<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 12 May 2026 02:46:41 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Raidz”</title>
    <link>https://www.bsdnow.tv/tags/raidz</link>
    <pubDate>Wed, 19 Jun 2019 22:30:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>303: OpenZFS in Ports</title>
  <link>https://www.bsdnow.tv/303</link>
  <guid isPermaLink="false">1ed8b630-10c4-44f6-9a48-2ffcb4a8b6fe</guid>
  <pubDate>Wed, 19 Jun 2019 22:30:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/1ed8b630-10c4-44f6-9a48-2ffcb4a8b6fe.mp3" length="37840062" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenZFS-kmod port available, using blacklistd with NPF as fail2ban replacement, ZFS raidz expansion alpha preview 1, audio VU-meter increases CO2 footprint rant, XSAVE and compat32 kernel work for LLDB, where icons for modern X applications come from, and more.</itunes:subtitle>
  <itunes:duration>52:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;OpenZFS-kmod port available, using blacklistd with NPF as fail2ban replacement, ZFS raidz expansion alpha preview 1, audio VU-meter increases CO2 footprint rant, XSAVE and compat32 kernel work for LLDB, where icons for modern X applications come from, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freshports.org/sysutils/openzfs-kmod" target="_blank" rel="nofollow noopener"&gt;ZFSonFreeBSD ports renamed OpenZFS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The ZFS on FreeBSD project has renamed the userland and kernel ports from zol and zol-kmod to openzfs and openzfs-kmod&lt;/li&gt;
&lt;li&gt;The new versions from this week are IOCTL compatible with the command line tools in FreeBSD 12.0, so you can use the old userland with the new kernel module (although obviously not the new features)&lt;/li&gt;
&lt;li&gt;With the renaming it is easier to specify which kernel module you want to load in /boot/loader.conf:
&amp;gt; zfs_load=”YES”&lt;/li&gt;
&lt;li&gt;or
&amp;gt; openzfs_load=”YES”&lt;/li&gt;
&lt;li&gt;To load traditional or the newer version of ZFS&lt;/li&gt;
&lt;li&gt;The kmod still requires FreeBSD 12-stable or 13-current because it depends on the newer crypto support in the kernel for the ZFS native encryption feature. Allan is looking at ways to work around this, but it may not be practical.&lt;/li&gt;
&lt;li&gt;We would like to do an unofficial poll on how people would the userland to co-exist. Add a suffix to the new commands in /usr/local (zfs.new zpool.new or whatever). One idea i’ve had is to move the zfs and zpool commands to /libexec and make /sbin/zfs and /sbin/zpool a switcher script, that will call the base or ports version based on a config file (or just based on if the port is installed)&lt;/li&gt;
&lt;li&gt;For testing purposes, generally you should be fine as long as you don’t run ‘zpool upgrade’, which will make your pool only importable using the newer ZFS.&lt;/li&gt;
&lt;li&gt;For extra safety, you can create a ‘zpool checkpoint’, which will allow you to undo any changes that are made to the pool during your testing with the new openzfs tools. Note: the checkpoint will undo EVERYTHING. So don’t save new data you want to keep.&lt;/li&gt;
&lt;li&gt;Note: Checkpoints disable all freeing operations, to prevent any data from being overwritten so that you can re-import at the checkpoint and undo any operation (including zfs destroy-ing a dataset), so also be careful you don’t run out of space during testing.&lt;/li&gt;
&lt;li&gt;Please test and provide feedback.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.unitedbsd.com/d/63-how-to-use-blacklistd8-with-npf-as-a-fail2ban-replacement" target="_blank" rel="nofollow noopener"&gt;How to use blacklistd(8) with NPF as a fail2ban replacement&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;About blacklistd(8)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; blacklistd(8) provides an API that can be used by network daemons to communicate with a packet filter via a daemon to enforce opening and closing ports dynamically based on policy.&lt;br&gt;
The interface to the packet filter is in /libexec/blacklistd-helper (this is currently designed for npf) and the configuration file (inspired from inetd.conf) is in etc/blacklistd.conf&lt;br&gt;
&amp;gt; Now, blacklistd(8) will require bpfjit(4) (Just-In-Time compiler for Berkeley Packet Filter) in order to properly work, in addition to, naturally, npf(7) as frontend and syslogd(8), as a backend to print diagnostic messages. Also remember npf shall rely on the npflog* virtual network interface to provide logging for tcpdump() to use. &lt;br&gt;
Unfortunately (dont' ask me why :P) in 8.1 all the required kernel components are still not compiled by default in the GENERIC kernel (though they are in HEAD), and are rather provided as modules. Enabling NPF and blacklistd services would normally result in them being automatically loaded as root, but predictably on securelevel=1 this is not going to happen&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/zfsonlinux/zfs/pull/8853" target="_blank" rel="nofollow noopener"&gt;[WIP] raidz expansion, alpha preview 1&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Motivation and Context
&amp;gt; This is a alpha-quality preview of RAID-Z expansion. This feature allows disks to be added one at a time to a RAID-Z group, expanding its capacity incrementally. This feature is especially useful for small pools (typically with only one RAID-Z group), where there isn't sufficient hardware to add capacity by adding a whole new RAID-Z group (typically doubling the number of disks).
&amp;gt; For additional context as well as a design overview, see my short talk from the 2017 OpenZFS Developer Summit: slides video&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://medium.com/@MartinCracauer/bug-rant-running-audio-vu-meter-increases-my-co2-footprint-871d5c1bee5a" target="_blank" rel="nofollow noopener"&gt;Rant: running audio VU-meter increases my CO2 footprint&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; A couple months ago I noticed that the monitor on my workstation never power off anymore. Screensaver would go on, but DPMs (to do the poweroff) never kicked in.&lt;br&gt;
&amp;gt; I grovels the output of various tools that display DPMS settings, which as usual in Xorg were useless. Everybody said DPMS is on with a timeout. I even wrote my own C program to use every available Xlib API call and even the xscreensaver library calls. (should make it available) No go, everybody says that DPMs is on, enabled and set on a timeout. Didn’t matter whether I let xscreeensaver do the job or just the X11 server.&lt;br&gt;
&amp;gt; After a while I noticed that DPMS actually worked between starting my X11 server and starting all my clients. I have a minimal .xinitrc and start the actual session from a script, that is how I could notice. If I used a regular desktop login I wouldn’t have noticed. A server state bug was much more likely than a client bug.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See the article for the rest...&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/xsave_and_compat32_kernel_work" target="_blank" rel="nofollow noopener"&gt;XSAVE and compat32 kernel work for LLDB&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Upstream describes LLDB as a next generation, high-performance debugger. It is built on top of LLVM/Clang toolchain, and features great integration with it. At the moment, it primarily supports debugging C, C++ and ObjC code, and there is interest in extending it to more languages.&lt;br&gt;
&amp;gt; In February, I have started working on LLDB, as contracted by the NetBSD Foundation. So far I've been working on reenabling continuous integration, squashing bugs, improving NetBSD core file support and lately extending NetBSD's ptrace interface to cover more register types. You can read more about that in my Apr 2019 report.&lt;br&gt;
&amp;gt; In May, I was primarily continuing the work on new ptrace interface. Besides that, I've found and fixed a bug in ptrace() compat32 code, pushed LLVM buildbot to ‘green’ status and found some upstream LLVM regressions. More below.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ModernXAppIcons" target="_blank" rel="nofollow noopener"&gt;Some things about where icons for modern X applications come from&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; If you have a traditional window manager like fvwm, one of the things it can do is iconify X windows so that they turn into icons on the root window (which would often be called the 'desktop'). Even modern desktop environments that don't iconify programs to the root window (or their desktop) may have per-program icons for running programs in their dock or taskbar. If your window manager or desktop environment can do this, you might reasonably wonder where those icons come from by default.&lt;br&gt;
&amp;gt; Although I don't know how it was done in the early days of X, the modern standard for this is part of the Extended Window Manager Hints. In EWMH, applications give the window manager a number of possible icons, generally in different sizes, as ARGB bitmaps (instead of, say, SVG format). The window manager or desktop environment can then pick whichever icon size it likes best, taking into account things like the display resolution and so on, and display it however it wants to (in its original size or scaled up or down).&lt;br&gt;
&amp;gt; How this is communicated in specific is through the only good interprocess communication method that X supplies, namely X properties. In the specific case of icons, the _NET_WM_ICON property is what is used, and xprop can display the size information and an ASCII art summary of what each icon looks like. It's also possible to use some additional magic to read out the raw data from _NET_WM_ICON in a useful format; see, for example, this Stackoverflow question and its answers.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://undeadly.org/cgi?action=article;sid=20190605110020" target="_blank" rel="nofollow noopener"&gt;Recent Security Innovations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://imgur.com/a/HbSYtQI" target="_blank" rel="nofollow noopener"&gt;Old Unix books + Solaris&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bitcannon.net/post/pro-desktop/" target="_blank" rel="nofollow noopener"&gt;Pro-Desktop - A Tiling Desktop Environment&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.extracheese.org/2010/05/the-tar-pipe.html" target="_blank" rel="nofollow noopener"&gt;The Tar Pipe&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hillelwayne.com/post/intermediate-vim/" target="_blank" rel="nofollow noopener"&gt;At least one vim trick you might not know&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Johnny - &lt;a href="http://dpaste.com/0ZQCQ8Y#wrap" target="_blank" rel="nofollow noopener"&gt;listener feedback&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Brian - &lt;a href="http://dpaste.com/1843RNX#wrap" target="_blank" rel="nofollow noopener"&gt;Questions&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Mark - &lt;a href="http://dpaste.com/3M83X9G#wrap" target="_blank" rel="nofollow noopener"&gt;ZFS Question&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0303.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, zfs, openzfs, blacklistd, raidz, xsave, compat32, awesomewm, vim, npf, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenZFS-kmod port available, using blacklistd with NPF as fail2ban replacement, ZFS raidz expansion alpha preview 1, audio VU-meter increases CO2 footprint rant, XSAVE and compat32 kernel work for LLDB, where icons for modern X applications come from, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freshports.org/sysutils/openzfs-kmod" rel="nofollow">ZFSonFreeBSD ports renamed OpenZFS</a></h3>

<ul>
<li>The ZFS on FreeBSD project has renamed the userland and kernel ports from zol and zol-kmod to openzfs and openzfs-kmod</li>
<li>The new versions from this week are IOCTL compatible with the command line tools in FreeBSD 12.0, so you can use the old userland with the new kernel module (although obviously not the new features)</li>
<li>With the renaming it is easier to specify which kernel module you want to load in /boot/loader.conf:
&gt; zfs_load=”YES”</li>
<li>or
&gt; openzfs_load=”YES”</li>
<li>To load traditional or the newer version of ZFS</li>
<li>The kmod still requires FreeBSD 12-stable or 13-current because it depends on the newer crypto support in the kernel for the ZFS native encryption feature. Allan is looking at ways to work around this, but it may not be practical.</li>
<li>We would like to do an unofficial poll on how people would the userland to co-exist. Add a suffix to the new commands in /usr/local (zfs.new zpool.new or whatever). One idea i’ve had is to move the zfs and zpool commands to /libexec and make /sbin/zfs and /sbin/zpool a switcher script, that will call the base or ports version based on a config file (or just based on if the port is installed)</li>
<li>For testing purposes, generally you should be fine as long as you don’t run ‘zpool upgrade’, which will make your pool only importable using the newer ZFS.</li>
<li>For extra safety, you can create a ‘zpool checkpoint’, which will allow you to undo any changes that are made to the pool during your testing with the new openzfs tools. Note: the checkpoint will undo EVERYTHING. So don’t save new data you want to keep.</li>
<li>Note: Checkpoints disable all freeing operations, to prevent any data from being overwritten so that you can re-import at the checkpoint and undo any operation (including zfs destroy-ing a dataset), so also be careful you don’t run out of space during testing.</li>
<li>Please test and provide feedback.</li>
</ul>

<hr>

<h3><a href="https://www.unitedbsd.com/d/63-how-to-use-blacklistd8-with-npf-as-a-fail2ban-replacement" rel="nofollow">How to use blacklistd(8) with NPF as a fail2ban replacement</a></h3>

<ul>
<li>About blacklistd(8)</li>
</ul>

<blockquote>
<p>blacklistd(8) provides an API that can be used by network daemons to communicate with a packet filter via a daemon to enforce opening and closing ports dynamically based on policy.<br>
The interface to the packet filter is in /libexec/blacklistd-helper (this is currently designed for npf) and the configuration file (inspired from inetd.conf) is in etc/blacklistd.conf<br>
Now, blacklistd(8) will require bpfjit(4) (Just-In-Time compiler for Berkeley Packet Filter) in order to properly work, in addition to, naturally, npf(7) as frontend and syslogd(8), as a backend to print diagnostic messages. Also remember npf shall rely on the npflog* virtual network interface to provide logging for tcpdump() to use. <br>
Unfortunately (dont&#39; ask me why :P) in 8.1 all the required kernel components are still not compiled by default in the GENERIC kernel (though they are in HEAD), and are rather provided as modules. Enabling NPF and blacklistd services would normally result in them being automatically loaded as root, but predictably on securelevel=1 this is not going to happen</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/zfsonlinux/zfs/pull/8853" rel="nofollow">[WIP] raidz expansion, alpha preview 1</a></h3>

<ul>
<li>Motivation and Context
&gt; This is a alpha-quality preview of RAID-Z expansion. This feature allows disks to be added one at a time to a RAID-Z group, expanding its capacity incrementally. This feature is especially useful for small pools (typically with only one RAID-Z group), where there isn&#39;t sufficient hardware to add capacity by adding a whole new RAID-Z group (typically doubling the number of disks).
&gt; For additional context as well as a design overview, see my short talk from the 2017 OpenZFS Developer Summit: slides video</li>
</ul>

<hr>

<h3><a href="https://medium.com/@MartinCracauer/bug-rant-running-audio-vu-meter-increases-my-co2-footprint-871d5c1bee5a" rel="nofollow">Rant: running audio VU-meter increases my CO2 footprint</a></h3>

<blockquote>
<p>A couple months ago I noticed that the monitor on my workstation never power off anymore. Screensaver would go on, but DPMs (to do the poweroff) never kicked in.<br>
I grovels the output of various tools that display DPMS settings, which as usual in Xorg were useless. Everybody said DPMS is on with a timeout. I even wrote my own C program to use every available Xlib API call and even the xscreensaver library calls. (should make it available) No go, everybody says that DPMs is on, enabled and set on a timeout. Didn’t matter whether I let xscreeensaver do the job or just the X11 server.<br>
After a while I noticed that DPMS actually worked between starting my X11 server and starting all my clients. I have a minimal .xinitrc and start the actual session from a script, that is how I could notice. If I used a regular desktop login I wouldn’t have noticed. A server state bug was much more likely than a client bug.</p>

<ul>
<li>See the article for the rest...</li>
</ul>
</blockquote>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/xsave_and_compat32_kernel_work" rel="nofollow">XSAVE and compat32 kernel work for LLDB</a></h3>

<blockquote>
<p>Upstream describes LLDB as a next generation, high-performance debugger. It is built on top of LLVM/Clang toolchain, and features great integration with it. At the moment, it primarily supports debugging C, C++ and ObjC code, and there is interest in extending it to more languages.<br>
In February, I have started working on LLDB, as contracted by the NetBSD Foundation. So far I&#39;ve been working on reenabling continuous integration, squashing bugs, improving NetBSD core file support and lately extending NetBSD&#39;s ptrace interface to cover more register types. You can read more about that in my Apr 2019 report.<br>
In May, I was primarily continuing the work on new ptrace interface. Besides that, I&#39;ve found and fixed a bug in ptrace() compat32 code, pushed LLVM buildbot to ‘green’ status and found some upstream LLVM regressions. More below.</p>
</blockquote>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ModernXAppIcons" rel="nofollow">Some things about where icons for modern X applications come from</a></h3>

<blockquote>
<p>If you have a traditional window manager like fvwm, one of the things it can do is iconify X windows so that they turn into icons on the root window (which would often be called the &#39;desktop&#39;). Even modern desktop environments that don&#39;t iconify programs to the root window (or their desktop) may have per-program icons for running programs in their dock or taskbar. If your window manager or desktop environment can do this, you might reasonably wonder where those icons come from by default.<br>
Although I don&#39;t know how it was done in the early days of X, the modern standard for this is part of the Extended Window Manager Hints. In EWMH, applications give the window manager a number of possible icons, generally in different sizes, as ARGB bitmaps (instead of, say, SVG format). The window manager or desktop environment can then pick whichever icon size it likes best, taking into account things like the display resolution and so on, and display it however it wants to (in its original size or scaled up or down).<br>
How this is communicated in specific is through the only good interprocess communication method that X supplies, namely X properties. In the specific case of icons, the _NET_WM_ICON property is what is used, and xprop can display the size information and an ASCII art summary of what each icon looks like. It&#39;s also possible to use some additional magic to read out the raw data from _NET_WM_ICON in a useful format; see, for example, this Stackoverflow question and its answers.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://undeadly.org/cgi?action=article;sid=20190605110020" rel="nofollow">Recent Security Innovations</a></li>
<li><a href="https://imgur.com/a/HbSYtQI" rel="nofollow">Old Unix books + Solaris</a></li>
<li><a href="https://bitcannon.net/post/pro-desktop/" rel="nofollow">Pro-Desktop - A Tiling Desktop Environment</a></li>
<li><a href="https://blog.extracheese.org/2010/05/the-tar-pipe.html" rel="nofollow">The Tar Pipe</a></li>
<li><a href="https://www.hillelwayne.com/post/intermediate-vim/" rel="nofollow">At least one vim trick you might not know</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Johnny - <a href="http://dpaste.com/0ZQCQ8Y#wrap" rel="nofollow">listener feedback</a></li>
<li>Brian - <a href="http://dpaste.com/1843RNX#wrap" rel="nofollow">Questions</a></li>
<li>Mark - <a href="http://dpaste.com/3M83X9G#wrap" rel="nofollow">ZFS Question</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0303.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenZFS-kmod port available, using blacklistd with NPF as fail2ban replacement, ZFS raidz expansion alpha preview 1, audio VU-meter increases CO2 footprint rant, XSAVE and compat32 kernel work for LLDB, where icons for modern X applications come from, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.freshports.org/sysutils/openzfs-kmod" rel="nofollow">ZFSonFreeBSD ports renamed OpenZFS</a></h3>

<ul>
<li>The ZFS on FreeBSD project has renamed the userland and kernel ports from zol and zol-kmod to openzfs and openzfs-kmod</li>
<li>The new versions from this week are IOCTL compatible with the command line tools in FreeBSD 12.0, so you can use the old userland with the new kernel module (although obviously not the new features)</li>
<li>With the renaming it is easier to specify which kernel module you want to load in /boot/loader.conf:
&gt; zfs_load=”YES”</li>
<li>or
&gt; openzfs_load=”YES”</li>
<li>To load traditional or the newer version of ZFS</li>
<li>The kmod still requires FreeBSD 12-stable or 13-current because it depends on the newer crypto support in the kernel for the ZFS native encryption feature. Allan is looking at ways to work around this, but it may not be practical.</li>
<li>We would like to do an unofficial poll on how people would the userland to co-exist. Add a suffix to the new commands in /usr/local (zfs.new zpool.new or whatever). One idea i’ve had is to move the zfs and zpool commands to /libexec and make /sbin/zfs and /sbin/zpool a switcher script, that will call the base or ports version based on a config file (or just based on if the port is installed)</li>
<li>For testing purposes, generally you should be fine as long as you don’t run ‘zpool upgrade’, which will make your pool only importable using the newer ZFS.</li>
<li>For extra safety, you can create a ‘zpool checkpoint’, which will allow you to undo any changes that are made to the pool during your testing with the new openzfs tools. Note: the checkpoint will undo EVERYTHING. So don’t save new data you want to keep.</li>
<li>Note: Checkpoints disable all freeing operations, to prevent any data from being overwritten so that you can re-import at the checkpoint and undo any operation (including zfs destroy-ing a dataset), so also be careful you don’t run out of space during testing.</li>
<li>Please test and provide feedback.</li>
</ul>

<hr>

<h3><a href="https://www.unitedbsd.com/d/63-how-to-use-blacklistd8-with-npf-as-a-fail2ban-replacement" rel="nofollow">How to use blacklistd(8) with NPF as a fail2ban replacement</a></h3>

<ul>
<li>About blacklistd(8)</li>
</ul>

<blockquote>
<p>blacklistd(8) provides an API that can be used by network daemons to communicate with a packet filter via a daemon to enforce opening and closing ports dynamically based on policy.<br>
The interface to the packet filter is in /libexec/blacklistd-helper (this is currently designed for npf) and the configuration file (inspired from inetd.conf) is in etc/blacklistd.conf<br>
Now, blacklistd(8) will require bpfjit(4) (Just-In-Time compiler for Berkeley Packet Filter) in order to properly work, in addition to, naturally, npf(7) as frontend and syslogd(8), as a backend to print diagnostic messages. Also remember npf shall rely on the npflog* virtual network interface to provide logging for tcpdump() to use. <br>
Unfortunately (dont&#39; ask me why :P) in 8.1 all the required kernel components are still not compiled by default in the GENERIC kernel (though they are in HEAD), and are rather provided as modules. Enabling NPF and blacklistd services would normally result in them being automatically loaded as root, but predictably on securelevel=1 this is not going to happen</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/zfsonlinux/zfs/pull/8853" rel="nofollow">[WIP] raidz expansion, alpha preview 1</a></h3>

<ul>
<li>Motivation and Context
&gt; This is a alpha-quality preview of RAID-Z expansion. This feature allows disks to be added one at a time to a RAID-Z group, expanding its capacity incrementally. This feature is especially useful for small pools (typically with only one RAID-Z group), where there isn&#39;t sufficient hardware to add capacity by adding a whole new RAID-Z group (typically doubling the number of disks).
&gt; For additional context as well as a design overview, see my short talk from the 2017 OpenZFS Developer Summit: slides video</li>
</ul>

<hr>

<h3><a href="https://medium.com/@MartinCracauer/bug-rant-running-audio-vu-meter-increases-my-co2-footprint-871d5c1bee5a" rel="nofollow">Rant: running audio VU-meter increases my CO2 footprint</a></h3>

<blockquote>
<p>A couple months ago I noticed that the monitor on my workstation never power off anymore. Screensaver would go on, but DPMs (to do the poweroff) never kicked in.<br>
I grovels the output of various tools that display DPMS settings, which as usual in Xorg were useless. Everybody said DPMS is on with a timeout. I even wrote my own C program to use every available Xlib API call and even the xscreensaver library calls. (should make it available) No go, everybody says that DPMs is on, enabled and set on a timeout. Didn’t matter whether I let xscreeensaver do the job or just the X11 server.<br>
After a while I noticed that DPMS actually worked between starting my X11 server and starting all my clients. I have a minimal .xinitrc and start the actual session from a script, that is how I could notice. If I used a regular desktop login I wouldn’t have noticed. A server state bug was much more likely than a client bug.</p>

<ul>
<li>See the article for the rest...</li>
</ul>
</blockquote>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/xsave_and_compat32_kernel_work" rel="nofollow">XSAVE and compat32 kernel work for LLDB</a></h3>

<blockquote>
<p>Upstream describes LLDB as a next generation, high-performance debugger. It is built on top of LLVM/Clang toolchain, and features great integration with it. At the moment, it primarily supports debugging C, C++ and ObjC code, and there is interest in extending it to more languages.<br>
In February, I have started working on LLDB, as contracted by the NetBSD Foundation. So far I&#39;ve been working on reenabling continuous integration, squashing bugs, improving NetBSD core file support and lately extending NetBSD&#39;s ptrace interface to cover more register types. You can read more about that in my Apr 2019 report.<br>
In May, I was primarily continuing the work on new ptrace interface. Besides that, I&#39;ve found and fixed a bug in ptrace() compat32 code, pushed LLVM buildbot to ‘green’ status and found some upstream LLVM regressions. More below.</p>
</blockquote>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ModernXAppIcons" rel="nofollow">Some things about where icons for modern X applications come from</a></h3>

<blockquote>
<p>If you have a traditional window manager like fvwm, one of the things it can do is iconify X windows so that they turn into icons on the root window (which would often be called the &#39;desktop&#39;). Even modern desktop environments that don&#39;t iconify programs to the root window (or their desktop) may have per-program icons for running programs in their dock or taskbar. If your window manager or desktop environment can do this, you might reasonably wonder where those icons come from by default.<br>
Although I don&#39;t know how it was done in the early days of X, the modern standard for this is part of the Extended Window Manager Hints. In EWMH, applications give the window manager a number of possible icons, generally in different sizes, as ARGB bitmaps (instead of, say, SVG format). The window manager or desktop environment can then pick whichever icon size it likes best, taking into account things like the display resolution and so on, and display it however it wants to (in its original size or scaled up or down).<br>
How this is communicated in specific is through the only good interprocess communication method that X supplies, namely X properties. In the specific case of icons, the _NET_WM_ICON property is what is used, and xprop can display the size information and an ASCII art summary of what each icon looks like. It&#39;s also possible to use some additional magic to read out the raw data from _NET_WM_ICON in a useful format; see, for example, this Stackoverflow question and its answers.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://undeadly.org/cgi?action=article;sid=20190605110020" rel="nofollow">Recent Security Innovations</a></li>
<li><a href="https://imgur.com/a/HbSYtQI" rel="nofollow">Old Unix books + Solaris</a></li>
<li><a href="https://bitcannon.net/post/pro-desktop/" rel="nofollow">Pro-Desktop - A Tiling Desktop Environment</a></li>
<li><a href="https://blog.extracheese.org/2010/05/the-tar-pipe.html" rel="nofollow">The Tar Pipe</a></li>
<li><a href="https://www.hillelwayne.com/post/intermediate-vim/" rel="nofollow">At least one vim trick you might not know</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Johnny - <a href="http://dpaste.com/0ZQCQ8Y#wrap" rel="nofollow">listener feedback</a></li>
<li>Brian - <a href="http://dpaste.com/1843RNX#wrap" rel="nofollow">Questions</a></li>
<li>Mark - <a href="http://dpaste.com/3M83X9G#wrap" rel="nofollow">ZFS Question</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0303.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>36: Let's Get RAID</title>
  <link>https://www.bsdnow.tv/36</link>
  <guid isPermaLink="false">485b12e9-ea67-4bc6-9709-4b0e38a76184</guid>
  <pubDate>Wed, 07 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/485b12e9-ea67-4bc6-9709-4b0e38a76184.mp3" length="65368948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/55.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 5.5 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you &lt;a href="https://https.openbsd.org/cgi-bin/order" target="_blank" rel="nofollow noopener"&gt;ordered&lt;/a&gt; a &lt;a href="https://twitter.com/blakkheim/status/461909893813784576" target="_blank" rel="nofollow noopener"&gt;CD set&lt;/a&gt; then you've probably had it for a little while already, but OpenBSD has formally announced the &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140501153339" target="_blank" rel="nofollow noopener"&gt;public release&lt;/a&gt; of 5.5&lt;/li&gt;
&lt;li&gt;This is one of the biggest releases to date, with a very long list of changes and improvements&lt;/li&gt;
&lt;li&gt;Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://www.openbsd.org/plus55.html" target="_blank" rel="nofollow noopener"&gt;full list of changes&lt;/a&gt; is HUGE, be sure to read through it all if you're interested in the details&lt;/li&gt;
&lt;li&gt;If you're doing an upgrade from 5.4 instead of a fresh install, pay careful attention to &lt;a href="http://www.openbsd.org/faq/upgrade55.html" target="_blank" rel="nofollow noopener"&gt;the upgrade guide&lt;/a&gt; as there are some very specific steps for this version&lt;/li&gt;
&lt;li&gt;Also be sure to apply the &lt;a href="http://www.openbsd.org/errata55.html" target="_blank" rel="nofollow noopener"&gt;errata patches&lt;/a&gt; on your new installations... especially those OpenSSL ones (some of which &lt;a href="http://marc.info/?l=oss-security&amp;amp;m=139906348230995&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;still aren't fixed&lt;/a&gt; in the other BSDs yet)&lt;/li&gt;
&lt;li&gt;On the topic of errata patches, the project is now going to also send them out (&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140502103355" target="_blank" rel="nofollow noopener"&gt;signed&lt;/a&gt;) via the &lt;a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&amp;amp;passw=&amp;amp;func=lists-long-full&amp;amp;extra=announce" target="_blank" rel="nofollow noopener"&gt;announce mailing list&lt;/a&gt;, a very welcome change&lt;/li&gt;
&lt;li&gt;Congrats to the whole team on this great release - 5.6 is going to be even more awesome with "Libre"SSL and lots of other stuff that's currently in development
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation funding highlights&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation posts a new update on how they're spending the money that everyone donates&lt;/li&gt;
&lt;li&gt;"As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we've done to help FreeBSD become the most innovative, reliable, and high-performance operation system"&lt;/li&gt;
&lt;li&gt;During this spring, they want to highlight the new UEFI boot support &lt;a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" target="_blank" rel="nofollow noopener"&gt;and newcons&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;There's a lot of details about what exactly UEFI is and why we need it going forward&lt;/li&gt;
&lt;li&gt;FreeBSD has also needed some updates to its console to support UTF8 and wide characters&lt;/li&gt;
&lt;li&gt;Hopefully this series will continue and we'll get to see what other work is being sponsored
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139879453001957&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenSSH without OpenSSL&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional&lt;/li&gt;
&lt;li&gt;Since it won't have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security&lt;/li&gt;
&lt;li&gt;This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the &lt;a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" target="_blank" rel="nofollow noopener"&gt;new combination&lt;/a&gt; of the Chacha20 stream cipher with Poly1305 for packet integrity&lt;/li&gt;
&lt;li&gt;Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs&lt;/li&gt;
&lt;li&gt;No support for RSA, DSA or ECDSA public keys - only Ed25519&lt;/li&gt;
&lt;li&gt;It also includes a &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139883582313750&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;new buffer API&lt;/a&gt; and a set of wrappers to make it compatible with the existing API&lt;/li&gt;
&lt;li&gt;Believe it or not, this was planned before all the heartbleed craziness&lt;/li&gt;
&lt;li&gt;Maybe someday soon we'll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" target="_blank" rel="nofollow noopener"&gt;BSDMag's April 2014 issue is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The free monthly BSD magazine has got a new issue available for download&lt;/li&gt;
&lt;li&gt;This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online&lt;/li&gt;
&lt;li&gt;Anyone can contribute to the magazine, just send the editors an email about what you want to write&lt;/li&gt;
&lt;li&gt;No Linux articles this time around, good
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - David Chisnall - &lt;a href="mailto:theraven@freebsd.org" target="_blank" rel="nofollow noopener"&gt;theraven@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The LLVM/Clang switch, FreeBSD's core team, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/raid" target="_blank" rel="nofollow noopener"&gt;RAID in FreeBSD and OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 240&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time&lt;/li&gt;
&lt;li&gt;Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more&lt;/li&gt;
&lt;li&gt;GNN also talks a little about the &lt;a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" target="_blank" rel="nofollow noopener"&gt;Precision Time Protocol&lt;/a&gt; and how it's different than NTP&lt;/li&gt;
&lt;li&gt;Two &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;people&lt;/a&gt; we've &lt;a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" target="_blank" rel="nofollow noopener"&gt;interviewed&lt;/a&gt; talking to each other, awesome&lt;/li&gt;
&lt;li&gt;If you're interested in NTP, be sure to see our &lt;a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener"&gt;tutorial&lt;/a&gt; too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140502092427" target="_blank" rel="nofollow noopener"&gt;m2k14 trip reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've got a few more reports from the recent OpenBSD hackathon in Morocco&lt;/li&gt;
&lt;li&gt;The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the &lt;a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" target="_blank" rel="nofollow noopener"&gt;OpenBSD desktop tutorial&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;"Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do"&lt;/li&gt;
&lt;li&gt;He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports' compatibility with LibreSSL&lt;/li&gt;
&lt;li&gt;Speaking of LibreSSL, there's &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140505062023" target="_blank" rel="nofollow noopener"&gt;an article&lt;/a&gt; all would-be portable version writers should probably read and take into consideration&lt;/li&gt;
&lt;li&gt;Jasper Adriaanse &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140501185019" target="_blank" rel="nofollow noopener"&gt;also writes&lt;/a&gt; about what he got done over there&lt;/li&gt;
&lt;li&gt;He cleaned up and fixed the puppet port to work better with OpenBSD
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" target="_blank" rel="nofollow noopener"&gt;Why you should use FreeBSD on your cloud VPS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD&lt;/li&gt;
&lt;li&gt;Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows&lt;/li&gt;
&lt;li&gt;The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options&lt;/li&gt;
&lt;li&gt;The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Big changes coming in the way PCBSD manages software&lt;/li&gt;
&lt;li&gt;The PBI system, AppCafe and related tools are all going to use pkgng now&lt;/li&gt;
&lt;li&gt;The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree&lt;/li&gt;
&lt;li&gt;New rating system coming soon and much more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21bk2oPuQ" target="_blank" rel="nofollow noopener"&gt;Martin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2n9fx1Rpw" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2rBBKLA4u" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20JY6ZI71" target="_blank" rel="nofollow noopener"&gt;Goetz writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20YV5Ohpa" target="_blank" rel="nofollow noopener"&gt;Jarrad writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, theraven, david chisnall, core, core team, clang, gcc, llvm, raid, stripe, mirror, bioctl, gstripe, zfs, gmirror, graid, ufs, ffs, disks, the worst pun i've done so far, i regret this already, redundancy, raid0, raid1, raid5, raidz, raid-z, filesystem, 5.5, pie, aslr, cd set, demo, tour, opensmtpd, pf, gnome, gnome3, marcusports, ports, router, signify, hackathon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>14: Zettabytes for Days</title>
  <link>https://www.bsdnow.tv/14</link>
  <guid isPermaLink="false">8a946478-3ac7-4087-a433-ad139e4d7aa9</guid>
  <pubDate>Wed, 04 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8a946478-3ac7-4087-a433-ad139e4d7aa9.mp3" length="56736843" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week is the long-awaited episode you've been asking for! We'll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project's recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week is the long-awaited episode you've been asking for! We'll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project's recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=334937" target="_blank" rel="nofollow noopener"&gt;pkgng 1.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;bapt and bdrewery from the portmgr team released pkgng 1.2 final&lt;/li&gt;
&lt;li&gt;New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new "pkg config" command, repo improvements, vuXML is now default, new fingerprint features and much more&lt;/li&gt;
&lt;li&gt;Really simple to upgrade, check our &lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;pkgng tutorial&lt;/a&gt; if you want some easy instructions&lt;/li&gt;
&lt;li&gt;It's also made its way &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" target="_blank" rel="nofollow noopener"&gt;into Dragonfly&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;See the show notes for the full list of new features and fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" target="_blank" rel="nofollow noopener"&gt;ChaCha20 and Poly1305 in OpenSSH&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305&lt;/li&gt;
&lt;li&gt;Long blog post explaining what these are and why we need them&lt;/li&gt;
&lt;li&gt;This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC&lt;/li&gt;
&lt;li&gt;RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn't show the packet length in cleartext&lt;/li&gt;
&lt;li&gt;Great explanation of the differences between EtM, MtE and EaM and their advantages&lt;/li&gt;
&lt;li&gt;"Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" target="_blank" rel="nofollow noopener"&gt;Is it time to dump Linux and move to BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;ITworld did an article about switching from Linux to BSD&lt;/li&gt;
&lt;li&gt;The author's interest was sparked from a review he was reading that said "I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0"&lt;/li&gt;
&lt;li&gt;The whole article can be summed up with "yes" - ok, next story!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/user/deirdres/videos" target="_blank" rel="nofollow noopener"&gt;OpenZFS devsummit videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenZFS &lt;a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" target="_blank" rel="nofollow noopener"&gt;developer summit&lt;/a&gt; discussion and presentation videos are up&lt;/li&gt;
&lt;li&gt;People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced&lt;/li&gt;
&lt;li&gt;Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation&lt;/li&gt;
&lt;li&gt;Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production&lt;/li&gt;
&lt;li&gt;TONS of video, about 6 hours' worth&lt;/li&gt;
&lt;li&gt;This leads us into our interview, which is...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - George Wilson - &lt;a href="mailto:wilzun@gmail.com" target="_blank" rel="nofollow noopener"&gt;wilzun@gmail.com&lt;/a&gt; / &lt;a href="https://twitter.com/zfsdude" target="_blank" rel="nofollow noopener"&gt;@zfsdude&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenZFS&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/zfs" target="_blank" rel="nofollow noopener"&gt;A crash course on ZFS&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20131126113154" target="_blank" rel="nofollow noopener"&gt;ruBSD 2013 information&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia&lt;/li&gt;
&lt;li&gt;Speakers include three OpenBSD developers, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" target="_blank" rel="nofollow noopener"&gt;Theo de Raadt&lt;/a&gt;, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" target="_blank" rel="nofollow noopener"&gt;Henning Brauer&lt;/a&gt; and Mike Belopuhov&lt;/li&gt;
&lt;li&gt;Their talks are titled "The bane of backwards compatibility," "OpenBSD's pf: Design, Implementation and Future" and "OpenBSD: Where crypto is going?"&lt;/li&gt;
&lt;li&gt;No word on if there will be video recordings, but we'll let you know if that changes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" target="_blank" rel="nofollow noopener"&gt;DragonFly roadmap, post 3.6&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;John Marino posted a possible roadmap for DragonFly, now that they're past the 3.6 release&lt;/li&gt;
&lt;li&gt;He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)&lt;/li&gt;
&lt;li&gt;Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still&lt;/li&gt;
&lt;li&gt;Bring in fixes and new stuff from FreeBSD 10
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" target="_blank" rel="nofollow noopener"&gt;BSDCan 2014 CFP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSDCan 2014 will be held on May 16-17 in Ottawa, Canada&lt;/li&gt;
&lt;li&gt;They're now accepting proposals for talks&lt;/li&gt;
&lt;li&gt;If you are doing something interesting with a BSD operating system, please submit a proposal&lt;/li&gt;
&lt;li&gt;We'll be getting lots of interviews there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=258838" target="_blank" rel="nofollow noopener"&gt;casperd added to -CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;"It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted."&lt;/li&gt;
&lt;li&gt;Lists some sysctls that can be controlled
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=258704" target="_blank" rel="nofollow noopener"&gt;ZFS corruption bug fixed in -CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JDWKjs7l" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20BLqxTWD" target="_blank" rel="nofollow noopener"&gt;SW writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2939tUOf5" target="_blank" rel="nofollow noopener"&gt;Jason writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21qKY6qIb" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20LWlmhoK" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, openzfs, devsummit, george wilson, zpool, raidz, raidz2, raidz3, mirror, delphix, linux, switch, zol, zfsonlinux, illumos, solaris, opensolaris, itworld, pkgng, pkg, 1.2, openssh, ssh, chacha20, cipher, encryption, mac, poly1305, rc4, security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week is the long-awaited episode you&#39;ve been asking for! We&#39;ll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project&#39;s recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=334937" rel="nofollow">pkgng 1.2 released</a></h3>

<ul>
<li>bapt and bdrewery from the portmgr team released pkgng 1.2 final</li>
<li>New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new &quot;pkg config&quot; command, repo improvements, vuXML is now default, new fingerprint features and much more</li>
<li>Really simple to upgrade, check our <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng tutorial</a> if you want some easy instructions</li>
<li>It&#39;s also made its way <a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" rel="nofollow">into Dragonfly</a></li>
<li>See the show notes for the full list of new features and fixes
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" rel="nofollow">ChaCha20 and Poly1305 in OpenSSH</a></h3>

<ul>
<li>Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305</li>
<li>Long blog post explaining what these are and why we need them</li>
<li>This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC</li>
<li>RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn&#39;t show the packet length in cleartext</li>
<li>Great explanation of the differences between EtM, MtE and EaM and their advantages</li>
<li>&quot;Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly.&quot;
***</li>
</ul>

<h3><a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" rel="nofollow">Is it time to dump Linux and move to BSD</a></h3>

<ul>
<li>ITworld did an article about switching from Linux to BSD</li>
<li>The author&#39;s interest was sparked from a review he was reading that said &quot;I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0&quot;</li>
<li>The whole article can be summed up with &quot;yes&quot; - ok, next story!
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/deirdres/videos" rel="nofollow">OpenZFS devsummit videos</a></h3>

<ul>
<li>The OpenZFS <a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" rel="nofollow">developer summit</a> discussion and presentation videos are up</li>
<li>People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced</li>
<li>Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation</li>
<li>Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production</li>
<li>TONS of video, about 6 hours&#39; worth</li>
<li>This leads us into our interview, which is...
***</li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<p>OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">A crash course on ZFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131126113154" rel="nofollow">ruBSD 2013 information</a></h3>

<ul>
<li>The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia</li>
<li>Speakers include three OpenBSD developers, <a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" rel="nofollow">Theo de Raadt</a>, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> and Mike Belopuhov</li>
<li>Their talks are titled &quot;The bane of backwards compatibility,&quot; &quot;OpenBSD&#39;s pf: Design, Implementation and Future&quot; and &quot;OpenBSD: Where crypto is going?&quot;</li>
<li>No word on if there will be video recordings, but we&#39;ll let you know if that changes
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" rel="nofollow">DragonFly roadmap, post 3.6</a></h3>

<ul>
<li>John Marino posted a possible roadmap for DragonFly, now that they&#39;re past the 3.6 release</li>
<li>He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)</li>
<li>Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still</li>
<li>Bring in fixes and new stuff from FreeBSD 10
***</li>
</ul>

<h3><a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" rel="nofollow">BSDCan 2014 CFP</a></h3>

<ul>
<li>BSDCan 2014 will be held on May 16-17 in Ottawa, Canada</li>
<li>They&#39;re now accepting proposals for talks</li>
<li>If you are doing something interesting with a BSD operating system, please submit a proposal</li>
<li>We&#39;ll be getting lots of interviews there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258838" rel="nofollow">casperd added to -CURRENT</a></h3>

<ul>
<li>&quot;It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted.&quot;</li>
<li>Lists some sysctls that can be controlled
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258704" rel="nofollow">ZFS corruption bug fixed in -CURRENT</a></h3>

<ul>
<li>Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JDWKjs7l" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20BLqxTWD" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s2939tUOf5" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s21qKY6qIb" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20LWlmhoK" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week is the long-awaited episode you&#39;ve been asking for! We&#39;ll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project&#39;s recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=334937" rel="nofollow">pkgng 1.2 released</a></h3>

<ul>
<li>bapt and bdrewery from the portmgr team released pkgng 1.2 final</li>
<li>New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new &quot;pkg config&quot; command, repo improvements, vuXML is now default, new fingerprint features and much more</li>
<li>Really simple to upgrade, check our <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng tutorial</a> if you want some easy instructions</li>
<li>It&#39;s also made its way <a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" rel="nofollow">into Dragonfly</a></li>
<li>See the show notes for the full list of new features and fixes
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" rel="nofollow">ChaCha20 and Poly1305 in OpenSSH</a></h3>

<ul>
<li>Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305</li>
<li>Long blog post explaining what these are and why we need them</li>
<li>This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC</li>
<li>RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn&#39;t show the packet length in cleartext</li>
<li>Great explanation of the differences between EtM, MtE and EaM and their advantages</li>
<li>&quot;Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly.&quot;
***</li>
</ul>

<h3><a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" rel="nofollow">Is it time to dump Linux and move to BSD</a></h3>

<ul>
<li>ITworld did an article about switching from Linux to BSD</li>
<li>The author&#39;s interest was sparked from a review he was reading that said &quot;I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0&quot;</li>
<li>The whole article can be summed up with &quot;yes&quot; - ok, next story!
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/deirdres/videos" rel="nofollow">OpenZFS devsummit videos</a></h3>

<ul>
<li>The OpenZFS <a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" rel="nofollow">developer summit</a> discussion and presentation videos are up</li>
<li>People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced</li>
<li>Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation</li>
<li>Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production</li>
<li>TONS of video, about 6 hours&#39; worth</li>
<li>This leads us into our interview, which is...
***</li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<p>OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">A crash course on ZFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131126113154" rel="nofollow">ruBSD 2013 information</a></h3>

<ul>
<li>The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia</li>
<li>Speakers include three OpenBSD developers, <a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" rel="nofollow">Theo de Raadt</a>, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> and Mike Belopuhov</li>
<li>Their talks are titled &quot;The bane of backwards compatibility,&quot; &quot;OpenBSD&#39;s pf: Design, Implementation and Future&quot; and &quot;OpenBSD: Where crypto is going?&quot;</li>
<li>No word on if there will be video recordings, but we&#39;ll let you know if that changes
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" rel="nofollow">DragonFly roadmap, post 3.6</a></h3>

<ul>
<li>John Marino posted a possible roadmap for DragonFly, now that they&#39;re past the 3.6 release</li>
<li>He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)</li>
<li>Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still</li>
<li>Bring in fixes and new stuff from FreeBSD 10
***</li>
</ul>

<h3><a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" rel="nofollow">BSDCan 2014 CFP</a></h3>

<ul>
<li>BSDCan 2014 will be held on May 16-17 in Ottawa, Canada</li>
<li>They&#39;re now accepting proposals for talks</li>
<li>If you are doing something interesting with a BSD operating system, please submit a proposal</li>
<li>We&#39;ll be getting lots of interviews there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258838" rel="nofollow">casperd added to -CURRENT</a></h3>

<ul>
<li>&quot;It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted.&quot;</li>
<li>Lists some sysctls that can be controlled
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258704" rel="nofollow">ZFS corruption bug fixed in -CURRENT</a></h3>

<ul>
<li>Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JDWKjs7l" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20BLqxTWD" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s2939tUOf5" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s21qKY6qIb" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20LWlmhoK" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
