<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 12 Mar 2026 11:10:39 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Pkgsrc”</title>
    <link>https://www.bsdnow.tv/tags/pkgsrc</link>
    <pubDate>Thu, 29 Jul 2021 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>413: BSD/Linux Chimera</title>
  <link>https://www.bsdnow.tv/413</link>
  <guid isPermaLink="false">e54035b9-3b93-4966-b35f-d6bf7ac2c51c</guid>
  <pubDate>Thu, 29 Jul 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e54035b9-3b93-4966-b35f-d6bf7ac2c51c.mp3" length="29515944" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Updating GCC GNAT (Ada) in pkgsrc/NetBSD, AdvanceBSD thoughts 2/2, FreeBSD from a NetBSD user’s perspective, FPGA programming and DragonFly, Chimera Linux, EuroBSDcon 2021, and more.</itunes:subtitle>
  <itunes:duration>46:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Updating GCC GNAT (Ada) in pkgsrc/NetBSD, AdvanceBSD thoughts 2/2, FreeBSD from a NetBSD user’s perspective, FPGA programming and DragonFly, Chimera Linux, EuroBSDcon 2021, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
Updating GCC GNAT (Ada) in pkgsrc/NetBSD (https://www.irvise.xyz/Projects%20&amp;amp;%20Engineering/updating-gcc-ada-pkgsrc.html)
Advance!BSD – thoughts on a not-for-profit project to support *BSD (2/2) (https://eerielinux.wordpress.com/2021/06/20/advancebsd-thoughts-on-a-not-for-profit-project-to-support-bsd-2-2/)
News Roundup
FreeBSD from a NetBSD user’s perspective (https://washbear.neocities.org/freebsd-netbsd-user.html)
FPGA programming and DragonFly (https://mastodon.sdf.org/@yrabbit/106497663837700420)
Chimera Linux - A Linux distribution based on FreeBSD userland and LLVM (https://chimera-linux.org/)
EuroBSDcon 2021 (https://2021.eurobsdcon.org/about/program/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Charlie - several questions (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/413/feedback/Charlie%20-%20several%20questions.md)
Dan - kernel driver or module question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/413/feedback/Dan%20-%20kernel%20driver%20or%20module%20question.md)
James - Apple M1 (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/413/feedback/James%20-%20Apple%20M1.md)
***
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, gcc gnat, pkgsrc, advancebsd, user perspective, fpga, programming, chimera linux, eurobsdcon 2021 </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Updating GCC GNAT (Ada) in pkgsrc/NetBSD, AdvanceBSD thoughts 2/2, FreeBSD from a NetBSD user’s perspective, FPGA programming and DragonFly, Chimera Linux, EuroBSDcon 2021, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.irvise.xyz/Projects%20&%20Engineering/updating-gcc-ada-pkgsrc.html" rel="nofollow">Updating GCC GNAT (Ada) in pkgsrc/NetBSD</a></h3>

<hr>

<h3><a href="https://eerielinux.wordpress.com/2021/06/20/advancebsd-thoughts-on-a-not-for-profit-project-to-support-bsd-2-2/" rel="nofollow">Advance!BSD – thoughts on a not-for-profit project to support *BSD (2/2)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://washbear.neocities.org/freebsd-netbsd-user.html" rel="nofollow">FreeBSD from a NetBSD user’s perspective</a></h3>

<hr>

<h3><a href="https://mastodon.sdf.org/@yrabbit/106497663837700420" rel="nofollow">FPGA programming and DragonFly</a></h3>

<hr>

<h3><a href="https://chimera-linux.org/" rel="nofollow">Chimera Linux - A Linux distribution based on FreeBSD userland and LLVM</a></h3>

<hr>

<h3><a href="https://2021.eurobsdcon.org/about/program/" rel="nofollow">EuroBSDcon 2021</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/413/feedback/Charlie%20-%20several%20questions.md" rel="nofollow">Charlie - several questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/413/feedback/Dan%20-%20kernel%20driver%20or%20module%20question.md" rel="nofollow">Dan - kernel driver or module question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/413/feedback/James%20-%20Apple%20M1.md" rel="nofollow">James - Apple M1</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Updating GCC GNAT (Ada) in pkgsrc/NetBSD, AdvanceBSD thoughts 2/2, FreeBSD from a NetBSD user’s perspective, FPGA programming and DragonFly, Chimera Linux, EuroBSDcon 2021, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.irvise.xyz/Projects%20&%20Engineering/updating-gcc-ada-pkgsrc.html" rel="nofollow">Updating GCC GNAT (Ada) in pkgsrc/NetBSD</a></h3>

<hr>

<h3><a href="https://eerielinux.wordpress.com/2021/06/20/advancebsd-thoughts-on-a-not-for-profit-project-to-support-bsd-2-2/" rel="nofollow">Advance!BSD – thoughts on a not-for-profit project to support *BSD (2/2)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://washbear.neocities.org/freebsd-netbsd-user.html" rel="nofollow">FreeBSD from a NetBSD user’s perspective</a></h3>

<hr>

<h3><a href="https://mastodon.sdf.org/@yrabbit/106497663837700420" rel="nofollow">FPGA programming and DragonFly</a></h3>

<hr>

<h3><a href="https://chimera-linux.org/" rel="nofollow">Chimera Linux - A Linux distribution based on FreeBSD userland and LLVM</a></h3>

<hr>

<h3><a href="https://2021.eurobsdcon.org/about/program/" rel="nofollow">EuroBSDcon 2021</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/413/feedback/Charlie%20-%20several%20questions.md" rel="nofollow">Charlie - several questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/413/feedback/Dan%20-%20kernel%20driver%20or%20module%20question.md" rel="nofollow">Dan - kernel driver or module question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/413/feedback/James%20-%20Apple%20M1.md" rel="nofollow">James - Apple M1</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>407: The jail Detail</title>
  <link>https://www.bsdnow.tv/407</link>
  <guid isPermaLink="false">ffb08bc6-ffde-4b63-bd68-9f70872557ef</guid>
  <pubDate>Thu, 17 Jun 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ffb08bc6-ffde-4b63-bd68-9f70872557ef.mp3" length="27481848" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Confining the omnipotent root, Jails with ZFS and PF on DigitalOcean, NomadBSD 130R is out, KDE Plasma Wayland on FreeBSD, Firefox under FreeBSD with Privacy, Using NetBSD’s pkgsrc everywhere, and more.</itunes:subtitle>
  <itunes:duration>45:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Confining the omnipotent root, Jails with ZFS and PF on DigitalOcean, NomadBSD 130R is out, KDE Plasma Wayland on FreeBSD, Firefox under FreeBSD with Privacy, Using NetBSD’s pkgsrc everywhere, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
Jails: Confining the omnipotent root (http://phk.freebsd.dk/pubs/sane2000-jail.pdf)
A dramatic reading of portions of the paper: Papers We Love: FreeBSD Jails and Solaris Zones (https://paperswelove.org/2016/video/bryan-cantrill-jails-and-solaris-zones/)
***
### 
Using Jails with ZFS and PF on DigitalOcean (https://medium.com/chris-opperwall/using-jails-with-zfs-and-pf-on-digitalocean-b25b1da82e20)
***
## News Roundup
### NomadBSD 130R is out (https://www.itsfoss.net/nomadbsd-130r-is-now-available-to-download-based-on-freebsd-13-0/)
***
### KDE Plasma Wayland - a week in FreeBSD (https://euroquis.nl//kde/2021/05/09/wayland.html)
***
### Install Firefox under FreeBSD and Set it Up with Privacy (https://danschmid.de/en/blog/install-firefox-under-freebsd-and-set-it-up-with-privacy)
***
Using NetBSD’s pkgsrc everywhere I can (https://rubenerd.com/using-netbsds-pkgsrc-everywhere-i-can/)
***
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Malcolm - restoring a single file (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/407/feedback/Malcolm%20-%20restoring%20a%20single%20file)
Nathan - wireless support (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/407/feedback/Nathan%20-%20wireless%20support)
bluefire - zfs special vdev (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/407/feedback/bluefire%20-%20zfs%20special%20vdev)
Push to next show with Allan
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, jail, root, pf, digitalocean, nomadbsd, kde plasma, wayland, firefox, privacy, pkgsrc </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Confining the omnipotent root, Jails with ZFS and PF on DigitalOcean, NomadBSD 130R is out, KDE Plasma Wayland on FreeBSD, Firefox under FreeBSD with Privacy, Using NetBSD’s pkgsrc everywhere, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="http://phk.freebsd.dk/pubs/sane2000-jail.pdf" rel="nofollow">Jails: Confining the omnipotent root</a></h3>

<ul>
<li>A dramatic reading of portions of the paper: <a href="https://paperswelove.org/2016/video/bryan-cantrill-jails-and-solaris-zones/" rel="nofollow">Papers We Love: FreeBSD Jails and Solaris Zones</a>
***
### 
<a href="https://medium.com/chris-opperwall/using-jails-with-zfs-and-pf-on-digitalocean-b25b1da82e20" rel="nofollow">Using Jails with ZFS and PF on DigitalOcean</a>
***
## News Roundup
### <a href="https://www.itsfoss.net/nomadbsd-130r-is-now-available-to-download-based-on-freebsd-13-0/" rel="nofollow">NomadBSD 130R is out</a>
***
### <a href="https://euroquis.nl//kde/2021/05/09/wayland.html" rel="nofollow">KDE Plasma Wayland - a week in FreeBSD</a>
***
### <a href="https://danschmid.de/en/blog/install-firefox-under-freebsd-and-set-it-up-with-privacy" rel="nofollow">Install Firefox under FreeBSD and Set it Up with Privacy</a>
***
<a href="https://rubenerd.com/using-netbsds-pkgsrc-everywhere-i-can/" rel="nofollow">Using NetBSD’s pkgsrc everywhere I can</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/407/feedback/Malcolm%20-%20restoring%20a%20single%20file" rel="nofollow">Malcolm - restoring a single file</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/407/feedback/Nathan%20-%20wireless%20support" rel="nofollow">Nathan - wireless support</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/407/feedback/bluefire%20-%20zfs%20special%20vdev" rel="nofollow">bluefire - zfs special vdev</a>
Push to next show with Allan</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Confining the omnipotent root, Jails with ZFS and PF on DigitalOcean, NomadBSD 130R is out, KDE Plasma Wayland on FreeBSD, Firefox under FreeBSD with Privacy, Using NetBSD’s pkgsrc everywhere, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="http://phk.freebsd.dk/pubs/sane2000-jail.pdf" rel="nofollow">Jails: Confining the omnipotent root</a></h3>

<ul>
<li>A dramatic reading of portions of the paper: <a href="https://paperswelove.org/2016/video/bryan-cantrill-jails-and-solaris-zones/" rel="nofollow">Papers We Love: FreeBSD Jails and Solaris Zones</a>
***
### 
<a href="https://medium.com/chris-opperwall/using-jails-with-zfs-and-pf-on-digitalocean-b25b1da82e20" rel="nofollow">Using Jails with ZFS and PF on DigitalOcean</a>
***
## News Roundup
### <a href="https://www.itsfoss.net/nomadbsd-130r-is-now-available-to-download-based-on-freebsd-13-0/" rel="nofollow">NomadBSD 130R is out</a>
***
### <a href="https://euroquis.nl//kde/2021/05/09/wayland.html" rel="nofollow">KDE Plasma Wayland - a week in FreeBSD</a>
***
### <a href="https://danschmid.de/en/blog/install-firefox-under-freebsd-and-set-it-up-with-privacy" rel="nofollow">Install Firefox under FreeBSD and Set it Up with Privacy</a>
***
<a href="https://rubenerd.com/using-netbsds-pkgsrc-everywhere-i-can/" rel="nofollow">Using NetBSD’s pkgsrc everywhere I can</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/407/feedback/Malcolm%20-%20restoring%20a%20single%20file" rel="nofollow">Malcolm - restoring a single file</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/407/feedback/Nathan%20-%20wireless%20support" rel="nofollow">Nathan - wireless support</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/407/feedback/bluefire%20-%20zfs%20special%20vdev" rel="nofollow">bluefire - zfs special vdev</a>
Push to next show with Allan</li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>386: Aye, 386!</title>
  <link>https://www.bsdnow.tv/386</link>
  <guid isPermaLink="false">d5e42030-e15b-444f-b823-a40e34bea5a8</guid>
  <pubDate>Thu, 21 Jan 2021 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d5e42030-e15b-444f-b823-a40e34bea5a8.mp3" length="38533008" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Routing and Firewalling VLANS with FreeBSD, FreeBSD 12 VNET jail with ZFS howto, pkgsrc-2020Q4 released, FreeBSD on Raspberry Pi 4 With 4GB of RAM, HardenedBSD December 2020 Status Report, and more</itunes:subtitle>
  <itunes:duration>37:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Routing and Firewalling VLANS with FreeBSD, FreeBSD 12 VNET jail with ZFS howto, pkgsrc-2020Q4 released, FreeBSD on Raspberry Pi 4 With 4GB of RAM, HardenedBSD December 2020 Status Report, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
Routing and Firewalling VLANS with FreeBSD (https://klarasystems.com/articles/routing-and-firewalling-vlans-with-freebsd/)
In this article we are going to look at and integrate two network isolation technologies, VLANs and VNET. VLANs are common place, and if you have done some network management or design then you are likely to have interacted with them. The second are FreeBSDs VNET virtual network stacks, a powerful network stack isolation technology that gives FreeBSD jails super powers.
Ethernet VLAN (standardised by IEEE 802.1Q) are an extension to Ethernet and provide an essential method for scaling network deployments. They are used in all environments to enable reuse of common infrastructure by isolating portions of networks from each other. VLANs allow the reuse of common cables, switches and routers to carry completely different networks. It is common to have data that must be separated from different networks carried on common cables until their VLAN tags are finally stripped at a gateway switch or router.
How to set up FreeBSD 12 VNET jail with ZFS (https://www.cyberciti.biz/faq/configuring-freebsd-12-vnet-jail-using-bridgeepair-zfs/)
How do I install, set up and configure a FreeBSD 12 jail with VNET on ZFS? How can I create FreeBSD 12 VNET jail with /etc/jail.conf to run OpenVPN, Apache, Wireguard and other Internet-facing services securely on my BSD box?
FreeBSD jail is nothing but operating system-level virtualization that allows partitioning a FreeBSD based Unix server. Such systems have their root user and access rights. Jails can use network subsystem virtualization infrastructure or share an existing network. FreeBSD jails are a powerful way to increase security. Usually, you create jail per services such as an Nginx/Apache webserver with PHP/Perl/Python app, WireGuard/OpeNVPN server, MariaDB/PgSQL server, and more. This page shows how to configure a FreeBSD Jail with vnet and ZFS on FreeBSD 12.x.
News Roundup
pkgsrc-2020Q4 released (https://mail-index.netbsd.org/netbsd-announce/2021/01/08/msg000322.html)
The pkgsrc developers are proud to announce the 69th quarterly release
of pkgsrc, the cross-platform packaging system.  pkgsrc is available
with more than 24,000 packages, running on 23 separate platforms; more
information on pkgsrc itself is available at https://www.pkgsrc.org/
FreeBSD ON A Raspberry PI 4 With 4GB of RAM (https://lambdaland.org/posts/2020-12-23_freebsd_rpi4/)
This is the story of how I managed to get FreeBSD running on a Raspberry Pi 4 with 4GB of RAM, though I think the setup story is pretty similar for those with 2GB and 8GB.1
HardenedBSD December 2020 Status Report (https://hardenedbsd.org/article/shawn-webb/2020-12-31/hardenedbsd-december-2020-status-report)
Happy New Year! On this the last day of 2020, I submit December's status report.
Beastie Bits
Christmas Cards The Unix Way - with pic and  troff (https://www.youtube.com/watch?v=xMijdTWSUEE&amp;amp;feature=youtu.be)
Fast RPI3 upgrade from source (cross compile) (https://forums.freebsd.org/threads/fast-upgrade-raspberry-pi3-from-source.78169/) 
***
###Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Robert - zfs question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/386/feedback/robert%20-%20zfs%20question.md)
Neb - AMA episode.md (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/386/feedback/neb%20-%20AMA%20episode.md)
Joe - puppet (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/386/feedback/joe%20-%20puppet.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, firewall, firewalling, VLAN, VNET, jail, pkgsrc, package source, raspberry pi, RPI, status report</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Routing and Firewalling VLANS with FreeBSD, FreeBSD 12 VNET jail with ZFS howto, pkgsrc-2020Q4 released, FreeBSD on Raspberry Pi 4 With 4GB of RAM, HardenedBSD December 2020 Status Report, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/routing-and-firewalling-vlans-with-freebsd/" rel="nofollow">Routing and Firewalling VLANS with FreeBSD</a></h3>

<blockquote>
<p>In this article we are going to look at and integrate two network isolation technologies, VLANs and VNET. VLANs are common place, and if you have done some network management or design then you are likely to have interacted with them. The second are FreeBSDs VNET virtual network stacks, a powerful network stack isolation technology that gives FreeBSD jails super powers.<br>
Ethernet VLAN (standardised by IEEE 802.1Q) are an extension to Ethernet and provide an essential method for scaling network deployments. They are used in all environments to enable reuse of common infrastructure by isolating portions of networks from each other. VLANs allow the reuse of common cables, switches and routers to carry completely different networks. It is common to have data that must be separated from different networks carried on common cables until their VLAN tags are finally stripped at a gateway switch or router.</p>
</blockquote>

<hr>

<h3><a href="https://www.cyberciti.biz/faq/configuring-freebsd-12-vnet-jail-using-bridgeepair-zfs/" rel="nofollow">How to set up FreeBSD 12 VNET jail with ZFS</a></h3>

<blockquote>
<p>How do I install, set up and configure a FreeBSD 12 jail with VNET on ZFS? How can I create FreeBSD 12 VNET jail with /etc/jail.conf to run OpenVPN, Apache, Wireguard and other Internet-facing services securely on my BSD box?<br>
FreeBSD jail is nothing but operating system-level virtualization that allows partitioning a FreeBSD based Unix server. Such systems have their root user and access rights. Jails can use network subsystem virtualization infrastructure or share an existing network. FreeBSD jails are a powerful way to increase security. Usually, you create jail per services such as an Nginx/Apache webserver with PHP/Perl/Python app, WireGuard/OpeNVPN server, MariaDB/PgSQL server, and more. This page shows how to configure a FreeBSD Jail with vnet and ZFS on FreeBSD 12.x.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-announce/2021/01/08/msg000322.html" rel="nofollow">pkgsrc-2020Q4 released</a></h3>

<blockquote>
<p>The pkgsrc developers are proud to announce the 69th quarterly release<br>
of pkgsrc, the cross-platform packaging system.  pkgsrc is available<br>
with more than 24,000 packages, running on 23 separate platforms; more<br>
information on pkgsrc itself is available at <a href="https://www.pkgsrc.org/" rel="nofollow">https://www.pkgsrc.org/</a></p>
</blockquote>

<hr>

<h3><a href="https://lambdaland.org/posts/2020-12-23_freebsd_rpi4/" rel="nofollow">FreeBSD ON A Raspberry PI 4 With 4GB of RAM</a></h3>

<blockquote>
<p>This is the story of how I managed to get FreeBSD running on a Raspberry Pi 4 with 4GB of RAM, though I think the setup story is pretty similar for those with 2GB and 8GB.1</p>
</blockquote>

<hr>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2020-12-31/hardenedbsd-december-2020-status-report" rel="nofollow">HardenedBSD December 2020 Status Report</a></h3>

<blockquote>
<p>Happy New Year! On this the last day of 2020, I submit December&#39;s status report.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=xMijdTWSUEE&feature=youtu.be" rel="nofollow">Christmas Cards The Unix Way - with pic and  troff</a></li>
<li><a href="https://forums.freebsd.org/threads/fast-upgrade-raspberry-pi3-from-source.78169/" rel="nofollow">Fast RPI3 upgrade from source (cross compile)</a> 
***
###Tarsnap</li>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/386/feedback/robert%20-%20zfs%20question.md" rel="nofollow">Robert - zfs question</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/386/feedback/neb%20-%20AMA%20episode.md" rel="nofollow">Neb - AMA episode.md</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/386/feedback/joe%20-%20puppet.md" rel="nofollow">Joe - puppet</a></p></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Routing and Firewalling VLANS with FreeBSD, FreeBSD 12 VNET jail with ZFS howto, pkgsrc-2020Q4 released, FreeBSD on Raspberry Pi 4 With 4GB of RAM, HardenedBSD December 2020 Status Report, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/routing-and-firewalling-vlans-with-freebsd/" rel="nofollow">Routing and Firewalling VLANS with FreeBSD</a></h3>

<blockquote>
<p>In this article we are going to look at and integrate two network isolation technologies, VLANs and VNET. VLANs are common place, and if you have done some network management or design then you are likely to have interacted with them. The second are FreeBSDs VNET virtual network stacks, a powerful network stack isolation technology that gives FreeBSD jails super powers.<br>
Ethernet VLAN (standardised by IEEE 802.1Q) are an extension to Ethernet and provide an essential method for scaling network deployments. They are used in all environments to enable reuse of common infrastructure by isolating portions of networks from each other. VLANs allow the reuse of common cables, switches and routers to carry completely different networks. It is common to have data that must be separated from different networks carried on common cables until their VLAN tags are finally stripped at a gateway switch or router.</p>
</blockquote>

<hr>

<h3><a href="https://www.cyberciti.biz/faq/configuring-freebsd-12-vnet-jail-using-bridgeepair-zfs/" rel="nofollow">How to set up FreeBSD 12 VNET jail with ZFS</a></h3>

<blockquote>
<p>How do I install, set up and configure a FreeBSD 12 jail with VNET on ZFS? How can I create FreeBSD 12 VNET jail with /etc/jail.conf to run OpenVPN, Apache, Wireguard and other Internet-facing services securely on my BSD box?<br>
FreeBSD jail is nothing but operating system-level virtualization that allows partitioning a FreeBSD based Unix server. Such systems have their root user and access rights. Jails can use network subsystem virtualization infrastructure or share an existing network. FreeBSD jails are a powerful way to increase security. Usually, you create jail per services such as an Nginx/Apache webserver with PHP/Perl/Python app, WireGuard/OpeNVPN server, MariaDB/PgSQL server, and more. This page shows how to configure a FreeBSD Jail with vnet and ZFS on FreeBSD 12.x.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-announce/2021/01/08/msg000322.html" rel="nofollow">pkgsrc-2020Q4 released</a></h3>

<blockquote>
<p>The pkgsrc developers are proud to announce the 69th quarterly release<br>
of pkgsrc, the cross-platform packaging system.  pkgsrc is available<br>
with more than 24,000 packages, running on 23 separate platforms; more<br>
information on pkgsrc itself is available at <a href="https://www.pkgsrc.org/" rel="nofollow">https://www.pkgsrc.org/</a></p>
</blockquote>

<hr>

<h3><a href="https://lambdaland.org/posts/2020-12-23_freebsd_rpi4/" rel="nofollow">FreeBSD ON A Raspberry PI 4 With 4GB of RAM</a></h3>

<blockquote>
<p>This is the story of how I managed to get FreeBSD running on a Raspberry Pi 4 with 4GB of RAM, though I think the setup story is pretty similar for those with 2GB and 8GB.1</p>
</blockquote>

<hr>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2020-12-31/hardenedbsd-december-2020-status-report" rel="nofollow">HardenedBSD December 2020 Status Report</a></h3>

<blockquote>
<p>Happy New Year! On this the last day of 2020, I submit December&#39;s status report.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=xMijdTWSUEE&feature=youtu.be" rel="nofollow">Christmas Cards The Unix Way - with pic and  troff</a></li>
<li><a href="https://forums.freebsd.org/threads/fast-upgrade-raspberry-pi3-from-source.78169/" rel="nofollow">Fast RPI3 upgrade from source (cross compile)</a> 
***
###Tarsnap</li>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/386/feedback/robert%20-%20zfs%20question.md" rel="nofollow">Robert - zfs question</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/386/feedback/neb%20-%20AMA%20episode.md" rel="nofollow">Neb - AMA episode.md</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/386/feedback/joe%20-%20puppet.md" rel="nofollow">Joe - puppet</a></p></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>340: Check My Sums</title>
  <link>https://www.bsdnow.tv/340</link>
  <guid isPermaLink="false">7e026ede-d713-4ed5-993a-9a39cab4aab1</guid>
  <pubDate>Thu, 05 Mar 2020 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/7e026ede-d713-4ed5-993a-9a39cab4aab1.mp3" length="36478978" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Why ZFS is doing filesystem checksumming right, better TMPFS throughput performance on DragonFlyBSD, reshaping pools with ZFS, PKGSRC on Manjaro aarch64 Pinebook-pro, central log host with syslog-ng on FreeBSD, and more.</itunes:subtitle>
  <itunes:duration>50:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Why ZFS is doing filesystem checksumming right, better TMPFS throughput performance on DragonFlyBSD, reshaping pools with ZFS, PKGSRC on Manjaro aarch64 Pinebook-pro, central log host with syslog-ng on FreeBSD, and more.
Headlines
Checksumming in filesystems, and why ZFS is doing it right (https://oshogbo.vexillium.org/blog/73/)
One of the best aspects of ZFS is its reliability. This can be accomplished using a few features like copy-on-write approach and checksumming. Today we will look at how ZFS does checksumming and why it does it the proper way. Most of the file systems don’t provide any integrity checking and fail in several scenarios:
Data bit flips - when the data that we wanted to store are bit flipped by the hard drives, or cables, and the wrong data is stored on the hard drive.
Misdirected writes - when the CPU/cable/hard drive will bit flip a block to which the data should be written.
Misdirected read - when we miss reading the block when a bit flip occurred.
Phantom writes - when the write operation never made it to the disk. For example, a disk or kernel may have some bug that it will return success even if the hard drive never made the write. This problem can also occur when data is kept only in the hard drive cache.
Checksumming may help us detect errors in a few of those situations.
DragonFlyBSD Improves Its TMPFS Implementation For Better Throughput Performance (https://www.phoronix.com/scan.php?page=news_item&amp;amp;px=DragonFlyBSD-TMPFS-Throughput)
It's been a while since last having any new magical optimizations to talk about by DragonFlyBSD lead developer Matthew Dillon, but on Wednesday he landed some significant temporary file-system "TMPFS" optimizations for better throughput including with swap.
Of several interesting commits merged tonight, the improved write clustering is a big one. In particular, "Reduces low-memory tmpfs paging I/O overheads by 4x and generally increases paging throughput to SSD-based swap by 2x-4x. Tmpfs is now able to issue a lot more 64KB I/Os when under memory pressure."
https://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/4eb0bb82efc8ef32c4357cf812891c08d38d8860
There's also a new tunable in the VM space as well as part of his commits on Wednesday night. This follows a lot of recent work on dsynth, improved page-out daemon pipelining, and other routine work.
https://gitweb.dragonflybsd.org/dragonfly.git/commit/bc47dbc18bf832e4badb41f2fd79159479a7d351
This work is building up towards the eventual DragonFlyBSD 5.8 while those wanting to try the latest improvements right away can find their daily snapshots.
News Roundup
Why ZFS is not good at growing and reshaping pools (or shrinking them) (https://utcc.utoronto.ca/~cks/space/blog/solaris/ZFSWhyNoRealReshaping)
 recently read Mark McBride's Five Years of Btrfs (via), which has a significant discussion of why McBride chose Btrfs over ZFS that boils down to ZFS not being very good at evolving your pool structure. You might doubt this judgment from a Btrfs user, so let me say as both a fan of ZFS and a long term user of it that this is unfortunately quite true; ZFS is not a good choice if you want to modify your pool disk layout significantly over time. ZFS works best if the only change in your pools that you do is replacing drives with bigger drives. In our ZFS environment we go to quite some lengths to be able to expand pools incrementally over time, and while this works it both leaves us with unbalanced pools and means that we're basically forced to use mirroring instead of RAIDZ.
(An unbalanced pool is one where some vdevs and disks have much more data than others. This is less of an issue for us now that we're using SSDs instead of HDs.)
Using PKGSRC on Manjaro Linux aarch64 Pinebook-pro (https://astr0baby.wordpress.com/2020/02/09/using-pkgsrc-on-manjaro-linux-aarch64-pinebook-pro/)
I wanted to see how pkgsrc works on aarch64 Linux Manjaro since it is a very mature framework that is very portable and supported by many architectures – pkgsrc (package source) is a package management system for Unix-like operating systems. It was forked from the FreeBSD ports collection in 1997 as the primary package management system for NetBSD.
One might question why use pkgsrc on Arch based Manjaro, since the pacman package repository is very good on its own. I see alternative pkgsrc as a good automated build framework that offers a way to produce independent build environment /usr/pkg that does not interfere with the current Linux distribution in any way (all libraries are statically built)
I have used the latest Manjaro for Pinebookpro and standard recommended tools as mentioned here https://wiki.netbsd.org/pkgsrc/howtousepkgsrcon_linux/
A Central Log Host with syslog-ng on FreeBSD
Part 1 (https://blog.socruel.nu/freebsd/a-central-log-host-with-syslog-ng-on-freebsd.html)
syslog-ng is the Swiss army knife of log management. You can collect logs from any source, process them in real time and deliver them to wide range of destinations. It allows you to flexibly collect, parse, classify, rewrite and correlate logs from across your infrastructure. This is why syslog-ng is the perfect solution for the central log host of my (mainly) FreeBSD based infrastructure.
Part 2 (https://blog.socruel.nu/freebsd/check-logs-of-syslog-ng-log-host-on-freebsd.html)
This blog post continues where the blog post A central log host with syslog-ng on FreeBSD left off. Open source solutions to check syslog log messages exist, such as Logcheck or Logwatch. Although these are not too difficult to implement and maintain, I still found these to much. So I went for my own home grown solution to check the syslog messages of the SoCruel.NU central log host.
Beastie Bits
FreeBSD at Linux Conf 2020 session videos now online (https://mirror.linux.org.au/pub/linux.conf.au/2020/room_9/Tuesday/)
Unlock your laptop with your phone (https://vermaden.wordpress.com/2020/01/09/freebsd-desktop-part-20-configuration-unlock-your-laptop-with-phone/)
Managing a database of vulnerabilities for a package system: the pkgsrc study (https://www.netbsd.org/gallery/presentations/leot/itasec20/pkgsrc-security.pdf)
Hamilton BSD User group will meet again on March 10th](http://studybsd.com/)
CharmBUG Meeting: March 24th 7pm in Severn, MD (https://www.meetup.com/en-AU/CharmBUG/events/268251508/)
***
Feedback/Questions
Andrew - ZFS feature Flags (http://dpaste.com/2YM23C0#wrap)
Sam - TwinCat BSD (http://dpaste.com/0FCZV6R)
Dacian - Freebsd + amdgpu + Lenovo E595 (http://dpaste.com/1R7F1JN#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, checksumming, filesystem, checksum, zfs, tmpfs, throughput, performance, throughput performance, zpool, pool reshaping, resizing, shrinking, pinebook, pkgsrc, aarch64, log host, central logging, syslog, syslog-ng</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Why ZFS is doing filesystem checksumming right, better TMPFS throughput performance on DragonFlyBSD, reshaping pools with ZFS, PKGSRC on Manjaro aarch64 Pinebook-pro, central log host with syslog-ng on FreeBSD, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://oshogbo.vexillium.org/blog/73/" rel="nofollow">Checksumming in filesystems, and why ZFS is doing it right</a></h3>

<blockquote>
<p>One of the best aspects of ZFS is its reliability. This can be accomplished using a few features like copy-on-write approach and checksumming. Today we will look at how ZFS does checksumming and why it does it the proper way. Most of the file systems don’t provide any integrity checking and fail in several scenarios:</p>
</blockquote>

<ul>
<li>Data bit flips - when the data that we wanted to store are bit flipped by the hard drives, or cables, and the wrong data is stored on the hard drive.</li>
<li>Misdirected writes - when the CPU/cable/hard drive will bit flip a block to which the data should be written.</li>
<li>Misdirected read - when we miss reading the block when a bit flip occurred.</li>
<li>Phantom writes - when the write operation never made it to the disk. For example, a disk or kernel may have some bug that it will return success even if the hard drive never made the write. This problem can also occur when data is kept only in the hard drive cache.</li>
</ul>

<blockquote>
<p>Checksumming may help us detect errors in a few of those situations.</p>
</blockquote>

<hr>

<h3><a href="https://www.phoronix.com/scan.php?page=news_item&px=DragonFlyBSD-TMPFS-Throughput" rel="nofollow">DragonFlyBSD Improves Its TMPFS Implementation For Better Throughput Performance</a></h3>

<blockquote>
<p>It&#39;s been a while since last having any new magical optimizations to talk about by DragonFlyBSD lead developer Matthew Dillon, but on Wednesday he landed some significant temporary file-system &quot;TMPFS&quot; optimizations for better throughput including with swap.</p>

<p>Of several interesting commits merged tonight, the improved write clustering is a big one. In particular, &quot;Reduces low-memory tmpfs paging I/O overheads by 4x and generally increases paging throughput to SSD-based swap by 2x-4x. Tmpfs is now able to issue a lot more 64KB I/Os when under memory pressure.&quot;</p>
</blockquote>

<ul>
<li><a href="https://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/4eb0bb82efc8ef32c4357cf812891c08d38d8860" rel="nofollow">https://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/4eb0bb82efc8ef32c4357cf812891c08d38d8860</a></li>
</ul>

<blockquote>
<p>There&#39;s also a new tunable in the VM space as well as part of his commits on Wednesday night. This follows a lot of recent work on dsynth, improved page-out daemon pipelining, and other routine work.</p>
</blockquote>

<ul>
<li><a href="https://gitweb.dragonflybsd.org/dragonfly.git/commit/bc47dbc18bf832e4badb41f2fd79159479a7d351" rel="nofollow">https://gitweb.dragonflybsd.org/dragonfly.git/commit/bc47dbc18bf832e4badb41f2fd79159479a7d351</a></li>
</ul>

<blockquote>
<p>This work is building up towards the eventual DragonFlyBSD 5.8 while those wanting to try the latest improvements right away can find their daily snapshots.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/solaris/ZFSWhyNoRealReshaping" rel="nofollow">Why ZFS is not good at growing and reshaping pools (or shrinking them)</a></h3>

<blockquote>
<p>recently read Mark McBride&#39;s Five Years of Btrfs (via), which has a significant discussion of why McBride chose Btrfs over ZFS that boils down to ZFS not being very good at evolving your pool structure. You might doubt this judgment from a Btrfs user, so let me say as both a fan of ZFS and a long term user of it that this is unfortunately quite true; ZFS is not a good choice if you want to modify your pool disk layout significantly over time. ZFS works best if the only change in your pools that you do is replacing drives with bigger drives. In our ZFS environment we go to quite some lengths to be able to expand pools incrementally over time, and while this works it both leaves us with unbalanced pools and means that we&#39;re basically forced to use mirroring instead of RAIDZ.</p>

<p>(An unbalanced pool is one where some vdevs and disks have much more data than others. This is less of an issue for us now that we&#39;re using SSDs instead of HDs.)</p>
</blockquote>

<hr>

<h3><a href="https://astr0baby.wordpress.com/2020/02/09/using-pkgsrc-on-manjaro-linux-aarch64-pinebook-pro/" rel="nofollow">Using PKGSRC on Manjaro Linux aarch64 Pinebook-pro</a></h3>

<blockquote>
<p>I wanted to see how pkgsrc works on aarch64 Linux Manjaro since it is a very mature framework that is very portable and supported by many architectures – pkgsrc (package source) is a package management system for Unix-like operating systems. It was forked from the FreeBSD ports collection in 1997 as the primary package management system for NetBSD.</p>

<p>One might question why use pkgsrc on Arch based Manjaro, since the pacman package repository is very good on its own. I see alternative pkgsrc as a good automated build framework that offers a way to produce independent build environment /usr/pkg that does not interfere with the current Linux distribution in any way (all libraries are statically built)</p>

<p>I have used the latest Manjaro for Pinebookpro and standard recommended tools as mentioned here <a href="https://wiki.netbsd.org/pkgsrc/how_to_use_pkgsrc_on_linux/" rel="nofollow">https://wiki.netbsd.org/pkgsrc/how_to_use_pkgsrc_on_linux/</a></p>
</blockquote>

<hr>

<h3>A Central Log Host with syslog-ng on FreeBSD</h3>

<ul>
<li><a href="https://blog.socruel.nu/freebsd/a-central-log-host-with-syslog-ng-on-freebsd.html" rel="nofollow">Part 1</a></li>
</ul>

<blockquote>
<p>syslog-ng is the Swiss army knife of log management. You can collect logs from any source, process them in real time and deliver them to wide range of destinations. It allows you to flexibly collect, parse, classify, rewrite and correlate logs from across your infrastructure. This is why syslog-ng is the perfect solution for the central log host of my (mainly) FreeBSD based infrastructure.</p>
</blockquote>

<ul>
<li><a href="https://blog.socruel.nu/freebsd/check-logs-of-syslog-ng-log-host-on-freebsd.html" rel="nofollow">Part 2</a></li>
</ul>

<blockquote>
<p>This blog post continues where the blog post A central log host with syslog-ng on FreeBSD left off. Open source solutions to check syslog log messages exist, such as Logcheck or Logwatch. Although these are not too difficult to implement and maintain, I still found these to much. So I went for my own home grown solution to check the syslog messages of the SoCruel.NU central log host.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://mirror.linux.org.au/pub/linux.conf.au/2020/room_9/Tuesday/" rel="nofollow">FreeBSD at Linux Conf 2020 session videos now online</a></li>
<li><a href="https://vermaden.wordpress.com/2020/01/09/freebsd-desktop-part-20-configuration-unlock-your-laptop-with-phone/" rel="nofollow">Unlock your laptop with your phone</a></li>
<li><a href="https://www.netbsd.org/gallery/presentations/leot/itasec20/pkgsrc-security.pdf" rel="nofollow">Managing a database of vulnerabilities for a package system: the pkgsrc study</a></li>
<li>Hamilton BSD User group will meet again on March 10th](<a href="http://studybsd.com/" rel="nofollow">http://studybsd.com/</a>)</li>
<li><a href="https://www.meetup.com/en-AU/CharmBUG/events/268251508/" rel="nofollow">CharmBUG Meeting: March 24th 7pm in Severn, MD</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Andrew - <a href="http://dpaste.com/2YM23C0#wrap" rel="nofollow">ZFS feature Flags</a></li>
<li>Sam - <a href="http://dpaste.com/0FCZV6R" rel="nofollow">TwinCat BSD</a></li>
<li>Dacian - <a href="http://dpaste.com/1R7F1JN#wrap" rel="nofollow">Freebsd + amdgpu + Lenovo E595</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0340.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Why ZFS is doing filesystem checksumming right, better TMPFS throughput performance on DragonFlyBSD, reshaping pools with ZFS, PKGSRC on Manjaro aarch64 Pinebook-pro, central log host with syslog-ng on FreeBSD, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://oshogbo.vexillium.org/blog/73/" rel="nofollow">Checksumming in filesystems, and why ZFS is doing it right</a></h3>

<blockquote>
<p>One of the best aspects of ZFS is its reliability. This can be accomplished using a few features like copy-on-write approach and checksumming. Today we will look at how ZFS does checksumming and why it does it the proper way. Most of the file systems don’t provide any integrity checking and fail in several scenarios:</p>
</blockquote>

<ul>
<li>Data bit flips - when the data that we wanted to store are bit flipped by the hard drives, or cables, and the wrong data is stored on the hard drive.</li>
<li>Misdirected writes - when the CPU/cable/hard drive will bit flip a block to which the data should be written.</li>
<li>Misdirected read - when we miss reading the block when a bit flip occurred.</li>
<li>Phantom writes - when the write operation never made it to the disk. For example, a disk or kernel may have some bug that it will return success even if the hard drive never made the write. This problem can also occur when data is kept only in the hard drive cache.</li>
</ul>

<blockquote>
<p>Checksumming may help us detect errors in a few of those situations.</p>
</blockquote>

<hr>

<h3><a href="https://www.phoronix.com/scan.php?page=news_item&px=DragonFlyBSD-TMPFS-Throughput" rel="nofollow">DragonFlyBSD Improves Its TMPFS Implementation For Better Throughput Performance</a></h3>

<blockquote>
<p>It&#39;s been a while since last having any new magical optimizations to talk about by DragonFlyBSD lead developer Matthew Dillon, but on Wednesday he landed some significant temporary file-system &quot;TMPFS&quot; optimizations for better throughput including with swap.</p>

<p>Of several interesting commits merged tonight, the improved write clustering is a big one. In particular, &quot;Reduces low-memory tmpfs paging I/O overheads by 4x and generally increases paging throughput to SSD-based swap by 2x-4x. Tmpfs is now able to issue a lot more 64KB I/Os when under memory pressure.&quot;</p>
</blockquote>

<ul>
<li><a href="https://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/4eb0bb82efc8ef32c4357cf812891c08d38d8860" rel="nofollow">https://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/4eb0bb82efc8ef32c4357cf812891c08d38d8860</a></li>
</ul>

<blockquote>
<p>There&#39;s also a new tunable in the VM space as well as part of his commits on Wednesday night. This follows a lot of recent work on dsynth, improved page-out daemon pipelining, and other routine work.</p>
</blockquote>

<ul>
<li><a href="https://gitweb.dragonflybsd.org/dragonfly.git/commit/bc47dbc18bf832e4badb41f2fd79159479a7d351" rel="nofollow">https://gitweb.dragonflybsd.org/dragonfly.git/commit/bc47dbc18bf832e4badb41f2fd79159479a7d351</a></li>
</ul>

<blockquote>
<p>This work is building up towards the eventual DragonFlyBSD 5.8 while those wanting to try the latest improvements right away can find their daily snapshots.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/solaris/ZFSWhyNoRealReshaping" rel="nofollow">Why ZFS is not good at growing and reshaping pools (or shrinking them)</a></h3>

<blockquote>
<p>recently read Mark McBride&#39;s Five Years of Btrfs (via), which has a significant discussion of why McBride chose Btrfs over ZFS that boils down to ZFS not being very good at evolving your pool structure. You might doubt this judgment from a Btrfs user, so let me say as both a fan of ZFS and a long term user of it that this is unfortunately quite true; ZFS is not a good choice if you want to modify your pool disk layout significantly over time. ZFS works best if the only change in your pools that you do is replacing drives with bigger drives. In our ZFS environment we go to quite some lengths to be able to expand pools incrementally over time, and while this works it both leaves us with unbalanced pools and means that we&#39;re basically forced to use mirroring instead of RAIDZ.</p>

<p>(An unbalanced pool is one where some vdevs and disks have much more data than others. This is less of an issue for us now that we&#39;re using SSDs instead of HDs.)</p>
</blockquote>

<hr>

<h3><a href="https://astr0baby.wordpress.com/2020/02/09/using-pkgsrc-on-manjaro-linux-aarch64-pinebook-pro/" rel="nofollow">Using PKGSRC on Manjaro Linux aarch64 Pinebook-pro</a></h3>

<blockquote>
<p>I wanted to see how pkgsrc works on aarch64 Linux Manjaro since it is a very mature framework that is very portable and supported by many architectures – pkgsrc (package source) is a package management system for Unix-like operating systems. It was forked from the FreeBSD ports collection in 1997 as the primary package management system for NetBSD.</p>

<p>One might question why use pkgsrc on Arch based Manjaro, since the pacman package repository is very good on its own. I see alternative pkgsrc as a good automated build framework that offers a way to produce independent build environment /usr/pkg that does not interfere with the current Linux distribution in any way (all libraries are statically built)</p>

<p>I have used the latest Manjaro for Pinebookpro and standard recommended tools as mentioned here <a href="https://wiki.netbsd.org/pkgsrc/how_to_use_pkgsrc_on_linux/" rel="nofollow">https://wiki.netbsd.org/pkgsrc/how_to_use_pkgsrc_on_linux/</a></p>
</blockquote>

<hr>

<h3>A Central Log Host with syslog-ng on FreeBSD</h3>

<ul>
<li><a href="https://blog.socruel.nu/freebsd/a-central-log-host-with-syslog-ng-on-freebsd.html" rel="nofollow">Part 1</a></li>
</ul>

<blockquote>
<p>syslog-ng is the Swiss army knife of log management. You can collect logs from any source, process them in real time and deliver them to wide range of destinations. It allows you to flexibly collect, parse, classify, rewrite and correlate logs from across your infrastructure. This is why syslog-ng is the perfect solution for the central log host of my (mainly) FreeBSD based infrastructure.</p>
</blockquote>

<ul>
<li><a href="https://blog.socruel.nu/freebsd/check-logs-of-syslog-ng-log-host-on-freebsd.html" rel="nofollow">Part 2</a></li>
</ul>

<blockquote>
<p>This blog post continues where the blog post A central log host with syslog-ng on FreeBSD left off. Open source solutions to check syslog log messages exist, such as Logcheck or Logwatch. Although these are not too difficult to implement and maintain, I still found these to much. So I went for my own home grown solution to check the syslog messages of the SoCruel.NU central log host.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://mirror.linux.org.au/pub/linux.conf.au/2020/room_9/Tuesday/" rel="nofollow">FreeBSD at Linux Conf 2020 session videos now online</a></li>
<li><a href="https://vermaden.wordpress.com/2020/01/09/freebsd-desktop-part-20-configuration-unlock-your-laptop-with-phone/" rel="nofollow">Unlock your laptop with your phone</a></li>
<li><a href="https://www.netbsd.org/gallery/presentations/leot/itasec20/pkgsrc-security.pdf" rel="nofollow">Managing a database of vulnerabilities for a package system: the pkgsrc study</a></li>
<li>Hamilton BSD User group will meet again on March 10th](<a href="http://studybsd.com/" rel="nofollow">http://studybsd.com/</a>)</li>
<li><a href="https://www.meetup.com/en-AU/CharmBUG/events/268251508/" rel="nofollow">CharmBUG Meeting: March 24th 7pm in Severn, MD</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Andrew - <a href="http://dpaste.com/2YM23C0#wrap" rel="nofollow">ZFS feature Flags</a></li>
<li>Sam - <a href="http://dpaste.com/0FCZV6R" rel="nofollow">TwinCat BSD</a></li>
<li>Dacian - <a href="http://dpaste.com/1R7F1JN#wrap" rel="nofollow">Freebsd + amdgpu + Lenovo E595</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0340.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>333: Unix Keyboard Joy</title>
  <link>https://www.bsdnow.tv/333</link>
  <guid isPermaLink="false">9f3dffa3-f888-4af3-8a0a-3a236e130b4f</guid>
  <pubDate>Thu, 16 Jan 2020 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9f3dffa3-f888-4af3-8a0a-3a236e130b4f.mp3" length="29159154" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Your Impact on FreeBSD in 2019, Wireguard on OpenBSD Router, Amazon now has FreeBSD/ARM 12, pkgsrc-2019Q4, The Joys of UNIX Keyboards, OpenBSD on Digital Ocean, and more.</itunes:subtitle>
  <itunes:duration>40:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Your Impact on FreeBSD in 2019, Wireguard on OpenBSD Router, Amazon now has FreeBSD/ARM 12, pkgsrc-2019Q4, The Joys of UNIX Keyboards, OpenBSD on Digital Ocean, and more.
Headlines
Your Impact on FreeBSD in 2019 (https://www.freebsdfoundation.org/blog/your-impact-on-freebsd-in-2019/)
It’s hard to believe that 2019 is nearly over. It has been an amazing year for supporting the FreeBSD Project and community! Why do I say that? Because as I reflect over the past 12 months, I realize how many events we’ve attended all over the world, and how many lives we’ve touched in so many ways. From advocating for FreeBSD to implementing FreeBSD features, my team has been there to help make FreeBSD the best open source project and operating system out there.
In 2019, we focused on supporting a few key areas where the Project needed the most help. The first area was software development. Whether it was contracting FreeBSD developers to work on projects like wifi support, to providing internal staff to quickly implement hardware workarounds, we’ve stepped in to help keep FreeBSD innovative, secure, and reliable. Software development includes supporting the tools and infrastructure that make the development process go smoothly, and we’re on it with team members heading up the Continuous Integration efforts, and actively involved in the clusteradmin and security teams.
Our advocacy efforts focused on recruiting new users and contributors to the Project. We attended and participated in 38 conferences and events in 21 countries. From giving FreeBSD presentations and workshops to staffing tables, we were able to have 1:1 conversations with thousands of attendees.
Our travels also provided opportunities to talk directly with FreeBSD commercial and individual users, contributors, and future FreeBSD user/contributors. We’ve seen an increase in use and interest in FreeBSD from all of these organizations and individuals. These meetings give us a chance to learn more about what organizations need and what they and other individuals are working on. The information helps inform the work we should fund.
Wireguard on OpenBSD Router (https://obscurity.xyz/bsd/open/wireguard.html)
wireguard (wg) is a modern vpn protocol, using the latest class of encryption algorithms while at the same time promising speed and a small code base.
modern crypto and lean code are also tenants of openbsd, thus it was a no brainer to migrate my router from openvpn over to wireguard.
my setup : a collection of devices, both wired and wireless, that are nat’d through my router (openbsd 6.6) out via my vpn provider azire* and out to the internet using wg-quick to start wg.
running : doubtless this could be improved on, but currently i start wg manually when my router boots. this, and the nat'ing on the vpn interface mean its impossible for clients to connect to the internet without the vpn being up. as my router is on a ups and only reboots when a kernel patch requires it, it’s a compromise i can live with. run wg-quick (please replace vpn with whatever you named your wg .conf file.) and reload pf rules.
News Roundup
Amazon now has FreeBSD/ARM 12 (https://aws.amazon.com/marketplace/pp/B081NF7BY7)
AWS, the cloud division of Amazon, announced in December the next generation of its ARM processors, the Graviton2. This is a custom chip design with a 7nm architecture. It is based on 64-bit ARM Neoverse cores.
Compared to first-generation Graviton processors (A1), today’s new chips should deliver up to 7x the performance of A1 instances in some cases. Floating point performance is now twice as fast. There are additional memory channels and cache speed memory access should be much faster.
The company is working on three types of Graviton2 EC2 instances that should be available soon. Instances with a “g” suffix are powered by Graviton2 chips. If they have a “d” suffix, it also means that they have NVMe local storage.
General-purpose instances (M6g and M6gd)
Compute-optimized instances (C6g and C6gd)
Memory-optimized instances (R6g and R6gd)
You can choose instances with up to 64 vCPUs, 512 GiB of memory and 25 Gbps networking.
And you can see that ARM-powered servers are not just a fad. AWS already promises a 40% better price/performance ratio with ARM-based instances when you compare them with x86-based instances.
AWS has been working with operating system vendors and independent software vendors to help them release software that runs on ARM. ARM-based EC2 instances support Amazon Linux 2, Ubuntu, Red Hat, SUSE, Fedora, Debian and FreeBSD. It also works with multiple container services (Docker, Amazon ECS, and Amazon Elastic Kubernetes Service).
Coverage of AWS Announcement  (https://techcrunch.com/2019/12/03/aws-announces-new-arm-based-instances-with-graviton2-processors/)
Announcing the pkgsrc-2019Q4 release (https://mail-index.netbsd.org/pkgsrc-users/2020/01/06/msg030130.html)
The pkgsrc developers are proud to announce the 65th quarterly release of pkgsrc, the cross-platform packaging system.  pkgsrc is available with more than 20,000 packages, running on 23 separate platforms; more information on pkgsrc itself is available at https://www.pkgsrc.org/
In total, 190 packages were added, 96 packages were removed, and 1,868 package updates (to 1388 unique packages) were processed since the pkgsrc-2019Q3 release.  As usual, a large number of updates and additions were processed for packages for go (14), guile (11), perl (170), php (10), python (426), and ruby (110).  This continues pkgsrc's tradition of adding useful packages, updating many packages to more current versions, and pruning unmaintained packages that are believed to have essentially no users.
The Joys of UNIX Keyboards (https://donatstudios.com/UNIX-Keyboards)
I fell in love with a dead keyboard layout.
A decade or so ago while helping a friends father clean out an old building, we came across an ancient Sun Microsystems server. We found it curious. Everything about it was different from what we were used to. The command line was black on white, the connectors strange and foreign, and the keyboard layout was bizarre.
We never did much with it; turning it on made all the lights in his home dim, and our joint knowledge of UNIX was nonexistent. It sat in his bedroom for years supporting his television at the foot of his bed.
I never forgot that keyboard though. The thought that there was this alternative layout out there seemed intriguing to me.
OpenBSD on Digital Ocean (https://www.going-flying.com/blog/openbsd-on-digitalocean.html)
Last night I had a need to put together a new OpenBSD machine. Since I already use DigitalOcean for one of my public DNS servers I wanted to use them for this need but sadly like all too many of the cloud providers they don't support OpenBSD. Now they do support FreeBSD and I found a couple writeups that show how to use FreeBSD as a shim to install OpenBSD.
They are both sort of old at this point and with OpenBSD 6.6 out I ran into a bit of a snag. The default these days is to use a GPT partition table to enable EFI booting. This is generally pretty sane but it looks to me like the FreeBSD droplet doesn't support this. After the installer rebooted the VM failed to boot, being unable to find the bootloader.
Thankfully DigitalOcean has a recovery ISO that you can boot by simply switching to it and powering off and then on your Droplet.
Beastie Bits
FreeBSD defaults to LLVM on PPC (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=356111)
Theo De Raadt Interview between Ottawa 2019 Hackathon and BSDCAN 2019 (https://undeadly.org/cgi?action=article;sid=20191231214356)
Bastille Poll about what people would like to see in 2020 (https://twitter.com/BastilleBSD/status/1211475103143251968)
Notes on the classic book : The Design of the UNIX Operating System (https://github.com/suvratapte/Maurice-Bach-Notes)
Multics History (https://www.multicians.org/)
First meeting of the Hamilton BSD user group, February 11, 2020 18:30 - 21:00, Boston Pizza on Upper James St (http://studybsd.com/)
Feedback/Questions
Bill - 1.1 CDROM (http://dpaste.com/2H9CW6R)
Greg - More 50 Year anniversary information (http://dpaste.com/2SGA3KY)
Dave - Question time for Allan (http://dpaste.com/3ZAEKHD#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, freebsd foundation, foundation, wireguard, amazon, ec2, arm, arm 12, pkgsrc, unix, keyboard, keyboards, digital ocean</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Your Impact on FreeBSD in 2019, Wireguard on OpenBSD Router, Amazon now has FreeBSD/ARM 12, pkgsrc-2019Q4, The Joys of UNIX Keyboards, OpenBSD on Digital Ocean, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/your-impact-on-freebsd-in-2019/" rel="nofollow">Your Impact on FreeBSD in 2019</a></h3>

<blockquote>
<p>It’s hard to believe that 2019 is nearly over. It has been an amazing year for supporting the FreeBSD Project and community! Why do I say that? Because as I reflect over the past 12 months, I realize how many events we’ve attended all over the world, and how many lives we’ve touched in so many ways. From advocating for FreeBSD to implementing FreeBSD features, my team has been there to help make FreeBSD the best open source project and operating system out there.</p>

<p>In 2019, we focused on supporting a few key areas where the Project needed the most help. The first area was software development. Whether it was contracting FreeBSD developers to work on projects like wifi support, to providing internal staff to quickly implement hardware workarounds, we’ve stepped in to help keep FreeBSD innovative, secure, and reliable. Software development includes supporting the tools and infrastructure that make the development process go smoothly, and we’re on it with team members heading up the Continuous Integration efforts, and actively involved in the clusteradmin and security teams.</p>

<p>Our advocacy efforts focused on recruiting new users and contributors to the Project. We attended and participated in 38 conferences and events in 21 countries. From giving FreeBSD presentations and workshops to staffing tables, we were able to have 1:1 conversations with thousands of attendees.</p>

<p>Our travels also provided opportunities to talk directly with FreeBSD commercial and individual users, contributors, and future FreeBSD user/contributors. We’ve seen an increase in use and interest in FreeBSD from all of these organizations and individuals. These meetings give us a chance to learn more about what organizations need and what they and other individuals are working on. The information helps inform the work we should fund.</p>
</blockquote>

<hr>

<h3><a href="https://obscurity.xyz/bsd/open/wireguard.html" rel="nofollow">Wireguard on OpenBSD Router</a></h3>

<blockquote>
<p>wireguard (wg) is a modern vpn protocol, using the latest class of encryption algorithms while at the same time promising speed and a small code base.</p>

<p>modern crypto and lean code are also tenants of openbsd, thus it was a no brainer to migrate my router from openvpn over to wireguard.</p>

<p>my setup : a collection of devices, both wired and wireless, that are nat’d through my router (openbsd 6.6) out via my vpn provider azire* and out to the internet using wg-quick to start wg.</p>

<p>running : doubtless this could be improved on, but currently i start wg manually when my router boots. this, and the nat&#39;ing on the vpn interface mean its impossible for clients to connect to the internet without the vpn being up. as my router is on a ups and only reboots when a kernel patch requires it, it’s a compromise i can live with. run wg-quick (please replace vpn with whatever you named your wg .conf file.) and reload pf rules.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://aws.amazon.com/marketplace/pp/B081NF7BY7" rel="nofollow">Amazon now has FreeBSD/ARM 12</a></h3>

<blockquote>
<p>AWS, the cloud division of Amazon, announced in December the next generation of its ARM processors, the Graviton2. This is a custom chip design with a 7nm architecture. It is based on 64-bit ARM Neoverse cores.</p>

<p>Compared to first-generation Graviton processors (A1), today’s new chips should deliver up to 7x the performance of A1 instances in some cases. Floating point performance is now twice as fast. There are additional memory channels and cache speed memory access should be much faster.</p>

<p>The company is working on three types of Graviton2 EC2 instances that should be available soon. Instances with a “g” suffix are powered by Graviton2 chips. If they have a “d” suffix, it also means that they have NVMe local storage.</p>

<ul>
<li><p>General-purpose instances (M6g and M6gd)</p></li>
<li><p>Compute-optimized instances (C6g and C6gd)</p></li>
<li><p>Memory-optimized instances (R6g and R6gd)</p></li>
</ul>

<p>You can choose instances with up to 64 vCPUs, 512 GiB of memory and 25 Gbps networking.</p>

<p>And you can see that ARM-powered servers are not just a fad. AWS already promises a 40% better price/performance ratio with ARM-based instances when you compare them with x86-based instances.</p>

<p>AWS has been working with operating system vendors and independent software vendors to help them release software that runs on ARM. ARM-based EC2 instances support Amazon Linux 2, Ubuntu, Red Hat, SUSE, Fedora, Debian and FreeBSD. It also works with multiple container services (Docker, Amazon ECS, and Amazon Elastic Kubernetes Service).</p>
</blockquote>

<ul>
<li><a href="https://techcrunch.com/2019/12/03/aws-announces-new-arm-based-instances-with-graviton2-processors/" rel="nofollow">Coverage of AWS Announcement </a></li>
</ul>

<hr>

<h3><a href="https://mail-index.netbsd.org/pkgsrc-users/2020/01/06/msg030130.html" rel="nofollow">Announcing the pkgsrc-2019Q4 release</a></h3>

<blockquote>
<p>The pkgsrc developers are proud to announce the 65th quarterly release of pkgsrc, the cross-platform packaging system.  pkgsrc is available with more than 20,000 packages, running on 23 separate platforms; more information on pkgsrc itself is available at <a href="https://www.pkgsrc.org/" rel="nofollow">https://www.pkgsrc.org/</a></p>

<p>In total, 190 packages were added, 96 packages were removed, and 1,868 package updates (to 1388 unique packages) were processed since the pkgsrc-2019Q3 release.  As usual, a large number of updates and additions were processed for packages for go (14), guile (11), perl (170), php (10), python (426), and ruby (110).  This continues pkgsrc&#39;s tradition of adding useful packages, updating many packages to more current versions, and pruning unmaintained packages that are believed to have essentially no users.</p>
</blockquote>

<hr>

<h3><a href="https://donatstudios.com/UNIX-Keyboards" rel="nofollow">The Joys of UNIX Keyboards</a></h3>

<blockquote>
<p>I fell in love with a dead keyboard layout.</p>

<p>A decade or so ago while helping a friends father clean out an old building, we came across an ancient Sun Microsystems server. We found it curious. Everything about it was different from what we were used to. The command line was black on white, the connectors strange and foreign, and the keyboard layout was bizarre.</p>

<p>We never did much with it; turning it on made all the lights in his home dim, and our joint knowledge of UNIX was nonexistent. It sat in his bedroom for years supporting his television at the foot of his bed.</p>

<p>I never forgot that keyboard though. The thought that there was this alternative layout out there seemed intriguing to me.</p>
</blockquote>

<hr>

<h3><a href="https://www.going-flying.com/blog/openbsd-on-digitalocean.html" rel="nofollow">OpenBSD on Digital Ocean</a></h3>

<blockquote>
<p>Last night I had a need to put together a new OpenBSD machine. Since I already use DigitalOcean for one of my public DNS servers I wanted to use them for this need but sadly like all too many of the cloud providers they don&#39;t support OpenBSD. Now they do support FreeBSD and I found a couple writeups that show how to use FreeBSD as a shim to install OpenBSD.</p>

<p>They are both sort of old at this point and with OpenBSD 6.6 out I ran into a bit of a snag. The default these days is to use a GPT partition table to enable EFI booting. This is generally pretty sane but it looks to me like the FreeBSD droplet doesn&#39;t support this. After the installer rebooted the VM failed to boot, being unable to find the bootloader.</p>

<p>Thankfully DigitalOcean has a recovery ISO that you can boot by simply switching to it and powering off and then on your Droplet.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=356111" rel="nofollow">FreeBSD defaults to LLVM on PPC</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20191231214356" rel="nofollow">Theo De Raadt Interview between Ottawa 2019 Hackathon and BSDCAN 2019</a></li>
<li><a href="https://twitter.com/BastilleBSD/status/1211475103143251968" rel="nofollow">Bastille Poll about what people would like to see in 2020</a></li>
<li><a href="https://github.com/suvratapte/Maurice-Bach-Notes" rel="nofollow">Notes on the classic book : The Design of the UNIX Operating System</a></li>
<li><a href="https://www.multicians.org/" rel="nofollow">Multics History</a></li>
<li><a href="http://studybsd.com/" rel="nofollow">First meeting of the Hamilton BSD user group, February 11, 2020 18:30 - 21:00, Boston Pizza on Upper James St</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Bill - <a href="http://dpaste.com/2H9CW6R" rel="nofollow">1.1 CDROM</a></li>
<li>Greg - <a href="http://dpaste.com/2SGA3KY" rel="nofollow">More 50 Year anniversary information</a></li>
<li>Dave - <a href="http://dpaste.com/3ZAEKHD#wrap" rel="nofollow">Question time for Allan</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0333.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Your Impact on FreeBSD in 2019, Wireguard on OpenBSD Router, Amazon now has FreeBSD/ARM 12, pkgsrc-2019Q4, The Joys of UNIX Keyboards, OpenBSD on Digital Ocean, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/your-impact-on-freebsd-in-2019/" rel="nofollow">Your Impact on FreeBSD in 2019</a></h3>

<blockquote>
<p>It’s hard to believe that 2019 is nearly over. It has been an amazing year for supporting the FreeBSD Project and community! Why do I say that? Because as I reflect over the past 12 months, I realize how many events we’ve attended all over the world, and how many lives we’ve touched in so many ways. From advocating for FreeBSD to implementing FreeBSD features, my team has been there to help make FreeBSD the best open source project and operating system out there.</p>

<p>In 2019, we focused on supporting a few key areas where the Project needed the most help. The first area was software development. Whether it was contracting FreeBSD developers to work on projects like wifi support, to providing internal staff to quickly implement hardware workarounds, we’ve stepped in to help keep FreeBSD innovative, secure, and reliable. Software development includes supporting the tools and infrastructure that make the development process go smoothly, and we’re on it with team members heading up the Continuous Integration efforts, and actively involved in the clusteradmin and security teams.</p>

<p>Our advocacy efforts focused on recruiting new users and contributors to the Project. We attended and participated in 38 conferences and events in 21 countries. From giving FreeBSD presentations and workshops to staffing tables, we were able to have 1:1 conversations with thousands of attendees.</p>

<p>Our travels also provided opportunities to talk directly with FreeBSD commercial and individual users, contributors, and future FreeBSD user/contributors. We’ve seen an increase in use and interest in FreeBSD from all of these organizations and individuals. These meetings give us a chance to learn more about what organizations need and what they and other individuals are working on. The information helps inform the work we should fund.</p>
</blockquote>

<hr>

<h3><a href="https://obscurity.xyz/bsd/open/wireguard.html" rel="nofollow">Wireguard on OpenBSD Router</a></h3>

<blockquote>
<p>wireguard (wg) is a modern vpn protocol, using the latest class of encryption algorithms while at the same time promising speed and a small code base.</p>

<p>modern crypto and lean code are also tenants of openbsd, thus it was a no brainer to migrate my router from openvpn over to wireguard.</p>

<p>my setup : a collection of devices, both wired and wireless, that are nat’d through my router (openbsd 6.6) out via my vpn provider azire* and out to the internet using wg-quick to start wg.</p>

<p>running : doubtless this could be improved on, but currently i start wg manually when my router boots. this, and the nat&#39;ing on the vpn interface mean its impossible for clients to connect to the internet without the vpn being up. as my router is on a ups and only reboots when a kernel patch requires it, it’s a compromise i can live with. run wg-quick (please replace vpn with whatever you named your wg .conf file.) and reload pf rules.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://aws.amazon.com/marketplace/pp/B081NF7BY7" rel="nofollow">Amazon now has FreeBSD/ARM 12</a></h3>

<blockquote>
<p>AWS, the cloud division of Amazon, announced in December the next generation of its ARM processors, the Graviton2. This is a custom chip design with a 7nm architecture. It is based on 64-bit ARM Neoverse cores.</p>

<p>Compared to first-generation Graviton processors (A1), today’s new chips should deliver up to 7x the performance of A1 instances in some cases. Floating point performance is now twice as fast. There are additional memory channels and cache speed memory access should be much faster.</p>

<p>The company is working on three types of Graviton2 EC2 instances that should be available soon. Instances with a “g” suffix are powered by Graviton2 chips. If they have a “d” suffix, it also means that they have NVMe local storage.</p>

<ul>
<li><p>General-purpose instances (M6g and M6gd)</p></li>
<li><p>Compute-optimized instances (C6g and C6gd)</p></li>
<li><p>Memory-optimized instances (R6g and R6gd)</p></li>
</ul>

<p>You can choose instances with up to 64 vCPUs, 512 GiB of memory and 25 Gbps networking.</p>

<p>And you can see that ARM-powered servers are not just a fad. AWS already promises a 40% better price/performance ratio with ARM-based instances when you compare them with x86-based instances.</p>

<p>AWS has been working with operating system vendors and independent software vendors to help them release software that runs on ARM. ARM-based EC2 instances support Amazon Linux 2, Ubuntu, Red Hat, SUSE, Fedora, Debian and FreeBSD. It also works with multiple container services (Docker, Amazon ECS, and Amazon Elastic Kubernetes Service).</p>
</blockquote>

<ul>
<li><a href="https://techcrunch.com/2019/12/03/aws-announces-new-arm-based-instances-with-graviton2-processors/" rel="nofollow">Coverage of AWS Announcement </a></li>
</ul>

<hr>

<h3><a href="https://mail-index.netbsd.org/pkgsrc-users/2020/01/06/msg030130.html" rel="nofollow">Announcing the pkgsrc-2019Q4 release</a></h3>

<blockquote>
<p>The pkgsrc developers are proud to announce the 65th quarterly release of pkgsrc, the cross-platform packaging system.  pkgsrc is available with more than 20,000 packages, running on 23 separate platforms; more information on pkgsrc itself is available at <a href="https://www.pkgsrc.org/" rel="nofollow">https://www.pkgsrc.org/</a></p>

<p>In total, 190 packages were added, 96 packages were removed, and 1,868 package updates (to 1388 unique packages) were processed since the pkgsrc-2019Q3 release.  As usual, a large number of updates and additions were processed for packages for go (14), guile (11), perl (170), php (10), python (426), and ruby (110).  This continues pkgsrc&#39;s tradition of adding useful packages, updating many packages to more current versions, and pruning unmaintained packages that are believed to have essentially no users.</p>
</blockquote>

<hr>

<h3><a href="https://donatstudios.com/UNIX-Keyboards" rel="nofollow">The Joys of UNIX Keyboards</a></h3>

<blockquote>
<p>I fell in love with a dead keyboard layout.</p>

<p>A decade or so ago while helping a friends father clean out an old building, we came across an ancient Sun Microsystems server. We found it curious. Everything about it was different from what we were used to. The command line was black on white, the connectors strange and foreign, and the keyboard layout was bizarre.</p>

<p>We never did much with it; turning it on made all the lights in his home dim, and our joint knowledge of UNIX was nonexistent. It sat in his bedroom for years supporting his television at the foot of his bed.</p>

<p>I never forgot that keyboard though. The thought that there was this alternative layout out there seemed intriguing to me.</p>
</blockquote>

<hr>

<h3><a href="https://www.going-flying.com/blog/openbsd-on-digitalocean.html" rel="nofollow">OpenBSD on Digital Ocean</a></h3>

<blockquote>
<p>Last night I had a need to put together a new OpenBSD machine. Since I already use DigitalOcean for one of my public DNS servers I wanted to use them for this need but sadly like all too many of the cloud providers they don&#39;t support OpenBSD. Now they do support FreeBSD and I found a couple writeups that show how to use FreeBSD as a shim to install OpenBSD.</p>

<p>They are both sort of old at this point and with OpenBSD 6.6 out I ran into a bit of a snag. The default these days is to use a GPT partition table to enable EFI booting. This is generally pretty sane but it looks to me like the FreeBSD droplet doesn&#39;t support this. After the installer rebooted the VM failed to boot, being unable to find the bootloader.</p>

<p>Thankfully DigitalOcean has a recovery ISO that you can boot by simply switching to it and powering off and then on your Droplet.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=356111" rel="nofollow">FreeBSD defaults to LLVM on PPC</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20191231214356" rel="nofollow">Theo De Raadt Interview between Ottawa 2019 Hackathon and BSDCAN 2019</a></li>
<li><a href="https://twitter.com/BastilleBSD/status/1211475103143251968" rel="nofollow">Bastille Poll about what people would like to see in 2020</a></li>
<li><a href="https://github.com/suvratapte/Maurice-Bach-Notes" rel="nofollow">Notes on the classic book : The Design of the UNIX Operating System</a></li>
<li><a href="https://www.multicians.org/" rel="nofollow">Multics History</a></li>
<li><a href="http://studybsd.com/" rel="nofollow">First meeting of the Hamilton BSD user group, February 11, 2020 18:30 - 21:00, Boston Pizza on Upper James St</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Bill - <a href="http://dpaste.com/2H9CW6R" rel="nofollow">1.1 CDROM</a></li>
<li>Greg - <a href="http://dpaste.com/2SGA3KY" rel="nofollow">More 50 Year anniversary information</a></li>
<li>Dave - <a href="http://dpaste.com/3ZAEKHD#wrap" rel="nofollow">Question time for Allan</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0333.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>296: It’s Alive: OpenBSD 6.5</title>
  <link>https://www.bsdnow.tv/296</link>
  <guid isPermaLink="false">81313d3c-40f8-49f3-bc58-f34f5dfcf51d</guid>
  <pubDate>Fri, 03 May 2019 13:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/81313d3c-40f8-49f3-bc58-f34f5dfcf51d.mp3" length="37476669" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenBSD 6.5 has been released, mount ZFS datasets anywhere, help test upcoming NetBSD 9 branch, LibreSSL 2.9.1 is available, Bail Bond Denied Edition of FreeBSD Mastery: Jails, and one reason ed(1) was a good editor back in the days in this week’s episode.</itunes:subtitle>
  <itunes:duration>1:01:35</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>OpenBSD 6.5 has been released, mount ZFS datasets anywhere, help test upcoming NetBSD 9 branch, LibreSSL 2.9.1 is available, Bail Bond Denied Edition of FreeBSD Mastery: Jails, and one reason ed(1) was a good editor back in the days in this week’s episode.
&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.openbsd.org/65.html"&gt;OpenBSD 6.5 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/plus65.html"&gt;Changelog&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.openbsd.org/ftp.html"&gt;Mirrors&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;6.5 Includes


&lt;ul&gt;
&lt;li&gt;OpenSMTPD 6.5.0&lt;/li&gt;

&lt;li&gt;LibreSSL 2.9.1&lt;/li&gt;

&lt;li&gt;OpenSSH 8.0&lt;/li&gt;

&lt;li&gt;Mandoc 1.14.5&lt;/li&gt;

&lt;li&gt;Xenocara&lt;/li&gt;

&lt;li&gt;LLVM/Clang 7.0.1 (+ patches)&lt;/li&gt;

&lt;li&gt;GCC 4.2.1 (+ patches) and 3.3.6 (+ patches)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;Many pre-built packages for each architecture:


&lt;ul&gt;
&lt;li&gt;aarch64: 9654&lt;/li&gt;

&lt;li&gt;amd64: 10602&lt;/li&gt;

&lt;li&gt;i386: 10535&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://dan.langille.org/2019/04/22/mount-your-zfs-datasets-anywhere-you-want/"&gt;Mount your ZFS datasets anywhere you want&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;ZFS is very flexible about mountpoints, and there are many features available to provide great flexibility.
  When you create zpool main&lt;em&gt;tank, the default mountpoint is /main&lt;/em&gt;tank.
  You might be happy with that, but you don’t have to be content. You can do magical things.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Some highlights are:


&lt;ul&gt;
&lt;li&gt;mount point can be inherited&lt;/li&gt;

&lt;li&gt;not all filesystems in a zpool need to be mounted&lt;/li&gt;

&lt;li&gt;each filesystem (directory) can have different ZFS characteristics&lt;/li&gt;

&lt;li&gt;In my case, let’s look at this new zpool I created earlier today and I will show you some very simple alternatives. This zpool use NVMe devices which should be faster than SSDs especially when used with multiple concurrent writes. This is my plan: run all the Bacula regression tests concurrently.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/current-users/2019/04/24/msg035645.html"&gt;Branch for netbsd 9 upcoming, please help and test -current&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Folks,
  once again we are quite late for branching the next NetBSD release (NetBSD 9).
  Initially planned to happen early in February 2019, we are now approaching May and it is unlikely that the branch will happen before that.
  On the positive side, lots of good things landed in -current in between, like new Mesa, new jemalloc, lots of ZFS improvements - and some of those would be hard to pull up to the branch later.
  On the bad side we saw lots of churn in -current recently, and there is quite  some fallout where we not even have a good overview right now. And this is where  you can help:&lt;/p&gt;
  
  &lt;ul&gt;
  &lt;li&gt;please test -current, on all the various machines you have&lt;/li&gt;
  
  &lt;li&gt;especially interesting would be test results from uncommon architectures
  or strange combinations (like the sparc userland on sparc64 kernel issue
  I ran in yesterday)
  Please test, report success, and file PRs for failures!
  We will likely announce the real branch date on quite short notice, the likely next candidates would be mid may or end of may.
  We may need to do extra steps after the branch (like switch some architectures back to old jemalloc on the branch). However, the less difference between -current and the branch, the easier will the release cycle go.
  Our goal is to have an unprecedented short release cycle this time. But..
  we always say that upfront.&lt;/li&gt;
  &lt;/ul&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://marc.info/?l=openbsd-announce&amp;amp;m=155590112606279&amp;amp;w=2"&gt;LibreSSL 2.9.1 Released&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;We have released LibreSSL 2.9.1, which will be arriving in the LibreSSL
  directory of your local OpenBSD mirror soon. This is the first stable release
  from the 2.9 series, which is also included with OpenBSD 6.5&lt;/p&gt;
  
  &lt;p&gt;It includes the following changes and improvements from LibreSSL 2.8.x:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;API and Documentation Enhancements&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CRYPTO_LOCK is now automatically initialized, with the legacy
callbacks stubbed for compatibility.&lt;/li&gt;

&lt;li&gt;Added the SM3 hash function from the Chinese standard GB/T 32905-2016.&lt;/li&gt;

&lt;li&gt;Added the SM4 block cipher from the Chinese standard GB/T 32907-2016.&lt;/li&gt;

&lt;li&gt;Added more OPENSSL&lt;em&gt;NO&lt;/em&gt;* macros for compatibility with OpenSSL.&lt;/li&gt;

&lt;li&gt;Partial port of the OpenSSL EC&lt;em&gt;KEY&lt;/em&gt;METHOD API for use by OpenSSH.&lt;/li&gt;

&lt;li&gt;Implemented further missing OpenSSL 1.1 API.&lt;/li&gt;

&lt;li&gt;Added support for XChaCha20 and XChaCha20-Poly1305.&lt;/li&gt;

&lt;li&gt;Added support for AES key wrap constructions via the EVP interface.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;
&lt;p&gt;Compatibility Changes&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added pbkdf2 key derivation support to openssl(1) enc.&lt;/li&gt;

&lt;li&gt;Changed the default digest type of openssl(1) enc to sha256.&lt;/li&gt;

&lt;li&gt;Changed the default digest type of openssl(1) dgst to sha256.&lt;/li&gt;

&lt;li&gt;Changed the default digest type of openssl(1) x509 -fingerprint to sha256.&lt;/li&gt;

&lt;li&gt;Changed the default digest type of openssl(1) crl -fingerprint to sha256.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;
&lt;p&gt;Testing and Proactive Security&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added extensive interoperability tests between LibreSSL and OpenSSL
1.0 and 1.1.&lt;/li&gt;

&lt;li&gt;Added additional Wycheproof tests and related bug fixes.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;
&lt;p&gt;Internal Improvements&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Simplified sigalgs option processing and handshake signing
algorithm selection.&lt;/li&gt;

&lt;li&gt;Added the ability to use the RSA PSS algorithm for handshake signatures.&lt;/li&gt;

&lt;li&gt;Added bn&lt;em&gt;rand&lt;/em&gt;interval() and use it in code needing ranges of
random bn values.&lt;/li&gt;

&lt;li&gt;Added functionality to derive early, handshake, and application
secrets as per RFC8446.&lt;/li&gt;

&lt;li&gt;Added handshake state machine from RFC8446.&lt;/li&gt;

&lt;li&gt;Removed some ASN.1 related code from libcrypto that had not been
used since around 2000.&lt;/li&gt;

&lt;li&gt;Unexported internal symbols and internalized more record layer structs.&lt;/li&gt;

&lt;li&gt;Removed SHA224 based handshake signatures from consideration for
use in a TLS 1.2 handshake.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;
&lt;p&gt;Portable Improvements&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Added support for assembly optimizations on 32-bit ARM ELF targets.&lt;/li&gt;

&lt;li&gt;Added support for assembly optimizations on Mingw-w64 targets.&lt;/li&gt;

&lt;li&gt;Improved Android compatibility&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;

&lt;li&gt;
&lt;p&gt;Bug Fixes&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Improved protection against timing side channels in ECDSA signature
generation.&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;Coordinate blinding was added to some elliptic curves. This is the
last bit of the work by Brumley et al. to protect against the Portsmash
vulnerability.&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;Ensure transcript handshake is always freed with TLS 1.2.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;The LibreSSL project continues improvement of the codebase to reflect modern,
  safe programming practices. We welcome feedback and improvements from the
  broader community. Thanks to all of the contributors who helped make this
  release possible.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://mwl.io/archives/4227"&gt;FreeBSD Mastery: Jails – Bail Bond Denied Edition&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;I had a brilliant, hideous idea: to produce a charity edition of FreeBSD Mastery: Jails featuring the cover art I would use if I was imprisoned and did not have access to a real cover artist. (Never mind that I wouldn’t be permitted to release books while in jail: we creative sorts scoff at mere legal and cultural details.)
  I originally wanted to produce my own take on the book’s cover art. My first attempt failed spectacularly.
  I downgraded my expectations and tried again. And again. And again.
  I’m pleased to reveal the final cover for FreeBSD Mastery: Jails–Bail Bond Edition!
  This cover represents the very pinnacle of my artistic talents, and is the result of literally hours of effort.
  But, as this book is available only to the winner of charity fund-raisers, purchase of this tome represents moral supremacy. I recommend flaunting it to your family, coworkers, and all those of lesser character.
  Get your copy by winning the BSDCan 2019 charity auction… or any other other auction-type event I deem worthwhile.
  As far as my moral fiber goes: I have learned that art is hard, and that artists are not paid enough.
  And if I am ever imprisoned, I do hope that you’ll contribute to my bail fund. Otherwise, you’ll get more covers like this one.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/~cks/space/blog/unix/EdDesignedForCookedInput"&gt;One reason ed(1) was a good editor back in the days of V7 Unix&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;It is common to describe ed(1) as being line oriented, as opposed to screen oriented editors like vi. This is completely accurate but it is perhaps not a complete enough description for today, because ed is line oriented in a way that is now uncommon. After all, you could say that your shell is line oriented too, and very few people use shells that work and feel the same way ed does.
  The surface difference between most people's shells and ed is that most people's shells have some version of cursor based interactive editing. The deeper difference is that this requires the shell to run in character by character TTY input mode, also called raw mode. By contrast, ed runs in what Unix usually calls cooked mode, where it reads whole lines from the kernel and the kernel handles things like backspace. All of ed's commands are designed so that they work in this line focused way (including being terminated by the end of the line), and as a whole ed's interface makes this whole line input approach natural. In fact I think ed makes it so natural that it's hard to think of things as being any other way. Ed was designed for line at a time input, not just to not be screen oriented.
  This input mode difference is not very important today, but in the days of V7 and serial terminals it made a real difference. In cooked mode, V7 ran very little code when you entered each character; almost everything was deferred until it could be processed in bulk by the kernel, and then handed to ed all in a single line which ed could also process all at once. A version of ed that tried to work in raw mode would have been much more resource intensive, even if it still operated on single lines at a time.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-fs/2019-April/027603.html"&gt;CFT for FreeBSD ZoL&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://github.com/wilyarti/simple-dns-adblock"&gt;Simple DNS Adblock&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://twitter.com/unix_byte/status/1119904828182781958"&gt;AT&amp;amp;T Unix PC in 1985&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://marc.info/?l=openbsd-cvs&amp;amp;m=155523690813457&amp;amp;w=2"&gt;OpenBSD-current drm at 4.19, includes new support for Intel GPUs like Coffee Lake&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://twitter.com/cfenollosa/status/1122069042083323904"&gt;"What are the differences between Linux and OpenBSD?" - Twitter thread&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="http://mail-index.netbsd.org/pkgsrc-users/2019/04/10/msg028308.html"&gt;Announcing the pkgsrc-2019Q1 release (2019-04-10)&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Brad - &lt;a href="http://dpaste.com/0K2QFTM#wrap"&gt;iocage&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Frank - &lt;a href="http://dpaste.com/3110R96#wrap"&gt;Video from Level1Tech and a question&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Niall - &lt;a href="http://dpaste.com/0A32XDK#wrap"&gt;Revision Control&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, zfs, libressl, ed, michael lucas, dns, pkgsrc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenBSD 6.5 has been released, mount ZFS datasets anywhere, help test upcoming NetBSD 9 branch, LibreSSL 2.9.1 is available, Bail Bond Denied Edition of FreeBSD Mastery: Jails, and one reason ed(1) was a good editor back in the days in this week’s episode.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="openbsd65releasedhttpswwwopenbsdorg65html"><a href="https://www.openbsd.org/65.html">OpenBSD 6.5 Released</a></h3>

<ul>
<li><a href="https://www.openbsd.org/plus65.html">Changelog</a></li>

<li><a href="https://www.openbsd.org/ftp.html">Mirrors</a></li>

<li>6.5 Includes


<ul>
<li>OpenSMTPD 6.5.0</li>

<li>LibreSSL 2.9.1</li>

<li>OpenSSH 8.0</li>

<li>Mandoc 1.14.5</li>

<li>Xenocara</li>

<li>LLVM/Clang 7.0.1 (+ patches)</li>

<li>GCC 4.2.1 (+ patches) and 3.3.6 (+ patches)</li></ul>
</li>

<li>Many pre-built packages for each architecture:


<ul>
<li>aarch64: 9654</li>

<li>amd64: 10602</li>

<li>i386: 10535</li></ul>
</li>
</ul>

<p><hr /></p>

<h3 id="mountyourzfsdatasetsanywhereyouwanthttpsdanlangilleorg20190422mountyourzfsdatasetsanywhereyouwant"><a href="https://dan.langille.org/2019/04/22/mount-your-zfs-datasets-anywhere-you-want/">Mount your ZFS datasets anywhere you want</a></h3>

<blockquote>
  <p>ZFS is very flexible about mountpoints, and there are many features available to provide great flexibility.
  When you create zpool main<em>tank, the default mountpoint is /main</em>tank.
  You might be happy with that, but you don’t have to be content. You can do magical things.</p>
</blockquote>

<ul>
<li>Some highlights are:


<ul>
<li>mount point can be inherited</li>

<li>not all filesystems in a zpool need to be mounted</li>

<li>each filesystem (directory) can have different ZFS characteristics</li>

<li>In my case, let’s look at this new zpool I created earlier today and I will show you some very simple alternatives. This zpool use NVMe devices which should be faster than SSDs especially when used with multiple concurrent writes. This is my plan: run all the Bacula regression tests concurrently.</li></ul>
</li>
</ul>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="branchfornetbsd9upcomingpleasehelpandtestcurrenthttpsmailindexnetbsdorgcurrentusers20190424msg035645html"><a href="https://mail-index.netbsd.org/current-users/2019/04/24/msg035645.html">Branch for netbsd 9 upcoming, please help and test -current</a></h3>

<blockquote>
  <p>Folks,
  once again we are quite late for branching the next NetBSD release (NetBSD 9).
  Initially planned to happen early in February 2019, we are now approaching May and it is unlikely that the branch will happen before that.
  On the positive side, lots of good things landed in -current in between, like new Mesa, new jemalloc, lots of ZFS improvements - and some of those would be hard to pull up to the branch later.
  On the bad side we saw lots of churn in -current recently, and there is quite  some fallout where we not even have a good overview right now. And this is where  you can help:</p>
  
  <ul>
  <li>please test -current, on all the various machines you have</li>
  
  <li>especially interesting would be test results from uncommon architectures
  or strange combinations (like the sparc userland on sparc64 kernel issue
  I ran in yesterday)
  Please test, report success, and file PRs for failures!
  We will likely announce the real branch date on quite short notice, the likely next candidates would be mid may or end of may.
  We may need to do extra steps after the branch (like switch some architectures back to old jemalloc on the branch). However, the less difference between -current and the branch, the easier will the release cycle go.
  Our goal is to have an unprecedented short release cycle this time. But..
  we always say that upfront.</li>
  </ul>
  
  <hr />
</blockquote>

<h3 id="libressl291releasedhttpsmarcinfolopenbsdannouncem155590112606279w2"><a href="https://marc.info/?l=openbsd-announce&amp;m=155590112606279&amp;w=2">LibreSSL 2.9.1 Released</a></h3>

<blockquote>
  <p>We have released LibreSSL 2.9.1, which will be arriving in the LibreSSL
  directory of your local OpenBSD mirror soon. This is the first stable release
  from the 2.9 series, which is also included with OpenBSD 6.5</p>
  
  <p>It includes the following changes and improvements from LibreSSL 2.8.x:</p>
</blockquote>

<ul>
<li><p>API and Documentation Enhancements</p>

<ul>
<li>CRYPTO_LOCK is now automatically initialized, with the legacy
callbacks stubbed for compatibility.</li>

<li>Added the SM3 hash function from the Chinese standard GB/T 32905-2016.</li>

<li>Added the SM4 block cipher from the Chinese standard GB/T 32907-2016.</li>

<li>Added more OPENSSL<em>NO</em>* macros for compatibility with OpenSSL.</li>

<li>Partial port of the OpenSSL EC<em>KEY</em>METHOD API for use by OpenSSH.</li>

<li>Implemented further missing OpenSSL 1.1 API.</li>

<li>Added support for XChaCha20 and XChaCha20-Poly1305.</li>

<li>Added support for AES key wrap constructions via the EVP interface.</li></ul></li>

<li><p>Compatibility Changes</p>

<ul>
<li>Added pbkdf2 key derivation support to openssl(1) enc.</li>

<li>Changed the default digest type of openssl(1) enc to sha256.</li>

<li>Changed the default digest type of openssl(1) dgst to sha256.</li>

<li>Changed the default digest type of openssl(1) x509 -fingerprint to sha256.</li>

<li>Changed the default digest type of openssl(1) crl -fingerprint to sha256.</li></ul></li>

<li><p>Testing and Proactive Security</p>

<ul>
<li>Added extensive interoperability tests between LibreSSL and OpenSSL
1.0 and 1.1.</li>

<li>Added additional Wycheproof tests and related bug fixes.</li></ul></li>

<li><p>Internal Improvements</p>

<ul>
<li>Simplified sigalgs option processing and handshake signing
algorithm selection.</li>

<li>Added the ability to use the RSA PSS algorithm for handshake signatures.</li>

<li>Added bn<em>rand</em>interval() and use it in code needing ranges of
random bn values.</li>

<li>Added functionality to derive early, handshake, and application
secrets as per RFC8446.</li>

<li>Added handshake state machine from RFC8446.</li>

<li>Removed some ASN.1 related code from libcrypto that had not been
used since around 2000.</li>

<li>Unexported internal symbols and internalized more record layer structs.</li>

<li>Removed SHA224 based handshake signatures from consideration for
use in a TLS 1.2 handshake.</li></ul></li>

<li><p>Portable Improvements</p>

<ul>
<li>Added support for assembly optimizations on 32-bit ARM ELF targets.</li>

<li>Added support for assembly optimizations on Mingw-w64 targets.</li>

<li>Improved Android compatibility</li></ul></li>

<li><p>Bug Fixes</p>

<p><ul>
<li>Improved protection against timing side channels in ECDSA signature
generation.</li></p>

<p><li>Coordinate blinding was added to some elliptic curves. This is the
last bit of the work by Brumley et al. to protect against the Portsmash
vulnerability.</li></p>

<p><li>Ensure transcript handshake is always freed with TLS 1.2.</li></ul>

<p></p></li>
</ul></p>

<blockquote>
  <p>The LibreSSL project continues improvement of the codebase to reflect modern,
  safe programming practices. We welcome feedback and improvements from the
  broader community. Thanks to all of the contributors who helped make this
  release possible.</p>
  
  <hr />
</blockquote>

<h3 id="freebsdmasteryjailsbailbonddeniededitionhttpsmwlioarchives4227"><a href="https://mwl.io/archives/4227">FreeBSD Mastery: Jails – Bail Bond Denied Edition</a></h3>

<blockquote>
  <p>I had a brilliant, hideous idea: to produce a charity edition of FreeBSD Mastery: Jails featuring the cover art I would use if I was imprisoned and did not have access to a real cover artist. (Never mind that I wouldn’t be permitted to release books while in jail: we creative sorts scoff at mere legal and cultural details.)
  I originally wanted to produce my own take on the book’s cover art. My first attempt failed spectacularly.
  I downgraded my expectations and tried again. And again. And again.
  I’m pleased to reveal the final cover for FreeBSD Mastery: Jails–Bail Bond Edition!
  This cover represents the very pinnacle of my artistic talents, and is the result of literally hours of effort.
  But, as this book is available only to the winner of charity fund-raisers, purchase of this tome represents moral supremacy. I recommend flaunting it to your family, coworkers, and all those of lesser character.
  Get your copy by winning the BSDCan 2019 charity auction… or any other other auction-type event I deem worthwhile.
  As far as my moral fiber goes: I have learned that art is hard, and that artists are not paid enough.
  And if I am ever imprisoned, I do hope that you’ll contribute to my bail fund. Otherwise, you’ll get more covers like this one.</p>
</blockquote>

<hr />

<h3 id="onereasoned1wasagoodeditorbackinthedaysofv7unixhttpsutccutorontocatcksspaceblogunixeddesignedforcookedinput"><a href="https://utcc.utoronto.ca/~cks/space/blog/unix/EdDesignedForCookedInput">One reason ed(1) was a good editor back in the days of V7 Unix</a></h3>

<blockquote>
  <p>It is common to describe ed(1) as being line oriented, as opposed to screen oriented editors like vi. This is completely accurate but it is perhaps not a complete enough description for today, because ed is line oriented in a way that is now uncommon. After all, you could say that your shell is line oriented too, and very few people use shells that work and feel the same way ed does.
  The surface difference between most people's shells and ed is that most people's shells have some version of cursor based interactive editing. The deeper difference is that this requires the shell to run in character by character TTY input mode, also called raw mode. By contrast, ed runs in what Unix usually calls cooked mode, where it reads whole lines from the kernel and the kernel handles things like backspace. All of ed's commands are designed so that they work in this line focused way (including being terminated by the end of the line), and as a whole ed's interface makes this whole line input approach natural. In fact I think ed makes it so natural that it's hard to think of things as being any other way. Ed was designed for line at a time input, not just to not be screen oriented.
  This input mode difference is not very important today, but in the days of V7 and serial terminals it made a real difference. In cooked mode, V7 ran very little code when you entered each character; almost everything was deferred until it could be processed in bulk by the kernel, and then handed to ed all in a single line which ed could also process all at once. A version of ed that tried to work in raw mode would have been much more resource intensive, even if it still operated on single lines at a time.</p>
</blockquote>

<hr />

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-fs/2019-April/027603.html">CFT for FreeBSD ZoL</a></li>

<li><a href="https://github.com/wilyarti/simple-dns-adblock">Simple DNS Adblock</a></li>

<li><a href="https://twitter.com/unix_byte/status/1119904828182781958">AT&amp;T Unix PC in 1985</a></li>

<li><a href="https://marc.info/?l=openbsd-cvs&amp;m=155523690813457&amp;w=2">OpenBSD-current drm at 4.19, includes new support for Intel GPUs like Coffee Lake</a></li>

<li><a href="https://twitter.com/cfenollosa/status/1122069042083323904">"What are the differences between Linux and OpenBSD?" - Twitter thread</a></li>

<li><a href="http://mail-index.netbsd.org/pkgsrc-users/2019/04/10/msg028308.html">Announcing the pkgsrc-2019Q1 release (2019-04-10)</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Brad - <a href="http://dpaste.com/0K2QFTM#wrap">iocage</a></li>

<li>Frank - <a href="http://dpaste.com/3110R96#wrap">Video from Level1Tech and a question</a></li>

<li>Niall - <a href="http://dpaste.com/0A32XDK#wrap">Revision Control</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0296.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenBSD 6.5 has been released, mount ZFS datasets anywhere, help test upcoming NetBSD 9 branch, LibreSSL 2.9.1 is available, Bail Bond Denied Edition of FreeBSD Mastery: Jails, and one reason ed(1) was a good editor back in the days in this week’s episode.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="openbsd65releasedhttpswwwopenbsdorg65html"><a href="https://www.openbsd.org/65.html">OpenBSD 6.5 Released</a></h3>

<ul>
<li><a href="https://www.openbsd.org/plus65.html">Changelog</a></li>

<li><a href="https://www.openbsd.org/ftp.html">Mirrors</a></li>

<li>6.5 Includes


<ul>
<li>OpenSMTPD 6.5.0</li>

<li>LibreSSL 2.9.1</li>

<li>OpenSSH 8.0</li>

<li>Mandoc 1.14.5</li>

<li>Xenocara</li>

<li>LLVM/Clang 7.0.1 (+ patches)</li>

<li>GCC 4.2.1 (+ patches) and 3.3.6 (+ patches)</li></ul>
</li>

<li>Many pre-built packages for each architecture:


<ul>
<li>aarch64: 9654</li>

<li>amd64: 10602</li>

<li>i386: 10535</li></ul>
</li>
</ul>

<p><hr /></p>

<h3 id="mountyourzfsdatasetsanywhereyouwanthttpsdanlangilleorg20190422mountyourzfsdatasetsanywhereyouwant"><a href="https://dan.langille.org/2019/04/22/mount-your-zfs-datasets-anywhere-you-want/">Mount your ZFS datasets anywhere you want</a></h3>

<blockquote>
  <p>ZFS is very flexible about mountpoints, and there are many features available to provide great flexibility.
  When you create zpool main<em>tank, the default mountpoint is /main</em>tank.
  You might be happy with that, but you don’t have to be content. You can do magical things.</p>
</blockquote>

<ul>
<li>Some highlights are:


<ul>
<li>mount point can be inherited</li>

<li>not all filesystems in a zpool need to be mounted</li>

<li>each filesystem (directory) can have different ZFS characteristics</li>

<li>In my case, let’s look at this new zpool I created earlier today and I will show you some very simple alternatives. This zpool use NVMe devices which should be faster than SSDs especially when used with multiple concurrent writes. This is my plan: run all the Bacula regression tests concurrently.</li></ul>
</li>
</ul>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="branchfornetbsd9upcomingpleasehelpandtestcurrenthttpsmailindexnetbsdorgcurrentusers20190424msg035645html"><a href="https://mail-index.netbsd.org/current-users/2019/04/24/msg035645.html">Branch for netbsd 9 upcoming, please help and test -current</a></h3>

<blockquote>
  <p>Folks,
  once again we are quite late for branching the next NetBSD release (NetBSD 9).
  Initially planned to happen early in February 2019, we are now approaching May and it is unlikely that the branch will happen before that.
  On the positive side, lots of good things landed in -current in between, like new Mesa, new jemalloc, lots of ZFS improvements - and some of those would be hard to pull up to the branch later.
  On the bad side we saw lots of churn in -current recently, and there is quite  some fallout where we not even have a good overview right now. And this is where  you can help:</p>
  
  <ul>
  <li>please test -current, on all the various machines you have</li>
  
  <li>especially interesting would be test results from uncommon architectures
  or strange combinations (like the sparc userland on sparc64 kernel issue
  I ran in yesterday)
  Please test, report success, and file PRs for failures!
  We will likely announce the real branch date on quite short notice, the likely next candidates would be mid may or end of may.
  We may need to do extra steps after the branch (like switch some architectures back to old jemalloc on the branch). However, the less difference between -current and the branch, the easier will the release cycle go.
  Our goal is to have an unprecedented short release cycle this time. But..
  we always say that upfront.</li>
  </ul>
  
  <hr />
</blockquote>

<h3 id="libressl291releasedhttpsmarcinfolopenbsdannouncem155590112606279w2"><a href="https://marc.info/?l=openbsd-announce&amp;m=155590112606279&amp;w=2">LibreSSL 2.9.1 Released</a></h3>

<blockquote>
  <p>We have released LibreSSL 2.9.1, which will be arriving in the LibreSSL
  directory of your local OpenBSD mirror soon. This is the first stable release
  from the 2.9 series, which is also included with OpenBSD 6.5</p>
  
  <p>It includes the following changes and improvements from LibreSSL 2.8.x:</p>
</blockquote>

<ul>
<li><p>API and Documentation Enhancements</p>

<ul>
<li>CRYPTO_LOCK is now automatically initialized, with the legacy
callbacks stubbed for compatibility.</li>

<li>Added the SM3 hash function from the Chinese standard GB/T 32905-2016.</li>

<li>Added the SM4 block cipher from the Chinese standard GB/T 32907-2016.</li>

<li>Added more OPENSSL<em>NO</em>* macros for compatibility with OpenSSL.</li>

<li>Partial port of the OpenSSL EC<em>KEY</em>METHOD API for use by OpenSSH.</li>

<li>Implemented further missing OpenSSL 1.1 API.</li>

<li>Added support for XChaCha20 and XChaCha20-Poly1305.</li>

<li>Added support for AES key wrap constructions via the EVP interface.</li></ul></li>

<li><p>Compatibility Changes</p>

<ul>
<li>Added pbkdf2 key derivation support to openssl(1) enc.</li>

<li>Changed the default digest type of openssl(1) enc to sha256.</li>

<li>Changed the default digest type of openssl(1) dgst to sha256.</li>

<li>Changed the default digest type of openssl(1) x509 -fingerprint to sha256.</li>

<li>Changed the default digest type of openssl(1) crl -fingerprint to sha256.</li></ul></li>

<li><p>Testing and Proactive Security</p>

<ul>
<li>Added extensive interoperability tests between LibreSSL and OpenSSL
1.0 and 1.1.</li>

<li>Added additional Wycheproof tests and related bug fixes.</li></ul></li>

<li><p>Internal Improvements</p>

<ul>
<li>Simplified sigalgs option processing and handshake signing
algorithm selection.</li>

<li>Added the ability to use the RSA PSS algorithm for handshake signatures.</li>

<li>Added bn<em>rand</em>interval() and use it in code needing ranges of
random bn values.</li>

<li>Added functionality to derive early, handshake, and application
secrets as per RFC8446.</li>

<li>Added handshake state machine from RFC8446.</li>

<li>Removed some ASN.1 related code from libcrypto that had not been
used since around 2000.</li>

<li>Unexported internal symbols and internalized more record layer structs.</li>

<li>Removed SHA224 based handshake signatures from consideration for
use in a TLS 1.2 handshake.</li></ul></li>

<li><p>Portable Improvements</p>

<ul>
<li>Added support for assembly optimizations on 32-bit ARM ELF targets.</li>

<li>Added support for assembly optimizations on Mingw-w64 targets.</li>

<li>Improved Android compatibility</li></ul></li>

<li><p>Bug Fixes</p>

<p><ul>
<li>Improved protection against timing side channels in ECDSA signature
generation.</li></p>

<p><li>Coordinate blinding was added to some elliptic curves. This is the
last bit of the work by Brumley et al. to protect against the Portsmash
vulnerability.</li></p>

<p><li>Ensure transcript handshake is always freed with TLS 1.2.</li></ul>

<p></p></li>
</ul></p>

<blockquote>
  <p>The LibreSSL project continues improvement of the codebase to reflect modern,
  safe programming practices. We welcome feedback and improvements from the
  broader community. Thanks to all of the contributors who helped make this
  release possible.</p>
  
  <hr />
</blockquote>

<h3 id="freebsdmasteryjailsbailbonddeniededitionhttpsmwlioarchives4227"><a href="https://mwl.io/archives/4227">FreeBSD Mastery: Jails – Bail Bond Denied Edition</a></h3>

<blockquote>
  <p>I had a brilliant, hideous idea: to produce a charity edition of FreeBSD Mastery: Jails featuring the cover art I would use if I was imprisoned and did not have access to a real cover artist. (Never mind that I wouldn’t be permitted to release books while in jail: we creative sorts scoff at mere legal and cultural details.)
  I originally wanted to produce my own take on the book’s cover art. My first attempt failed spectacularly.
  I downgraded my expectations and tried again. And again. And again.
  I’m pleased to reveal the final cover for FreeBSD Mastery: Jails–Bail Bond Edition!
  This cover represents the very pinnacle of my artistic talents, and is the result of literally hours of effort.
  But, as this book is available only to the winner of charity fund-raisers, purchase of this tome represents moral supremacy. I recommend flaunting it to your family, coworkers, and all those of lesser character.
  Get your copy by winning the BSDCan 2019 charity auction… or any other other auction-type event I deem worthwhile.
  As far as my moral fiber goes: I have learned that art is hard, and that artists are not paid enough.
  And if I am ever imprisoned, I do hope that you’ll contribute to my bail fund. Otherwise, you’ll get more covers like this one.</p>
</blockquote>

<hr />

<h3 id="onereasoned1wasagoodeditorbackinthedaysofv7unixhttpsutccutorontocatcksspaceblogunixeddesignedforcookedinput"><a href="https://utcc.utoronto.ca/~cks/space/blog/unix/EdDesignedForCookedInput">One reason ed(1) was a good editor back in the days of V7 Unix</a></h3>

<blockquote>
  <p>It is common to describe ed(1) as being line oriented, as opposed to screen oriented editors like vi. This is completely accurate but it is perhaps not a complete enough description for today, because ed is line oriented in a way that is now uncommon. After all, you could say that your shell is line oriented too, and very few people use shells that work and feel the same way ed does.
  The surface difference between most people's shells and ed is that most people's shells have some version of cursor based interactive editing. The deeper difference is that this requires the shell to run in character by character TTY input mode, also called raw mode. By contrast, ed runs in what Unix usually calls cooked mode, where it reads whole lines from the kernel and the kernel handles things like backspace. All of ed's commands are designed so that they work in this line focused way (including being terminated by the end of the line), and as a whole ed's interface makes this whole line input approach natural. In fact I think ed makes it so natural that it's hard to think of things as being any other way. Ed was designed for line at a time input, not just to not be screen oriented.
  This input mode difference is not very important today, but in the days of V7 and serial terminals it made a real difference. In cooked mode, V7 ran very little code when you entered each character; almost everything was deferred until it could be processed in bulk by the kernel, and then handed to ed all in a single line which ed could also process all at once. A version of ed that tried to work in raw mode would have been much more resource intensive, even if it still operated on single lines at a time.</p>
</blockquote>

<hr />

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-fs/2019-April/027603.html">CFT for FreeBSD ZoL</a></li>

<li><a href="https://github.com/wilyarti/simple-dns-adblock">Simple DNS Adblock</a></li>

<li><a href="https://twitter.com/unix_byte/status/1119904828182781958">AT&amp;T Unix PC in 1985</a></li>

<li><a href="https://marc.info/?l=openbsd-cvs&amp;m=155523690813457&amp;w=2">OpenBSD-current drm at 4.19, includes new support for Intel GPUs like Coffee Lake</a></li>

<li><a href="https://twitter.com/cfenollosa/status/1122069042083323904">"What are the differences between Linux and OpenBSD?" - Twitter thread</a></li>

<li><a href="http://mail-index.netbsd.org/pkgsrc-users/2019/04/10/msg028308.html">Announcing the pkgsrc-2019Q1 release (2019-04-10)</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Brad - <a href="http://dpaste.com/0K2QFTM#wrap">iocage</a></li>

<li>Frank - <a href="http://dpaste.com/3110R96#wrap">Video from Level1Tech and a question</a></li>

<li>Niall - <a href="http://dpaste.com/0A32XDK#wrap">Revision Control</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0296.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>103: Ubuntu Slaughters Kittens</title>
  <link>https://www.bsdnow.tv/103</link>
  <guid isPermaLink="false">227b2929-398f-4d82-b29d-80981ddcc4d7</guid>
  <pubDate>Wed, 19 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/227b2929-398f-4d82-b29d-80981ddcc4d7.mp3" length="86734228" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Allan's away at BSDCam this week, but we've still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!</itunes:subtitle>
  <itunes:duration>2:00:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Allan's away at BSDCam this week, but we've still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Interview - Bryan Cantrill - bryan@joyent.com (mailto:bryan@joyent.com) / @bcantrill (https://twitter.com/bcantrill)
BSD and Solaris history, illumos, dtrace, Joyent, pkgsrc, various topics (and rants)
Feedback/Questions
Randy writes in (http://slexy.org/view/s2b6dA7fAr)
Jared writes in (http://slexy.org/view/s2vABMHiok)
Steve writes in (http://slexy.org/view/s2194ADVUL)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, multipath, tcp, performance, dtrace, zfs, illumos, opensolaris, solaris, joyent, pkgsrc, omnios</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Allan&#39;s away at BSDCam this week, but we&#39;ve still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Bryan Cantrill - <a href="mailto:bryan@joyent.com" rel="nofollow">bryan@joyent.com</a> / <a href="https://twitter.com/bcantrill" rel="nofollow">@bcantrill</a></h2>

<p>BSD and Solaris history, illumos, dtrace, Joyent, pkgsrc, various topics (and rants)</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b6dA7fAr" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2vABMHiok" rel="nofollow">Jared writes in</a></li>
<li><a href="http://slexy.org/view/s2194ADVUL" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Allan&#39;s away at BSDCam this week, but we&#39;ve still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Bryan Cantrill - <a href="mailto:bryan@joyent.com" rel="nofollow">bryan@joyent.com</a> / <a href="https://twitter.com/bcantrill" rel="nofollow">@bcantrill</a></h2>

<p>BSD and Solaris history, illumos, dtrace, Joyent, pkgsrc, various topics (and rants)</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b6dA7fAr" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2vABMHiok" rel="nofollow">Jared writes in</a></li>
<li><a href="http://slexy.org/view/s2194ADVUL" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>100: Straight from the Src</title>
  <link>https://www.bsdnow.tv/100</link>
  <guid isPermaLink="false">06d71c41-6630-4fa3-8cd3-46e35a9a535c</guid>
  <pubDate>Wed, 29 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/06d71c41-6630-4fa3-8cd3-46e35a9a535c.mp3" length="53030452" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We've finally reached a hundred episodes, and this week we'll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</itunes:subtitle>
  <itunes:duration>1:13:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We've finally reached a hundred episodes, and this week we'll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Remote DoS in the TCP stack (https://blog.team-cymru.org/2015/07/another-day-another-patch/)
A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing remote attackers to exhaust the resources of a system with nothing more than TCP connections
While in the LAST_ACK state, which is one of the final stages of a connection's lifetime, the connection can get stuck and hang there indefinitely
This problem has a slightly confusing history that involves different fixes at different points in time from different people
Juniper originally discovered the bug and announced a fix (https://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=JSA10686) for their proprietary networking gear on June 8th
On June 29th, FreeBSD caught wind of it and fixed the bug in their -current branch (https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&amp;amp;r1=284941&amp;amp;r2=284940&amp;amp;pathrev=284941), but did not issue a security notice or MFC the fix back to the -stable branches
On July 13th, two weeks later, OpenBSD fixed the issue (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143682919807388&amp;amp;w=2) in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found
Immediately afterwards, they merged it back to -stable and issued an errata notice (http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig) for 5.7 and 5.6
On July 21st, three weeks after their original fix, FreeBSD committed yet another slightly different fix (https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&amp;amp;r1=285777&amp;amp;r2=285776&amp;amp;pathrev=285777) and issued a security notice (https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html) for the problem (which didn't include the first fix)
After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way
NetBSD confirmed they were vulnerable too, and applied another completely different fix (http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&amp;amp;r2=1.184&amp;amp;only_with_tag=MAIN) to -current on July 24th, but haven't released a security notice yet
DragonFly is also investigating the issue now to see if they're affected as well
***
c2k15 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150721180312&amp;amp;mode=flat)
Reports from OpenBSD's latest hackathon (http://www.openbsd.org/hackathons.html), held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)
The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event
He writes, "Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the "command" built-in command - and had to step through dozens of false positives with the less '/' and 'n' search keys before you finally found the actual definition?"
With mandoc's new internal jump targets, this is a problem of the past now
Jasper also sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150723124332&amp;amp;mode=flat), doing his usual work with Puppet (and specifically "Facter," a tool used by Puppet to gather various bits of system information)
Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an "-i" flag for sed (hooray!)
Antoine Jacoutot gave a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150722205349&amp;amp;mode=flat) on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)
It now has an "ls" subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this "the poor man's service monitoring tool")
He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)
His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades
Foundation director Ken Westerback was also there (http://undeadly.org/cgi?action=article&amp;amp;sid=20150722105658&amp;amp;mode=flat), getting some disk-related and laptop work done
He cleaned up and committed the 4k sector softraid code that he'd been working on, as well as fixing some trackpad issues
Stefan Sperling, OpenBSD's token "wireless guy," had a lot to say (http://undeadly.org/cgi?action=article&amp;amp;sid=20150722182236&amp;amp;mode=flat) about the hackathon and what he did there (and even sent in his write-up before he got home)
He taught tcpdump about some new things, including 802.11n metadata beacons (there's a lot more specific detail about this one in the report)
Bringing a bag full of USB wireless devices with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work
One quote from Stefan's report that a lot of people seem to be talking about: "Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We'll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year."
Jeremy Evans wrote in (http://undeadly.org/cgi?action=article&amp;amp;sid=20150725180527&amp;amp;mode=flat) to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem
While he's mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon
Rafael Zalamena, who got commit access at the event, gives his very first report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150725183439&amp;amp;mode=flat) on his networking-related hackathon activities
With Rafael's diffs and help from a couple other developers, OpenBSD now has support for VPLS (https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service)
Jonathan Gray got a lot done (http://undeadly.org/cgi?action=article&amp;amp;sid=20150728184743&amp;amp;mode=flat) in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code
As he's become somewhat known for, Jonathan was also busy running three things in the background: clang's fuzzer, cppcheck and AFL (looking for any potential crashes to fix)
Martin Pieuchot gave an write-up (http://undeadly.org/cgi?action=article&amp;amp;sid=20150724183210&amp;amp;mode=flat) on his experience: "I always though that hackathons were the best place to write code, but what's even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that's what I did."
He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack
Unfortunately, most of Martin's secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle
We're still eagerly awaiting a report from one of OpenBSD's newest developers (https://twitter.com/phessler/status/623291827878137856), Alexandr Nedvedicky (the Oracle guy who's working on SMP PF and some other PF fixes)
OpenBSD 5.8's "beta" status was recently reverted, with the message "take that as a hint (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143766883514831&amp;amp;w=2)," so that may mean more big changes are still to come...
***
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2015-04-2015-06.html)
FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far
It's broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others
Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just "svn.freebsd.org") are now using GeoGNS with official SSL certs and general redundancy was increased
In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages
The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon
Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)
The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support
Multipath TCP was also a hot topic, and there's a brief summary of the current status on that patch (it will be available publicly soon)
ZFSguru, a project we haven't talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August
PCIe hotplug support is also mentioned, though it's still in the development stages (basic hot-swap functions are working though)
The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling
Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report
Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot
Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***
The OpenSSH bug that wasn't (http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html)
There's been a lot of discussion (https://www.marc.info/?t=143766048000005&amp;amp;r=1&amp;amp;w=2) about a supposed flaw (https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/) in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)
There's no actual exploit to speak of; this bug would only help someone get more bruteforce tries in with a fewer number of connections (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html)
FreeBSD in its default configuration, with PAM (https://en.wikipedia.org/wiki/Pluggable_authentication_module) and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - not upstream OpenSSH (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143767296016252&amp;amp;w=2), nor any of the other BSDs, and not even the majority of Linux distros
If you disable all forms of authentication except public keys, like you're supposed to (https://stribika.github.io/2015/01/04/secure-secure-shell.html), then this is also not a big deal for FreeBSD systems
Realistically speaking, it's more of a PAM bug (https://www.marc.info/?l=openbsd-misc&amp;amp;m=143782167322500&amp;amp;w=2) than anything else
OpenSSH added an additional check (https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab) for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can run freebsd-update (https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html))
***
Interview - Sebastian Wiedenroth - wiedi@netbsd.org (mailto:wiedi@netbsd.org) / @wied0r (https://twitter.com/wied0r)
pkgsrc (https://en.wikipedia.org/wiki/Pkgsrc) and pkgsrcCon (http://pkgsrc.org/pkgsrcCon/)
News Roundup
Now served by OpenBSD (https://tribaal.io/this-now-served-by-openbsd.html)
We've mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it
The use case for the author was for a webserver, so he decided to try out the httpd in base
Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting
TLS 1.2 by default, strong ciphers with LibreSSL and HSTS (https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) combined give you a pretty secure web server
***
FreeBSD laptop playbooks (https://github.com/sean-/freebsd-laptops)
A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named "freebsd-laptops"
It's based on ansible, and uses the playbook format for automatic set up and configuration
Right now, it's only working on a single Lenovo laptop, but the plan is to add instructions for many more models
Check the Github page for instructions on how to get started, and maybe get involved if you're running FreeBSD on a laptop
***
NetBSD on the NVIDIA Jetson TK1 (https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson)
If you've never heard of the Jetson TK1 (https://developer.nvidia.com/jetson-tk1), we can go ahead and spoil the secret here: NetBSD runs on it
As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE
This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)
You can even run X11 on it, pretty sweet
***
DragonFly power mangement options (http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html)
DragonFly developer Sepherosa, who we've had on the show, has been doing some ACPI work over there
In this email, he presents some of DragonFly's different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well
He also did some testing with each of them and gave his findings about power saving
If you've been thinking about running DragonFly on a laptop, this would be a good one to read
***
OpenBSD router under FreeBSD bhyve (https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/)
If one BSD just isn't enough for you, and you've only got one machine, why not run two at once
This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it
If you've been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware
The author also includes a little bit of history on how he got into both operating systems
There are lots of mixed opinions about virtualizing core network components, so we'll leave it up to you to do your research
Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***
Feedback/Questions
Kevin writes in (http://slexy.org/view/s2yPVV5Wyp)
Logan writes in (http://slexy.org/view/s21zcz9rut)
Peter writes in (http://slexy.org/view/s21CRmiPwK)
Randy writes in (http://slexy.org/view/s211zfIXff)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, pkgsrccon, portability, illumos, solaris, openindiana, opensolaris, zfs, openzfs, tcp, dos, c2k15, hackathon, openssh, pam, exploit, smartos, omnios, joyent, delphix</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;ve finally reached a hundred episodes, and this week we&#39;ll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" rel="nofollow">Remote DoS in the TCP stack</a></h3>

<ul>
<li>A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing <em>remote</em> attackers to exhaust the resources of a system with nothing more than TCP connections</li>
<li>While in the LAST_ACK state, which is one of the final stages of a connection&#39;s lifetime, the connection can get stuck and hang there indefinitely</li>
<li>This problem has a slightly confusing history that involves different fixes at different points in time from different people</li>
<li>Juniper originally discovered the bug and <a href="https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686" rel="nofollow">announced a fix</a> for their proprietary networking gear on June 8th</li>
<li>On June 29th, FreeBSD caught wind of it and fixed the bug <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=284941&r2=284940&pathrev=284941" rel="nofollow">in their -current branch</a>, but did not issue a security notice or MFC the fix back to the -stable branches</li>
<li>On July 13th, two weeks later, OpenBSD <a href="https://www.marc.info/?l=openbsd-cvs&m=143682919807388&w=2" rel="nofollow">fixed the issue</a> in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found</li>
<li>Immediately afterwards, they merged it back to -stable and issued <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" rel="nofollow">an errata notice</a> for 5.7 and 5.6</li>
<li>On July 21st, three weeks after their original fix, FreeBSD committed <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=285777&r2=285776&pathrev=285777" rel="nofollow">yet another slightly different fix</a> and issued <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" rel="nofollow">a security notice</a> for the problem (which didn&#39;t include the first fix)</li>
<li>After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way</li>
<li>NetBSD confirmed they were vulnerable too, and <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&r2=1.184&only_with_tag=MAIN" rel="nofollow">applied another completely different fix</a> to -current on July 24th, but haven&#39;t released a security notice yet</li>
<li>DragonFly is also investigating the issue now to see if they&#39;re affected as well
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150721180312&mode=flat" rel="nofollow">c2k15 hackathon reports</a></h3>

<ul>
<li>Reports from OpenBSD&#39;s latest <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a>, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)</li>
<li>The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event</li>
<li>He writes, &quot;Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the &quot;command&quot; built-in command - and had to step through dozens of false positives with the less &#39;/&#39; and &#39;n&#39; search keys before you finally found the actual definition?&quot;</li>
<li>With mandoc&#39;s new internal jump targets, this is a problem of the past now</li>
<li>Jasper <a href="http://undeadly.org/cgi?action=article&sid=20150723124332&mode=flat" rel="nofollow">also sent in a report</a>, doing his usual work with Puppet (and specifically &quot;Facter,&quot; a tool used by Puppet to gather various bits of system information)</li>
<li>Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an &quot;-i&quot; flag for sed (hooray!)</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20150722205349&mode=flat" rel="nofollow">gave a report</a> on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)</li>
<li>It now has an &quot;ls&quot; subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this &quot;the poor man&#39;s service monitoring tool&quot;)</li>
<li>He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)</li>
<li>His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades</li>
<li>Foundation director Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150722105658&mode=flat" rel="nofollow">was also there</a>, getting some disk-related and laptop work done</li>
<li>He cleaned up and committed the 4k sector softraid code that he&#39;d been working on, as well as fixing some trackpad issues</li>
<li>Stefan Sperling, OpenBSD&#39;s token &quot;wireless guy,&quot; had <a href="http://undeadly.org/cgi?action=article&sid=20150722182236&mode=flat" rel="nofollow">a lot to say</a> about the hackathon and what he did there (and even sent in his write-up before he got home)</li>
<li>He taught tcpdump about some new things, including 802.11n metadata beacons (there&#39;s a lot more specific detail about this one in the report)</li>
<li>Bringing <em>a bag full of USB wireless devices</em> with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work</li>
<li>One quote from Stefan&#39;s report that a lot of people seem to be talking about: &quot;Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We&#39;ll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year.&quot;</li>
<li>Jeremy Evans <a href="http://undeadly.org/cgi?action=article&sid=20150725180527&mode=flat" rel="nofollow">wrote in</a> to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem</li>
<li>While he&#39;s mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon</li>
<li>Rafael Zalamena, who got commit access at the event, <a href="http://undeadly.org/cgi?action=article&sid=20150725183439&mode=flat" rel="nofollow">gives his very first report</a> on his networking-related hackathon activities</li>
<li>With Rafael&#39;s diffs and help from a couple other developers, OpenBSD now has support for <a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" rel="nofollow">VPLS</a></li>
<li>Jonathan Gray <a href="http://undeadly.org/cgi?action=article&sid=20150728184743&mode=flat" rel="nofollow">got a lot done</a> in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code</li>
<li>As he&#39;s become somewhat known for, Jonathan was also busy running three things in the background: clang&#39;s fuzzer, cppcheck and AFL (looking for any potential crashes to fix)</li>
<li>Martin Pieuchot <a href="http://undeadly.org/cgi?action=article&sid=20150724183210&mode=flat" rel="nofollow">gave an write-up</a> on his experience: &quot;I always though that hackathons were the best place to write code, but what&#39;s even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that&#39;s what I did.&quot;</li>
<li>He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack</li>
<li>Unfortunately, most of Martin&#39;s secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle</li>
<li>We&#39;re still eagerly awaiting a report from one of OpenBSD&#39;s <a href="https://twitter.com/phessler/status/623291827878137856" rel="nofollow">newest developers</a>, Alexandr Nedvedicky (the Oracle guy who&#39;s working on SMP PF and some other PF fixes)</li>
<li>OpenBSD 5.8&#39;s &quot;beta&quot; status was recently <strong>reverted</strong>, with the message &quot;<a href="https://www.marc.info/?l=openbsd-cvs&m=143766883514831&w=2" rel="nofollow">take that as a hint</a>,&quot; so that may mean more big changes are still to come...
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far</li>
<li>It&#39;s broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others</li>
<li>Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just &quot;svn.freebsd.org&quot;) are now using GeoGNS with official SSL certs and general redundancy was increased</li>
<li>In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages</li>
<li>The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon</li>
<li>Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)</li>
<li>The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support</li>
<li>Multipath TCP was also a hot topic, and there&#39;s a brief summary of the current status on that patch (it will be available publicly soon)</li>
<li>ZFSguru, a project we haven&#39;t talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August</li>
<li>PCIe hotplug support is also mentioned, though it&#39;s still in the development stages (basic hot-swap functions are working though)</li>
<li>The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling</li>
<li>Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report</li>
<li>Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot</li>
<li>Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" rel="nofollow">The OpenSSH bug that wasn&#39;t</a></h3>

<ul>
<li>There&#39;s been a lot of <a href="https://www.marc.info/?t=143766048000005&r=1&w=2" rel="nofollow">discussion</a> about <a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" rel="nofollow">a supposed flaw</a> in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)</li>
<li>There&#39;s no actual <em>exploit</em> to speak of; this bug would only help someone get more bruteforce tries in with a <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" rel="nofollow">fewer number of connections</a></li>
<li>FreeBSD in its default configuration, with <a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" rel="nofollow">PAM</a> and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - <a href="https://www.marc.info/?l=openbsd-misc&m=143767296016252&w=2" rel="nofollow">not upstream OpenSSH</a>, nor any of the other BSDs, and not even the majority of Linux distros</li>
<li>If you disable all forms of authentication except public keys, <a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">like you&#39;re supposed to</a>, then this is also not a big deal for FreeBSD systems</li>
<li>Realistically speaking, it&#39;s more of <a href="https://www.marc.info/?l=openbsd-misc&m=143782167322500&w=2" rel="nofollow">a PAM bug</a> than anything else</li>
<li>OpenSSH <a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" rel="nofollow">added an additional check</a> for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" rel="nofollow">run freebsd-update</a>)
***</li>
</ul>

<h2>Interview - Sebastian Wiedenroth - <a href="mailto:wiedi@netbsd.org" rel="nofollow">wiedi@netbsd.org</a> / <a href="https://twitter.com/wied0r" rel="nofollow">@wied0r</a></h2>

<p><a href="https://en.wikipedia.org/wiki/Pkgsrc" rel="nofollow">pkgsrc</a> and <a href="http://pkgsrc.org/pkgsrcCon/" rel="nofollow">pkgsrcCon</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://tribaal.io/this-now-served-by-openbsd.html" rel="nofollow">Now served by OpenBSD</a></h3>

<ul>
<li>We&#39;ve mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it</li>
<li>The use case for the author was for a webserver, so he decided to try out the httpd in base</li>
<li>Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting</li>
<li>TLS 1.2 by default, strong ciphers with LibreSSL and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="nofollow">HSTS</a> combined give you a pretty secure web server
***</li>
</ul>

<h3><a href="https://github.com/sean-/freebsd-laptops" rel="nofollow">FreeBSD laptop playbooks</a></h3>

<ul>
<li>A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named &quot;freebsd-laptops&quot;</li>
<li>It&#39;s based on ansible, and uses the playbook format for automatic set up and configuration</li>
<li>Right now, it&#39;s only working on a single Lenovo laptop, but the plan is to add instructions for many more models</li>
<li>Check the Github page for instructions on how to get started, and maybe get involved if you&#39;re running FreeBSD on a laptop
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" rel="nofollow">NetBSD on the NVIDIA Jetson TK1</a></h3>

<ul>
<li>If you&#39;ve never heard of the <a href="https://developer.nvidia.com/jetson-tk1" rel="nofollow">Jetson TK1</a>, we can go ahead and spoil the secret here: NetBSD runs on it</li>
<li>As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE</li>
<li>This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)</li>
<li>You can even run X11 on it, pretty sweet
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" rel="nofollow">DragonFly power mangement options</a></h3>

<ul>
<li>DragonFly developer Sepherosa, who we&#39;ve had on the show, has been doing some ACPI work over there</li>
<li>In this email, he presents some of DragonFly&#39;s different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well</li>
<li>He also did some testing with each of them and gave his findings about power saving</li>
<li>If you&#39;ve been thinking about running DragonFly on a laptop, this would be a good one to read
***</li>
</ul>

<h3><a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" rel="nofollow">OpenBSD router under FreeBSD bhyve</a></h3>

<ul>
<li>If one BSD just isn&#39;t enough for you, and you&#39;ve only got one machine, why not run two at once</li>
<li>This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it</li>
<li>If you&#39;ve been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware</li>
<li>The author also includes a little bit of history on how he got into both operating systems</li>
<li>There are lots of mixed opinions about virtualizing core network components, so we&#39;ll leave it up to you to do your research</li>
<li>Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2yPVV5Wyp" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s21zcz9rut" rel="nofollow">Logan writes in</a></li>
<li><a href="http://slexy.org/view/s21CRmiPwK" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s211zfIXff" rel="nofollow">Randy writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;ve finally reached a hundred episodes, and this week we&#39;ll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" rel="nofollow">Remote DoS in the TCP stack</a></h3>

<ul>
<li>A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing <em>remote</em> attackers to exhaust the resources of a system with nothing more than TCP connections</li>
<li>While in the LAST_ACK state, which is one of the final stages of a connection&#39;s lifetime, the connection can get stuck and hang there indefinitely</li>
<li>This problem has a slightly confusing history that involves different fixes at different points in time from different people</li>
<li>Juniper originally discovered the bug and <a href="https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686" rel="nofollow">announced a fix</a> for their proprietary networking gear on June 8th</li>
<li>On June 29th, FreeBSD caught wind of it and fixed the bug <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=284941&r2=284940&pathrev=284941" rel="nofollow">in their -current branch</a>, but did not issue a security notice or MFC the fix back to the -stable branches</li>
<li>On July 13th, two weeks later, OpenBSD <a href="https://www.marc.info/?l=openbsd-cvs&m=143682919807388&w=2" rel="nofollow">fixed the issue</a> in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found</li>
<li>Immediately afterwards, they merged it back to -stable and issued <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" rel="nofollow">an errata notice</a> for 5.7 and 5.6</li>
<li>On July 21st, three weeks after their original fix, FreeBSD committed <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=285777&r2=285776&pathrev=285777" rel="nofollow">yet another slightly different fix</a> and issued <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" rel="nofollow">a security notice</a> for the problem (which didn&#39;t include the first fix)</li>
<li>After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way</li>
<li>NetBSD confirmed they were vulnerable too, and <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&r2=1.184&only_with_tag=MAIN" rel="nofollow">applied another completely different fix</a> to -current on July 24th, but haven&#39;t released a security notice yet</li>
<li>DragonFly is also investigating the issue now to see if they&#39;re affected as well
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150721180312&mode=flat" rel="nofollow">c2k15 hackathon reports</a></h3>

<ul>
<li>Reports from OpenBSD&#39;s latest <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a>, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)</li>
<li>The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event</li>
<li>He writes, &quot;Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the &quot;command&quot; built-in command - and had to step through dozens of false positives with the less &#39;/&#39; and &#39;n&#39; search keys before you finally found the actual definition?&quot;</li>
<li>With mandoc&#39;s new internal jump targets, this is a problem of the past now</li>
<li>Jasper <a href="http://undeadly.org/cgi?action=article&sid=20150723124332&mode=flat" rel="nofollow">also sent in a report</a>, doing his usual work with Puppet (and specifically &quot;Facter,&quot; a tool used by Puppet to gather various bits of system information)</li>
<li>Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an &quot;-i&quot; flag for sed (hooray!)</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20150722205349&mode=flat" rel="nofollow">gave a report</a> on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)</li>
<li>It now has an &quot;ls&quot; subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this &quot;the poor man&#39;s service monitoring tool&quot;)</li>
<li>He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)</li>
<li>His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades</li>
<li>Foundation director Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150722105658&mode=flat" rel="nofollow">was also there</a>, getting some disk-related and laptop work done</li>
<li>He cleaned up and committed the 4k sector softraid code that he&#39;d been working on, as well as fixing some trackpad issues</li>
<li>Stefan Sperling, OpenBSD&#39;s token &quot;wireless guy,&quot; had <a href="http://undeadly.org/cgi?action=article&sid=20150722182236&mode=flat" rel="nofollow">a lot to say</a> about the hackathon and what he did there (and even sent in his write-up before he got home)</li>
<li>He taught tcpdump about some new things, including 802.11n metadata beacons (there&#39;s a lot more specific detail about this one in the report)</li>
<li>Bringing <em>a bag full of USB wireless devices</em> with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work</li>
<li>One quote from Stefan&#39;s report that a lot of people seem to be talking about: &quot;Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We&#39;ll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year.&quot;</li>
<li>Jeremy Evans <a href="http://undeadly.org/cgi?action=article&sid=20150725180527&mode=flat" rel="nofollow">wrote in</a> to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem</li>
<li>While he&#39;s mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon</li>
<li>Rafael Zalamena, who got commit access at the event, <a href="http://undeadly.org/cgi?action=article&sid=20150725183439&mode=flat" rel="nofollow">gives his very first report</a> on his networking-related hackathon activities</li>
<li>With Rafael&#39;s diffs and help from a couple other developers, OpenBSD now has support for <a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" rel="nofollow">VPLS</a></li>
<li>Jonathan Gray <a href="http://undeadly.org/cgi?action=article&sid=20150728184743&mode=flat" rel="nofollow">got a lot done</a> in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code</li>
<li>As he&#39;s become somewhat known for, Jonathan was also busy running three things in the background: clang&#39;s fuzzer, cppcheck and AFL (looking for any potential crashes to fix)</li>
<li>Martin Pieuchot <a href="http://undeadly.org/cgi?action=article&sid=20150724183210&mode=flat" rel="nofollow">gave an write-up</a> on his experience: &quot;I always though that hackathons were the best place to write code, but what&#39;s even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that&#39;s what I did.&quot;</li>
<li>He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack</li>
<li>Unfortunately, most of Martin&#39;s secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle</li>
<li>We&#39;re still eagerly awaiting a report from one of OpenBSD&#39;s <a href="https://twitter.com/phessler/status/623291827878137856" rel="nofollow">newest developers</a>, Alexandr Nedvedicky (the Oracle guy who&#39;s working on SMP PF and some other PF fixes)</li>
<li>OpenBSD 5.8&#39;s &quot;beta&quot; status was recently <strong>reverted</strong>, with the message &quot;<a href="https://www.marc.info/?l=openbsd-cvs&m=143766883514831&w=2" rel="nofollow">take that as a hint</a>,&quot; so that may mean more big changes are still to come...
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far</li>
<li>It&#39;s broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others</li>
<li>Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just &quot;svn.freebsd.org&quot;) are now using GeoGNS with official SSL certs and general redundancy was increased</li>
<li>In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages</li>
<li>The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon</li>
<li>Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)</li>
<li>The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support</li>
<li>Multipath TCP was also a hot topic, and there&#39;s a brief summary of the current status on that patch (it will be available publicly soon)</li>
<li>ZFSguru, a project we haven&#39;t talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August</li>
<li>PCIe hotplug support is also mentioned, though it&#39;s still in the development stages (basic hot-swap functions are working though)</li>
<li>The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling</li>
<li>Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report</li>
<li>Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot</li>
<li>Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" rel="nofollow">The OpenSSH bug that wasn&#39;t</a></h3>

<ul>
<li>There&#39;s been a lot of <a href="https://www.marc.info/?t=143766048000005&r=1&w=2" rel="nofollow">discussion</a> about <a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" rel="nofollow">a supposed flaw</a> in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)</li>
<li>There&#39;s no actual <em>exploit</em> to speak of; this bug would only help someone get more bruteforce tries in with a <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" rel="nofollow">fewer number of connections</a></li>
<li>FreeBSD in its default configuration, with <a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" rel="nofollow">PAM</a> and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - <a href="https://www.marc.info/?l=openbsd-misc&m=143767296016252&w=2" rel="nofollow">not upstream OpenSSH</a>, nor any of the other BSDs, and not even the majority of Linux distros</li>
<li>If you disable all forms of authentication except public keys, <a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">like you&#39;re supposed to</a>, then this is also not a big deal for FreeBSD systems</li>
<li>Realistically speaking, it&#39;s more of <a href="https://www.marc.info/?l=openbsd-misc&m=143782167322500&w=2" rel="nofollow">a PAM bug</a> than anything else</li>
<li>OpenSSH <a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" rel="nofollow">added an additional check</a> for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" rel="nofollow">run freebsd-update</a>)
***</li>
</ul>

<h2>Interview - Sebastian Wiedenroth - <a href="mailto:wiedi@netbsd.org" rel="nofollow">wiedi@netbsd.org</a> / <a href="https://twitter.com/wied0r" rel="nofollow">@wied0r</a></h2>

<p><a href="https://en.wikipedia.org/wiki/Pkgsrc" rel="nofollow">pkgsrc</a> and <a href="http://pkgsrc.org/pkgsrcCon/" rel="nofollow">pkgsrcCon</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://tribaal.io/this-now-served-by-openbsd.html" rel="nofollow">Now served by OpenBSD</a></h3>

<ul>
<li>We&#39;ve mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it</li>
<li>The use case for the author was for a webserver, so he decided to try out the httpd in base</li>
<li>Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting</li>
<li>TLS 1.2 by default, strong ciphers with LibreSSL and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="nofollow">HSTS</a> combined give you a pretty secure web server
***</li>
</ul>

<h3><a href="https://github.com/sean-/freebsd-laptops" rel="nofollow">FreeBSD laptop playbooks</a></h3>

<ul>
<li>A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named &quot;freebsd-laptops&quot;</li>
<li>It&#39;s based on ansible, and uses the playbook format for automatic set up and configuration</li>
<li>Right now, it&#39;s only working on a single Lenovo laptop, but the plan is to add instructions for many more models</li>
<li>Check the Github page for instructions on how to get started, and maybe get involved if you&#39;re running FreeBSD on a laptop
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" rel="nofollow">NetBSD on the NVIDIA Jetson TK1</a></h3>

<ul>
<li>If you&#39;ve never heard of the <a href="https://developer.nvidia.com/jetson-tk1" rel="nofollow">Jetson TK1</a>, we can go ahead and spoil the secret here: NetBSD runs on it</li>
<li>As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE</li>
<li>This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)</li>
<li>You can even run X11 on it, pretty sweet
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" rel="nofollow">DragonFly power mangement options</a></h3>

<ul>
<li>DragonFly developer Sepherosa, who we&#39;ve had on the show, has been doing some ACPI work over there</li>
<li>In this email, he presents some of DragonFly&#39;s different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well</li>
<li>He also did some testing with each of them and gave his findings about power saving</li>
<li>If you&#39;ve been thinking about running DragonFly on a laptop, this would be a good one to read
***</li>
</ul>

<h3><a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" rel="nofollow">OpenBSD router under FreeBSD bhyve</a></h3>

<ul>
<li>If one BSD just isn&#39;t enough for you, and you&#39;ve only got one machine, why not run two at once</li>
<li>This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it</li>
<li>If you&#39;ve been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware</li>
<li>The author also includes a little bit of history on how he got into both operating systems</li>
<li>There are lots of mixed opinions about virtualizing core network components, so we&#39;ll leave it up to you to do your research</li>
<li>Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2yPVV5Wyp" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s21zcz9rut" rel="nofollow">Logan writes in</a></li>
<li><a href="http://slexy.org/view/s21CRmiPwK" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s211zfIXff" rel="nofollow">Randy writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>90: ZFS Armistice</title>
  <link>https://www.bsdnow.tv/90</link>
  <guid isPermaLink="false">5faad566-284e-4d62-b377-5144cf232cdb</guid>
  <pubDate>Wed, 20 May 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5faad566-284e-4d62-b377-5144cf232cdb.mp3" length="52647700" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be chatting with Jed Reynolds about ZFS. He's been using it extensively on a certain other OS, and we can both learn a bit about the other side's implementation. Answers to your questions and all this week's news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:13:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be chatting with Jed Reynolds about ZFS. He's been using it extensively on a certain other OS, and we can both learn a bit about the other side's implementation. Answers to your questions and all this week's news, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Playing with sandboxing (http://blog.conviso.com.br/2015/05/playing-with-sandbox-analysis-of_13.html)
Sandboxing and privilege separation are popular topics these days - they're the goal of the new "shill" scripting language, they're used heavily throughout OpenBSD, and they're gaining traction with the capsicum framework
This blog post explores capsicum in FreeBSD, some of its history and where it's used in the base system
They also include some code samples so you can verify that capsicum is actually denying the program access to certain system calls
Check our interview about capsicum (http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox) from a while back if you haven't seen it already
***
OpenNTPD on by default (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143195693612629&amp;amp;w=4)
OpenBSD has enabled ntpd (http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change) by default in the installer, rather than prompting the user if they want to turn it on
In nearly every case, you're going to want to have your clock synced via NTP
With the HTTPS constraints feature also enabled by default, this should keep the time checked and accurate, even against spoofing attacks
Lots of problems can be traced back to the time on one system or another being wrong, so this will also eliminate some of those cases
For those who might be curious (http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/etc/ntpd.conf), they're using the "pool.ntp.org (http://www.pool.ntp.org/en/)" cluster of addresses and google for HTTPS constraints (but these can be easily changed (http://www.bsdnow.tv/tutorials/ntpd))
***
FreeBSD workshop in Landshut (https://www.banym.de/freebsd/review-first-freebsd-workshop-in-landshut-on-15-may-2015)
We mentioned a BSD installfest happening in Germany a few weeks back, and the organizer wrote in with a review of the event
The installfest instead became a "FreeBSD workshop" session, introducing curious new users to some of the flagship features of the OS
They covered when to use UFS or ZFS, firewall options, the release/stable/current branches and finally how to automate installations with Ansible
If you're in south Germany and want to give similar introduction talks or Q&amp;amp;A sessions about the other BSDs, get in touch
We'll hear more from him about how it went in the feedback section today
***
Swap encryption in DragonFly (http://lists.dragonflybsd.org/pipermail/users/2015-May/207690.html)
Doing full disk encryption (http://www.bsdnow.tv/tutorials/fde) is very important, but something that people sometimes overlook is encrypting their swap
This can actually be more important than the contents of your disks, especially if an unencrypted password or key hits your swap (as it can be recovered quite easily)
DragonFlyBSD has added a new experimental option to automatically encrypt your swap partition in fstab
There was another way (http://lists.dragonflybsd.org/pipermail/users/2015-May/207691.html) to do it previously, but this is a lot easier
You can achieve similar results in FreeBSD by adding ".eli" to the end of the swap device in fstab, there are a few steps (https://www.netbsd.org/docs/misc/#cgd-swap) to do it in NetBSD and swap in OpenBSD is encrypted by default
A one-time key will be created and then destroyed in each case, making recovery of the plaintext nearly impossible
***
Interview - Jed Reynolds - jed@bitratchet.com (mailto:jed@bitratchet.com) / @jed_reynolds (https://twitter.com/jed_reynolds)
Comparing ZFS on Linux and FreeBSD
News Roundup
USB thermometer on OpenBSD (http://www.cambus.net/rding-temper-gold-usb-thermometer-on-openbsd/)
So maybe you've got BSD on your server or router, maybe NetBSD on a toaster, but have you ever used a thermometer with one?
This blog post introduces the RDing TEMPer Gold USB thermometer, a small device that can tell the room temperature, and how to get it working on OpenBSD
Wouldn't you know it, OpenBSD has a native "ugold (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/ugold.4)" driver to support it with the sensors framework
How useful such a device would be is another story though
***
NAS4Free now on ARM (http://sourceforge.net/projects/nas4free/files/NAS4Free-ARM/10.1.0.2.1511/)
We talk a lot about hardware for network-attached storage devices on the show, but ARM doesn't come up a lot
That might be changing soon, as NAS4Free has just released some ARM builds
These new (somewhat experimental) images are based on FreeBSD 11-CURRENT
Included in the announcement is a list of fully-supported and partially-supported hardware that they've tested it with
If anyone has experience with running a NAS on slightly exotic hardware, write in to us
***
pkgsrcCon 2015 CFP and info (http://pkgsrc.pub/pkgsrcCon/2015/)
This year's pkgsrcCon will be in Berlin, Germany on July 4th and 5th (https://mail-index.netbsd.org/pkgsrc-users/2015/05/16/msg021560.html)
They're looking for talk proposals and ideas for things you'd like to see
If you or your company uses pkgsrc, or if you're just interested in NetBSD in general, it would be a good event to check out
***
BSDTalk episode 253 (http://bsdtalk.blogspot.com/2015/05/bsdtalk253-george-neville-neil.html)
BSDTalk has released another new episode
In it, he interviews George Neville-Neil about the 2nd edition of "The Design and Implementation of the FreeBSD Operating System"
They discuss what's new since the last edition, who the book's target audience is and a lot more
We're up to 90 episodes now, slowly catching up to Will...
***
Feedback/Questions
Dominik writes in (http://slexy.org/view/s2SWlyuOeb)
Brad writes in (http://slexy.org/view/s216z44lDU)
Corvin writes in (http://slexy.org/view/s2djtX0dSE)
James writes in (http://slexy.org/view/s21XM4hPRh)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, zpool, openzfs, zfsonlinux, nas4free, capsicum, systrace, arm, rfc7539, bsdrp, openntpd, landshut, pkgsrc, pkgsrccon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be chatting with Jed Reynolds about ZFS. He&#39;s been using it extensively on a certain other OS, and we can both learn a bit about the other side&#39;s implementation. Answers to your questions and all this week&#39;s news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.conviso.com.br/2015/05/playing-with-sandbox-analysis-of_13.html" rel="nofollow">Playing with sandboxing</a></h3>

<ul>
<li>Sandboxing and privilege separation are popular topics these days - they&#39;re the goal of the new &quot;shill&quot; scripting language, they&#39;re used heavily throughout OpenBSD, and they&#39;re gaining traction with the capsicum framework</li>
<li>This blog post explores capsicum in FreeBSD, some of its history and where it&#39;s used in the base system</li>
<li>They also include some code samples so you can verify that capsicum is actually denying the program access to certain system calls</li>
<li>Check our <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">interview about capsicum</a> from a while back if you haven&#39;t seen it already
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143195693612629&w=4" rel="nofollow">OpenNTPD on by default</a></h3>

<ul>
<li>OpenBSD has enabled <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">ntpd</a> by default in the installer, rather than prompting the user if they want to turn it on</li>
<li>In nearly every case, you&#39;re going to want to have your clock synced via NTP</li>
<li>With the HTTPS constraints feature also enabled by default, this should keep the time checked and accurate, even against spoofing attacks</li>
<li>Lots of problems can be traced back to the time on one system or another being wrong, so this will also eliminate some of those cases</li>
<li>For those who might be <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/etc/ntpd.conf" rel="nofollow">curious</a>, they&#39;re using the &quot;<a href="http://www.pool.ntp.org/en/" rel="nofollow">pool.ntp.org</a>&quot; cluster of addresses and google for HTTPS constraints (but these can be <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">easily changed</a>)
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/review-first-freebsd-workshop-in-landshut-on-15-may-2015" rel="nofollow">FreeBSD workshop in Landshut</a></h3>

<ul>
<li>We mentioned a BSD installfest happening in Germany a few weeks back, and the organizer wrote in with a review of the event</li>
<li>The installfest instead became a &quot;FreeBSD workshop&quot; session, introducing curious new users to some of the flagship features of the OS</li>
<li>They covered when to use UFS or ZFS, firewall options, the release/stable/current branches and finally how to automate installations with Ansible</li>
<li>If you&#39;re in south Germany and want to give similar introduction talks or Q&amp;A sessions about the other BSDs, get in touch</li>
<li>We&#39;ll hear more from him about how it went in the feedback section today
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207690.html" rel="nofollow">Swap encryption in DragonFly</a></h3>

<ul>
<li>Doing <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">full disk encryption</a> is very important, but something that people sometimes overlook is encrypting their swap</li>
<li>This can actually be <em>more</em> important than the contents of your disks, especially if an unencrypted password or key hits your swap (as it can be recovered quite easily)</li>
<li>DragonFlyBSD has added a new experimental option to automatically encrypt your swap partition in fstab</li>
<li>There was <a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207691.html" rel="nofollow">another way</a> to do it previously, but this is a lot easier</li>
<li>You can achieve similar results in FreeBSD by adding &quot;.eli&quot; to the end of the swap device in fstab, there are <a href="https://www.netbsd.org/docs/misc/#cgd-swap" rel="nofollow">a few steps</a> to do it in NetBSD and swap in OpenBSD is encrypted by default</li>
<li>A one-time key will be created and then destroyed in each case, making recovery of the plaintext nearly impossible
***</li>
</ul>

<h2>Interview - Jed Reynolds - <a href="mailto:jed@bitratchet.com" rel="nofollow">jed@bitratchet.com</a> / <a href="https://twitter.com/jed_reynolds" rel="nofollow">@jed_reynolds</a></h2>

<p>Comparing ZFS on Linux and FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.cambus.net/rding-temper-gold-usb-thermometer-on-openbsd/" rel="nofollow">USB thermometer on OpenBSD</a></h3>

<ul>
<li>So maybe you&#39;ve got BSD on your server or router, maybe NetBSD on a toaster, but have you ever used a thermometer with one?</li>
<li>This blog post introduces the RDing TEMPer Gold USB thermometer, a small device that can tell the room temperature, and how to get it working on OpenBSD</li>
<li>Wouldn&#39;t you know it, OpenBSD has a native &quot;<a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/ugold.4" rel="nofollow">ugold</a>&quot; driver to support it with the sensors framework</li>
<li>How useful such a device would be is another story though
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/nas4free/files/NAS4Free-ARM/10.1.0.2.1511/" rel="nofollow">NAS4Free now on ARM</a></h3>

<ul>
<li>We talk a lot about hardware for network-attached storage devices on the show, but ARM doesn&#39;t come up a lot</li>
<li>That might be changing soon, as NAS4Free has just released some ARM builds</li>
<li>These new (somewhat experimental) images are based on FreeBSD 11-CURRENT</li>
<li>Included in the announcement is a list of fully-supported and partially-supported hardware that they&#39;ve tested it with</li>
<li>If anyone has experience with running a NAS on slightly exotic hardware, write in to us
***</li>
</ul>

<h3><a href="http://pkgsrc.pub/pkgsrcCon/2015/" rel="nofollow">pkgsrcCon 2015 CFP and info</a></h3>

<ul>
<li>This year&#39;s pkgsrcCon will be in Berlin, Germany <a href="https://mail-index.netbsd.org/pkgsrc-users/2015/05/16/msg021560.html" rel="nofollow">on July 4th and 5th</a></li>
<li>They&#39;re looking for talk proposals and ideas for things you&#39;d like to see</li>
<li>If you or your company uses pkgsrc, or if you&#39;re just interested in NetBSD in general, it would be a good event to check out
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/05/bsdtalk253-george-neville-neil.html" rel="nofollow">BSDTalk episode 253</a></h3>

<ul>
<li>BSDTalk has released another new episode</li>
<li>In it, he interviews George Neville-Neil about the 2nd edition of &quot;The Design and Implementation of the FreeBSD Operating System&quot;</li>
<li>They discuss what&#39;s new since the last edition, who the book&#39;s target audience is and a lot more</li>
<li>We&#39;re up to 90 episodes now, slowly catching up to Will...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2SWlyuOeb" rel="nofollow">Dominik writes in</a></li>
<li><a href="http://slexy.org/view/s216z44lDU" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2djtX0dSE" rel="nofollow">Corvin writes in</a></li>
<li><a href="http://slexy.org/view/s21XM4hPRh" rel="nofollow">James writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be chatting with Jed Reynolds about ZFS. He&#39;s been using it extensively on a certain other OS, and we can both learn a bit about the other side&#39;s implementation. Answers to your questions and all this week&#39;s news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.conviso.com.br/2015/05/playing-with-sandbox-analysis-of_13.html" rel="nofollow">Playing with sandboxing</a></h3>

<ul>
<li>Sandboxing and privilege separation are popular topics these days - they&#39;re the goal of the new &quot;shill&quot; scripting language, they&#39;re used heavily throughout OpenBSD, and they&#39;re gaining traction with the capsicum framework</li>
<li>This blog post explores capsicum in FreeBSD, some of its history and where it&#39;s used in the base system</li>
<li>They also include some code samples so you can verify that capsicum is actually denying the program access to certain system calls</li>
<li>Check our <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">interview about capsicum</a> from a while back if you haven&#39;t seen it already
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143195693612629&w=4" rel="nofollow">OpenNTPD on by default</a></h3>

<ul>
<li>OpenBSD has enabled <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">ntpd</a> by default in the installer, rather than prompting the user if they want to turn it on</li>
<li>In nearly every case, you&#39;re going to want to have your clock synced via NTP</li>
<li>With the HTTPS constraints feature also enabled by default, this should keep the time checked and accurate, even against spoofing attacks</li>
<li>Lots of problems can be traced back to the time on one system or another being wrong, so this will also eliminate some of those cases</li>
<li>For those who might be <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/etc/ntpd.conf" rel="nofollow">curious</a>, they&#39;re using the &quot;<a href="http://www.pool.ntp.org/en/" rel="nofollow">pool.ntp.org</a>&quot; cluster of addresses and google for HTTPS constraints (but these can be <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">easily changed</a>)
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/review-first-freebsd-workshop-in-landshut-on-15-may-2015" rel="nofollow">FreeBSD workshop in Landshut</a></h3>

<ul>
<li>We mentioned a BSD installfest happening in Germany a few weeks back, and the organizer wrote in with a review of the event</li>
<li>The installfest instead became a &quot;FreeBSD workshop&quot; session, introducing curious new users to some of the flagship features of the OS</li>
<li>They covered when to use UFS or ZFS, firewall options, the release/stable/current branches and finally how to automate installations with Ansible</li>
<li>If you&#39;re in south Germany and want to give similar introduction talks or Q&amp;A sessions about the other BSDs, get in touch</li>
<li>We&#39;ll hear more from him about how it went in the feedback section today
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207690.html" rel="nofollow">Swap encryption in DragonFly</a></h3>

<ul>
<li>Doing <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">full disk encryption</a> is very important, but something that people sometimes overlook is encrypting their swap</li>
<li>This can actually be <em>more</em> important than the contents of your disks, especially if an unencrypted password or key hits your swap (as it can be recovered quite easily)</li>
<li>DragonFlyBSD has added a new experimental option to automatically encrypt your swap partition in fstab</li>
<li>There was <a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207691.html" rel="nofollow">another way</a> to do it previously, but this is a lot easier</li>
<li>You can achieve similar results in FreeBSD by adding &quot;.eli&quot; to the end of the swap device in fstab, there are <a href="https://www.netbsd.org/docs/misc/#cgd-swap" rel="nofollow">a few steps</a> to do it in NetBSD and swap in OpenBSD is encrypted by default</li>
<li>A one-time key will be created and then destroyed in each case, making recovery of the plaintext nearly impossible
***</li>
</ul>

<h2>Interview - Jed Reynolds - <a href="mailto:jed@bitratchet.com" rel="nofollow">jed@bitratchet.com</a> / <a href="https://twitter.com/jed_reynolds" rel="nofollow">@jed_reynolds</a></h2>

<p>Comparing ZFS on Linux and FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.cambus.net/rding-temper-gold-usb-thermometer-on-openbsd/" rel="nofollow">USB thermometer on OpenBSD</a></h3>

<ul>
<li>So maybe you&#39;ve got BSD on your server or router, maybe NetBSD on a toaster, but have you ever used a thermometer with one?</li>
<li>This blog post introduces the RDing TEMPer Gold USB thermometer, a small device that can tell the room temperature, and how to get it working on OpenBSD</li>
<li>Wouldn&#39;t you know it, OpenBSD has a native &quot;<a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/ugold.4" rel="nofollow">ugold</a>&quot; driver to support it with the sensors framework</li>
<li>How useful such a device would be is another story though
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/nas4free/files/NAS4Free-ARM/10.1.0.2.1511/" rel="nofollow">NAS4Free now on ARM</a></h3>

<ul>
<li>We talk a lot about hardware for network-attached storage devices on the show, but ARM doesn&#39;t come up a lot</li>
<li>That might be changing soon, as NAS4Free has just released some ARM builds</li>
<li>These new (somewhat experimental) images are based on FreeBSD 11-CURRENT</li>
<li>Included in the announcement is a list of fully-supported and partially-supported hardware that they&#39;ve tested it with</li>
<li>If anyone has experience with running a NAS on slightly exotic hardware, write in to us
***</li>
</ul>

<h3><a href="http://pkgsrc.pub/pkgsrcCon/2015/" rel="nofollow">pkgsrcCon 2015 CFP and info</a></h3>

<ul>
<li>This year&#39;s pkgsrcCon will be in Berlin, Germany <a href="https://mail-index.netbsd.org/pkgsrc-users/2015/05/16/msg021560.html" rel="nofollow">on July 4th and 5th</a></li>
<li>They&#39;re looking for talk proposals and ideas for things you&#39;d like to see</li>
<li>If you or your company uses pkgsrc, or if you&#39;re just interested in NetBSD in general, it would be a good event to check out
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/05/bsdtalk253-george-neville-neil.html" rel="nofollow">BSDTalk episode 253</a></h3>

<ul>
<li>BSDTalk has released another new episode</li>
<li>In it, he interviews George Neville-Neil about the 2nd edition of &quot;The Design and Implementation of the FreeBSD Operating System&quot;</li>
<li>They discuss what&#39;s new since the last edition, who the book&#39;s target audience is and a lot more</li>
<li>We&#39;re up to 90 episodes now, slowly catching up to Will...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2SWlyuOeb" rel="nofollow">Dominik writes in</a></li>
<li><a href="http://slexy.org/view/s216z44lDU" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2djtX0dSE" rel="nofollow">Corvin writes in</a></li>
<li><a href="http://slexy.org/view/s21XM4hPRh" rel="nofollow">James writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>74: That Sly MINIX</title>
  <link>https://www.bsdnow.tv/74</link>
  <guid isPermaLink="false">6e3c9361-afc5-4f27-b2de-a33a6ac82db5</guid>
  <pubDate>Wed, 28 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6e3c9361-afc5-4f27-b2de-a33a6ac82db5.mp3" length="54813172" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we've got something a little bit different for you. We'll be talking with Andrew Tanenbaum, the creator of MINIX. They've recently imported parts of NetBSD into their OS, and we'll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:16:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we've got something a little bit different for you. We'll be talking with Andrew Tanenbaum, the creator of MINIX. They've recently imported parts of NetBSD into their OS, and we'll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
The missing EuroBSDCon videos (http://2014.eurobsdcon.org/)
Some of the missing videos from EuroBSDCon 2014 we mentioned before (http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited) have mysteriously appeared
Jordan Hubbard (http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap), FreeBSD, looking forward to another 10 years (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/01.Keynote%20-%20FreeBSD:%20looking%20forward%20to%20another%2010%20years%20-%20Jordan%20Hubbard.mp4)
Lourival Viera Neto, NPF scripting with Lua (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/06.NFS%20scripting%20with%20Lua%20-%20Lourival%20Viera%20Neto.mp4)
Kris Moore, Snapshots, replication and boot environments (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/02.Snapshots,%20replication%20and%20boot%20environments%20-%20Kris%20Moore.mp4)
Andy Tanenbaum, A reimplementation of NetBSD based on a microkernel (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/07.A%20reimplementation%20of%20NetBSD%20based%20on%20a%20microkernel%20-%20Andy%20Tanenbaum.mp4)
Kirk McKusick (http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache), An introduction to FreeBSD's implementation of ZFS (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/03.An%20introduction%20to%20the%20implementation%20of%20ZFS%20-%20Kirk%20McKusick.mp4)
Emannuel Dreyfus, FUSE and beyond, bridging filesystems (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/05.FUSE%20and%20beyond:%20bridging%20filesystems%20-%20Emannuel%20Dreyfus.mp4)
John-Mark Gurney (http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind), Optimizing GELI performance (https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/04.Optimizing%20GELI%20performance%20-%20John-Mark%20Gurney.mp4)
Unfortunately, there are still about six talks missing… and no ETA
***
FreeBSD on a MacBook Pro (or two) (https://gist.github.com/mpasternacki/974e29d1e3865e940c53)
We've got a couple posts about running FreeBSD on a MacBook Pro this week
In the first one, the author talks a bit about trying to run Linux on his laptop for quite a while, going back and forth between it and something that Just Works™
Eventually he came full circle, and the focus on using only GUI tools got in the way, instead of making things easier
He works on a lot of FreeBSD-related software, so switching to it for a desktop seems to be the obvious next step
He's still not quite to that point yet, but documents his experiments with BSD as a desktop
The second article (http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-13-late.html) also documents an ex-Linux user switching over to BSD for their desktop
It also covers (http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-82-now.html) power management, bluetooth and trackpad setup
On the topic of Gentoo, "Underneath the beautiful and easy-to-use Portage system lies the same glibc, the same turmoil over a switch to a less-than-ideal init system, and the same kernel-level bugs that bring my productivity down"
Check out both articles if you've been considering running FreeBSD on a MacBook
***
Remote logging over TLS (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142136923124184&amp;amp;w=2)
In most of the BSDs, syslogd has been able to remotely send logs to another server for a long time
That feature can be very useful, especially for forensics purposes - it's much harder for an attacker to hide their activities if the logs aren't on the same server
The problem is, of course, that it's sent in cleartext (https://en.wikipedia.org/wiki/Syslog#Protocol), unless you tunnel it over SSH or use some kind of third party wrapper
With a few recent commits (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142160989610410&amp;amp;w=2), OpenBSD's syslogd now supports sending logs over TLS natively, including X509 certificate verification
By default, syslogd runs as an unprivileged user in a chroot on OpenBSD, so there were some initial concerns about certificate verification - how does that user access the CA chain outside of the chroot?
That problem was also conquered (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142188450524692&amp;amp;w=2), by loading the CA chain directly from memory (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142191799331938&amp;amp;w=2), so the entire process can be run in the chroot (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142191819131993&amp;amp;w=2) without issue
Some of the privsep verifcation code even made its way into (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142191878632141&amp;amp;w=2) LibreSSL right afterwards
If you haven't set up remote logging before, now might be an interesting time to try it out
***
FreeBSD, not a Linux distro (https://www.youtube.com/watch?v=wwbO4eTieQY)
George Neville-Neil gave a presentation recently, titled "FreeBSD: not a Linux distro"
It's meant to be an introduction to new users that might've heard about FreeBSD, but aren't familiar with any BSD history
He goes through some of that history, and talks about what FreeBSD is and why you might want to use it over other options
There's even an interesting "thirty years in three minutes" segment
It's not just a history lesson though, he talks about some of the current features and even some new things coming in the next version(s)
We also learn about filesystems, jails, capsicum, clang, dtrace and the various big companies using FreeBSD in their products
This might be a good video to show your friends or potential employer if you're looking to introduce FreeBSD to them 
***
Long-term support considered harmful (http://www.tedunangst.com/flak/post/long-term-support-considered-harmful)
There was recently a pretty horrible bug (https://www.marc.info/?l=bugtraq&amp;amp;m=142237866420639&amp;amp;w=2) in GNU's libc (BSDs aren't affected, don't worry)
Aside from the severity of the actual problem, the fix was delayed (https://code.google.com/p/chromium/issues/detail?id=364511) for quite a long time, leaving people vulnerable
Ted Unangst writes a post about how this idea of long-term support (https://plus.google.com/u/0/+ArtoPekkanen/posts/88jk5ggXYts?cfem=1) could actually be harmful in the long run, and compares it to how OpenBSD does things
OpenBSD releases a new version every six months, and only the two most recent releases get support and security fixes
He describes this as both a good thing and a bad thing: all the bugs in the ecosystem get flushed out within a year, but it forces people to stay (relatively) up-to-date
"Upgrades only get harder and more painful (and more fragile) the longer one goes between them. More changes, more damage. Frequent upgrades amortize the cost and ensure that regressions are caught early."
There was also some (https://lobste.rs/s/a4iijx/long_term_support_considered_harmful) discussion (https://news.ycombinator.com/item?id=8954737) about the article you can check out
***
Interview - Andrew Tanenbaum - info@minix3.org (mailto:info@minix3.org) / @minix3 (https://twitter.com/minix3)
MINIX's integration of NetBSD
News Roundup
Using AFL on OpenBSD (http://www.undeadly.org/cgi?action=article&amp;amp;sid=20150121093259)
We've talked about American Fuzzy Lop (http://lcamtuf.coredump.cx/afl/) a bit on a previous episode, and how some OpenBSD devs are using it (https://www.marc.info/?l=openbsd-cvs&amp;amp;w=2&amp;amp;r=1&amp;amp;s=afl&amp;amp;q=b) to catch and fix new bugs
Undeadly has a cool guide on how you can get started with fuzzing
It's a little on the advanced side, but if you're interested in programming or diagnosing crashes, it'll be a really interesting article to read
Lots of recent CVEs in other open source projects are attributed to fuzzing - it's a great way to stress test your software
***
Lumina 0.8.1 released (http://blog.pcbsd.org/2015/01/lumina-desktop-0-8-1-released/)
A new version of Lumina, the BSD-licensed desktop environment from PCBSD, has been released
This update includes some new plugins, lots of bugfixes and even "quality-of-life improvements"
There's a new audio player desktop plugin, a button to easily minimize all windows at once and some cool new customization options
You can get it in PCBSD's edge repo or install it through regular ports (on FreeBSD, OpenBSD or DragonFly!)
If you haven't seen our episode about Lumina, where we interview the developer and show you a tour of its features, gotta go watch it (http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment)
***
My first OpenBSD port (http://homing-on-code.blogspot.com/2015/01/my-first-openbsd-port.html)
The author of the "Code Rot &amp;amp; Why I Chose OpenBSD" article has a new post up, this time about ports
He recently made his first port and got it into the tree, so he talks about the whole process from start to finish
After learning some of the basics and becoming comfortable running -current, he noticed there wasn't a port for the "Otter" web browser
At that point he did what you're supposed to do in that situation, and started working on it himself
OpenBSD has a great porter's handbook (http://www.openbsd.org/faq/ports/) that he referenced throughout the process
Long story short, his browser of choice is in the official ports collection and now he's the maintainer (and gets to deal with any bug reports, of course)
If some software you use isn't available for whatever BSD you're using, you could be the one to make it happen
***
How to slide with DragonFly (http://www.dragonflybsd.org/docs/docs/howtos/howtoslide/)
DragonFly BSD has a new HAMMER FS utility called "Slider"
It's used to easily browse through file history and undelete files - imagine something like a commandline version of Apple's Time Machine
They have a pretty comprehensive guide on how to use it on their wiki page
If you're using HAMMER FS, this is a really handy tool to have, check it out
***
OpenSMTPD with Dovecot and Salt (https://blog.al-shami.net/2015/01/howto-small-mail-server-with-salt-dovecot-and-opensmtpd/)
We recently had a feedback question about which mail servers you can use on BSD - Postfix, Exim and OpenSMTPD being the big three
This blog post details how to set up OpenSMTPD, including Dovecot for IMAP and Salt for quick and easy deployment
Intrigued by it becoming the default MTA in OpenBSD, the author decided to give it a try after being a long-time Postfix fan
"Small, fast, stable, and very easy to customize, no more ugly m4 macros to deal with"
Check it out if you've been thinking about configuring your first mail server on any of the BSDs
***
Feedback/Questions
Christopher writes in (http://slexy.org/view/s20q2fSfEO) (handbook section (https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails-ezjail.html#jails-ezjail-update-os))
Mark writes in (http://slexy.org/view/s2zGvAczeN)
Kevin writes in (http://slexy.org/view/s21Dn2Tey8)
Stefano writes in (http://slexy.org/view/s215nxxrtF)
Matthew writes in (http://slexy.org/view/s20cwezc9l)
***
Mailing List Gold
Not that interested actually (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142194821910087&amp;amp;w=2)
This guy again (https://lists.freebsd.org/pipermail/freebsd-jail/2015-January/002742.html)
Yep, this is the place (https://lists.freebsd.org/pipermail/freebsd-doc/2015-January/024888.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, minix, minix3, userland, pkgsrc, afl, american fuzzy lop, fuzzing, hammerfs, hammer fs, slider, eurobsdcon, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ve got something a little bit different for you. We&#39;ll be talking with Andrew Tanenbaum, the creator of MINIX. They&#39;ve recently imported parts of NetBSD into their OS, and we&#39;ll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/" rel="nofollow">The missing EuroBSDCon videos</a></h3>

<ul>
<li>Some of the missing videos from EuroBSDCon 2014 <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">we mentioned before</a> have mysteriously appeared</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" rel="nofollow">Jordan Hubbard</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/01.Keynote%20-%20FreeBSD:%20looking%20forward%20to%20another%2010%20years%20-%20Jordan%20Hubbard.mp4" rel="nofollow">FreeBSD, looking forward to another 10 years</a></li>
<li>Lourival Viera Neto, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/06.NFS%20scripting%20with%20Lua%20-%20Lourival%20Viera%20Neto.mp4" rel="nofollow">NPF scripting with Lua</a></li>
<li>Kris Moore, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/02.Snapshots,%20replication%20and%20boot%20environments%20-%20Kris%20Moore.mp4" rel="nofollow">Snapshots, replication and boot environments</a></li>
<li>Andy Tanenbaum, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/07.A%20reimplementation%20of%20NetBSD%20based%20on%20a%20microkernel%20-%20Andy%20Tanenbaum.mp4" rel="nofollow">A reimplementation of NetBSD based on a microkernel</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/03.An%20introduction%20to%20the%20implementation%20of%20ZFS%20-%20Kirk%20McKusick.mp4" rel="nofollow">An introduction to FreeBSD&#39;s implementation of ZFS</a></li>
<li>Emannuel Dreyfus, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/05.FUSE%20and%20beyond:%20bridging%20filesystems%20-%20Emannuel%20Dreyfus.mp4" rel="nofollow">FUSE and beyond, bridging filesystems</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" rel="nofollow">John-Mark Gurney</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/04.Optimizing%20GELI%20performance%20-%20John-Mark%20Gurney.mp4" rel="nofollow">Optimizing GELI performance</a></li>
<li>Unfortunately, there are still about six talks missing… and no ETA
***</li>
</ul>

<h3><a href="https://gist.github.com/mpasternacki/974e29d1e3865e940c53" rel="nofollow">FreeBSD on a MacBook Pro (or two)</a></h3>

<ul>
<li>We&#39;ve got a couple posts about running FreeBSD on a MacBook Pro this week</li>
<li>In the first one, the author talks a bit about trying to run Linux on his laptop for quite a while, going back and forth between it and something that Just Works™</li>
<li>Eventually he came full circle, and the focus on using only GUI tools got in the way, instead of making things easier</li>
<li>He works on a lot of FreeBSD-related software, so switching to it for a desktop seems to be the obvious next step</li>
<li>He&#39;s still not quite to that point yet, but documents his experiments with BSD as a desktop</li>
<li>The <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-13-late.html" rel="nofollow">second article</a> also documents an ex-Linux user switching over to BSD for their desktop</li>
<li>It <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-82-now.html" rel="nofollow">also covers</a> power management, bluetooth and trackpad setup</li>
<li>On the topic of Gentoo, &quot;Underneath the beautiful and easy-to-use Portage system lies the same glibc, the same turmoil over a switch to a less-than-ideal init system, and the same kernel-level bugs that bring my productivity down&quot;</li>
<li>Check out both articles if you&#39;ve been considering running FreeBSD on a MacBook
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142136923124184&w=2" rel="nofollow">Remote logging over TLS</a></h3>

<ul>
<li>In most of the BSDs, syslogd has been able to remotely send logs to another server for a long time</li>
<li>That feature can be very useful, especially for forensics purposes - it&#39;s much harder for an attacker to hide their activities if the logs aren&#39;t on the same server</li>
<li>The problem is, of course, that it&#39;s <a href="https://en.wikipedia.org/wiki/Syslog#Protocol" rel="nofollow">sent in cleartext</a>, unless you tunnel it over SSH or use some kind of third party wrapper</li>
<li>With a few <a href="https://www.marc.info/?l=openbsd-cvs&m=142160989610410&w=2" rel="nofollow">recent commits</a>, OpenBSD&#39;s syslogd now supports sending logs over TLS natively, including X509 certificate verification</li>
<li>By default, syslogd runs as an unprivileged user in a chroot on OpenBSD, so there were some initial concerns about certificate verification - how does that user access the CA chain <em>outside</em> of the chroot?</li>
<li>That problem <a href="https://www.marc.info/?l=openbsd-tech&m=142188450524692&w=2" rel="nofollow">was also conquered</a>, by loading the CA chain <a href="https://www.marc.info/?l=openbsd-cvs&m=142191799331938&w=2" rel="nofollow">directly from memory</a>, so the entire process <a href="https://www.marc.info/?l=openbsd-cvs&m=142191819131993&w=2" rel="nofollow">can be run in the chroot</a> without issue</li>
<li>Some of the privsep verifcation code even <a href="https://www.marc.info/?l=openbsd-cvs&m=142191878632141&w=2" rel="nofollow">made its way into</a> LibreSSL right afterwards</li>
<li>If you haven&#39;t set up remote logging before, now might be an interesting time to try it out
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=wwbO4eTieQY" rel="nofollow">FreeBSD, not a Linux distro</a></h3>

<ul>
<li>George Neville-Neil gave a presentation recently, titled &quot;FreeBSD: not a Linux distro&quot;</li>
<li>It&#39;s meant to be an introduction to new users that might&#39;ve heard about FreeBSD, but aren&#39;t familiar with any BSD history</li>
<li>He goes through some of that history, and talks about what FreeBSD is and why you might want to use it over other options</li>
<li>There&#39;s even an interesting &quot;thirty years in three minutes&quot; segment</li>
<li>It&#39;s not just a history lesson though, he talks about some of the current features and even some new things coming in the next version(s)</li>
<li>We also learn about filesystems, jails, capsicum, clang, dtrace and the various big companies using FreeBSD in their products</li>
<li>This might be a good video to show your friends or potential employer if you&#39;re looking to introduce FreeBSD to them 
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/long-term-support-considered-harmful" rel="nofollow">Long-term support considered harmful</a></h3>

<ul>
<li>There was recently a <a href="https://www.marc.info/?l=bugtraq&m=142237866420639&w=2" rel="nofollow">pretty horrible bug</a> in GNU&#39;s libc (BSDs aren&#39;t affected, don&#39;t worry)</li>
<li>Aside from the severity of the actual problem, the fix was <a href="https://code.google.com/p/chromium/issues/detail?id=364511" rel="nofollow">delayed</a> for quite a long time, leaving people vulnerable</li>
<li>Ted Unangst writes a post about how this <a href="https://plus.google.com/u/0/+ArtoPekkanen/posts/88jk5ggXYts?cfem=1" rel="nofollow">idea of long-term support</a> could actually be harmful in the long run, and compares it to how OpenBSD does things</li>
<li>OpenBSD releases a new version every six months, and only the two most recent releases get support and security fixes</li>
<li>He describes this as both a good thing and a bad thing: all the bugs in the ecosystem get flushed out within a year, but it forces people to stay (relatively) up-to-date</li>
<li>&quot;Upgrades only get harder and more painful (and more fragile) the longer one goes between them. More changes, more damage. Frequent upgrades amortize the cost and ensure that regressions are caught early.&quot;</li>
<li>There was also <a href="https://lobste.rs/s/a4iijx/long_term_support_considered_harmful" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=8954737" rel="nofollow">discussion</a> about the article you can check out
***</li>
</ul>

<h2>Interview - Andrew Tanenbaum - <a href="mailto:info@minix3.org" rel="nofollow">info@minix3.org</a> / <a href="https://twitter.com/minix3" rel="nofollow">@minix3</a></h2>

<p>MINIX&#39;s integration of NetBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.undeadly.org/cgi?action=article&sid=20150121093259" rel="nofollow">Using AFL on OpenBSD</a></h3>

<ul>
<li>We&#39;ve talked about <a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a> a bit on a previous episode, and how some OpenBSD devs <a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">are using it</a> to catch and fix new bugs</li>
<li>Undeadly has a cool guide on how you can get started with fuzzing</li>
<li>It&#39;s a little on the advanced side, but if you&#39;re interested in programming or diagnosing crashes, it&#39;ll be a really interesting article to read</li>
<li>Lots of recent CVEs in other open source projects are attributed to fuzzing - it&#39;s a great way to stress test your software
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/lumina-desktop-0-8-1-released/" rel="nofollow">Lumina 0.8.1 released</a></h3>

<ul>
<li>A new version of Lumina, the BSD-licensed desktop environment from PCBSD, has been released</li>
<li>This update includes some new plugins, lots of bugfixes and even &quot;quality-of-life improvements&quot;</li>
<li>There&#39;s a new audio player desktop plugin, a button to easily minimize all windows at once and some cool new customization options</li>
<li>You can get it in PCBSD&#39;s edge repo or install it through regular ports (on FreeBSD, OpenBSD <em>or</em> DragonFly!)</li>
<li>If you haven&#39;t seen our episode about Lumina, where we interview the developer and show you a tour of its features, <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">gotta go watch it</a>
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/my-first-openbsd-port.html" rel="nofollow">My first OpenBSD port</a></h3>

<ul>
<li>The author of the &quot;Code Rot &amp; Why I Chose OpenBSD&quot; article has a new post up, this time about ports</li>
<li>He recently made his first port and got it into the tree, so he talks about the whole process from start to finish</li>
<li>After learning some of the basics and becoming comfortable running -current, he noticed there wasn&#39;t a port for the &quot;Otter&quot; web browser</li>
<li>At that point he did what you&#39;re <em>supposed to do</em> in that situation, and started working on it himself</li>
<li>OpenBSD has a great <a href="http://www.openbsd.org/faq/ports/" rel="nofollow">porter&#39;s handbook</a> that he referenced throughout the process</li>
<li>Long story short, his browser of choice is in the official ports collection and now he&#39;s the maintainer (and gets to deal with any bug reports, of course)</li>
<li>If some software you use isn&#39;t available for whatever BSD you&#39;re using, you could be the one to make it happen
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/docs/howtos/howtoslide/" rel="nofollow">How to slide with DragonFly</a></h3>

<ul>
<li>DragonFly BSD has a new HAMMER FS utility called &quot;Slider&quot;</li>
<li>It&#39;s used to easily browse through file history and undelete files - imagine something like a commandline version of Apple&#39;s Time Machine</li>
<li>They have a pretty comprehensive guide on how to use it on their wiki page</li>
<li>If you&#39;re using HAMMER FS, this is a really handy tool to have, check it out
***</li>
</ul>

<h3><a href="https://blog.al-shami.net/2015/01/howto-small-mail-server-with-salt-dovecot-and-opensmtpd/" rel="nofollow">OpenSMTPD with Dovecot and Salt</a></h3>

<ul>
<li>We recently had a feedback question about which mail servers you can use on BSD - Postfix, Exim and OpenSMTPD being the big three</li>
<li>This blog post details how to set up OpenSMTPD, including Dovecot for IMAP and Salt for quick and easy deployment</li>
<li>Intrigued by it becoming the default MTA in OpenBSD, the author decided to give it a try after being a long-time Postfix fan</li>
<li>&quot;Small, fast, stable, and very easy to customize, no more ugly m4 macros to deal with&quot;</li>
<li>Check it out if you&#39;ve been thinking about configuring your first mail server on any of the BSDs
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20q2fSfEO" rel="nofollow">Christopher writes in</a> (<a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails-ezjail.html#jails-ezjail-update-os" rel="nofollow">handbook section</a>)</li>
<li><a href="http://slexy.org/view/s2zGvAczeN" rel="nofollow">Mark writes in</a></li>
<li><a href="http://slexy.org/view/s21Dn2Tey8" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s215nxxrtF" rel="nofollow">Stefano writes in</a></li>
<li><a href="http://slexy.org/view/s20cwezc9l" rel="nofollow">Matthew writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142194821910087&w=2" rel="nofollow">Not that interested actually</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-jail/2015-January/002742.html" rel="nofollow">This guy again</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2015-January/024888.html" rel="nofollow">Yep, this is the place</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ve got something a little bit different for you. We&#39;ll be talking with Andrew Tanenbaum, the creator of MINIX. They&#39;ve recently imported parts of NetBSD into their OS, and we&#39;ll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/" rel="nofollow">The missing EuroBSDCon videos</a></h3>

<ul>
<li>Some of the missing videos from EuroBSDCon 2014 <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">we mentioned before</a> have mysteriously appeared</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" rel="nofollow">Jordan Hubbard</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/01.Keynote%20-%20FreeBSD:%20looking%20forward%20to%20another%2010%20years%20-%20Jordan%20Hubbard.mp4" rel="nofollow">FreeBSD, looking forward to another 10 years</a></li>
<li>Lourival Viera Neto, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/06.NFS%20scripting%20with%20Lua%20-%20Lourival%20Viera%20Neto.mp4" rel="nofollow">NPF scripting with Lua</a></li>
<li>Kris Moore, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/02.Snapshots,%20replication%20and%20boot%20environments%20-%20Kris%20Moore.mp4" rel="nofollow">Snapshots, replication and boot environments</a></li>
<li>Andy Tanenbaum, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/07.A%20reimplementation%20of%20NetBSD%20based%20on%20a%20microkernel%20-%20Andy%20Tanenbaum.mp4" rel="nofollow">A reimplementation of NetBSD based on a microkernel</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/03.An%20introduction%20to%20the%20implementation%20of%20ZFS%20-%20Kirk%20McKusick.mp4" rel="nofollow">An introduction to FreeBSD&#39;s implementation of ZFS</a></li>
<li>Emannuel Dreyfus, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/05.FUSE%20and%20beyond:%20bridging%20filesystems%20-%20Emannuel%20Dreyfus.mp4" rel="nofollow">FUSE and beyond, bridging filesystems</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" rel="nofollow">John-Mark Gurney</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/04.Optimizing%20GELI%20performance%20-%20John-Mark%20Gurney.mp4" rel="nofollow">Optimizing GELI performance</a></li>
<li>Unfortunately, there are still about six talks missing… and no ETA
***</li>
</ul>

<h3><a href="https://gist.github.com/mpasternacki/974e29d1e3865e940c53" rel="nofollow">FreeBSD on a MacBook Pro (or two)</a></h3>

<ul>
<li>We&#39;ve got a couple posts about running FreeBSD on a MacBook Pro this week</li>
<li>In the first one, the author talks a bit about trying to run Linux on his laptop for quite a while, going back and forth between it and something that Just Works™</li>
<li>Eventually he came full circle, and the focus on using only GUI tools got in the way, instead of making things easier</li>
<li>He works on a lot of FreeBSD-related software, so switching to it for a desktop seems to be the obvious next step</li>
<li>He&#39;s still not quite to that point yet, but documents his experiments with BSD as a desktop</li>
<li>The <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-13-late.html" rel="nofollow">second article</a> also documents an ex-Linux user switching over to BSD for their desktop</li>
<li>It <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-82-now.html" rel="nofollow">also covers</a> power management, bluetooth and trackpad setup</li>
<li>On the topic of Gentoo, &quot;Underneath the beautiful and easy-to-use Portage system lies the same glibc, the same turmoil over a switch to a less-than-ideal init system, and the same kernel-level bugs that bring my productivity down&quot;</li>
<li>Check out both articles if you&#39;ve been considering running FreeBSD on a MacBook
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142136923124184&w=2" rel="nofollow">Remote logging over TLS</a></h3>

<ul>
<li>In most of the BSDs, syslogd has been able to remotely send logs to another server for a long time</li>
<li>That feature can be very useful, especially for forensics purposes - it&#39;s much harder for an attacker to hide their activities if the logs aren&#39;t on the same server</li>
<li>The problem is, of course, that it&#39;s <a href="https://en.wikipedia.org/wiki/Syslog#Protocol" rel="nofollow">sent in cleartext</a>, unless you tunnel it over SSH or use some kind of third party wrapper</li>
<li>With a few <a href="https://www.marc.info/?l=openbsd-cvs&m=142160989610410&w=2" rel="nofollow">recent commits</a>, OpenBSD&#39;s syslogd now supports sending logs over TLS natively, including X509 certificate verification</li>
<li>By default, syslogd runs as an unprivileged user in a chroot on OpenBSD, so there were some initial concerns about certificate verification - how does that user access the CA chain <em>outside</em> of the chroot?</li>
<li>That problem <a href="https://www.marc.info/?l=openbsd-tech&m=142188450524692&w=2" rel="nofollow">was also conquered</a>, by loading the CA chain <a href="https://www.marc.info/?l=openbsd-cvs&m=142191799331938&w=2" rel="nofollow">directly from memory</a>, so the entire process <a href="https://www.marc.info/?l=openbsd-cvs&m=142191819131993&w=2" rel="nofollow">can be run in the chroot</a> without issue</li>
<li>Some of the privsep verifcation code even <a href="https://www.marc.info/?l=openbsd-cvs&m=142191878632141&w=2" rel="nofollow">made its way into</a> LibreSSL right afterwards</li>
<li>If you haven&#39;t set up remote logging before, now might be an interesting time to try it out
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=wwbO4eTieQY" rel="nofollow">FreeBSD, not a Linux distro</a></h3>

<ul>
<li>George Neville-Neil gave a presentation recently, titled &quot;FreeBSD: not a Linux distro&quot;</li>
<li>It&#39;s meant to be an introduction to new users that might&#39;ve heard about FreeBSD, but aren&#39;t familiar with any BSD history</li>
<li>He goes through some of that history, and talks about what FreeBSD is and why you might want to use it over other options</li>
<li>There&#39;s even an interesting &quot;thirty years in three minutes&quot; segment</li>
<li>It&#39;s not just a history lesson though, he talks about some of the current features and even some new things coming in the next version(s)</li>
<li>We also learn about filesystems, jails, capsicum, clang, dtrace and the various big companies using FreeBSD in their products</li>
<li>This might be a good video to show your friends or potential employer if you&#39;re looking to introduce FreeBSD to them 
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/long-term-support-considered-harmful" rel="nofollow">Long-term support considered harmful</a></h3>

<ul>
<li>There was recently a <a href="https://www.marc.info/?l=bugtraq&m=142237866420639&w=2" rel="nofollow">pretty horrible bug</a> in GNU&#39;s libc (BSDs aren&#39;t affected, don&#39;t worry)</li>
<li>Aside from the severity of the actual problem, the fix was <a href="https://code.google.com/p/chromium/issues/detail?id=364511" rel="nofollow">delayed</a> for quite a long time, leaving people vulnerable</li>
<li>Ted Unangst writes a post about how this <a href="https://plus.google.com/u/0/+ArtoPekkanen/posts/88jk5ggXYts?cfem=1" rel="nofollow">idea of long-term support</a> could actually be harmful in the long run, and compares it to how OpenBSD does things</li>
<li>OpenBSD releases a new version every six months, and only the two most recent releases get support and security fixes</li>
<li>He describes this as both a good thing and a bad thing: all the bugs in the ecosystem get flushed out within a year, but it forces people to stay (relatively) up-to-date</li>
<li>&quot;Upgrades only get harder and more painful (and more fragile) the longer one goes between them. More changes, more damage. Frequent upgrades amortize the cost and ensure that regressions are caught early.&quot;</li>
<li>There was also <a href="https://lobste.rs/s/a4iijx/long_term_support_considered_harmful" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=8954737" rel="nofollow">discussion</a> about the article you can check out
***</li>
</ul>

<h2>Interview - Andrew Tanenbaum - <a href="mailto:info@minix3.org" rel="nofollow">info@minix3.org</a> / <a href="https://twitter.com/minix3" rel="nofollow">@minix3</a></h2>

<p>MINIX&#39;s integration of NetBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.undeadly.org/cgi?action=article&sid=20150121093259" rel="nofollow">Using AFL on OpenBSD</a></h3>

<ul>
<li>We&#39;ve talked about <a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a> a bit on a previous episode, and how some OpenBSD devs <a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">are using it</a> to catch and fix new bugs</li>
<li>Undeadly has a cool guide on how you can get started with fuzzing</li>
<li>It&#39;s a little on the advanced side, but if you&#39;re interested in programming or diagnosing crashes, it&#39;ll be a really interesting article to read</li>
<li>Lots of recent CVEs in other open source projects are attributed to fuzzing - it&#39;s a great way to stress test your software
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/lumina-desktop-0-8-1-released/" rel="nofollow">Lumina 0.8.1 released</a></h3>

<ul>
<li>A new version of Lumina, the BSD-licensed desktop environment from PCBSD, has been released</li>
<li>This update includes some new plugins, lots of bugfixes and even &quot;quality-of-life improvements&quot;</li>
<li>There&#39;s a new audio player desktop plugin, a button to easily minimize all windows at once and some cool new customization options</li>
<li>You can get it in PCBSD&#39;s edge repo or install it through regular ports (on FreeBSD, OpenBSD <em>or</em> DragonFly!)</li>
<li>If you haven&#39;t seen our episode about Lumina, where we interview the developer and show you a tour of its features, <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">gotta go watch it</a>
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/my-first-openbsd-port.html" rel="nofollow">My first OpenBSD port</a></h3>

<ul>
<li>The author of the &quot;Code Rot &amp; Why I Chose OpenBSD&quot; article has a new post up, this time about ports</li>
<li>He recently made his first port and got it into the tree, so he talks about the whole process from start to finish</li>
<li>After learning some of the basics and becoming comfortable running -current, he noticed there wasn&#39;t a port for the &quot;Otter&quot; web browser</li>
<li>At that point he did what you&#39;re <em>supposed to do</em> in that situation, and started working on it himself</li>
<li>OpenBSD has a great <a href="http://www.openbsd.org/faq/ports/" rel="nofollow">porter&#39;s handbook</a> that he referenced throughout the process</li>
<li>Long story short, his browser of choice is in the official ports collection and now he&#39;s the maintainer (and gets to deal with any bug reports, of course)</li>
<li>If some software you use isn&#39;t available for whatever BSD you&#39;re using, you could be the one to make it happen
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/docs/howtos/howtoslide/" rel="nofollow">How to slide with DragonFly</a></h3>

<ul>
<li>DragonFly BSD has a new HAMMER FS utility called &quot;Slider&quot;</li>
<li>It&#39;s used to easily browse through file history and undelete files - imagine something like a commandline version of Apple&#39;s Time Machine</li>
<li>They have a pretty comprehensive guide on how to use it on their wiki page</li>
<li>If you&#39;re using HAMMER FS, this is a really handy tool to have, check it out
***</li>
</ul>

<h3><a href="https://blog.al-shami.net/2015/01/howto-small-mail-server-with-salt-dovecot-and-opensmtpd/" rel="nofollow">OpenSMTPD with Dovecot and Salt</a></h3>

<ul>
<li>We recently had a feedback question about which mail servers you can use on BSD - Postfix, Exim and OpenSMTPD being the big three</li>
<li>This blog post details how to set up OpenSMTPD, including Dovecot for IMAP and Salt for quick and easy deployment</li>
<li>Intrigued by it becoming the default MTA in OpenBSD, the author decided to give it a try after being a long-time Postfix fan</li>
<li>&quot;Small, fast, stable, and very easy to customize, no more ugly m4 macros to deal with&quot;</li>
<li>Check it out if you&#39;ve been thinking about configuring your first mail server on any of the BSDs
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20q2fSfEO" rel="nofollow">Christopher writes in</a> (<a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails-ezjail.html#jails-ezjail-update-os" rel="nofollow">handbook section</a>)</li>
<li><a href="http://slexy.org/view/s2zGvAczeN" rel="nofollow">Mark writes in</a></li>
<li><a href="http://slexy.org/view/s21Dn2Tey8" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s215nxxrtF" rel="nofollow">Stefano writes in</a></li>
<li><a href="http://slexy.org/view/s20cwezc9l" rel="nofollow">Matthew writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142194821910087&w=2" rel="nofollow">Not that interested actually</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-jail/2015-January/002742.html" rel="nofollow">This guy again</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2015-January/024888.html" rel="nofollow">Yep, this is the place</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>46: Network Iodometry</title>
  <link>https://www.bsdnow.tv/46</link>
  <guid isPermaLink="false">e23303c8-31f0-4706-817c-1618e08cd149</guid>
  <pubDate>Wed, 16 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e23303c8-31f0-4706-817c-1618e08cd149.mp3" length="76226260" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
EuroBSDCon 2014 registration open (http://2014.eurobsdcon.org/registration/)
September is getting closer, and that means it's time for EuroBSDCon - held in Bulgaria this year
Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th
Tutorials, sessions, dev summits and everything else all have their own pricing as well
Registering between August 18th - September 12th will cost more for everything
You can register online here (http://registration.eurobsdcon.org/) and check hotels in the area (http://2014.eurobsdcon.org/registration/travel-and-stay/hotels)
The FreeBSD foundation is also accepting applications (https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html) for travel grants
***
OpenBSD SMP PF update (http://marc.info/?t=140440541000002&amp;amp;r=1&amp;amp;w=2)
A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded
With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump
In a recent mailing list thread, Henning Brauer (http://www.bsdnow.tv/episodes/2013_10_30-current_events) addresses some of the concerns
The short version (http://marc.info/?l=openbsd-misc&amp;amp;m=140479174521071&amp;amp;w=2) is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless
He also says (http://marc.info/?l=openbsd-misc&amp;amp;m=140481012425889&amp;amp;w=2) PF on OpenBSD is over four times faster than FreeBSD's old version, presumably due to those extra years of development it's gone through
There's also been even more recent concern (https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html) about the uncertain future of FreeBSD's PF, being mostly unmaintained since their SMP patches
We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***
Introduction to NetBSD pkgsrc (http://saveosx.org/pkgsrc-intro/)
An article from one of our listeners about how to create a new pkgsrc port or fix one that you need
The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format
It also lists all the different bmake targets and their functions in relation to the porting process
Finally, the post details the whole process of creating a new port
***
FreeBSD 9.3-RELEASE (https://www.freebsd.org/releases/9.3R/relnotes.html)
After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced today (https://www.freebsd.org/releases/9.3R/schedule.html) but actually came out yesterday
The full list of changes (https://www.freebsd.org/releases/9.3R/relnotes.html) is available, but it's mostly a smaller maintenance release
Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more
If you haven't jumped to the 10.x branch yet (and there are a lot of people who haven't!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon
Good news, this will be the first release (https://twitter.com/evilgjb/status/485909719522222080) with PGP-signed checksums on the FTP mirrors - a very welcome change
With that out of the way, the 10.1-RELEASE schedule was posted (https://www.freebsd.org/releases/10.1R/schedule.html)
***
Interview - Bryan Drewery - bdrewery@freebsd.org (mailto:bdrewery@freebsd.org) / @bdrewery (https://twitter.com/bdrewery)
The FreeBSD package building cluster, pkgng, ports, various topics
Tutorial
Tunneling traffic through DNS (http://www.bsdnow.tv/tutorials/ssh-dns)
News Roundup
SSH two-factor authentication on FreeBSD (http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/)
We've previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website
This blog post tells you how to do exactly that, but with your Google account and the pamgoogleauthenticator port
Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally
It's a really, really simple process once you have the port installed - full details on the page
***
Ditch tape backup in favor of FreeNAS (http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/)
The author of this post shares some of his horrible experiences with tape backups for a client
Having constant, daily errors and failed backups, he needed to find another solution
With 1TB of backups, tapes just weren't a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)
The rest of the article details his experiences with it and tells about his setup
***
NetBSD vs FreeBSD, desktop experiences (http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/)
A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job
Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver
"Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga."
He's become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***
PCBSD not-so-weekly digest (http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/)
Speaking of choices for a desktop system, it's the return of the PCBSD digest!
Warden and PBI_add have gotten some interesting new features
You can now create jails "on the fly" when adding a new PBI to your application library
Bulk jail creation is also possible now, and it's really easy
New Jenkins integration, with public access to poudriere logs as well (http://builds.pcbsd.org)
PkgNG 1.3.0.rc2 testing for EDGE users
***
Feedback/Questions
Jeff writes in (http://slexy.org/view/s21D05MP0t) - Sending Encrypted Backups over SSH (http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh) + Sending ZFS snapshots via user (http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System)
Bruce writes in (http://slexy.org/view/s2lzo1swzo)
Richard writes in (http://slexy.org/view/s20z841ean)
Jeff writes in (http://slexy.org/view/s2QYc8BOAo) - NYCBUG dmesg list (http://www.nycbug.org/index.cgi?action=dmesgd)
Steve writes in (http://slexy.org/view/s2V2e1m7S7)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pc-bsd, tutorial, howto, guide, bsd, interview, iodine, dns, tunnel, ssh, encryption, vpn, ids, bypass, detection, portmgr, pkgng, bypassing, firewall, pkgsrccon, pkgsrc, pf, smp, eurobsdcon, 2014, multithreaded, presentations, talks, two factor authentication, freenas, 9.3</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>44: Base ISO 100</title>
  <link>https://www.bsdnow.tv/44</link>
  <guid isPermaLink="false">cbf5ab1d-2355-4c2c-ade8-0e66250b204e</guid>
  <pubDate>Wed, 02 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf5ab1d-2355-4c2c-ade8-0e66250b204e.mp3" length="75659476" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
pfSense 2.1.4 released (https://blog.pfsense.org/?p=1377)
The pfSense team (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) has released 2.1.4, shortly after 2.1.3 - it's mainly a security release
Included within are eight security fixes, most of which are pfSense-specific
OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)
It also includes a large number of various other bug fixes
Update all your routers!
***
DragonflyBSD's pf gets SMP (http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html)
While we're on the topic of pf...
Dragonfly patches their old[er than even FreeBSD's] pf to support multithreading in many areas
Stemming from a user's complaint (http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html), Matthew Dillon did his own work on pf to make it SMP-aware
Altering your configuration (http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html)'s ruleset can also help speed things up, he found
When will OpenBSD, the source of pf, finally do the same?
***
ChaCha usage and deployment (http://ianix.com/pub/chacha-deployment.html)
A while back, we talked to djm (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5
This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20
OpenSSH offers it as a stream cipher now, OpenBSD uses it for it's random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it
Both Google's fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not
Unfortunately, this article has one mistake: FreeBSD does not use it (https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html) - they still use the broken RC4 algorithm
***
BSDMag June 2014 issue (http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue)
The monthly online BSD magazine releases their newest issue
This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, "saving time and headaches using the robot framework for testing," an interview and an article about the increasing number of security vulnerabilities
The free pdf file is available for download as always
***
Interview - Craig Rodrigues - rodrigc@freebsd.org (mailto:rodrigc@freebsd.org)
FreeBSD's continuous (https://wiki.freebsd.org/Jenkins) testing (https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p) infrastructure (https://jenkins.freebsd.org/jenkins/)
Tutorial
Creating pre-patched OpenBSD ISOs (http://www.bsdnow.tv/tutorials/stable-iso)
News Roundup
Preauthenticated decryption considered harmful (http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful)
Responding to a post (https://www.imperialviolet.org/2014/06/27/streamingencryption.html) from Adam Langley, Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) talks a little more about how signify and pkg_add handle signatures
In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns
With signify, now everything is fully downloaded and verified before tar is even invoked
The pkg_add utility works a little bit differently, but it's also been improved in this area - details in the post
Be sure to also read the original post from Adam, lots of good information
***
FreeBSD 9.3-RC2 is out (https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html)
As the -RELEASE inches closer, release candidate 2 is out and ready for testing
Since the last one, it's got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things
The updated bsdconfig will use pkgng style packages now too
A lesser known fact: there are also premade virtual machine images you can use too
***
pkgsrcCon 2014 wrap-up (http://saveosx.org/pkgsrcCon/)
In what may be the first real pkgsrcCon article we've ever had!
Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event
Unfortunately no recordings to be found...
***
PostgreSQL FreeBSD performance and scalability (https://kib.kiev.ua/kib/pgsql_perf.pdf)
FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales
On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings
Lots of technical details if you're interested in getting the best performance out of your hardware
It also includes specific kernel options he used and the rest of the configuration
If you don't want to open the pdf file, you can use this link (https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf) too
***
Feedback/Questions
James writes in (http://slexy.org/view/s24pFjUPe4)
Klemen writes in (http://slexy.org/view/s21OogIgTu)
John writes in (http://slexy.org/view/s21rLcemNN)
Brad writes in (http://slexy.org/view/s203Qsx6CZ)
Adam writes in (http://slexy.org/view/s2eBj0FfSL)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, iso, patch, stable, cd, dvd, cdr, pre-applied, applied, horrible puns, jenkins, testing, kyua, ixsystems, tarsnap, pfsense, freenas, tarsnap, ixsystems, pfsense, freenas, bsdmag, magazine, ssl, tls, hardening, hardened, security, pf, smp, multithreading, firewall, scalability, postgresql, mysql, sql, database, performance, openssl, libressl, boringssl, google, chacha, chacha20, salsa20, encryption, pkgsrc, pkgsrccon, signify, pkg_add, authenticated encryption, decryption, gcm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>38: A BUG's Life</title>
  <link>https://www.bsdnow.tv/38</link>
  <guid isPermaLink="false">01510b66-38e5-40ac-a282-9bff71cb55d9</guid>
  <pubDate>Wed, 21 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/01510b66-38e5-40ac-a282-9bff71cb55d9.mp3" length="63768244" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:28:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD 11 goals and discussion (http://blather.michaelwlucas.com/archives/2053)
Something that actually happened at BSDCan this year...
During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE
Some of MWL's notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support
A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more
There's also some notes from the devsummit virtualization session (http://blather.michaelwlucas.com/archives/2060), mostly talking about bhyve
Lastly, he also provides some notes about ports and packages (http://blather.michaelwlucas.com/archives/2065) and where they're going
***
An SSH honeypot with OpenBSD and Kippo (http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/)
Everyone loves messing with script kiddies, right?
This blog post introduces Kippo (https://code.google.com/p/kippo/), an SSH honeypot tool, and how to use it in combination with OpenBSD
It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely
You can use this to get new 0day exploits or find weaknesses in your systems
OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***
NetBSD foundation financial report (https://www.netbsd.org/foundation/reports/financial/2013.html)
The NetBSD foundation has posted their 2013 financial report
It's a very "no nonsense" page, pretty much only the hard numbers
In 2013, they got $26,000 of income in donations
The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else
Be sure to donate to whichever BSDs you like and use!
***
Building a fully-encrypted NAS with OpenBSD (http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html)
Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you're doing
This article takes a look at the OpenBSD side and explains how (http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html) to build a NAS with security in mind
The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected
The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people's needs too
There's also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***
Interview - Brian Callahan &amp;amp; Aaron Bieber - admin@lists.nycbug.org (mailto:admin@lists.nycbug.org) &amp;amp; admin@cobug.org (mailto:admin@cobug.org)
Forming a local BSD Users Group
Tutorial
The basics of pkgsrc (http://www.bsdnow.tv/tutorials/pkgsrc)
News Roundup
FreeBSD periodic mails vs. monitoring (http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/)
If you've ever been an admin for a lot of FreeBSD boxes, you've probably noticed that you get a lot of email
This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them
From bad SSH logins to Zabbix alerts, it all adds up quickly
It highlights the periodic.conf file and FreeBSD's periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***
Doing cool stuff with OpenBSD routing domains (http://www.skogsrud.net/?p=44)
A blog post from our viewer and regular emailer, Kjell-Aleksander!
He manages some internally-routed IP ranges at his work, but didn't want to have equipment for each separate project
This is where OpenBSD routing domains and pf come in to save the day
The blog post goes through the process with all the network details you could ever dream of
He even named his networking equipment... after us (http://i.imgur.com/penYQFP.jpg)
***
LibreSSL, the good and the bad (http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html)
We're all probably familiar with OpenBSD's fork of OpenSSL at this point
However, "for those of you that don't know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk"
This article talks about some of the cryptographic development challenges involved with maintaining such a massive project
You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled
It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/)
Lots going on in PCBSD land this week, AppCafe has been redesigned
The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update
In the more recent post (http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/), there's some further explanation of the PBI system and the reason for the transition
It's got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s2UbEhgjce)
Daniel writes in (http://slexy.org/view/s21XU0y3JP)
Sean writes in (http://slexy.org/view/s2QQtuawFl)
tsyn writes in (http://slexy.org/view/s20XrT5Q8U)
Chris writes in (http://slexy.org/view/s2ayZ1nsdv)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, bug, bsd user group, users group, community, lug, uug, unix users group, packages, signing, binary, source, compile, ports, nycbug, nycbsdcon, cobug, colorado, new york, conference, presentation, 11.0, ssh, honeypot, script kiddies, kippo, foundation, financial report, encrypted, nas, network attached storage, full disk encryption, periodic, routing domains, pf, the book of pf, third edition, 3rd edition, cron, monitoring, openssl, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>32: PXE Dust</title>
  <link>https://www.bsdnow.tv/32</link>
  <guid isPermaLink="false">a909eddb-036d-451c-8d5a-e7b8e358239f</guid>
  <pubDate>Wed, 09 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a909eddb-036d-451c-8d5a-e7b8e358239f.mp3" length="55324948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the big show we'll be showing off OpenBSD's new "autoinstall" feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it's the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:16:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the big show we'll be showing off OpenBSD's new "autoinstall" feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it's the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD ASLR status update (http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress)
Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD
He's implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)
Work has also started on testing ASLR on ARM, using a Raspberry Pi
He's giving a presentation at BSDCan this year about his ASLR work
While we're on the topic of BSDCan...
***
BSDCan tutorials, improving the experience (http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html)
Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials
The tutorials are called "Building the network you need with PF, the OpenBSD packet filter" and "Transitioning to OpenBSD 5.5" - both scheduled to last three hours each
He's requesting anyone that'll be there to go ahead and contact him, telling him exactly what you'd like to learn
There's also a bit of background information about the tutorials and how he's looking to improve them
If you're interested in OpenBSD and going to BSDCan this year, hit him up
***
pkgsrc-2014Q1 released (http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html)
The new stable branch of pkgsrc packages has been built and is ready
Python 3.3 is now a "first class citizen" in pkgsrc
14255 packages for NetBSD-current/x8664, 11233 binary packages built with clang for FreeBSD 10/x8664
There's a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined
They're also looking into signing packages (http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html)
***
Only two holes in a heck of a long time, who cares? (https://www.mail-archive.com/misc%40openbsd.org/index.html#127993)
A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list
He questions "what's the big deal" about OpenBSD's slogan being "Only two remote holes in the default install, in a heck of a long time!"
Luckily, the community and Theo set the record straight (https://www.mail-archive.com/misc%40openbsd.org/msg128001.html) about why you should care about this
Running insecure applications on OpenBSD is actually more secure than running them on other systems, due to things like ASLR, PIE and all the security features (https://www.mail-archive.com/misc%40openbsd.org/msg127995.html) of OpenBSD
It spawned a discussion about ease of management and Linux's poor security record, definitely worth reading (https://www.mail-archive.com/misc%40openbsd.org/msg128073.html)
***
Interview - Dru Lavigne - dru@freebsd.org (mailto:dru@freebsd.org) / @bsdevents (https://twitter.com/bsdevents)
FreeBSD's documentation printing, documentation springs, various topics
Tutorial
Automatic, unattended OpenBSD installs with PXE (http://www.bsdnow.tv/tutorials/autoinstall)
News Roundup
pfSense 2.1.1 released (https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes)
A new version of pfSense is released, mainly to fix some security issues
Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router
There are also some NIC driver updates and other things (https://blog.pfsense.org/?p=1238)
Of course if you want to learn more about pfSense, watch episode 25 (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense)
2.1.2 is already up for testing too
***
FreeBSD gets UEFI support (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=264095)
It looks like FreeBSD's battle with UEFI may be coming to a close?
Ed Maste committed a giant list of patches to enable UEFI support on x86_64
Look through the list to see all the details and information
Thanks FreeBSD foundation!
***
Ideas for the next DragonflyBSD release (http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html)
Mr. Dragonfly release engineer himself, Justin Sherrill (http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug) posts some of his ideas for the upcoming release
They're aiming for late May for the next version
Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support
Gasp, they're even considering dropping i386
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/)
Lots of new PBI updates for 10.0, new runtime implementation
New support for running 32 bit applications in PBI runtime
New default CD and DVD player, umplayer
Latest GNOME 3 and Cinnamon merged, new edge package builds
***
Feedback/Questions
Remy writes in (http://slexy.org/view/s273oSezFs)
Jan writes in (http://slexy.org/view/s2I3H1HsVb)
Eddie writes in (http://slexy.org/view/s2wUTRowzU)
Zen writes in (http://slexy.org/view/s2RA0whmwz)
Sean writes in (http://slexy.org/view/s2pwE20Ov6)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pxe, pxeboot, autoinstall, dru lavigne, documentation, sprints, handbook, printed, bsdcan, aslr, arm, desktop, linux, games, ports, stable, pkgsrc, aslr, security, pie, branch, ports, pkgng, freenas</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the big show we&#39;ll be showing off OpenBSD&#39;s new &quot;autoinstall&quot; feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it&#39;s the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress" rel="nofollow">FreeBSD ASLR status update</a></h3>

<ul>
<li>Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD</li>
<li>He&#39;s implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)</li>
<li>Work has also started on testing ASLR on ARM, using a Raspberry Pi</li>
<li>He&#39;s giving a presentation at BSDCan this year about his ASLR work</li>
<li>While we&#39;re on the topic of BSDCan...
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html" rel="nofollow">BSDCan tutorials, improving the experience</a></h3>

<ul>
<li>Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials</li>
<li>The tutorials are called &quot;Building the network you need with PF, the OpenBSD packet filter&quot; and &quot;Transitioning to OpenBSD 5.5&quot; - both scheduled to last three hours each</li>
<li>He&#39;s requesting anyone that&#39;ll be there to go ahead and contact him, telling him exactly what you&#39;d like to learn</li>
<li>There&#39;s also a bit of background information about the tutorials and how he&#39;s looking to improve them</li>
<li>If you&#39;re interested in OpenBSD and going to BSDCan this year, hit him up
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html" rel="nofollow">pkgsrc-2014Q1 released</a></h3>

<ul>
<li>The new stable branch of pkgsrc packages has been built and is ready</li>
<li>Python 3.3 is now a &quot;first class citizen&quot; in pkgsrc</li>
<li>14255 packages for NetBSD-current/x86_64, 11233 binary packages built with clang for FreeBSD 10/x86_64</li>
<li>There&#39;s a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined</li>
<li>They&#39;re also looking into <a href="http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html" rel="nofollow">signing packages</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc%40openbsd.org/index.html#127993" rel="nofollow">Only two holes in a heck of a long time, who cares?</a></h3>

<ul>
<li>A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list</li>
<li>He questions &quot;what&#39;s the big deal&quot; about OpenBSD&#39;s slogan being &quot;Only two remote holes in the default install, in a heck of a long time!&quot;</li>
<li>Luckily, the community and Theo <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128001.html" rel="nofollow">set the record straight</a> about why you should care about this</li>
<li>Running insecure applications on OpenBSD is actually <strong>more</strong> secure than running them on other systems, due to things like ASLR, PIE and all the <a href="https://www.mail-archive.com/misc%40openbsd.org/msg127995.html" rel="nofollow">security features</a> of OpenBSD</li>
<li>It spawned a discussion about ease of management and Linux&#39;s poor security record, definitely <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128073.html" rel="nofollow">worth reading</a>
***</li>
</ul>

<h2>Interview - Dru Lavigne - <a href="mailto:dru@freebsd.org" rel="nofollow">dru@freebsd.org</a> / <a href="https://twitter.com/bsdevents" rel="nofollow">@bsdevents</a></h2>

<p>FreeBSD&#39;s documentation printing, documentation springs, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">Automatic, unattended OpenBSD installs with PXE</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense 2.1.1 released</a></h3>

<ul>
<li>A new version of pfSense is released, mainly to fix some security issues</li>
<li>Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router</li>
<li>There are also some NIC driver updates <a href="https://blog.pfsense.org/?p=1238" rel="nofollow">and other things</a></li>
<li>Of course if you want to learn more about pfSense, watch <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">episode 25</a></li>
<li>2.1.2 is already up for testing too
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=264095" rel="nofollow">FreeBSD gets UEFI support</a></h3>

<ul>
<li>It looks like FreeBSD&#39;s battle with UEFI may be coming to a close?</li>
<li>Ed Maste committed a giant list of patches to enable UEFI support on x86_64</li>
<li>Look through the list to see all the details and information</li>
<li>Thanks FreeBSD foundation!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html" rel="nofollow">Ideas for the next DragonflyBSD release</a></h3>

<ul>
<li>Mr. Dragonfly release engineer himself, <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherrill</a> posts some of his ideas for the upcoming release</li>
<li>They&#39;re aiming for late May for the next version</li>
<li>Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support</li>
<li>Gasp, they&#39;re even considering dropping i386
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of new PBI updates for 10.0, new runtime implementation</li>
<li>New support for running 32 bit applications in PBI runtime</li>
<li>New default CD and DVD player, umplayer</li>
<li>Latest GNOME 3 and Cinnamon merged, new edge package builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s273oSezFs" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2I3H1HsVb" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s2wUTRowzU" rel="nofollow">Eddie writes in</a></li>
<li><a href="http://slexy.org/view/s2RA0whmwz" rel="nofollow">Zen writes in</a></li>
<li><a href="http://slexy.org/view/s2pwE20Ov6" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the big show we&#39;ll be showing off OpenBSD&#39;s new &quot;autoinstall&quot; feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it&#39;s the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress" rel="nofollow">FreeBSD ASLR status update</a></h3>

<ul>
<li>Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD</li>
<li>He&#39;s implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)</li>
<li>Work has also started on testing ASLR on ARM, using a Raspberry Pi</li>
<li>He&#39;s giving a presentation at BSDCan this year about his ASLR work</li>
<li>While we&#39;re on the topic of BSDCan...
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html" rel="nofollow">BSDCan tutorials, improving the experience</a></h3>

<ul>
<li>Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials</li>
<li>The tutorials are called &quot;Building the network you need with PF, the OpenBSD packet filter&quot; and &quot;Transitioning to OpenBSD 5.5&quot; - both scheduled to last three hours each</li>
<li>He&#39;s requesting anyone that&#39;ll be there to go ahead and contact him, telling him exactly what you&#39;d like to learn</li>
<li>There&#39;s also a bit of background information about the tutorials and how he&#39;s looking to improve them</li>
<li>If you&#39;re interested in OpenBSD and going to BSDCan this year, hit him up
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html" rel="nofollow">pkgsrc-2014Q1 released</a></h3>

<ul>
<li>The new stable branch of pkgsrc packages has been built and is ready</li>
<li>Python 3.3 is now a &quot;first class citizen&quot; in pkgsrc</li>
<li>14255 packages for NetBSD-current/x86_64, 11233 binary packages built with clang for FreeBSD 10/x86_64</li>
<li>There&#39;s a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined</li>
<li>They&#39;re also looking into <a href="http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html" rel="nofollow">signing packages</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc%40openbsd.org/index.html#127993" rel="nofollow">Only two holes in a heck of a long time, who cares?</a></h3>

<ul>
<li>A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list</li>
<li>He questions &quot;what&#39;s the big deal&quot; about OpenBSD&#39;s slogan being &quot;Only two remote holes in the default install, in a heck of a long time!&quot;</li>
<li>Luckily, the community and Theo <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128001.html" rel="nofollow">set the record straight</a> about why you should care about this</li>
<li>Running insecure applications on OpenBSD is actually <strong>more</strong> secure than running them on other systems, due to things like ASLR, PIE and all the <a href="https://www.mail-archive.com/misc%40openbsd.org/msg127995.html" rel="nofollow">security features</a> of OpenBSD</li>
<li>It spawned a discussion about ease of management and Linux&#39;s poor security record, definitely <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128073.html" rel="nofollow">worth reading</a>
***</li>
</ul>

<h2>Interview - Dru Lavigne - <a href="mailto:dru@freebsd.org" rel="nofollow">dru@freebsd.org</a> / <a href="https://twitter.com/bsdevents" rel="nofollow">@bsdevents</a></h2>

<p>FreeBSD&#39;s documentation printing, documentation springs, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">Automatic, unattended OpenBSD installs with PXE</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense 2.1.1 released</a></h3>

<ul>
<li>A new version of pfSense is released, mainly to fix some security issues</li>
<li>Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router</li>
<li>There are also some NIC driver updates <a href="https://blog.pfsense.org/?p=1238" rel="nofollow">and other things</a></li>
<li>Of course if you want to learn more about pfSense, watch <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">episode 25</a></li>
<li>2.1.2 is already up for testing too
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=264095" rel="nofollow">FreeBSD gets UEFI support</a></h3>

<ul>
<li>It looks like FreeBSD&#39;s battle with UEFI may be coming to a close?</li>
<li>Ed Maste committed a giant list of patches to enable UEFI support on x86_64</li>
<li>Look through the list to see all the details and information</li>
<li>Thanks FreeBSD foundation!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html" rel="nofollow">Ideas for the next DragonflyBSD release</a></h3>

<ul>
<li>Mr. Dragonfly release engineer himself, <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherrill</a> posts some of his ideas for the upcoming release</li>
<li>They&#39;re aiming for late May for the next version</li>
<li>Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support</li>
<li>Gasp, they&#39;re even considering dropping i386
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of new PBI updates for 10.0, new runtime implementation</li>
<li>New support for running 32 bit applications in PBI runtime</li>
<li>New default CD and DVD player, umplayer</li>
<li>Latest GNOME 3 and Cinnamon merged, new edge package builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s273oSezFs" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2I3H1HsVb" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s2wUTRowzU" rel="nofollow">Eddie writes in</a></li>
<li><a href="http://slexy.org/view/s2RA0whmwz" rel="nofollow">Zen writes in</a></li>
<li><a href="http://slexy.org/view/s2pwE20Ov6" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>26: Port Authority</title>
  <link>https://www.bsdnow.tv/26</link>
  <guid isPermaLink="false">0e208963-5f59-446a-902e-9876d96c8f3f</guid>
  <pubDate>Wed, 26 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0e208963-5f59-446a-902e-9876d96c8f3f.mp3" length="65589845" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On today's show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:31:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>On today's show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
Tailoring OpenBSD for an old, strange computer (http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html)
The author of this article had an OmniBook 800CT (http://hpmuseum.net/display_item.php?hw=233), which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU
Obviously he had to install some kind of BSD on it!
This post goes through all his efforts of trimming down OpenBSD to work on such a limited device
He goes through the trial and error of "compile, break it, rebuild, try again"
After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***
pkgsrcCon and BSDCan (http://www.pkgsrc.org/pkgsrcCon/2014/)
pkgsrccon is "a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure"
This year it will be on June 21st and 22nd
The schedule (http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html) is still being worked out, so if you want to give a talk, submit it
BSDCan's schedule (https://www.bsdcan.org/2014/schedule/events.en.html) was also announced
We'll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more
Kris' presentation was accepted!
Tons of topics, look forward to the recorded versions of all of them hopefully!
***
Two factor auth with pushover (http://www.tedunangst.com/flak/post/login-pushover)
A new write-up from our friend Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures)
Pushover is "a web hook to smartphone push notification gateway" - you sent a POST to a web server and it sends a code to your phone
His post goes through the steps of editing your login.conf and setting it all up to work
Now you can get a two factor authenticated login for ssh!
***
The status of GNOME 3 on BSD (http://undeadly.org/cgi?action=article&amp;amp;sid=20140219085851)
It's no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems
OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use
This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes a screencast (https://www.bsdfrog.org/tmp/undeadly-gnome.webm)
A few recent (http://blogs.gnome.org/mclasen/2014/02/19/on-portability/) posts (http://blogs.gnome.org/desrt/2014/02/19/on-portability/) from some GNOME developers show that they're finally working with the BSD guys to improve portability
The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it's a beautiful thing
This goes right along with our interview today!
***
Interview - Joe Marcus Clark - marcus@freebsd.org (mailto:marcus@freebsd.org)
The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics
Tutorial
The FreeBSD Ports Collection (http://www.bsdnow.tv/tutorials/ports)
News Roundup
DragonflyBSD 3.8 goals and 3.6.1 release (http://bugs.dragonflybsd.org/versions/4)
The Dragonfly team is thinking about what should be in version 3.8
On their bug tracker, it lists some of the things they'd like to get done before then
In the meantime, 3.6.1 (http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html) was released with lots of bugfixes
***
NYCBSDCon 2014 wrap-up piece (http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend)
We've got a nice wrap-up titled "NYCBSDCon 2014 Heats Up a Cold Winter Weekend"
The author also interviews GNN (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) about the conference
There's even a little "beginner introduction" to BSD segment
Includes a mention of the recently-launched journal and lots of pictures from the event
***
FreeBSD and Linux, a comparative analysis (https://www.youtube.com/watch?&amp;amp;v=5mv_oKFzACM#t=418)
GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux
He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs "distros," development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences
Serves as a good introduction you can show your Linux friends
***
PCBSD CFT and weekly digest (http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/)
Upgrade tools have gotten a major rewrite
You have to help test it, there is no choice! Read more here (http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/)
How dare Kris be "unimpressed with" freebsd-update and pkgng!?
Various updates and fixes
***
Feedback/Questions
Jeffrey writes in (http://slexy.org/view/s213KxUdVj)
Shane writes in (http://slexy.org/view/s20lwkjLVK)
Ferdinand writes in (http://slexy.org/view/s21DqJs77g)
Curtis writes in (http://slexy.org/view/s20eXKEqJc)
Clint writes in (http://slexy.org/view/s21XMVFuVu)
Peter writes in (http://slexy.org/view/s20Xk05MHe)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, portmgr, ports, pkgng, packages, portsnap, make.conf, tinderbox, portlint, gnome, gnome 3, gnome-shell, omnibook, 800ct, ixsystems, pkgsrc, pkgsrccon, pushover, two factor authentication, bsdcan, 2014, dragonfly mail agent, dma, sendmail, postfix, ssmtp, flashrd, nylug, linux, differences, switching to bsd, presentation, lug, uug, bug, gnu, gpl, fsf, license, debate, nycbsdcon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On today&#39;s show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html" rel="nofollow">Tailoring OpenBSD for an old, strange computer</a></h3>

<ul>
<li>The author of this article had an <a href="http://hpmuseum.net/display_item.php?hw=233" rel="nofollow">OmniBook 800CT</a>, which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU</li>
<li>Obviously he had to install some kind of BSD on it!</li>
<li>This post goes through all his efforts of trimming down OpenBSD to work on such a limited device</li>
<li>He goes through the trial and error of &quot;compile, break it, rebuild, try again&quot;</li>
<li>After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***</li>
</ul>

<h3><a href="http://www.pkgsrc.org/pkgsrcCon/2014/" rel="nofollow">pkgsrcCon and BSDCan</a></h3>

<ul>
<li>pkgsrccon is &quot;a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure&quot;</li>
<li>This year it will be on June 21st and 22nd</li>
<li>The <a href="http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html" rel="nofollow">schedule</a> is still being worked out, so if you want to give a talk, submit it</li>
<li>BSDCan&#39;s <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">schedule</a> was also announced</li>
<li>We&#39;ll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more</li>
<li>Kris&#39; presentation was accepted!</li>
<li>Tons of topics, look forward to the recorded versions of all of them hopefully!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/login-pushover" rel="nofollow">Two factor auth with pushover</a></h3>

<ul>
<li>A new write-up from our friend <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a></li>
<li>Pushover is &quot;a web hook to smartphone push notification gateway&quot; - you sent a POST to a web server and it sends a code to your phone</li>
<li>His post goes through the steps of editing your login.conf and setting it all up to work</li>
<li>Now you can get a two factor authenticated login for ssh!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140219085851" rel="nofollow">The status of GNOME 3 on BSD</a></h3>

<ul>
<li>It&#39;s no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems</li>
<li>OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use</li>
<li>This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes <a href="https://www.bsdfrog.org/tmp/undeadly-gnome.webm" rel="nofollow">a screencast</a></li>
<li>A few <a href="http://blogs.gnome.org/mclasen/2014/02/19/on-portability/" rel="nofollow">recent</a> <a href="http://blogs.gnome.org/desrt/2014/02/19/on-portability/" rel="nofollow">posts</a> from some GNOME developers show that they&#39;re finally working with the BSD guys to improve portability</li>
<li>The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it&#39;s a beautiful thing</li>
<li>This goes right along with our interview today!
***</li>
</ul>

<h2>Interview - Joe Marcus Clark - <a href="mailto:marcus@freebsd.org" rel="nofollow">marcus@freebsd.org</a></h2>

<p>The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">The FreeBSD Ports Collection</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bugs.dragonflybsd.org/versions/4" rel="nofollow">DragonflyBSD 3.8 goals and 3.6.1 release</a></h3>

<ul>
<li>The Dragonfly team is thinking about what should be in version 3.8</li>
<li>On their bug tracker, it lists some of the things they&#39;d like to get done before then</li>
<li>In the meantime, <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html" rel="nofollow">3.6.1</a> was released with lots of bugfixes
***</li>
</ul>

<h3><a href="http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend" rel="nofollow">NYCBSDCon 2014 wrap-up piece</a></h3>

<ul>
<li>We&#39;ve got a nice wrap-up titled &quot;NYCBSDCon 2014 Heats Up a Cold Winter Weekend&quot;</li>
<li>The author also interviews <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">GNN</a> about the conference</li>
<li>There&#39;s even a little &quot;beginner introduction&quot; to BSD segment</li>
<li>Includes a mention of the recently-launched journal and lots of pictures from the event
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?&v=5mv_oKFzACM#t=418" rel="nofollow">FreeBSD and Linux, a comparative analysis</a></h3>

<ul>
<li>GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux</li>
<li>He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs &quot;distros,&quot; development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences</li>
<li>Serves as a good introduction you can show your Linux friends
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/" rel="nofollow">PCBSD CFT and weekly digest</a></h3>

<ul>
<li>Upgrade tools have gotten a major rewrite</li>
<li>You have to help test it, there is no choice! Read more <a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/" rel="nofollow">here</a></li>
<li>How dare Kris be &quot;unimpressed with&quot; freebsd-update and pkgng!?</li>
<li>Various updates and fixes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s213KxUdVj" rel="nofollow">Jeffrey writes in</a></li>
<li><a href="http://slexy.org/view/s20lwkjLVK" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s21DqJs77g" rel="nofollow">Ferdinand writes in</a></li>
<li><a href="http://slexy.org/view/s20eXKEqJc" rel="nofollow">Curtis writes in</a></li>
<li><a href="http://slexy.org/view/s21XMVFuVu" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20Xk05MHe" rel="nofollow">Peter writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On today&#39;s show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html" rel="nofollow">Tailoring OpenBSD for an old, strange computer</a></h3>

<ul>
<li>The author of this article had an <a href="http://hpmuseum.net/display_item.php?hw=233" rel="nofollow">OmniBook 800CT</a>, which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU</li>
<li>Obviously he had to install some kind of BSD on it!</li>
<li>This post goes through all his efforts of trimming down OpenBSD to work on such a limited device</li>
<li>He goes through the trial and error of &quot;compile, break it, rebuild, try again&quot;</li>
<li>After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***</li>
</ul>

<h3><a href="http://www.pkgsrc.org/pkgsrcCon/2014/" rel="nofollow">pkgsrcCon and BSDCan</a></h3>

<ul>
<li>pkgsrccon is &quot;a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure&quot;</li>
<li>This year it will be on June 21st and 22nd</li>
<li>The <a href="http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html" rel="nofollow">schedule</a> is still being worked out, so if you want to give a talk, submit it</li>
<li>BSDCan&#39;s <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">schedule</a> was also announced</li>
<li>We&#39;ll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more</li>
<li>Kris&#39; presentation was accepted!</li>
<li>Tons of topics, look forward to the recorded versions of all of them hopefully!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/login-pushover" rel="nofollow">Two factor auth with pushover</a></h3>

<ul>
<li>A new write-up from our friend <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a></li>
<li>Pushover is &quot;a web hook to smartphone push notification gateway&quot; - you sent a POST to a web server and it sends a code to your phone</li>
<li>His post goes through the steps of editing your login.conf and setting it all up to work</li>
<li>Now you can get a two factor authenticated login for ssh!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140219085851" rel="nofollow">The status of GNOME 3 on BSD</a></h3>

<ul>
<li>It&#39;s no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems</li>
<li>OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use</li>
<li>This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes <a href="https://www.bsdfrog.org/tmp/undeadly-gnome.webm" rel="nofollow">a screencast</a></li>
<li>A few <a href="http://blogs.gnome.org/mclasen/2014/02/19/on-portability/" rel="nofollow">recent</a> <a href="http://blogs.gnome.org/desrt/2014/02/19/on-portability/" rel="nofollow">posts</a> from some GNOME developers show that they&#39;re finally working with the BSD guys to improve portability</li>
<li>The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it&#39;s a beautiful thing</li>
<li>This goes right along with our interview today!
***</li>
</ul>

<h2>Interview - Joe Marcus Clark - <a href="mailto:marcus@freebsd.org" rel="nofollow">marcus@freebsd.org</a></h2>

<p>The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">The FreeBSD Ports Collection</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bugs.dragonflybsd.org/versions/4" rel="nofollow">DragonflyBSD 3.8 goals and 3.6.1 release</a></h3>

<ul>
<li>The Dragonfly team is thinking about what should be in version 3.8</li>
<li>On their bug tracker, it lists some of the things they&#39;d like to get done before then</li>
<li>In the meantime, <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html" rel="nofollow">3.6.1</a> was released with lots of bugfixes
***</li>
</ul>

<h3><a href="http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend" rel="nofollow">NYCBSDCon 2014 wrap-up piece</a></h3>

<ul>
<li>We&#39;ve got a nice wrap-up titled &quot;NYCBSDCon 2014 Heats Up a Cold Winter Weekend&quot;</li>
<li>The author also interviews <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">GNN</a> about the conference</li>
<li>There&#39;s even a little &quot;beginner introduction&quot; to BSD segment</li>
<li>Includes a mention of the recently-launched journal and lots of pictures from the event
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?&v=5mv_oKFzACM#t=418" rel="nofollow">FreeBSD and Linux, a comparative analysis</a></h3>

<ul>
<li>GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux</li>
<li>He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs &quot;distros,&quot; development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences</li>
<li>Serves as a good introduction you can show your Linux friends
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/" rel="nofollow">PCBSD CFT and weekly digest</a></h3>

<ul>
<li>Upgrade tools have gotten a major rewrite</li>
<li>You have to help test it, there is no choice! Read more <a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/" rel="nofollow">here</a></li>
<li>How dare Kris be &quot;unimpressed with&quot; freebsd-update and pkgng!?</li>
<li>Various updates and fixes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s213KxUdVj" rel="nofollow">Jeffrey writes in</a></li>
<li><a href="http://slexy.org/view/s20lwkjLVK" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s21DqJs77g" rel="nofollow">Ferdinand writes in</a></li>
<li><a href="http://slexy.org/view/s20eXKEqJc" rel="nofollow">Curtis writes in</a></li>
<li><a href="http://slexy.org/view/s21XMVFuVu" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20Xk05MHe" rel="nofollow">Peter writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>25: A Sixth pfSense</title>
  <link>https://www.bsdnow.tv/25</link>
  <guid isPermaLink="false">dad040a2-8866-4876-88fb-43b036b3e691</guid>
  <pubDate>Wed, 19 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/dad040a2-8866-4876-88fb-43b036b3e691.mp3" length="48903556" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
EuroBSDCon and AsiaBSDCon (http://2014.eurobsdcon.org/calendar/call-for-papers/)
This year, EuroBSDCon will be in September in Sofia, Bulgaria
They've got a call for papers up now, so everyone can submit the talks they want to present
There will also be a tutorial section of the conference
AsiaBSDCon (http://2014.asiabsdcon.org/timetable.html.en) will be next month, in March!
All the info about the registration, tutorials, hotels, timetable and location have been posted
Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***
FreeBSD 10 on Ubiquiti EdgeRouter Lite (http://rtfm.net/FreeBSD/ERL/)
The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU
This article goes through the process of installing and configuring FreeBSD on it to use as a home router
Lots of good pictures of the hardware and specific details needed to get you set up
It also includes the scripts to create your own images if you don't want to use the ones rolled by someone else
For such a cheap price, might be a really fun weekend project to replace your shitty consumer router
Of course if you're more of an OpenBSD guy, you can always see our tutorial (http://www.bsdnow.tv/tutorials/openbsd-router) for that too
***
Signed pkgsrc package guide (http://blog.saveosx.org/signed-packages/)
We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up
It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)
He goes through the process of signing packages with a public key and how to verify the packages when you install them
The author also happens to be an EdgeBSD developer
***
Big batch of OpenBSD hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140212083627)
Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI
In the second (http://undeadly.org/cgi?action=article&amp;amp;sid=20140213065843), ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things
In the third (http://undeadly.org/cgi?action=article&amp;amp;sid=20140213173808), jsg updated libdrm and mesa and did various work on xenocara
In the fourth (http://undeadly.org/cgi?action=article&amp;amp;sid=20140214070023), dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he's done
In the fifth (http://undeadly.org/cgi?action=article&amp;amp;sid=20140214130039), claudio talks about some stuff he did for routing tables and misc. other things
***
Interview - Chris Buechler - cmb@pfsense.com (mailto:cmb@pfsense.com) / @cbuechler (https://twitter.com/cbuechler)
pfSense
Tutorial
pfSense walkthrough
News Roundup
FreeBSD challenge continues (http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/)
Our buddy from the Linux foundation continues his switching to BSD journey
In day 13, he covers some tips for new users, mentions trying things out in a VM first
In day 14 (http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/), he starts setting up XFCE and X11, feels like he's starting over as a new Linux user learning the ropes again - concludes that ports are the way to go
In day 15 (http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/), he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch
In day 16 (http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/), he dives into the world of FreeBSD jails (http://www.bsdnow.tv/tutorials/jails)!
***
BSD books in 2014 (http://blather.michaelwlucas.com/archives/1962)
BSD books are some of the highest quality technical writings available, and MWL has written a good number of them
In this post, he details some of his plans for 2014
In includes at least one OpenBSD book, at least one FreeBSD book and...
Very strong possibility of Absolute FreeBSD 3rd edition (watch our interview with him (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop))
Check the link for all the details
***
How to build FreeBSD/EC2 images (http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html)
Our friend Colin Percival (http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten) details how to build EC2 images in a new blog post
Most people just use the images he makes on their instances, but some people will want to make their own from scratch (https://svnweb.freebsd.org/base/user/cperciva/EC2-build/)
You build a regular disk image and then turn it into an AMI
It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/)
This time around we discuss how you can become a developer
Kris also details the length of supported releases
Expect lots of new features in 10.1
***
Feedback/Questions
Sean writes in (http://slexy.org/view/s216xJoCVG)
Jake writes in (http://slexy.org/view/s2gLrR3VVf)
Niclas writes in (http://slexy.org/view/s21gfG3Iho)
Steffan writes in (http://slexy.org/view/s2JNyw5BCn)
Antonio writes in (http://slexy.org/view/s2kg3zoRfm)
Chris writes in (http://slexy.org/view/s2ZwSIfRjm)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pfsense, pf, firewall, gateway, router, hangout, webui, web interface, php, ipfw, ipfilter, gateway, graphs, bandwidth, edgerouter, edgerouter lite, eurobsdcon, eurobsdcon2014, edge router, 2014, books, michael w lucas, freebsd journal, fosdem, asiabsdcon, mips, hackathon, new zealand, pkgsrc, signed packages, edgebsd, smp, ec2, amazon, images, instance, build, custom</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>19: The Installfest</title>
  <link>https://www.bsdnow.tv/19</link>
  <guid isPermaLink="false">6e52e1f8-72f4-4ef7-be58-b8d78ab97072</guid>
  <pubDate>Wed, 08 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6e52e1f8-72f4-4ef7-be58-b8d78ab97072.mp3" length="58342747" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We've got some special treats for you this week on the show. It's the long-awaited "installfest" segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There's a lot to get to today on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:21:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We've got some special treats for you this week on the show. It's the long-awaited "installfest" segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There's a lot to get to today on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD's new testing infrastructure (https://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/044009.html)
A new test suite was added to FreeBSD, with 3 powerful machines available
Both -CURRENT and stable/10 have got the test suite build infrastructure in place
Designed to help developers test and improve major scalability across huge amounts of CPUs and RAM
More details available here (http://julipedia.meroh.net/2013/12/introducing-freebsd-test-suite.html)
Could the iXsystems monster server be involved...?
***
OpenBSD gets signify (http://marc.info/?l=openbsd-cvs&amp;amp;m=138845902916897&amp;amp;w=2)
At long last, OpenBSD gets support for signed releases!
For "the world's most secure OS" it was very easy to MITM kernel patches, updates, installer isos, everything
A commit to the -current tree reveals a new "signify" tool is currently being kicked around
More details in a blog post (http://www.tedunangst.com/flak/post/signify) from the guy who committed it
Quote: "yeah, briefly, the plan is to sign sets and packages. that's still work in progress."
***
Faces of FreeBSD (http://freebsdfoundation.blogspot.ca/2013/12/faces-of-freebsd-isabell-long.html)
This time they interview Isabell Long
She's a volunteer staff member on the freenode IRC network
In 2011, she participated in the Google Code-In contest and became involved with documentation
"The new committer mentoring process proved very useful and that, plus the accepting community of FreeBSD, are reasons why I stay involved."
***
pkgsrc-2013Q4 branched (http://mail-index.netbsd.org/pkgsrc-users/2013/12/31/msg019107.html)
The quarterly pkgsrc branch from NetBSD is out
13472 total packages for NetBSD-current/amd64 + 13049 binary packages built with clang!
Lots of numbers and stats in the announcement
pkgsrc works on quite a few different OSes, not just NetBSD
See our interview (http://www.bsdnow.tv/episodes/2013_11_20-collecting_shells) with Amitai Schlair for a bit about pkgsrc
***
OpenBSD on Google's Compute Engine (http://marc.info/?l=openbsd-misc&amp;amp;m=138610199311393&amp;amp;w=2)
Google Compute Engine is a "cloud computing" platform similar to EC2
Unfortunately, they only offer poor choices for the OS (Debian and CentOS)
Recently it's been announced that there is a custom OS option
It's using a WIP virtio-scsi driver, lots of things still need more work
Lots of technical and networking details about the struggles to get OpenBSD working on it
***
The Installfest
We'll be showing you the installer of each of the main BSDs. As of the date this episode airs, we're using:
FreeBSD 10.0
OpenBSD 5.4
NetBSD 6.1.2
DragonflyBSD 3.6
PCBSD 10.0
***
News Roundup
Building an OpenBSD wireless access point (http://ctors.net/2013/12/30/openbsd_wireless_access_point)
A neat write up we found around the internet about making an OpenBSD wifi router
Goes through the process of PXE booting, installing base, using a serial console, setting up networking and wireless
Even includes a puffy sticker on the Soekris box at the end, how cute
***
FreeBSD 4.X jails on 10.0 (http://blather.michaelwlucas.com/archives/1919)
Blog entry from our buddy Michael Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop)
For whatever reason (an "in-house application"), he needed to run a FreeBSD 4 jail in FreeBSD 10
Talks about the options he had: porting software, virtualizing, dealing with slow old hardware
He goes through the whole process of making an ancient jail
It's "an acceptable trade-off, if it means I don’t have to touch actual PHP code."
***
Unscrewed: a story about OpenBSD (http://www.skeptech.org/blog/2013/01/13/unscrewed-a-story-about-openbsd/)
Pretty long blog post about how a network admin used OpenBSD to save the day
To set the tone, "It was 5am, and the network was down"
Great war story about replacing expensive routers and networking equipment with cheaper hardware and BSD
Mentions a lot of the built in tools and how OpenBSD is great for routers and high security applications
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-2/)
10.0-RC3 is out and ready to be tested
New detection of ATI Hybrid Graphics, they're working on nVidia next
Re-classifying Linux jails as unsupported / experimental
***
Feedback/Questions
Daniel writes in (http://slexy.org/view/s2uns1hMml)
Erik writes in (http://slexy.org/view/s2MeJNCCiu)
SW writes in (http://slexy.org/view/s21fBXkP2K)
[Bostjan writes in[(http://slexy.org/view/s20N9bfkum)
Samuel writes in (http://slexy.org/view/s20FU9wUO5)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, contest, pillow, giveaway, competition, sweepstakes, router, tuning, performance, dnscrypt, dnscurve, opendns, pkgsrc, testing, megacore, ixsystems, signify, signed packages, sets, mitm, gce, google compute engine, access point, jails, installfest, installer, sysinstall, bsdinstall, pc-sysinstall</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;ve got some special treats for you this week on the show. It&#39;s the long-awaited &quot;installfest&quot; segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There&#39;s a lot to get to today on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/044009.html" rel="nofollow">FreeBSD&#39;s new testing infrastructure</a></h3>

<ul>
<li>A new test suite was added to FreeBSD, with 3 powerful machines available</li>
<li>Both -CURRENT and stable/10 have got the test suite build infrastructure in place</li>
<li>Designed to help developers test and improve major scalability across huge amounts of CPUs and RAM</li>
<li>More details <a href="http://julipedia.meroh.net/2013/12/introducing-freebsd-test-suite.html" rel="nofollow">available here</a></li>
<li>Could the iXsystems monster server be involved...?
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=138845902916897&w=2" rel="nofollow">OpenBSD gets signify</a></h3>

<ul>
<li>At long last, OpenBSD gets support for signed releases!</li>
<li>For &quot;the world&#39;s most secure OS&quot; it was very easy to MITM kernel patches, updates, installer isos, everything</li>
<li>A commit to the -current tree reveals a new &quot;signify&quot; tool is currently being kicked around</li>
<li>More details in <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">a blog post</a> from the guy who committed it</li>
<li>Quote: &quot;yeah, briefly, the plan is to sign sets and packages. that&#39;s still work in progress.&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.ca/2013/12/faces-of-freebsd-isabell-long.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>This time they interview Isabell Long</li>
<li>She&#39;s a volunteer staff member on the freenode IRC network</li>
<li>In 2011, she participated in the Google Code-In contest and became involved with documentation</li>
<li>&quot;The new committer mentoring process proved very useful and that, plus the accepting community of FreeBSD, are reasons why I stay involved.&quot;
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/12/31/msg019107.html" rel="nofollow">pkgsrc-2013Q4 branched</a></h3>

<ul>
<li>The quarterly pkgsrc branch from NetBSD is out</li>
<li>13472 total packages for NetBSD-current/amd64 + 13049 binary packages built with clang!</li>
<li>Lots of numbers and stats in the announcement</li>
<li>pkgsrc works on quite a few different OSes, not just NetBSD</li>
<li>See <a href="http://www.bsdnow.tv/episodes/2013_11_20-collecting_shells" rel="nofollow">our interview</a> with Amitai Schlair for a bit about pkgsrc
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=138610199311393&w=2" rel="nofollow">OpenBSD on Google&#39;s Compute Engine</a></h3>

<ul>
<li>Google Compute Engine is a &quot;cloud computing&quot; platform similar to EC2</li>
<li>Unfortunately, they only offer poor choices for the OS (Debian and CentOS)</li>
<li>Recently it&#39;s been announced that there is a custom OS option</li>
<li>It&#39;s using a WIP virtio-scsi driver, lots of things still need more work</li>
<li>Lots of technical and networking details about the struggles to get OpenBSD working on it
***</li>
</ul>

<h2>The Installfest</h2>

<p>We&#39;ll be showing you the installer of each of the main BSDs. As of the date this episode airs, we&#39;re using:</p>

<ul>
<li>FreeBSD 10.0</li>
<li>OpenBSD 5.4</li>
<li>NetBSD 6.1.2</li>
<li>DragonflyBSD 3.6</li>
<li>PCBSD 10.0
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://ctors.net/2013/12/30/openbsd_wireless_access_point" rel="nofollow">Building an OpenBSD wireless access point</a></h3>

<ul>
<li>A neat write up we found around the internet about making an OpenBSD wifi router</li>
<li>Goes through the process of PXE booting, installing base, using a serial console, setting up networking and wireless</li>
<li>Even includes a puffy sticker on the Soekris box at the end, how cute
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1919" rel="nofollow">FreeBSD 4.X jails on 10.0</a></h3>

<ul>
<li>Blog entry from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>For whatever reason (an &quot;in-house application&quot;), he needed to run a FreeBSD 4 jail in FreeBSD 10</li>
<li>Talks about the options he had: porting software, virtualizing, dealing with slow old hardware</li>
<li>He goes through the whole process of making an ancient jail</li>
<li>It&#39;s &quot;an acceptable trade-off, if it means I don’t have to touch actual PHP code.&quot;
***</li>
</ul>

<h3><a href="http://www.skeptech.org/blog/2013/01/13/unscrewed-a-story-about-openbsd/" rel="nofollow">Unscrewed: a story about OpenBSD</a></h3>

<ul>
<li>Pretty long blog post about how a network admin used OpenBSD to save the day</li>
<li>To set the tone, &quot;It was 5am, and the network was down&quot;</li>
<li>Great war story about replacing expensive routers and networking equipment with cheaper hardware and BSD</li>
<li>Mentions a lot of the built in tools and how OpenBSD is great for routers and high security applications
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC3 is out and ready to be tested</li>
<li>New detection of ATI Hybrid Graphics, they&#39;re working on nVidia next</li>
<li>Re-classifying Linux jails as unsupported / experimental
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2uns1hMml" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2MeJNCCiu" rel="nofollow">Erik writes in</a></li>
<li><a href="http://slexy.org/view/s21fBXkP2K" rel="nofollow">SW writes in</a></li>
<li>[Bostjan writes in[(<a href="http://slexy.org/view/s20N9bfkum" rel="nofollow">http://slexy.org/view/s20N9bfkum</a>)</li>
<li><a href="http://slexy.org/view/s20FU9wUO5" rel="nofollow">Samuel writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;ve got some special treats for you this week on the show. It&#39;s the long-awaited &quot;installfest&quot; segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There&#39;s a lot to get to today on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/044009.html" rel="nofollow">FreeBSD&#39;s new testing infrastructure</a></h3>

<ul>
<li>A new test suite was added to FreeBSD, with 3 powerful machines available</li>
<li>Both -CURRENT and stable/10 have got the test suite build infrastructure in place</li>
<li>Designed to help developers test and improve major scalability across huge amounts of CPUs and RAM</li>
<li>More details <a href="http://julipedia.meroh.net/2013/12/introducing-freebsd-test-suite.html" rel="nofollow">available here</a></li>
<li>Could the iXsystems monster server be involved...?
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=138845902916897&w=2" rel="nofollow">OpenBSD gets signify</a></h3>

<ul>
<li>At long last, OpenBSD gets support for signed releases!</li>
<li>For &quot;the world&#39;s most secure OS&quot; it was very easy to MITM kernel patches, updates, installer isos, everything</li>
<li>A commit to the -current tree reveals a new &quot;signify&quot; tool is currently being kicked around</li>
<li>More details in <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">a blog post</a> from the guy who committed it</li>
<li>Quote: &quot;yeah, briefly, the plan is to sign sets and packages. that&#39;s still work in progress.&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.ca/2013/12/faces-of-freebsd-isabell-long.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>This time they interview Isabell Long</li>
<li>She&#39;s a volunteer staff member on the freenode IRC network</li>
<li>In 2011, she participated in the Google Code-In contest and became involved with documentation</li>
<li>&quot;The new committer mentoring process proved very useful and that, plus the accepting community of FreeBSD, are reasons why I stay involved.&quot;
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/12/31/msg019107.html" rel="nofollow">pkgsrc-2013Q4 branched</a></h3>

<ul>
<li>The quarterly pkgsrc branch from NetBSD is out</li>
<li>13472 total packages for NetBSD-current/amd64 + 13049 binary packages built with clang!</li>
<li>Lots of numbers and stats in the announcement</li>
<li>pkgsrc works on quite a few different OSes, not just NetBSD</li>
<li>See <a href="http://www.bsdnow.tv/episodes/2013_11_20-collecting_shells" rel="nofollow">our interview</a> with Amitai Schlair for a bit about pkgsrc
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=138610199311393&w=2" rel="nofollow">OpenBSD on Google&#39;s Compute Engine</a></h3>

<ul>
<li>Google Compute Engine is a &quot;cloud computing&quot; platform similar to EC2</li>
<li>Unfortunately, they only offer poor choices for the OS (Debian and CentOS)</li>
<li>Recently it&#39;s been announced that there is a custom OS option</li>
<li>It&#39;s using a WIP virtio-scsi driver, lots of things still need more work</li>
<li>Lots of technical and networking details about the struggles to get OpenBSD working on it
***</li>
</ul>

<h2>The Installfest</h2>

<p>We&#39;ll be showing you the installer of each of the main BSDs. As of the date this episode airs, we&#39;re using:</p>

<ul>
<li>FreeBSD 10.0</li>
<li>OpenBSD 5.4</li>
<li>NetBSD 6.1.2</li>
<li>DragonflyBSD 3.6</li>
<li>PCBSD 10.0
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://ctors.net/2013/12/30/openbsd_wireless_access_point" rel="nofollow">Building an OpenBSD wireless access point</a></h3>

<ul>
<li>A neat write up we found around the internet about making an OpenBSD wifi router</li>
<li>Goes through the process of PXE booting, installing base, using a serial console, setting up networking and wireless</li>
<li>Even includes a puffy sticker on the Soekris box at the end, how cute
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1919" rel="nofollow">FreeBSD 4.X jails on 10.0</a></h3>

<ul>
<li>Blog entry from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>For whatever reason (an &quot;in-house application&quot;), he needed to run a FreeBSD 4 jail in FreeBSD 10</li>
<li>Talks about the options he had: porting software, virtualizing, dealing with slow old hardware</li>
<li>He goes through the whole process of making an ancient jail</li>
<li>It&#39;s &quot;an acceptable trade-off, if it means I don’t have to touch actual PHP code.&quot;
***</li>
</ul>

<h3><a href="http://www.skeptech.org/blog/2013/01/13/unscrewed-a-story-about-openbsd/" rel="nofollow">Unscrewed: a story about OpenBSD</a></h3>

<ul>
<li>Pretty long blog post about how a network admin used OpenBSD to save the day</li>
<li>To set the tone, &quot;It was 5am, and the network was down&quot;</li>
<li>Great war story about replacing expensive routers and networking equipment with cheaper hardware and BSD</li>
<li>Mentions a lot of the built in tools and how OpenBSD is great for routers and high security applications
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC3 is out and ready to be tested</li>
<li>New detection of ATI Hybrid Graphics, they&#39;re working on nVidia next</li>
<li>Re-classifying Linux jails as unsupported / experimental
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2uns1hMml" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2MeJNCCiu" rel="nofollow">Erik writes in</a></li>
<li><a href="http://slexy.org/view/s21fBXkP2K" rel="nofollow">SW writes in</a></li>
<li>[Bostjan writes in[(<a href="http://slexy.org/view/s20N9bfkum" rel="nofollow">http://slexy.org/view/s20N9bfkum</a>)</li>
<li><a href="http://slexy.org/view/s20FU9wUO5" rel="nofollow">Samuel writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>12: Collecting SSHells</title>
  <link>https://www.bsdnow.tv/12</link>
  <guid isPermaLink="false">8552d8d2-0590-4641-9780-81ca0dc91bd1</guid>
  <pubDate>Wed, 20 Nov 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8552d8d2-0590-4641-9780-81ca0dc91bd1.mp3" length="49103236" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we'll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD's future plans and much more. After that, if you've ever wondered what all this SSH stuff is about, today's tutorial has got you covered. We'll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:08:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week we'll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD's future plans and much more. After that, if you've ever wondered what all this SSH stuff is about, today's tutorial has got you covered. We'll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.
Headlines
Faces of FreeBSD (http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-colin-percival.html)
The FreeBSD foundation is publishing articles on different FreeBSD developers
This one is about Colin Percival (cperciva@), the ex-security officer
Tells the story of how he first found BSD, what he contributed back, how he eventually became the security officer
Running series with more to come
***
Lots of BSD presentation videos uploaded (http://www.freebsdnews.net/2013/11/14/eurobsdcon-2013-devsummit-video-recordings/)
EuroBSDCon 2013 dev summit videos, AsiaBSDCon 2013 videos, MWL's presentation video
Most of us never get to see the dev summit talks since they're only for developers
AsiaBSDCon 2013 videos also up (https://www.youtube.com/user/bsdconferences) finally
List of AsiaBSDCon presentation topics here (http://2013.asiabsdcon.org/papers/index.html)
Our buddy Michael W Lucas gave an "OpenBSD for Linux users" talk (http://blather.michaelwlucas.com/archives/1879) at a Michigan Unix Users Group.
He says "Among other things, I compare OpenBSD to Richard Stallman and physically assault an audience member. We also talk long long time, memory randomization, PF, BSD license versus GPL, Microsoft and other OpenBSD stuff"
Really informative presentation, pretty long, answers some common questions at the end
***
Call for Presentations: FOSDEM 2014 and NYCBSDCon 2014 (https://blog.netbsd.org/tnf/entry/call_for_presentations_bsd_devroom)
FOSDEM 2014 will take place on 1–2 February, 2014, in Brussels, Belgium
Just like in the last years, there will be both a BSD booth and a developer's room
The topics of the devroom include all BSD operating systems. Every talk is welcome, from internal hacker discussion to real-world examples and presentations about new and shiny features.
If you are in the area or want to go, check the show notes for details
NYCBSDCon is also accepting papers (http://undeadly.org/cgi?action=article&amp;amp;sid=20131119053455).
It'll be in New York City at the beginning of February 2014
If anyone wants to give a talk at one of these conferences, go ahead and send in your stuff!
***
FreeBSD foundation's year-end fundraising campaign (https://lists.freebsd.org/pipermail/freebsd-announce/2013-November/001511.html)
The FreeBSD foundation has been supporting the FreeBSD project and community for over 13 years
As of today they have raised about half a million dollars, but still have a while to go
Donations go towards new features, paying for the server infrastructure, conferences, supporting the community, hiring full-time staff members and promoting FreeBSD at events
They are preparing the debut of a new online magazine, the FreeBSD Journal
Typically big companies make their huge donations in December, like a couple of anonymous donors that gave around $250,000 each last year
Make your donation today (http://www.freebsdfoundation.org/donate/) over at freebsdfoundation.org, every little bit helps
Everyone involved with BSD Now made a donation last year and will do so again this year
***
Interview - Amitai Schlair - schmonz@netbsd.org (mailto:schmonz@netbsd.org) / @schmonz (https://twitter.com/schmonz)
The NetBSD Foundation, pkgsrc, future plans
Tutorial
Combining SSH and tmux (http://www.bsdnow.tv/tutorials/ssh-tmux)
Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.
***
News Roundup
PS4 released (http://www.theregister.co.uk/2013/11/16/sony_playstation_4_kernel)
Sony's Playstation 4 is finally released
As previously thought, its OS is heavily based on FreeBSD and uses the kernel among other things
Link in the show notes contains the full list of BSD software they're using (http://www.scei.co.jp/ps4-license/)
Always good to see BSD being so widespread
***
BSD Mag November issue (http://bsdmag.org/magazine/1853-hast-on-freebsd-how-to-make-storage-highly-availble-by-using-hast)
Free monthly BSD magazine publishes another issue
This time their topics include: Configuring a Highly Available Service on FreeBSD, IT Inventory &amp;amp; Asset Management Automation, more FreeBSD Programming Primer, PfSense and Snort and a few others
PDF linked in the show notes
***
pbulk builds made easy (http://mail-index.netbsd.org/pkgsrc-users/2013/11/09/msg018881.html)
NetBSD's pbulk tool (https://www.netbsd.org/docs/pkgsrc/bulk.html) is similar to poudriere (http://www.bsdnow.tv/tutorials/poudriere), but for pkgsrc
While working on updating the documentation, a developer cleaned up quite a lot of code
He wrote a script that automates pbulk deployment and setup
The whole setup of a dedicated machine has been reduced to just three commands
***
PCBSD weekly digest (http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-111513/)
Over 200 PBIs have been populated in to the PC-BSD 10 Stable Appcafe
Many PC-BSD programs received some necessary bug fixes and updates
Some include network detection in the package and update managers, nvidia graphic detection, security updates for PCDM
***
Feedback/Questions
Peter writes in (http://slexy.org/view/s21oh3vP7t)
Kjell-Aleksander writes in (http://slexy.org/view/s21zfqcWMP)
Jordan writes in (http://slexy.org/view/s2ZmW77Odb)
Christian writes in (http://slexy.org/view/s2BZq7xiyo)
entransic writes in (http://slexy.org/view/s21xrk0M4k)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, openssh, gnu, screen, tmux, presentation, talk, foundation, fundraiser, donations, michael w lucas, linux, amitai schlair, schmonz, pkgsrc, tetris, devsummit, dev, developer, summit, eurobsdcon, eurobsdcon2013, 2013, sony, ps4, launch, playstation, playstation4, orbis os, orbisos, asiabsdcon, pbulk</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;ll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD&#39;s future plans and much more. After that, if you&#39;ve ever wondered what all this SSH stuff is about, today&#39;s tutorial has got you covered. We&#39;ll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-colin-percival.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>The FreeBSD foundation is publishing articles on different FreeBSD developers</li>
<li>This one is about Colin Percival (cperciva@), the ex-security officer</li>
<li>Tells the story of how he first found BSD, what he contributed back, how he eventually became the security officer</li>
<li>Running series with more to come
***</li>
</ul>

<h3><a href="http://www.freebsdnews.net/2013/11/14/eurobsdcon-2013-devsummit-video-recordings/" rel="nofollow">Lots of BSD presentation videos uploaded</a></h3>

<ul>
<li>EuroBSDCon 2013 dev summit videos, AsiaBSDCon 2013 videos, MWL&#39;s presentation video</li>
<li>Most of us never get to see the dev summit talks since they&#39;re only for developers</li>
<li><a href="https://www.youtube.com/user/bsdconferences" rel="nofollow">AsiaBSDCon 2013 videos also up</a> finally</li>
<li>List of AsiaBSDCon presentation topics <a href="http://2013.asiabsdcon.org/papers/index.html" rel="nofollow">here</a></li>
<li>Our buddy Michael W Lucas gave an <a href="http://blather.michaelwlucas.com/archives/1879" rel="nofollow">&quot;OpenBSD for Linux users&quot; talk</a> at a Michigan Unix Users Group.</li>
<li>He says &quot;Among other things, I compare OpenBSD to Richard Stallman and physically assault an audience member. We also talk long long time, memory randomization, PF, BSD license versus GPL, Microsoft and other OpenBSD stuff&quot;</li>
<li>Really informative presentation, pretty long, answers some common questions at the end
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/call_for_presentations_bsd_devroom" rel="nofollow">Call for Presentations: FOSDEM 2014 and NYCBSDCon 2014</a></h3>

<ul>
<li>FOSDEM 2014 will take place on 1–2 February, 2014, in Brussels, Belgium</li>
<li>Just like in the last years, there will be both a BSD booth and a developer&#39;s room</li>
<li>The topics of the devroom include all BSD operating systems. Every talk is welcome, from internal hacker discussion to real-world examples and presentations about new and shiny features.</li>
<li>If you are in the area or want to go, check the show notes for details</li>
<li>NYCBSDCon <a href="http://undeadly.org/cgi?action=article&sid=20131119053455" rel="nofollow">is also accepting papers</a>.</li>
<li>It&#39;ll be in New York City at the beginning of February 2014</li>
<li>If anyone wants to give a talk at one of these conferences, go ahead and send in your stuff!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2013-November/001511.html" rel="nofollow">FreeBSD foundation&#39;s year-end fundraising campaign</a></h3>

<ul>
<li>The FreeBSD foundation has been supporting the FreeBSD project and community for over 13 years</li>
<li>As of today they have raised about half a million dollars, but still have a while to go</li>
<li>Donations go towards new features, paying for the server infrastructure, conferences, supporting the community, hiring full-time staff members and promoting FreeBSD at events</li>
<li>They are preparing the debut of a new online magazine, the FreeBSD Journal</li>
<li>Typically big companies make their huge donations in December, like a couple of anonymous donors that gave around $250,000 each last year</li>
<li><a href="http://www.freebsdfoundation.org/donate/" rel="nofollow">Make your donation today</a> over at freebsdfoundation.org, every little bit helps</li>
<li>Everyone involved with BSD Now made a donation last year and will do so again this year
***</li>
</ul>

<h2>Interview - Amitai Schlair - <a href="mailto:schmonz@netbsd.org" rel="nofollow">schmonz@netbsd.org</a> / <a href="https://twitter.com/schmonz" rel="nofollow">@schmonz</a></h2>

<p>The NetBSD Foundation, pkgsrc, future plans</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">Combining SSH and tmux</a></h3>

<ul>
<li><strong>Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.</strong>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.theregister.co.uk/2013/11/16/sony_playstation_4_kernel" rel="nofollow">PS4 released</a></h3>

<ul>
<li>Sony&#39;s Playstation 4 is finally released</li>
<li>As previously thought, its OS is heavily based on FreeBSD and uses the kernel among other things</li>
<li>Link in the show notes contains the <a href="http://www.scei.co.jp/ps4-license/" rel="nofollow">full list of BSD software they&#39;re using</a></li>
<li>Always good to see BSD being so widespread
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1853-hast-on-freebsd-how-to-make-storage-highly-availble-by-using-hast" rel="nofollow">BSD Mag November issue</a></h3>

<ul>
<li>Free monthly BSD magazine publishes another issue</li>
<li>This time their topics include: Configuring a Highly Available Service on FreeBSD, IT Inventory &amp; Asset Management Automation, more FreeBSD Programming Primer, PfSense and Snort and a few others</li>
<li>PDF linked in the show notes
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/11/09/msg018881.html" rel="nofollow">pbulk builds made easy</a></h3>

<ul>
<li>NetBSD&#39;s <a href="https://www.netbsd.org/docs/pkgsrc/bulk.html" rel="nofollow">pbulk tool</a> is similar to <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, but for pkgsrc</li>
<li>While working on updating the documentation, a developer cleaned up quite a lot of code</li>
<li>He wrote a script that automates pbulk deployment and setup</li>
<li>The whole setup of a dedicated machine has been reduced to just three commands
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-111513/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Over 200 PBIs have been populated in to the PC-BSD 10 Stable Appcafe</li>
<li>Many PC-BSD programs received some necessary bug fixes and updates</li>
<li>Some include network detection in the package and update managers, nvidia graphic detection, security updates for PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21oh3vP7t" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21zfqcWMP" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2ZmW77Odb" rel="nofollow">Jordan writes in</a></li>
<li><a href="http://slexy.org/view/s2BZq7xiyo" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21xrk0M4k" rel="nofollow">entransic writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;ll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD&#39;s future plans and much more. After that, if you&#39;ve ever wondered what all this SSH stuff is about, today&#39;s tutorial has got you covered. We&#39;ll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-colin-percival.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>The FreeBSD foundation is publishing articles on different FreeBSD developers</li>
<li>This one is about Colin Percival (cperciva@), the ex-security officer</li>
<li>Tells the story of how he first found BSD, what he contributed back, how he eventually became the security officer</li>
<li>Running series with more to come
***</li>
</ul>

<h3><a href="http://www.freebsdnews.net/2013/11/14/eurobsdcon-2013-devsummit-video-recordings/" rel="nofollow">Lots of BSD presentation videos uploaded</a></h3>

<ul>
<li>EuroBSDCon 2013 dev summit videos, AsiaBSDCon 2013 videos, MWL&#39;s presentation video</li>
<li>Most of us never get to see the dev summit talks since they&#39;re only for developers</li>
<li><a href="https://www.youtube.com/user/bsdconferences" rel="nofollow">AsiaBSDCon 2013 videos also up</a> finally</li>
<li>List of AsiaBSDCon presentation topics <a href="http://2013.asiabsdcon.org/papers/index.html" rel="nofollow">here</a></li>
<li>Our buddy Michael W Lucas gave an <a href="http://blather.michaelwlucas.com/archives/1879" rel="nofollow">&quot;OpenBSD for Linux users&quot; talk</a> at a Michigan Unix Users Group.</li>
<li>He says &quot;Among other things, I compare OpenBSD to Richard Stallman and physically assault an audience member. We also talk long long time, memory randomization, PF, BSD license versus GPL, Microsoft and other OpenBSD stuff&quot;</li>
<li>Really informative presentation, pretty long, answers some common questions at the end
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/call_for_presentations_bsd_devroom" rel="nofollow">Call for Presentations: FOSDEM 2014 and NYCBSDCon 2014</a></h3>

<ul>
<li>FOSDEM 2014 will take place on 1–2 February, 2014, in Brussels, Belgium</li>
<li>Just like in the last years, there will be both a BSD booth and a developer&#39;s room</li>
<li>The topics of the devroom include all BSD operating systems. Every talk is welcome, from internal hacker discussion to real-world examples and presentations about new and shiny features.</li>
<li>If you are in the area or want to go, check the show notes for details</li>
<li>NYCBSDCon <a href="http://undeadly.org/cgi?action=article&sid=20131119053455" rel="nofollow">is also accepting papers</a>.</li>
<li>It&#39;ll be in New York City at the beginning of February 2014</li>
<li>If anyone wants to give a talk at one of these conferences, go ahead and send in your stuff!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2013-November/001511.html" rel="nofollow">FreeBSD foundation&#39;s year-end fundraising campaign</a></h3>

<ul>
<li>The FreeBSD foundation has been supporting the FreeBSD project and community for over 13 years</li>
<li>As of today they have raised about half a million dollars, but still have a while to go</li>
<li>Donations go towards new features, paying for the server infrastructure, conferences, supporting the community, hiring full-time staff members and promoting FreeBSD at events</li>
<li>They are preparing the debut of a new online magazine, the FreeBSD Journal</li>
<li>Typically big companies make their huge donations in December, like a couple of anonymous donors that gave around $250,000 each last year</li>
<li><a href="http://www.freebsdfoundation.org/donate/" rel="nofollow">Make your donation today</a> over at freebsdfoundation.org, every little bit helps</li>
<li>Everyone involved with BSD Now made a donation last year and will do so again this year
***</li>
</ul>

<h2>Interview - Amitai Schlair - <a href="mailto:schmonz@netbsd.org" rel="nofollow">schmonz@netbsd.org</a> / <a href="https://twitter.com/schmonz" rel="nofollow">@schmonz</a></h2>

<p>The NetBSD Foundation, pkgsrc, future plans</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">Combining SSH and tmux</a></h3>

<ul>
<li><strong>Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.</strong>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.theregister.co.uk/2013/11/16/sony_playstation_4_kernel" rel="nofollow">PS4 released</a></h3>

<ul>
<li>Sony&#39;s Playstation 4 is finally released</li>
<li>As previously thought, its OS is heavily based on FreeBSD and uses the kernel among other things</li>
<li>Link in the show notes contains the <a href="http://www.scei.co.jp/ps4-license/" rel="nofollow">full list of BSD software they&#39;re using</a></li>
<li>Always good to see BSD being so widespread
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1853-hast-on-freebsd-how-to-make-storage-highly-availble-by-using-hast" rel="nofollow">BSD Mag November issue</a></h3>

<ul>
<li>Free monthly BSD magazine publishes another issue</li>
<li>This time their topics include: Configuring a Highly Available Service on FreeBSD, IT Inventory &amp; Asset Management Automation, more FreeBSD Programming Primer, PfSense and Snort and a few others</li>
<li>PDF linked in the show notes
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/11/09/msg018881.html" rel="nofollow">pbulk builds made easy</a></h3>

<ul>
<li>NetBSD&#39;s <a href="https://www.netbsd.org/docs/pkgsrc/bulk.html" rel="nofollow">pbulk tool</a> is similar to <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, but for pkgsrc</li>
<li>While working on updating the documentation, a developer cleaned up quite a lot of code</li>
<li>He wrote a script that automates pbulk deployment and setup</li>
<li>The whole setup of a dedicated machine has been reduced to just three commands
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-111513/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Over 200 PBIs have been populated in to the PC-BSD 10 Stable Appcafe</li>
<li>Many PC-BSD programs received some necessary bug fixes and updates</li>
<li>Some include network detection in the package and update managers, nvidia graphic detection, security updates for PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21oh3vP7t" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21zfqcWMP" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2ZmW77Odb" rel="nofollow">Jordan writes in</a></li>
<li><a href="http://slexy.org/view/s2BZq7xiyo" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21xrk0M4k" rel="nofollow">entransic writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
