<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 18 Apr 2026 03:34:41 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Random”</title>
    <link>https://www.bsdnow.tv/tags/random</link>
    <pubDate>Thu, 08 Dec 2022 03:00:00 -0500</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>484: Birth of stderr</title>
  <link>https://www.bsdnow.tv/484</link>
  <guid isPermaLink="false">4f095d18-aa8c-465b-956d-03ca0f1f16f8</guid>
  <pubDate>Thu, 08 Dec 2022 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4f095d18-aa8c-465b-956d-03ca0f1f16f8.mp3" length="34985472" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Virtualization showdown, The Birth of Standard Error, why Steam started picking a random font, Maintaining Sufficient Free Space with ZFS, updated Apple M1/M2 bootloader, code, FreeBSD on my workstation, and more </itunes:subtitle>
  <itunes:duration>36:26</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Virtualization showdown, The Birth of Standard Error, why Steam started picking a random font, Maintaining Sufficient Free Space with ZFS, updated Apple M1/M2 bootloader, code, FreeBSD on my workstation, and more 
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
Virtualization showdown – FreeBSD’s bhyve vs. Linux’s KVM (https://klarasystems.com/articles/virtualization-showdown-freebsd-bhyve-linux-kvm/)
The Birth of Standard Error (https://www.spinellis.gr/blog/20131211/)
News Roundup
Investigating why Steam started picking a random font (http://blog.pkh.me/p/35-investigating-why-steam-started-picking-a-random-font.html)
Curious Case of Maintaining Sufficient Free Space with ZFS (https://taras.glek.net/post/curious-case-of-maintaining-sufficient-free-space-with-zfs/)
Call for testing on updated Apple M1/M2 bootloader code (https://undeadly.org/cgi?action=article;sid=20221120113149)
FreeBSD on my workstation (https://camandro.org/blog/2022-09-30-freebsd-on-my-workstation.html)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Brad - Initial Setup (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/484/feedback/Brad%20-%20Initial%20Setup.md)
Joseph - openbsd and postgresql (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/484/feedback/joseph%20-%20openbsd%20and%20postgresql.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, bhyve, kvm, virtualization, virtual, vm, standard error, stderr, steam, random, font, free space, M1, M2, bootloader, workstation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Virtualization showdown, The Birth of Standard Error, why Steam started picking a random font, Maintaining Sufficient Free Space with ZFS, updated Apple M1/M2 bootloader, code, FreeBSD on my workstation, and more </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/virtualization-showdown-freebsd-bhyve-linux-kvm/" rel="nofollow">Virtualization showdown – FreeBSD’s bhyve vs. Linux’s KVM</a></h3>

<hr>

<h3><a href="https://www.spinellis.gr/blog/20131211/" rel="nofollow">The Birth of Standard Error</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.pkh.me/p/35-investigating-why-steam-started-picking-a-random-font.html" rel="nofollow">Investigating why Steam started picking a random font</a></h3>

<hr>

<h3><a href="https://taras.glek.net/post/curious-case-of-maintaining-sufficient-free-space-with-zfs/" rel="nofollow">Curious Case of Maintaining Sufficient Free Space with ZFS</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20221120113149" rel="nofollow">Call for testing on updated Apple M1/M2 bootloader code</a></h3>

<hr>

<h3><a href="https://camandro.org/blog/2022-09-30-freebsd-on-my-workstation.html" rel="nofollow">FreeBSD on my workstation</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/484/feedback/Brad%20-%20Initial%20Setup.md" rel="nofollow">Brad - Initial Setup</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/484/feedback/joseph%20-%20openbsd%20and%20postgresql.md" rel="nofollow">Joseph - openbsd and postgresql</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Virtualization showdown, The Birth of Standard Error, why Steam started picking a random font, Maintaining Sufficient Free Space with ZFS, updated Apple M1/M2 bootloader, code, FreeBSD on my workstation, and more </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/virtualization-showdown-freebsd-bhyve-linux-kvm/" rel="nofollow">Virtualization showdown – FreeBSD’s bhyve vs. Linux’s KVM</a></h3>

<hr>

<h3><a href="https://www.spinellis.gr/blog/20131211/" rel="nofollow">The Birth of Standard Error</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.pkh.me/p/35-investigating-why-steam-started-picking-a-random-font.html" rel="nofollow">Investigating why Steam started picking a random font</a></h3>

<hr>

<h3><a href="https://taras.glek.net/post/curious-case-of-maintaining-sufficient-free-space-with-zfs/" rel="nofollow">Curious Case of Maintaining Sufficient Free Space with ZFS</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20221120113149" rel="nofollow">Call for testing on updated Apple M1/M2 bootloader code</a></h3>

<hr>

<h3><a href="https://camandro.org/blog/2022-09-30-freebsd-on-my-workstation.html" rel="nofollow">FreeBSD on my workstation</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/484/feedback/Brad%20-%20Initial%20Setup.md" rel="nofollow">Brad - Initial Setup</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/484/feedback/joseph%20-%20openbsd%20and%20postgresql.md" rel="nofollow">Joseph - openbsd and postgresql</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>398: Coordinated Mars Time</title>
  <link>https://www.bsdnow.tv/398</link>
  <guid isPermaLink="false">690f3bec-7d66-4d05-8cee-073e2248cd50</guid>
  <pubDate>Thu, 15 Apr 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/690f3bec-7d66-4d05-8cee-073e2248cd50.mp3" length="30056400" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD 13.0 Full Desktop Experience, FreeBSD on ARM64 in the Cloud, Plan 9 from Bell Labs in Cyberspace, Inferno is open source as well, NetBSD hits donation milestone, grep returns (standard input) on FreeBSD, Random Programming Challenge, OpenBSD Adds Support for Coordinated Mars Time (MTC) and more</itunes:subtitle>
  <itunes:duration>50:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>FreeBSD 13.0 Full Desktop Experience, FreeBSD on ARM64 in the Cloud, Plan 9 from Bell Labs in Cyberspace, Inferno is open source as well, NetBSD hits donation milestone, grep returns (standard input) on FreeBSD, Random Programming Challenge, OpenBSD Adds Support for Coordinated Mars Time (MTC) and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
FreeBSD 13.0 – Full Desktop Experience (https://www.tubsta.com/2021/03/freebsd-13-0-full-desktop-experience/)
With the release of FreeBSD 13.0 on the horizon, I wanted to see how it shapes up on my Lenovo T450 laptop.  Previous major releases on this laptop, using it as a workstation, felt very rough around the edges but with 13, it feels like the developers got it right.
FreeBSD on ARM64 in the Cloud (https://klarasystems.com/articles/the-next-level-freebsd-on-arm64-in-the-cloud/)
Until the end of June, Amazon AWS is offering free ARM64 Graviton instances, learn how to try out FreeBSD to ARMv8 in the cloud
Plan 9 from Bell Labs in Cyberspace! (https://www.bell-labs.com/institute/blog/plan-9-bell-labs-cyberspace/)
The releases below represent the historical releases of Plan 9. (http://p9f.org/dl/index.html) The two versions of 4th Edition represent the initial release and the final version available from Bell Labs as it was updated and patched. All historical releases of Plan 9 have been re-released under the terms of the MIT license.
+ Inferno is open source as well (https://bitbucket.org/inferno-os/inferno64-os/src/master/)
News Roundup
Hitting donation milestone, financial report for 2020 (http://blog.netbsd.org/tnf/entry/hitting_donation_milestone_financial_report)
We nearly hit our 2020 donation milestone set after the release of 9.0 of $50,000.
grep returns (standard input) on FreeBSD (https://rubenerd.com/grep-returns-standard-input/)
I was dealing with a bizarre error with grep(1) on FreeBSD, and it soon infected my macOS and NetBSD machines too. It was driving me crazy!
Random Programming Challenge (https://projecteuler.net/problem=84)
This better not be an April Fools Joke… I want to see this actually implemented. I’ll donate $100 to the first BSD that actually implements this for real.  Who’s with me?
OpenBSD Adds Support for Coordinated Mars Time (MTC) (https://marc.info/?l=openbsd-cvs&amp;amp;m=161730046519995)
To make sure that OpenBSD can be used elsewhere than just earth, this diff introduces Coordinated Mars Time (MTC), the Mars equivalent of earth’s Universal Time (UTC).
OpenZFS had a good one too (https://github.com/openzfs/zfs/pull/11823)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Brandon - router (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Brandon%20-%20router)
Lawrence - Is BSD for me (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Lawrence%20-%20Is%20FreeBSD%20for%20me)
miguel - printing (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/miguel%20-%20printing)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, desktop, arm64, armv8, cloud, aws, plan 9, bell labs, cyberspace, inferno, donation, milestone, financial, report, opnsense, grep, stdin, standard input, random, programming, challenge, Mars, Coordinated Mars Time </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 13.0 Full Desktop Experience, FreeBSD on ARM64 in the Cloud, Plan 9 from Bell Labs in Cyberspace, Inferno is open source as well, NetBSD hits donation milestone, grep returns (standard input) on FreeBSD, Random Programming Challenge, OpenBSD Adds Support for Coordinated Mars Time (MTC) and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.tubsta.com/2021/03/freebsd-13-0-full-desktop-experience/" rel="nofollow">FreeBSD 13.0 – Full Desktop Experience</a></h3>

<blockquote>
<p>With the release of FreeBSD 13.0 on the horizon, I wanted to see how it shapes up on my Lenovo T450 laptop.  Previous major releases on this laptop, using it as a workstation, felt very rough around the edges but with 13, it feels like the developers got it right.</p>

<hr>

<h3><a href="https://klarasystems.com/articles/the-next-level-freebsd-on-arm64-in-the-cloud/" rel="nofollow">FreeBSD on ARM64 in the Cloud</a></h3>

<p>Until the end of June, Amazon AWS is offering free ARM64 Graviton instances, learn how to try out FreeBSD to ARMv8 in the cloud</p>

<hr>
</blockquote>

<h3><a href="https://www.bell-labs.com/institute/blog/plan-9-bell-labs-cyberspace/" rel="nofollow">Plan 9 from Bell Labs in Cyberspace!</a></h3>

<blockquote>
<p><a href="http://p9f.org/dl/index.html" rel="nofollow">The releases below represent the historical releases of Plan 9.</a> The two versions of 4th Edition represent the initial release and the final version available from Bell Labs as it was updated and patched. All historical releases of Plan 9 have been re-released under the terms of the MIT license.</p>

<ul>
<li><a href="https://bitbucket.org/inferno-os/inferno64-os/src/master/" rel="nofollow">Inferno is open source as well</a>
***
## News Roundup
### <a href="http://blog.netbsd.org/tnf/entry/hitting_donation_milestone_financial_report" rel="nofollow">Hitting donation milestone, financial report for 2020</a>
We nearly hit our 2020 donation milestone set after the release of 9.0 of $50,000.
***</li>
</ul>
</blockquote>

<h3><a href="https://rubenerd.com/grep-returns-standard-input/" rel="nofollow">grep returns (standard input) on FreeBSD</a></h3>

<blockquote>
<p>I was dealing with a bizarre error with grep(1) on FreeBSD, and it soon infected my macOS and NetBSD machines too. It was driving me crazy!</p>

<hr>

<h3><a href="https://projecteuler.net/problem=84" rel="nofollow">Random Programming Challenge</a></h3>

<hr>

<h3>This better not be an April Fools Joke… I want to see this actually implemented. I’ll donate $100 to the first BSD that actually implements this for real.  Who’s with me?</h3>
</blockquote>

<p><a href="https://marc.info/?l=openbsd-cvs&m=161730046519995" rel="nofollow">OpenBSD Adds Support for Coordinated Mars Time (MTC)</a></p>

<blockquote>
<p>To make sure that OpenBSD can be used elsewhere than just earth, this diff introduces Coordinated Mars Time (MTC), the Mars equivalent of earth’s Universal Time (UTC).<br>
<a href="https://github.com/openzfs/zfs/pull/11823" rel="nofollow">OpenZFS had a good one too</a></p>
</blockquote>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Brandon%20-%20router" rel="nofollow">Brandon - router</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Lawrence%20-%20Is%20FreeBSD%20for%20me" rel="nofollow">Lawrence - Is BSD for me</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/miguel%20-%20printing" rel="nofollow">miguel - printing</a></p></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 13.0 Full Desktop Experience, FreeBSD on ARM64 in the Cloud, Plan 9 from Bell Labs in Cyberspace, Inferno is open source as well, NetBSD hits donation milestone, grep returns (standard input) on FreeBSD, Random Programming Challenge, OpenBSD Adds Support for Coordinated Mars Time (MTC) and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.tubsta.com/2021/03/freebsd-13-0-full-desktop-experience/" rel="nofollow">FreeBSD 13.0 – Full Desktop Experience</a></h3>

<blockquote>
<p>With the release of FreeBSD 13.0 on the horizon, I wanted to see how it shapes up on my Lenovo T450 laptop.  Previous major releases on this laptop, using it as a workstation, felt very rough around the edges but with 13, it feels like the developers got it right.</p>

<hr>

<h3><a href="https://klarasystems.com/articles/the-next-level-freebsd-on-arm64-in-the-cloud/" rel="nofollow">FreeBSD on ARM64 in the Cloud</a></h3>

<p>Until the end of June, Amazon AWS is offering free ARM64 Graviton instances, learn how to try out FreeBSD to ARMv8 in the cloud</p>

<hr>
</blockquote>

<h3><a href="https://www.bell-labs.com/institute/blog/plan-9-bell-labs-cyberspace/" rel="nofollow">Plan 9 from Bell Labs in Cyberspace!</a></h3>

<blockquote>
<p><a href="http://p9f.org/dl/index.html" rel="nofollow">The releases below represent the historical releases of Plan 9.</a> The two versions of 4th Edition represent the initial release and the final version available from Bell Labs as it was updated and patched. All historical releases of Plan 9 have been re-released under the terms of the MIT license.</p>

<ul>
<li><a href="https://bitbucket.org/inferno-os/inferno64-os/src/master/" rel="nofollow">Inferno is open source as well</a>
***
## News Roundup
### <a href="http://blog.netbsd.org/tnf/entry/hitting_donation_milestone_financial_report" rel="nofollow">Hitting donation milestone, financial report for 2020</a>
We nearly hit our 2020 donation milestone set after the release of 9.0 of $50,000.
***</li>
</ul>
</blockquote>

<h3><a href="https://rubenerd.com/grep-returns-standard-input/" rel="nofollow">grep returns (standard input) on FreeBSD</a></h3>

<blockquote>
<p>I was dealing with a bizarre error with grep(1) on FreeBSD, and it soon infected my macOS and NetBSD machines too. It was driving me crazy!</p>

<hr>

<h3><a href="https://projecteuler.net/problem=84" rel="nofollow">Random Programming Challenge</a></h3>

<hr>

<h3>This better not be an April Fools Joke… I want to see this actually implemented. I’ll donate $100 to the first BSD that actually implements this for real.  Who’s with me?</h3>
</blockquote>

<p><a href="https://marc.info/?l=openbsd-cvs&m=161730046519995" rel="nofollow">OpenBSD Adds Support for Coordinated Mars Time (MTC)</a></p>

<blockquote>
<p>To make sure that OpenBSD can be used elsewhere than just earth, this diff introduces Coordinated Mars Time (MTC), the Mars equivalent of earth’s Universal Time (UTC).<br>
<a href="https://github.com/openzfs/zfs/pull/11823" rel="nofollow">OpenZFS had a good one too</a></p>
</blockquote>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Brandon%20-%20router" rel="nofollow">Brandon - router</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/Lawrence%20-%20Is%20FreeBSD%20for%20me" rel="nofollow">Lawrence - Is BSD for me</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/398/feedback/miguel%20-%20printing" rel="nofollow">miguel - printing</a></p></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>352: Introducing Randomness</title>
  <link>https://www.bsdnow.tv/352</link>
  <guid isPermaLink="false">a4aba73b-ccc0-41d3-bd39-45783e594bd3</guid>
  <pubDate>Thu, 28 May 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a4aba73b-ccc0-41d3-bd39-45783e594bd3.mp3" length="45132517" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>A brief introduction to randomness, logs grinding netatalk to a halt, NetBSD core team changes, Using qemu guest agent on OpenBSD kvm/qemu guests, WireGuard patchset for OpenBSD, FreeBSD 12.1 on a laptop, and more.</itunes:subtitle>
  <itunes:duration>50:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>A brief introduction to randomness, logs grinding netatalk to a halt, NetBSD core team changes, Using qemu guest agent on OpenBSD kvm/qemu guests, WireGuard patchset for OpenBSD, FreeBSD 12.1 on a laptop, and more.
Headlines
Entropy (https://washbear.neocities.org/entropy.html)
A brief introduction to randomness
Problem: Computers are very predictable. This is by design.
But what if we want them to act unpredictably? This is very useful if we want to secure our private communications with randomized keys, or not let people cheat at video games, or if we're doing statistical simulations or similar.
Logs grinding Netatalk on FreeBSD to a hault (https://rubenerd.com/logs-grinding-netatalk-on-freebsd-to-a-hault/)
I’ve heard it said the cobbler’s children walk barefoot. While posessing the qualities of a famed financial investment strategy, it speaks to how we generally put more effort into things for others than ourselves; at least in business.
The HP Microserver I share with Clara is a modest affair compared to what we run at work. It has six spinning rust drives and two SSDs which are ZFS-mirrored; not even in a RAID 10 equivalent. This is underlaid with GELI for encryption, and served to our Macs with Netatalk over gigabit Ethernet with jumbo frames.
News Roundup
NetBSD Core Team Changes (https://mail-index.netbsd.org/netbsd-announce/2020/05/07/msg000314.html)
Matt Thomas (matt@) has served on the NetBSD core team for over ten years, and has made many contributions, including ELF functionality, being the long-time VAX maintainer, gcc contributor, the generic pmap, and also networking functionality, and platform bring-up over the years.  Matt has stepped down from the NetBSD core team, and we thank him for his many, extensive contributions.
Robert Elz (kre@), a long time BSD contributor, has kindly accepted the offer to join the core team, and help us out with the benefit of his experience and advice over many years.  Amongst other things, Robert has been maintaining our shell, liaising with the Austin Group, and bringing it up to date with modern functionality.
Using qemu guest agent on OpenBSD kvm/qemu guests (https://undeadly.org/cgi?action=article;sid=20200514073852)
In a post to the ports@ mailing list, Landry Breuil (landry@) shared some of his notes on using qemu guest agent on OpenBSD kvm/qemu guests.
WireGuard patchset for OpenBSD (https://undeadly.org/cgi?action=article;sid=20200512080047)
A while ago I wanted to learn more about OpenBSD development. So I picked a project, in this case WireGuard, to develop a native client for. Over the last two years, with many different iterations, and working closely with the WireGuard's creator (Jason [Jason A. Donenfeld - Ed.], CC'd), it started to become a serious project eventually reaching parity with other official implementations. Finally, we are here and I think it is time for any further development to happen inside the src tree.
FreeBSD 12.1 on a laptop (https://dataswamp.org/~solene/2020-05-11-freebsd-workstation.html)
I’m using FreeBSD again on a laptop for some reasons so expect to read more about FreeBSD here. This tutorial explain how to get a graphical desktop using FreeBSD 12.1.
Beastie Bits
List of useful FreeBSD Commands (https://medium.com/@tdebarbora/list-of-useful-freebsd-commands-92dffb8f8c57)
Master Your Network With Unix Command Line Tools (https://itnext.io/master-your-network-with-unix-command-line-tools-790bdd3b3b87)
Original Unix containers aka FreeBSD jails (https://twitter.com/nixcraft/status/1257674069387993088)
Flashback : 2003 Article : Bill Joy's greatest gift to man – the vi editor (https://www.theregister.co.uk/2003/09/11/bill_joys_greatest_gift/)
FreeBSD Journal March/April 2020 Filesystems: ZFS Encryption, FUSE, and more, plus Network Bridges (https://www.freebsdfoundation.org/past-issues/filesystems/)
HAMBug meeting will be online again in June, so those from all over the world are welcome to join, June 9th (2nd Tuesday of each month) at 18:30 Eastern (https://www.hambug.ca/)
Feedback/Questions
+ Lyubomir - GELI and ZFS (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Lyubomir%20-%20GELI%20and%20ZFS.md)
Patrick - powerd and powerd++ (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Patrick%20-%20powerd%20and%20powerd%2B%2B.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, random, randomness, entropy, logs, netatalk, core team, changes, qemu, guest agent, kvm, wireguard, patchset, laptop, notebook</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A brief introduction to randomness, logs grinding netatalk to a halt, NetBSD core team changes, Using qemu guest agent on OpenBSD kvm/qemu guests, WireGuard patchset for OpenBSD, FreeBSD 12.1 on a laptop, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://washbear.neocities.org/entropy.html" rel="nofollow">Entropy</a></h3>

<blockquote>
<blockquote>
<p>A brief introduction to randomness</p>
</blockquote>
</blockquote>

<ul>
<li>Problem: Computers are very predictable. This is by design.</li>
</ul>

<blockquote>
<p>But what if we want them to act unpredictably? This is very useful if we want to secure our private communications with randomized keys, or not let people cheat at video games, or if we&#39;re doing statistical simulations or similar.</p>
</blockquote>

<hr>

<h3><a href="https://rubenerd.com/logs-grinding-netatalk-on-freebsd-to-a-hault/" rel="nofollow">Logs grinding Netatalk on FreeBSD to a hault</a></h3>

<blockquote>
<blockquote>
<p>I’ve heard it said the cobbler’s children walk barefoot. While posessing the qualities of a famed financial investment strategy, it speaks to how we generally put more effort into things for others than ourselves; at least in business.<br>
The HP Microserver I share with Clara is a modest affair compared to what we run at work. It has six spinning rust drives and two SSDs which are ZFS-mirrored; not even in a RAID 10 equivalent. This is underlaid with GELI for encryption, and served to our Macs with Netatalk over gigabit Ethernet with jumbo frames.</p>
</blockquote>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-announce/2020/05/07/msg000314.html" rel="nofollow">NetBSD Core Team Changes</a></h3>

<blockquote>
<p>Matt Thomas (matt@) has served on the NetBSD core team for over ten years, and has made many contributions, including ELF functionality, being the long-time VAX maintainer, gcc contributor, the generic pmap, and also networking functionality, and platform bring-up over the years.  Matt has stepped down from the NetBSD core team, and we thank him for his many, extensive contributions.<br>
Robert Elz (kre@), a long time BSD contributor, has kindly accepted the offer to join the core team, and help us out with the benefit of his experience and advice over many years.  Amongst other things, Robert has been maintaining our shell, liaising with the Austin Group, and bringing it up to date with modern functionality.</p>

<hr>
</blockquote>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20200514073852" rel="nofollow">Using qemu guest agent on OpenBSD kvm/qemu guests</a></h3>

<blockquote>
<p>In a post to the ports@ mailing list, Landry Breuil (landry@) shared some of his notes on using qemu guest agent on OpenBSD kvm/qemu guests.</p>
</blockquote>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20200512080047" rel="nofollow">WireGuard patchset for OpenBSD</a></h3>

<blockquote>
<p>A while ago I wanted to learn more about OpenBSD development. So I picked a project, in this case WireGuard, to develop a native client for. Over the last two years, with many different iterations, and working closely with the WireGuard&#39;s creator (Jason [Jason A. Donenfeld - Ed.], CC&#39;d), it started to become a serious project eventually reaching parity with other official implementations. Finally, we are here and I think it is time for any further development to happen inside the src tree.</p>

<hr>
</blockquote>

<h3><a href="https://dataswamp.org/%7Esolene/2020-05-11-freebsd-workstation.html" rel="nofollow">FreeBSD 12.1 on a laptop</a></h3>

<blockquote>
<p>I’m using FreeBSD again on a laptop for some reasons so expect to read more about FreeBSD here. This tutorial explain how to get a graphical desktop using FreeBSD 12.1.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://medium.com/@tdebarbora/list-of-useful-freebsd-commands-92dffb8f8c57" rel="nofollow">List of useful FreeBSD Commands</a></li>
<li><a href="https://itnext.io/master-your-network-with-unix-command-line-tools-790bdd3b3b87" rel="nofollow">Master Your Network With Unix Command Line Tools</a></li>
<li><a href="https://twitter.com/nixcraft/status/1257674069387993088" rel="nofollow">Original Unix containers aka FreeBSD jails</a></li>
<li><a href="https://www.theregister.co.uk/2003/09/11/bill_joys_greatest_gift/" rel="nofollow">Flashback : 2003 Article : Bill Joy&#39;s greatest gift to man – the vi editor</a></li>
<li><a href="https://www.freebsdfoundation.org/past-issues/filesystems/" rel="nofollow">FreeBSD Journal March/April 2020 Filesystems: ZFS Encryption, FUSE, and more, plus Network Bridges</a></li>
<li><a href="https://www.hambug.ca/" rel="nofollow">HAMBug meeting will be online again in June, so those from all over the world are welcome to join, June 9th (2nd Tuesday of each month) at 18:30 Eastern</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>+ <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Lyubomir%20-%20GELI%20and%20ZFS.md" rel="nofollow">Lyubomir - GELI and ZFS</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Patrick%20-%20powerd%20and%20powerd%2B%2B.md" rel="nofollow">Patrick - powerd and powerd++</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A brief introduction to randomness, logs grinding netatalk to a halt, NetBSD core team changes, Using qemu guest agent on OpenBSD kvm/qemu guests, WireGuard patchset for OpenBSD, FreeBSD 12.1 on a laptop, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://washbear.neocities.org/entropy.html" rel="nofollow">Entropy</a></h3>

<blockquote>
<blockquote>
<p>A brief introduction to randomness</p>
</blockquote>
</blockquote>

<ul>
<li>Problem: Computers are very predictable. This is by design.</li>
</ul>

<blockquote>
<p>But what if we want them to act unpredictably? This is very useful if we want to secure our private communications with randomized keys, or not let people cheat at video games, or if we&#39;re doing statistical simulations or similar.</p>
</blockquote>

<hr>

<h3><a href="https://rubenerd.com/logs-grinding-netatalk-on-freebsd-to-a-hault/" rel="nofollow">Logs grinding Netatalk on FreeBSD to a hault</a></h3>

<blockquote>
<blockquote>
<p>I’ve heard it said the cobbler’s children walk barefoot. While posessing the qualities of a famed financial investment strategy, it speaks to how we generally put more effort into things for others than ourselves; at least in business.<br>
The HP Microserver I share with Clara is a modest affair compared to what we run at work. It has six spinning rust drives and two SSDs which are ZFS-mirrored; not even in a RAID 10 equivalent. This is underlaid with GELI for encryption, and served to our Macs with Netatalk over gigabit Ethernet with jumbo frames.</p>
</blockquote>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-announce/2020/05/07/msg000314.html" rel="nofollow">NetBSD Core Team Changes</a></h3>

<blockquote>
<p>Matt Thomas (matt@) has served on the NetBSD core team for over ten years, and has made many contributions, including ELF functionality, being the long-time VAX maintainer, gcc contributor, the generic pmap, and also networking functionality, and platform bring-up over the years.  Matt has stepped down from the NetBSD core team, and we thank him for his many, extensive contributions.<br>
Robert Elz (kre@), a long time BSD contributor, has kindly accepted the offer to join the core team, and help us out with the benefit of his experience and advice over many years.  Amongst other things, Robert has been maintaining our shell, liaising with the Austin Group, and bringing it up to date with modern functionality.</p>

<hr>
</blockquote>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20200514073852" rel="nofollow">Using qemu guest agent on OpenBSD kvm/qemu guests</a></h3>

<blockquote>
<p>In a post to the ports@ mailing list, Landry Breuil (landry@) shared some of his notes on using qemu guest agent on OpenBSD kvm/qemu guests.</p>
</blockquote>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20200512080047" rel="nofollow">WireGuard patchset for OpenBSD</a></h3>

<blockquote>
<p>A while ago I wanted to learn more about OpenBSD development. So I picked a project, in this case WireGuard, to develop a native client for. Over the last two years, with many different iterations, and working closely with the WireGuard&#39;s creator (Jason [Jason A. Donenfeld - Ed.], CC&#39;d), it started to become a serious project eventually reaching parity with other official implementations. Finally, we are here and I think it is time for any further development to happen inside the src tree.</p>

<hr>
</blockquote>

<h3><a href="https://dataswamp.org/%7Esolene/2020-05-11-freebsd-workstation.html" rel="nofollow">FreeBSD 12.1 on a laptop</a></h3>

<blockquote>
<p>I’m using FreeBSD again on a laptop for some reasons so expect to read more about FreeBSD here. This tutorial explain how to get a graphical desktop using FreeBSD 12.1.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://medium.com/@tdebarbora/list-of-useful-freebsd-commands-92dffb8f8c57" rel="nofollow">List of useful FreeBSD Commands</a></li>
<li><a href="https://itnext.io/master-your-network-with-unix-command-line-tools-790bdd3b3b87" rel="nofollow">Master Your Network With Unix Command Line Tools</a></li>
<li><a href="https://twitter.com/nixcraft/status/1257674069387993088" rel="nofollow">Original Unix containers aka FreeBSD jails</a></li>
<li><a href="https://www.theregister.co.uk/2003/09/11/bill_joys_greatest_gift/" rel="nofollow">Flashback : 2003 Article : Bill Joy&#39;s greatest gift to man – the vi editor</a></li>
<li><a href="https://www.freebsdfoundation.org/past-issues/filesystems/" rel="nofollow">FreeBSD Journal March/April 2020 Filesystems: ZFS Encryption, FUSE, and more, plus Network Bridges</a></li>
<li><a href="https://www.hambug.ca/" rel="nofollow">HAMBug meeting will be online again in June, so those from all over the world are welcome to join, June 9th (2nd Tuesday of each month) at 18:30 Eastern</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>+ <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Lyubomir%20-%20GELI%20and%20ZFS.md" rel="nofollow">Lyubomir - GELI and ZFS</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/352/feedback/Patrick%20-%20powerd%20and%20powerd%2B%2B.md" rel="nofollow">Patrick - powerd and powerd++</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>67: Must Be Rigged</title>
  <link>https://www.bsdnow.tv/67</link>
  <guid isPermaLink="false">5e135afe-0a75-46d6-b995-ae5d3ca228ba</guid>
  <pubDate>Wed, 10 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5e135afe-0a75-46d6-b995-ae5d3ca228ba.mp3" length="58310356" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we've got an interview with Patrick Wildt, one of the developers of Bitrig. We'll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We've also got all the week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show, we've got an interview with Patrick Wildt, one of the developers of Bitrig. We'll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We've also got all the week's news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Bitrig 1.0 released (http://article.gmane.org/gmane.os.bitrig.devel/6)
If you haven't heard of it, Bitrig (https://www.bitrig.org/) is a fork of OpenBSD that started a couple years ago
According to their FAQ (https://github.com/bitrig/bitrig/wiki/Faq), some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support
They've finally announced their first official release, 1.0
This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version
It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background
One of the developers answered some questions (https://news.ycombinator.com/item?id=8701936) about it on Hacker News too
***
Is it time to try BSD? (http://www.technewsworld.com/story/81424.html)
Here we get a little peek into the Linux world - more and more people are considering switching
On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD
People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side
This article explores some pros and cons of switching, and features opinions of various users
***
Poudriere 3.1 released (https://github.com/freebsd/poudriere/wiki/release_notes_31)
One of the first things we ever covered on the show was poudriere (http://www.bsdnow.tv/tutorials/poudriere), a tool with a funny name that's used to build binary packages from FreeBSD ports
It's come a long way since then, and bdrewery (http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry) and bapt (http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries) have just announced a new major version
This new release features a redesigned web interface to check on the status of your packages
There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier
It also introduces a useful new "pkgclean" subcommand to clean out your repository of packages that aren't needed anymore, and poudriere keeps it cleaner by default as well now
Check the full release notes for all the additions and bug fixes
***
Firewalling with OpenBSD's pf and pfsync (https://www.youtube.com/watch?v=mN5E2EYJnrw)
A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync
He uses pf to manage 60 internal networks with a single firewall
The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated
It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more
The second half of the presentation focuses on pfsync and carp for failover and redundancy
With two BSD boxes running pfsync, you can actually patch your kernel and still stay connected to IRC
***
Interview - Patrick Wildt - patrick@bitrig.org (mailto:patrick@bitrig.org) / @bitrig (https://twitter.com/bitrig)
The initial release of Bitrig
News Roundup
Infrastructural enhancements at NYI (http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html)
The FreeBSD foundation put up a new blog post detailing some hardware improvements they've recently done
Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things
There've been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there
This blog post goes into detail about how those servers are used and details some of the network topology
***
The long tail of MD5 (http://www.tedunangst.com/flak/post/the-long-tail-of-MD5)
Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD's tree with something more modern
In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace
Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect
Some other places (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141763065223567&amp;amp;w=4) require a bit more care… 
***
DragonFly cheat sheet (http://www.dragonflybsd.org/varialus/)
If you've been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier
A user-created "cheat sheet" on the website lists some common answers to beginner questions
The page features a walkthrough of the installer, some shell tips and workarounds for various issues
At the end, it also has some things that new users can get involved with to help out
***
Experiences with an OpenBSD laptop (http://alxjsn.com/unix/openbsd-laptop/)
A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that
The author got interested in OpenBSD mostly because of the security focus and the fact that it's not Linux
In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad
He even gives us a mention as a good place to learn more about BSD, thanks!
***
PC-BSD Updates (http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html)
A call for testing of a new update system has gone out
Conversion to Qt5 for utils has taken place
***
Feedback/Questions
Chris writes in (http://slexy.org/view/s2ihSmjpLu)
AJ writes in (http://slexy.org/view/s20JXhXS6o)
Dan writes in (http://slexy.org/view/s21hfeWB2K)
Jeff writes in (http://slexy.org/view/s2k6SmuDGB)
***
Mailing List Gold
Over 440% faster (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141775233603723&amp;amp;w=2)
The (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html) PF (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html) conundrum (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html) (edit: Allan misspoke about PF performance during this segment, apologies.)
Violating (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141807513728073&amp;amp;w=4) bad standards (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141807224826859&amp;amp;w=2)
apt-get rid of systemd (https://www.marc.info/?l=openbsd-misc&amp;amp;m=141798194330985&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bitrig, fork, clang, llvm, virtualization, poudriere, srand, random, md5, sha512, rand, srand, systemd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got an interview with Patrick Wildt, one of the developers of Bitrig. We&#39;ll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We&#39;ve also got all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://article.gmane.org/gmane.os.bitrig.devel/6" rel="nofollow">Bitrig 1.0 released</a></h3>

<ul>
<li>If you haven&#39;t heard of it, <a href="https://www.bitrig.org/" rel="nofollow">Bitrig</a> is a fork of OpenBSD that started a couple years ago</li>
<li>According to <a href="https://github.com/bitrig/bitrig/wiki/Faq" rel="nofollow">their FAQ</a>, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support</li>
<li>They&#39;ve finally announced their first official release, 1.0</li>
<li>This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version</li>
<li>It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background</li>
<li>One of the developers <a href="https://news.ycombinator.com/item?id=8701936" rel="nofollow">answered some questions</a> about it on Hacker News too
***</li>
</ul>

<h3><a href="http://www.technewsworld.com/story/81424.html" rel="nofollow">Is it time to try BSD?</a></h3>

<ul>
<li>Here we get a little peek into the Linux world - more and more people are considering switching</li>
<li>On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD</li>
<li>People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side</li>
<li>This article explores some pros and cons of switching, and features opinions of various users
***</li>
</ul>

<h3><a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" rel="nofollow">Poudriere 3.1 released</a></h3>

<ul>
<li>One of the first things we ever covered on the show was <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, a tool with a funny name that&#39;s used to build binary packages from FreeBSD ports</li>
<li>It&#39;s come a long way since then, and <a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" rel="nofollow">bdrewery</a> and <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a> have just announced a new major version</li>
<li>This new release features a redesigned web interface to check on the status of your packages</li>
<li>There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier</li>
<li>It also introduces a useful new &quot;pkgclean&quot; subcommand to clean out your repository of packages that aren&#39;t needed anymore, and poudriere keeps it cleaner by default as well now</li>
<li>Check the full release notes for all the additions and bug fixes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" rel="nofollow">Firewalling with OpenBSD&#39;s pf and pfsync</a></h3>

<ul>
<li>A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync</li>
<li>He uses pf to manage 60 internal networks with a single firewall</li>
<li>The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated</li>
<li>It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more</li>
<li>The second half of the presentation focuses on pfsync and carp for failover and redundancy</li>
<li>With two BSD boxes running pfsync, you can actually <em>patch your kernel and still stay connected to IRC</em>
***</li>
</ul>

<h2>Interview - Patrick Wildt - <a href="mailto:patrick@bitrig.org" rel="nofollow">patrick@bitrig.org</a> / <a href="https://twitter.com/bitrig" rel="nofollow">@bitrig</a></h2>

<p>The initial release of Bitrig</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" rel="nofollow">Infrastructural enhancements at NYI</a></h3>

<ul>
<li>The FreeBSD foundation put up a new blog post detailing some hardware improvements they&#39;ve recently done</li>
<li>Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things</li>
<li>There&#39;ve been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there</li>
<li>This blog post goes into detail about how those servers are used and details some of the network topology
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" rel="nofollow">The long tail of MD5</a></h3>

<ul>
<li>Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD&#39;s tree with something more modern</li>
<li>In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace</li>
<li>Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141763065223567&w=4" rel="nofollow">Some other places</a> require a bit more care… 
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/varialus/" rel="nofollow">DragonFly cheat sheet</a></h3>

<ul>
<li>If you&#39;ve been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier</li>
<li>A user-created &quot;cheat sheet&quot; on the website lists some common answers to beginner questions</li>
<li>The page features a walkthrough of the installer, some shell tips and workarounds for various issues</li>
<li>At the end, it also has some things that new users can get involved with to help out
***</li>
</ul>

<h3><a href="http://alxjsn.com/unix/openbsd-laptop/" rel="nofollow">Experiences with an OpenBSD laptop</a></h3>

<ul>
<li>A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that</li>
<li>The author got interested in OpenBSD mostly because of the security focus and the fact that it&#39;s <em>not</em> Linux</li>
<li>In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad</li>
<li>He even gives us a mention as a good place to learn more about BSD, thanks!
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" rel="nofollow">PC-BSD Updates</a></h3>

<ul>
<li>A call for testing of a new update system has gone out</li>
<li>Conversion to Qt5 for utils has taken place
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ihSmjpLu" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20JXhXS6o" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s21hfeWB2K" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s2k6SmuDGB" rel="nofollow">Jeff writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141775233603723&w=2" rel="nofollow">Over 440% faster</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" rel="nofollow">PF</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" rel="nofollow">conundrum</a> (<strong>edit:</strong> Allan misspoke about PF performance during this segment, apologies.)</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141807513728073&w=4" rel="nofollow">Violating</a> <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">bad standards</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=141798194330985&w=2" rel="nofollow">apt-get rid of systemd</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got an interview with Patrick Wildt, one of the developers of Bitrig. We&#39;ll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We&#39;ve also got all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://article.gmane.org/gmane.os.bitrig.devel/6" rel="nofollow">Bitrig 1.0 released</a></h3>

<ul>
<li>If you haven&#39;t heard of it, <a href="https://www.bitrig.org/" rel="nofollow">Bitrig</a> is a fork of OpenBSD that started a couple years ago</li>
<li>According to <a href="https://github.com/bitrig/bitrig/wiki/Faq" rel="nofollow">their FAQ</a>, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support</li>
<li>They&#39;ve finally announced their first official release, 1.0</li>
<li>This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version</li>
<li>It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background</li>
<li>One of the developers <a href="https://news.ycombinator.com/item?id=8701936" rel="nofollow">answered some questions</a> about it on Hacker News too
***</li>
</ul>

<h3><a href="http://www.technewsworld.com/story/81424.html" rel="nofollow">Is it time to try BSD?</a></h3>

<ul>
<li>Here we get a little peek into the Linux world - more and more people are considering switching</li>
<li>On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD</li>
<li>People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side</li>
<li>This article explores some pros and cons of switching, and features opinions of various users
***</li>
</ul>

<h3><a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" rel="nofollow">Poudriere 3.1 released</a></h3>

<ul>
<li>One of the first things we ever covered on the show was <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, a tool with a funny name that&#39;s used to build binary packages from FreeBSD ports</li>
<li>It&#39;s come a long way since then, and <a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" rel="nofollow">bdrewery</a> and <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a> have just announced a new major version</li>
<li>This new release features a redesigned web interface to check on the status of your packages</li>
<li>There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier</li>
<li>It also introduces a useful new &quot;pkgclean&quot; subcommand to clean out your repository of packages that aren&#39;t needed anymore, and poudriere keeps it cleaner by default as well now</li>
<li>Check the full release notes for all the additions and bug fixes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" rel="nofollow">Firewalling with OpenBSD&#39;s pf and pfsync</a></h3>

<ul>
<li>A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync</li>
<li>He uses pf to manage 60 internal networks with a single firewall</li>
<li>The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated</li>
<li>It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more</li>
<li>The second half of the presentation focuses on pfsync and carp for failover and redundancy</li>
<li>With two BSD boxes running pfsync, you can actually <em>patch your kernel and still stay connected to IRC</em>
***</li>
</ul>

<h2>Interview - Patrick Wildt - <a href="mailto:patrick@bitrig.org" rel="nofollow">patrick@bitrig.org</a> / <a href="https://twitter.com/bitrig" rel="nofollow">@bitrig</a></h2>

<p>The initial release of Bitrig</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" rel="nofollow">Infrastructural enhancements at NYI</a></h3>

<ul>
<li>The FreeBSD foundation put up a new blog post detailing some hardware improvements they&#39;ve recently done</li>
<li>Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things</li>
<li>There&#39;ve been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there</li>
<li>This blog post goes into detail about how those servers are used and details some of the network topology
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" rel="nofollow">The long tail of MD5</a></h3>

<ul>
<li>Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD&#39;s tree with something more modern</li>
<li>In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace</li>
<li>Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141763065223567&w=4" rel="nofollow">Some other places</a> require a bit more care… 
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/varialus/" rel="nofollow">DragonFly cheat sheet</a></h3>

<ul>
<li>If you&#39;ve been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier</li>
<li>A user-created &quot;cheat sheet&quot; on the website lists some common answers to beginner questions</li>
<li>The page features a walkthrough of the installer, some shell tips and workarounds for various issues</li>
<li>At the end, it also has some things that new users can get involved with to help out
***</li>
</ul>

<h3><a href="http://alxjsn.com/unix/openbsd-laptop/" rel="nofollow">Experiences with an OpenBSD laptop</a></h3>

<ul>
<li>A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that</li>
<li>The author got interested in OpenBSD mostly because of the security focus and the fact that it&#39;s <em>not</em> Linux</li>
<li>In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad</li>
<li>He even gives us a mention as a good place to learn more about BSD, thanks!
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" rel="nofollow">PC-BSD Updates</a></h3>

<ul>
<li>A call for testing of a new update system has gone out</li>
<li>Conversion to Qt5 for utils has taken place
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ihSmjpLu" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20JXhXS6o" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s21hfeWB2K" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s2k6SmuDGB" rel="nofollow">Jeff writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141775233603723&w=2" rel="nofollow">Over 440% faster</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" rel="nofollow">PF</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" rel="nofollow">conundrum</a> (<strong>edit:</strong> Allan misspoke about PF performance during this segment, apologies.)</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141807513728073&w=4" rel="nofollow">Violating</a> <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">bad standards</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=141798194330985&w=2" rel="nofollow">apt-get rid of systemd</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>63: A Man's man(1)</title>
  <link>https://www.bsdnow.tv/63</link>
  <guid isPermaLink="false">0dbe70cc-bfdd-4af8-b67f-a5d1e85b7115</guid>
  <pubDate>Wed, 12 Nov 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0dbe70cc-bfdd-4af8-b67f-a5d1e85b7115.mp3" length="70356244" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we've got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week's news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:37:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we've got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week's news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Updates to FreeBSD's random(4) (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=273872)
FreeBSD's random device, which presents itself as "/dev/random" to users (https://news.ycombinator.com/item?id=8550457), has gotten a fairly major overhaul in -CURRENT
The CSPRNG (cryptographically secure pseudo-random number generator) algorithm, Yarrow, now has a new alternative called Fortuna
Yarrow is still the default for now, but Fortuna can be used with a kernel option (and will likely be the new default in 11.0-RELEASE)
Pluggable modules can now be written to add more sources of entropy
These changes are expected to make it in 11.0-RELEASE, but there hasn't been any mention of MFCing them to 10 or 9
***
OpenBSD Tor relays and network diversity (https://lists.torproject.org/pipermail/tor-relays/2014-November/005661.html)
We've talked about getting more BSD-based Tor nodes (http://lists.nycbug.org/mailman/listinfo/tor-bsd) a few times in previous episodes
The "tor-relays" mailing list has had some recent discussion about increasing diversity in the Tor network, specifically by adding more OpenBSD nodes
With the security features and attention to detail, it makes for an excellent dedicated Tor box
More and more adversaries are attacking Tor nodes, so having something that can withstand that will help the greater network at large
A few users are even saying they'll convert their Linux nodes to OpenBSD to help out
Check the archive for the full conversation, and maybe run a node yourself (http://www.bsdnow.tv/tutorials/tor) on any of the BSDs
The Tor wiki page on OpenBSD is pretty out of date (https://lists.torproject.org/pipermail/tor-dev/2014-November/007715.html) (nine years old!?) and uses the old pf syntax, maybe one of our listeners can modernize it
***
SSP now default for FreeBSD ports (https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096344.html)
SSP, or Stack Smashing Protection (https://en.wikipedia.org/wiki/Buffer_overflow_protection), is an additional layer of protection against buffer overflows that the compiler can give to the binaries it produces
It's now enabled by default in FreeBSD's ports tree, and the pkgng packages will have it as well - but only for amd64 (all supported releases) and i386 (10.0-RELEASE or newer)
This will only apply to regular ports and binary packages, not the quarterly branch that only receives security updates
If you were using the temporary "new Xorg" or SSP package repositories instead of the default ones, you need to switch back over
NetBSD made this the default on i386 and amd64 two years ago (https://www.netbsd.org/releases/formal-6/NetBSD-6.0.html) and OpenBSD made this the default on all architectures twelve years ago (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=103881967909595&amp;amp;w=2)
Next time you rebuild your ports, things should be automatically hardened without any extra steps or configuration needed
***
Building an OpenBSD firewall and router (https://www.reddit.com/r/BSD/comments/2ld0yw/building_an_openbsd_firewall_and_router/)
While we've discussed the software and configuration of an OpenBSD router, this Reddit thread focuses more on the hardware side
The OP lists some of his potential choices, but was originally looking for something a bit cheaper than a Soekris
Most agree that, if it's for a business especially, it's worth the extra money to go with something that's well known in the BSD community
They also list a few other popular alternatives: ALIX or the APU series from PC Engines, some Supermicro boards, etc.
Through the comments, we also find out that QuakeCon runs OpenBSD on their network
Hopefully most of our listeners are running some kind of BSD as their gateway - try it out (http://www.bsdnow.tv/tutorials/openbsd-router) if you haven't already
***
Interview - Kristaps Džonsons - kristaps@bsd.lv (mailto:kristaps@bsd.lv)
Mandoc, historical man pages, various topics
Tutorial
Throttling bandwidth with PF (http://www.bsdnow.tv/tutorials/openbsd-router#queues)
News Roundup
NetBSD at Kansai Open Forum 2014 (https://mail-index.netbsd.org/netbsd-advocacy/2014/11/08/msg000672.html)
Japanese NetBSD users invade yet another conference, demonstrating that they can and will install NetBSD on everything
From a Raspberry Pi to SHARP Netwalkers to various luna68k devices, they had it all
As always, you can find lots of pictures in the trip report
***
Getting to know your portmgr lurkers (http://blogs.freebsdish.org/portmgr/2014/11/04/getting-to-know-your-portmgr-lurker-ak/)
The lovable "getting to know your portmgr" series makes its triumphant return
This time around, they interview Alex, one of the portmgr lurkers that joined just this month
"How would you describe yourself?" "Too lazy."
Another post (http://blogs.freebsdish.org/portmgr/2014/11/08/getting-to-know-your-portmgr-lurker-ehaupt/) includes a short interview with Emanuel, another new lurker
We discussed the portmgr lurkers initiative with Steve Wills a while back (http://www.bsdnow.tv/episodes/2014_10_01-the_daemons_apprentice)
***
NetBSD's ARM port gets SMP (https://blog.netbsd.org/tnf/entry/working_arm_multiprocessor_support)
The ARM port of NetBSD now has SMP support, allowing more than one CPU to be used
This blog post on the website has a list of supported boards: Banana Pi, Cubieboard 2, Cubietruck, Merrii Hummingbird A31, CUBOX-I and NITROGEN6X
NetBSD's release team is working on getting these changes into the 7 branch before 7.0 is released
There are also a few nice pictures in the article
***
A high performance mid-range NAS (http://pivotallabs.com/high-performing-mid-range-nas-server-part-2-performance-tuning-iscsi/)
This blog post is about FreeNAS and optimizing iSCSI performance
It talks about using mid-range hardware with FreeNAS and different tunables you can change to affect performance
There are some nice graphs and lots of detail if you're interested in tweaking some of your own settings
They conclude "there is no optimal configuration; rather, FreeNAS can be configured to suit a particular workload"
***
Feedback/Questions
Heto writes in (http://slexy.org/view/s2xGCUj8mC)
Brad writes in (http://slexy.org/view/s2SJ8xppDJ)
Tyler writes in (http://slexy.org/view/s20Ktl6BMk)
Tim writes in (http://slexy.org/view/s2AsrxU0ZQ)
Brad writes in (http://slexy.org/view/s21yn0xLv2)
***
Mailing List Gold
Suspicious contributions (https://www.marc.info/?t=141379917200003&amp;amp;r=1&amp;amp;w=2)
La puissance du fromage (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141538800019451&amp;amp;w=2)
Nothing unusual here (https://mail-index.netbsd.org/tech-ports/2002/07/05/0000.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, mandoc, sysjail, mdocml, mdoc, mancgi, mult, random, arc4random, libressl, meetbsd, fortuna, yarrow, soekris, alix, apu, altq, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ve got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week&#39;s news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=273872" rel="nofollow">Updates to FreeBSD&#39;s random(4)</a></h3>

<ul>
<li>FreeBSD&#39;s random device, which presents itself as &quot;/dev/random&quot; to <a href="https://news.ycombinator.com/item?id=8550457" rel="nofollow">users</a>, has gotten a fairly major overhaul in -CURRENT</li>
<li>The CSPRNG (cryptographically secure pseudo-random number generator) algorithm, Yarrow, now has a new alternative called Fortuna</li>
<li>Yarrow is still the default for now, but Fortuna can be used with a kernel option (and will likely be the new default in 11.0-RELEASE)</li>
<li>Pluggable modules can now be written to add more sources of entropy</li>
<li>These changes are expected to make it in 11.0-RELEASE, but there hasn&#39;t been any mention of MFCing them to 10 or 9
***</li>
</ul>

<h3><a href="https://lists.torproject.org/pipermail/tor-relays/2014-November/005661.html" rel="nofollow">OpenBSD Tor relays and network diversity</a></h3>

<ul>
<li>We&#39;ve talked about getting <a href="http://lists.nycbug.org/mailman/listinfo/tor-bsd" rel="nofollow">more BSD-based Tor nodes</a> a few times in previous episodes</li>
<li>The &quot;tor-relays&quot; mailing list has had some recent discussion about increasing diversity in the Tor network, specifically by adding more OpenBSD nodes</li>
<li>With the security features and attention to detail, it makes for an excellent dedicated Tor box</li>
<li>More and more adversaries are attacking Tor nodes, so having something that can withstand that will help the greater network at large</li>
<li>A few users are even saying they&#39;ll <em>convert their Linux nodes</em> to OpenBSD to help out</li>
<li>Check the archive for the full conversation, and maybe <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">run a node yourself</a> on any of the BSDs</li>
<li>The Tor wiki page on OpenBSD is pretty <a href="https://lists.torproject.org/pipermail/tor-dev/2014-November/007715.html" rel="nofollow">out of date</a> (nine years old!?) and uses the old pf syntax, maybe one of our listeners can modernize it
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096344.html" rel="nofollow">SSP now default for FreeBSD ports</a></h3>

<ul>
<li>SSP, or <a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" rel="nofollow">Stack Smashing Protection</a>, is an additional layer of protection against buffer overflows that the compiler can give to the binaries it produces</li>
<li>It&#39;s now enabled by default in FreeBSD&#39;s ports tree, and the pkgng packages will have it as well - but only for amd64 (all supported releases) and i386 (10.0-RELEASE or newer)</li>
<li>This will only apply to regular ports and binary packages, not the quarterly branch that only receives security updates</li>
<li>If you were using the temporary &quot;new Xorg&quot; or SSP package repositories instead of the default ones, you need to switch back over</li>
<li>NetBSD made this the default on i386 and amd64 <a href="https://www.netbsd.org/releases/formal-6/NetBSD-6.0.html" rel="nofollow">two years ago</a> and OpenBSD made this the default on all architectures <a href="https://www.marc.info/?l=openbsd-cvs&m=103881967909595&w=2" rel="nofollow">twelve years ago</a></li>
<li>Next time you rebuild your ports, things should be automatically hardened without any extra steps or configuration needed
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2ld0yw/building_an_openbsd_firewall_and_router/" rel="nofollow">Building an OpenBSD firewall and router</a></h3>

<ul>
<li>While we&#39;ve discussed the software and configuration of an OpenBSD router, this Reddit thread focuses more on the hardware side</li>
<li>The OP lists some of his potential choices, but was originally looking for something a bit cheaper than a Soekris</li>
<li>Most agree that, if it&#39;s for a business especially, it&#39;s worth the extra money to go with something that&#39;s well known in the BSD community</li>
<li>They also list a few other popular alternatives: ALIX or the APU series from PC Engines, some Supermicro boards, etc.</li>
<li>Through the comments, we also find out that <strong>QuakeCon runs OpenBSD</strong> on their network</li>
<li>Hopefully most of our listeners are running some kind of BSD as their gateway - <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">try it out</a> if you haven&#39;t already
***</li>
</ul>

<h2>Interview - Kristaps Džonsons - <a href="mailto:kristaps@bsd.lv" rel="nofollow">kristaps@bsd.lv</a></h2>

<p>Mandoc, historical man pages, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router#queues" rel="nofollow">Throttling bandwidth with PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/11/08/msg000672.html" rel="nofollow">NetBSD at Kansai Open Forum 2014</a></h3>

<ul>
<li>Japanese NetBSD users invade yet another conference, demonstrating that they <strong>can and will</strong> install NetBSD <em>on everything</em></li>
<li>From a Raspberry Pi to SHARP Netwalkers to various luna68k devices, they had it all</li>
<li>As always, you can find lots of pictures in the trip report
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/11/04/getting-to-know-your-portmgr-lurker-ak/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The lovable &quot;getting to know your portmgr&quot; series makes its triumphant return</li>
<li>This time around, they interview Alex, one of the portmgr lurkers that joined just this month</li>
<li>&quot;How would you describe yourself?&quot; &quot;Too lazy.&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2014/11/08/getting-to-know-your-portmgr-lurker-ehaupt/" rel="nofollow">Another post</a> includes a short interview with Emanuel, another new lurker</li>
<li>We discussed the portmgr lurkers initiative with Steve Wills <a href="http://www.bsdnow.tv/episodes/2014_10_01-the_daemons_apprentice" rel="nofollow">a while back</a>
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/working_arm_multiprocessor_support" rel="nofollow">NetBSD&#39;s ARM port gets SMP</a></h3>

<ul>
<li>The ARM port of NetBSD now has SMP support, allowing more than one CPU to be used</li>
<li>This blog post on the website has a list of supported boards: Banana Pi, Cubieboard 2, Cubietruck, Merrii Hummingbird A31, CUBOX-I and NITROGEN6X</li>
<li>NetBSD&#39;s release team is working on getting these changes into the 7 branch before 7.0 is released</li>
<li>There are also a few nice pictures in the article
***</li>
</ul>

<h3><a href="http://pivotallabs.com/high-performing-mid-range-nas-server-part-2-performance-tuning-iscsi/" rel="nofollow">A high performance mid-range NAS</a></h3>

<ul>
<li>This blog post is about FreeNAS and optimizing iSCSI performance</li>
<li>It talks about using mid-range hardware with FreeNAS and different tunables you can change to affect performance</li>
<li>There are some nice graphs and lots of detail if you&#39;re interested in tweaking some of your own settings</li>
<li>They conclude &quot;there is no optimal configuration; rather, FreeNAS can be configured to suit a particular workload&quot;
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xGCUj8mC" rel="nofollow">Heto writes in</a></li>
<li><a href="http://slexy.org/view/s2SJ8xppDJ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s20Ktl6BMk" rel="nofollow">Tyler writes in</a></li>
<li><a href="http://slexy.org/view/s2AsrxU0ZQ" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s21yn0xLv2" rel="nofollow">Brad writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141379917200003&r=1&w=2" rel="nofollow">Suspicious contributions</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141538800019451&w=2" rel="nofollow">La puissance du fromage</a></li>
<li><a href="https://mail-index.netbsd.org/tech-ports/2002/07/05/0000.html" rel="nofollow">Nothing unusual here</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ve got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week&#39;s news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=273872" rel="nofollow">Updates to FreeBSD&#39;s random(4)</a></h3>

<ul>
<li>FreeBSD&#39;s random device, which presents itself as &quot;/dev/random&quot; to <a href="https://news.ycombinator.com/item?id=8550457" rel="nofollow">users</a>, has gotten a fairly major overhaul in -CURRENT</li>
<li>The CSPRNG (cryptographically secure pseudo-random number generator) algorithm, Yarrow, now has a new alternative called Fortuna</li>
<li>Yarrow is still the default for now, but Fortuna can be used with a kernel option (and will likely be the new default in 11.0-RELEASE)</li>
<li>Pluggable modules can now be written to add more sources of entropy</li>
<li>These changes are expected to make it in 11.0-RELEASE, but there hasn&#39;t been any mention of MFCing them to 10 or 9
***</li>
</ul>

<h3><a href="https://lists.torproject.org/pipermail/tor-relays/2014-November/005661.html" rel="nofollow">OpenBSD Tor relays and network diversity</a></h3>

<ul>
<li>We&#39;ve talked about getting <a href="http://lists.nycbug.org/mailman/listinfo/tor-bsd" rel="nofollow">more BSD-based Tor nodes</a> a few times in previous episodes</li>
<li>The &quot;tor-relays&quot; mailing list has had some recent discussion about increasing diversity in the Tor network, specifically by adding more OpenBSD nodes</li>
<li>With the security features and attention to detail, it makes for an excellent dedicated Tor box</li>
<li>More and more adversaries are attacking Tor nodes, so having something that can withstand that will help the greater network at large</li>
<li>A few users are even saying they&#39;ll <em>convert their Linux nodes</em> to OpenBSD to help out</li>
<li>Check the archive for the full conversation, and maybe <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">run a node yourself</a> on any of the BSDs</li>
<li>The Tor wiki page on OpenBSD is pretty <a href="https://lists.torproject.org/pipermail/tor-dev/2014-November/007715.html" rel="nofollow">out of date</a> (nine years old!?) and uses the old pf syntax, maybe one of our listeners can modernize it
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096344.html" rel="nofollow">SSP now default for FreeBSD ports</a></h3>

<ul>
<li>SSP, or <a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" rel="nofollow">Stack Smashing Protection</a>, is an additional layer of protection against buffer overflows that the compiler can give to the binaries it produces</li>
<li>It&#39;s now enabled by default in FreeBSD&#39;s ports tree, and the pkgng packages will have it as well - but only for amd64 (all supported releases) and i386 (10.0-RELEASE or newer)</li>
<li>This will only apply to regular ports and binary packages, not the quarterly branch that only receives security updates</li>
<li>If you were using the temporary &quot;new Xorg&quot; or SSP package repositories instead of the default ones, you need to switch back over</li>
<li>NetBSD made this the default on i386 and amd64 <a href="https://www.netbsd.org/releases/formal-6/NetBSD-6.0.html" rel="nofollow">two years ago</a> and OpenBSD made this the default on all architectures <a href="https://www.marc.info/?l=openbsd-cvs&m=103881967909595&w=2" rel="nofollow">twelve years ago</a></li>
<li>Next time you rebuild your ports, things should be automatically hardened without any extra steps or configuration needed
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2ld0yw/building_an_openbsd_firewall_and_router/" rel="nofollow">Building an OpenBSD firewall and router</a></h3>

<ul>
<li>While we&#39;ve discussed the software and configuration of an OpenBSD router, this Reddit thread focuses more on the hardware side</li>
<li>The OP lists some of his potential choices, but was originally looking for something a bit cheaper than a Soekris</li>
<li>Most agree that, if it&#39;s for a business especially, it&#39;s worth the extra money to go with something that&#39;s well known in the BSD community</li>
<li>They also list a few other popular alternatives: ALIX or the APU series from PC Engines, some Supermicro boards, etc.</li>
<li>Through the comments, we also find out that <strong>QuakeCon runs OpenBSD</strong> on their network</li>
<li>Hopefully most of our listeners are running some kind of BSD as their gateway - <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">try it out</a> if you haven&#39;t already
***</li>
</ul>

<h2>Interview - Kristaps Džonsons - <a href="mailto:kristaps@bsd.lv" rel="nofollow">kristaps@bsd.lv</a></h2>

<p>Mandoc, historical man pages, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router#queues" rel="nofollow">Throttling bandwidth with PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/11/08/msg000672.html" rel="nofollow">NetBSD at Kansai Open Forum 2014</a></h3>

<ul>
<li>Japanese NetBSD users invade yet another conference, demonstrating that they <strong>can and will</strong> install NetBSD <em>on everything</em></li>
<li>From a Raspberry Pi to SHARP Netwalkers to various luna68k devices, they had it all</li>
<li>As always, you can find lots of pictures in the trip report
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/11/04/getting-to-know-your-portmgr-lurker-ak/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The lovable &quot;getting to know your portmgr&quot; series makes its triumphant return</li>
<li>This time around, they interview Alex, one of the portmgr lurkers that joined just this month</li>
<li>&quot;How would you describe yourself?&quot; &quot;Too lazy.&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2014/11/08/getting-to-know-your-portmgr-lurker-ehaupt/" rel="nofollow">Another post</a> includes a short interview with Emanuel, another new lurker</li>
<li>We discussed the portmgr lurkers initiative with Steve Wills <a href="http://www.bsdnow.tv/episodes/2014_10_01-the_daemons_apprentice" rel="nofollow">a while back</a>
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/working_arm_multiprocessor_support" rel="nofollow">NetBSD&#39;s ARM port gets SMP</a></h3>

<ul>
<li>The ARM port of NetBSD now has SMP support, allowing more than one CPU to be used</li>
<li>This blog post on the website has a list of supported boards: Banana Pi, Cubieboard 2, Cubietruck, Merrii Hummingbird A31, CUBOX-I and NITROGEN6X</li>
<li>NetBSD&#39;s release team is working on getting these changes into the 7 branch before 7.0 is released</li>
<li>There are also a few nice pictures in the article
***</li>
</ul>

<h3><a href="http://pivotallabs.com/high-performing-mid-range-nas-server-part-2-performance-tuning-iscsi/" rel="nofollow">A high performance mid-range NAS</a></h3>

<ul>
<li>This blog post is about FreeNAS and optimizing iSCSI performance</li>
<li>It talks about using mid-range hardware with FreeNAS and different tunables you can change to affect performance</li>
<li>There are some nice graphs and lots of detail if you&#39;re interested in tweaking some of your own settings</li>
<li>They conclude &quot;there is no optimal configuration; rather, FreeNAS can be configured to suit a particular workload&quot;
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xGCUj8mC" rel="nofollow">Heto writes in</a></li>
<li><a href="http://slexy.org/view/s2SJ8xppDJ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s20Ktl6BMk" rel="nofollow">Tyler writes in</a></li>
<li><a href="http://slexy.org/view/s2AsrxU0ZQ" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s21yn0xLv2" rel="nofollow">Brad writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141379917200003&r=1&w=2" rel="nofollow">Suspicious contributions</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141538800019451&w=2" rel="nofollow">La puissance du fromage</a></li>
<li><a href="https://mail-index.netbsd.org/tech-ports/2002/07/05/0000.html" rel="nofollow">Nothing unusual here</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
