<li>In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the <a href="http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433" rel="nofollow">Hardkernel ODROID-C1</a></li>
<li>This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35</li>
<li>There&#39;s a special kernel config file for this board&#39;s hardware, available in both -current and the upcoming 7.0</li>
<li>More info can be found on <a href="https://wiki.netbsd.org/ports/evbarm/odroid-c1/" rel="nofollow">their wiki page</a></li>
<li>After this was written, basic framebuffer console support was <a href="http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html" rel="nofollow">also committed</a>, allowing a developer to <a href="https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large" rel="nofollow">run XFCE</a> on the device
***</li>
</ul>

<h2>Interview - Bernard Spil - <a href="mailto:brnrd@freebsd.org" rel="nofollow">brnrd@freebsd.org</a> / <a href="https://twitter.com/sp1l" rel="nofollow">@sp1l</a></h2>

<p>LibreSSL adoption <a href="https://wiki.freebsd.org/LibreSSL" rel="nofollow">in FreeBSD ports</a> and the wider software ecosystem</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/monitoring-pf-logs-gource" rel="nofollow">Monitoring pf logs with Gource</a></h3>

<ul>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">using pf</a> on any of the BSDs, maybe you&#39;ve gotten bored of grepping logs and want to do something more fancy</li>
<li>This article will show you how to get set up with Gource for a cinematic-like experience</li>
<li>If you&#39;ve never heard of Gource, it&#39;s &quot;an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories&quot;</li>
<li>When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic</li>
<li>One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend&#39;s phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=381573" rel="nofollow">pkgng 1.5.0 alpha1 released</a></h3>

<ul>
<li>The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1</li>
<li>This update introduces support for provides/requires, something that we&#39;ve been wanting for a long time</li>
<li>It will also now print which package is the reason for direct dependency change</li>
<li>Another interesting addition is the &quot;pkg -r&quot; switch, allowing cross installation of packages</li>
<li>Remember this isn&#39;t the stable version, so maybe don&#39;t upgrade to it just yet on any production systems</li>
<li>DragonFly will also likely pick up this update once it&#39;s marked stable
***</li>
</ul>

<h3><a href="http://devio.us/%7Ebcallah/rcos2015.pdf" rel="nofollow">Welcome to OpenBSD</a></h3>

<ul>
<li>We mentioned last week that our listener Brian was giving a talk in the Troy, New York area</li>
<li>The slides from that talk are now online, and they&#39;ve been generating quite a bit of <a href="https://news.ycombinator.com/item?id=9240533" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/" rel="nofollow">online</a></li>
<li>It&#39;s simply titled &quot;Welcome to OpenBSD&quot; and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)</li>
<li>Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved</li>
<li>As you may know, NetBSD has almost 60 <a href="https://www.netbsd.org/ports/" rel="nofollow">supported platforms</a> and their slogan is &quot;<em>of course</em> it runs NetBSD&quot; - Brian says, with <a href="http://www.openbsd.org/plat.html" rel="nofollow">17 platforms</a> over 13 CPU architectures, &quot;it <em>probably</em> runs OpenBSD&quot;</li>
<li>No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet</li>
<li>Try to guess which font he used...
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html" rel="nofollow">BSDTalk episode 252</a></h3>

<ul>
<li>And somehow Brian has snuck himself into <em>another</em> news item this week</li>
<li>He makes an appearance in the latest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSD Talk</a>, where he chats with Will about running a BSD-based shell provider</li>
<li>If that sounds familiar, it&#39;s probably because <a href="http://www.bsdnow.tv/episodes/2014_06_18-devious_methods" rel="nofollow">we did the same thing</a>, albeit with a different member of their team</li>
<li>In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people</li>
<li>They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2O81pixhq" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s2dhr2WfVc" rel="nofollow">Stefan writes in</a></li>
<li><a href="http://slexy.org/view/s2Kisq2EqT" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s2Xr0e5YAJ" rel="nofollow">Ruudsch writes in</a></li>
<li><a href="http://slexy.org/view/s2Xz7BNoJE" rel="nofollow">Shane writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html" rel="nofollow">Accidental support</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142686812913221&w=2" rel="nofollow">Larry&#39;s tears</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html" rel="nofollow">The boy who sailed with BSD</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>80: The PC-BSD Tour II</title>
  <link>https://www.bsdnow.tv/80</link>
  <guid isPermaLink="false">42370236-9013-44ce-882f-6e1b829bbca8</guid>
  <pubDate>Wed, 11 Mar 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/42370236-9013-44ce-882f-6e1b829bbca8.mp3" length="57728596" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're away at AsiaBSDCon this week, but we've still got a packed episode for you. First up is a sequel to the "PC-BSD tour" segment from a while back, highlighting how ZFS boot environments work. After that, Justin Gibbs joins us to talk about the FreeBSD foundation's 15th anniversary. We'll return next week with a normal episode of BSD Now - which is of course, the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're away at AsiaBSDCon this week, but we've still got a packed episode for you. First up is a sequel to the "PC-BSD tour" segment from a while back, highlighting how ZFS boot environments work. After that, Justin Gibbs joins us to talk about the FreeBSD foundation's 15th anniversary. We'll return next week with a normal episode of BSD Now - which is of course, the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Special segment
Demystifying Boot Environments in PC-BSD
Interview - Justin Gibbs - gibbs@freebsd.org (mailto:gibbs@freebsd.org) / @freebsdfndation (https://twitter.com/freebsdfndation)
The FreeBSD foundation's 15th anniversary
Discussion
The story of PC-BSD
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, asiabsdcon, 2015, freebsd foundation, president, anniversary, walkthrough, tour, guide, pkgng, boot environments, zfs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re away at AsiaBSDCon this week, but we&#39;ve still got a packed episode for you. First up is a sequel to the &quot;PC-BSD tour&quot; segment from a while back, highlighting how ZFS boot environments work. After that, Justin Gibbs joins us to talk about the FreeBSD foundation&#39;s 15th anniversary. We&#39;ll return next week with a normal episode of BSD Now - which is of course, the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Special segment</h2>

<p>Demystifying Boot Environments in PC-BSD</p>

<hr>

<h2>Interview - Justin Gibbs - <a href="mailto:gibbs@freebsd.org" rel="nofollow">gibbs@freebsd.org</a> / <a href="https://twitter.com/freebsdfndation" rel="nofollow">@freebsdfndation</a></h2>

<p>The FreeBSD foundation&#39;s 15th anniversary</p>

<hr>

<h2>Discussion</h2>

<p>The story of PC-BSD</p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re away at AsiaBSDCon this week, but we&#39;ve still got a packed episode for you. First up is a sequel to the &quot;PC-BSD tour&quot; segment from a while back, highlighting how ZFS boot environments work. After that, Justin Gibbs joins us to talk about the FreeBSD foundation&#39;s 15th anniversary. We&#39;ll return next week with a normal episode of BSD Now - which is of course, the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Special segment</h2>

<p>Demystifying Boot Environments in PC-BSD</p>

<hr>

<h2>Interview - Justin Gibbs - <a href="mailto:gibbs@freebsd.org" rel="nofollow">gibbs@freebsd.org</a> / <a href="https://twitter.com/freebsdfndation" rel="nofollow">@freebsdfndation</a></h2>

<p>The FreeBSD foundation&#39;s 15th anniversary</p>

<hr>

<h2>Discussion</h2>

<p>The story of PC-BSD</p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>48: Liberating SSL</title>
  <link>https://www.bsdnow.tv/48</link>
  <guid isPermaLink="false">e0c8ab6b-dd19-4778-8dc2-4b02bd2ae809</guid>
  <pubDate>Wed, 30 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0c8ab6b-dd19-4778-8dc2-4b02bd2ae809.mp3" length="43106548" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up in this week's episode, we'll be talking with one of OpenBSD's newest developers - Brent Cook - about the portable version of LibreSSL and how it's developed. We've also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>59:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up in this week's episode, we'll be talking with one of OpenBSD's newest developers - Brent Cook - about the portable version of LibreSSL and how it's developed. We've also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2014-04-2014-06.html)
FreeBSD has gotten quite a lot done this quarter
Changes in the way release branches are supported - major releases will get at least five years over their lifespan
A new automounter is in the works, hoping to replace amd (which has some issues)
The CAM target layer and RPC stack have gotten some major optimization and speed boosts
Work on ZFSGuru continues, with a large status report specifically for that
The report also mentioned some new committers, both source and ports
It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we've already mentioned on the show
"Foundation-sponsored work resulted in 226 commits to FreeBSD over the April to June period"
***
A new OpenBSD HTTPD is born (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724094043)
Work has begun on a new HTTP daemon in the OpenBSD base system
A lot of people are asking (http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/) "why?" since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?
Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn't trying to be a full-featured replacement)
It's partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter
This has the added benefit of the usual, easy-to-understand syntax and privilege separation 
There's a very brief man page (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8) online already
It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs
Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***
pkgng 1.3 announced (https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html)
The newest version of FreeBSD's second generation package management system (http://www.bsdnow.tv/tutorials/pkgng) has been released, with lots of new features
It has a new "real" solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)
Lots of the code has been sandboxed for extra security
You'll probably notice some new changes to the UI too, making things more user friendly
A few days later 1.3.1 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;sortby=date&amp;amp;revision=362996) was released to fix a few small bugs, then 1.3.2 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=363108) shortly thereafter and 1.3.3 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=363363) yesterday
***
FreeBSD after-install security tasks (http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be)
A number of people have written in to ask us "how do I secure my BSD box after I install it?"
With this blog post, hopefully most of their questions will finally be answered in detail
It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things
Not only does it just list things to do, but the post also does a good job of explaining why you should do them
Maybe we'll see some more posts in this series in the future
***
Interview - Brent Cook - bcook@openbsd.org (mailto:bcook@openbsd.org) / @busterbcook (https://twitter.com/busterbcook)
LibreSSL's portable version and development
News Roundup
FreeBSD Mastery - Storage Essentials (https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials)
MWL (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop)'s new book about the FreeBSD storage subsystems now has an early draft available
Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes
Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance
You'll get access to the completed (e)book when it's done if you buy the early draft
The suggested price is $8
***
Why BSD and not Linux? (http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/)
Yet another thread comes up asking why you should choose BSD over Linux or vice-versa
Lots of good responses from users of the various BSDs
Directly ripping a quote: "Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is "GCC free". DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity."
And "Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS."
Some other users share their switching experiences - worth a read
***
More g2k14 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724161550)
Following up from last week's huge list (http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv) of hackathon reports, we have a few more
Landry Breuil (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724161550) spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream
Andrew Fresh (http://undeadly.org/cgi?action=article&amp;amp;sid=20140728122850) enjoyed his first hackathon, pushing OpenBSD's perl patches upstream and got tricked into rewriting the adduser utility in perl
Ted Unangst (http://undeadly.org/cgi?action=article&amp;amp;sid=20140729070721) did his usual "teduing" (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth
Luckily we didn't have to cover 20 new ones this time!
***
BSDTalk episode 243 (http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html)
The newest episode of BSDTalk (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) is out, featuring an interview with Ingo Schwarze of the OpenBSD team
The main topic of discussion is mandoc, which some users might not be familiar with
mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it's not built by default)
We'll catch up to you soon, Will!
***
Feedback/Questions
Thomas writes in (http://slexy.org/view/s2xLRQytAZ)
Stephen writes in (http://slexy.org/view/s21AYng20n)
Sha'ul writes in (http://slexy.org/view/s2DwLRdQDS)
Florian writes in (http://slexy.org/view/s2E05L31BC)
Bob Beck writes in (http://slexy.org/view/s21Nmg3Jrk) - and note the "Caution" section that was added to libressl.org (http://www.libressl.org/)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssl, libressl, portable, openssh, security, linux, arc4random, intrinsic functions, rng, prng, status report, pkgng, openhttpd, relayd, httpd, web server, zfsguru, zfs, freebsd mastery, book, storage, ufs, geom, disks, presentation, talk, comparison, mandoc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up in this week&#39;s episode, we&#39;ll be talking with one of OpenBSD&#39;s newest developers - Brent Cook - about the portable version of LibreSSL and how it&#39;s developed. We&#39;ve also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has gotten quite a lot done this quarter</li>
<li>Changes in the way release branches are supported - major releases will get at least five years over their lifespan</li>
<li>A new automounter is in the works, hoping to replace amd (which has some issues)</li>
<li>The CAM target layer and RPC stack have gotten some major optimization and speed boosts</li>
<li>Work on ZFSGuru continues, with a large status report specifically for that</li>
<li>The report also mentioned some new committers, both source and ports</li>
<li>It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we&#39;ve already mentioned on the show</li>
<li>&quot;Foundation-sponsored work resulted in <strong>226 commits</strong> to FreeBSD over the April to June period&quot;
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724094043" rel="nofollow">A new OpenBSD HTTPD is born</a></h3>

<ul>
<li>Work has begun on a new HTTP daemon in the OpenBSD base system</li>
<li>A lot of people are <a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" rel="nofollow">asking</a> &quot;why?&quot; since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?</li>
<li>Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn&#39;t trying to be a full-featured replacement)</li>
<li>It&#39;s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter</li>
<li>This has the added benefit of the usual, easy-to-understand syntax and privilege separation </li>
<li>There&#39;s a very brief <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" rel="nofollow">man page</a> online already</li>
<li>It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs</li>
<li>Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" rel="nofollow">pkgng 1.3 announced</a></h3>

<ul>
<li>The newest version of FreeBSD&#39;s second generation <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package management system</a> has been released, with lots of new features</li>
<li>It has a new &quot;real&quot; solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)</li>
<li>Lots of the code has been sandboxed for extra security</li>
<li>You&#39;ll probably notice some new changes to the UI too, making things more user friendly</li>
<li>A few days later <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=362996" rel="nofollow">1.3.1</a> was released to fix a few small bugs, then <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363108" rel="nofollow">1.3.2</a> shortly thereafter and <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363363" rel="nofollow">1.3.3</a> yesterday
***</li>
</ul>

<h3><a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" rel="nofollow">FreeBSD after-install security tasks</a></h3>

<ul>
<li>A number of people have written in to ask us &quot;how do I secure my BSD box after I install it?&quot;</li>
<li>With this blog post, hopefully most of their questions will finally be answered in detail</li>
<li>It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things</li>
<li>Not only does it just list things to do, but the post also does a good job of explaining why you should do them</li>
<li>Maybe we&#39;ll see some more posts in this series in the future
***</li>
</ul>

<h2>Interview - Brent Cook - <a href="mailto:bcook@openbsd.org" rel="nofollow">bcook@openbsd.org</a> / <a href="https://twitter.com/busterbcook" rel="nofollow">@busterbcook</a></h2>

<p>LibreSSL&#39;s portable version and development</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery - Storage Essentials</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a>&#39;s new book about the FreeBSD storage subsystems now has an early draft available</li>
<li>Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes</li>
<li>Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance</li>
<li>You&#39;ll get access to the completed (e)book when it&#39;s done if you buy the early draft</li>
<li>The suggested price is $8
***</li>
</ul>

<h3><a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" rel="nofollow">Why BSD and not Linux?</a></h3>

<ul>
<li>Yet another thread comes up asking why you should choose BSD over Linux or vice-versa</li>
<li>Lots of good responses from users of the various BSDs</li>
<li>Directly ripping a quote: &quot;Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is &quot;GCC free&quot;. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.&quot;</li>
<li>And &quot;Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.&quot;</li>
<li>Some other users share their switching experiences - worth a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">More g2k14 hackathon reports</a></h3>

<ul>
<li>Following up from last week&#39;s <a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">huge list</a> of hackathon reports, we have a few more</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">Landry Breuil</a> spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140728122850" rel="nofollow">Andrew Fresh</a> enjoyed his first hackathon, pushing OpenBSD&#39;s perl patches upstream and got tricked into rewriting the adduser utility in perl</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140729070721" rel="nofollow">Ted Unangst</a> did his usual &quot;teduing&quot; (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth</li>
<li>Luckily we didn&#39;t have to cover 20 new ones this time!
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" rel="nofollow">BSDTalk episode 243</a></h3>

<ul>
<li>The newest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, featuring an interview with Ingo Schwarze of the OpenBSD team</li>
<li>The main topic of discussion is mandoc, which some users might not be familiar with</li>
<li>mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it&#39;s not built by default)</li>
<li>We&#39;ll catch up to you soon, Will!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xLRQytAZ" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21AYng20n" rel="nofollow">Stephen writes in</a></li>
<li><a href="http://slexy.org/view/s2DwLRdQDS" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2E05L31BC" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s21Nmg3Jrk" rel="nofollow">Bob Beck writes in</a> - and note the &quot;Caution&quot; section that was added to <a href="http://www.libressl.org/" rel="nofollow">libressl.org</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up in this week&#39;s episode, we&#39;ll be talking with one of OpenBSD&#39;s newest developers - Brent Cook - about the portable version of LibreSSL and how it&#39;s developed. We&#39;ve also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has gotten quite a lot done this quarter</li>
<li>Changes in the way release branches are supported - major releases will get at least five years over their lifespan</li>
<li>A new automounter is in the works, hoping to replace amd (which has some issues)</li>
<li>The CAM target layer and RPC stack have gotten some major optimization and speed boosts</li>
<li>Work on ZFSGuru continues, with a large status report specifically for that</li>
<li>The report also mentioned some new committers, both source and ports</li>
<li>It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we&#39;ve already mentioned on the show</li>
<li>&quot;Foundation-sponsored work resulted in <strong>226 commits</strong> to FreeBSD over the April to June period&quot;
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724094043" rel="nofollow">A new OpenBSD HTTPD is born</a></h3>

<ul>
<li>Work has begun on a new HTTP daemon in the OpenBSD base system</li>
<li>A lot of people are <a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" rel="nofollow">asking</a> &quot;why?&quot; since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?</li>
<li>Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn&#39;t trying to be a full-featured replacement)</li>
<li>It&#39;s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter</li>
<li>This has the added benefit of the usual, easy-to-understand syntax and privilege separation </li>
<li>There&#39;s a very brief <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" rel="nofollow">man page</a> online already</li>
<li>It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs</li>
<li>Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" rel="nofollow">pkgng 1.3 announced</a></h3>

<ul>
<li>The newest version of FreeBSD&#39;s second generation <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package management system</a> has been released, with lots of new features</li>
<li>It has a new &quot;real&quot; solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)</li>
<li>Lots of the code has been sandboxed for extra security</li>
<li>You&#39;ll probably notice some new changes to the UI too, making things more user friendly</li>
<li>A few days later <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=362996" rel="nofollow">1.3.1</a> was released to fix a few small bugs, then <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363108" rel="nofollow">1.3.2</a> shortly thereafter and <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363363" rel="nofollow">1.3.3</a> yesterday
***</li>
</ul>

<h3><a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" rel="nofollow">FreeBSD after-install security tasks</a></h3>

<ul>
<li>A number of people have written in to ask us &quot;how do I secure my BSD box after I install it?&quot;</li>
<li>With this blog post, hopefully most of their questions will finally be answered in detail</li>
<li>It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things</li>
<li>Not only does it just list things to do, but the post also does a good job of explaining why you should do them</li>
<li>Maybe we&#39;ll see some more posts in this series in the future
***</li>
</ul>

<h2>Interview - Brent Cook - <a href="mailto:bcook@openbsd.org" rel="nofollow">bcook@openbsd.org</a> / <a href="https://twitter.com/busterbcook" rel="nofollow">@busterbcook</a></h2>

<p>LibreSSL&#39;s portable version and development</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery - Storage Essentials</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a>&#39;s new book about the FreeBSD storage subsystems now has an early draft available</li>
<li>Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes</li>
<li>Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance</li>
<li>You&#39;ll get access to the completed (e)book when it&#39;s done if you buy the early draft</li>
<li>The suggested price is $8
***</li>
</ul>

<h3><a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" rel="nofollow">Why BSD and not Linux?</a></h3>

<ul>
<li>Yet another thread comes up asking why you should choose BSD over Linux or vice-versa</li>
<li>Lots of good responses from users of the various BSDs</li>
<li>Directly ripping a quote: &quot;Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is &quot;GCC free&quot;. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.&quot;</li>
<li>And &quot;Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.&quot;</li>
<li>Some other users share their switching experiences - worth a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">More g2k14 hackathon reports</a></h3>

<ul>
<li>Following up from last week&#39;s <a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">huge list</a> of hackathon reports, we have a few more</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">Landry Breuil</a> spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140728122850" rel="nofollow">Andrew Fresh</a> enjoyed his first hackathon, pushing OpenBSD&#39;s perl patches upstream and got tricked into rewriting the adduser utility in perl</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140729070721" rel="nofollow">Ted Unangst</a> did his usual &quot;teduing&quot; (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth</li>
<li>Luckily we didn&#39;t have to cover 20 new ones this time!
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" rel="nofollow">BSDTalk episode 243</a></h3>

<ul>
<li>The newest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, featuring an interview with Ingo Schwarze of the OpenBSD team</li>
<li>The main topic of discussion is mandoc, which some users might not be familiar with</li>
<li>mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it&#39;s not built by default)</li>
<li>We&#39;ll catch up to you soon, Will!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xLRQytAZ" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21AYng20n" rel="nofollow">Stephen writes in</a></li>
<li><a href="http://slexy.org/view/s2DwLRdQDS" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2E05L31BC" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s21Nmg3Jrk" rel="nofollow">Bob Beck writes in</a> - and note the &quot;Caution&quot; section that was added to <a href="http://www.libressl.org/" rel="nofollow">libressl.org</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>46: Network Iodometry</title>
  <link>https://www.bsdnow.tv/46</link>
  <guid isPermaLink="false">e23303c8-31f0-4706-817c-1618e08cd149</guid>
  <pubDate>Wed, 16 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e23303c8-31f0-4706-817c-1618e08cd149.mp3" length="76226260" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
EuroBSDCon 2014 registration open (http://2014.eurobsdcon.org/registration/)
September is getting closer, and that means it's time for EuroBSDCon - held in Bulgaria this year
Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th
Tutorials, sessions, dev summits and everything else all have their own pricing as well
Registering between August 18th - September 12th will cost more for everything
You can register online here (http://registration.eurobsdcon.org/) and check hotels in the area (http://2014.eurobsdcon.org/registration/travel-and-stay/hotels)
The FreeBSD foundation is also accepting applications (https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html) for travel grants
***
OpenBSD SMP PF update (http://marc.info/?t=140440541000002&amp;amp;r=1&amp;amp;w=2)
A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded
With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump
In a recent mailing list thread, Henning Brauer (http://www.bsdnow.tv/episodes/2013_10_30-current_events) addresses some of the concerns
The short version (http://marc.info/?l=openbsd-misc&amp;amp;m=140479174521071&amp;amp;w=2) is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless
He also says (http://marc.info/?l=openbsd-misc&amp;amp;m=140481012425889&amp;amp;w=2) PF on OpenBSD is over four times faster than FreeBSD's old version, presumably due to those extra years of development it's gone through
There's also been even more recent concern (https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html) about the uncertain future of FreeBSD's PF, being mostly unmaintained since their SMP patches
We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***
Introduction to NetBSD pkgsrc (http://saveosx.org/pkgsrc-intro/)
An article from one of our listeners about how to create a new pkgsrc port or fix one that you need
The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format
It also lists all the different bmake targets and their functions in relation to the porting process
Finally, the post details the whole process of creating a new port
***
FreeBSD 9.3-RELEASE (https://www.freebsd.org/releases/9.3R/relnotes.html)
After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced today (https://www.freebsd.org/releases/9.3R/schedule.html) but actually came out yesterday
The full list of changes (https://www.freebsd.org/releases/9.3R/relnotes.html) is available, but it's mostly a smaller maintenance release
Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more
If you haven't jumped to the 10.x branch yet (and there are a lot of people who haven't!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon
Good news, this will be the first release (https://twitter.com/evilgjb/status/485909719522222080) with PGP-signed checksums on the FTP mirrors - a very welcome change
With that out of the way, the 10.1-RELEASE schedule was posted (https://www.freebsd.org/releases/10.1R/schedule.html)
***
Interview - Bryan Drewery - bdrewery@freebsd.org (mailto:bdrewery@freebsd.org) / @bdrewery (https://twitter.com/bdrewery)
The FreeBSD package building cluster, pkgng, ports, various topics
Tutorial
Tunneling traffic through DNS (http://www.bsdnow.tv/tutorials/ssh-dns)
News Roundup
SSH two-factor authentication on FreeBSD (http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/)
We've previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website
This blog post tells you how to do exactly that, but with your Google account and the pamgoogleauthenticator port
Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally
It's a really, really simple process once you have the port installed - full details on the page
***
Ditch tape backup in favor of FreeNAS (http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/)
The author of this post shares some of his horrible experiences with tape backups for a client
Having constant, daily errors and failed backups, he needed to find another solution
With 1TB of backups, tapes just weren't a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)
The rest of the article details his experiences with it and tells about his setup
***
NetBSD vs FreeBSD, desktop experiences (http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/)
A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job
Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver
"Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga."
He's become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***
PCBSD not-so-weekly digest (http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/)
Speaking of choices for a desktop system, it's the return of the PCBSD digest!
Warden and PBI_add have gotten some interesting new features
You can now create jails "on the fly" when adding a new PBI to your application library
Bulk jail creation is also possible now, and it's really easy
New Jenkins integration, with public access to poudriere logs as well (http://builds.pcbsd.org)
PkgNG 1.3.0.rc2 testing for EDGE users
***
Feedback/Questions
Jeff writes in (http://slexy.org/view/s21D05MP0t) - Sending Encrypted Backups over SSH (http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh) + Sending ZFS snapshots via user (http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System)
Bruce writes in (http://slexy.org/view/s2lzo1swzo)
Richard writes in (http://slexy.org/view/s20z841ean)
Jeff writes in (http://slexy.org/view/s2QYc8BOAo) - NYCBUG dmesg list (http://www.nycbug.org/index.cgi?action=dmesgd)
Steve writes in (http://slexy.org/view/s2V2e1m7S7)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pc-bsd, tutorial, howto, guide, bsd, interview, iodine, dns, tunnel, ssh, encryption, vpn, ids, bypass, detection, portmgr, pkgng, bypassing, firewall, pkgsrccon, pkgsrc, pf, smp, eurobsdcon, 2014, multithreaded, presentations, talks, two factor authentication, freenas, 9.3</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>32: PXE Dust</title>
  <link>https://www.bsdnow.tv/32</link>
  <guid isPermaLink="false">a909eddb-036d-451c-8d5a-e7b8e358239f</guid>
  <pubDate>Wed, 09 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a909eddb-036d-451c-8d5a-e7b8e358239f.mp3" length="55324948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the big show we'll be showing off OpenBSD's new "autoinstall" feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it's the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:16:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the big show we'll be showing off OpenBSD's new "autoinstall" feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it's the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD ASLR status update (http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress)
Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD
He's implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)
Work has also started on testing ASLR on ARM, using a Raspberry Pi
He's giving a presentation at BSDCan this year about his ASLR work
While we're on the topic of BSDCan...
***
BSDCan tutorials, improving the experience (http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html)
Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials
The tutorials are called "Building the network you need with PF, the OpenBSD packet filter" and "Transitioning to OpenBSD 5.5" - both scheduled to last three hours each
He's requesting anyone that'll be there to go ahead and contact him, telling him exactly what you'd like to learn
There's also a bit of background information about the tutorials and how he's looking to improve them
If you're interested in OpenBSD and going to BSDCan this year, hit him up
***
pkgsrc-2014Q1 released (http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html)
The new stable branch of pkgsrc packages has been built and is ready
Python 3.3 is now a "first class citizen" in pkgsrc
14255 packages for NetBSD-current/x8664, 11233 binary packages built with clang for FreeBSD 10/x8664
There's a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined
They're also looking into signing packages (http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html)
***
Only two holes in a heck of a long time, who cares? (https://www.mail-archive.com/misc%40openbsd.org/index.html#127993)
A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list
He questions "what's the big deal" about OpenBSD's slogan being "Only two remote holes in the default install, in a heck of a long time!"
Luckily, the community and Theo set the record straight (https://www.mail-archive.com/misc%40openbsd.org/msg128001.html) about why you should care about this
Running insecure applications on OpenBSD is actually more secure than running them on other systems, due to things like ASLR, PIE and all the security features (https://www.mail-archive.com/misc%40openbsd.org/msg127995.html) of OpenBSD
It spawned a discussion about ease of management and Linux's poor security record, definitely worth reading (https://www.mail-archive.com/misc%40openbsd.org/msg128073.html)
***
Interview - Dru Lavigne - dru@freebsd.org (mailto:dru@freebsd.org) / @bsdevents (https://twitter.com/bsdevents)
FreeBSD's documentation printing, documentation springs, various topics
Tutorial
Automatic, unattended OpenBSD installs with PXE (http://www.bsdnow.tv/tutorials/autoinstall)
News Roundup
pfSense 2.1.1 released (https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes)
A new version of pfSense is released, mainly to fix some security issues
Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router
There are also some NIC driver updates and other things (https://blog.pfsense.org/?p=1238)
Of course if you want to learn more about pfSense, watch episode 25 (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense)
2.1.2 is already up for testing too
***
FreeBSD gets UEFI support (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=264095)
It looks like FreeBSD's battle with UEFI may be coming to a close?
Ed Maste committed a giant list of patches to enable UEFI support on x86_64
Look through the list to see all the details and information
Thanks FreeBSD foundation!
***
Ideas for the next DragonflyBSD release (http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html)
Mr. Dragonfly release engineer himself, Justin Sherrill (http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug) posts some of his ideas for the upcoming release
They're aiming for late May for the next version
Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support
Gasp, they're even considering dropping i386
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/)
Lots of new PBI updates for 10.0, new runtime implementation
New support for running 32 bit applications in PBI runtime
New default CD and DVD player, umplayer
Latest GNOME 3 and Cinnamon merged, new edge package builds
***
Feedback/Questions
Remy writes in (http://slexy.org/view/s273oSezFs)
Jan writes in (http://slexy.org/view/s2I3H1HsVb)
Eddie writes in (http://slexy.org/view/s2wUTRowzU)
Zen writes in (http://slexy.org/view/s2RA0whmwz)
Sean writes in (http://slexy.org/view/s2pwE20Ov6)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pxe, pxeboot, autoinstall, dru lavigne, documentation, sprints, handbook, printed, bsdcan, aslr, arm, desktop, linux, games, ports, stable, pkgsrc, aslr, security, pie, branch, ports, pkgng, freenas</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the big show we&#39;ll be showing off OpenBSD&#39;s new &quot;autoinstall&quot; feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it&#39;s the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress" rel="nofollow">FreeBSD ASLR status update</a></h3>

<ul>
<li>Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD</li>
<li>He&#39;s implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)</li>
<li>Work has also started on testing ASLR on ARM, using a Raspberry Pi</li>
<li>He&#39;s giving a presentation at BSDCan this year about his ASLR work</li>
<li>While we&#39;re on the topic of BSDCan...
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html" rel="nofollow">BSDCan tutorials, improving the experience</a></h3>

<ul>
<li>Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials</li>
<li>The tutorials are called &quot;Building the network you need with PF, the OpenBSD packet filter&quot; and &quot;Transitioning to OpenBSD 5.5&quot; - both scheduled to last three hours each</li>
<li>He&#39;s requesting anyone that&#39;ll be there to go ahead and contact him, telling him exactly what you&#39;d like to learn</li>
<li>There&#39;s also a bit of background information about the tutorials and how he&#39;s looking to improve them</li>
<li>If you&#39;re interested in OpenBSD and going to BSDCan this year, hit him up
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html" rel="nofollow">pkgsrc-2014Q1 released</a></h3>

<ul>
<li>The new stable branch of pkgsrc packages has been built and is ready</li>
<li>Python 3.3 is now a &quot;first class citizen&quot; in pkgsrc</li>
<li>14255 packages for NetBSD-current/x86_64, 11233 binary packages built with clang for FreeBSD 10/x86_64</li>
<li>There&#39;s a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined</li>
<li>They&#39;re also looking into <a href="http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html" rel="nofollow">signing packages</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc%40openbsd.org/index.html#127993" rel="nofollow">Only two holes in a heck of a long time, who cares?</a></h3>

<ul>
<li>A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list</li>
<li>He questions &quot;what&#39;s the big deal&quot; about OpenBSD&#39;s slogan being &quot;Only two remote holes in the default install, in a heck of a long time!&quot;</li>
<li>Luckily, the community and Theo <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128001.html" rel="nofollow">set the record straight</a> about why you should care about this</li>
<li>Running insecure applications on OpenBSD is actually <strong>more</strong> secure than running them on other systems, due to things like ASLR, PIE and all the <a href="https://www.mail-archive.com/misc%40openbsd.org/msg127995.html" rel="nofollow">security features</a> of OpenBSD</li>
<li>It spawned a discussion about ease of management and Linux&#39;s poor security record, definitely <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128073.html" rel="nofollow">worth reading</a>
***</li>
</ul>

<h2>Interview - Dru Lavigne - <a href="mailto:dru@freebsd.org" rel="nofollow">dru@freebsd.org</a> / <a href="https://twitter.com/bsdevents" rel="nofollow">@bsdevents</a></h2>

<p>FreeBSD&#39;s documentation printing, documentation springs, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">Automatic, unattended OpenBSD installs with PXE</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense 2.1.1 released</a></h3>

<ul>
<li>A new version of pfSense is released, mainly to fix some security issues</li>
<li>Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router</li>
<li>There are also some NIC driver updates <a href="https://blog.pfsense.org/?p=1238" rel="nofollow">and other things</a></li>
<li>Of course if you want to learn more about pfSense, watch <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">episode 25</a></li>
<li>2.1.2 is already up for testing too
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=264095" rel="nofollow">FreeBSD gets UEFI support</a></h3>

<ul>
<li>It looks like FreeBSD&#39;s battle with UEFI may be coming to a close?</li>
<li>Ed Maste committed a giant list of patches to enable UEFI support on x86_64</li>
<li>Look through the list to see all the details and information</li>
<li>Thanks FreeBSD foundation!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html" rel="nofollow">Ideas for the next DragonflyBSD release</a></h3>

<ul>
<li>Mr. Dragonfly release engineer himself, <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherrill</a> posts some of his ideas for the upcoming release</li>
<li>They&#39;re aiming for late May for the next version</li>
<li>Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support</li>
<li>Gasp, they&#39;re even considering dropping i386
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of new PBI updates for 10.0, new runtime implementation</li>
<li>New support for running 32 bit applications in PBI runtime</li>
<li>New default CD and DVD player, umplayer</li>
<li>Latest GNOME 3 and Cinnamon merged, new edge package builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s273oSezFs" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2I3H1HsVb" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s2wUTRowzU" rel="nofollow">Eddie writes in</a></li>
<li><a href="http://slexy.org/view/s2RA0whmwz" rel="nofollow">Zen writes in</a></li>
<li><a href="http://slexy.org/view/s2pwE20Ov6" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the big show we&#39;ll be showing off OpenBSD&#39;s new &quot;autoinstall&quot; feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it&#39;s the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress" rel="nofollow">FreeBSD ASLR status update</a></h3>

<ul>
<li>Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD</li>
<li>He&#39;s implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)</li>
<li>Work has also started on testing ASLR on ARM, using a Raspberry Pi</li>
<li>He&#39;s giving a presentation at BSDCan this year about his ASLR work</li>
<li>While we&#39;re on the topic of BSDCan...
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html" rel="nofollow">BSDCan tutorials, improving the experience</a></h3>

<ul>
<li>Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials</li>
<li>The tutorials are called &quot;Building the network you need with PF, the OpenBSD packet filter&quot; and &quot;Transitioning to OpenBSD 5.5&quot; - both scheduled to last three hours each</li>
<li>He&#39;s requesting anyone that&#39;ll be there to go ahead and contact him, telling him exactly what you&#39;d like to learn</li>
<li>There&#39;s also a bit of background information about the tutorials and how he&#39;s looking to improve them</li>
<li>If you&#39;re interested in OpenBSD and going to BSDCan this year, hit him up
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html" rel="nofollow">pkgsrc-2014Q1 released</a></h3>

<ul>
<li>The new stable branch of pkgsrc packages has been built and is ready</li>
<li>Python 3.3 is now a &quot;first class citizen&quot; in pkgsrc</li>
<li>14255 packages for NetBSD-current/x86_64, 11233 binary packages built with clang for FreeBSD 10/x86_64</li>
<li>There&#39;s a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined</li>
<li>They&#39;re also looking into <a href="http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html" rel="nofollow">signing packages</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc%40openbsd.org/index.html#127993" rel="nofollow">Only two holes in a heck of a long time, who cares?</a></h3>

<ul>
<li>A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list</li>
<li>He questions &quot;what&#39;s the big deal&quot; about OpenBSD&#39;s slogan being &quot;Only two remote holes in the default install, in a heck of a long time!&quot;</li>
<li>Luckily, the community and Theo <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128001.html" rel="nofollow">set the record straight</a> about why you should care about this</li>
<li>Running insecure applications on OpenBSD is actually <strong>more</strong> secure than running them on other systems, due to things like ASLR, PIE and all the <a href="https://www.mail-archive.com/misc%40openbsd.org/msg127995.html" rel="nofollow">security features</a> of OpenBSD</li>
<li>It spawned a discussion about ease of management and Linux&#39;s poor security record, definitely <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128073.html" rel="nofollow">worth reading</a>
***</li>
</ul>

<h2>Interview - Dru Lavigne - <a href="mailto:dru@freebsd.org" rel="nofollow">dru@freebsd.org</a> / <a href="https://twitter.com/bsdevents" rel="nofollow">@bsdevents</a></h2>

<p>FreeBSD&#39;s documentation printing, documentation springs, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">Automatic, unattended OpenBSD installs with PXE</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense 2.1.1 released</a></h3>

<ul>
<li>A new version of pfSense is released, mainly to fix some security issues</li>
<li>Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router</li>
<li>There are also some NIC driver updates <a href="https://blog.pfsense.org/?p=1238" rel="nofollow">and other things</a></li>
<li>Of course if you want to learn more about pfSense, watch <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">episode 25</a></li>
<li>2.1.2 is already up for testing too
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=264095" rel="nofollow">FreeBSD gets UEFI support</a></h3>

<ul>
<li>It looks like FreeBSD&#39;s battle with UEFI may be coming to a close?</li>
<li>Ed Maste committed a giant list of patches to enable UEFI support on x86_64</li>
<li>Look through the list to see all the details and information</li>
<li>Thanks FreeBSD foundation!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html" rel="nofollow">Ideas for the next DragonflyBSD release</a></h3>

<ul>
<li>Mr. Dragonfly release engineer himself, <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherrill</a> posts some of his ideas for the upcoming release</li>
<li>They&#39;re aiming for late May for the next version</li>
<li>Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support</li>
<li>Gasp, they&#39;re even considering dropping i386
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of new PBI updates for 10.0, new runtime implementation</li>
<li>New support for running 32 bit applications in PBI runtime</li>
<li>New default CD and DVD player, umplayer</li>
<li>Latest GNOME 3 and Cinnamon merged, new edge package builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s273oSezFs" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2I3H1HsVb" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s2wUTRowzU" rel="nofollow">Eddie writes in</a></li>
<li><a href="http://slexy.org/view/s2RA0whmwz" rel="nofollow">Zen writes in</a></li>
<li><a href="http://slexy.org/view/s2pwE20Ov6" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>26: Port Authority</title>
  <link>https://www.bsdnow.tv/26</link>
  <guid isPermaLink="false">0e208963-5f59-446a-902e-9876d96c8f3f</guid>
  <pubDate>Wed, 26 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0e208963-5f59-446a-902e-9876d96c8f3f.mp3" length="65589845" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On today's show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:31:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>On today's show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
Tailoring OpenBSD for an old, strange computer (http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html)
The author of this article had an OmniBook 800CT (http://hpmuseum.net/display_item.php?hw=233), which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU
Obviously he had to install some kind of BSD on it!
This post goes through all his efforts of trimming down OpenBSD to work on such a limited device
He goes through the trial and error of "compile, break it, rebuild, try again"
After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***
pkgsrcCon and BSDCan (http://www.pkgsrc.org/pkgsrcCon/2014/)
pkgsrccon is "a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure"
This year it will be on June 21st and 22nd
The schedule (http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html) is still being worked out, so if you want to give a talk, submit it
BSDCan's schedule (https://www.bsdcan.org/2014/schedule/events.en.html) was also announced
We'll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more
Kris' presentation was accepted!
Tons of topics, look forward to the recorded versions of all of them hopefully!
***
Two factor auth with pushover (http://www.tedunangst.com/flak/post/login-pushover)
A new write-up from our friend Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures)
Pushover is "a web hook to smartphone push notification gateway" - you sent a POST to a web server and it sends a code to your phone
His post goes through the steps of editing your login.conf and setting it all up to work
Now you can get a two factor authenticated login for ssh!
***
The status of GNOME 3 on BSD (http://undeadly.org/cgi?action=article&amp;amp;sid=20140219085851)
It's no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems
OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use
This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes a screencast (https://www.bsdfrog.org/tmp/undeadly-gnome.webm)
A few recent (http://blogs.gnome.org/mclasen/2014/02/19/on-portability/) posts (http://blogs.gnome.org/desrt/2014/02/19/on-portability/) from some GNOME developers show that they're finally working with the BSD guys to improve portability
The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it's a beautiful thing
This goes right along with our interview today!
***
Interview - Joe Marcus Clark - marcus@freebsd.org (mailto:marcus@freebsd.org)
The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics
Tutorial
The FreeBSD Ports Collection (http://www.bsdnow.tv/tutorials/ports)
News Roundup
DragonflyBSD 3.8 goals and 3.6.1 release (http://bugs.dragonflybsd.org/versions/4)
The Dragonfly team is thinking about what should be in version 3.8
On their bug tracker, it lists some of the things they'd like to get done before then
In the meantime, 3.6.1 (http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html) was released with lots of bugfixes
***
NYCBSDCon 2014 wrap-up piece (http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend)
We've got a nice wrap-up titled "NYCBSDCon 2014 Heats Up a Cold Winter Weekend"
The author also interviews GNN (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) about the conference
There's even a little "beginner introduction" to BSD segment
Includes a mention of the recently-launched journal and lots of pictures from the event
***
FreeBSD and Linux, a comparative analysis (https://www.youtube.com/watch?&amp;amp;v=5mv_oKFzACM#t=418)
GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux
He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs "distros," development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences
Serves as a good introduction you can show your Linux friends
***
PCBSD CFT and weekly digest (http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/)
Upgrade tools have gotten a major rewrite
You have to help test it, there is no choice! Read more here (http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/)
How dare Kris be "unimpressed with" freebsd-update and pkgng!?
Various updates and fixes
***
Feedback/Questions
Jeffrey writes in (http://slexy.org/view/s213KxUdVj)
Shane writes in (http://slexy.org/view/s20lwkjLVK)
Ferdinand writes in (http://slexy.org/view/s21DqJs77g)
Curtis writes in (http://slexy.org/view/s20eXKEqJc)
Clint writes in (http://slexy.org/view/s21XMVFuVu)
Peter writes in (http://slexy.org/view/s20Xk05MHe)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, portmgr, ports, pkgng, packages, portsnap, make.conf, tinderbox, portlint, gnome, gnome 3, gnome-shell, omnibook, 800ct, ixsystems, pkgsrc, pkgsrccon, pushover, two factor authentication, bsdcan, 2014, dragonfly mail agent, dma, sendmail, postfix, ssmtp, flashrd, nylug, linux, differences, switching to bsd, presentation, lug, uug, bug, gnu, gpl, fsf, license, debate, nycbsdcon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On today&#39;s show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html" rel="nofollow">Tailoring OpenBSD for an old, strange computer</a></h3>

<ul>
<li>The author of this article had an <a href="http://hpmuseum.net/display_item.php?hw=233" rel="nofollow">OmniBook 800CT</a>, which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU</li>
<li>Obviously he had to install some kind of BSD on it!</li>
<li>This post goes through all his efforts of trimming down OpenBSD to work on such a limited device</li>
<li>He goes through the trial and error of &quot;compile, break it, rebuild, try again&quot;</li>
<li>After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***</li>
</ul>

<h3><a href="http://www.pkgsrc.org/pkgsrcCon/2014/" rel="nofollow">pkgsrcCon and BSDCan</a></h3>

<ul>
<li>pkgsrccon is &quot;a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure&quot;</li>
<li>This year it will be on June 21st and 22nd</li>
<li>The <a href="http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html" rel="nofollow">schedule</a> is still being worked out, so if you want to give a talk, submit it</li>
<li>BSDCan&#39;s <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">schedule</a> was also announced</li>
<li>We&#39;ll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more</li>
<li>Kris&#39; presentation was accepted!</li>
<li>Tons of topics, look forward to the recorded versions of all of them hopefully!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/login-pushover" rel="nofollow">Two factor auth with pushover</a></h3>

<ul>
<li>A new write-up from our friend <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a></li>
<li>Pushover is &quot;a web hook to smartphone push notification gateway&quot; - you sent a POST to a web server and it sends a code to your phone</li>
<li>His post goes through the steps of editing your login.conf and setting it all up to work</li>
<li>Now you can get a two factor authenticated login for ssh!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140219085851" rel="nofollow">The status of GNOME 3 on BSD</a></h3>

<ul>
<li>It&#39;s no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems</li>
<li>OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use</li>
<li>This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes <a href="https://www.bsdfrog.org/tmp/undeadly-gnome.webm" rel="nofollow">a screencast</a></li>
<li>A few <a href="http://blogs.gnome.org/mclasen/2014/02/19/on-portability/" rel="nofollow">recent</a> <a href="http://blogs.gnome.org/desrt/2014/02/19/on-portability/" rel="nofollow">posts</a> from some GNOME developers show that they&#39;re finally working with the BSD guys to improve portability</li>
<li>The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it&#39;s a beautiful thing</li>
<li>This goes right along with our interview today!
***</li>
</ul>

<h2>Interview - Joe Marcus Clark - <a href="mailto:marcus@freebsd.org" rel="nofollow">marcus@freebsd.org</a></h2>

<p>The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">The FreeBSD Ports Collection</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bugs.dragonflybsd.org/versions/4" rel="nofollow">DragonflyBSD 3.8 goals and 3.6.1 release</a></h3>

<ul>
<li>The Dragonfly team is thinking about what should be in version 3.8</li>
<li>On their bug tracker, it lists some of the things they&#39;d like to get done before then</li>
<li>In the meantime, <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html" rel="nofollow">3.6.1</a> was released with lots of bugfixes
***</li>
</ul>

<h3><a href="http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend" rel="nofollow">NYCBSDCon 2014 wrap-up piece</a></h3>

<ul>
<li>We&#39;ve got a nice wrap-up titled &quot;NYCBSDCon 2014 Heats Up a Cold Winter Weekend&quot;</li>
<li>The author also interviews <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">GNN</a> about the conference</li>
<li>There&#39;s even a little &quot;beginner introduction&quot; to BSD segment</li>
<li>Includes a mention of the recently-launched journal and lots of pictures from the event
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?&v=5mv_oKFzACM#t=418" rel="nofollow">FreeBSD and Linux, a comparative analysis</a></h3>

<ul>
<li>GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux</li>
<li>He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs &quot;distros,&quot; development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences</li>
<li>Serves as a good introduction you can show your Linux friends
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/" rel="nofollow">PCBSD CFT and weekly digest</a></h3>

<ul>
<li>Upgrade tools have gotten a major rewrite</li>
<li>You have to help test it, there is no choice! Read more <a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/" rel="nofollow">here</a></li>
<li>How dare Kris be &quot;unimpressed with&quot; freebsd-update and pkgng!?</li>
<li>Various updates and fixes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s213KxUdVj" rel="nofollow">Jeffrey writes in</a></li>
<li><a href="http://slexy.org/view/s20lwkjLVK" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s21DqJs77g" rel="nofollow">Ferdinand writes in</a></li>
<li><a href="http://slexy.org/view/s20eXKEqJc" rel="nofollow">Curtis writes in</a></li>
<li><a href="http://slexy.org/view/s21XMVFuVu" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20Xk05MHe" rel="nofollow">Peter writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On today&#39;s show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html" rel="nofollow">Tailoring OpenBSD for an old, strange computer</a></h3>

<ul>
<li>The author of this article had an <a href="http://hpmuseum.net/display_item.php?hw=233" rel="nofollow">OmniBook 800CT</a>, which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU</li>
<li>Obviously he had to install some kind of BSD on it!</li>
<li>This post goes through all his efforts of trimming down OpenBSD to work on such a limited device</li>
<li>He goes through the trial and error of &quot;compile, break it, rebuild, try again&quot;</li>
<li>After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***</li>
</ul>

<h3><a href="http://www.pkgsrc.org/pkgsrcCon/2014/" rel="nofollow">pkgsrcCon and BSDCan</a></h3>

<ul>
<li>pkgsrccon is &quot;a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure&quot;</li>
<li>This year it will be on June 21st and 22nd</li>
<li>The <a href="http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html" rel="nofollow">schedule</a> is still being worked out, so if you want to give a talk, submit it</li>
<li>BSDCan&#39;s <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">schedule</a> was also announced</li>
<li>We&#39;ll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more</li>
<li>Kris&#39; presentation was accepted!</li>
<li>Tons of topics, look forward to the recorded versions of all of them hopefully!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/login-pushover" rel="nofollow">Two factor auth with pushover</a></h3>

<ul>
<li>A new write-up from our friend <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a></li>
<li>Pushover is &quot;a web hook to smartphone push notification gateway&quot; - you sent a POST to a web server and it sends a code to your phone</li>
<li>His post goes through the steps of editing your login.conf and setting it all up to work</li>
<li>Now you can get a two factor authenticated login for ssh!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140219085851" rel="nofollow">The status of GNOME 3 on BSD</a></h3>

<ul>
<li>It&#39;s no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems</li>
<li>OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use</li>
<li>This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes <a href="https://www.bsdfrog.org/tmp/undeadly-gnome.webm" rel="nofollow">a screencast</a></li>
<li>A few <a href="http://blogs.gnome.org/mclasen/2014/02/19/on-portability/" rel="nofollow">recent</a> <a href="http://blogs.gnome.org/desrt/2014/02/19/on-portability/" rel="nofollow">posts</a> from some GNOME developers show that they&#39;re finally working with the BSD guys to improve portability</li>
<li>The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it&#39;s a beautiful thing</li>
<li>This goes right along with our interview today!
***</li>
</ul>

<h2>Interview - Joe Marcus Clark - <a href="mailto:marcus@freebsd.org" rel="nofollow">marcus@freebsd.org</a></h2>

<p>The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">The FreeBSD Ports Collection</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bugs.dragonflybsd.org/versions/4" rel="nofollow">DragonflyBSD 3.8 goals and 3.6.1 release</a></h3>

<ul>
<li>The Dragonfly team is thinking about what should be in version 3.8</li>
<li>On their bug tracker, it lists some of the things they&#39;d like to get done before then</li>
<li>In the meantime, <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html" rel="nofollow">3.6.1</a> was released with lots of bugfixes
***</li>
</ul>

<h3><a href="http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend" rel="nofollow">NYCBSDCon 2014 wrap-up piece</a></h3>

<ul>
<li>We&#39;ve got a nice wrap-up titled &quot;NYCBSDCon 2014 Heats Up a Cold Winter Weekend&quot;</li>
<li>The author also interviews <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">GNN</a> about the conference</li>
<li>There&#39;s even a little &quot;beginner introduction&quot; to BSD segment</li>
<li>Includes a mention of the recently-launched journal and lots of pictures from the event
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?&v=5mv_oKFzACM#t=418" rel="nofollow">FreeBSD and Linux, a comparative analysis</a></h3>

<ul>
<li>GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux</li>
<li>He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs &quot;distros,&quot; development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences</li>
<li>Serves as a good introduction you can show your Linux friends
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/" rel="nofollow">PCBSD CFT and weekly digest</a></h3>

<ul>
<li>Upgrade tools have gotten a major rewrite</li>
<li>You have to help test it, there is no choice! Read more <a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/" rel="nofollow">here</a></li>
<li>How dare Kris be &quot;unimpressed with&quot; freebsd-update and pkgng!?</li>
<li>Various updates and fixes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s213KxUdVj" rel="nofollow">Jeffrey writes in</a></li>
<li><a href="http://slexy.org/view/s20lwkjLVK" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s21DqJs77g" rel="nofollow">Ferdinand writes in</a></li>
<li><a href="http://slexy.org/view/s20eXKEqJc" rel="nofollow">Curtis writes in</a></li>
<li><a href="http://slexy.org/view/s21XMVFuVu" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20Xk05MHe" rel="nofollow">Peter writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>24: The Cluster &amp; The Cloud</title>
  <link>https://www.bsdnow.tv/24</link>
  <guid isPermaLink="false">4472f6f6-5fb3-4ee9-b20c-04e927cf1299</guid>
  <pubDate>Wed, 12 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4472f6f6-5fb3-4ee9-b20c-04e927cf1299.mp3" length="50214172" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:09:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD 10 as a firewall (http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html)
Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead
Now, with the release of 10.0, he's apparently changed his mind and switched back over
It mentions the SMP version of pf, general performance advantages and more modern features
The author is a regular listener of BSD Now, hi Joe!
***
Network Noise Reduction Using Free Tools (http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html)
Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD
Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD's spamd and other security features to combat spam and malware
He goes through his experiences with content filtering and disappointment with a certain proprietary vendor
Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***
FreeBSD ASLR patches submitted (http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream)
So far, FreeBSD hasn't had Address Space Layout Randomization
ASLR is a nice security feature, see wikipedia (https://en.wikipedia.org/wiki/Address_space_layout_randomization) for more information
With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)
We might have Shawn on the show to talk about it, but he's also giving a presentation at BSDCan about his work with ASLR
***
Old-style pkg_ tools retired (http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/)
At last the old pkg_add tools are being retired in FreeBSD
pkgng (http://www.bsdnow.tv/tutorials/pkgng) is a huge improvement, and now portmgr@ thinks it's time to cut the cord on the legacy toolset
Ports aren't going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go
All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***
Interview - Luke Marsden - luke@hybridcluster.com (mailto:luke@hybridcluster.com) / @lmarsden (https://twitter.com/lmarsden)
BSD at HybridCluster
Tutorial
Filesharing with chrooted SFTP (http://www.bsdnow.tv/tutorials/chroot-sftp)
News Roundup
FreeBSD on OpenStack (http://pellaeon.github.io/bsd-cloudinit/)
OpenStack (https://en.wikipedia.org/wiki/OpenStack) is a cloud computing project
It consists of "a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API."
Until now, there wasn't a good way to run a full BSD instance on OpenStack
With a project in the vein of Colin Percival (http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten)'s AWS startup scripts, now that's no longer the case! 
***
FOSDEM BSD videos (https://fosdem.org/2014/schedule/track/bsd/)
This year's FOSDEM had seven BSD presentations
The videos are slowly being uploaded (https://video.fosdem.org/2014/) for your viewing pleasure
Not all of the BSD ones are up yet, but by the time you're watching this they might be!
Check this directory (https://video.fosdem.org/2014/AW1121/Saturday/) for most of 'em
The BSD dev room was full, lots of interest in what's going on from the other communities
***
The FreeBSD challenge finally returns! (http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/)
Due to prodding from a certain guy of a certain podcast, the "FreeBSD Challenge" series has finally resumed
Our friend from the Linux foundation picks up with day 11 (http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/) and day 12 (http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/) on his switching from Linux journey
This time he outlines the upgrade process of going from 9 to 10, using freebsd-update
There's also some notes about different options for upgrading ports and some extra tips
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/)
After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while
During their "fine tuning phase" users are encouraged to submit any and all bugs via the trac system
Warden got some fixes and the package manager got some updates as well
Huge size reduction in PBI format
***
Feedback/Questions
Derrick writes in (http://slexy.org/view/s21nbJKYmb)
Sean writes in (http://slexy.org/view/s2yhziVsBP)
Patrick writes in (http://slexy.org/view/s20PuccWbo)
Peter writes in (http://slexy.org/view/s22PL0SbUO)
Sean writes in (http://slexy.org/view/s20dkbjuOK)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, cluster, cloud, cloud computing, hybridcluster, jails, scaling, virtualization, zfs, big data, provisioning, webhosting, instances, web hosting, chroot, sftp, filesharing, file sharing, shell, linux, switching to bsd, linux user, smp, pkg_add, pkg, pkgng, binary packages, openstack, open stack, httperf, performance, http, vpn, nycbsdcon, nycbug, nyc, conference, convention, talks, presentation, keynote, ssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>18: Eclipsing Binaries</title>
  <link>https://www.bsdnow.tv/18</link>
  <guid isPermaLink="false">96a80a26-313b-4891-a505-fa71245e4e84</guid>
  <pubDate>Wed, 01 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/96a80a26-313b-4891-a505-fa71245e4e84.mp3" length="50662433" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Put away the Christmas trees and update your ports trees! We're back with the first show of 2014, and we've got some catching up to do. This time on the show, we have an interview with Baptiste Daroussin about the future of FreeBSD binary packages. Following that, we'll be highlighting a cool script to do binary upgrades on OpenBSD. Lots of holiday news and listener feedback, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:10:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Put away the Christmas trees and update your ports trees! We're back with the first show of 2014, and we've got some catching up to do. This time on the show, we have an interview with Baptiste Daroussin about the future of FreeBSD binary packages. Following that, we'll be highlighting a cool script to do binary upgrades on OpenBSD. Lots of holiday news and listener feedback, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
Faces of FreeBSD continues (http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-shteryana-shopova.html)
Our first one details Shteryana Shopova, the local organizer for EuroBSDCon 2014 in Sophia
Gives some information about how she got into BSD
"I installed FreeBSD on my laptop, alongside the Windows and Slackware Linux I was running on it at the time. Several months later I realized that apart from FreeBSD, I hadn't booted the other two operating systems in months. So I wiped them out."
She wrote bsnmpd and extended it with the help of a grant from the FreeBSD Foundation
We've also got one for Kevin Martin (http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-kevin-martin.html)
Started off with a pinball website, ended up learning about FreeBSD from an ISP and starting his own hosting company
"FreeBSD has been an asset to our operations, and while we have branched out a bit, we still primarily use FreeBSD and promote it whenever possible.  FreeBSD is a terrific technology with a terrific community."
***
OpenPF? (http://www.shiningsilence.com/dbsdlog/2013/12/19/13008.html)
A blog post over at the Dragonfly digest (http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug)
What if we had some cross platform development of OpenBSD's firewall?
Similar to portable OpenSSH (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) or OpenZFS (http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days), there could be a centrally-developed version with compatibility glue
Right now FreeBSD 9's pf is old, FreeBSD 10's pf is old (but has the best performance of any implementation due to custom patches), NetBSD's pf is old (but they're working on a fork) and Dragonfly's pf is old
Further complicated by the fact that PF itself doesn’t have a version number, since it was designed to just be ‘the pf that came with OpenBSD 5.4’
Not likely to happen any time soon, but it's good food for thought
***
Year of BSD on the server (http://mxey.net/the-year-of-freebsd-on-the-server/)
A good blog post about switching servers from Linux to BSD
2014 is going to be the year of a lot of switching, due to FreeBSD 10's amazing new features
This author was particularly taken with pkgng (http://www.bsdnow.tv/tutorials/pkgng) and the more coherent layout of BSD systems
Similarly, there was also a recent reddit thread (http://www.reddit.com/r/BSD/comments/1tdrz1/why_did_you_choose_bsd_over_linux/), "Why did you choose BSD over Linux?"
Both are excellent reads for Linux users that are thinking about making the switch, send 'em to your friends
***
Getting to know your portmgr (http://blogs.freebsdish.org/portmgr/2013/12/24/getting-to-know-your-portmgr-bryan-drewery/)
This time in the series they interview Bryan Drewery, a fairly new addition to the team
He started maintaining portupgrade and portmaster, and eventually ended up on the ports management team
Believe it or not, his wife actually had a lot to do with him getting into FreeBSD full-time
Lots of fun trivia and background about him
Speaking of portmgr, our interview for today is...
***
Interview - Baptiste Daroussin - bapt@freebsd.org (mailto:bapt@freebsd.org)
The future of FreeBSD's binary packages (http://www.bsdnow.tv/tutorials/pkgng), ports' features, various topics
News Roundup
pfSense december hang out (https://www.youtube.com/watch?v=aD-2e9u3tug)
Interview/presentation from pfSense developer Chris Buechler with an accompanying blog post (http://blog.pfsense.org/?p=1146)
"This is the first in what will be a monthly recurring series. Each month, we’ll have a how to tutorial on a specific topic or area of the system, and updates on development and other happenings with the project. We have several topics in mind, but also welcome community suggestions on topics"
Speaking of pfSense, they recently opened an online store (http://blog.pfsense.org/?p=1156)
We're planning on having a pfSense episode next month!
***
BSDMag December issue is out (http://bsdmag.org/magazine/1854-carp-on-freebsd-how-to-use-devd-to-take-action-on-kernel-events)
The free monthly BSD magazine gets a new release for December
Topics include CARP on FreeBSD, more BSD programming, "unix basics for security professionals," some kernel introductions, using OpenBSD as a transparent proxy with relayd, GhostBSD overview and some stuff about SSH
***
OpenBSD gets tmpfs (http://undeadly.org/cgi?action=article&amp;amp;sid=20131217081921)
In addition to the recently-added FUSE support, OpenBSD now has tmpfs
To get more testing, it was enabled by default in -current
Should make its way into 5.5 if everything goes according to plan
Enables lots of new possibilities, like our ccache and tmpfs guide (http://www.bsdnow.tv/tutorials/ccache)
***
PCBSD weekly digests (http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-122013/)
Catching up with all the work going on in PCBSD land..
10.0-RC2 is now available (http://blog.pcbsd.org/2013/12/weekly-feature-digest-122713/)
The big pkgng 1.2 problems seem to have been worked out
***
Feedback/Questions
Remy writes in (http://slexy.org/view/s2UrUzlnf6)
Jason writes in (http://slexy.org/view/s2iqnywwKX)
Rob writes in (http://slexy.org/view/s2IUcPySbh)
John writes in (http://slexy.org/view/s21aYlbXz2)
Stuart writes in (http://slexy.org/view/s21vrYSqU8)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, binary, upgrade, update, openbsd-binary-upgrade, freebsd-update, patches, signed, bapt, portmgr, ports, binary star, packages, pkgng, tmpfs, pkg_add, pf, firewall, pfsense, hangout, switching from linux to bsd, linux bsd differences, bsdmag</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Put away the Christmas trees and update your ports trees! We&#39;re back with the first show of 2014, and we&#39;ve got some catching up to do. This time on the show, we have an interview with Baptiste Daroussin about the future of FreeBSD binary packages. Following that, we&#39;ll be highlighting a cool script to do binary upgrades on OpenBSD. Lots of holiday news and listener feedback, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-shteryana-shopova.html" rel="nofollow">Faces of FreeBSD continues</a></h3>

<ul>
<li>Our first one details Shteryana Shopova, the local organizer for EuroBSDCon 2014 in Sophia</li>
<li>Gives some information about how she got into BSD</li>
<li>&quot;I installed FreeBSD on my laptop, alongside the Windows and Slackware Linux I was running on it at the time. Several months later I realized that apart from FreeBSD, I hadn&#39;t booted the other two operating systems in months. So I wiped them out.&quot;</li>
<li>She wrote bsnmpd and extended it with the help of a grant from the FreeBSD Foundation</li>
<li>We&#39;ve also got one for <a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-kevin-martin.html" rel="nofollow">Kevin Martin</a></li>
<li>Started off with a pinball website, ended up learning about FreeBSD from an ISP and starting his own hosting company</li>
<li>&quot;FreeBSD has been an asset to our operations, and while we have branched out a bit, we still primarily use FreeBSD and promote it whenever possible.  FreeBSD is a terrific technology with a terrific community.&quot;
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/19/13008.html" rel="nofollow">OpenPF?</a></h3>

<ul>
<li>A blog post over at the <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Dragonfly digest</a></li>
<li>What if we had some cross platform development of OpenBSD&#39;s firewall?</li>
<li>Similar to portable <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">OpenSSH</a> or <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">OpenZFS</a>, there could be a centrally-developed version with compatibility glue</li>
<li>Right now FreeBSD 9&#39;s pf is old, FreeBSD 10&#39;s pf is old (but has the best performance of any implementation due to custom patches), NetBSD&#39;s pf is old (but they&#39;re working on a fork) and Dragonfly&#39;s pf is old</li>
<li>Further complicated by the fact that PF itself doesn’t have a version number, since it was designed to just be ‘the pf that came with OpenBSD 5.4’</li>
<li>Not likely to happen any time soon, but it&#39;s good food for thought
***</li>
</ul>

<h3><a href="http://mxey.net/the-year-of-freebsd-on-the-server/" rel="nofollow">Year of BSD on the server</a></h3>

<ul>
<li>A good blog post about switching servers from Linux to BSD</li>
<li>2014 is going to be the year of a lot of switching, due to FreeBSD 10&#39;s amazing new features</li>
<li>This author was particularly taken with <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> and the more coherent layout of BSD systems</li>
<li>Similarly, there was also a recent <a href="http://www.reddit.com/r/BSD/comments/1tdrz1/why_did_you_choose_bsd_over_linux/" rel="nofollow">reddit thread</a>, &quot;Why did you choose BSD over Linux?&quot;</li>
<li>Both are excellent reads for Linux users that are thinking about making the switch, send &#39;em to your friends
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/24/getting-to-know-your-portmgr-bryan-drewery/" rel="nofollow">Getting to know your portmgr</a></h3>

<ul>
<li>This time in the series they interview Bryan Drewery, a fairly new addition to the team</li>
<li>He started maintaining portupgrade and portmaster, and eventually ended up on the ports management team</li>
<li>Believe it or not, his wife actually had a lot to do with him getting into FreeBSD full-time</li>
<li>Lots of fun trivia and background about him</li>
<li>Speaking of portmgr, our interview for today is...
***</li>
</ul>

<h2>Interview - Baptiste Daroussin - <a href="mailto:bapt@freebsd.org" rel="nofollow">bapt@freebsd.org</a></h2>

<p>The future of FreeBSD&#39;s <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">binary packages</a>, ports&#39; features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=aD-2e9u3tug" rel="nofollow">pfSense december hang out</a></h3>

<ul>
<li>Interview/presentation from pfSense developer Chris Buechler with an <a href="http://blog.pfsense.org/?p=1146" rel="nofollow">accompanying blog post</a></li>
<li>&quot;This is the first in what will be a monthly recurring series. Each month, we’ll have a how to tutorial on a specific topic or area of the system, and updates on development and other happenings with the project. We have several topics in mind, but also welcome community suggestions on topics&quot;</li>
<li>Speaking of pfSense, they recently opened an <a href="http://blog.pfsense.org/?p=1156" rel="nofollow">online store</a></li>
<li>We&#39;re planning on having a pfSense episode next month!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1854-carp-on-freebsd-how-to-use-devd-to-take-action-on-kernel-events" rel="nofollow">BSDMag December issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine gets a new release for December</li>
<li>Topics include CARP on FreeBSD, more BSD programming, &quot;unix basics for security professionals,&quot; some kernel introductions, using OpenBSD as a transparent proxy with relayd, GhostBSD overview and some stuff about SSH
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131217081921" rel="nofollow">OpenBSD gets tmpfs</a></h3>

<ul>
<li>In addition to the recently-added FUSE support, OpenBSD now has tmpfs</li>
<li>To get more testing, it was enabled by default in -current</li>
<li>Should make its way into 5.5 if everything goes according to plan</li>
<li>Enables lots of new possibilities, like our <a href="http://www.bsdnow.tv/tutorials/ccache" rel="nofollow">ccache and tmpfs guide</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-122013/" rel="nofollow">PCBSD weekly digests</a></h3>

<ul>
<li>Catching up with all the work going on in PCBSD land..</li>
<li><a href="http://blog.pcbsd.org/2013/12/weekly-feature-digest-122713/" rel="nofollow">10.0-RC2 is now available</a></li>
<li>The big pkgng 1.2 problems seem to have been worked out
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UrUzlnf6" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2iqnywwKX" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2IUcPySbh" rel="nofollow">Rob writes in</a></li>
<li><a href="http://slexy.org/view/s21aYlbXz2" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21vrYSqU8" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Put away the Christmas trees and update your ports trees! We&#39;re back with the first show of 2014, and we&#39;ve got some catching up to do. This time on the show, we have an interview with Baptiste Daroussin about the future of FreeBSD binary packages. Following that, we&#39;ll be highlighting a cool script to do binary upgrades on OpenBSD. Lots of holiday news and listener feedback, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-shteryana-shopova.html" rel="nofollow">Faces of FreeBSD continues</a></h3>

<ul>
<li>Our first one details Shteryana Shopova, the local organizer for EuroBSDCon 2014 in Sophia</li>
<li>Gives some information about how she got into BSD</li>
<li>&quot;I installed FreeBSD on my laptop, alongside the Windows and Slackware Linux I was running on it at the time. Several months later I realized that apart from FreeBSD, I hadn&#39;t booted the other two operating systems in months. So I wiped them out.&quot;</li>
<li>She wrote bsnmpd and extended it with the help of a grant from the FreeBSD Foundation</li>
<li>We&#39;ve also got one for <a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-kevin-martin.html" rel="nofollow">Kevin Martin</a></li>
<li>Started off with a pinball website, ended up learning about FreeBSD from an ISP and starting his own hosting company</li>
<li>&quot;FreeBSD has been an asset to our operations, and while we have branched out a bit, we still primarily use FreeBSD and promote it whenever possible.  FreeBSD is a terrific technology with a terrific community.&quot;
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/19/13008.html" rel="nofollow">OpenPF?</a></h3>

<ul>
<li>A blog post over at the <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Dragonfly digest</a></li>
<li>What if we had some cross platform development of OpenBSD&#39;s firewall?</li>
<li>Similar to portable <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">OpenSSH</a> or <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">OpenZFS</a>, there could be a centrally-developed version with compatibility glue</li>
<li>Right now FreeBSD 9&#39;s pf is old, FreeBSD 10&#39;s pf is old (but has the best performance of any implementation due to custom patches), NetBSD&#39;s pf is old (but they&#39;re working on a fork) and Dragonfly&#39;s pf is old</li>
<li>Further complicated by the fact that PF itself doesn’t have a version number, since it was designed to just be ‘the pf that came with OpenBSD 5.4’</li>
<li>Not likely to happen any time soon, but it&#39;s good food for thought
***</li>
</ul>

<h3><a href="http://mxey.net/the-year-of-freebsd-on-the-server/" rel="nofollow">Year of BSD on the server</a></h3>

<ul>
<li>A good blog post about switching servers from Linux to BSD</li>
<li>2014 is going to be the year of a lot of switching, due to FreeBSD 10&#39;s amazing new features</li>
<li>This author was particularly taken with <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> and the more coherent layout of BSD systems</li>
<li>Similarly, there was also a recent <a href="http://www.reddit.com/r/BSD/comments/1tdrz1/why_did_you_choose_bsd_over_linux/" rel="nofollow">reddit thread</a>, &quot;Why did you choose BSD over Linux?&quot;</li>
<li>Both are excellent reads for Linux users that are thinking about making the switch, send &#39;em to your friends
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/24/getting-to-know-your-portmgr-bryan-drewery/" rel="nofollow">Getting to know your portmgr</a></h3>

<ul>
<li>This time in the series they interview Bryan Drewery, a fairly new addition to the team</li>
<li>He started maintaining portupgrade and portmaster, and eventually ended up on the ports management team</li>
<li>Believe it or not, his wife actually had a lot to do with him getting into FreeBSD full-time</li>
<li>Lots of fun trivia and background about him</li>
<li>Speaking of portmgr, our interview for today is...
***</li>
</ul>

<h2>Interview - Baptiste Daroussin - <a href="mailto:bapt@freebsd.org" rel="nofollow">bapt@freebsd.org</a></h2>

<p>The future of FreeBSD&#39;s <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">binary packages</a>, ports&#39; features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=aD-2e9u3tug" rel="nofollow">pfSense december hang out</a></h3>

<ul>
<li>Interview/presentation from pfSense developer Chris Buechler with an <a href="http://blog.pfsense.org/?p=1146" rel="nofollow">accompanying blog post</a></li>
<li>&quot;This is the first in what will be a monthly recurring series. Each month, we’ll have a how to tutorial on a specific topic or area of the system, and updates on development and other happenings with the project. We have several topics in mind, but also welcome community suggestions on topics&quot;</li>
<li>Speaking of pfSense, they recently opened an <a href="http://blog.pfsense.org/?p=1156" rel="nofollow">online store</a></li>
<li>We&#39;re planning on having a pfSense episode next month!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1854-carp-on-freebsd-how-to-use-devd-to-take-action-on-kernel-events" rel="nofollow">BSDMag December issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine gets a new release for December</li>
<li>Topics include CARP on FreeBSD, more BSD programming, &quot;unix basics for security professionals,&quot; some kernel introductions, using OpenBSD as a transparent proxy with relayd, GhostBSD overview and some stuff about SSH
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131217081921" rel="nofollow">OpenBSD gets tmpfs</a></h3>

<ul>
<li>In addition to the recently-added FUSE support, OpenBSD now has tmpfs</li>
<li>To get more testing, it was enabled by default in -current</li>
<li>Should make its way into 5.5 if everything goes according to plan</li>
<li>Enables lots of new possibilities, like our <a href="http://www.bsdnow.tv/tutorials/ccache" rel="nofollow">ccache and tmpfs guide</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-122013/" rel="nofollow">PCBSD weekly digests</a></h3>

<ul>
<li>Catching up with all the work going on in PCBSD land..</li>
<li><a href="http://blog.pcbsd.org/2013/12/weekly-feature-digest-122713/" rel="nofollow">10.0-RC2 is now available</a></li>
<li>The big pkgng 1.2 problems seem to have been worked out
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UrUzlnf6" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2iqnywwKX" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2IUcPySbh" rel="nofollow">Rob writes in</a></li>
<li><a href="http://slexy.org/view/s21aYlbXz2" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21vrYSqU8" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>14: Zettabytes for Days</title>
  <link>https://www.bsdnow.tv/14</link>
  <guid isPermaLink="false">8a946478-3ac7-4087-a433-ad139e4d7aa9</guid>
  <pubDate>Wed, 04 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8a946478-3ac7-4087-a433-ad139e4d7aa9.mp3" length="56736843" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week is the long-awaited episode you've been asking for! We'll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project's recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week is the long-awaited episode you've been asking for! We'll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project's recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.
Headlines
pkgng 1.2 released (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=334937)
bapt and bdrewery from the portmgr team released pkgng 1.2 final
New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new "pkg config" command, repo improvements, vuXML is now default, new fingerprint features and much more
Really simple to upgrade, check our pkgng tutorial (http://www.bsdnow.tv/tutorials/pkgng) if you want some easy instructions
It's also made its way into Dragonfly (http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html)
See the show notes for the full list of new features and fixes
***
ChaCha20 and Poly1305 in OpenSSH (http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html)
Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305
Long blog post explaining what these are and why we need them
This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC
RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn't show the packet length in cleartext
Great explanation of the differences between EtM, MtE and EaM and their advantages
"Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly."
***
Is it time to dump Linux and move to BSD (http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd)
ITworld did an article about switching from Linux to BSD
The author's interest was sparked from a review he was reading that said "I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0"
The whole article can be summed up with "yes" - ok, next story!
***
OpenZFS devsummit videos (https://www.youtube.com/user/deirdres/videos)
The OpenZFS developer summit (http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013) discussion and presentation videos are up
People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced
Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation
Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production
TONS of video, about 6 hours' worth
This leads us into our interview, which is...
***
Interview - George Wilson - wilzun@gmail.com (mailto:wilzun@gmail.com) / @zfsdude (https://twitter.com/zfsdude)
OpenZFS
Tutorial
A crash course on ZFS (http://www.bsdnow.tv/tutorials/zfs)
News Roundup
ruBSD 2013 information (http://undeadly.org/cgi?action=article&amp;amp;sid=20131126113154)
The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia
Speakers include three OpenBSD developers, Theo de Raadt (http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way), Henning Brauer (http://www.bsdnow.tv/episodes/2013_10_30-current_events) and Mike Belopuhov
Their talks are titled "The bane of backwards compatibility," "OpenBSD's pf: Design, Implementation and Future" and "OpenBSD: Where crypto is going?"
No word on if there will be video recordings, but we'll let you know if that changes
***
DragonFly roadmap, post 3.6 (http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html)
John Marino posted a possible roadmap for DragonFly, now that they're past the 3.6 release
He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)
Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still
Bring in fixes and new stuff from FreeBSD 10
***
BSDCan 2014 CFP (http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html)
BSDCan 2014 will be held on May 16-17 in Ottawa, Canada
They're now accepting proposals for talks
If you are doing something interesting with a BSD operating system, please submit a proposal
We'll be getting lots of interviews there
***
casperd added to -CURRENT (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=258838)
"It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted."
Lists some sysctls that can be controlled
***
ZFS corruption bug fixed in -CURRENT (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=258704)
Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***
Feedback/Questions
Chris writes in (http://slexy.org/view/s2JDWKjs7l)
SW writes in (http://slexy.org/view/s20BLqxTWD)
Jason writes in (http://slexy.org/view/s2939tUOf5)
Clint writes in (http://slexy.org/view/s21qKY6qIb)
Chris writes in (http://slexy.org/view/s20LWlmhoK)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, openzfs, devsummit, george wilson, zpool, raidz, raidz2, raidz3, mirror, delphix, linux, switch, zol, zfsonlinux, illumos, solaris, opensolaris, itworld, pkgng, pkg, 1.2, openssh, ssh, chacha20, cipher, encryption, mac, poly1305, rc4, security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week is the long-awaited episode you&#39;ve been asking for! We&#39;ll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project&#39;s recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=334937" rel="nofollow">pkgng 1.2 released</a></h3>

<ul>
<li>bapt and bdrewery from the portmgr team released pkgng 1.2 final</li>
<li>New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new &quot;pkg config&quot; command, repo improvements, vuXML is now default, new fingerprint features and much more</li>
<li>Really simple to upgrade, check our <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng tutorial</a> if you want some easy instructions</li>
<li>It&#39;s also made its way <a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" rel="nofollow">into Dragonfly</a></li>
<li>See the show notes for the full list of new features and fixes
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" rel="nofollow">ChaCha20 and Poly1305 in OpenSSH</a></h3>

<ul>
<li>Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305</li>
<li>Long blog post explaining what these are and why we need them</li>
<li>This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC</li>
<li>RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn&#39;t show the packet length in cleartext</li>
<li>Great explanation of the differences between EtM, MtE and EaM and their advantages</li>
<li>&quot;Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly.&quot;
***</li>
</ul>

<h3><a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" rel="nofollow">Is it time to dump Linux and move to BSD</a></h3>

<ul>
<li>ITworld did an article about switching from Linux to BSD</li>
<li>The author&#39;s interest was sparked from a review he was reading that said &quot;I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0&quot;</li>
<li>The whole article can be summed up with &quot;yes&quot; - ok, next story!
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/deirdres/videos" rel="nofollow">OpenZFS devsummit videos</a></h3>

<ul>
<li>The OpenZFS <a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" rel="nofollow">developer summit</a> discussion and presentation videos are up</li>
<li>People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced</li>
<li>Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation</li>
<li>Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production</li>
<li>TONS of video, about 6 hours&#39; worth</li>
<li>This leads us into our interview, which is...
***</li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<p>OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">A crash course on ZFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131126113154" rel="nofollow">ruBSD 2013 information</a></h3>

<ul>
<li>The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia</li>
<li>Speakers include three OpenBSD developers, <a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" rel="nofollow">Theo de Raadt</a>, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> and Mike Belopuhov</li>
<li>Their talks are titled &quot;The bane of backwards compatibility,&quot; &quot;OpenBSD&#39;s pf: Design, Implementation and Future&quot; and &quot;OpenBSD: Where crypto is going?&quot;</li>
<li>No word on if there will be video recordings, but we&#39;ll let you know if that changes
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" rel="nofollow">DragonFly roadmap, post 3.6</a></h3>

<ul>
<li>John Marino posted a possible roadmap for DragonFly, now that they&#39;re past the 3.6 release</li>
<li>He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)</li>
<li>Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still</li>
<li>Bring in fixes and new stuff from FreeBSD 10
***</li>
</ul>

<h3><a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" rel="nofollow">BSDCan 2014 CFP</a></h3>

<ul>
<li>BSDCan 2014 will be held on May 16-17 in Ottawa, Canada</li>
<li>They&#39;re now accepting proposals for talks</li>
<li>If you are doing something interesting with a BSD operating system, please submit a proposal</li>
<li>We&#39;ll be getting lots of interviews there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258838" rel="nofollow">casperd added to -CURRENT</a></h3>

<ul>
<li>&quot;It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted.&quot;</li>
<li>Lists some sysctls that can be controlled
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258704" rel="nofollow">ZFS corruption bug fixed in -CURRENT</a></h3>

<ul>
<li>Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JDWKjs7l" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20BLqxTWD" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s2939tUOf5" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s21qKY6qIb" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20LWlmhoK" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week is the long-awaited episode you&#39;ve been asking for! We&#39;ll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project&#39;s recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=334937" rel="nofollow">pkgng 1.2 released</a></h3>

<ul>
<li>bapt and bdrewery from the portmgr team released pkgng 1.2 final</li>
<li>New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new &quot;pkg config&quot; command, repo improvements, vuXML is now default, new fingerprint features and much more</li>
<li>Really simple to upgrade, check our <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng tutorial</a> if you want some easy instructions</li>
<li>It&#39;s also made its way <a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" rel="nofollow">into Dragonfly</a></li>
<li>See the show notes for the full list of new features and fixes
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" rel="nofollow">ChaCha20 and Poly1305 in OpenSSH</a></h3>

<ul>
<li>Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305</li>
<li>Long blog post explaining what these are and why we need them</li>
<li>This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC</li>
<li>RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn&#39;t show the packet length in cleartext</li>
<li>Great explanation of the differences between EtM, MtE and EaM and their advantages</li>
<li>&quot;Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly.&quot;
***</li>
</ul>

<h3><a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" rel="nofollow">Is it time to dump Linux and move to BSD</a></h3>

<ul>
<li>ITworld did an article about switching from Linux to BSD</li>
<li>The author&#39;s interest was sparked from a review he was reading that said &quot;I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0&quot;</li>
<li>The whole article can be summed up with &quot;yes&quot; - ok, next story!
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/deirdres/videos" rel="nofollow">OpenZFS devsummit videos</a></h3>

<ul>
<li>The OpenZFS <a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" rel="nofollow">developer summit</a> discussion and presentation videos are up</li>
<li>People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced</li>
<li>Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation</li>
<li>Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production</li>
<li>TONS of video, about 6 hours&#39; worth</li>
<li>This leads us into our interview, which is...
***</li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<p>OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">A crash course on ZFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131126113154" rel="nofollow">ruBSD 2013 information</a></h3>

<ul>
<li>The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia</li>
<li>Speakers include three OpenBSD developers, <a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" rel="nofollow">Theo de Raadt</a>, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> and Mike Belopuhov</li>
<li>Their talks are titled &quot;The bane of backwards compatibility,&quot; &quot;OpenBSD&#39;s pf: Design, Implementation and Future&quot; and &quot;OpenBSD: Where crypto is going?&quot;</li>
<li>No word on if there will be video recordings, but we&#39;ll let you know if that changes
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" rel="nofollow">DragonFly roadmap, post 3.6</a></h3>

<ul>
<li>John Marino posted a possible roadmap for DragonFly, now that they&#39;re past the 3.6 release</li>
<li>He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)</li>
<li>Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still</li>
<li>Bring in fixes and new stuff from FreeBSD 10
***</li>
</ul>

<h3><a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" rel="nofollow">BSDCan 2014 CFP</a></h3>

<ul>
<li>BSDCan 2014 will be held on May 16-17 in Ottawa, Canada</li>
<li>They&#39;re now accepting proposals for talks</li>
<li>If you are doing something interesting with a BSD operating system, please submit a proposal</li>
<li>We&#39;ll be getting lots of interviews there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258838" rel="nofollow">casperd added to -CURRENT</a></h3>

<ul>
<li>&quot;It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted.&quot;</li>
<li>Lists some sysctls that can be controlled
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258704" rel="nofollow">ZFS corruption bug fixed in -CURRENT</a></h3>

<ul>
<li>Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JDWKjs7l" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20BLqxTWD" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s2939tUOf5" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s21qKY6qIb" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20LWlmhoK" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
