<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 12 Apr 2026 08:46:50 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Qemu”</title>
    <link>https://www.bsdnow.tv/tags/qemu</link>
    <pubDate>Thu, 09 Sep 2021 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>419: Rethinking OS installs</title>
  <link>https://www.bsdnow.tv/419</link>
  <guid isPermaLink="false">4fb1ef2f-3915-403b-9687-47451b3339a9</guid>
  <pubDate>Thu, 09 Sep 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4fb1ef2f-3915-403b-9687-47451b3339a9.mp3" length="33694320" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.</itunes:subtitle>
  <itunes:duration>51:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
Reviewing my first OpenBSD port, and what I'd do differently 10 years later (https://briancallahan.net/blog/20210802.html)
Install NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11 (https://raymii.org/s/articles/NetBSD_on_QEMU_Alpha.html)
News Roundup
FreeBSD Experiment Rethinks the OS Install (https://hackaday.com/2021/08/10/freebsd-experiment-rethinks-the-os-install/)
The switch to FreeBSD rc.d is coming (https://www.ghostbsd.org/rc_switch)
Irix gets LLVM (https://forums.irixnet.org/thread-3043.html)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Miceal - a few questions (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Miceal%20-%20a%20few%20questions.md)
Nelson - dummynet (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Nelson%20-%20dummynet.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, port, review, done differently, learning, retrospect, DEC, alpha cpu, qemu, x11, os install, rethink, ghostbsd, rc.d, irix, llvm </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://briancallahan.net/blog/20210802.html" rel="nofollow">Reviewing my first OpenBSD port, and what I&#39;d do differently 10 years later</a></h3>

<hr>

<h3><a href="https://raymii.org/s/articles/NetBSD_on_QEMU_Alpha.html" rel="nofollow">Install NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://hackaday.com/2021/08/10/freebsd-experiment-rethinks-the-os-install/" rel="nofollow">FreeBSD Experiment Rethinks the OS Install</a></h3>

<hr>

<h3><a href="https://www.ghostbsd.org/rc_switch" rel="nofollow">The switch to FreeBSD rc.d is coming</a></h3>

<hr>

<h3><a href="https://forums.irixnet.org/thread-3043.html" rel="nofollow">Irix gets LLVM</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Miceal%20-%20a%20few%20questions.md" rel="nofollow">Miceal - a few questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Nelson%20-%20dummynet.md" rel="nofollow">Nelson - dummynet</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://briancallahan.net/blog/20210802.html" rel="nofollow">Reviewing my first OpenBSD port, and what I&#39;d do differently 10 years later</a></h3>

<hr>

<h3><a href="https://raymii.org/s/articles/NetBSD_on_QEMU_Alpha.html" rel="nofollow">Install NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://hackaday.com/2021/08/10/freebsd-experiment-rethinks-the-os-install/" rel="nofollow">FreeBSD Experiment Rethinks the OS Install</a></h3>

<hr>

<h3><a href="https://www.ghostbsd.org/rc_switch" rel="nofollow">The switch to FreeBSD rc.d is coming</a></h3>

<hr>

<h3><a href="https://forums.irixnet.org/thread-3043.html" rel="nofollow">Irix gets LLVM</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Miceal%20-%20a%20few%20questions.md" rel="nofollow">Miceal - a few questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Nelson%20-%20dummynet.md" rel="nofollow">Nelson - dummynet</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>402: Goodbye GPL</title>
  <link>https://www.bsdnow.tv/402</link>
  <guid isPermaLink="false">8fa4abac-1e15-4f91-8893-ca72a65c95c1</guid>
  <pubDate>Thu, 13 May 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8fa4abac-1e15-4f91-8893-ca72a65c95c1.mp3" length="30499968" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's time to say goodbye to the GPL, a new OCI Runtime for FreeBSD Jails, A bit of Xenix history, On Updating QEMU's bsd-user fork, FreeBSD 13 on a 12 year old laptop, and more </itunes:subtitle>
  <itunes:duration>49:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>It's time to say goodbye to the GPL, a new OCI Runtime for FreeBSD Jails, A bit of Xenix history, On Updating QEMU's bsd-user fork, FreeBSD 13 on a 12 year old laptop, and more. 
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
It's time to say goodbye to the GPL (https://martin.kleppmann.com/2021/04/14/goodbye-gpl.html)
The trigger for this post is the reinstating of Richard Stallman, a very problematic character, to the board of the Free Software Foundation (FSF). I am appalled by this move, and join others in the call for his removal.
This occasion has caused me to reevaluate the position of the FSF in computing. It is the steward of the GNU project (a part of Linux distributions, loosely speaking), and of a family of software licenses centred around the GNU General Public License (GPL). These efforts are unfortunately tainted by Stallman’s behaviour. However, this is not what I actually want to talk about today.
runj: a new OCI Runtime for FreeBSD Jails (https://samuel.karp.dev/blog/2021/03/runj-a-new-oci-runtime-for-freebsd-jails/)
Today, I open-sourced runj, a new experimental, proof-of-concept OCI-compatible runtime for FreeBSD jails. For the past 6.5 years I’ve been working on Linux containers, but never really had much experience with FreeBSD jails. runj (pronounced “run jay”) is a vehicle for me to learn more about FreeBSD in general and jails in particular. With my position on the Technical Oversight Board of the Open Containers Initiative, I’m also interested in understanding how the OCI runtime specification can be adapted to other operating systems like FreeBSD.
News Roundup
A Bit of Xenix History (http://seefigure1.com/2014/04/15/xenixtime.html)
From 1986 to 1989, I worked in the Xenix1 group at Microsoft. It was my first job out of school, and I was the most junior person on the team. I was hopelessly naive, inexperienced, generally clueless, and borderline incompetent, but my coworkers were kind, supportive and enormously forgiving – just a lovely bunch of folks.
On Updating QEMU's bsd-user fork (https://bsdimp.blogspot.com/2021/05/on-updating-qemus-bsd-user-fork.html)
FreeBSD 13 on a 12 year old laptop (http://box.matto.nl/freebsd-13-on-a-12-year-old-laptop.html)
My old (2009) HP laptop now runs FreeBSD 13.0-RELEASE.
Beastie Bits
Registration is now open for the June 2021 #FreeBSD Developers Summit (https://twitter.com/i/web/status/1387797859479732227)
6.0RC1 images available (https://www.dragonflydigest.com/2021/04/22/25663.html)
Lexical File Names in Plan 9 or Getting Dot-Dot Right (https://plan9.io/sys/doc/lexnames.pdf)
The history of UTF-8 as told by Rob Pike (http://doc.cat-v.org/bell_labs/utf-8_history)
Initial Support for the riscv64 Architecture (http://undeadly.org/cgi?action=article;sid=20210423090342)
***
###Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Hamza - Congrats on 400 (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/402/feedback/Hamza%20-%20Congrats%20on%20400)
Renato - DTS and ContainerD (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/402/feedback/Renato%20-%20DTS%20and%20ContainerD)
Rob - Music (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/402/feedback/Rob%20-%20Music)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, gpl, goodbye, oci, runtime, jails, xenix, qemu, bsd-user, fork, laptop</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s time to say goodbye to the GPL, a new OCI Runtime for FreeBSD Jails, A bit of Xenix history, On Updating QEMU&#39;s bsd-user fork, FreeBSD 13 on a 12 year old laptop, and more. </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://martin.kleppmann.com/2021/04/14/goodbye-gpl.html" rel="nofollow">It&#39;s time to say goodbye to the GPL</a></h3>

<blockquote>
<p>The trigger for this post is the reinstating of Richard Stallman, a very problematic character, to the board of the Free Software Foundation (FSF). I am appalled by this move, and join others in the call for his removal.<br>
This occasion has caused me to reevaluate the position of the FSF in computing. It is the steward of the GNU project (a part of Linux distributions, loosely speaking), and of a family of software licenses centred around the GNU General Public License (GPL). These efforts are unfortunately tainted by Stallman’s behaviour. However, this is not what I actually want to talk about today.</p>

<hr>

<h3><a href="https://samuel.karp.dev/blog/2021/03/runj-a-new-oci-runtime-for-freebsd-jails/" rel="nofollow">runj: a new OCI Runtime for FreeBSD Jails</a></h3>

<p>Today, I open-sourced runj, a new experimental, proof-of-concept OCI-compatible runtime for FreeBSD jails. For the past 6.5 years I’ve been working on Linux containers, but never really had much experience with FreeBSD jails. runj (pronounced “run jay”) is a vehicle for me to learn more about FreeBSD in general and jails in particular. With my position on the Technical Oversight Board of the Open Containers Initiative, I’m also interested in understanding how the OCI runtime specification can be adapted to other operating systems like FreeBSD.</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://seefigure1.com/2014/04/15/xenixtime.html" rel="nofollow">A Bit of Xenix History</a></h3>

<p>From 1986 to 1989, I worked in the Xenix1 group at Microsoft. It was my first job out of school, and I was the most junior person on the team. I was hopelessly naive, inexperienced, generally clueless, and borderline incompetent, but my coworkers were kind, supportive and enormously forgiving – just a lovely bunch of folks.</p>

<hr>

<h3><a href="https://bsdimp.blogspot.com/2021/05/on-updating-qemus-bsd-user-fork.html" rel="nofollow">On Updating QEMU&#39;s bsd-user fork</a></h3>

<hr>
</blockquote>

<h3><a href="http://box.matto.nl/freebsd-13-on-a-12-year-old-laptop.html" rel="nofollow">FreeBSD 13 on a 12 year old laptop</a></h3>

<blockquote>
<p>My old (2009) HP laptop now runs FreeBSD 13.0-RELEASE.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/i/web/status/1387797859479732227" rel="nofollow">Registration is now open for the June 2021 #FreeBSD Developers Summit</a></li>
<li><a href="https://www.dragonflydigest.com/2021/04/22/25663.html" rel="nofollow">6.0RC1 images available</a></li>
<li><a href="https://plan9.io/sys/doc/lexnames.pdf" rel="nofollow">Lexical File Names in Plan 9 or Getting Dot-Dot Right</a></li>
<li><a href="http://doc.cat-v.org/bell_labs/utf-8_history" rel="nofollow">The history of UTF-8 as told by Rob Pike</a></li>
<li><a href="http://undeadly.org/cgi?action=article;sid=20210423090342" rel="nofollow">Initial Support for the riscv64 Architecture</a>
***
###Tarsnap</li>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/402/feedback/Hamza%20-%20Congrats%20on%20400" rel="nofollow">Hamza - Congrats on 400</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/402/feedback/Renato%20-%20DTS%20and%20ContainerD" rel="nofollow">Renato - DTS and ContainerD</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/402/feedback/Rob%20-%20Music" rel="nofollow">Rob - Music</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s time to say goodbye to the GPL, a new OCI Runtime for FreeBSD Jails, A bit of Xenix history, On Updating QEMU&#39;s bsd-user fork, FreeBSD 13 on a 12 year old laptop, and more. </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://martin.kleppmann.com/2021/04/14/goodbye-gpl.html" rel="nofollow">It&#39;s time to say goodbye to the GPL</a></h3>

<blockquote>
<p>The trigger for this post is the reinstating of Richard Stallman, a very problematic character, to the board of the Free Software Foundation (FSF). I am appalled by this move, and join others in the call for his removal.<br>
This occasion has caused me to reevaluate the position of the FSF in computing. It is the steward of the GNU project (a part of Linux distributions, loosely speaking), and of a family of software licenses centred around the GNU General Public License (GPL). These efforts are unfortunately tainted by Stallman’s behaviour. However, this is not what I actually want to talk about today.</p>

<hr>

<h3><a href="https://samuel.karp.dev/blog/2021/03/runj-a-new-oci-runtime-for-freebsd-jails/" rel="nofollow">runj: a new OCI Runtime for FreeBSD Jails</a></h3>

<p>Today, I open-sourced runj, a new experimental, proof-of-concept OCI-compatible runtime for FreeBSD jails. For the past 6.5 years I’ve been working on Linux containers, but never really had much experience with FreeBSD jails. runj (pronounced “run jay”) is a vehicle for me to learn more about FreeBSD in general and jails in particular. With my position on the Technical Oversight Board of the Open Containers Initiative, I’m also interested in understanding how the OCI runtime specification can be adapted to other operating systems like FreeBSD.</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://seefigure1.com/2014/04/15/xenixtime.html" rel="nofollow">A Bit of Xenix History</a></h3>

<p>From 1986 to 1989, I worked in the Xenix1 group at Microsoft. It was my first job out of school, and I was the most junior person on the team. I was hopelessly naive, inexperienced, generally clueless, and borderline incompetent, but my coworkers were kind, supportive and enormously forgiving – just a lovely bunch of folks.</p>

<hr>

<h3><a href="https://bsdimp.blogspot.com/2021/05/on-updating-qemus-bsd-user-fork.html" rel="nofollow">On Updating QEMU&#39;s bsd-user fork</a></h3>

<hr>
</blockquote>

<h3><a href="http://box.matto.nl/freebsd-13-on-a-12-year-old-laptop.html" rel="nofollow">FreeBSD 13 on a 12 year old laptop</a></h3>

<blockquote>
<p>My old (2009) HP laptop now runs FreeBSD 13.0-RELEASE.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/i/web/status/1387797859479732227" rel="nofollow">Registration is now open for the June 2021 #FreeBSD Developers Summit</a></li>
<li><a href="https://www.dragonflydigest.com/2021/04/22/25663.html" rel="nofollow">6.0RC1 images available</a></li>
<li><a href="https://plan9.io/sys/doc/lexnames.pdf" rel="nofollow">Lexical File Names in Plan 9 or Getting Dot-Dot Right</a></li>
<li><a href="http://doc.cat-v.org/bell_labs/utf-8_history" rel="nofollow">The history of UTF-8 as told by Rob Pike</a></li>
<li><a href="http://undeadly.org/cgi?action=article;sid=20210423090342" rel="nofollow">Initial Support for the riscv64 Architecture</a>
***
###Tarsnap</li>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/402/feedback/Hamza%20-%20Congrats%20on%20400" rel="nofollow">Hamza - Congrats on 400</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/402/feedback/Renato%20-%20DTS%20and%20ContainerD" rel="nofollow">Renato - DTS and ContainerD</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/402/feedback/Rob%20-%20Music" rel="nofollow">Rob - Music</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>352: Introducing Randomness</title>
  <link>https://www.bsdnow.tv/352</link>
  <guid isPermaLink="false">a4aba73b-ccc0-41d3-bd39-45783e594bd3</guid>
  <pubDate>Thu, 28 May 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a4aba73b-ccc0-41d3-bd39-45783e594bd3.mp3" length="45132517" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>A brief introduction to randomness, logs grinding netatalk to a halt, NetBSD core team changes, Using qemu guest agent on OpenBSD kvm/qemu guests, WireGuard patchset for OpenBSD, FreeBSD 12.1 on a laptop, and more.</itunes:subtitle>
  <itunes:duration>50:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>A brief introduction to randomness, logs grinding netatalk to a halt, NetBSD core team changes, Using qemu guest agent on OpenBSD kvm/qemu guests, WireGuard patchset for OpenBSD, FreeBSD 12.1 on a laptop, and more.
Headlines
Entropy (https://washbear.neocities.org/entropy.html)
A brief introduction to randomness
Problem: Computers are very predictable. This is by design.
But what if we want them to act unpredictably? This is very useful if we want to secure our private communications with randomized keys, or not let people cheat at video games, or if we're doing statistical simulations or similar.
Logs grinding Netatalk on FreeBSD to a hault (https://rubenerd.com/logs-grinding-netatalk-on-freebsd-to-a-hault/)
I’ve heard it said the cobbler’s children walk barefoot. While posessing the qualities of a famed financial investment strategy, it speaks to how we generally put more effort into things for others than ourselves; at least in business.
The HP Microserver I share with Clara is a modest affair compared to what we run at work. It has six spinning rust drives and two SSDs which are ZFS-mirrored; not even in a RAID 10 equivalent. This is underlaid with GELI for encryption, and served to our Macs with Netatalk over gigabit Ethernet with jumbo frames.
News Roundup
NetBSD Core Team Changes (https://mail-index.netbsd.org/netbsd-announce/2020/05/07/msg000314.html)
Matt Thomas (matt@) has served on the NetBSD core team for over ten years, and has made many contributions, including ELF functionality, being the long-time VAX maintainer, gcc contributor, the generic pmap, and also networking functionality, and platform bring-up over the years.  Matt has stepped down from the NetBSD core team, and we thank him for his many, extensive contributions.
Robert Elz (kre@), a long time BSD contributor, has kindly accepted the offer to join the core team, and help us out with the benefit of his experience and advice over many years.  Amongst other things, Robert has been maintaining our shell, liaising with the Austin Group, and bringing it up to date with modern functionality.
Using qemu guest agent on OpenBSD kvm/qemu guests (https://undeadly.org/cgi?action=article;sid=20200514073852)
In a post to the ports@ mailing list, Landry Breuil (landry@) shared some of his notes on using qemu guest agent on OpenBSD kvm/qemu guests.
WireGuard patchset for OpenBSD (https://undeadly.org/cgi?action=article;sid=20200512080047)
A while ago I wanted to learn more about OpenBSD development. So I picked a project, in this case WireGuard, to develop a native client for. Over the last two years, with many different iterations, and working closely with the WireGuard's creator (Jason [Jason A. Donenfeld - Ed.], CC'd), it started to become a serious project eventually reaching parity with other official implementations. Finally, we are here and I think it is time for any further development to happen inside the src tree.
FreeBSD 12.1 on a laptop (https://dataswamp.org/~solene/2020-05-11-freebsd-workstation.html)
I’m using FreeBSD again on a laptop for some reasons so expect to read more about FreeBSD here. This tutorial explain how to get a graphical desktop using FreeBSD 12.1.
Beastie Bits
List of useful FreeBSD Commands (https://medium.com/@tdebarbora/list-of-useful-freebsd-commands-92dffb8f8c57)
Master Your Network With Unix Command Line Tools (https://itnext.io/master-your-network-with-unix-command-line-tools-790bdd3b3b87)
Original Unix containers aka FreeBSD jails (https://twitter.com/nixcraft/status/1257674069387993088)
Flashback : 2003 Article : Bill Joy's greatest gift to man – the vi editor (https://www.theregister.co.uk/2003/09/11/bill_joys_greatest_gift/)
FreeBSD Journal March/April 2020 Filesystems: ZFS Encryption, FUSE, and more, plus Network Bridges (https://www.freebsdfoundation.org/past-issues/filesystems/)
HAMBug meeting will be online again in June, so those from all over the world are welcome to join, June 9th (2nd Tuesday of each month) at 18:30 Eastern (https://www.hambug.ca/)
Feedback/Questions
+ Lyubomir - GELI and ZFS (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Lyubomir%20-%20GELI%20and%20ZFS.md)
Patrick - powerd and powerd++ (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Patrick%20-%20powerd%20and%20powerd%2B%2B.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, random, randomness, entropy, logs, netatalk, core team, changes, qemu, guest agent, kvm, wireguard, patchset, laptop, notebook</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A brief introduction to randomness, logs grinding netatalk to a halt, NetBSD core team changes, Using qemu guest agent on OpenBSD kvm/qemu guests, WireGuard patchset for OpenBSD, FreeBSD 12.1 on a laptop, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://washbear.neocities.org/entropy.html" rel="nofollow">Entropy</a></h3>

<blockquote>
<blockquote>
<p>A brief introduction to randomness</p>
</blockquote>
</blockquote>

<ul>
<li>Problem: Computers are very predictable. This is by design.</li>
</ul>

<blockquote>
<p>But what if we want them to act unpredictably? This is very useful if we want to secure our private communications with randomized keys, or not let people cheat at video games, or if we&#39;re doing statistical simulations or similar.</p>
</blockquote>

<hr>

<h3><a href="https://rubenerd.com/logs-grinding-netatalk-on-freebsd-to-a-hault/" rel="nofollow">Logs grinding Netatalk on FreeBSD to a hault</a></h3>

<blockquote>
<blockquote>
<p>I’ve heard it said the cobbler’s children walk barefoot. While posessing the qualities of a famed financial investment strategy, it speaks to how we generally put more effort into things for others than ourselves; at least in business.<br>
The HP Microserver I share with Clara is a modest affair compared to what we run at work. It has six spinning rust drives and two SSDs which are ZFS-mirrored; not even in a RAID 10 equivalent. This is underlaid with GELI for encryption, and served to our Macs with Netatalk over gigabit Ethernet with jumbo frames.</p>
</blockquote>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-announce/2020/05/07/msg000314.html" rel="nofollow">NetBSD Core Team Changes</a></h3>

<blockquote>
<p>Matt Thomas (matt@) has served on the NetBSD core team for over ten years, and has made many contributions, including ELF functionality, being the long-time VAX maintainer, gcc contributor, the generic pmap, and also networking functionality, and platform bring-up over the years.  Matt has stepped down from the NetBSD core team, and we thank him for his many, extensive contributions.<br>
Robert Elz (kre@), a long time BSD contributor, has kindly accepted the offer to join the core team, and help us out with the benefit of his experience and advice over many years.  Amongst other things, Robert has been maintaining our shell, liaising with the Austin Group, and bringing it up to date with modern functionality.</p>

<hr>
</blockquote>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20200514073852" rel="nofollow">Using qemu guest agent on OpenBSD kvm/qemu guests</a></h3>

<blockquote>
<p>In a post to the ports@ mailing list, Landry Breuil (landry@) shared some of his notes on using qemu guest agent on OpenBSD kvm/qemu guests.</p>
</blockquote>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20200512080047" rel="nofollow">WireGuard patchset for OpenBSD</a></h3>

<blockquote>
<p>A while ago I wanted to learn more about OpenBSD development. So I picked a project, in this case WireGuard, to develop a native client for. Over the last two years, with many different iterations, and working closely with the WireGuard&#39;s creator (Jason [Jason A. Donenfeld - Ed.], CC&#39;d), it started to become a serious project eventually reaching parity with other official implementations. Finally, we are here and I think it is time for any further development to happen inside the src tree.</p>

<hr>
</blockquote>

<h3><a href="https://dataswamp.org/%7Esolene/2020-05-11-freebsd-workstation.html" rel="nofollow">FreeBSD 12.1 on a laptop</a></h3>

<blockquote>
<p>I’m using FreeBSD again on a laptop for some reasons so expect to read more about FreeBSD here. This tutorial explain how to get a graphical desktop using FreeBSD 12.1.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://medium.com/@tdebarbora/list-of-useful-freebsd-commands-92dffb8f8c57" rel="nofollow">List of useful FreeBSD Commands</a></li>
<li><a href="https://itnext.io/master-your-network-with-unix-command-line-tools-790bdd3b3b87" rel="nofollow">Master Your Network With Unix Command Line Tools</a></li>
<li><a href="https://twitter.com/nixcraft/status/1257674069387993088" rel="nofollow">Original Unix containers aka FreeBSD jails</a></li>
<li><a href="https://www.theregister.co.uk/2003/09/11/bill_joys_greatest_gift/" rel="nofollow">Flashback : 2003 Article : Bill Joy&#39;s greatest gift to man – the vi editor</a></li>
<li><a href="https://www.freebsdfoundation.org/past-issues/filesystems/" rel="nofollow">FreeBSD Journal March/April 2020 Filesystems: ZFS Encryption, FUSE, and more, plus Network Bridges</a></li>
<li><a href="https://www.hambug.ca/" rel="nofollow">HAMBug meeting will be online again in June, so those from all over the world are welcome to join, June 9th (2nd Tuesday of each month) at 18:30 Eastern</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>+ <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Lyubomir%20-%20GELI%20and%20ZFS.md" rel="nofollow">Lyubomir - GELI and ZFS</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Patrick%20-%20powerd%20and%20powerd%2B%2B.md" rel="nofollow">Patrick - powerd and powerd++</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A brief introduction to randomness, logs grinding netatalk to a halt, NetBSD core team changes, Using qemu guest agent on OpenBSD kvm/qemu guests, WireGuard patchset for OpenBSD, FreeBSD 12.1 on a laptop, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://washbear.neocities.org/entropy.html" rel="nofollow">Entropy</a></h3>

<blockquote>
<blockquote>
<p>A brief introduction to randomness</p>
</blockquote>
</blockquote>

<ul>
<li>Problem: Computers are very predictable. This is by design.</li>
</ul>

<blockquote>
<p>But what if we want them to act unpredictably? This is very useful if we want to secure our private communications with randomized keys, or not let people cheat at video games, or if we&#39;re doing statistical simulations or similar.</p>
</blockquote>

<hr>

<h3><a href="https://rubenerd.com/logs-grinding-netatalk-on-freebsd-to-a-hault/" rel="nofollow">Logs grinding Netatalk on FreeBSD to a hault</a></h3>

<blockquote>
<blockquote>
<p>I’ve heard it said the cobbler’s children walk barefoot. While posessing the qualities of a famed financial investment strategy, it speaks to how we generally put more effort into things for others than ourselves; at least in business.<br>
The HP Microserver I share with Clara is a modest affair compared to what we run at work. It has six spinning rust drives and two SSDs which are ZFS-mirrored; not even in a RAID 10 equivalent. This is underlaid with GELI for encryption, and served to our Macs with Netatalk over gigabit Ethernet with jumbo frames.</p>
</blockquote>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-announce/2020/05/07/msg000314.html" rel="nofollow">NetBSD Core Team Changes</a></h3>

<blockquote>
<p>Matt Thomas (matt@) has served on the NetBSD core team for over ten years, and has made many contributions, including ELF functionality, being the long-time VAX maintainer, gcc contributor, the generic pmap, and also networking functionality, and platform bring-up over the years.  Matt has stepped down from the NetBSD core team, and we thank him for his many, extensive contributions.<br>
Robert Elz (kre@), a long time BSD contributor, has kindly accepted the offer to join the core team, and help us out with the benefit of his experience and advice over many years.  Amongst other things, Robert has been maintaining our shell, liaising with the Austin Group, and bringing it up to date with modern functionality.</p>

<hr>
</blockquote>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20200514073852" rel="nofollow">Using qemu guest agent on OpenBSD kvm/qemu guests</a></h3>

<blockquote>
<p>In a post to the ports@ mailing list, Landry Breuil (landry@) shared some of his notes on using qemu guest agent on OpenBSD kvm/qemu guests.</p>
</blockquote>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20200512080047" rel="nofollow">WireGuard patchset for OpenBSD</a></h3>

<blockquote>
<p>A while ago I wanted to learn more about OpenBSD development. So I picked a project, in this case WireGuard, to develop a native client for. Over the last two years, with many different iterations, and working closely with the WireGuard&#39;s creator (Jason [Jason A. Donenfeld - Ed.], CC&#39;d), it started to become a serious project eventually reaching parity with other official implementations. Finally, we are here and I think it is time for any further development to happen inside the src tree.</p>

<hr>
</blockquote>

<h3><a href="https://dataswamp.org/%7Esolene/2020-05-11-freebsd-workstation.html" rel="nofollow">FreeBSD 12.1 on a laptop</a></h3>

<blockquote>
<p>I’m using FreeBSD again on a laptop for some reasons so expect to read more about FreeBSD here. This tutorial explain how to get a graphical desktop using FreeBSD 12.1.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://medium.com/@tdebarbora/list-of-useful-freebsd-commands-92dffb8f8c57" rel="nofollow">List of useful FreeBSD Commands</a></li>
<li><a href="https://itnext.io/master-your-network-with-unix-command-line-tools-790bdd3b3b87" rel="nofollow">Master Your Network With Unix Command Line Tools</a></li>
<li><a href="https://twitter.com/nixcraft/status/1257674069387993088" rel="nofollow">Original Unix containers aka FreeBSD jails</a></li>
<li><a href="https://www.theregister.co.uk/2003/09/11/bill_joys_greatest_gift/" rel="nofollow">Flashback : 2003 Article : Bill Joy&#39;s greatest gift to man – the vi editor</a></li>
<li><a href="https://www.freebsdfoundation.org/past-issues/filesystems/" rel="nofollow">FreeBSD Journal March/April 2020 Filesystems: ZFS Encryption, FUSE, and more, plus Network Bridges</a></li>
<li><a href="https://www.hambug.ca/" rel="nofollow">HAMBug meeting will be online again in June, so those from all over the world are welcome to join, June 9th (2nd Tuesday of each month) at 18:30 Eastern</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>+ <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Lyubomir%20-%20GELI%20and%20ZFS.md" rel="nofollow">Lyubomir - GELI and ZFS</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Patrick%20-%20powerd%20and%20powerd%2B%2B.md" rel="nofollow">Patrick - powerd and powerd++</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>299: The NAS Fleet</title>
  <link>https://www.bsdnow.tv/299</link>
  <guid isPermaLink="false">22eb77a0-e162-4fce-bb37-987c1d34c477</guid>
  <pubDate>Wed, 22 May 2019 14:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/22eb77a0-e162-4fce-bb37-987c1d34c477.mp3" length="32188343" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Running AIX on QEMU on Linux on Windows, your NAS fleet with TrueCommand, Unleashed 1.3 is available, LLDB: CPU register inspection support extension, V7 Unix programs often not written as expected, and more.</itunes:subtitle>
  <itunes:duration>52:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Running AIX on QEMU on Linux on Windows, your NAS fleet with TrueCommand, Unleashed 1.3 is available, LLDB: CPU register inspection support extension, V7 Unix programs often not written as expected, and more.
&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://virtuallyfun.com/wordpress/2019/04/22/installing-aix-on-qemu/"&gt;Running AiX on QEMU on Linux on Windows&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;YES it’s real!
  I’m using the Linux subsystem on Windows, as it’s easier to build this Qemu tree from source. I’m using Debian, but these steps will work on other systems that use Debian as a base.
  first thing first, you need to get your system with the needed pre-requisites to compile
  Great with those in place, now clone Artyom Tarasenko’s source repository
  Since the frame buffer apparently isn’t quite working just yet, I configure for something more like a text mode build.
  Now for me, GCC 7 didn’t build the source cleanly. I had to make a change to the file config-host.mak and remove all references to -Werror. Also I removed the sound hooks, as we won’t need them.
  Now you can build Qemu.
  Okay, all being well you now have a Qemu. Now following the steps from Artyom Tarasenko’s blog post, we can get started on the install!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;See article for rest of walkthrough.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://www.ixsystems.com/blog/truecommand/"&gt;Take Command of Your NAS Fleet with TrueCommand&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Hundreds of thousands of FreeNAS and TrueNAS systems are deployed around the world, with many sites having dozens of systems.  Managing multiple systems individually can be time-consuming. iXsystems has responded to the challenge by creating a “single pane of glass” application to simplify the scaling of data, drive management, and administration of iXsystems NAS platforms. We are proud to introduce TrueCommand.
  TrueCommand is a ZFS-aware management application that manages TrueNAS and FreeNAS systems. 
  The public Beta of TrueCommand is available for download now. TrueCommand can be used with small iXsystems NAS fleets for free. Licenses can be purchased for large-scale deployments and enterprise support.
  TrueCommand expands on the ease of use and power of TrueNAS and FreeNAS systems with multi-system management and reporting.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://lists.31bits.net/archives/devel/2019-April/000052.html"&gt;Unleashed 1.3 Released&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;This is the fourth release of Unleashed - an operating system fork of illumos.  For more information about Unleashed itself and the download links, see our website.
  As one might expect, this release removes a few things.
  The most notable being the removal of ksh93 along with all its libs.
  As far as libc interfaces are concerned, a number of non-standard functions were removed.  In general, they have been replaced by the standards-compliant versions.  (getgrent&lt;em&gt;r, fgetgrent&lt;/em&gt;r, getgrgid&lt;em&gt;r, getgrnam&lt;/em&gt;r, ttyname&lt;em&gt;r, getlogin&lt;/em&gt;r, shmdt, sigwait, gethostname, putmsg, putpmsg, and getaddrinfo)
  Additionally, wordexp and wordfree have been removed from libc.  Even though they are technically required by POSIX, software doesn't seem to use them. Because of the fragile implementation (shelling out), we took the OpenBSD approach and just removed them.
  The default compilation environment now includes &lt;em&gt;XOPEN&lt;/em&gt;SOURCE=700 and &lt;strong&gt;EXTENSIONS&lt;/strong&gt;.  Additionally, all applications now use 64-bit file offsets, making use of &lt;em&gt;LARGEFILE&lt;/em&gt;SOURCE, &lt;em&gt;LARGEFILE64&lt;/em&gt;SOURCE, and &lt;em&gt;FILE&lt;/em&gt;OFFSET_BITS unnecessary.
  Last but not least, nightly.sh is no more.  In short, to build one simply runs 'make'.  (See README for detailed build instructions.)&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.unleashed-os.org/why.html"&gt;Why Unleashed&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Why did we decide to fork illumos? After all, there are already many illumos distributions available to choose from. We felt we could do better than any of them by taking a more aggressive stance toward compatibility and reducing cruft from code and community interactions alike.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/lldb_extending_cpu_register_inspection"&gt;LLDB: extending CPU register inspection support&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Upstream describes LLDB as a next generation, high-performance debugger. It is built on top of LLVM/Clang toolchain, and features great integration with it. At the moment, it primarily supports debugging C, C++ and ObjC code, and there is interest in extending it to more languages.
  In February, I have started working on LLDB, as contracted by the NetBSD Foundation. So far I've been working on reenabling continuous integration, squashing bugs, improving NetBSD core file support and updating NetBSD distribution to LLVM 8 (which is still stalled by unresolved regressions in inline assembly syntax). You can read more about that in my Mar 2019 report.
  In April, my main focus was on fixing and enhancing the support for reading and writing CPU registers. In this report, I'd like to shortly summarize what I have done, what I have learned in the process and what I still need to do.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Future plans&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;My work continues with the two milestones from last month, plus a third that's closely related:
  Add support for FPU registers support for NetBSD/i386 and NetBSD/amd64.
  Support XSAVE, XSAVEOPT, ... registers in core(5) files on NetBSD/amd64.
  Add support for Debug Registers support for NetBSD/i386 and NetBSD/amd64.
  The most important point right now is deciding on the format for passing the remaining registers, and implementing the missing ptrace interface kernel-side. The support for core files should follow using the same format then.
  Userland-side, I will work on adding matching ATF tests for ptrace features and implement LLDB side of support for the new ptrace interface and core file notes. Afterwards, I will start working on improving support for the same things on 32-bit (i386) executables.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;hr&gt;
&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/~cks/space/blog/unix/EdV7CodedUnusually"&gt;V7 Unix programs are often not written the way you would expect&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Yesterday I wrote that V7 ed read its terminal input in cooked mode a line at a time, which was an efficient, low-CPU design that was important on V7's small and low-power hardware. Then in comments, frankg pointed out that I was wrong about part of that, namely about how ed read its input.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Sidebar: An interesting undocumented ed feature&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Reading this section of the source code for ed taught me that it has an interesting, undocumented, and entirely characteristic little behavior. Officially, ed commands that have you enter new text have that new text terminate by a . on a line by itself:&lt;/p&gt;
  
  &lt;p&gt;In other words, it turns a single line with '.' into an EOF. The consequence of this is that if you type a real EOF at the start of a line, you get the same result, thus saving you one character (you use Control-D instead of '.' plus newline). This is very V7 Unix behavior, including the lack of documentation.&lt;/p&gt;
  
  &lt;p&gt;This is also a natural behavior in one sense. A proper program has to react to EOF here in some way, and it might as well do so by ending the input mode. It's also natural to go on to try reading from the terminal again for subsequent commands; if this was a real and persistent EOF, for example because the pty closed, you'll just get EOF again and eventually quit. V7 ed is slightly unusual here in that it deliberately converts '.' by itself to EOF, instead of signaling this in a different way, but in a way that's also the simplest approach; if you have to have some signal for each case and you're going to treat them the same, you might as well have the same signal for both cases.&lt;/p&gt;
  
  &lt;p&gt;Modern versions of ed appear to faithfully reimplement this convenient behavior, although they don't appear to document it. I haven't checked OpenBSD, but both FreeBSD ed and GNU ed work like this in a quick test. I haven't checked their source code to see if they implement it the same way.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lteo.net/blog/2019/04/27/carolinacon-15-writing-exploit-resistant-code-with-openbsd/"&gt;CarolinaCon 15: Writing Exploit-Resistant Code With OpenBSD&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-pkgbase/2019-April/000396.html"&gt;CFT: FreeBSD Package Base&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2019/05/02/22862.html"&gt;Initial FUSE support in DragonFly&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2019/05/03/22869.html"&gt;Two significant bugfixes for 5.4&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.reddit.com/r/openbsd/comments/bkb2zk/surprised_this_can_still_run_current/"&gt;Libretto 100ct: 166mhz Pentium, 16gb compactflash, 32mb ram running OpenBSD&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;DJ - &lt;a href="http://dpaste.com/0DSYJAH#wrap"&gt;Feedback&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Fabian - &lt;a href="http://dpaste.com/2EC7S10#wrap"&gt;ZFS ARC&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Caleb - &lt;a href="http://dpaste.com/3ZX177B#wrap"&gt;Question&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;A small programming note: After BSDNow episode 300, the podcast will switch to audio-only, using a new higher quality recording and production system. The live stream will likely still include video.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, aix, qemu, true command, nas, unleashed, lldb, v7</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Running AIX on QEMU on Linux on Windows, your NAS fleet with TrueCommand, Unleashed 1.3 is available, LLDB: CPU register inspection support extension, V7 Unix programs often not written as expected, and more.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="runningaixonqemuonlinuxonwindowshttpsvirtuallyfuncomwordpress20190422installingaixonqemu"><a href="https://virtuallyfun.com/wordpress/2019/04/22/installing-aix-on-qemu/">Running AiX on QEMU on Linux on Windows</a></h3>

<blockquote>
  <p>YES it’s real!
  I’m using the Linux subsystem on Windows, as it’s easier to build this Qemu tree from source. I’m using Debian, but these steps will work on other systems that use Debian as a base.
  first thing first, you need to get your system with the needed pre-requisites to compile
  Great with those in place, now clone Artyom Tarasenko’s source repository
  Since the frame buffer apparently isn’t quite working just yet, I configure for something more like a text mode build.
  Now for me, GCC 7 didn’t build the source cleanly. I had to make a change to the file config-host.mak and remove all references to -Werror. Also I removed the sound hooks, as we won’t need them.
  Now you can build Qemu.
  Okay, all being well you now have a Qemu. Now following the steps from Artyom Tarasenko’s blog post, we can get started on the install!</p>
</blockquote>

<ul>
<li>See article for rest of walkthrough.</li>
</ul>

<p><hr /></p>

<h3 id="takecommandofyournasfleetwithtruecommandhttpswwwixsystemscomblogtruecommand"><a href="https://www.ixsystems.com/blog/truecommand/">Take Command of Your NAS Fleet with TrueCommand</a></h3>

<blockquote>
  <p>Hundreds of thousands of FreeNAS and TrueNAS systems are deployed around the world, with many sites having dozens of systems.  Managing multiple systems individually can be time-consuming. iXsystems has responded to the challenge by creating a “single pane of glass” application to simplify the scaling of data, drive management, and administration of iXsystems NAS platforms. We are proud to introduce TrueCommand.
  TrueCommand is a ZFS-aware management application that manages TrueNAS and FreeNAS systems. 
  The public Beta of TrueCommand is available for download now. TrueCommand can be used with small iXsystems NAS fleets for free. Licenses can be purchased for large-scale deployments and enterprise support.
  TrueCommand expands on the ease of use and power of TrueNAS and FreeNAS systems with multi-system management and reporting.</p>
</blockquote>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="unleashed13releasedhttplists31bitsnetarchivesdevel2019april000052html"><a href="http://lists.31bits.net/archives/devel/2019-April/000052.html">Unleashed 1.3 Released</a></h3>

<blockquote>
  <p>This is the fourth release of Unleashed - an operating system fork of illumos.  For more information about Unleashed itself and the download links, see our website.
  As one might expect, this release removes a few things.
  The most notable being the removal of ksh93 along with all its libs.
  As far as libc interfaces are concerned, a number of non-standard functions were removed.  In general, they have been replaced by the standards-compliant versions.  (getgrent<em>r, fgetgrent</em>r, getgrgid<em>r, getgrnam</em>r, ttyname<em>r, getlogin</em>r, shmdt, sigwait, gethostname, putmsg, putpmsg, and getaddrinfo)
  Additionally, wordexp and wordfree have been removed from libc.  Even though they are technically required by POSIX, software doesn't seem to use them. Because of the fragile implementation (shelling out), we took the OpenBSD approach and just removed them.
  The default compilation environment now includes <em>XOPEN</em>SOURCE=700 and <strong>EXTENSIONS</strong>.  Additionally, all applications now use 64-bit file offsets, making use of <em>LARGEFILE</em>SOURCE, <em>LARGEFILE64</em>SOURCE, and <em>FILE</em>OFFSET_BITS unnecessary.
  Last but not least, nightly.sh is no more.  In short, to build one simply runs 'make'.  (See README for detailed build instructions.)</p>
</blockquote>

<ul>
<li><a href="https://www.unleashed-os.org/why.html">Why Unleashed</a></li>
</ul>

<blockquote>
  <p>Why did we decide to fork illumos? After all, there are already many illumos distributions available to choose from. We felt we could do better than any of them by taking a more aggressive stance toward compatibility and reducing cruft from code and community interactions alike.</p>
</blockquote>

<p><hr /></p>

<h3 id="lldbextendingcpuregisterinspectionsupporthttpblognetbsdorgtnfentrylldb_extending_cpu_register_inspection"><a href="http://blog.netbsd.org/tnf/entry/lldb_extending_cpu_register_inspection">LLDB: extending CPU register inspection support</a></h3>

<blockquote>
  <p>Upstream describes LLDB as a next generation, high-performance debugger. It is built on top of LLVM/Clang toolchain, and features great integration with it. At the moment, it primarily supports debugging C, C++ and ObjC code, and there is interest in extending it to more languages.
  In February, I have started working on LLDB, as contracted by the NetBSD Foundation. So far I've been working on reenabling continuous integration, squashing bugs, improving NetBSD core file support and updating NetBSD distribution to LLVM 8 (which is still stalled by unresolved regressions in inline assembly syntax). You can read more about that in my Mar 2019 report.
  In April, my main focus was on fixing and enhancing the support for reading and writing CPU registers. In this report, I'd like to shortly summarize what I have done, what I have learned in the process and what I still need to do.</p>
</blockquote>

<ul>
<li>Future plans</li>
</ul>

<blockquote>
  <p>My work continues with the two milestones from last month, plus a third that's closely related:
  Add support for FPU registers support for NetBSD/i386 and NetBSD/amd64.
  Support XSAVE, XSAVEOPT, ... registers in core(5) files on NetBSD/amd64.
  Add support for Debug Registers support for NetBSD/i386 and NetBSD/amd64.
  The most important point right now is deciding on the format for passing the remaining registers, and implementing the missing ptrace interface kernel-side. The support for core files should follow using the same format then.
  Userland-side, I will work on adding matching ATF tests for ptrace features and implement LLDB side of support for the new ptrace interface and core file notes. Afterwards, I will start working on improving support for the same things on 32-bit (i386) executables.</p>
</blockquote>

<p><hr /></p>

<h3 id="v7unixprogramsareoftennotwrittenthewayyouwouldexpecthttpsutccutorontocatcksspaceblogunixedv7codedunusually"><a href="https://utcc.utoronto.ca/~cks/space/blog/unix/EdV7CodedUnusually">V7 Unix programs are often not written the way you would expect</a></h3>

<blockquote>
  <p>Yesterday I wrote that V7 ed read its terminal input in cooked mode a line at a time, which was an efficient, low-CPU design that was important on V7's small and low-power hardware. Then in comments, frankg pointed out that I was wrong about part of that, namely about how ed read its input.</p>
</blockquote>

<ul>
<li>Sidebar: An interesting undocumented ed feature</li>
</ul>

<blockquote>
  <p>Reading this section of the source code for ed taught me that it has an interesting, undocumented, and entirely characteristic little behavior. Officially, ed commands that have you enter new text have that new text terminate by a . on a line by itself:</p>
  
  <p>In other words, it turns a single line with '.' into an EOF. The consequence of this is that if you type a real EOF at the start of a line, you get the same result, thus saving you one character (you use Control-D instead of '.' plus newline). This is very V7 Unix behavior, including the lack of documentation.</p>
  
  <p>This is also a natural behavior in one sense. A proper program has to react to EOF here in some way, and it might as well do so by ending the input mode. It's also natural to go on to try reading from the terminal again for subsequent commands; if this was a real and persistent EOF, for example because the pty closed, you'll just get EOF again and eventually quit. V7 ed is slightly unusual here in that it deliberately converts '.' by itself to EOF, instead of signaling this in a different way, but in a way that's also the simplest approach; if you have to have some signal for each case and you're going to treat them the same, you might as well have the same signal for both cases.</p>
  
  <p>Modern versions of ed appear to faithfully reimplement this convenient behavior, although they don't appear to document it. I haven't checked OpenBSD, but both FreeBSD ed and GNU ed work like this in a quick test. I haven't checked their source code to see if they implement it the same way.</p>
  
  <hr />
</blockquote>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://lteo.net/blog/2019/04/27/carolinacon-15-writing-exploit-resistant-code-with-openbsd/">CarolinaCon 15: Writing Exploit-Resistant Code With OpenBSD</a></li>

<li><a href="https://lists.freebsd.org/pipermail/freebsd-pkgbase/2019-April/000396.html">CFT: FreeBSD Package Base</a></li>

<li><a href="https://www.dragonflydigest.com/2019/05/02/22862.html">Initial FUSE support in DragonFly</a></li>

<li><a href="https://www.dragonflydigest.com/2019/05/03/22869.html">Two significant bugfixes for 5.4</a></li>

<li><a href="https://www.reddit.com/r/openbsd/comments/bkb2zk/surprised_this_can_still_run_current/">Libretto 100ct: 166mhz Pentium, 16gb compactflash, 32mb ram running OpenBSD</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>DJ - <a href="http://dpaste.com/0DSYJAH#wrap">Feedback</a></li>

<li>Fabian - <a href="http://dpaste.com/2EC7S10#wrap">ZFS ARC</a></li>

<li>Caleb - <a href="http://dpaste.com/3ZX177B#wrap">Question</a></li>

<li>A small programming note: After BSDNow episode 300, the podcast will switch to audio-only, using a new higher quality recording and production system. The live stream will likely still include video.</li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0299.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Running AIX on QEMU on Linux on Windows, your NAS fleet with TrueCommand, Unleashed 1.3 is available, LLDB: CPU register inspection support extension, V7 Unix programs often not written as expected, and more.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="runningaixonqemuonlinuxonwindowshttpsvirtuallyfuncomwordpress20190422installingaixonqemu"><a href="https://virtuallyfun.com/wordpress/2019/04/22/installing-aix-on-qemu/">Running AiX on QEMU on Linux on Windows</a></h3>

<blockquote>
  <p>YES it’s real!
  I’m using the Linux subsystem on Windows, as it’s easier to build this Qemu tree from source. I’m using Debian, but these steps will work on other systems that use Debian as a base.
  first thing first, you need to get your system with the needed pre-requisites to compile
  Great with those in place, now clone Artyom Tarasenko’s source repository
  Since the frame buffer apparently isn’t quite working just yet, I configure for something more like a text mode build.
  Now for me, GCC 7 didn’t build the source cleanly. I had to make a change to the file config-host.mak and remove all references to -Werror. Also I removed the sound hooks, as we won’t need them.
  Now you can build Qemu.
  Okay, all being well you now have a Qemu. Now following the steps from Artyom Tarasenko’s blog post, we can get started on the install!</p>
</blockquote>

<ul>
<li>See article for rest of walkthrough.</li>
</ul>

<p><hr /></p>

<h3 id="takecommandofyournasfleetwithtruecommandhttpswwwixsystemscomblogtruecommand"><a href="https://www.ixsystems.com/blog/truecommand/">Take Command of Your NAS Fleet with TrueCommand</a></h3>

<blockquote>
  <p>Hundreds of thousands of FreeNAS and TrueNAS systems are deployed around the world, with many sites having dozens of systems.  Managing multiple systems individually can be time-consuming. iXsystems has responded to the challenge by creating a “single pane of glass” application to simplify the scaling of data, drive management, and administration of iXsystems NAS platforms. We are proud to introduce TrueCommand.
  TrueCommand is a ZFS-aware management application that manages TrueNAS and FreeNAS systems. 
  The public Beta of TrueCommand is available for download now. TrueCommand can be used with small iXsystems NAS fleets for free. Licenses can be purchased for large-scale deployments and enterprise support.
  TrueCommand expands on the ease of use and power of TrueNAS and FreeNAS systems with multi-system management and reporting.</p>
</blockquote>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="unleashed13releasedhttplists31bitsnetarchivesdevel2019april000052html"><a href="http://lists.31bits.net/archives/devel/2019-April/000052.html">Unleashed 1.3 Released</a></h3>

<blockquote>
  <p>This is the fourth release of Unleashed - an operating system fork of illumos.  For more information about Unleashed itself and the download links, see our website.
  As one might expect, this release removes a few things.
  The most notable being the removal of ksh93 along with all its libs.
  As far as libc interfaces are concerned, a number of non-standard functions were removed.  In general, they have been replaced by the standards-compliant versions.  (getgrent<em>r, fgetgrent</em>r, getgrgid<em>r, getgrnam</em>r, ttyname<em>r, getlogin</em>r, shmdt, sigwait, gethostname, putmsg, putpmsg, and getaddrinfo)
  Additionally, wordexp and wordfree have been removed from libc.  Even though they are technically required by POSIX, software doesn't seem to use them. Because of the fragile implementation (shelling out), we took the OpenBSD approach and just removed them.
  The default compilation environment now includes <em>XOPEN</em>SOURCE=700 and <strong>EXTENSIONS</strong>.  Additionally, all applications now use 64-bit file offsets, making use of <em>LARGEFILE</em>SOURCE, <em>LARGEFILE64</em>SOURCE, and <em>FILE</em>OFFSET_BITS unnecessary.
  Last but not least, nightly.sh is no more.  In short, to build one simply runs 'make'.  (See README for detailed build instructions.)</p>
</blockquote>

<ul>
<li><a href="https://www.unleashed-os.org/why.html">Why Unleashed</a></li>
</ul>

<blockquote>
  <p>Why did we decide to fork illumos? After all, there are already many illumos distributions available to choose from. We felt we could do better than any of them by taking a more aggressive stance toward compatibility and reducing cruft from code and community interactions alike.</p>
</blockquote>

<p><hr /></p>

<h3 id="lldbextendingcpuregisterinspectionsupporthttpblognetbsdorgtnfentrylldb_extending_cpu_register_inspection"><a href="http://blog.netbsd.org/tnf/entry/lldb_extending_cpu_register_inspection">LLDB: extending CPU register inspection support</a></h3>

<blockquote>
  <p>Upstream describes LLDB as a next generation, high-performance debugger. It is built on top of LLVM/Clang toolchain, and features great integration with it. At the moment, it primarily supports debugging C, C++ and ObjC code, and there is interest in extending it to more languages.
  In February, I have started working on LLDB, as contracted by the NetBSD Foundation. So far I've been working on reenabling continuous integration, squashing bugs, improving NetBSD core file support and updating NetBSD distribution to LLVM 8 (which is still stalled by unresolved regressions in inline assembly syntax). You can read more about that in my Mar 2019 report.
  In April, my main focus was on fixing and enhancing the support for reading and writing CPU registers. In this report, I'd like to shortly summarize what I have done, what I have learned in the process and what I still need to do.</p>
</blockquote>

<ul>
<li>Future plans</li>
</ul>

<blockquote>
  <p>My work continues with the two milestones from last month, plus a third that's closely related:
  Add support for FPU registers support for NetBSD/i386 and NetBSD/amd64.
  Support XSAVE, XSAVEOPT, ... registers in core(5) files on NetBSD/amd64.
  Add support for Debug Registers support for NetBSD/i386 and NetBSD/amd64.
  The most important point right now is deciding on the format for passing the remaining registers, and implementing the missing ptrace interface kernel-side. The support for core files should follow using the same format then.
  Userland-side, I will work on adding matching ATF tests for ptrace features and implement LLDB side of support for the new ptrace interface and core file notes. Afterwards, I will start working on improving support for the same things on 32-bit (i386) executables.</p>
</blockquote>

<p><hr /></p>

<h3 id="v7unixprogramsareoftennotwrittenthewayyouwouldexpecthttpsutccutorontocatcksspaceblogunixedv7codedunusually"><a href="https://utcc.utoronto.ca/~cks/space/blog/unix/EdV7CodedUnusually">V7 Unix programs are often not written the way you would expect</a></h3>

<blockquote>
  <p>Yesterday I wrote that V7 ed read its terminal input in cooked mode a line at a time, which was an efficient, low-CPU design that was important on V7's small and low-power hardware. Then in comments, frankg pointed out that I was wrong about part of that, namely about how ed read its input.</p>
</blockquote>

<ul>
<li>Sidebar: An interesting undocumented ed feature</li>
</ul>

<blockquote>
  <p>Reading this section of the source code for ed taught me that it has an interesting, undocumented, and entirely characteristic little behavior. Officially, ed commands that have you enter new text have that new text terminate by a . on a line by itself:</p>
  
  <p>In other words, it turns a single line with '.' into an EOF. The consequence of this is that if you type a real EOF at the start of a line, you get the same result, thus saving you one character (you use Control-D instead of '.' plus newline). This is very V7 Unix behavior, including the lack of documentation.</p>
  
  <p>This is also a natural behavior in one sense. A proper program has to react to EOF here in some way, and it might as well do so by ending the input mode. It's also natural to go on to try reading from the terminal again for subsequent commands; if this was a real and persistent EOF, for example because the pty closed, you'll just get EOF again and eventually quit. V7 ed is slightly unusual here in that it deliberately converts '.' by itself to EOF, instead of signaling this in a different way, but in a way that's also the simplest approach; if you have to have some signal for each case and you're going to treat them the same, you might as well have the same signal for both cases.</p>
  
  <p>Modern versions of ed appear to faithfully reimplement this convenient behavior, although they don't appear to document it. I haven't checked OpenBSD, but both FreeBSD ed and GNU ed work like this in a quick test. I haven't checked their source code to see if they implement it the same way.</p>
  
  <hr />
</blockquote>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://lteo.net/blog/2019/04/27/carolinacon-15-writing-exploit-resistant-code-with-openbsd/">CarolinaCon 15: Writing Exploit-Resistant Code With OpenBSD</a></li>

<li><a href="https://lists.freebsd.org/pipermail/freebsd-pkgbase/2019-April/000396.html">CFT: FreeBSD Package Base</a></li>

<li><a href="https://www.dragonflydigest.com/2019/05/02/22862.html">Initial FUSE support in DragonFly</a></li>

<li><a href="https://www.dragonflydigest.com/2019/05/03/22869.html">Two significant bugfixes for 5.4</a></li>

<li><a href="https://www.reddit.com/r/openbsd/comments/bkb2zk/surprised_this_can_still_run_current/">Libretto 100ct: 166mhz Pentium, 16gb compactflash, 32mb ram running OpenBSD</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>DJ - <a href="http://dpaste.com/0DSYJAH#wrap">Feedback</a></li>

<li>Fabian - <a href="http://dpaste.com/2EC7S10#wrap">ZFS ARC</a></li>

<li>Caleb - <a href="http://dpaste.com/3ZX177B#wrap">Question</a></li>

<li>A small programming note: After BSDNow episode 300, the podcast will switch to audio-only, using a new higher quality recording and production system. The live stream will likely still include video.</li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0299.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>281: EPYC Server Battle</title>
  <link>https://www.bsdnow.tv/281</link>
  <guid isPermaLink="false">62f301ee-57b8-4f10-8736-3660f78074a8</guid>
  <pubDate>Thu, 17 Jan 2019 10:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/62f301ee-57b8-4f10-8736-3660f78074a8.mp3" length="50507863" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>SCP client vulnerabilities, BSDs vs Linux benchmarks on a Tyan EPYC Server, fame for the Unix inventors, Die IPv4, GhostBSD 18.12 released, Unix in pictures, and more.</itunes:subtitle>
  <itunes:duration>1:23:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>SCP client vulnerabilities, BSDs vs Linux benchmarks on a Tyan EPYC Server, fame for the Unix inventors, Die IPv4, GhostBSD 18.12 released, Unix in pictures, and more.
&lt;p&gt;##Headlines&lt;br&gt;
###&lt;a href="https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt"&gt;scp client multiple vulnerabilities&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Overview&lt;/li&gt;
&lt;li&gt;SCP clients from multiple vendors are susceptible to a malicious scp server performing&lt;br&gt;
unauthorized changes to target directory and/or client output manipulation.&lt;/li&gt;
&lt;li&gt;Description&lt;/li&gt;
&lt;li&gt;Many scp clients fail to verify if the objects returned by the scp server match those&lt;br&gt;
it asked for. This issue dates back to 1983 and rcp, on which scp is based. A separate&lt;br&gt;
flaw in the client allows the target directory attributes to be changed arbitrarily.&lt;br&gt;
Finally, two vulnerabilities in clients may allow server to spoof the client output.&lt;/li&gt;
&lt;li&gt;Impact&lt;/li&gt;
&lt;li&gt;Malicious scp server can write arbitrary files to scp target directory, change the&lt;br&gt;
target directory permissions and to spoof the client output.&lt;/li&gt;
&lt;li&gt;Details&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;The discovered vulnerabilities, described in more detail below, enables the attack&lt;br&gt;
described here in brief.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;ol&gt;
&lt;li&gt;The attacker controlled server or Man-in-the-Middle(*) attack drops .bash_aliases file to victim’s home directory when the victim performs scp operation from the server. The transfer of extra files is hidden by sending ANSI control sequences via stderr. For example:&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;code&gt;user@local:~$ scp user@remote:readme.txt .&lt;/code&gt;&lt;br&gt;
&lt;code&gt;readme.txt 100% 494 1.6KB/s 00:00&lt;/code&gt;&lt;br&gt;
&lt;code&gt;user@local:~$&lt;/code&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;ol&gt;
&lt;li&gt;Once the victim launches a new shell, the malicious commands in .bash_aliases get executed.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;*) Man-in-the-Middle attack does require the victim to accept the wrong host fingerprint.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://www.phoronix.com/scan.php?page=article&amp;amp;item=dfly-freebsd-tyanamd&amp;amp;num=1"&gt;FreeBSD 12.0 vs. DragonFlyBSD 5.4 vs. TrueOS 18.12 vs. Linux On A Tyan EPYC Server&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Last month when running FreeBSD 12.0 benchmarks on a 2P EPYC server I wasn’t able to run any side-by-side benchmarks with the new DragonFlyBSD 5.4 as this BSD was crashing during the boot process on that board. But fortunately on another AMD EPYC server available, the EPYC 1P TYAN Transport SX TN70A-B8026, DragonFlyBSD 5.4.1 runs fine. So for this first round of BSD benchmarking in 2019 are tests of FreeBSD 11.2, FreeBSD 12.0, DragonFlyBSD 5.4.1, the new TrueOS 18.12, and a few Linux distributions (CentOS 7, Ubuntu 18.04.1 LTS, and Clear Linux) on this EPYC 7601 server in a variety of workloads.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote&gt;
&lt;p&gt;DragonFlyBSD 5.4.1 ran fine on this Tyan server and could boot fine unlike the issue encountered on the Dell PowerEdge R7425 for this particular BSD. But on the Tyan server, DragonFlyBSD 5.2.2 wouldn’t boot so only this latest DragonFlyBSD release series was used as part of the comparison.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;A summary of the operating systems tested for this EPYC 7601 OS benchmark comparison included:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;DragonFlyBSD 5.4.1 - The latest release of Matthew Dillon’s operating system while using the HAMMER2 file-system and GCC 8.1 compiler that is now the default system compiler for this BSD.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;FreeBSD 11.2 - The previous stable release of FreeBSD. Installed with a ZFS file-system.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;FreeBSD 12.0 - The latest stable release of FreeBSD and installed with its ZFS option.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;TrueOS 18.12 - The latest release of the iX systems’ FreeBSD derivative. TrueOS 18.12 is based on FreeBSD 13.0-CURRENT and uses ZFS by default and was using the Clang 7.0.1 compiler compared to Clang 6.0.1 on FreeBSD 12.0.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;CentOS Linux 7 - The latest EL7 operating system performance.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Ubuntu 18.04.1 LTS - The latest Ubuntu Long Term Support release.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Clear Linux 27120 - The latest rolling release as of testing out of Intel’s Open-Source Technology Center. Clear Linux often reflects as close to the gold standard for performance as possible with its insanely tuned software stack for offering optimal performance on x86_64 performance for generally showing best what the hardware is capable of.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Throughout all of this testing, the Tyan 2U server was kept to its same configuration of an AMD EPYC 7601 (32 cores / 64 threads) at stock speeds, 8 x 16GB DDR4-2666 ECC memory, and 280GB Intel Optane 900p SSD benchmarks.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;##News Roundup&lt;br&gt;
&lt;a href="https://www.engadget.com/2019/01/08/national-inventors-hall-of-fame-class-of-2019/"&gt;National Inventors Hall of Fame honors creators of Unix&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Dennis Ritchie (Posthumous) and Ken Thompson: UNIX Operating System&lt;br&gt;
Thompson and Ritchie’s creation of the UNIX operating system and the C programming language were pivotal developments in the progress of computer science. Today, 50 years after its beginnings, UNIX and UNIX-like systems continue to run machinery from supercomputers to smartphones. The UNIX operating system remains the basis of much of the world’s computing infrastructure, and C language – written to simplify the development of UNIX – is one of the most widely used languages today.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://ungleich.ch/en-us/cms/blog/2019/01/09/die-ipv4-die/"&gt;Die IPV4, Die&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Imagine, it is 2019. Easy, ha? Imagine, it is 2019 and you want to turn off IPv4. Like, off off. Really off. Not disabling IPv6, but disabling IPv4.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;Two steps back&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;You might be coming here wondering, why would anybody want to do what we are asking to be done. Well, it is dead simple: We are running data centers (like Data Center Light) with a lot of IPv6 only equipment. There simply is no need for IPv4. So why would we want to have it enabled?&lt;br&gt;
Also, here at ungleich, we defined 2019 as the year to move away from IPv4.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;The challenge&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;Do you like puzzles? Competitions? Challenges? Hacking? Well. If ANY of this is of your interest, here is a real challenge for you:&lt;br&gt;
We offer a 100 CHF (roughly 100 USD) for anyone who can give us a detailed description of how to turn IPv4 completely off in an operating system and allowing it to communicate with IPv6 only. This should obviously include a tiny proof that your operating system is really unable to use IPv4 at all. Just flushing IPv4 addresses and keeping the IPv4 stack loaded, does not count.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="http://www.ghostbsd.org/18.12_release_announcement"&gt;GhostBSD 18.12 released&lt;/a&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;GhostBSD 18.12 is an updated iso of GhostBSD 18.10 with some little changes to the live DVD/USB and with updated packages.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;ul&gt;
&lt;li&gt;What has changed since 18.10&lt;/li&gt;
&lt;li&gt;removed default call of kernel modules for AMD and Intel&lt;/li&gt;
&lt;li&gt;replaced octopkg by software-station&lt;/li&gt;
&lt;li&gt;added back gop hacks to the live system&lt;/li&gt;
&lt;li&gt;added ghostbsd-drivers and ghostbsd-utils&lt;/li&gt;
&lt;li&gt;we updated the packages to the latest build&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;###&lt;a href="https://threader.app/thread/1083054050315243521"&gt;And Now for a laugh : #unixinpictures&lt;/a&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;##Beastie Bits&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.jwz.org/blog/2019/01/we-are-now-closer-to-the-y2038-bug-than-the-y2k-bug/"&gt;We are now closer to the Y2038 bug than the Y2K bug&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://old.reddit.com/r/openbsd/comments/ae6b77/openbsd_enterprise_use/"&gt;OpenBSD Enterprise use&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://old.reddit.com/r/unix/comments/af0kij/note_the_whole_book_series_in_the_background/"&gt;AT&amp;amp;T Unix Books&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://oshogbo.vexillium.org/blog/54/"&gt;Process title and missing memory space&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.os2museum.com/wp/the-history-of-a-security-hole/"&gt;The History of a Security Hole&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.geoghegan.ca/unbound-adblock.html"&gt;unbound-adblock: The ultimate network adblocker!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/wheelsystems/nvlist"&gt;FreeBSD’s name/value pairs library&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://utcc.utoronto.ca/~cks/space/blog/unix/PidRollover"&gt;Pid Rollover&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cambus.net/booting-openbsd-kernels-in-efi-mode-with-qemu/"&gt;Booting OpenBSD kernels in EFI mode with QEMU&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://marc.info/?l=openbsd-cvs&amp;amp;m=154715734504845&amp;amp;w=2"&gt;OpenBSD CVS commit: Make mincore lie&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.bsdcan.org/2019/papers.php"&gt;BSDCan 2019 CfP ending January 19 - Submit!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.eventbrite.com/e/zfs-user-conference-2019-tickets-54530403906"&gt;OpenZFS User Conference - April 18-19&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsdfoundation.org/journal/"&gt;FreeBSD Journal is a free publication now&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;p&gt;##Feedback/Questions&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Chris - &lt;a href="http://dpaste.com/101P5HA"&gt;Boot environments and SSDs&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jonathan - &lt;a href="http://dpaste.com/0YTPYV4"&gt;Bytes issued during a zpool scrub&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Bostjan - &lt;a href="http://dpaste.com/0Q97J7H#wrap"&gt;ZFS Record Size and my mistakes&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt; 
</description>
  <content:encoded>
    <![CDATA[<p>SCP client vulnerabilities, BSDs vs Linux benchmarks on a Tyan EPYC Server, fame for the Unix inventors, Die IPv4, GhostBSD 18.12 released, Unix in pictures, and more.</p>

<p>##Headlines<br>
###<a href="https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt">scp client multiple vulnerabilities</a></p>

<ul>
<li>Overview</li>
<li>SCP clients from multiple vendors are susceptible to a malicious scp server performing<br>
unauthorized changes to target directory and/or client output manipulation.</li>
<li>Description</li>
<li>Many scp clients fail to verify if the objects returned by the scp server match those<br>
it asked for. This issue dates back to 1983 and rcp, on which scp is based. A separate<br>
flaw in the client allows the target directory attributes to be changed arbitrarily.<br>
Finally, two vulnerabilities in clients may allow server to spoof the client output.</li>
<li>Impact</li>
<li>Malicious scp server can write arbitrary files to scp target directory, change the<br>
target directory permissions and to spoof the client output.</li>
<li>Details</li>
</ul>

<blockquote>
<p>The discovered vulnerabilities, described in more detail below, enables the attack<br>
described here in brief.</p>
</blockquote>

<ul>
<li>
<ol>
<li>The attacker controlled server or Man-in-the-Middle(*) attack drops .bash_aliases file to victim’s home directory when the victim performs scp operation from the server. The transfer of extra files is hidden by sending ANSI control sequences via stderr. For example:</li>
</ol>
</li>
</ul>

<p><code>user@local:~$ scp user@remote:readme.txt .</code><br>
<code>readme.txt 100% 494 1.6KB/s 00:00</code><br>
<code>user@local:~$</code></p>

<ul>
<li>
<ol start="2">
<li>Once the victim launches a new shell, the malicious commands in .bash_aliases get executed.</li>
</ol>
</li>
<li>*) Man-in-the-Middle attack does require the victim to accept the wrong host fingerprint.</li>
</ul>

<p><hr></p>

<p>###<a href="https://www.phoronix.com/scan.php?page=article&amp;item=dfly-freebsd-tyanamd&amp;num=1">FreeBSD 12.0 vs. DragonFlyBSD 5.4 vs. TrueOS 18.12 vs. Linux On A Tyan EPYC Server</a></p>

<blockquote>
<p>Last month when running FreeBSD 12.0 benchmarks on a 2P EPYC server I wasn’t able to run any side-by-side benchmarks with the new DragonFlyBSD 5.4 as this BSD was crashing during the boot process on that board. But fortunately on another AMD EPYC server available, the EPYC 1P TYAN Transport SX TN70A-B8026, DragonFlyBSD 5.4.1 runs fine. So for this first round of BSD benchmarking in 2019 are tests of FreeBSD 11.2, FreeBSD 12.0, DragonFlyBSD 5.4.1, the new TrueOS 18.12, and a few Linux distributions (CentOS 7, Ubuntu 18.04.1 LTS, and Clear Linux) on this EPYC 7601 server in a variety of workloads.</p>
</blockquote>

<blockquote>
<p>DragonFlyBSD 5.4.1 ran fine on this Tyan server and could boot fine unlike the issue encountered on the Dell PowerEdge R7425 for this particular BSD. But on the Tyan server, DragonFlyBSD 5.2.2 wouldn’t boot so only this latest DragonFlyBSD release series was used as part of the comparison.</p>
</blockquote>

<ul>
<li>
<p>A summary of the operating systems tested for this EPYC 7601 OS benchmark comparison included:</p>
</li>
<li>
<p>DragonFlyBSD 5.4.1 - The latest release of Matthew Dillon’s operating system while using the HAMMER2 file-system and GCC 8.1 compiler that is now the default system compiler for this BSD.</p>
</li>
<li>
<p>FreeBSD 11.2 - The previous stable release of FreeBSD. Installed with a ZFS file-system.</p>
</li>
<li>
<p>FreeBSD 12.0 - The latest stable release of FreeBSD and installed with its ZFS option.</p>
</li>
<li>
<p>TrueOS 18.12 - The latest release of the iX systems’ FreeBSD derivative. TrueOS 18.12 is based on FreeBSD 13.0-CURRENT and uses ZFS by default and was using the Clang 7.0.1 compiler compared to Clang 6.0.1 on FreeBSD 12.0.</p>
</li>
<li>
<p>CentOS Linux 7 - The latest EL7 operating system performance.</p>
</li>
<li>
<p>Ubuntu 18.04.1 LTS - The latest Ubuntu Long Term Support release.</p>
</li>
<li>
<p>Clear Linux 27120 - The latest rolling release as of testing out of Intel’s Open-Source Technology Center. Clear Linux often reflects as close to the gold standard for performance as possible with its insanely tuned software stack for offering optimal performance on x86_64 performance for generally showing best what the hardware is capable of.</p>
</li>
</ul>

<blockquote>
<p>Throughout all of this testing, the Tyan 2U server was kept to its same configuration of an AMD EPYC 7601 (32 cores / 64 threads) at stock speeds, 8 x 16GB DDR4-2666 ECC memory, and 280GB Intel Optane 900p SSD benchmarks.</p>
</blockquote>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://www.engadget.com/2019/01/08/national-inventors-hall-of-fame-class-of-2019/">National Inventors Hall of Fame honors creators of Unix</a></p>

<blockquote>
<p>Dennis Ritchie (Posthumous) and Ken Thompson: UNIX Operating System<br>
Thompson and Ritchie’s creation of the UNIX operating system and the C programming language were pivotal developments in the progress of computer science. Today, 50 years after its beginnings, UNIX and UNIX-like systems continue to run machinery from supercomputers to smartphones. The UNIX operating system remains the basis of much of the world’s computing infrastructure, and C language – written to simplify the development of UNIX – is one of the most widely used languages today.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://ungleich.ch/en-us/cms/blog/2019/01/09/die-ipv4-die/">Die IPV4, Die</a></p>

<blockquote>
<p>Imagine, it is 2019. Easy, ha? Imagine, it is 2019 and you want to turn off IPv4. Like, off off. Really off. Not disabling IPv6, but disabling IPv4.</p>
</blockquote>

<ul>
<li>Two steps back</li>
</ul>

<blockquote>
<p>You might be coming here wondering, why would anybody want to do what we are asking to be done. Well, it is dead simple: We are running data centers (like Data Center Light) with a lot of IPv6 only equipment. There simply is no need for IPv4. So why would we want to have it enabled?<br>
Also, here at ungleich, we defined 2019 as the year to move away from IPv4.</p>
</blockquote>

<ul>
<li>The challenge</li>
</ul>

<blockquote>
<p>Do you like puzzles? Competitions? Challenges? Hacking? Well. If ANY of this is of your interest, here is a real challenge for you:<br>
We offer a 100 CHF (roughly 100 USD) for anyone who can give us a detailed description of how to turn IPv4 completely off in an operating system and allowing it to communicate with IPv6 only. This should obviously include a tiny proof that your operating system is really unable to use IPv4 at all. Just flushing IPv4 addresses and keeping the IPv4 stack loaded, does not count.</p>
</blockquote>

<p><hr></p>

<p>###<a href="http://www.ghostbsd.org/18.12_release_announcement">GhostBSD 18.12 released</a></p>

<blockquote>
<p>GhostBSD 18.12 is an updated iso of GhostBSD 18.10 with some little changes to the live DVD/USB and with updated packages.</p>
</blockquote>

<ul>
<li>What has changed since 18.10</li>
<li>removed default call of kernel modules for AMD and Intel</li>
<li>replaced octopkg by software-station</li>
<li>added back gop hacks to the live system</li>
<li>added ghostbsd-drivers and ghostbsd-utils</li>
<li>we updated the packages to the latest build</li>
</ul>

<p><hr></p>

<p>###<a href="https://threader.app/thread/1083054050315243521">And Now for a laugh : #unixinpictures</a></p>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://www.jwz.org/blog/2019/01/we-are-now-closer-to-the-y2038-bug-than-the-y2k-bug/">We are now closer to the Y2038 bug than the Y2K bug</a></li>
<li><a href="https://old.reddit.com/r/openbsd/comments/ae6b77/openbsd_enterprise_use/">OpenBSD Enterprise use</a></li>
<li><a href="https://old.reddit.com/r/unix/comments/af0kij/note_the_whole_book_series_in_the_background/">AT&amp;T Unix Books</a></li>
<li><a href="https://oshogbo.vexillium.org/blog/54/">Process title and missing memory space</a></li>
<li><a href="http://www.os2museum.com/wp/the-history-of-a-security-hole/">The History of a Security Hole</a></li>
<li><a href="https://www.geoghegan.ca/unbound-adblock.html">unbound-adblock: The ultimate network adblocker!</a></li>
<li><a href="https://github.com/wheelsystems/nvlist">FreeBSD’s name/value pairs library</a></li>
<li><a href="https://utcc.utoronto.ca/~cks/space/blog/unix/PidRollover">Pid Rollover</a></li>
<li><a href="https://www.cambus.net/booting-openbsd-kernels-in-efi-mode-with-qemu/">Booting OpenBSD kernels in EFI mode with QEMU</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&amp;m=154715734504845&amp;w=2">OpenBSD CVS commit: Make mincore lie</a></li>
<li><a href="http://www.bsdcan.org/2019/papers.php">BSDCan 2019 CfP ending January 19 - Submit!</a></li>
<li><a href="https://www.eventbrite.com/e/zfs-user-conference-2019-tickets-54530403906">OpenZFS User Conference - April 18-19</a></li>
<li><a href="https://www.freebsdfoundation.org/journal/">FreeBSD Journal is a free publication now</a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Chris - <a href="http://dpaste.com/101P5HA">Boot environments and SSDs</a></li>
<li>Jonathan - <a href="http://dpaste.com/0YTPYV4">Bytes issued during a zpool scrub</a></li>
<li>Bostjan - <a href="http://dpaste.com/0Q97J7H#wrap">ZFS Record Size and my mistakes</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>SCP client vulnerabilities, BSDs vs Linux benchmarks on a Tyan EPYC Server, fame for the Unix inventors, Die IPv4, GhostBSD 18.12 released, Unix in pictures, and more.</p>

<p>##Headlines<br>
###<a href="https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt">scp client multiple vulnerabilities</a></p>

<ul>
<li>Overview</li>
<li>SCP clients from multiple vendors are susceptible to a malicious scp server performing<br>
unauthorized changes to target directory and/or client output manipulation.</li>
<li>Description</li>
<li>Many scp clients fail to verify if the objects returned by the scp server match those<br>
it asked for. This issue dates back to 1983 and rcp, on which scp is based. A separate<br>
flaw in the client allows the target directory attributes to be changed arbitrarily.<br>
Finally, two vulnerabilities in clients may allow server to spoof the client output.</li>
<li>Impact</li>
<li>Malicious scp server can write arbitrary files to scp target directory, change the<br>
target directory permissions and to spoof the client output.</li>
<li>Details</li>
</ul>

<blockquote>
<p>The discovered vulnerabilities, described in more detail below, enables the attack<br>
described here in brief.</p>
</blockquote>

<ul>
<li>
<ol>
<li>The attacker controlled server or Man-in-the-Middle(*) attack drops .bash_aliases file to victim’s home directory when the victim performs scp operation from the server. The transfer of extra files is hidden by sending ANSI control sequences via stderr. For example:</li>
</ol>
</li>
</ul>

<p><code>user@local:~$ scp user@remote:readme.txt .</code><br>
<code>readme.txt 100% 494 1.6KB/s 00:00</code><br>
<code>user@local:~$</code></p>

<ul>
<li>
<ol start="2">
<li>Once the victim launches a new shell, the malicious commands in .bash_aliases get executed.</li>
</ol>
</li>
<li>*) Man-in-the-Middle attack does require the victim to accept the wrong host fingerprint.</li>
</ul>

<p><hr></p>

<p>###<a href="https://www.phoronix.com/scan.php?page=article&amp;item=dfly-freebsd-tyanamd&amp;num=1">FreeBSD 12.0 vs. DragonFlyBSD 5.4 vs. TrueOS 18.12 vs. Linux On A Tyan EPYC Server</a></p>

<blockquote>
<p>Last month when running FreeBSD 12.0 benchmarks on a 2P EPYC server I wasn’t able to run any side-by-side benchmarks with the new DragonFlyBSD 5.4 as this BSD was crashing during the boot process on that board. But fortunately on another AMD EPYC server available, the EPYC 1P TYAN Transport SX TN70A-B8026, DragonFlyBSD 5.4.1 runs fine. So for this first round of BSD benchmarking in 2019 are tests of FreeBSD 11.2, FreeBSD 12.0, DragonFlyBSD 5.4.1, the new TrueOS 18.12, and a few Linux distributions (CentOS 7, Ubuntu 18.04.1 LTS, and Clear Linux) on this EPYC 7601 server in a variety of workloads.</p>
</blockquote>

<blockquote>
<p>DragonFlyBSD 5.4.1 ran fine on this Tyan server and could boot fine unlike the issue encountered on the Dell PowerEdge R7425 for this particular BSD. But on the Tyan server, DragonFlyBSD 5.2.2 wouldn’t boot so only this latest DragonFlyBSD release series was used as part of the comparison.</p>
</blockquote>

<ul>
<li>
<p>A summary of the operating systems tested for this EPYC 7601 OS benchmark comparison included:</p>
</li>
<li>
<p>DragonFlyBSD 5.4.1 - The latest release of Matthew Dillon’s operating system while using the HAMMER2 file-system and GCC 8.1 compiler that is now the default system compiler for this BSD.</p>
</li>
<li>
<p>FreeBSD 11.2 - The previous stable release of FreeBSD. Installed with a ZFS file-system.</p>
</li>
<li>
<p>FreeBSD 12.0 - The latest stable release of FreeBSD and installed with its ZFS option.</p>
</li>
<li>
<p>TrueOS 18.12 - The latest release of the iX systems’ FreeBSD derivative. TrueOS 18.12 is based on FreeBSD 13.0-CURRENT and uses ZFS by default and was using the Clang 7.0.1 compiler compared to Clang 6.0.1 on FreeBSD 12.0.</p>
</li>
<li>
<p>CentOS Linux 7 - The latest EL7 operating system performance.</p>
</li>
<li>
<p>Ubuntu 18.04.1 LTS - The latest Ubuntu Long Term Support release.</p>
</li>
<li>
<p>Clear Linux 27120 - The latest rolling release as of testing out of Intel’s Open-Source Technology Center. Clear Linux often reflects as close to the gold standard for performance as possible with its insanely tuned software stack for offering optimal performance on x86_64 performance for generally showing best what the hardware is capable of.</p>
</li>
</ul>

<blockquote>
<p>Throughout all of this testing, the Tyan 2U server was kept to its same configuration of an AMD EPYC 7601 (32 cores / 64 threads) at stock speeds, 8 x 16GB DDR4-2666 ECC memory, and 280GB Intel Optane 900p SSD benchmarks.</p>
</blockquote>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://www.engadget.com/2019/01/08/national-inventors-hall-of-fame-class-of-2019/">National Inventors Hall of Fame honors creators of Unix</a></p>

<blockquote>
<p>Dennis Ritchie (Posthumous) and Ken Thompson: UNIX Operating System<br>
Thompson and Ritchie’s creation of the UNIX operating system and the C programming language were pivotal developments in the progress of computer science. Today, 50 years after its beginnings, UNIX and UNIX-like systems continue to run machinery from supercomputers to smartphones. The UNIX operating system remains the basis of much of the world’s computing infrastructure, and C language – written to simplify the development of UNIX – is one of the most widely used languages today.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://ungleich.ch/en-us/cms/blog/2019/01/09/die-ipv4-die/">Die IPV4, Die</a></p>

<blockquote>
<p>Imagine, it is 2019. Easy, ha? Imagine, it is 2019 and you want to turn off IPv4. Like, off off. Really off. Not disabling IPv6, but disabling IPv4.</p>
</blockquote>

<ul>
<li>Two steps back</li>
</ul>

<blockquote>
<p>You might be coming here wondering, why would anybody want to do what we are asking to be done. Well, it is dead simple: We are running data centers (like Data Center Light) with a lot of IPv6 only equipment. There simply is no need for IPv4. So why would we want to have it enabled?<br>
Also, here at ungleich, we defined 2019 as the year to move away from IPv4.</p>
</blockquote>

<ul>
<li>The challenge</li>
</ul>

<blockquote>
<p>Do you like puzzles? Competitions? Challenges? Hacking? Well. If ANY of this is of your interest, here is a real challenge for you:<br>
We offer a 100 CHF (roughly 100 USD) for anyone who can give us a detailed description of how to turn IPv4 completely off in an operating system and allowing it to communicate with IPv6 only. This should obviously include a tiny proof that your operating system is really unable to use IPv4 at all. Just flushing IPv4 addresses and keeping the IPv4 stack loaded, does not count.</p>
</blockquote>

<p><hr></p>

<p>###<a href="http://www.ghostbsd.org/18.12_release_announcement">GhostBSD 18.12 released</a></p>

<blockquote>
<p>GhostBSD 18.12 is an updated iso of GhostBSD 18.10 with some little changes to the live DVD/USB and with updated packages.</p>
</blockquote>

<ul>
<li>What has changed since 18.10</li>
<li>removed default call of kernel modules for AMD and Intel</li>
<li>replaced octopkg by software-station</li>
<li>added back gop hacks to the live system</li>
<li>added ghostbsd-drivers and ghostbsd-utils</li>
<li>we updated the packages to the latest build</li>
</ul>

<p><hr></p>

<p>###<a href="https://threader.app/thread/1083054050315243521">And Now for a laugh : #unixinpictures</a></p>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://www.jwz.org/blog/2019/01/we-are-now-closer-to-the-y2038-bug-than-the-y2k-bug/">We are now closer to the Y2038 bug than the Y2K bug</a></li>
<li><a href="https://old.reddit.com/r/openbsd/comments/ae6b77/openbsd_enterprise_use/">OpenBSD Enterprise use</a></li>
<li><a href="https://old.reddit.com/r/unix/comments/af0kij/note_the_whole_book_series_in_the_background/">AT&amp;T Unix Books</a></li>
<li><a href="https://oshogbo.vexillium.org/blog/54/">Process title and missing memory space</a></li>
<li><a href="http://www.os2museum.com/wp/the-history-of-a-security-hole/">The History of a Security Hole</a></li>
<li><a href="https://www.geoghegan.ca/unbound-adblock.html">unbound-adblock: The ultimate network adblocker!</a></li>
<li><a href="https://github.com/wheelsystems/nvlist">FreeBSD’s name/value pairs library</a></li>
<li><a href="https://utcc.utoronto.ca/~cks/space/blog/unix/PidRollover">Pid Rollover</a></li>
<li><a href="https://www.cambus.net/booting-openbsd-kernels-in-efi-mode-with-qemu/">Booting OpenBSD kernels in EFI mode with QEMU</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&amp;m=154715734504845&amp;w=2">OpenBSD CVS commit: Make mincore lie</a></li>
<li><a href="http://www.bsdcan.org/2019/papers.php">BSDCan 2019 CfP ending January 19 - Submit!</a></li>
<li><a href="https://www.eventbrite.com/e/zfs-user-conference-2019-tickets-54530403906">OpenZFS User Conference - April 18-19</a></li>
<li><a href="https://www.freebsdfoundation.org/journal/">FreeBSD Journal is a free publication now</a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Chris - <a href="http://dpaste.com/101P5HA">Boot environments and SSDs</a></li>
<li>Jonathan - <a href="http://dpaste.com/0YTPYV4">Bytes issued during a zpool scrub</a></li>
<li>Bostjan - <a href="http://dpaste.com/0Q97J7H#wrap">ZFS Record Size and my mistakes</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </itunes:summary>
</item>
<item>
  <title>79: Just Add QEMU</title>
  <link>https://www.bsdnow.tv/79</link>
  <guid isPermaLink="false">cb3fc5ef-1795-4d76-8b42-56a205255a03</guid>
  <pubDate>Wed, 04 Mar 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cb3fc5ef-1795-4d76-8b42-56a205255a03.mp3" length="60830644" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be talking to Sean Bruno. He's been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We've also got answers to viewer-submitted questions and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:24:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this time on the show, we'll be talking to Sean Bruno. He's been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We've also got answers to viewer-submitted questions and all this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
AsiaBSDCon 2015 schedule (http://2015.asiabsdcon.org/timetable.html.en)
Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up
This year's conference will be between 12-15 March at the Tokyo University of Science in Japan
The first and second days are for tutorials, as well as the developer summit and vendor summit
Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again
Not counting the ones that have yet to be revealed (as of the day we're recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD
Summaries of all the presentations are on the timetable page if you scroll down a bit
***
FreeBSD foundation updates and more (https://www.freebsdfoundation.org/press/2015febupdate.pdf)
The FreeBSD foundation (http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1) has posted a number of things this week, the first of which is their February 2015 status update
It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform
There's a FOSDEM recap and another update of their fundraising goal for 2015
They also have two new blog posts: a trip report from SCALE13x (http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html) and a featured "FreeBSD in the trenches (http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html)" article about how a small typo caused a lot of ZFS chaos in the cluster
"Then panic ensued.  The machine didn't panic -- I did."
***
OpenBSD improves browser security (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142523501726732&amp;amp;w=2)
No matter what OS you run on your desktop, the most likely entry point for an exploit these days is almost certainly the web browser
Ted Unangst writes in to the OpenBSD misc list to introduce a new project he's working on, simply titled "improving browser security"
He gives some background on the W^X memory protection (https://en.wikipedia.org/wiki/W%5EX) in the base system, but also mentions that some applications in ports don't adhere to it
For it to be enforced globally instead of just recommended, at least one browser (or specifically, one JIT (https://en.wikipedia.org/wiki/Just-in-time_compilation) engine) needs to be fixed to use it
"A system that is 'all W^X except where it's not' is the same as a system that's not W^X. We've worked hard to provide a secure foundation for programs; we'd like to see them take advantage of it."
The work is being supported by the OpenBSD foundation (http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2), and we'll keep you updated on this undertaking as more news about it is released
There's also some discussion on Hacker News (https://news.ycombinator.com/item?id=9128360) and Undeadly (http://undeadly.org/cgi?action=article&amp;amp;sid=20150303075848&amp;amp;mode=expanded) about it
***
NetBSD at Open Source Conference 2015 Tokyo (https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html)
The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo
There's even a spreadsheet (https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0) of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)
If you just can't get enough strange devices running BSD, check the mailing list post for lots of pictures
Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we'll run into them
***
Interview - Sean Bruno - sbruno@freebsd.org (mailto:sbruno@freebsd.org) / @franknbeans (https://twitter.com/franknbeans)
Cross-compiling packages with poudriere (http://www.bsdnow.tv/tutorials/poudriere) and QEMU
News Roundup
The Crypto Bone (http://crypto-bone.com/what.html)
The Crypto Bone is a new device (http://www.crypto-bone.com/) that's aimed at making encryption and secure communications easier (http://crypto-bone.com/cbb-usersview.html) and more accessible
Under the hood, it's actually just a Beaglebone (http://beagleboard.org/bone) board, running stock OpenBSD with a few extra packages
It includes a web interface (http://crypto-bone.com/release/root/var/www/apache/html/) for configuring keys and secure tunnels
The source code (http://crypto-bone.com/release/root/) is freely available for anyone interested in hacking on it (or auditing the crypto), and there's a technical overview (http://crypto-bone.com/cbb-technicalview.html) of how everything works on their site
If you don't want to teach your mom how to use PGP, buy her one of these(?)
***
BSD in the 2015 Google Summer of Code (https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page)
For those who don't know, GSoC is a way for students to get paid to work on a coding project for an open source organization
Good news: both FreeBSD and OpenBSD were accepted (https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015) for the 2015 event
FreeBSD has a wiki page (https://wiki.freebsd.org/SummerOfCodeIdeas) of ideas for people to work on
OpenBSD also has an ideas page (http://www.openbsdfoundation.org/gsoc2015.html) where you can see some of the initial things that might be interesting
If you're a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it
Who knows, you may even end up on the show (http://www.bsdnow.tv/episodes/2015_01_07-system_disaster) if you work on a cool project
GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you'd like to hack on
***
pfSense 2.3 roadmap (https://blog.pfsense.org/?p=1588)
The pfSense team has posted a new blog entry, detailing some of their plans for future versions
PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions
PBIs are scheduled to be replaced with native pkgng packages
Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely
Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***
PCBSD 10.1.2 security features (http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/)
PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post
A new "personacrypt" utility is introduced, which allows for easy encryption and management of external drives for your home directory
Going along with this, it also has a "stealth mode" that allows for one-time temporary home directories (but it doesn't self-destruct, don't worry)
The LibreSSL integration also continues, and now packages will be built with it by default
If you're using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update
They've also been working on introducing some new options to enable tunneling your traffic through Tor
There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week
A small disclaimer: remember that many things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity
Look forward to Kris wearing a Tor shirt (https://www.torproject.org/getinvolved/tshirt.html) in future episodes
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s2ofBPRT5n)
Chris writes in (http://slexy.org/view/s26LsYcoJF)
Van writes in (http://slexy.org/view/s28Rho0jvL)
Stu writes in (http://slexy.org/view/s21AkGbniU)
***
Mailing List Gold
H (https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html)
Pay up, mister Free (https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html)
Heritage protected (https://www.mail-archive.com/tech%40openbsd.org/msg22663.html)
Blind leading the blind (https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html)
What are the chances (https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, qemu, mips, arm, poudriere, packages, scale13x, asiabsdcon 2015, tor, tails, w^m, browser, exploit</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking to Sean Bruno. He&#39;s been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2015.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon 2015 schedule</a></h3>

<ul>
<li>Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up</li>
<li>This year&#39;s conference will be between 12-15 March at the Tokyo University of Science in Japan</li>
<li>The first and second days are for tutorials, as well as the developer summit and vendor summit</li>
<li>Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again</li>
<li>Not counting the ones that have yet to be revealed (as of the day we&#39;re recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD</li>
<li>Summaries of all the presentations are on the timetable page if you scroll down a bit
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015febupdate.pdf" rel="nofollow">FreeBSD foundation updates and more</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">FreeBSD foundation</a> has posted a number of things this week, the first of which is their February 2015 status update</li>
<li>It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform</li>
<li>There&#39;s a FOSDEM recap and another update of their fundraising goal for 2015</li>
<li>They also have two new blog posts: <a href="http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html" rel="nofollow">a trip report from SCALE13x</a> and a featured &quot;<a href="http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html" rel="nofollow">FreeBSD in the trenches</a>&quot; article about how a small typo caused a lot of ZFS chaos in the cluster</li>
<li>&quot;Then panic ensued.  The machine didn&#39;t panic -- I did.&quot;
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142523501726732&w=2" rel="nofollow">OpenBSD improves browser security</a></h3>

<ul>
<li>No matter what OS you run on your desktop, the most likely entry point for an exploit these days is <em>almost certainly</em> the web browser</li>
<li>Ted Unangst writes in to the OpenBSD misc list to introduce a new project he&#39;s working on, simply titled &quot;improving browser security&quot;</li>
<li>He gives some background on the <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup> memory protection</a> in the base system, but also mentions that some applications in ports don&#39;t adhere to it</li>
<li>For it to be enforced globally instead of just recommended, at least one browser (or specifically, one <a href="https://en.wikipedia.org/wiki/Just-in-time_compilation" rel="nofollow">JIT</a> engine) needs to be fixed to use it</li>
<li>&quot;A system that is &#39;all W<sup>X</sup> except where it&#39;s not&#39; is the same as a system that&#39;s not W<sup>X.</sup> We&#39;ve worked hard to provide a secure foundation for programs; we&#39;d like to see them take advantage of it.&quot;</li>
<li>The work is being supported by the <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">OpenBSD foundation</a>, and we&#39;ll keep you updated on this undertaking as more news about it is released</li>
<li>There&#39;s also some discussion <a href="https://news.ycombinator.com/item?id=9128360" rel="nofollow">on Hacker News</a> <a href="http://undeadly.org/cgi?action=article&sid=20150303075848&mode=expanded" rel="nofollow">and Undeadly</a> about it
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html" rel="nofollow">NetBSD at Open Source Conference 2015 Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo</li>
<li>There&#39;s even a <a href="https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0" rel="nofollow">spreadsheet</a> of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)</li>
<li>If you just can&#39;t get enough strange devices running BSD, check the mailing list post for lots of pictures</li>
<li>Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we&#39;ll run into them
***</li>
</ul>

<h2>Interview - Sean Bruno - <a href="mailto:sbruno@freebsd.org" rel="nofollow">sbruno@freebsd.org</a> / <a href="https://twitter.com/franknbeans" rel="nofollow">@franknbeans</a></h2>

<p>Cross-compiling packages with <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> and QEMU</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://crypto-bone.com/what.html" rel="nofollow">The Crypto Bone</a></h3>

<ul>
<li>The Crypto Bone is a new <a href="http://www.crypto-bone.com/" rel="nofollow">device</a> that&#39;s aimed at making encryption and secure communications <a href="http://crypto-bone.com/cbb-usersview.html" rel="nofollow">easier</a> and more accessible</li>
<li>Under the hood, it&#39;s actually just a <a href="http://beagleboard.org/bone" rel="nofollow">Beaglebone</a> board, running stock OpenBSD with a few extra packages</li>
<li>It includes a <a href="http://crypto-bone.com/release/root/var/www/apache/html/" rel="nofollow">web interface</a> for configuring keys and secure tunnels</li>
<li>The <a href="http://crypto-bone.com/release/root/" rel="nofollow">source code</a> is freely available for anyone interested in hacking on it (or auditing the crypto), and there&#39;s <a href="http://crypto-bone.com/cbb-technicalview.html" rel="nofollow">a technical overview</a> of how everything works on their site</li>
<li>If you don&#39;t want to teach your mom how to use PGP, buy her one of these(?)
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page" rel="nofollow">BSD in the 2015 Google Summer of Code</a></h3>

<ul>
<li>For those who don&#39;t know, GSoC is a way for students to get paid to work on a coding project for an open source organization</li>
<li>Good news: both FreeBSD and OpenBSD were <a href="https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015" rel="nofollow">accepted</a> for the 2015 event</li>
<li>FreeBSD has <a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">a wiki page</a> of ideas for people to work on</li>
<li>OpenBSD also has <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">an ideas page</a> where you can see some of the initial things that might be interesting</li>
<li>If you&#39;re a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it</li>
<li>Who knows, you may even <a href="http://www.bsdnow.tv/episodes/2015_01_07-system_disaster" rel="nofollow">end up on the show</a> if you work on a cool project</li>
<li>GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you&#39;d like to hack on
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1588" rel="nofollow">pfSense 2.3 roadmap</a></h3>

<ul>
<li>The pfSense team has posted a new blog entry, detailing some of their plans for future versions</li>
<li>PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions</li>
<li>PBIs are scheduled to be replaced with native pkgng packages</li>
<li>Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely</li>
<li>Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/" rel="nofollow">PCBSD 10.1.2 security features</a></h3>

<ul>
<li>PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post</li>
<li>A new &quot;personacrypt&quot; utility is introduced, which allows for easy encryption and management of external drives for your home directory</li>
<li>Going along with this, it also has a &quot;stealth mode&quot; that allows for one-time temporary home directories (but it doesn&#39;t self-destruct, don&#39;t worry)</li>
<li>The LibreSSL integration also continues, and now packages will be built with it by default</li>
<li>If you&#39;re using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update</li>
<li>They&#39;ve also been working on introducing some new options to enable tunneling your traffic through Tor</li>
<li>There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week</li>
<li>A small disclaimer: remember that <strong>many</strong> things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity</li>
<li>Look forward to Kris wearing a <a href="https://www.torproject.org/getinvolved/tshirt.html" rel="nofollow">Tor shirt</a> in future episodes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ofBPRT5n" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s26LsYcoJF" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s28Rho0jvL" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s21AkGbniU" rel="nofollow">Stu writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html" rel="nofollow">H</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html" rel="nofollow">Pay up, mister Free</a></li>
<li><a href="https://www.mail-archive.com/tech%40openbsd.org/msg22663.html" rel="nofollow">Heritage protected</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html" rel="nofollow">Blind leading the blind</a></li>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html" rel="nofollow">What are the chances</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking to Sean Bruno. He&#39;s been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2015.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon 2015 schedule</a></h3>

<ul>
<li>Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up</li>
<li>This year&#39;s conference will be between 12-15 March at the Tokyo University of Science in Japan</li>
<li>The first and second days are for tutorials, as well as the developer summit and vendor summit</li>
<li>Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again</li>
<li>Not counting the ones that have yet to be revealed (as of the day we&#39;re recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD</li>
<li>Summaries of all the presentations are on the timetable page if you scroll down a bit
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015febupdate.pdf" rel="nofollow">FreeBSD foundation updates and more</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">FreeBSD foundation</a> has posted a number of things this week, the first of which is their February 2015 status update</li>
<li>It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform</li>
<li>There&#39;s a FOSDEM recap and another update of their fundraising goal for 2015</li>
<li>They also have two new blog posts: <a href="http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html" rel="nofollow">a trip report from SCALE13x</a> and a featured &quot;<a href="http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html" rel="nofollow">FreeBSD in the trenches</a>&quot; article about how a small typo caused a lot of ZFS chaos in the cluster</li>
<li>&quot;Then panic ensued.  The machine didn&#39;t panic -- I did.&quot;
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142523501726732&w=2" rel="nofollow">OpenBSD improves browser security</a></h3>

<ul>
<li>No matter what OS you run on your desktop, the most likely entry point for an exploit these days is <em>almost certainly</em> the web browser</li>
<li>Ted Unangst writes in to the OpenBSD misc list to introduce a new project he&#39;s working on, simply titled &quot;improving browser security&quot;</li>
<li>He gives some background on the <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup> memory protection</a> in the base system, but also mentions that some applications in ports don&#39;t adhere to it</li>
<li>For it to be enforced globally instead of just recommended, at least one browser (or specifically, one <a href="https://en.wikipedia.org/wiki/Just-in-time_compilation" rel="nofollow">JIT</a> engine) needs to be fixed to use it</li>
<li>&quot;A system that is &#39;all W<sup>X</sup> except where it&#39;s not&#39; is the same as a system that&#39;s not W<sup>X.</sup> We&#39;ve worked hard to provide a secure foundation for programs; we&#39;d like to see them take advantage of it.&quot;</li>
<li>The work is being supported by the <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">OpenBSD foundation</a>, and we&#39;ll keep you updated on this undertaking as more news about it is released</li>
<li>There&#39;s also some discussion <a href="https://news.ycombinator.com/item?id=9128360" rel="nofollow">on Hacker News</a> <a href="http://undeadly.org/cgi?action=article&sid=20150303075848&mode=expanded" rel="nofollow">and Undeadly</a> about it
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html" rel="nofollow">NetBSD at Open Source Conference 2015 Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo</li>
<li>There&#39;s even a <a href="https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0" rel="nofollow">spreadsheet</a> of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)</li>
<li>If you just can&#39;t get enough strange devices running BSD, check the mailing list post for lots of pictures</li>
<li>Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we&#39;ll run into them
***</li>
</ul>

<h2>Interview - Sean Bruno - <a href="mailto:sbruno@freebsd.org" rel="nofollow">sbruno@freebsd.org</a> / <a href="https://twitter.com/franknbeans" rel="nofollow">@franknbeans</a></h2>

<p>Cross-compiling packages with <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> and QEMU</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://crypto-bone.com/what.html" rel="nofollow">The Crypto Bone</a></h3>

<ul>
<li>The Crypto Bone is a new <a href="http://www.crypto-bone.com/" rel="nofollow">device</a> that&#39;s aimed at making encryption and secure communications <a href="http://crypto-bone.com/cbb-usersview.html" rel="nofollow">easier</a> and more accessible</li>
<li>Under the hood, it&#39;s actually just a <a href="http://beagleboard.org/bone" rel="nofollow">Beaglebone</a> board, running stock OpenBSD with a few extra packages</li>
<li>It includes a <a href="http://crypto-bone.com/release/root/var/www/apache/html/" rel="nofollow">web interface</a> for configuring keys and secure tunnels</li>
<li>The <a href="http://crypto-bone.com/release/root/" rel="nofollow">source code</a> is freely available for anyone interested in hacking on it (or auditing the crypto), and there&#39;s <a href="http://crypto-bone.com/cbb-technicalview.html" rel="nofollow">a technical overview</a> of how everything works on their site</li>
<li>If you don&#39;t want to teach your mom how to use PGP, buy her one of these(?)
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page" rel="nofollow">BSD in the 2015 Google Summer of Code</a></h3>

<ul>
<li>For those who don&#39;t know, GSoC is a way for students to get paid to work on a coding project for an open source organization</li>
<li>Good news: both FreeBSD and OpenBSD were <a href="https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015" rel="nofollow">accepted</a> for the 2015 event</li>
<li>FreeBSD has <a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">a wiki page</a> of ideas for people to work on</li>
<li>OpenBSD also has <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">an ideas page</a> where you can see some of the initial things that might be interesting</li>
<li>If you&#39;re a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it</li>
<li>Who knows, you may even <a href="http://www.bsdnow.tv/episodes/2015_01_07-system_disaster" rel="nofollow">end up on the show</a> if you work on a cool project</li>
<li>GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you&#39;d like to hack on
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1588" rel="nofollow">pfSense 2.3 roadmap</a></h3>

<ul>
<li>The pfSense team has posted a new blog entry, detailing some of their plans for future versions</li>
<li>PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions</li>
<li>PBIs are scheduled to be replaced with native pkgng packages</li>
<li>Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely</li>
<li>Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/" rel="nofollow">PCBSD 10.1.2 security features</a></h3>

<ul>
<li>PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post</li>
<li>A new &quot;personacrypt&quot; utility is introduced, which allows for easy encryption and management of external drives for your home directory</li>
<li>Going along with this, it also has a &quot;stealth mode&quot; that allows for one-time temporary home directories (but it doesn&#39;t self-destruct, don&#39;t worry)</li>
<li>The LibreSSL integration also continues, and now packages will be built with it by default</li>
<li>If you&#39;re using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update</li>
<li>They&#39;ve also been working on introducing some new options to enable tunneling your traffic through Tor</li>
<li>There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week</li>
<li>A small disclaimer: remember that <strong>many</strong> things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity</li>
<li>Look forward to Kris wearing a <a href="https://www.torproject.org/getinvolved/tshirt.html" rel="nofollow">Tor shirt</a> in future episodes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ofBPRT5n" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s26LsYcoJF" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s28Rho0jvL" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s21AkGbniU" rel="nofollow">Stu writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html" rel="nofollow">H</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html" rel="nofollow">Pay up, mister Free</a></li>
<li><a href="https://www.mail-archive.com/tech%40openbsd.org/msg22663.html" rel="nofollow">Heritage protected</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html" rel="nofollow">Blind leading the blind</a></li>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html" rel="nofollow">What are the chances</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>55: The Promised WLAN</title>
  <link>https://www.bsdnow.tv/55</link>
  <guid isPermaLink="false">138f743e-c056-4292-9d04-7a7022b34944</guid>
  <pubDate>Wed, 17 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/138f743e-c056-4292-9d04-7a7022b34944.mp3" length="57124948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we've got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:19:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we've got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD 10.1-BETA1 is out (http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/)
The first maintenance update in the 10.x series of FreeBSD is on its way
Since we can't see a changelog yet, the 10-STABLE release notes (https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html) offer a glimpse at some of the new features and fixes that will be included in 10.1
The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11
Initial UEFI support, multithreaded softupdates for UFS and many more things were added
You can check the release schedule (https://www.freebsd.org/releases/10.1R/schedule.html) for the planned release dates
Details for the various forms of release media can be found in the announcement (https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html)
***
Remote headless OpenBSD installation (https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/)
A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes
Sometimes you'll get lucky and they'll offer FreeBSD, but it's much harder to find ones that natively support other BSDs
This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely
It required a few specific steps you'll want to take note of, but is extremely useful for those pesky hosting providers
***
Building a firewall appliance with pfSense (http://www.get-virtual.net/2014/09/16/build-firewall-appliance/)
In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate ALIX2C3 APU (http://pcengines.ch/alix2c3.htm)
After the author's modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board
The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)
There's a lot of great pictures of the hardware and detailed screenshots, definitely worth a look
***
Receive Side Scaling - UDP testing (http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html)
Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress
He's using some quad core boxes with 10 gigabit ethernet for the tests
The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do
He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)
And speaking of Adrian Chadd...
***
Interview - Adrian Chadd - adrian@freebsd.org (mailto:adrian@freebsd.org) / @erikarn (https://twitter.com/erikarn)
BSD on laptops, wifi, drivers, various topics
News Roundup
Sendmail removed from OpenBSD (http://undeadly.org/cgi?action=article&amp;amp;sid=20140916084251)
Mail server admins around the world are rejoicing (https://news.ycombinator.com/item?id=8324475), because sendmail is finally gone (http://marc.info/?l=openbsd-cvs&amp;amp;m=141081997917153&amp;amp;w=2) from OpenBSD
With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded
If you've ever compared a "sendmail.cf" file to an "smtpd.conf" file... the different is as clear as night and day
5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it
If you still need it for some reason, sendmail will live in ports from now on
Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly's mail transfer agent in base (instead of an entire mail server)
***
pfSense backups with pfmb (https://github.com/zinkwazi/pfmb)
We've mentioned the need for a tool to back up pfSense configs a number of times on the show
This script, hosted on github, does pretty much exactly that
It can connect to one (or more!) pfSense installations and back up the configuration
You can roll back or replace failed hardware very easily with its restore function
Everything is done over SSH, so it should be pretty secure
***
The Design and Implementation of the FreeBSD Operating System (http://www.amazon.com/dp/0321968972/)
We mentioned when the pre orders were up, but now "The Design and Implementation of the FreeBSD Operating System, 2nd edition" seems to be shipping out
If you're interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy
We've even had all (http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache) three (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) authors (http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson) on the show before!
***
OpenBSD's systemd replacement updates (http://undeadly.org/cgi?action=article&amp;amp;sid=20140915064856)
We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention
One of the developers writes in to Undeadly, detailing what's going on and what the overall status is
He also clears up any confusion about "porting systemd to BSD" (that's not what's going on) or his code ever ending up in base (it won't)
The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***
Feedback/Questions
Brad writes in (http://slexy.org/view/s20jrx0nIf)
Ben writes in (http://slexy.org/view/s21hFUJ2ju)
Mathieu writes in (http://slexy.org/view/s21RgSzOv4)
Steve writes in (http://slexy.org/view/s2P1mzalPh)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, bsd, interview, adrian chadd, wireless, wifi, aircrack-ng, kismet, packet injection, monitor mode, libressl, openssl, qemu, zfs, jails, headless, remote, pfsense, systemd, netgate, apu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we&#39;ve got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/" rel="nofollow">FreeBSD 10.1-BETA1 is out</a></h3>

<ul>
<li>The first maintenance update in the 10.x series of FreeBSD is on its way</li>
<li>Since we can&#39;t see a changelog yet, the 10-STABLE <a href="https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html" rel="nofollow">release notes</a> offer a glimpse at some of the new features and fixes that will be included in 10.1</li>
<li>The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11</li>
<li>Initial UEFI support, multithreaded softupdates for UFS and many more things were added</li>
<li>You can check the <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">release schedule</a> for the planned release dates</li>
<li>Details for the various forms of release media can be found in <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html" rel="nofollow">the announcement</a>
***</li>
</ul>

<h3><a href="https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/" rel="nofollow">Remote headless OpenBSD installation</a></h3>

<ul>
<li>A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes</li>
<li>Sometimes you&#39;ll get lucky and they&#39;ll offer FreeBSD, but it&#39;s much harder to find ones that natively support other BSDs</li>
<li>This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely</li>
<li>It required a few specific steps you&#39;ll want to take note of, but is <strong>extremely useful</strong> for those pesky hosting providers
***</li>
</ul>

<h3><a href="http://www.get-virtual.net/2014/09/16/build-firewall-appliance/" rel="nofollow">Building a firewall appliance with pfSense</a></h3>

<ul>
<li>In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate <a href="http://pcengines.ch/alix2c3.htm" rel="nofollow">ALIX2C3 APU</a></li>
<li>After the author&#39;s modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board</li>
<li>The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)</li>
<li>There&#39;s a lot of <em>great</em> pictures of the hardware and detailed screenshots, definitely worth a look
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html" rel="nofollow">Receive Side Scaling - UDP testing</a></h3>

<ul>
<li>Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress</li>
<li>He&#39;s using some quad core boxes with 10 gigabit ethernet for the tests</li>
<li>The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do</li>
<li>He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)</li>
<li>And speaking of Adrian Chadd...
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>BSD on laptops, wifi, drivers, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140916084251" rel="nofollow">Sendmail removed from OpenBSD</a></h3>

<ul>
<li>Mail server admins around the world <a href="https://news.ycombinator.com/item?id=8324475" rel="nofollow">are rejoicing</a>, because sendmail is <a href="http://marc.info/?l=openbsd-cvs&m=141081997917153&w=2" rel="nofollow">finally gone</a> from OpenBSD</li>
<li>With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded</li>
<li>If you&#39;ve ever compared a &quot;sendmail.cf&quot; file to an &quot;smtpd.conf&quot; file... the different is as clear as night and day</li>
<li>5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it</li>
<li>If you still need it for some reason, sendmail will live in ports from now on</li>
<li>Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly&#39;s mail transfer agent in base (instead of an entire mail server)
***</li>
</ul>

<h3><a href="https://github.com/zinkwazi/pfmb" rel="nofollow">pfSense backups with pfmb</a></h3>

<ul>
<li>We&#39;ve mentioned the need for a tool to back up pfSense configs a number of times on the show</li>
<li>This script, hosted on github, does pretty much exactly that</li>
<li>It can connect to one (or more!) pfSense installations and back up the configuration</li>
<li>You can roll back or replace failed hardware very easily with its restore function</li>
<li>Everything is done over SSH, so it should be pretty secure
***</li>
</ul>

<h3><a href="http://www.amazon.com/dp/0321968972/" rel="nofollow">The Design and Implementation of the FreeBSD Operating System</a></h3>

<ul>
<li>We mentioned when the pre orders were up, but now &quot;The Design and Implementation of the FreeBSD Operating System, 2nd edition&quot; seems to be shipping out</li>
<li>If you&#39;re interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy</li>
<li>We&#39;ve even had <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">all</a> <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">three</a> <a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">authors</a> on the show before!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">OpenBSD&#39;s systemd replacement updates</a></h3>

<ul>
<li>We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention</li>
<li>One of the developers writes in to Undeadly, detailing what&#39;s going on and what the overall status is</li>
<li>He also clears up any confusion about &quot;porting systemd to BSD&quot; <strong>(that&#39;s not what&#39;s going on)</strong> or his code ever ending up in base <strong>(it won&#39;t)</strong></li>
<li>The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20jrx0nIf" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21hFUJ2ju" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21RgSzOv4" rel="nofollow">Mathieu writes in</a></li>
<li><a href="http://slexy.org/view/s2P1mzalPh" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we&#39;ve got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/" rel="nofollow">FreeBSD 10.1-BETA1 is out</a></h3>

<ul>
<li>The first maintenance update in the 10.x series of FreeBSD is on its way</li>
<li>Since we can&#39;t see a changelog yet, the 10-STABLE <a href="https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html" rel="nofollow">release notes</a> offer a glimpse at some of the new features and fixes that will be included in 10.1</li>
<li>The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11</li>
<li>Initial UEFI support, multithreaded softupdates for UFS and many more things were added</li>
<li>You can check the <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">release schedule</a> for the planned release dates</li>
<li>Details for the various forms of release media can be found in <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html" rel="nofollow">the announcement</a>
***</li>
</ul>

<h3><a href="https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/" rel="nofollow">Remote headless OpenBSD installation</a></h3>

<ul>
<li>A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes</li>
<li>Sometimes you&#39;ll get lucky and they&#39;ll offer FreeBSD, but it&#39;s much harder to find ones that natively support other BSDs</li>
<li>This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely</li>
<li>It required a few specific steps you&#39;ll want to take note of, but is <strong>extremely useful</strong> for those pesky hosting providers
***</li>
</ul>

<h3><a href="http://www.get-virtual.net/2014/09/16/build-firewall-appliance/" rel="nofollow">Building a firewall appliance with pfSense</a></h3>

<ul>
<li>In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate <a href="http://pcengines.ch/alix2c3.htm" rel="nofollow">ALIX2C3 APU</a></li>
<li>After the author&#39;s modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board</li>
<li>The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)</li>
<li>There&#39;s a lot of <em>great</em> pictures of the hardware and detailed screenshots, definitely worth a look
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html" rel="nofollow">Receive Side Scaling - UDP testing</a></h3>

<ul>
<li>Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress</li>
<li>He&#39;s using some quad core boxes with 10 gigabit ethernet for the tests</li>
<li>The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do</li>
<li>He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)</li>
<li>And speaking of Adrian Chadd...
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>BSD on laptops, wifi, drivers, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140916084251" rel="nofollow">Sendmail removed from OpenBSD</a></h3>

<ul>
<li>Mail server admins around the world <a href="https://news.ycombinator.com/item?id=8324475" rel="nofollow">are rejoicing</a>, because sendmail is <a href="http://marc.info/?l=openbsd-cvs&m=141081997917153&w=2" rel="nofollow">finally gone</a> from OpenBSD</li>
<li>With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded</li>
<li>If you&#39;ve ever compared a &quot;sendmail.cf&quot; file to an &quot;smtpd.conf&quot; file... the different is as clear as night and day</li>
<li>5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it</li>
<li>If you still need it for some reason, sendmail will live in ports from now on</li>
<li>Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly&#39;s mail transfer agent in base (instead of an entire mail server)
***</li>
</ul>

<h3><a href="https://github.com/zinkwazi/pfmb" rel="nofollow">pfSense backups with pfmb</a></h3>

<ul>
<li>We&#39;ve mentioned the need for a tool to back up pfSense configs a number of times on the show</li>
<li>This script, hosted on github, does pretty much exactly that</li>
<li>It can connect to one (or more!) pfSense installations and back up the configuration</li>
<li>You can roll back or replace failed hardware very easily with its restore function</li>
<li>Everything is done over SSH, so it should be pretty secure
***</li>
</ul>

<h3><a href="http://www.amazon.com/dp/0321968972/" rel="nofollow">The Design and Implementation of the FreeBSD Operating System</a></h3>

<ul>
<li>We mentioned when the pre orders were up, but now &quot;The Design and Implementation of the FreeBSD Operating System, 2nd edition&quot; seems to be shipping out</li>
<li>If you&#39;re interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy</li>
<li>We&#39;ve even had <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">all</a> <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">three</a> <a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">authors</a> on the show before!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">OpenBSD&#39;s systemd replacement updates</a></h3>

<ul>
<li>We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention</li>
<li>One of the developers writes in to Undeadly, detailing what&#39;s going on and what the overall status is</li>
<li>He also clears up any confusion about &quot;porting systemd to BSD&quot; <strong>(that&#39;s not what&#39;s going on)</strong> or his code ever ending up in base <strong>(it won&#39;t)</strong></li>
<li>The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20jrx0nIf" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21hFUJ2ju" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21RgSzOv4" rel="nofollow">Mathieu writes in</a></li>
<li><a href="http://slexy.org/view/s2P1mzalPh" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>47: DES Challenge IV</title>
  <link>https://www.bsdnow.tv/47</link>
  <guid isPermaLink="false">2c9f4e68-6474-41f9-ab80-bb40fbb76855</guid>
  <pubDate>Wed, 23 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2c9f4e68-6474-41f9-ab80-bb40fbb76855.mp3" length="66811828" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show! We've got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:32:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show! We've got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
g2k14 hackathon reports (http://www.openbsd.org/hackathons.html)
Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon
Lots of work got done - in just the first two weeks of July, there were over 1000 commits (http://marc.info/?l=openbsd-cvs&amp;amp;r=1&amp;amp;b=201407&amp;amp;w=2) to their CVS tree
Some of the developers wrote in to document what they were up to at the event
Bob Beck (http://undeadly.org/cgi?action=article&amp;amp;sid=20140713220618) planned to work on kernel stuff, but then "LibreSSL happened" and he spent most of his time working on that
Miod Vallat (http://undeadly.org/cgi?action=article&amp;amp;sid=20140718072312) also tells about his LibreSSL experiences
Brent Cook (http://undeadly.org/cgi?action=article&amp;amp;sid=20140718090456), a new developer, worked mainly on the portable version of LibreSSL (and we'll be interviewing him next week!)
Henning Brauer (http://undeadly.org/cgi?action=article&amp;amp;sid=20140714094454) worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)
Martin Pieuchot (http://undeadly.org/cgi?action=article&amp;amp;sid=20140714191912) fixed some bugs in the USB stack, softraid and misc other things
Marc Espie (http://undeadly.org/cgi?action=article&amp;amp;sid=20140714202157) improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency
Martin Pelikan (http://undeadly.org/cgi?action=article&amp;amp;sid=20140715120259) integrated read-only ext4 support
Vadim Zhukov (http://undeadly.org/cgi?action=article&amp;amp;sid=20140715094848) did lots of ports work, including working on KDE4
Theo de Raadt (http://undeadly.org/cgi?action=article&amp;amp;sid=20140715212333) created a new, more secure system call, "sendsyslog" and did a lot of work with /etc, sysmerge and the rc scripts
Paul Irofti (http://undeadly.org/cgi?action=article&amp;amp;sid=20140718134017) worked on the USB stack, specifically for the Octeon platform
Sebastian Benoit (http://undeadly.org/cgi?action=article&amp;amp;sid=20140719104939) worked on relayd filters and IPv6 code
Jasper Lievisse Adriaanse (http://undeadly.org/cgi?action=article&amp;amp;sid=20140719134058) did work with puppet, packages and the bootloader
Jonathan Gray (http://undeadly.org/cgi?action=article&amp;amp;sid=20140719082410) imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection
Stefan Sperling (http://undeadly.org/cgi?action=article&amp;amp;sid=20140721125235) fixed a lot of issues with wireless drivers
Florian Obser (http://undeadly.org/cgi?action=article&amp;amp;sid=20140721125020) did many things related to IPv6
Ingo Schwarze (http://undeadly.org/cgi?action=article&amp;amp;sid=20140721090411) worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface
Ken Westerback (http://undeadly.org/cgi?action=article&amp;amp;sid=20140722071413) hacked on dhclient and dhcpd, and also got dump working on 4k sector drives
Matthieu Herrb (http://undeadly.org/cgi?action=article&amp;amp;sid=20140723142224) worked on updating and modernizing parts of xenocara
***
FreeBSD pf discussion takes off (https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html)
Concerns from last week, about FreeBSD's packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the "questions" and "current" mailing lists (unfortunately people didn't always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)
Straight from the SMP FreeBSD pf maintainer: "no one right now [is actively developing pf on FreeBSD]"
Searching for documentation online for pf is troublesome because there are two incompatible syntaxes
FreeBSD's pf man pages are lacking, and some of FreeBSD's documentation still links to OpenBSD's pages, which won't work anymore - possibly turning away would-be BSD converts because it's frustrating
There's also the issue of importing patches from pfSense, but most of those still haven't been done either
Lots of disagreement among developers vs. users...
Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren't interested
Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions
Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning's claims about OpenBSD's improved speed as "uncorroborated claims" (but neither side has provided any public benchmarks)
Gleb had to abandon his work on FreeBSD's pf because funding ran out
***
LibreSSL progress update (http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched)
LibreSSL's first few portable releases have come out and they're making great progress, releasing 2.0.3 two days ago (http://marc.info/?l=openbsd-tech&amp;amp;m=140599450206255&amp;amp;w=2)
Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list
However, there has already been some drama... with Linux users
There was a problem with Linux's PRNG, and LibreSSL was unforgiving (https://twitter.com/MiodVallat/status/489122763610021888) of it, not making an effort to randomize something that could not provide real entropy
This "problem" doesn't affect OpenBSD's native implementation, only the portable version
The developers (http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl) decide to weigh in (http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit) to calm the misinformation and rage
A fix was added in 2.0.2, and Linux may even get a new system call (http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666) to handle this properly now - remember to say thanks, guys
Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) has a really good post (http://www.tedunangst.com/flak/post/this-is-why-software-sucks) about the whole situation, definitely check it out
As a follow-up from last week, bapt says they're working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you're a port maintainer, please test your ports against it
***
Preparation for NetBSD 7 (http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html)
The release process for NetBSD 7.0 is finally underway
The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September
If you run NetBSD, that'll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)
They're also looking for some help updating documentation and fixing any bugs that get reported
Another formal announcement will be made when the beta binaries are up
***
Interview - Dag-Erling Smørgrav - des@freebsd.org (mailto:des@freebsd.org) / @RealEvilDES (https://twitter.com/RealEvilDES)
The role of the FreeBSD Security Officer, recent ports features, various topics
News Roundup
BSDCan ports and packages WG (http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/)
Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages
Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages
There's also some detail about the signing infrastructure and different mirrors
Ports people and source people need to talk more often about ABI breakage
The post also includes information about pkg 1.3, the old pkg tools' EOL, the quarterly stable package sets and a lot more (it's a huge post!)
***
Cross-compiling ports with QEMU and poudriere (http://blog.ignoranthack.me/?p=212)
With recent QEMU features, you can basically chroot into a completely different architecture
This article goes through the process of building ARMv6 packages on a normal X86 box
Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now
The poudriere-devel port now has a "qemu user" option that will pull in all the requirements
Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***
Cloning FreeBSD with ZFS send (http://blather.michaelwlucas.com/archives/2108)
For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen
This post shows his entire process in creating a mirror machine, using ZFS for everything
The "zfs send" and "zfs snapshot" commands really come in handy for this
He does the whole thing from a live CD, pretty impressive
***
FreeBSD Overview series (http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/)
A new blog series we stumbled upon about a Linux user switching to BSD
In part one, he gives a little background on being "done with Linux distros" and documents his initial experience getting and installing FreeBSD 10
He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels
Most of what he was used to on Linux was already in the default FreeBSD (except bash...)
Part two (http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/) documents his experiences with pkgng and ports 
***
Feedback/Questions
Bostjan writes in (http://slexy.org/view/s214FYbOKL)
Rick writes in (http://slexy.org/view/s21cWLhzj4)
Clint writes in (http://slexy.org/view/s21A4grtH0)
Esteban writes in (http://slexy.org/view/s27fQHz8Se)
Ben writes in (http://slexy.org/view/s21QscO4Cr)
Matt sends in pictures of his FreeBSD CD collection (https://imgur.com/a/Ah444)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssl, libressl, prng, linux, des, aes, encryption, cryptography, Dag-Erling Smørgrav, security, hackathon, pf, packet filter, firewall, smp, multithreading, ixsystems, tarsnap, bsdcan, cheri, zfs, qemu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show! We&#39;ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/hackathons.html" rel="nofollow">g2k14 hackathon reports</a></h3>

<ul>
<li>Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon</li>
<li>Lots of work got done - in just the first two weeks of July, there were <a href="http://marc.info/?l=openbsd-cvs&r=1&b=201407&w=2" rel="nofollow">over 1000 commits</a> to their CVS tree</li>
<li>Some of the developers wrote in to document what they were up to at the event</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140713220618" rel="nofollow">Bob Beck</a> planned to work on kernel stuff, but then &quot;LibreSSL happened&quot; and he spent most of his time working on that</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718072312" rel="nofollow">Miod Vallat</a> also tells about his LibreSSL experiences</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718090456" rel="nofollow">Brent Cook</a>, a new developer, worked mainly on the portable version of LibreSSL (and we&#39;ll be interviewing him next week!)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714094454" rel="nofollow">Henning Brauer</a> worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714191912" rel="nofollow">Martin Pieuchot</a> fixed some bugs in the USB stack, softraid and misc other things</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714202157" rel="nofollow">Marc Espie</a> improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715120259" rel="nofollow">Martin Pelikan</a> integrated read-only ext4 support</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715094848" rel="nofollow">Vadim Zhukov</a> did lots of ports work, including working on KDE4</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715212333" rel="nofollow">Theo de Raadt</a> created a new, more secure system call, &quot;sendsyslog&quot; and did a lot of work with /etc, sysmerge and the rc scripts</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718134017" rel="nofollow">Paul Irofti</a> worked on the USB stack, specifically for the Octeon platform</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719104939" rel="nofollow">Sebastian Benoit</a> worked on relayd filters and IPv6 code</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719134058" rel="nofollow">Jasper Lievisse Adriaanse</a> did work with puppet, packages and the bootloader</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719082410" rel="nofollow">Jonathan Gray</a> imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125235" rel="nofollow">Stefan Sperling</a> fixed a lot of issues with wireless drivers</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125020" rel="nofollow">Florian Obser</a> did many things related to IPv6</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721090411" rel="nofollow">Ingo Schwarze</a> worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140722071413" rel="nofollow">Ken Westerback</a> hacked on dhclient and dhcpd, and also got dump working on 4k sector drives</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140723142224" rel="nofollow">Matthieu Herrb</a> worked on updating and modernizing parts of xenocara
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" rel="nofollow">FreeBSD pf discussion takes off</a></h3>

<ul>
<li>Concerns from last week, about FreeBSD&#39;s packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the &quot;questions&quot; and &quot;current&quot; mailing lists (unfortunately people didn&#39;t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)</li>
<li>Straight from the SMP FreeBSD pf maintainer: &quot;no one right now [is actively developing pf on FreeBSD]&quot;</li>
<li>Searching for documentation online for pf is troublesome because there are two incompatible syntaxes</li>
<li>FreeBSD&#39;s pf man pages are lacking, and some of FreeBSD&#39;s documentation still links to OpenBSD&#39;s pages, which won&#39;t work anymore - possibly turning away would-be BSD converts because it&#39;s frustrating</li>
<li>There&#39;s also the issue of importing patches from pfSense, but most of those still haven&#39;t been done either</li>
<li>Lots of disagreement among developers vs. users...</li>
<li>Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren&#39;t interested</li>
<li>Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions</li>
<li>Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning&#39;s claims about OpenBSD&#39;s improved speed as &quot;uncorroborated claims&quot; (but neither side has provided any public benchmarks)</li>
<li>Gleb had to abandon his work on FreeBSD&#39;s pf because funding ran out
***</li>
</ul>

<h3><a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" rel="nofollow">LibreSSL progress update</a></h3>

<ul>
<li>LibreSSL&#39;s first few portable releases have come out and they&#39;re making great progress, releasing 2.0.3 <a href="http://marc.info/?l=openbsd-tech&m=140599450206255&w=2" rel="nofollow">two days ago</a></li>
<li>Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list</li>
<li>However, there has already been some drama... with Linux users</li>
<li>There was a problem with Linux&#39;s PRNG, and LibreSSL was <a href="https://twitter.com/MiodVallat/status/489122763610021888" rel="nofollow">unforgiving</a> of it, not making an effort to randomize something that could not provide real entropy</li>
<li>This &quot;problem&quot; doesn&#39;t affect OpenBSD&#39;s native implementation, only the portable version</li>
<li><a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" rel="nofollow">The developers</a> decide to <a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" rel="nofollow">weigh in</a> to calm the misinformation and rage</li>
<li>A fix was added in 2.0.2, and Linux may even <a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" rel="nofollow">get a new system call</a> to handle this properly now - remember to say thanks, guys</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a <a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" rel="nofollow">really good post</a> about the whole situation, definitely check it out</li>
<li>As a follow-up from last week, bapt says they&#39;re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you&#39;re a port maintainer, please test your ports against it
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" rel="nofollow">Preparation for NetBSD 7</a></h3>

<ul>
<li>The release process for NetBSD 7.0 is finally underway</li>
<li>The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September</li>
<li>If you run NetBSD, that&#39;ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)</li>
<li>They&#39;re also looking for some help updating documentation and fixing any bugs that get reported</li>
<li>Another formal announcement will be made when the beta binaries are up
***</li>
</ul>

<h2>Interview - Dag-Erling Smørgrav - <a href="mailto:des@freebsd.org" rel="nofollow">des@freebsd.org</a> / <a href="https://twitter.com/RealEvilDES" rel="nofollow">@RealEvilDES</a></h2>

<p>The role of the FreeBSD Security Officer, recent ports features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" rel="nofollow">BSDCan ports and packages WG</a></h3>

<ul>
<li>Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages</li>
<li>Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages</li>
<li>There&#39;s also some detail about the signing infrastructure and different mirrors</li>
<li>Ports people and source people need to talk more often about ABI breakage</li>
<li>The post also includes information about pkg 1.3, the old pkg tools&#39; EOL, the quarterly stable package sets and a lot more (it&#39;s a huge post!)
***</li>
</ul>

<h3><a href="http://blog.ignoranthack.me/?p=212" rel="nofollow">Cross-compiling ports with QEMU and poudriere</a></h3>

<ul>
<li>With recent QEMU features, you can basically chroot into a completely different architecture</li>
<li>This article goes through the process of building ARMv6 packages on a normal X86 box</li>
<li>Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now</li>
<li>The poudriere-devel port now has a &quot;qemu user&quot; option that will pull in all the requirements</li>
<li>Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2108" rel="nofollow">Cloning FreeBSD with ZFS send</a></h3>

<ul>
<li>For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen</li>
<li>This post shows his entire process in creating a mirror machine, using ZFS for everything</li>
<li>The &quot;zfs send&quot; and &quot;zfs snapshot&quot; commands really come in handy for this</li>
<li>He does the whole thing from a live CD, pretty impressive
***</li>
</ul>

<h3><a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" rel="nofollow">FreeBSD Overview series</a></h3>

<ul>
<li>A new blog series we stumbled upon about a Linux user switching to BSD</li>
<li>In part one, he gives a little background on being &quot;done with Linux distros&quot; and documents his initial experience getting and installing FreeBSD 10</li>
<li>He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels</li>
<li>Most of what he was used to on Linux was already in the default FreeBSD (except bash...)</li>
<li><a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" rel="nofollow">Part two</a> documents his experiences with pkgng and ports 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s214FYbOKL" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21cWLhzj4" rel="nofollow">Rick writes in</a></li>
<li><a href="http://slexy.org/view/s21A4grtH0" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s27fQHz8Se" rel="nofollow">Esteban writes in</a></li>
<li><a href="http://slexy.org/view/s21QscO4Cr" rel="nofollow">Ben writes in</a></li>
<li><a href="https://imgur.com/a/Ah444" rel="nofollow">Matt sends in pictures of his FreeBSD CD collection</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show! We&#39;ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/hackathons.html" rel="nofollow">g2k14 hackathon reports</a></h3>

<ul>
<li>Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon</li>
<li>Lots of work got done - in just the first two weeks of July, there were <a href="http://marc.info/?l=openbsd-cvs&r=1&b=201407&w=2" rel="nofollow">over 1000 commits</a> to their CVS tree</li>
<li>Some of the developers wrote in to document what they were up to at the event</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140713220618" rel="nofollow">Bob Beck</a> planned to work on kernel stuff, but then &quot;LibreSSL happened&quot; and he spent most of his time working on that</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718072312" rel="nofollow">Miod Vallat</a> also tells about his LibreSSL experiences</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718090456" rel="nofollow">Brent Cook</a>, a new developer, worked mainly on the portable version of LibreSSL (and we&#39;ll be interviewing him next week!)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714094454" rel="nofollow">Henning Brauer</a> worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714191912" rel="nofollow">Martin Pieuchot</a> fixed some bugs in the USB stack, softraid and misc other things</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714202157" rel="nofollow">Marc Espie</a> improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715120259" rel="nofollow">Martin Pelikan</a> integrated read-only ext4 support</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715094848" rel="nofollow">Vadim Zhukov</a> did lots of ports work, including working on KDE4</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715212333" rel="nofollow">Theo de Raadt</a> created a new, more secure system call, &quot;sendsyslog&quot; and did a lot of work with /etc, sysmerge and the rc scripts</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718134017" rel="nofollow">Paul Irofti</a> worked on the USB stack, specifically for the Octeon platform</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719104939" rel="nofollow">Sebastian Benoit</a> worked on relayd filters and IPv6 code</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719134058" rel="nofollow">Jasper Lievisse Adriaanse</a> did work with puppet, packages and the bootloader</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719082410" rel="nofollow">Jonathan Gray</a> imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125235" rel="nofollow">Stefan Sperling</a> fixed a lot of issues with wireless drivers</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125020" rel="nofollow">Florian Obser</a> did many things related to IPv6</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721090411" rel="nofollow">Ingo Schwarze</a> worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140722071413" rel="nofollow">Ken Westerback</a> hacked on dhclient and dhcpd, and also got dump working on 4k sector drives</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140723142224" rel="nofollow">Matthieu Herrb</a> worked on updating and modernizing parts of xenocara
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" rel="nofollow">FreeBSD pf discussion takes off</a></h3>

<ul>
<li>Concerns from last week, about FreeBSD&#39;s packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the &quot;questions&quot; and &quot;current&quot; mailing lists (unfortunately people didn&#39;t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)</li>
<li>Straight from the SMP FreeBSD pf maintainer: &quot;no one right now [is actively developing pf on FreeBSD]&quot;</li>
<li>Searching for documentation online for pf is troublesome because there are two incompatible syntaxes</li>
<li>FreeBSD&#39;s pf man pages are lacking, and some of FreeBSD&#39;s documentation still links to OpenBSD&#39;s pages, which won&#39;t work anymore - possibly turning away would-be BSD converts because it&#39;s frustrating</li>
<li>There&#39;s also the issue of importing patches from pfSense, but most of those still haven&#39;t been done either</li>
<li>Lots of disagreement among developers vs. users...</li>
<li>Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren&#39;t interested</li>
<li>Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions</li>
<li>Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning&#39;s claims about OpenBSD&#39;s improved speed as &quot;uncorroborated claims&quot; (but neither side has provided any public benchmarks)</li>
<li>Gleb had to abandon his work on FreeBSD&#39;s pf because funding ran out
***</li>
</ul>

<h3><a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" rel="nofollow">LibreSSL progress update</a></h3>

<ul>
<li>LibreSSL&#39;s first few portable releases have come out and they&#39;re making great progress, releasing 2.0.3 <a href="http://marc.info/?l=openbsd-tech&m=140599450206255&w=2" rel="nofollow">two days ago</a></li>
<li>Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list</li>
<li>However, there has already been some drama... with Linux users</li>
<li>There was a problem with Linux&#39;s PRNG, and LibreSSL was <a href="https://twitter.com/MiodVallat/status/489122763610021888" rel="nofollow">unforgiving</a> of it, not making an effort to randomize something that could not provide real entropy</li>
<li>This &quot;problem&quot; doesn&#39;t affect OpenBSD&#39;s native implementation, only the portable version</li>
<li><a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" rel="nofollow">The developers</a> decide to <a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" rel="nofollow">weigh in</a> to calm the misinformation and rage</li>
<li>A fix was added in 2.0.2, and Linux may even <a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" rel="nofollow">get a new system call</a> to handle this properly now - remember to say thanks, guys</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a <a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" rel="nofollow">really good post</a> about the whole situation, definitely check it out</li>
<li>As a follow-up from last week, bapt says they&#39;re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you&#39;re a port maintainer, please test your ports against it
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" rel="nofollow">Preparation for NetBSD 7</a></h3>

<ul>
<li>The release process for NetBSD 7.0 is finally underway</li>
<li>The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September</li>
<li>If you run NetBSD, that&#39;ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)</li>
<li>They&#39;re also looking for some help updating documentation and fixing any bugs that get reported</li>
<li>Another formal announcement will be made when the beta binaries are up
***</li>
</ul>

<h2>Interview - Dag-Erling Smørgrav - <a href="mailto:des@freebsd.org" rel="nofollow">des@freebsd.org</a> / <a href="https://twitter.com/RealEvilDES" rel="nofollow">@RealEvilDES</a></h2>

<p>The role of the FreeBSD Security Officer, recent ports features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" rel="nofollow">BSDCan ports and packages WG</a></h3>

<ul>
<li>Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages</li>
<li>Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages</li>
<li>There&#39;s also some detail about the signing infrastructure and different mirrors</li>
<li>Ports people and source people need to talk more often about ABI breakage</li>
<li>The post also includes information about pkg 1.3, the old pkg tools&#39; EOL, the quarterly stable package sets and a lot more (it&#39;s a huge post!)
***</li>
</ul>

<h3><a href="http://blog.ignoranthack.me/?p=212" rel="nofollow">Cross-compiling ports with QEMU and poudriere</a></h3>

<ul>
<li>With recent QEMU features, you can basically chroot into a completely different architecture</li>
<li>This article goes through the process of building ARMv6 packages on a normal X86 box</li>
<li>Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now</li>
<li>The poudriere-devel port now has a &quot;qemu user&quot; option that will pull in all the requirements</li>
<li>Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2108" rel="nofollow">Cloning FreeBSD with ZFS send</a></h3>

<ul>
<li>For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen</li>
<li>This post shows his entire process in creating a mirror machine, using ZFS for everything</li>
<li>The &quot;zfs send&quot; and &quot;zfs snapshot&quot; commands really come in handy for this</li>
<li>He does the whole thing from a live CD, pretty impressive
***</li>
</ul>

<h3><a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" rel="nofollow">FreeBSD Overview series</a></h3>

<ul>
<li>A new blog series we stumbled upon about a Linux user switching to BSD</li>
<li>In part one, he gives a little background on being &quot;done with Linux distros&quot; and documents his initial experience getting and installing FreeBSD 10</li>
<li>He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels</li>
<li>Most of what he was used to on Linux was already in the default FreeBSD (except bash...)</li>
<li><a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" rel="nofollow">Part two</a> documents his experiences with pkgng and ports 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s214FYbOKL" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21cWLhzj4" rel="nofollow">Rick writes in</a></li>
<li><a href="http://slexy.org/view/s21A4grtH0" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s27fQHz8Se" rel="nofollow">Esteban writes in</a></li>
<li><a href="http://slexy.org/view/s21QscO4Cr" rel="nofollow">Ben writes in</a></li>
<li><a href="https://imgur.com/a/Ah444" rel="nofollow">Matt sends in pictures of his FreeBSD CD collection</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
