<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 12 Mar 2026 20:21:36 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Router”</title>
    <link>https://www.bsdnow.tv/tags/router</link>
    <pubDate>Thu, 23 Oct 2025 09:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>634: Why Self-Host?</title>
  <link>https://www.bsdnow.tv/634</link>
  <guid isPermaLink="false">32188a5f-bff5-4a8f-97bd-b1c19705b7a9</guid>
  <pubDate>Thu, 23 Oct 2025 09:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/32188a5f-bff5-4a8f-97bd-b1c19705b7a9.mp3" length="59177472" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Why Self-host?, Advanced ZFS Dataset Management, Building a Simple Router with OpenBSD, Minimal pkgbase jails / chroots, WSL-For-FreeBSD, Yubico yubikey 5 nfc on FreeBSD, The Q3 2025 Issue of the FreeBSD Journal, and more</itunes:subtitle>
  <itunes:duration>1:01:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Why Self-host?, Advanced ZFS Dataset Management, Building a Simple Router with OpenBSD, Minimal pkgbase jails / chroots, WSL-For-FreeBSD, Yubico yubikey 5 nfc on FreeBSD, The Q3 2025 Issue of the FreeBSD Journal, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
Why Self-host? (https://romanzipp.com/blog/why-a-homelab-why-self-host)
Advanced ZFS Dataset Management: Snapshots, Clones, and Bookmarks (https://klarasystems.com/articles/advanced-zfs-dataset-management/)
News Roundup
Building a Simple Router with OpenBSD (https://btxx.org/posts/openbsd-router/)
Minimal pkgbase jails / chroots (https://forums.FreeBSD.org/threads/minimal-pkgbase-jails-chroots-docker-oci-like.99512/)
WSL-For-FreeBSD (https://github.com/BalajeS/WSL-For-FreeBSD)
Yubico yubikey 5 nfc on FreeBSD (https://forums.freebsd.org/threads/yubico-yubikey-5-nfc-on-freebsd.99529)
The Q3 2025 Issue of the FreeBSD Journal is Now Available (https://freebsdfoundation.org/blog/the-q3-2025-issue-of-the-freebsd-journal-is-now-available/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, self hosting, hosting, advanced, dataset management, simple router, router, pkgbase, minimal, chroot, WSL, yubico, yubikey 5, FreeBSD Journal</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Why Self-host?, Advanced ZFS Dataset Management, Building a Simple Router with OpenBSD, Minimal pkgbase jails / chroots, WSL-For-FreeBSD, Yubico yubikey 5 nfc on FreeBSD, The Q3 2025 Issue of the FreeBSD Journal, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://romanzipp.com/blog/why-a-homelab-why-self-host" rel="nofollow">Why Self-host?</a></p>

<hr>

<p><a href="https://klarasystems.com/articles/advanced-zfs-dataset-management/" rel="nofollow">Advanced ZFS Dataset Management: Snapshots, Clones, and Bookmarks</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://btxx.org/posts/openbsd-router/" rel="nofollow">Building a Simple Router with OpenBSD</a></p>

<hr>

<p><a href="https://forums.FreeBSD.org/threads/minimal-pkgbase-jails-chroots-docker-oci-like.99512/" rel="nofollow">Minimal pkgbase jails / chroots</a></p>

<hr>

<p><a href="https://github.com/BalajeS/WSL-For-FreeBSD" rel="nofollow">WSL-For-FreeBSD</a></p>

<hr>

<p><a href="https://forums.freebsd.org/threads/yubico-yubikey-5-nfc-on-freebsd.99529" rel="nofollow">Yubico yubikey 5 nfc on FreeBSD</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/the-q3-2025-issue-of-the-freebsd-journal-is-now-available/" rel="nofollow">The Q3 2025 Issue of the FreeBSD Journal is Now Available</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Why Self-host?, Advanced ZFS Dataset Management, Building a Simple Router with OpenBSD, Minimal pkgbase jails / chroots, WSL-For-FreeBSD, Yubico yubikey 5 nfc on FreeBSD, The Q3 2025 Issue of the FreeBSD Journal, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://romanzipp.com/blog/why-a-homelab-why-self-host" rel="nofollow">Why Self-host?</a></p>

<hr>

<p><a href="https://klarasystems.com/articles/advanced-zfs-dataset-management/" rel="nofollow">Advanced ZFS Dataset Management: Snapshots, Clones, and Bookmarks</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://btxx.org/posts/openbsd-router/" rel="nofollow">Building a Simple Router with OpenBSD</a></p>

<hr>

<p><a href="https://forums.FreeBSD.org/threads/minimal-pkgbase-jails-chroots-docker-oci-like.99512/" rel="nofollow">Minimal pkgbase jails / chroots</a></p>

<hr>

<p><a href="https://github.com/BalajeS/WSL-For-FreeBSD" rel="nofollow">WSL-For-FreeBSD</a></p>

<hr>

<p><a href="https://forums.freebsd.org/threads/yubico-yubikey-5-nfc-on-freebsd.99529" rel="nofollow">Yubico yubikey 5 nfc on FreeBSD</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/the-q3-2025-issue-of-the-freebsd-journal-is-now-available/" rel="nofollow">The Q3 2025 Issue of the FreeBSD Journal is Now Available</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>632: Zipbomb defeated</title>
  <link>https://www.bsdnow.tv/632</link>
  <guid isPermaLink="false">4d8e2a9b-ebf7-4dcc-bbda-93121e1ab789</guid>
  <pubDate>Thu, 09 Oct 2025 09:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4d8e2a9b-ebf7-4dcc-bbda-93121e1ab789.mp3" length="50827776" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>zipbomb defeated, Optimizing ZFS for High-Throughput Storage Workloads, Open Source is one person, Omada SDN Controller on FreeBSD, Building a Simple Router with OpenBSD, Back to the origins, Enhancing Support for NAT64 Protocol Translation in NetBSD, and more</itunes:subtitle>
  <itunes:duration>52:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>zipbomb defeated, Optimizing ZFS for High-Throughput Storage Workloads, Open Source is one person, Omada SDN Controller on FreeBSD, Building a Simple Router with OpenBSD, Back to the origins, Enhancing Support for NAT64 Protocol Translation in NetBSD, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
zipbomb defeated (https://www.reddit.com/r/openzfs/comments/1niu6h7/when_a_decompression_zip_bomb_meets_zfs_19_pb/)
Optimizing ZFS for High-Throughput Storage Workloads (https://klarasystems.com/articles/optimizing-zfs-for-high-throughput-storage-workloads?utm_source=BSD%20Now&amp;amp;utm_medium=Podcast)
News Roundup
Open Source is one person (https://opensourcesecurity.io/2025/08-oss-one-person)
Omada SDN Controller on FreeBSD (https://blog.feld.me/posts/2025/08/omada-on-freebsd)
Back to the origins (https://failsafe.monster/posts/another-world/)
Google Summer of Code 2025 Reports: Enhancing Support for NAT64 Protocol Translation in NetBSD (http://blog.netbsd.org/tnf/entry/gsoc2025_nat64_protocol_translation)
Undeadly Bits
j2k25 - OpenBSD Hackathon Japan 2025 (http://undeadly.org/cgi?action=article;sid=20250601104254)
OpenSSH will now adapt IP QoS to actual sessions and traffic (http://undeadly.org/cgi?action=article;sid=20250818113047)
Preliminary support for Raspberry Pi 5 (https://undeadly.org/cgi?action=article;sid=20250903064251)
OpenBSD enters 7.8-beta (https://undeadly.org/cgi?action=article;sid=20250911045955)
Full BSDCan 2025 video playlist(s) available (https://undeadly.org/cgi?action=article;sid=20250912124932)
OpenBGPD 8.9 released (https://undeadly.org/cgi?action=article;sid=20250926141610)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Brad - a few things (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/632/feedback/Brad%20-%20a%20few%20things.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, zipbomb, optimizing, High-Throughput, Workload, open person, Omada, sdn, software defined network, router, origins, enhancing support, nat64,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>zipbomb defeated, Optimizing ZFS for High-Throughput Storage Workloads, Open Source is one person, Omada SDN Controller on FreeBSD, Building a Simple Router with OpenBSD, Back to the origins, Enhancing Support for NAT64 Protocol Translation in NetBSD, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.reddit.com/r/openzfs/comments/1niu6h7/when_a_decompression_zip_bomb_meets_zfs_19_pb/" rel="nofollow">zipbomb defeated</a></p>

<hr>

<p><a href="https://klarasystems.com/articles/optimizing-zfs-for-high-throughput-storage-workloads?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">Optimizing ZFS for High-Throughput Storage Workloads</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://opensourcesecurity.io/2025/08-oss-one-person" rel="nofollow">Open Source is one person</a></p>

<hr>

<p><a href="https://blog.feld.me/posts/2025/08/omada-on-freebsd" rel="nofollow">Omada SDN Controller on FreeBSD</a></p>

<hr>

<p><a href="https://failsafe.monster/posts/another-world/" rel="nofollow">Back to the origins</a></p>

<hr>

<p><a href="http://blog.netbsd.org/tnf/entry/gsoc2025_nat64_protocol_translation" rel="nofollow">Google Summer of Code 2025 Reports: Enhancing Support for NAT64 Protocol Translation in NetBSD</a></p>

<hr>

<h2>Undeadly Bits</h2>

<ul>
<li><a href="http://undeadly.org/cgi?action=article;sid=20250601104254" rel="nofollow">j2k25 - OpenBSD Hackathon Japan 2025</a></li>
<li><a href="http://undeadly.org/cgi?action=article;sid=20250818113047" rel="nofollow">OpenSSH will now adapt IP QoS to actual sessions and traffic</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20250903064251" rel="nofollow">Preliminary support for Raspberry Pi 5</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20250911045955" rel="nofollow">OpenBSD enters 7.8-beta</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20250912124932" rel="nofollow">Full BSDCan 2025 video playlist(s) available</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20250926141610" rel="nofollow">OpenBGPD 8.9 released</a></li>
</ul>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/632/feedback/Brad%20-%20a%20few%20things.md" rel="nofollow">Brad - a few things</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>zipbomb defeated, Optimizing ZFS for High-Throughput Storage Workloads, Open Source is one person, Omada SDN Controller on FreeBSD, Building a Simple Router with OpenBSD, Back to the origins, Enhancing Support for NAT64 Protocol Translation in NetBSD, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.reddit.com/r/openzfs/comments/1niu6h7/when_a_decompression_zip_bomb_meets_zfs_19_pb/" rel="nofollow">zipbomb defeated</a></p>

<hr>

<p><a href="https://klarasystems.com/articles/optimizing-zfs-for-high-throughput-storage-workloads?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">Optimizing ZFS for High-Throughput Storage Workloads</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://opensourcesecurity.io/2025/08-oss-one-person" rel="nofollow">Open Source is one person</a></p>

<hr>

<p><a href="https://blog.feld.me/posts/2025/08/omada-on-freebsd" rel="nofollow">Omada SDN Controller on FreeBSD</a></p>

<hr>

<p><a href="https://failsafe.monster/posts/another-world/" rel="nofollow">Back to the origins</a></p>

<hr>

<p><a href="http://blog.netbsd.org/tnf/entry/gsoc2025_nat64_protocol_translation" rel="nofollow">Google Summer of Code 2025 Reports: Enhancing Support for NAT64 Protocol Translation in NetBSD</a></p>

<hr>

<h2>Undeadly Bits</h2>

<ul>
<li><a href="http://undeadly.org/cgi?action=article;sid=20250601104254" rel="nofollow">j2k25 - OpenBSD Hackathon Japan 2025</a></li>
<li><a href="http://undeadly.org/cgi?action=article;sid=20250818113047" rel="nofollow">OpenSSH will now adapt IP QoS to actual sessions and traffic</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20250903064251" rel="nofollow">Preliminary support for Raspberry Pi 5</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20250911045955" rel="nofollow">OpenBSD enters 7.8-beta</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20250912124932" rel="nofollow">Full BSDCan 2025 video playlist(s) available</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20250926141610" rel="nofollow">OpenBGPD 8.9 released</a></li>
</ul>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/632/feedback/Brad%20-%20a%20few%20things.md" rel="nofollow">Brad - a few things</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>420: OpenBSD makes life better</title>
  <link>https://www.bsdnow.tv/420</link>
  <guid isPermaLink="false">8b8bd7d2-7ac2-4c6b-a33f-fcc39e355be5</guid>
  <pubDate>Thu, 16 Sep 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8b8bd7d2-7ac2-4c6b-a33f-fcc39e355be5.mp3" length="32538960" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Choosing The Right ZFS Pool Layout, changes in OpenBSD that make life better, GhostBSD 21.09.06 ISO's now available, Fair Internet bandwidth management with OpenBSD, NetBSD wifi router project update, NetBSD on the Apple M1, HardenedBSD August Status Report, FreeBSD Journal on Wireless and Desktop, and more.
</itunes:subtitle>
  <itunes:duration>49:18</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Choosing The Right ZFS Pool Layout, changes in OpenBSD that make life better, GhostBSD 21.09.06 ISO's now available, Fair Internet bandwidth management with OpenBSD, NetBSD wifi router project update, NetBSD on the Apple M1, HardenedBSD August Status Report, FreeBSD Journal on Wireless and Desktop, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
Choosing The Right ZFS Pool Layout (https://klarasystems.com/articles/choosing-the-right-zfs-pool-layout/)
Recent and not so recent changes in OpenBSD that make life better (and may turn up elsewhere too) (https://bsdly.blogspot.com/2021/08/recent-and-not-so-recent-changes-in.html)
News Roundup
GhostBSD 21.09.06 ISO's now available (https://www.ghostbsd.org/ghostbsd_21.09.06_iso_now_available)
Fair Internet bandwidth management on a network using OpenBSD (https://dataswamp.org/~solene/2021-08-30-openbsd-qos-lan.html)
NetBSD wifi router project update (https://blog.netbsd.org/tnf/entry/wifi_project_status_update)
Bonus NetBSD Recent Developments: NetBSD on the Apple M1 (https://mobile.twitter.com/jmcwhatever/status/1431575270436319235)
***
### HardenedBSD August 2021 Status Report (https://hardenedbsd.org/article/shawn-webb/2021-08-31/hardenedbsd-august-2021-status-report)
### FreeBSD Journal July/August 2021: Desktop/Wireless (https://freebsdfoundation.org/past-issues/desktop-wireless/)
***
### Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
James - backup question (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/James%20-%20backup%20question.md)
Jonathon - certifications (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Jonathon%20-%20certifications.md)
Marty - RPG CLI (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Marty%20-%20RPG%20CLI.md)
*** 
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, pool layout, changes, improvements, ghostbsd, internet, bandwidth management, wifi, router, router project, Apple M1, arm64, wireless, desktop</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Choosing The Right ZFS Pool Layout, changes in OpenBSD that make life better, GhostBSD 21.09.06 ISO&#39;s now available, Fair Internet bandwidth management with OpenBSD, NetBSD wifi router project update, NetBSD on the Apple M1, HardenedBSD August Status Report, FreeBSD Journal on Wireless and Desktop, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/choosing-the-right-zfs-pool-layout/" rel="nofollow">Choosing The Right ZFS Pool Layout</a></h3>

<hr>

<h3><a href="https://bsdly.blogspot.com/2021/08/recent-and-not-so-recent-changes-in.html" rel="nofollow">Recent and not so recent changes in OpenBSD that make life better (and may turn up elsewhere too)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.ghostbsd.org/ghostbsd_21.09.06_iso_now_available" rel="nofollow">GhostBSD 21.09.06 ISO&#39;s now available</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-08-30-openbsd-qos-lan.html" rel="nofollow">Fair Internet bandwidth management on a network using OpenBSD</a></h3>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/wifi_project_status_update" rel="nofollow">NetBSD wifi router project update</a></h3>

<ul>
<li>Bonus NetBSD Recent Developments: <a href="https://mobile.twitter.com/jmcwhatever/status/1431575270436319235" rel="nofollow">NetBSD on the Apple M1</a>
***
### <a href="https://hardenedbsd.org/article/shawn-webb/2021-08-31/hardenedbsd-august-2021-status-report" rel="nofollow">HardenedBSD August 2021 Status Report</a>
### <a href="https://freebsdfoundation.org/past-issues/desktop-wireless/" rel="nofollow">FreeBSD Journal July/August 2021: Desktop/Wireless</a>
***
### Tarsnap</li>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/James%20-%20backup%20question.md" rel="nofollow">James - backup question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Jonathon%20-%20certifications.md" rel="nofollow">Jonathon - certifications</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Marty%20-%20RPG%20CLI.md" rel="nofollow">Marty - RPG CLI</a>
*** </li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Choosing The Right ZFS Pool Layout, changes in OpenBSD that make life better, GhostBSD 21.09.06 ISO&#39;s now available, Fair Internet bandwidth management with OpenBSD, NetBSD wifi router project update, NetBSD on the Apple M1, HardenedBSD August Status Report, FreeBSD Journal on Wireless and Desktop, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/choosing-the-right-zfs-pool-layout/" rel="nofollow">Choosing The Right ZFS Pool Layout</a></h3>

<hr>

<h3><a href="https://bsdly.blogspot.com/2021/08/recent-and-not-so-recent-changes-in.html" rel="nofollow">Recent and not so recent changes in OpenBSD that make life better (and may turn up elsewhere too)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.ghostbsd.org/ghostbsd_21.09.06_iso_now_available" rel="nofollow">GhostBSD 21.09.06 ISO&#39;s now available</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2021-08-30-openbsd-qos-lan.html" rel="nofollow">Fair Internet bandwidth management on a network using OpenBSD</a></h3>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/wifi_project_status_update" rel="nofollow">NetBSD wifi router project update</a></h3>

<ul>
<li>Bonus NetBSD Recent Developments: <a href="https://mobile.twitter.com/jmcwhatever/status/1431575270436319235" rel="nofollow">NetBSD on the Apple M1</a>
***
### <a href="https://hardenedbsd.org/article/shawn-webb/2021-08-31/hardenedbsd-august-2021-status-report" rel="nofollow">HardenedBSD August 2021 Status Report</a>
### <a href="https://freebsdfoundation.org/past-issues/desktop-wireless/" rel="nofollow">FreeBSD Journal July/August 2021: Desktop/Wireless</a>
***
### Tarsnap</li>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/James%20-%20backup%20question.md" rel="nofollow">James - backup question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Jonathon%20-%20certifications.md" rel="nofollow">Jonathon - certifications</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/420/feedback/Marty%20-%20RPG%20CLI.md" rel="nofollow">Marty - RPG CLI</a>
*** </li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>336: Archived Knowledge</title>
  <link>https://www.bsdnow.tv/336</link>
  <guid isPermaLink="false">3f404c97-d972-4734-9152-420ea4263317</guid>
  <pubDate>Thu, 06 Feb 2020 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/3f404c97-d972-4734-9152-420ea4263317.mp3" length="41728650" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Linux couldn’t duplicate OpenBSD, FreeBSD Q4 status report, OPNsense 19.7.9 released, archives retain and pass on knowledge, HardenedBSD Tor Onion Service v3 Nodes, and more.</itunes:subtitle>
  <itunes:duration>57:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Linux couldn’t duplicate OpenBSD, FreeBSD Q4 status report, OPNsense 19.7.9 released, archives retain and pass on knowledge, HardenedBSD Tor Onion Service v3 Nodes, and more.
Headlines
OpenBSD has to be a BSD Unix and you couldn't duplicate it with Linux (https://utcc.utoronto.ca/~cks/space/blog/unix/OpenBSDMustBeABSD?showcomments)
OpenBSD has a well deserved reputation for putting security and a clean system (for code, documentation, and so on) first, and everything else second. OpenBSD is of course based on BSD (it's right there in the name) and descends from FreeBSD NetBSD (you can read the history here). But one of the questions you could ask about it is whether it had to be that way, and in particular if you could build something like OpenBSD on top of Linux. I believe that the answer is no.
Linux and the *BSDs have a significantly different model of what they are. BSDs have a 'base system' that provides an integrated and fully operational core Unix, covering the kernel, C library and compiler, and the normal Unix user level programs, all maintained and distributed by the particular BSD. Linux is not a single unit this way, and instead all of the component parts are maintained separately and assembled in various ways by various Linux distributions. Both approaches have their advantages, but one big one for the BSD approach is that it enables global changes.
Making global changes is an important part of what makes OpenBSD's approach to improving security, code maintenance, and so on work. Because it directly maintains everything as a unit, OpenBSD is in a position to introduce new C library or kernel APIs (or change them) and then immediately update all sorts of things in user level programs to use the new API. This takes a certain amount of work, of course, but it's possible to do it at all. And because OpenBSD can do this sort of ambitious global change, it does.
This goes further than just the ability to make global changes, because in theory you can patch in global changes on top of a bunch of separate upstream projects. Because OpenBSD is in control of its entire base system, it's not forced to try to reconcile different development priorities or integrate clashing changes. OpenBSD can decide (and has) that only certain sorts of changes will be accepted into its system at all, no matter what people want. If there are features or entire programs that don't fit into what OpenBSD will accept, they just lose out.
FreeBSD Quarterly Status Report 2019Q4 (https://lists.freebsd.org/pipermail/freebsd-announce/2020-January/001923.html)
Here is the last quarterly status report for 2019. As you might remember from last report, we changed our timeline: now we collect reports the last month of each quarter and we edit and publish the full document the next month. Thus, we cover here the period October 2019 - December 2019.
If you thought that the FreeBSD community was less active in the Christmas' quarter you will be glad to be proven wrong: a quick glance at the summary will be sufficient to see that much work has been done in the last months.
Have a nice read!
News Roundup
OPNsense 19.7.9 released (https://opnsense.org/opnsense-19-7-9-released/)
As 20.1 nears we will be making adjustments to the scope of the release with an announcement following shortly.
For now, this update brings you a GeoIP database configuration page for aliases which is now required due to upstream database policy changes and a number of prominent third-party software updates we are happy to see included.
Archives are important to retain and pass on knowledge (https://dan.langille.org/2020/01/07/archives-are-important-to-retain-and-pass-on-knowledge/)
Archives are important. When they are public and available for searching, it retains and passes on knowledge. It saves vast amounts of time.
HardenedBSD Tor Onion Service v3 Nodes (https://hardenedbsd.org/article/shawn-webb/2020-01-30/hardenedbsd-tor-onion-service-v3-nodes)
I've been working today on deploying Tor Onion Service v3 nodes across our build infrastructure. I'm happy to announce that the public portion of this is now completed. Below you will find various onion service hostnames and their match to our infrastructure.
hardenedbsd.org: lkiw4tmbudbr43hbyhm636sarn73vuow77czzohdbqdpjuq3vdzvenyd.onion
ci-01.nyi.hardenedbsd.org: qspcqclhifj3tcpojsbwoxgwanlo2wakti2ia4wozxjcldkxmw2yj3yd.onion
ci-03.md.hardenedbsd.org: eqvnohly4tjrkpwatdhgptftabpesofirnhz5kq7jzn4zd6ernpvnpqd.onion
ci-04.md.hardenedbsd.org: rfqabq2w65nhdkukeqwf27r7h5xfh53h3uns6n74feeyl7s5fbjxczqd.onion
git-01.md.hardenedbsd.org: dacxzjk3kq5mmepbdd3ai2ifynlzxsnpl2cnkfhridqfywihrfftapid.onion
Beastie Bits
The Missing Semester of Your CS Education (MIT Course) (https://missing.csail.mit.edu/)
An old Unix Ad (https://i.redd.it/503390rf7md41.png)
OpenBSD syscall call-from verification (https://marc.info/?l=openbsd-tech&amp;amp;m=157488907117170&amp;amp;w=2)
OpenBSD/arm64 on Pinebook (https://twitter.com/bluerise/status/1220963106563579909)
Reminder: First Southern Ontario BSD user group meeting, February 11th (this coming Tuesday!) 18:30 at Boston Pizza on Upper James st, Hamilton. (http://studybsd.com/)
NYCBUG: March meeting will feature Dr. Paul Vixie and his new talk “Operating Systems as Dumb Pipes” (https://www.nycbug.org/)
8th Meetup of the Stockholm BUG: March 3 at 18:00 (https://www.meetup.com/de-DE/BSD-Users-Stockholm/events/267873938/)
Polish BSD User Group meets on Feb 11, 2020 at 18:15 (https://bsd-pl.org/en)
Feedback/Questions
Sean - ZFS and Creation Dates (http://dpaste.com/3W5WBV0#wrap)
Christopher - Help on ZFS Disaster Recovery (http://dpaste.com/3SE43PW)
Mike - Encrypted ZFS Send (http://dpaste.com/00J5JZG#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, status, status report, opnsense, firewall, router, archives, knowledge, tor, tor onion service node</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Linux couldn’t duplicate OpenBSD, FreeBSD Q4 status report, OPNsense 19.7.9 released, archives retain and pass on knowledge, HardenedBSD Tor Onion Service v3 Nodes, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/OpenBSDMustBeABSD?showcomments" rel="nofollow">OpenBSD has to be a BSD Unix and you couldn&#39;t duplicate it with Linux</a></h3>

<blockquote>
<p>OpenBSD has a well deserved reputation for putting security and a clean system (for code, documentation, and so on) first, and everything else second. OpenBSD is of course based on BSD (it&#39;s right there in the name) and descends from FreeBSD NetBSD (you can read the history here). But one of the questions you could ask about it is whether it had to be that way, and in particular if you could build something like OpenBSD on top of Linux. I believe that the answer is no.</p>

<p>Linux and the *BSDs have a significantly different model of what they are. BSDs have a &#39;base system&#39; that provides an integrated and fully operational core Unix, covering the kernel, C library and compiler, and the normal Unix user level programs, all maintained and distributed by the particular BSD. Linux is not a single unit this way, and instead all of the component parts are maintained separately and assembled in various ways by various Linux distributions. Both approaches have their advantages, but one big one for the BSD approach is that it enables global changes.</p>

<p>Making global changes is an important part of what makes OpenBSD&#39;s approach to improving security, code maintenance, and so on work. Because it directly maintains everything as a unit, OpenBSD is in a position to introduce new C library or kernel APIs (or change them) and then immediately update all sorts of things in user level programs to use the new API. This takes a certain amount of work, of course, but it&#39;s possible to do it at all. And because OpenBSD can do this sort of ambitious global change, it does.</p>

<p>This goes further than just the ability to make global changes, because in theory you can patch in global changes on top of a bunch of separate upstream projects. Because OpenBSD is in control of its entire base system, it&#39;s not forced to try to reconcile different development priorities or integrate clashing changes. OpenBSD can decide (and has) that only certain sorts of changes will be accepted into its system at all, no matter what people want. If there are features or entire programs that don&#39;t fit into what OpenBSD will accept, they just lose out.</p>
</blockquote>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-January/001923.html" rel="nofollow">FreeBSD Quarterly Status Report 2019Q4</a></h3>

<blockquote>
<p>Here is the last quarterly status report for 2019. As you might remember from last report, we changed our timeline: now we collect reports the last month of each quarter and we edit and publish the full document the next month. Thus, we cover here the period October 2019 - December 2019.</p>

<p>If you thought that the FreeBSD community was less active in the Christmas&#39; quarter you will be glad to be proven wrong: a quick glance at the summary will be sufficient to see that much work has been done in the last months.</p>

<p>Have a nice read!</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://opnsense.org/opnsense-19-7-9-released/" rel="nofollow">OPNsense 19.7.9 released</a></h3>

<blockquote>
<p>As 20.1 nears we will be making adjustments to the scope of the release with an announcement following shortly.</p>

<p>For now, this update brings you a GeoIP database configuration page for aliases which is now required due to upstream database policy changes and a number of prominent third-party software updates we are happy to see included.</p>
</blockquote>

<hr>

<h3><a href="https://dan.langille.org/2020/01/07/archives-are-important-to-retain-and-pass-on-knowledge/" rel="nofollow">Archives are important to retain and pass on knowledge</a></h3>

<blockquote>
<p>Archives are important. When they are public and available for searching, it retains and passes on knowledge. It saves vast amounts of time.</p>
</blockquote>

<hr>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2020-01-30/hardenedbsd-tor-onion-service-v3-nodes" rel="nofollow">HardenedBSD Tor Onion Service v3 Nodes</a></h3>

<blockquote>
<p>I&#39;ve been working today on deploying Tor Onion Service v3 nodes across our build infrastructure. I&#39;m happy to announce that the public portion of this is now completed. Below you will find various onion service hostnames and their match to our infrastructure.</p>
</blockquote>

<ul>
<li>hardenedbsd.org: lkiw4tmbudbr43hbyhm636sarn73vuow77czzohdbqdpjuq3vdzvenyd.onion</li>
<li>ci-01.nyi.hardenedbsd.org: qspcqclhifj3tcpojsbwoxgwanlo2wakti2ia4wozxjcldkxmw2yj3yd.onion</li>
<li>ci-03.md.hardenedbsd.org: eqvnohly4tjrkpwatdhgptftabpesofirnhz5kq7jzn4zd6ernpvnpqd.onion</li>
<li>ci-04.md.hardenedbsd.org: rfqabq2w65nhdkukeqwf27r7h5xfh53h3uns6n74feeyl7s5fbjxczqd.onion</li>
<li>git-01.md.hardenedbsd.org: dacxzjk3kq5mmepbdd3ai2ifynlzxsnpl2cnkfhridqfywihrfftapid.onion</li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://missing.csail.mit.edu/" rel="nofollow">The Missing Semester of Your CS Education (MIT Course)</a></li>
<li><a href="https://i.redd.it/503390rf7md41.png" rel="nofollow">An old Unix Ad</a></li>
<li><a href="https://marc.info/?l=openbsd-tech&m=157488907117170&w=2" rel="nofollow">OpenBSD syscall call-from verification</a></li>
<li><a href="https://twitter.com/bluerise/status/1220963106563579909" rel="nofollow">OpenBSD/arm64 on Pinebook</a></li>
<li><a href="http://studybsd.com/" rel="nofollow">Reminder: First Southern Ontario BSD user group meeting, February 11th (this coming Tuesday!) 18:30 at Boston Pizza on Upper James st, Hamilton.</a></li>
<li><a href="https://www.nycbug.org/" rel="nofollow">NYCBUG: March meeting will feature Dr. Paul Vixie and his new talk “Operating Systems as Dumb Pipes”</a></li>
<li><a href="https://www.meetup.com/de-DE/BSD-Users-Stockholm/events/267873938/" rel="nofollow">8th Meetup of the Stockholm BUG: March 3 at 18:00</a></li>
<li><a href="https://bsd-pl.org/en" rel="nofollow">Polish BSD User Group meets on Feb 11, 2020 at 18:15</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Sean - <a href="http://dpaste.com/3W5WBV0#wrap" rel="nofollow">ZFS and Creation Dates</a></li>
<li>Christopher - <a href="http://dpaste.com/3SE43PW" rel="nofollow">Help on ZFS Disaster Recovery</a></li>
<li>Mike - <a href="http://dpaste.com/00J5JZG#wrap" rel="nofollow">Encrypted ZFS Send</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0336.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Linux couldn’t duplicate OpenBSD, FreeBSD Q4 status report, OPNsense 19.7.9 released, archives retain and pass on knowledge, HardenedBSD Tor Onion Service v3 Nodes, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/OpenBSDMustBeABSD?showcomments" rel="nofollow">OpenBSD has to be a BSD Unix and you couldn&#39;t duplicate it with Linux</a></h3>

<blockquote>
<p>OpenBSD has a well deserved reputation for putting security and a clean system (for code, documentation, and so on) first, and everything else second. OpenBSD is of course based on BSD (it&#39;s right there in the name) and descends from FreeBSD NetBSD (you can read the history here). But one of the questions you could ask about it is whether it had to be that way, and in particular if you could build something like OpenBSD on top of Linux. I believe that the answer is no.</p>

<p>Linux and the *BSDs have a significantly different model of what they are. BSDs have a &#39;base system&#39; that provides an integrated and fully operational core Unix, covering the kernel, C library and compiler, and the normal Unix user level programs, all maintained and distributed by the particular BSD. Linux is not a single unit this way, and instead all of the component parts are maintained separately and assembled in various ways by various Linux distributions. Both approaches have their advantages, but one big one for the BSD approach is that it enables global changes.</p>

<p>Making global changes is an important part of what makes OpenBSD&#39;s approach to improving security, code maintenance, and so on work. Because it directly maintains everything as a unit, OpenBSD is in a position to introduce new C library or kernel APIs (or change them) and then immediately update all sorts of things in user level programs to use the new API. This takes a certain amount of work, of course, but it&#39;s possible to do it at all. And because OpenBSD can do this sort of ambitious global change, it does.</p>

<p>This goes further than just the ability to make global changes, because in theory you can patch in global changes on top of a bunch of separate upstream projects. Because OpenBSD is in control of its entire base system, it&#39;s not forced to try to reconcile different development priorities or integrate clashing changes. OpenBSD can decide (and has) that only certain sorts of changes will be accepted into its system at all, no matter what people want. If there are features or entire programs that don&#39;t fit into what OpenBSD will accept, they just lose out.</p>
</blockquote>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2020-January/001923.html" rel="nofollow">FreeBSD Quarterly Status Report 2019Q4</a></h3>

<blockquote>
<p>Here is the last quarterly status report for 2019. As you might remember from last report, we changed our timeline: now we collect reports the last month of each quarter and we edit and publish the full document the next month. Thus, we cover here the period October 2019 - December 2019.</p>

<p>If you thought that the FreeBSD community was less active in the Christmas&#39; quarter you will be glad to be proven wrong: a quick glance at the summary will be sufficient to see that much work has been done in the last months.</p>

<p>Have a nice read!</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://opnsense.org/opnsense-19-7-9-released/" rel="nofollow">OPNsense 19.7.9 released</a></h3>

<blockquote>
<p>As 20.1 nears we will be making adjustments to the scope of the release with an announcement following shortly.</p>

<p>For now, this update brings you a GeoIP database configuration page for aliases which is now required due to upstream database policy changes and a number of prominent third-party software updates we are happy to see included.</p>
</blockquote>

<hr>

<h3><a href="https://dan.langille.org/2020/01/07/archives-are-important-to-retain-and-pass-on-knowledge/" rel="nofollow">Archives are important to retain and pass on knowledge</a></h3>

<blockquote>
<p>Archives are important. When they are public and available for searching, it retains and passes on knowledge. It saves vast amounts of time.</p>
</blockquote>

<hr>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2020-01-30/hardenedbsd-tor-onion-service-v3-nodes" rel="nofollow">HardenedBSD Tor Onion Service v3 Nodes</a></h3>

<blockquote>
<p>I&#39;ve been working today on deploying Tor Onion Service v3 nodes across our build infrastructure. I&#39;m happy to announce that the public portion of this is now completed. Below you will find various onion service hostnames and their match to our infrastructure.</p>
</blockquote>

<ul>
<li>hardenedbsd.org: lkiw4tmbudbr43hbyhm636sarn73vuow77czzohdbqdpjuq3vdzvenyd.onion</li>
<li>ci-01.nyi.hardenedbsd.org: qspcqclhifj3tcpojsbwoxgwanlo2wakti2ia4wozxjcldkxmw2yj3yd.onion</li>
<li>ci-03.md.hardenedbsd.org: eqvnohly4tjrkpwatdhgptftabpesofirnhz5kq7jzn4zd6ernpvnpqd.onion</li>
<li>ci-04.md.hardenedbsd.org: rfqabq2w65nhdkukeqwf27r7h5xfh53h3uns6n74feeyl7s5fbjxczqd.onion</li>
<li>git-01.md.hardenedbsd.org: dacxzjk3kq5mmepbdd3ai2ifynlzxsnpl2cnkfhridqfywihrfftapid.onion</li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://missing.csail.mit.edu/" rel="nofollow">The Missing Semester of Your CS Education (MIT Course)</a></li>
<li><a href="https://i.redd.it/503390rf7md41.png" rel="nofollow">An old Unix Ad</a></li>
<li><a href="https://marc.info/?l=openbsd-tech&m=157488907117170&w=2" rel="nofollow">OpenBSD syscall call-from verification</a></li>
<li><a href="https://twitter.com/bluerise/status/1220963106563579909" rel="nofollow">OpenBSD/arm64 on Pinebook</a></li>
<li><a href="http://studybsd.com/" rel="nofollow">Reminder: First Southern Ontario BSD user group meeting, February 11th (this coming Tuesday!) 18:30 at Boston Pizza on Upper James st, Hamilton.</a></li>
<li><a href="https://www.nycbug.org/" rel="nofollow">NYCBUG: March meeting will feature Dr. Paul Vixie and his new talk “Operating Systems as Dumb Pipes”</a></li>
<li><a href="https://www.meetup.com/de-DE/BSD-Users-Stockholm/events/267873938/" rel="nofollow">8th Meetup of the Stockholm BUG: March 3 at 18:00</a></li>
<li><a href="https://bsd-pl.org/en" rel="nofollow">Polish BSD User Group meets on Feb 11, 2020 at 18:15</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Sean - <a href="http://dpaste.com/3W5WBV0#wrap" rel="nofollow">ZFS and Creation Dates</a></li>
<li>Christopher - <a href="http://dpaste.com/3SE43PW" rel="nofollow">Help on ZFS Disaster Recovery</a></li>
<li>Mike - <a href="http://dpaste.com/00J5JZG#wrap" rel="nofollow">Encrypted ZFS Send</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0336.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>102: May Contain ZFS</title>
  <link>https://www.bsdnow.tv/102</link>
  <guid isPermaLink="false">e0de53ca-3dcf-4df7-a556-faa52c7788a7</guid>
  <pubDate>Wed, 12 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0de53ca-3dcf-4df7-a556-faa52c7788a7.mp3" length="48985492" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking with Peter Toth. He's got a jail management system called "iocage" that's been getting pretty popular recently. Have we finally found a replacement for ezjail? We'll see how it stacks up.</itunes:subtitle>
  <itunes:duration>1:08:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be talking with Peter Toth. He's got a jail management system called "iocage" that's been getting pretty popular recently. Have we finally found a replacement for ezjail? We'll see how it stacks up.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD on Olimex RT5350F-OLinuXino (https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino)
If you haven't heard of the RT5350F-OLinuXino-EVB, you're not alone (actually, we probably couldn't even remember the name if we did know about it)
It's a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM
This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment
In part two of the series (https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2), he talks about the GPIO and how you can configure it
Part three is still in the works, so check the site later on for further progress and info
***
The modern OpenBSD home router (https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html)
In a new series of blog posts, one guy takes you through the process of building an OpenBSD-based gateway (http://www.bsdnow.tv/tutorials/openbsd-router) for his home network
"It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst"
Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless
This guide also covers PPP and IPv6, in case you have those requirements
In a similar but unrelated series (http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html), another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge
He also has a separate post (http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html) for setting up an IPSEC VPN on the router
***
NetBSD at Open Source Conference 2015 Kansai (https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html)
The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference
They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event
Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k
They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it
And what conference would be complete without an LED-powered towel
***
OpenSSH 7.0 released (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html)
The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code
SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled
The syntax for permitting root logins has been changed, and is now called "prohibit-password" instead of "without-password" (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now
If you're using an older configuration file, the "without-password" option still works, so no change is required
You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications
Various bug fixes and documentation improvements are also included
Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users
In the next release, even more deprecation is planned: RSA keys will be refused if they're under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***
Interview - Peter Toth - peter.toth198@gmail.com (mailto:peter.toth198@gmail.com) / @pannonp (https://twitter.com/pannonp)
Containment with iocage (https://github.com/iocage/iocage)
News Roundup
More c2k15 reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150809105132)
A few more hackathon reports from c2k15 in Calgary are still slowly trickling in
Alexander Bluhm's up first, and he continued improving OpenBSD's regression test suite (this ensures that no changes accidentally break existing things)
He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging
Renato Westphal sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150811171006) of his very first hackathon
He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network
Philip Guenther also wrote in (http://undeadly.org/cgi?action=article&amp;amp;sid=20150809165912), getting some very technical and low-level stuff done at the hackathon
His report opens with "First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking." - not exactly beginner stuff
There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***
FreeBSD jails, the hard way (https://clinta.github.io/freebsd-jails-the-hard-way)
As you learned from our interview this week, there's quite a selection of tools available to manage your jails
This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf
Unlike with iocage, ZFS isn't actually a requirement for this method
If you are using it, though, you can make use of snapshots for making template jails
***
OpenSSH hardware tokens (http://www.tancsa.com/mdtblog/?p=73)
We've talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client and server?
This blog post will show you how to use a hardware token as a second authentication factor, for the "something you know, something you have" security model
It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd
Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***
LibreSSL 2.2.2 released (http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt)
The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes
At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don't want in a crypto tool...) and much more
SSLv3 support was removed from the "openssl" command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it'll be removed completely
Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc
It'll be in 5.8 (due out earlier than usual) and it's in the FreeBSD ports tree as well
***
Feedback/Questions
James writes in (http://slexy.org/view/s216lrsVVd)
Stuart writes in (http://slexy.org/view/s20uGUHWLr)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, jails, iocage, bhyve, containers, lxc, docker, ezjail, router, gateway, ipsec, vpn, libressl, authentication, uefi, jails</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Peter Toth. He&#39;s got a jail management system called &quot;iocage&quot; that&#39;s been getting pretty popular recently. Have we finally found a replacement for ezjail? We&#39;ll see how it stacks up.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" rel="nofollow">FreeBSD on Olimex RT5350F-OLinuXino</a></h3>

<ul>
<li>If you haven&#39;t heard of the RT5350F-OLinuXino-EVB, you&#39;re not alone (actually, we probably couldn&#39;t even remember the name if we did know about it)</li>
<li>It&#39;s a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM</li>
<li>This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment</li>
<li>In <a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" rel="nofollow">part two of the series</a>, he talks about the GPIO and how you can configure it</li>
<li>Part three is still in the works, so check the site later on for further progress and info
***</li>
</ul>

<h3><a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" rel="nofollow">The modern OpenBSD home router</a></h3>

<ul>
<li>In a new series of blog posts, one guy takes you through the process of building an <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD-based gateway</a> for his home network</li>
<li>&quot;It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst&quot;</li>
<li>Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless</li>
<li>This guide also covers PPP and IPv6, in case you have those requirements</li>
<li>In a <a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" rel="nofollow">similar but unrelated series</a>, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge</li>
<li>He also has <a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" rel="nofollow">a separate post</a> for setting up an IPSEC VPN on the router
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" rel="nofollow">NetBSD at Open Source Conference 2015 Kansai</a></h3>

<ul>
<li>The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference</li>
<li>They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event</li>
<li>Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k</li>
<li>They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it</li>
<li>And what conference would be complete without an LED-powered towel
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" rel="nofollow">OpenSSH 7.0 released</a></h3>

<ul>
<li>The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code</li>
<li>SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled</li>
<li>The syntax for permitting root logins has been changed, and is now called &quot;prohibit-password&quot; instead of &quot;without-password&quot; (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now</li>
<li>If you&#39;re using an older configuration file, the &quot;without-password&quot; option still works, so no change is required</li>
<li>You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications</li>
<li>Various bug fixes and documentation improvements are also included</li>
<li>Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users</li>
<li>In the <em>next release</em>, even more deprecation is planned: RSA keys will be refused if they&#39;re under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***</li>
</ul>

<h2>Interview - Peter Toth - <a href="mailto:peter.toth198@gmail.com" rel="nofollow">peter.toth198@gmail.com</a> / <a href="https://twitter.com/pannonp" rel="nofollow">@pannonp</a></h2>

<p>Containment with <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150809105132" rel="nofollow">More c2k15 reports</a></h3>

<ul>
<li>A few more hackathon reports from c2k15 in Calgary are still slowly trickling in</li>
<li>Alexander Bluhm&#39;s up first, and he continued improving OpenBSD&#39;s regression test suite (this ensures that no changes accidentally break existing things)</li>
<li>He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging</li>
<li>Renato Westphal <a href="http://undeadly.org/cgi?action=article&sid=20150811171006" rel="nofollow">sent in a report</a> of his very first hackathon</li>
<li>He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network</li>
<li>Philip Guenther <a href="http://undeadly.org/cgi?action=article&sid=20150809165912" rel="nofollow">also wrote in</a>, getting some very technical and low-level stuff done at the hackathon</li>
<li>His report opens with &quot;First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking.&quot; - not exactly beginner stuff</li>
<li>There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***</li>
</ul>

<h3><a href="https://clinta.github.io/freebsd-jails-the-hard-way" rel="nofollow">FreeBSD jails, the hard way</a></h3>

<ul>
<li>As you learned from our interview this week, there&#39;s quite a selection of tools available to manage your jails</li>
<li>This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf</li>
<li>Unlike with iocage, ZFS isn&#39;t actually a requirement for this method</li>
<li>If you are using it, though, you can make use of snapshots for making template jails
***</li>
</ul>

<h3><a href="http://www.tancsa.com/mdtblog/?p=73" rel="nofollow">OpenSSH hardware tokens</a></h3>

<ul>
<li>We&#39;ve talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client <em>and</em> server?</li>
<li>This blog post will show you how to use a hardware token as a second authentication factor, for the &quot;something you know, something you have&quot; security model</li>
<li>It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd</li>
<li>Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***</li>
</ul>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" rel="nofollow">LibreSSL 2.2.2 released</a></h3>

<ul>
<li>The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes</li>
<li>At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don&#39;t want in a crypto tool...) and much more</li>
<li>SSLv3 support was removed from the &quot;openssl&quot; command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it&#39;ll be removed completely</li>
<li>Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc</li>
<li>It&#39;ll be in 5.8 (due out earlier than usual) and it&#39;s in the FreeBSD ports tree as well
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216lrsVVd" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20uGUHWLr" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Peter Toth. He&#39;s got a jail management system called &quot;iocage&quot; that&#39;s been getting pretty popular recently. Have we finally found a replacement for ezjail? We&#39;ll see how it stacks up.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" rel="nofollow">FreeBSD on Olimex RT5350F-OLinuXino</a></h3>

<ul>
<li>If you haven&#39;t heard of the RT5350F-OLinuXino-EVB, you&#39;re not alone (actually, we probably couldn&#39;t even remember the name if we did know about it)</li>
<li>It&#39;s a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM</li>
<li>This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment</li>
<li>In <a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" rel="nofollow">part two of the series</a>, he talks about the GPIO and how you can configure it</li>
<li>Part three is still in the works, so check the site later on for further progress and info
***</li>
</ul>

<h3><a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" rel="nofollow">The modern OpenBSD home router</a></h3>

<ul>
<li>In a new series of blog posts, one guy takes you through the process of building an <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD-based gateway</a> for his home network</li>
<li>&quot;It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst&quot;</li>
<li>Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless</li>
<li>This guide also covers PPP and IPv6, in case you have those requirements</li>
<li>In a <a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" rel="nofollow">similar but unrelated series</a>, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge</li>
<li>He also has <a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" rel="nofollow">a separate post</a> for setting up an IPSEC VPN on the router
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" rel="nofollow">NetBSD at Open Source Conference 2015 Kansai</a></h3>

<ul>
<li>The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference</li>
<li>They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event</li>
<li>Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k</li>
<li>They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it</li>
<li>And what conference would be complete without an LED-powered towel
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" rel="nofollow">OpenSSH 7.0 released</a></h3>

<ul>
<li>The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code</li>
<li>SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled</li>
<li>The syntax for permitting root logins has been changed, and is now called &quot;prohibit-password&quot; instead of &quot;without-password&quot; (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now</li>
<li>If you&#39;re using an older configuration file, the &quot;without-password&quot; option still works, so no change is required</li>
<li>You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications</li>
<li>Various bug fixes and documentation improvements are also included</li>
<li>Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users</li>
<li>In the <em>next release</em>, even more deprecation is planned: RSA keys will be refused if they&#39;re under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***</li>
</ul>

<h2>Interview - Peter Toth - <a href="mailto:peter.toth198@gmail.com" rel="nofollow">peter.toth198@gmail.com</a> / <a href="https://twitter.com/pannonp" rel="nofollow">@pannonp</a></h2>

<p>Containment with <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150809105132" rel="nofollow">More c2k15 reports</a></h3>

<ul>
<li>A few more hackathon reports from c2k15 in Calgary are still slowly trickling in</li>
<li>Alexander Bluhm&#39;s up first, and he continued improving OpenBSD&#39;s regression test suite (this ensures that no changes accidentally break existing things)</li>
<li>He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging</li>
<li>Renato Westphal <a href="http://undeadly.org/cgi?action=article&sid=20150811171006" rel="nofollow">sent in a report</a> of his very first hackathon</li>
<li>He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network</li>
<li>Philip Guenther <a href="http://undeadly.org/cgi?action=article&sid=20150809165912" rel="nofollow">also wrote in</a>, getting some very technical and low-level stuff done at the hackathon</li>
<li>His report opens with &quot;First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking.&quot; - not exactly beginner stuff</li>
<li>There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***</li>
</ul>

<h3><a href="https://clinta.github.io/freebsd-jails-the-hard-way" rel="nofollow">FreeBSD jails, the hard way</a></h3>

<ul>
<li>As you learned from our interview this week, there&#39;s quite a selection of tools available to manage your jails</li>
<li>This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf</li>
<li>Unlike with iocage, ZFS isn&#39;t actually a requirement for this method</li>
<li>If you are using it, though, you can make use of snapshots for making template jails
***</li>
</ul>

<h3><a href="http://www.tancsa.com/mdtblog/?p=73" rel="nofollow">OpenSSH hardware tokens</a></h3>

<ul>
<li>We&#39;ve talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client <em>and</em> server?</li>
<li>This blog post will show you how to use a hardware token as a second authentication factor, for the &quot;something you know, something you have&quot; security model</li>
<li>It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd</li>
<li>Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***</li>
</ul>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" rel="nofollow">LibreSSL 2.2.2 released</a></h3>

<ul>
<li>The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes</li>
<li>At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don&#39;t want in a crypto tool...) and much more</li>
<li>SSLv3 support was removed from the &quot;openssl&quot; command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it&#39;ll be removed completely</li>
<li>Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc</li>
<li>It&#39;ll be in 5.8 (due out earlier than usual) and it&#39;s in the FreeBSD ports tree as well
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216lrsVVd" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20uGUHWLr" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>97: Big Network, SmallWall</title>
  <link>https://www.bsdnow.tv/97</link>
  <guid isPermaLink="false">8ae01f5e-8be5-4cbc-bb95-094f2d536681</guid>
  <pubDate>Wed, 08 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8ae01f5e-8be5-4cbc-bb95-094f2d536681.mp3" length="56408980" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be chatting with Lee Sharp. He's recently revived the m0n0wall codebase, now known as SmallWall, and we'll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this time on the show, we'll be chatting with Lee Sharp. He's recently revived the m0n0wall codebase, now known as SmallWall, and we'll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
BSDCan and pkgsrcCon videos (https://www.youtube.com/channel/UCAEx6zhR2sD2pAGKezasAjA/videos)
Even more BSDCan 2015 videos are slowly but surely making their way to the internet
Nigel Williams, Multipath TCP for FreeBSD (https://www.youtube.com/watch?v=P3vB_FWtyIs)
Stephen Bourne, Early days of Unix and design of sh (https://www.youtube.com/watch?v=2kEJoWfobpA)
John Criswell, Protecting FreeBSD with Secure Virtual Architecture (https://www.youtube.com/watch?v=hRIC_aF_u24)
Shany Michaely, Expanding RDMA capability over Ethernet in FreeBSD (https://www.youtube.com/watch?v=stsaeKvF3no)
John-Mark Gurney, Adding AES-ICM and AES-GCM to OpenCrypto (https://www.youtube.com/watch?v=JaufZ7yCrLU)
Sevan Janiyan, Adventures in building (https://www.youtube.com/watch?v=-HMXyzybgdM) open source software (https://www.youtube.com/watch?v=Xof-uKnQ6cY)
And finally, the BSDCan 2015 closing (https://www.youtube.com/watch?v=Ynm0bGnYdfY)
Some videos (https://vimeo.com/channels/pkgsrccon/videos) from this year's pkgsrcCon (http://pkgsrc.org/pkgsrcCon/2015/) are also starting to appear online
Sevan Janiyan, A year of pkgsrc 2014 - 2015 (https://vimeo.com/channels/pkgsrccon/132767946)
Pierre Pronchery, pkgsrc meets pkg-ng (https://vimeo.com/channels/pkgsrccon/132766052)
Jonathan Perkin, pkgsrc at Joyent (https://vimeo.com/channels/pkgsrccon/132760863)
Jörg Sonnenberger, pkg_install script framework (https://vimeo.com/channels/pkgsrccon/132757658)
Benny Siegert, New Features in BulkTracker (https://vimeo.com/channels/pkgsrccon/132751897)
This is the first time we've ever seen recordings from the conference - hopefully they continue this trend
***
OPNsense 15.7 released (https://forum.opnsense.org/index.php?topic=839.0)
The OPNsense team has released version 15.7, almost exactly six months after their initial debut (http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach)
In addition to pulling in the latest security fixes from upstream FreeBSD, 15.7 also includes new integration of an intrusion detection system (and new GUI for it) as well as new blacklisting options for the proxy server
Taking a note from upstream PF's playbook, ALTQ traffic shaping support has finally been retired as of this release (it was deprecated from OpenBSD a few years ago, and the code was completely removed (http://undeadly.org/cgi?action=article&amp;amp;sid=20140419151959) just over a year ago)
The LibreSSL flavor has been promoted to production-ready, and users can easily migrate over from OpenSSL via the GUI - switching between the two is simple; no commitment needed
Various third party ports have also been bumped up to their latest versions to keep things fresh, and there's the usual round of bug fixes included
Shortly afterwards, 15.7.1 (https://forum.opnsense.org/index.php?topic=915.0) was released with a few more small fixes
***
NetBSD at Open Source Conference 2015 Okinawa (https://mail-index.netbsd.org/netbsd-advocacy/2015/07/04/msg000688.html)
If you liked last week's episode (http://www.bsdnow.tv/episodes/2015_07_01-lost_technology) then you'll probably know what to expect with this one
The NetBSD users group of Japan hit another open source conference, this time in Okinawa
This time, they had a few interesting NetBSD machines on display that we didn't get to see in the interview last week
We'd love to see something like this in North America or Europe too - anyone up for installing BSD on some interesting devices and showing them off at a Linux con?
***
OpenBSD BGP and VRFs (http://firstyear.id.au/entry/21)
"VRFs (https://en.wikipedia.org/wiki/Virtual_routing_and_forwarding), or in OpenBSD rdomains, are a simple, yet powerful (and sometimes confusing) topic"
This article aims to explain both BGP and rdomains, using network diagrams, for some network isolation goodness
With multiple rdomains, it's also possible to have two upstream internet connections, but lock different groups of your internal network to just one of them
The idea of a "guest network" can greatly benefit from this separation as well, even allowing for the same IP ranges to be used without issues
Combining rdomains with the BGP protocol allows for some very selective and precise blocking/passing of traffic between networks, which is also covered in detail here
The BSDCan talk on rdomains (https://www.youtube.com/watch?v=BizrC8Zr-YY) expands on the subject a bit more if you haven't seen it, as well as a few related (https://www.packetmischief.ca/2011/09/20/virtualizing-the-openbsd-routing-table/) posts (http://cybermashup.com/2013/05/21/complex-routing-with-openbsd/)
***
Interview - Lee Sharp - lee@smallwall.org (mailto:lee@smallwall.org)
SmallWall (http://smallwall.org), a continuation of m0n0wall
News Roundup
Solaris adopts more BSD goodies (https://blogs.oracle.com/solarisfw/entry/pf_for_solaris)
We mentioned a while back that Oracle developers have begun porting a current version of OpenBSD's PF firewall to their next version, even contributing back patches for SMP and other bug fixes
They recently published an article about PF, talking about what's different about it on their platform compared to others - not especially useful for BSD users, but interesting to read if you like firewalls
Darren Moffat, who was part of originally getting an SSH implementation into Solaris, has a second blog post (https://blogs.oracle.com/darren/entry/openssh_in_solaris_11_3) up about their "SunSSH" fork
Going forward, their next version is going to offer a completely vanilla OpenSSH option as well, with the plan being to phase out SunSSH after that
The article talks a bit about the history of getting SSH into the OS, forking the code and also lists some of the differences between the two
In a third blog post (https://blogs.oracle.com/darren/entry/solaris_new_system_calls_getentropy), they talk about a new system call they're borrowing from OpenBSD, getentropy(2) (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2), as well as the addition of arc4random (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man3/arc4random.3) to their libc
With an up-to-date and SMP-capable PF, ZFS with native encryption, jail-like Zones, unaltered OpenSSH and secure entropy calls… is Solaris becoming better than us?
Look forward to the upcoming "Solaris Now" podcast &lt;sub&gt;(not really)&lt;/sub&gt;
***
EuroBSDCon 2015 talks and tutorials (https://2015.eurobsdcon.org/talks/)
This year's EuroBSDCon is set to be held in Sweden at the beginning of October, and the preliminary list of accepted presentations has been published
The list looks pretty well-balanced between the different BSDs, something Paul would be happy to see if he was still with us
It even includes an interesting DragonFly talk and a couple talks from NetBSD developers, in addition to plenty of FreeBSD and OpenBSD of course
There are also a few tutorials (https://2015.eurobsdcon.org/tutorials/) planned for the event, some you've probably seen already and some you haven't
Registration for the event will be opening very soon (likely this week or next)
***
Using ZFS replication to improve offsite backups (https://www.iceflatline.com/2015/07/using-zfs-replication-features-in-freebsd-to-improve-my-offsite-backups/)
If you take backups seriously, you're probably using ZFS and probably keeping an offsite copy of the data
This article covers doing just that, but with a focus on making use of the replication capability
It'll walk you through taking a snapshot of your pool and then replicating it to another remote system, using "zfs send" and SSH - this has the benefit of only transferring the files that have changed since the last time you did it
Steps are also taken to allow a regular user to take and manage snapshots, so you don't need to be root for the SSH transfer
Data integrity is a long process - filesystem-level checksums, resistance to hardware failure, ECC memory, multiple copies in different locations... they all play a role in keeping your files secure; don't skip out on any of them
One thing the author didn't mention in his post: having an offline copy of the data, ideally sealed in a safe place, is also important
***
Block encryption in OpenBSD (http://anadoxin.org/blog/blog/20150705/block-encryption-in-openbsd/)
We've covered (http://www.bsdnow.tv/tutorials/fde) ways to do fully-encrypted installations of OpenBSD (and FreeBSD) before, but that requires dedicating a whole drive or partition to the sensitive data
This blog post takes you through the process of creating encrypted containers in OpenBSD, à la TrueCrypt - that is, a file-backed virtual device with an encrypted filesystem
It goes through creating a file that looks like random data, pointing vnconfig at it, setting up the crypto and finally using it as a fake storage device
The encrypted container method offers the advantage of being a bit more portable across installations than other ways
***
Docker hits FreeBSD ports (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=391421)
The inevitable has happened, and an early FreeBSD port of docker is finally here 
Some details and directions (https://github.com/kvasdopil/docker/blob/freebsd-compat/FREEBSD-PORTING.md) are available to read if you'd like to give it a try, as well as a list of which features work and which don't
There was also some Hacker News discussion (https://news.ycombinator.com/item?id=9840025) on the topic
***
Microsoft donates to OpenSSH (http://undeadly.org/cgi?action=article&amp;amp;sid=20150708134520&amp;amp;mode=flat)
We've talked about big businesses using BSD and contributing back before, even mentioning a few other large public donations - now it's Microsoft's turn
With their recent decision to integrate OpenSSH into an upcoming Windows release, Microsoft has donated a large sum of money to the OpenBSD foundation, making them a gold-level sponsor
They've also posted some contract work offers on the OpenSSH mailing list, and say that their changes will be upstreamed if appropriate - we're always glad to see this
***
Feedback/Questions
Joe writes in (http://slexy.org/view/s2NqbhwOoH)
Mike writes in (http://slexy.org/view/s2T3NEia98)
Randy writes in (http://slexy.org/view/s20RlTK6Ha)
Tony writes in (http://slexy.org/view/s2rjCd0bGX)
Kevin writes in (http://slexy.org/view/s21PfSIyG5)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, smallwall, m0n0wall, opnsense, pfsense, router, mini-itx, apu, alix, soekris, pcengines, edgerouter, lite, encryption, containers, zfs, replication, docker</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Lee Sharp. He&#39;s recently revived the m0n0wall codebase, now known as SmallWall, and we&#39;ll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCAEx6zhR2sD2pAGKezasAjA/videos" rel="nofollow">BSDCan and pkgsrcCon videos</a></h3>

<ul>
<li>Even more BSDCan 2015 videos are slowly but surely making their way to the internet</li>
<li>Nigel Williams, <a href="https://www.youtube.com/watch?v=P3vB_FWtyIs" rel="nofollow">Multipath TCP for FreeBSD</a></li>
<li>Stephen Bourne, <a href="https://www.youtube.com/watch?v=2kEJoWfobpA" rel="nofollow">Early days of Unix and design of sh</a></li>
<li>John Criswell, <a href="https://www.youtube.com/watch?v=hRIC_aF_u24" rel="nofollow">Protecting FreeBSD with Secure Virtual Architecture</a></li>
<li>Shany Michaely, <a href="https://www.youtube.com/watch?v=stsaeKvF3no" rel="nofollow">Expanding RDMA capability over Ethernet in FreeBSD</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=JaufZ7yCrLU" rel="nofollow">Adding AES-ICM and AES-GCM to OpenCrypto</a></li>
<li>Sevan Janiyan, <a href="https://www.youtube.com/watch?v=-HMXyzybgdM" rel="nofollow">Adventures in building</a> <a href="https://www.youtube.com/watch?v=Xof-uKnQ6cY" rel="nofollow">open source software</a></li>
<li>And finally, <a href="https://www.youtube.com/watch?v=Ynm0bGnYdfY" rel="nofollow">the BSDCan 2015 closing</a></li>
<li>Some <a href="https://vimeo.com/channels/pkgsrccon/videos" rel="nofollow">videos</a> from this year&#39;s <a href="http://pkgsrc.org/pkgsrcCon/2015/" rel="nofollow">pkgsrcCon</a> are also starting to appear online</li>
<li>Sevan Janiyan, <a href="https://vimeo.com/channels/pkgsrccon/132767946" rel="nofollow">A year of pkgsrc 2014 - 2015</a></li>
<li>Pierre Pronchery, <a href="https://vimeo.com/channels/pkgsrccon/132766052" rel="nofollow">pkgsrc meets pkg-ng</a></li>
<li>Jonathan Perkin, <a href="https://vimeo.com/channels/pkgsrccon/132760863" rel="nofollow">pkgsrc at Joyent</a></li>
<li>Jörg Sonnenberger, <a href="https://vimeo.com/channels/pkgsrccon/132757658" rel="nofollow">pkg_install script framework</a></li>
<li>Benny Siegert, <a href="https://vimeo.com/channels/pkgsrccon/132751897" rel="nofollow">New Features in BulkTracker</a></li>
<li>This is the first time we&#39;ve ever seen recordings from the conference - hopefully they continue this trend
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=839.0" rel="nofollow">OPNsense 15.7 released</a></h3>

<ul>
<li>The OPNsense team has released version 15.7, almost exactly six months after <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">their initial debut</a></li>
<li>In addition to pulling in the latest security fixes from upstream FreeBSD, 15.7 also includes new integration of an intrusion detection system (and new GUI for it) as well as new blacklisting options for the proxy server</li>
<li>Taking a note from upstream PF&#39;s playbook, ALTQ traffic shaping support has finally been retired as of this release (it was deprecated from OpenBSD a few years ago, and the code was <a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">completely removed</a> just over a year ago)</li>
<li>The LibreSSL flavor has been promoted to production-ready, and users can easily migrate over from OpenSSL via the GUI - switching between the two is simple; no commitment needed</li>
<li>Various third party ports have also been bumped up to their latest versions to keep things fresh, and there&#39;s the usual round of bug fixes included</li>
<li>Shortly afterwards, <a href="https://forum.opnsense.org/index.php?topic=915.0" rel="nofollow">15.7.1</a> was released with a few more small fixes
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/07/04/msg000688.html" rel="nofollow">NetBSD at Open Source Conference 2015 Okinawa</a></h3>

<ul>
<li>If you liked <a href="http://www.bsdnow.tv/episodes/2015_07_01-lost_technology" rel="nofollow">last week&#39;s episode</a> then you&#39;ll probably know what to expect with this one</li>
<li>The NetBSD users group of Japan hit another open source conference, this time in Okinawa</li>
<li>This time, they had a few interesting NetBSD machines on display that we didn&#39;t get to see in the interview last week</li>
<li>We&#39;d love to see something like this in North America or Europe too - anyone up for installing BSD on some interesting devices and showing them off at a Linux con?
***</li>
</ul>

<h3><a href="http://firstyear.id.au/entry/21" rel="nofollow">OpenBSD BGP and VRFs</a></h3>

<ul>
<li>&quot;<a href="https://en.wikipedia.org/wiki/Virtual_routing_and_forwarding" rel="nofollow">VRFs</a>, or in OpenBSD rdomains, are a simple, yet powerful (and sometimes confusing) topic&quot;</li>
<li>This article aims to explain both BGP and rdomains, using network diagrams, for some network isolation goodness</li>
<li>With multiple rdomains, it&#39;s also possible to have two upstream internet connections, but lock different groups of your internal network to just one of them</li>
<li>The idea of a &quot;guest network&quot; can greatly benefit from this separation as well, even allowing for the same IP ranges to be used without issues</li>
<li>Combining rdomains with the BGP protocol allows for some very selective and precise blocking/passing of traffic between networks, which is also covered in detail here</li>
<li>The <a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" rel="nofollow">BSDCan talk on rdomains</a> expands on the subject a bit more if you haven&#39;t seen it, as well as a few <a href="https://www.packetmischief.ca/2011/09/20/virtualizing-the-openbsd-routing-table/" rel="nofollow">related</a> <a href="http://cybermashup.com/2013/05/21/complex-routing-with-openbsd/" rel="nofollow">posts</a>
***</li>
</ul>

<h2>Interview - Lee Sharp - <a href="mailto:lee@smallwall.org" rel="nofollow">lee@smallwall.org</a></h2>

<p><a href="http://smallwall.org" rel="nofollow">SmallWall</a>, a continuation of m0n0wall</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blogs.oracle.com/solarisfw/entry/pf_for_solaris" rel="nofollow">Solaris adopts more BSD goodies</a></h3>

<ul>
<li>We mentioned a while back that Oracle developers have begun porting a current version of OpenBSD&#39;s PF firewall to their next version, even contributing back patches for SMP and other bug fixes</li>
<li>They recently published an article about PF, talking about what&#39;s different about it on their platform compared to others - not especially useful for BSD users, but interesting to read if you like firewalls</li>
<li>Darren Moffat, who was part of originally getting an SSH implementation into Solaris, has a <a href="https://blogs.oracle.com/darren/entry/openssh_in_solaris_11_3" rel="nofollow">second blog post</a> up about their &quot;SunSSH&quot; fork</li>
<li>Going forward, their next version is going to offer a completely vanilla OpenSSH option as well, with the plan being to phase out SunSSH after that</li>
<li>The article talks a bit about the history of getting SSH into the OS, forking the code and also lists some of the differences between the two</li>
<li>In <a href="https://blogs.oracle.com/darren/entry/solaris_new_system_calls_getentropy" rel="nofollow">a third blog post</a>, they talk about a new system call they&#39;re borrowing from OpenBSD, <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2" rel="nofollow">getentropy(2)</a>, as well as the addition of <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man3/arc4random.3" rel="nofollow">arc4random</a> to their libc</li>
<li>With an up-to-date and SMP-capable PF, ZFS with native encryption, jail-like Zones, unaltered OpenSSH and secure entropy calls… is Solaris becoming <em>better than us</em>?</li>
<li>Look forward to the upcoming &quot;Solaris Now&quot; podcast <sub>(not really)</sub>
***</li>
</ul>

<h3><a href="https://2015.eurobsdcon.org/talks/" rel="nofollow">EuroBSDCon 2015 talks and tutorials</a></h3>

<ul>
<li>This year&#39;s EuroBSDCon is set to be held in Sweden at the beginning of October, and the preliminary list of accepted presentations has been published</li>
<li>The list looks pretty well-balanced between the different BSDs, something Paul would be happy to see if he was still with us</li>
<li>It even includes an interesting DragonFly talk and a couple talks from NetBSD developers, in addition to plenty of FreeBSD and OpenBSD of course</li>
<li>There are also <a href="https://2015.eurobsdcon.org/tutorials/" rel="nofollow">a few tutorials</a> planned for the event, some you&#39;ve probably seen already and some you haven&#39;t</li>
<li>Registration for the event will be opening very soon (likely this week or next)
***</li>
</ul>

<h3><a href="https://www.iceflatline.com/2015/07/using-zfs-replication-features-in-freebsd-to-improve-my-offsite-backups/" rel="nofollow">Using ZFS replication to improve offsite backups</a></h3>

<ul>
<li>If you take backups seriously, you&#39;re probably using ZFS and probably keeping an offsite copy of the data</li>
<li>This article covers doing just that, but with a focus on making use of the replication capability</li>
<li>It&#39;ll walk you through taking a snapshot of your pool and then replicating it to another remote system, using &quot;zfs send&quot; and SSH - this has the benefit of only transferring the files that have changed since the last time you did it</li>
<li>Steps are also taken to allow a regular user to take and manage snapshots, so you don&#39;t need to be root for the SSH transfer</li>
<li>Data integrity is a long process - filesystem-level checksums, resistance to hardware failure, ECC memory, multiple copies in different locations... they all play a role in keeping your files secure; don&#39;t skip out on any of them</li>
<li>One thing the author didn&#39;t mention in his post: having an <strong>offline</strong> copy of the data, ideally sealed in a safe place, is also important
***</li>
</ul>

<h3><a href="http://anadoxin.org/blog/blog/20150705/block-encryption-in-openbsd/" rel="nofollow">Block encryption in OpenBSD</a></h3>

<ul>
<li>We&#39;ve <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">covered</a> ways to do fully-encrypted installations of OpenBSD (and FreeBSD) before, but that requires dedicating a whole drive or partition to the sensitive data</li>
<li>This blog post takes you through the process of creating encrypted <em>containers</em> in OpenBSD, à la TrueCrypt - that is, a file-backed virtual device with an encrypted filesystem</li>
<li>It goes through creating a file that looks like random data, pointing <strong>vnconfig</strong> at it, setting up the crypto and finally using it as a fake storage device</li>
<li>The encrypted container method offers the advantage of being a bit more portable across installations than other ways
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=391421" rel="nofollow">Docker hits FreeBSD ports</a></h3>

<ul>
<li>The inevitable has happened, and an early FreeBSD port of docker is finally here </li>
<li>Some <a href="https://github.com/kvasdopil/docker/blob/freebsd-compat/FREEBSD-PORTING.md" rel="nofollow">details and directions</a> are available to read if you&#39;d like to give it a try, as well as a list of which features work and which don&#39;t</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9840025" rel="nofollow">Hacker News discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150708134520&mode=flat" rel="nofollow">Microsoft donates to OpenSSH</a></h3>

<ul>
<li>We&#39;ve talked about big businesses using BSD and contributing back before, even mentioning a few other large public donations - now it&#39;s Microsoft&#39;s turn</li>
<li>With their recent decision to integrate OpenSSH into an upcoming Windows release, Microsoft has donated a large sum of money to the OpenBSD foundation, making them a gold-level sponsor</li>
<li>They&#39;ve also posted some contract work offers on the OpenSSH mailing list, and say that their changes will be upstreamed if appropriate - we&#39;re always glad to see this
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NqbhwOoH" rel="nofollow">Joe writes in</a></li>
<li><a href="http://slexy.org/view/s2T3NEia98" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s20RlTK6Ha" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2rjCd0bGX" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s21PfSIyG5" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Lee Sharp. He&#39;s recently revived the m0n0wall codebase, now known as SmallWall, and we&#39;ll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCAEx6zhR2sD2pAGKezasAjA/videos" rel="nofollow">BSDCan and pkgsrcCon videos</a></h3>

<ul>
<li>Even more BSDCan 2015 videos are slowly but surely making their way to the internet</li>
<li>Nigel Williams, <a href="https://www.youtube.com/watch?v=P3vB_FWtyIs" rel="nofollow">Multipath TCP for FreeBSD</a></li>
<li>Stephen Bourne, <a href="https://www.youtube.com/watch?v=2kEJoWfobpA" rel="nofollow">Early days of Unix and design of sh</a></li>
<li>John Criswell, <a href="https://www.youtube.com/watch?v=hRIC_aF_u24" rel="nofollow">Protecting FreeBSD with Secure Virtual Architecture</a></li>
<li>Shany Michaely, <a href="https://www.youtube.com/watch?v=stsaeKvF3no" rel="nofollow">Expanding RDMA capability over Ethernet in FreeBSD</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=JaufZ7yCrLU" rel="nofollow">Adding AES-ICM and AES-GCM to OpenCrypto</a></li>
<li>Sevan Janiyan, <a href="https://www.youtube.com/watch?v=-HMXyzybgdM" rel="nofollow">Adventures in building</a> <a href="https://www.youtube.com/watch?v=Xof-uKnQ6cY" rel="nofollow">open source software</a></li>
<li>And finally, <a href="https://www.youtube.com/watch?v=Ynm0bGnYdfY" rel="nofollow">the BSDCan 2015 closing</a></li>
<li>Some <a href="https://vimeo.com/channels/pkgsrccon/videos" rel="nofollow">videos</a> from this year&#39;s <a href="http://pkgsrc.org/pkgsrcCon/2015/" rel="nofollow">pkgsrcCon</a> are also starting to appear online</li>
<li>Sevan Janiyan, <a href="https://vimeo.com/channels/pkgsrccon/132767946" rel="nofollow">A year of pkgsrc 2014 - 2015</a></li>
<li>Pierre Pronchery, <a href="https://vimeo.com/channels/pkgsrccon/132766052" rel="nofollow">pkgsrc meets pkg-ng</a></li>
<li>Jonathan Perkin, <a href="https://vimeo.com/channels/pkgsrccon/132760863" rel="nofollow">pkgsrc at Joyent</a></li>
<li>Jörg Sonnenberger, <a href="https://vimeo.com/channels/pkgsrccon/132757658" rel="nofollow">pkg_install script framework</a></li>
<li>Benny Siegert, <a href="https://vimeo.com/channels/pkgsrccon/132751897" rel="nofollow">New Features in BulkTracker</a></li>
<li>This is the first time we&#39;ve ever seen recordings from the conference - hopefully they continue this trend
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=839.0" rel="nofollow">OPNsense 15.7 released</a></h3>

<ul>
<li>The OPNsense team has released version 15.7, almost exactly six months after <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">their initial debut</a></li>
<li>In addition to pulling in the latest security fixes from upstream FreeBSD, 15.7 also includes new integration of an intrusion detection system (and new GUI for it) as well as new blacklisting options for the proxy server</li>
<li>Taking a note from upstream PF&#39;s playbook, ALTQ traffic shaping support has finally been retired as of this release (it was deprecated from OpenBSD a few years ago, and the code was <a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">completely removed</a> just over a year ago)</li>
<li>The LibreSSL flavor has been promoted to production-ready, and users can easily migrate over from OpenSSL via the GUI - switching between the two is simple; no commitment needed</li>
<li>Various third party ports have also been bumped up to their latest versions to keep things fresh, and there&#39;s the usual round of bug fixes included</li>
<li>Shortly afterwards, <a href="https://forum.opnsense.org/index.php?topic=915.0" rel="nofollow">15.7.1</a> was released with a few more small fixes
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/07/04/msg000688.html" rel="nofollow">NetBSD at Open Source Conference 2015 Okinawa</a></h3>

<ul>
<li>If you liked <a href="http://www.bsdnow.tv/episodes/2015_07_01-lost_technology" rel="nofollow">last week&#39;s episode</a> then you&#39;ll probably know what to expect with this one</li>
<li>The NetBSD users group of Japan hit another open source conference, this time in Okinawa</li>
<li>This time, they had a few interesting NetBSD machines on display that we didn&#39;t get to see in the interview last week</li>
<li>We&#39;d love to see something like this in North America or Europe too - anyone up for installing BSD on some interesting devices and showing them off at a Linux con?
***</li>
</ul>

<h3><a href="http://firstyear.id.au/entry/21" rel="nofollow">OpenBSD BGP and VRFs</a></h3>

<ul>
<li>&quot;<a href="https://en.wikipedia.org/wiki/Virtual_routing_and_forwarding" rel="nofollow">VRFs</a>, or in OpenBSD rdomains, are a simple, yet powerful (and sometimes confusing) topic&quot;</li>
<li>This article aims to explain both BGP and rdomains, using network diagrams, for some network isolation goodness</li>
<li>With multiple rdomains, it&#39;s also possible to have two upstream internet connections, but lock different groups of your internal network to just one of them</li>
<li>The idea of a &quot;guest network&quot; can greatly benefit from this separation as well, even allowing for the same IP ranges to be used without issues</li>
<li>Combining rdomains with the BGP protocol allows for some very selective and precise blocking/passing of traffic between networks, which is also covered in detail here</li>
<li>The <a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" rel="nofollow">BSDCan talk on rdomains</a> expands on the subject a bit more if you haven&#39;t seen it, as well as a few <a href="https://www.packetmischief.ca/2011/09/20/virtualizing-the-openbsd-routing-table/" rel="nofollow">related</a> <a href="http://cybermashup.com/2013/05/21/complex-routing-with-openbsd/" rel="nofollow">posts</a>
***</li>
</ul>

<h2>Interview - Lee Sharp - <a href="mailto:lee@smallwall.org" rel="nofollow">lee@smallwall.org</a></h2>

<p><a href="http://smallwall.org" rel="nofollow">SmallWall</a>, a continuation of m0n0wall</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blogs.oracle.com/solarisfw/entry/pf_for_solaris" rel="nofollow">Solaris adopts more BSD goodies</a></h3>

<ul>
<li>We mentioned a while back that Oracle developers have begun porting a current version of OpenBSD&#39;s PF firewall to their next version, even contributing back patches for SMP and other bug fixes</li>
<li>They recently published an article about PF, talking about what&#39;s different about it on their platform compared to others - not especially useful for BSD users, but interesting to read if you like firewalls</li>
<li>Darren Moffat, who was part of originally getting an SSH implementation into Solaris, has a <a href="https://blogs.oracle.com/darren/entry/openssh_in_solaris_11_3" rel="nofollow">second blog post</a> up about their &quot;SunSSH&quot; fork</li>
<li>Going forward, their next version is going to offer a completely vanilla OpenSSH option as well, with the plan being to phase out SunSSH after that</li>
<li>The article talks a bit about the history of getting SSH into the OS, forking the code and also lists some of the differences between the two</li>
<li>In <a href="https://blogs.oracle.com/darren/entry/solaris_new_system_calls_getentropy" rel="nofollow">a third blog post</a>, they talk about a new system call they&#39;re borrowing from OpenBSD, <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2" rel="nofollow">getentropy(2)</a>, as well as the addition of <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man3/arc4random.3" rel="nofollow">arc4random</a> to their libc</li>
<li>With an up-to-date and SMP-capable PF, ZFS with native encryption, jail-like Zones, unaltered OpenSSH and secure entropy calls… is Solaris becoming <em>better than us</em>?</li>
<li>Look forward to the upcoming &quot;Solaris Now&quot; podcast <sub>(not really)</sub>
***</li>
</ul>

<h3><a href="https://2015.eurobsdcon.org/talks/" rel="nofollow">EuroBSDCon 2015 talks and tutorials</a></h3>

<ul>
<li>This year&#39;s EuroBSDCon is set to be held in Sweden at the beginning of October, and the preliminary list of accepted presentations has been published</li>
<li>The list looks pretty well-balanced between the different BSDs, something Paul would be happy to see if he was still with us</li>
<li>It even includes an interesting DragonFly talk and a couple talks from NetBSD developers, in addition to plenty of FreeBSD and OpenBSD of course</li>
<li>There are also <a href="https://2015.eurobsdcon.org/tutorials/" rel="nofollow">a few tutorials</a> planned for the event, some you&#39;ve probably seen already and some you haven&#39;t</li>
<li>Registration for the event will be opening very soon (likely this week or next)
***</li>
</ul>

<h3><a href="https://www.iceflatline.com/2015/07/using-zfs-replication-features-in-freebsd-to-improve-my-offsite-backups/" rel="nofollow">Using ZFS replication to improve offsite backups</a></h3>

<ul>
<li>If you take backups seriously, you&#39;re probably using ZFS and probably keeping an offsite copy of the data</li>
<li>This article covers doing just that, but with a focus on making use of the replication capability</li>
<li>It&#39;ll walk you through taking a snapshot of your pool and then replicating it to another remote system, using &quot;zfs send&quot; and SSH - this has the benefit of only transferring the files that have changed since the last time you did it</li>
<li>Steps are also taken to allow a regular user to take and manage snapshots, so you don&#39;t need to be root for the SSH transfer</li>
<li>Data integrity is a long process - filesystem-level checksums, resistance to hardware failure, ECC memory, multiple copies in different locations... they all play a role in keeping your files secure; don&#39;t skip out on any of them</li>
<li>One thing the author didn&#39;t mention in his post: having an <strong>offline</strong> copy of the data, ideally sealed in a safe place, is also important
***</li>
</ul>

<h3><a href="http://anadoxin.org/blog/blog/20150705/block-encryption-in-openbsd/" rel="nofollow">Block encryption in OpenBSD</a></h3>

<ul>
<li>We&#39;ve <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">covered</a> ways to do fully-encrypted installations of OpenBSD (and FreeBSD) before, but that requires dedicating a whole drive or partition to the sensitive data</li>
<li>This blog post takes you through the process of creating encrypted <em>containers</em> in OpenBSD, à la TrueCrypt - that is, a file-backed virtual device with an encrypted filesystem</li>
<li>It goes through creating a file that looks like random data, pointing <strong>vnconfig</strong> at it, setting up the crypto and finally using it as a fake storage device</li>
<li>The encrypted container method offers the advantage of being a bit more portable across installations than other ways
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=391421" rel="nofollow">Docker hits FreeBSD ports</a></h3>

<ul>
<li>The inevitable has happened, and an early FreeBSD port of docker is finally here </li>
<li>Some <a href="https://github.com/kvasdopil/docker/blob/freebsd-compat/FREEBSD-PORTING.md" rel="nofollow">details and directions</a> are available to read if you&#39;d like to give it a try, as well as a list of which features work and which don&#39;t</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9840025" rel="nofollow">Hacker News discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150708134520&mode=flat" rel="nofollow">Microsoft donates to OpenSSH</a></h3>

<ul>
<li>We&#39;ve talked about big businesses using BSD and contributing back before, even mentioning a few other large public donations - now it&#39;s Microsoft&#39;s turn</li>
<li>With their recent decision to integrate OpenSSH into an upcoming Windows release, Microsoft has donated a large sum of money to the OpenBSD foundation, making them a gold-level sponsor</li>
<li>They&#39;ve also posted some contract work offers on the OpenSSH mailing list, and say that their changes will be upstreamed if appropriate - we&#39;re always glad to see this
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NqbhwOoH" rel="nofollow">Joe writes in</a></li>
<li><a href="http://slexy.org/view/s2T3NEia98" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s20RlTK6Ha" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2rjCd0bGX" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s21PfSIyG5" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>88: Below the Clouds</title>
  <link>https://www.bsdnow.tv/88</link>
  <guid isPermaLink="false">26ef6d0e-ea2a-4032-88ee-121e1b2be033</guid>
  <pubDate>Wed, 06 May 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/26ef6d0e-ea2a-4032-88ee-121e1b2be033.mp3" length="67680724" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with Ed Schouten about CloudABI. It's a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week's BSD news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:34:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking with Ed Schouten about CloudABI. It's a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week's BSD news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2015-01-2015-03.html)
The FreeBSD team has posted a report of the activities that went on between January and March of this year
As usual, it's broken down into separate reports from the various teams in the project (ports, kernel, virtualization, etc)
The ports team continuing battling the flood of PRs, closing quite a lot of them and boasting nearly 7,000 commits this quarter
The core team and cluster admins dealt with the accidental deletion of the Bugzilla database, and are making plans for an improved backup strategy within the project going forward
FreeBSD's future release support model was also finalized and published in February, which should be a big improvement for both users and the release team
Some topics are still being discussed internally, mainly MFCing ZFS ARC responsiveness patches to the 10 branch and deciding whether to maintain or abandon C89 support in the kernel code
Lots of activity is happening in bhyve, some of which we've covered recently (http://www.bsdnow.tv/episodes/2015_04_29-on_the_list), and a number of improvements were made this quarter
Clang, LLVM and LLDB have been updated to the 3.6.0 branch in -CURRENT
Work to get FreeBSD booting natively on the POWER8 CPU architecture is also still in progress, but it does boot in KVM for the time being
The project to replace forth in the bootloader with lua is in its final stages, and can be used on x86 already
ASLR work (http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover) is still being done by the HardenedBSD guys, and their next aim is position-independent executable
The report also touches on multipath TCP support, the new automounter, opaque ifnet, pkgng updates, secureboot (which should be in 10.2-RELEASE), GNOME and KDE on FreeBSD, PCIe hotplugging, nested kernel support and more
Also of note: work is going on to make ARM a Tier 1 platform in the upcoming 11.0-RELEASE (and support for more ARM boards is still being added, including ARM64)
***
OpenBSD 5.7 released (http://www.openbsd.org/57.html)
OpenBSD has formally released another new version, complete with the giant changelog we've come to expect
In the hardware department, 5.7 features many driver improvements and fixes, as well as support for some new things: USB 3.0 controllers, newer Intel and Atheros wireless cards and some additional 10gbit NICs
If you're using one of the Soekris boards, there's even a new driver (http://bodgitandscarper.co.uk/openbsd/further-soekris-net6501-improvements-for-openbsd/) to manipulate the GPIO and LEDs on them - this has some fun possibilities
Some new security improvements include: SipHash (https://en.wikipedia.org/wiki/SipHash) being sprinkled in some areas to protect hashing functions, big W^X improvements (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2) in the kernel space, static PIE (http://www.bsdnow.tv/episodes/2015_04_15-pie_in_the_sky) on all architectures, deterministic "random" functions being replaced (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141807224826859&amp;amp;w=2) with strong randomness, and support for remote logging over TLS
The entire source tree has also been audited to use reallocarray (http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/), which unintentionally saved (https://splone.com/blog/2015/3/11/integer-overflow-prevention-in-c) OpenBSD's libc from being vulnerable to earlier attacks (https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/) affecting other BSDs' implementations
Being that it's OpenBSD, a number of things have also been removed from the base system: procfs, sendmail, SSLv3 support and loadable kernel modules are all gone now (not to mention the continuing massacre of dead code in LibreSSL)
Some people seem to be surprised about the removal of loadable modules, but almost nothing utilized them in OpenBSD, so it was really just removing old code that no one used anymore - very different from FreeBSD or Linux in this regard, where kernel modules are used pretty heavily
BIND and nginx have been taken out, so you'll need to either use the versions in ports or switch to Unbound and the in-base HTTP daemon
Speaking of httpd, it's gotten a number of new (http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf) features (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/httpd.conf.5), and has had time to grow and mature since its initial debut - if you've been considering trying it out, now would be a great time to do so
This release also includes the latest OpenSSH (with stronger fingerprint types and host key rotation), OpenNTPD (with the HTTPS constraints feature), OpenSMTPD, LibreSSL and mandoc (http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man)
Check the errata page (http://www.openbsd.org/errata57.html) for any post-release fixes, and the upgrade guide (http://www.openbsd.org/faq/upgrade57.html) for specific instructions on updating from 5.6
Groundwork has also been laid for some major SMP scalability improvements - look forward to those in future releases
There's a song and artwork (http://www.openbsd.org/lyrics.html#57) to go along with the release as always, and CDs should be arriving within a few days - we'll show some pictures next week
Consider picking one up (https://www.openbsdstore.com) to support the project (and it's the only way to get puffy stickers)
For those of you paying close attention, the banner image (http://www.openbsd.org/images/puffy57.gif) for this release just might remind you of a certain special episode (http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time) of BSD Now...
***
Tor-BSD diversity project (https://torbsd.github.io/)
We've talked about Tor on the show a few times, and specifically about getting more of the network on BSD (Linux has an overwhelming majority right now)
A new initiative has started to do just that, called the Tor-BSD diversity project
"Monocultures in nature are dangerous, as vulnerabilities are held in common across a broad spectrum. Diversity means single vulnerabilities are less likely to harm the entire ecosystem. [...] A single kernel vulnerability in GNU/Linux that impacting Tor relays could be devastating. We want to see a stronger Tor network, and we believe one critical ingredient for that is operating system diversity."
In addition to encouraging people to put up more relays, they're also continuing work on porting the Tor Browser Bundle to BSD, so more desktop users can have easy access to online privacy
There's an additional progress report (http://trac.haqistan.net/blog/tor-browser-ports-progress) for that part specifically, and it looks like most of the work is done now
Engaging the broader BSD community about Tor and fixing up the official documentation are also both on their todo list 
If you've been considering running a node to help out, there's always our handy tutorial (http://www.bsdnow.tv/tutorials/tor) on getting set up
***
PC-BSD 10.1.2-RC1 released (http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-now-available/)
If you want a sneak peek at the upcoming PC-BSD 10.1.2, the first release candidate is now available to grab
This quarterly update includes a number of new features, improvements and even some additional utilities
PersonaCrypt is one of them - it's a new tool for easily migrating encrypted home directories between systems
A new "stealth mode" option allows for a one-time login, using a blank home directory that gets wiped after use
Similarly, a new "Tor mode" allows for easy tunneling of all your traffic through the Tor network
IPFW is now the default firewall, offering improved VIMAGE capabilities
The life preserver backup tool now allows for bare-metal restores via the install CD
ISC's NTP daemon has been replaced with OpenNTPD (http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change), and OpenSSL has been replaced with LibreSSL (http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild)
It also includes the latest Lumina (http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment) desktop, and there's another post dedicated to that (http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-lumina-desktop-0-8-4-released/)
Binary packages have also been updated to fresh versions from the ports tree
More details, including upgrade instructions, can be found in the linked blog post
***
Interview - Ed Schouten - ed@freebsd.org (mailto:ed@freebsd.org) / @edschouten (https://twitter.com/edschouten)
CloudABI (https://www.bsdcan.org/2015/schedule/track/Security/524.en.html)
News Roundup
Open Household Router Contraption (http://code.saghul.net/index.php/2015/05/01/announcing-the-open-household-router-contraption/)
This article introduces OpenHRC, the "Open Household Router Contraption"
In short, it's a set of bootstrapping scripts to turn a vanilla OpenBSD install into a feature-rich gateway device
It also makes use of Ansible playbooks for configuration, allowing for a more "mass deployment" type of setup
Everything is configured via a simple text file, and you end up with a local NTP server, DHCP server, firewall (obviously) and local caching DNS resolver - it even does DNSSEC validation
All the code is open source and on Github (https://github.com/ioc32/openhrc), so you can read through what's actually being changed and put in place
There's also a video guide (https://www.youtube.com/watch?v=LZeKDM5jc90) to the entire process, if you're more of a visual person
***
OPNsense 15.1.10 released (https://forum.opnsense.org/index.php?topic=365.0)
Speaking of BSD routers, if you're looking for a "prebuilt and ready to go" option, OPNsense has just released a new version
15.1.10 drops some of the legacy patches they inherited from pfSense, aiming to stay closer to the mainline FreeBSD source code
Going along with this theme, they've redone how they do ports, and are now kept totally in sync with the regular ports tree
Their binary packages are now signed using the fingerprint-style method, various GUI menus have been rewritten and a number of other bugs were fixed
NanoBSD-based images are also available now, so you can try it out on hardware with constrained resources as well
Version 15.1.10.1 (https://twitter.com/opnsense/status/596009164746432512) was released shortly thereafter, including a hotfix for VLANs
***
IBM Workpad Z50 and NetBSD (https://www.ibm.com/developerworks/community/blogs/hpcgoulash/entry/ibm_workpad_z50_netbsd_an_interesting_combination1?lang=en)
Before the infamous netbook fad came and went, IBM had a handheld PDA device that looked pretty much the same
Back in 1999, they released the Workpad Z50 (http://www.hpcfactor.com/reviews/hardware/ibm/workpad-z50/) with Windows CE, sporting a 131MHz MIPS CPU, 16MB of RAM and a 640x480 display
You can probably tell where this is going... the article is about installing NetBSD it
"What prevents me from taking my pristine Workpad z50 to the local electronics recycling  facility is NetBSD. With a little effort it is possible to install recent versions of NetBSD on the Workpad z50 and even have XWindows running"
The author got pkgsrc up and running on it too, and cleverly used distcc to offload the compiling jobs to something a bit more modern
He's also got a couple (https://www.youtube.com/watch?v=hSLVnSZKB9I) videos (https://www.youtube.com/watch?v=mIA-NWEHLM4) of the bootup process and running Xorg (neither of which we'd call "speedy" by any stretch of the imagination)
***
FreeBSD from the trenches (http://freebsdfoundation.blogspot.com/2015/04/from-trenches-tips-tricks-edition.html)
The FreeBSD foundation has a new blog post up in their "from the trenches" series, detailing FreeBSD in some real-world use cases
In this installment, Glen Barber talks about how he sets up all his laptops with ZFS and GELI
While the installer allows for an automatic ZFS layout, Glen notes that it's not a one-size-fits-all thing, and goes through doing everything manually
Each command is explained, and he walks you through the process of doing an encrypted installation (http://www.bsdnow.tv/tutorials/fde) on your root zpool
***
Broadwell in DragonFly (http://lists.dragonflybsd.org/pipermail/users/2015-May/207671.html)
DragonFlyBSD has officially won the race to get an Intel Broadwell graphics driver
Their i915 driver has been brought up to speed with Linux 3.14's, adding not only Broadwell support, but many other bugfixes for other cards too
It's planned for commit to the main tree very soon, but you can test it out with a git branch for the time being
***
Feedback/Questions
Bostjan writes in (http://slexy.org/view/s216QQcHyX)
Hunter writes in (http://slexy.org/view/s21hGSk3c0)
Hrishi writes in (http://slexy.org/view/s20JwPw9Je)
Clint writes in (http://slexy.org/view/s2x1GYr7y6)
Sergei writes in (http://slexy.org/view/s2swXxr2PX)
***
Mailing List Gold
How did you guess (https://lists.freebsd.org/pipermail/freebsd-advocacy/2015-May/004541.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, 5.7, libressl, opensmtpd, openntpd, openssh, cloudabi, capsicum, 5.7, tor-bsd, tor, diversity, browser bundle, ipfw, openhrc, opnsense, router, workpad z50, gateway</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Ed Schouten about CloudABI. It&#39;s a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week&#39;s BSD news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2015-01-2015-03.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted a report of the activities that went on between January and March of this year</li>
<li>As usual, it&#39;s broken down into separate reports from the various teams in the project (ports, kernel, virtualization, etc)</li>
<li>The ports team continuing battling the flood of PRs, closing quite a lot of them and boasting nearly 7,000 commits this quarter</li>
<li>The core team and cluster admins dealt with the accidental deletion of the Bugzilla database, and are making plans for an improved backup strategy within the project going forward</li>
<li>FreeBSD&#39;s future release support model was also finalized and published in February, which should be a big improvement for both users and the release team</li>
<li>Some topics are still being discussed internally, mainly MFCing ZFS ARC responsiveness patches to the 10 branch and deciding whether to maintain or abandon C89 support in the kernel code</li>
<li>Lots of activity is happening in bhyve, some of which we&#39;ve covered <a href="http://www.bsdnow.tv/episodes/2015_04_29-on_the_list" rel="nofollow">recently</a>, and a number of improvements were made this quarter</li>
<li>Clang, LLVM and LLDB have been updated to the 3.6.0 branch in -CURRENT</li>
<li>Work to get FreeBSD booting natively on the POWER8 CPU architecture is also still in progress, but it does boot in KVM for the time being</li>
<li>The project to replace forth in the bootloader with lua is in its final stages, and can be used on x86 already</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">ASLR work</a> is still being done by the HardenedBSD guys, and their next aim is position-independent executable</li>
<li>The report also touches on multipath TCP support, the new automounter, opaque ifnet, pkgng updates, secureboot (which should be in 10.2-RELEASE), GNOME and KDE on FreeBSD, PCIe hotplugging, nested kernel support and more</li>
<li>Also of note: work is going on to make ARM a Tier 1 platform in the upcoming 11.0-RELEASE (and support for more ARM boards is still being added, including ARM64)
***</li>
</ul>

<h3><a href="http://www.openbsd.org/57.html" rel="nofollow">OpenBSD 5.7 released</a></h3>

<ul>
<li>OpenBSD has formally released another new version, complete with the giant changelog we&#39;ve come to expect</li>
<li>In the hardware department, 5.7 features many driver improvements and fixes, as well as support for some new things: USB 3.0 controllers, newer Intel and Atheros wireless cards and some additional 10gbit NICs</li>
<li>If you&#39;re using one of the Soekris boards, there&#39;s even <a href="http://bodgitandscarper.co.uk/openbsd/further-soekris-net6501-improvements-for-openbsd/" rel="nofollow">a new driver</a> to manipulate the GPIO and LEDs on them - this has some fun possibilities</li>
<li>Some new security improvements include: <a href="https://en.wikipedia.org/wiki/SipHash" rel="nofollow">SipHash</a> being sprinkled in some areas to protect hashing functions, big <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">W<sup>X</sup> improvements</a> in the kernel space, <a href="http://www.bsdnow.tv/episodes/2015_04_15-pie_in_the_sky" rel="nofollow">static PIE</a> on all architectures, deterministic &quot;random&quot; functions <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">being replaced</a> with strong randomness, and support for remote logging over TLS</li>
<li>The entire source tree has also been audited to use <a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray</a>, which unintentionally <a href="https://splone.com/blog/2015/3/11/integer-overflow-prevention-in-c" rel="nofollow">saved</a> OpenBSD&#39;s libc from being vulnerable to <a href="https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/" rel="nofollow">earlier attacks</a> affecting other BSDs&#39; implementations</li>
<li>Being that it&#39;s OpenBSD, a number of things have also been <em>removed</em> from the base system: procfs, sendmail, SSLv3 support and loadable kernel modules are all gone now (not to mention the continuing massacre of dead code in LibreSSL)</li>
<li>Some people seem to be surprised about the removal of loadable modules, but almost nothing utilized them in OpenBSD, so it was really just removing old code that no one used anymore - very different from FreeBSD or Linux in this regard, where kernel modules are used pretty heavily</li>
<li>BIND and nginx have been taken out, so you&#39;ll need to either use the versions in ports or switch to Unbound and the in-base HTTP daemon</li>
<li>Speaking of httpd, it&#39;s gotten a number of <a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" rel="nofollow">new</a> <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/httpd.conf.5" rel="nofollow">features</a>, and has had time to grow and mature since its initial debut - if you&#39;ve been considering trying it out, now would be a great time to do so</li>
<li>This release also includes the latest OpenSSH (with stronger fingerprint types and host key rotation), OpenNTPD (with the HTTPS constraints feature), OpenSMTPD, LibreSSL and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Check the <a href="http://www.openbsd.org/errata57.html" rel="nofollow">errata page</a> for any post-release fixes, and the <a href="http://www.openbsd.org/faq/upgrade57.html" rel="nofollow">upgrade guide</a> for specific instructions on updating from 5.6</li>
<li>Groundwork has also been laid for some major SMP scalability improvements - look forward to those in future releases</li>
<li>There&#39;s a <a href="http://www.openbsd.org/lyrics.html#57" rel="nofollow">song and artwork</a> to go along with the release as always, and CDs should be arriving within a few days - we&#39;ll show some pictures next week</li>
<li>Consider <a href="https://www.openbsdstore.com" rel="nofollow">picking one up</a> to support the project (and it&#39;s the only way to get puffy stickers)</li>
<li>For those of you paying close attention, the <a href="http://www.openbsd.org/images/puffy57.gif" rel="nofollow">banner image</a> for this release just might remind you of a <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">certain special episode</a> of BSD Now...
***</li>
</ul>

<h3><a href="https://torbsd.github.io/" rel="nofollow">Tor-BSD diversity project</a></h3>

<ul>
<li>We&#39;ve talked about Tor on the show a few times, and specifically about getting more of the network on BSD (Linux has an overwhelming majority right now)</li>
<li>A new initiative has started to do just that, called the Tor-BSD diversity project</li>
<li>&quot;Monocultures in nature are dangerous, as vulnerabilities are held in common across a broad spectrum. Diversity means single vulnerabilities are less likely to harm the entire ecosystem. [...] A single kernel vulnerability in GNU/Linux that impacting Tor relays could be devastating. We want to see a stronger Tor network, and we believe one critical ingredient for that is operating system diversity.&quot;</li>
<li>In addition to encouraging people to put up more relays, they&#39;re also continuing work on porting the Tor Browser Bundle to BSD, so more desktop users can have easy access to online privacy</li>
<li>There&#39;s an additional <a href="http://trac.haqistan.net/blog/tor-browser-ports-progress" rel="nofollow">progress report</a> for that part specifically, and it looks like most of the work is done now</li>
<li>Engaging the broader BSD community about Tor and fixing up the official documentation are also both on their todo list </li>
<li>If you&#39;ve been considering running a node to help out, there&#39;s always <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">our handy tutorial</a> on getting set up
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-now-available/" rel="nofollow">PC-BSD 10.1.2-RC1 released</a></h3>

<ul>
<li>If you want a sneak peek at the upcoming PC-BSD 10.1.2, the first release candidate is now available to grab</li>
<li>This quarterly update includes a number of new features, improvements and even some additional utilities</li>
<li>PersonaCrypt is one of them - it&#39;s a new tool for easily migrating encrypted home directories between systems</li>
<li>A new &quot;stealth mode&quot; option allows for a one-time login, using a blank home directory that gets wiped after use</li>
<li>Similarly, a new &quot;Tor mode&quot; allows for easy tunneling of all your traffic through the Tor network</li>
<li>IPFW is now the default firewall, offering improved VIMAGE capabilities</li>
<li>The life preserver backup tool now allows for bare-metal restores via the install CD</li>
<li>ISC&#39;s NTP daemon has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">OpenNTPD</a>, and OpenSSL has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" rel="nofollow">LibreSSL</a></li>
<li>It also includes the latest <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">Lumina</a> desktop, and there&#39;s another <a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-lumina-desktop-0-8-4-released/" rel="nofollow">post dedicated to that</a></li>
<li>Binary packages have also been updated to fresh versions from the ports tree</li>
<li>More details, including upgrade instructions, can be found in the linked blog post
***</li>
</ul>

<h2>Interview - Ed Schouten - <a href="mailto:ed@freebsd.org" rel="nofollow">ed@freebsd.org</a> / <a href="https://twitter.com/edschouten" rel="nofollow">@edschouten</a></h2>

<p><a href="https://www.bsdcan.org/2015/schedule/track/Security/524.en.html" rel="nofollow">CloudABI</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://code.saghul.net/index.php/2015/05/01/announcing-the-open-household-router-contraption/" rel="nofollow">Open Household Router Contraption</a></h3>

<ul>
<li>This article introduces OpenHRC, the &quot;Open Household Router Contraption&quot;</li>
<li>In short, it&#39;s a set of bootstrapping scripts to turn a vanilla OpenBSD install into a feature-rich gateway device</li>
<li>It also makes use of Ansible playbooks for configuration, allowing for a more &quot;mass deployment&quot; type of setup</li>
<li>Everything is configured via a simple text file, and you end up with a local NTP server, DHCP server, firewall (obviously) and local caching DNS resolver - it even does DNSSEC validation</li>
<li>All the code is open source <a href="https://github.com/ioc32/openhrc" rel="nofollow">and on Github</a>, so you can read through what&#39;s actually being changed and put in place</li>
<li>There&#39;s also a <a href="https://www.youtube.com/watch?v=LZeKDM5jc90" rel="nofollow">video guide</a> to the entire process, if you&#39;re more of a visual person
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=365.0" rel="nofollow">OPNsense 15.1.10 released</a></h3>

<ul>
<li>Speaking of BSD routers, if you&#39;re looking for a &quot;prebuilt and ready to go&quot; option, OPNsense has just released a new version</li>
<li>15.1.10 drops some of the legacy patches they inherited from pfSense, aiming to stay closer to the mainline FreeBSD source code</li>
<li>Going along with this theme, they&#39;ve redone how they do ports, and are now kept totally in sync with the regular ports tree</li>
<li>Their binary packages are now signed using the fingerprint-style method, various GUI menus have been rewritten and a number of other bugs were fixed</li>
<li>NanoBSD-based images are also available now, so you can try it out on hardware with constrained resources as well</li>
<li>Version <a href="https://twitter.com/opnsense/status/596009164746432512" rel="nofollow">15.1.10.1</a> was released shortly thereafter, including a hotfix for VLANs
***</li>
</ul>

<h3><a href="https://www.ibm.com/developerworks/community/blogs/hpcgoulash/entry/ibm_workpad_z50_netbsd_an_interesting_combination1?lang=en" rel="nofollow">IBM Workpad Z50 and NetBSD</a></h3>

<ul>
<li>Before the infamous netbook fad came and went, IBM had a handheld PDA device that looked pretty much the same</li>
<li>Back in 1999, they released <a href="http://www.hpcfactor.com/reviews/hardware/ibm/workpad-z50/" rel="nofollow">the Workpad Z50</a> with Windows CE, sporting a 131MHz MIPS CPU, 16MB of RAM and a 640x480 display</li>
<li>You can probably tell where this is going... the article is about installing NetBSD it</li>
<li>&quot;What prevents me from taking my pristine Workpad z50 to the local electronics recycling  facility is NetBSD. With a little effort it is possible to install recent versions of NetBSD on the Workpad z50 and even have XWindows running&quot;</li>
<li>The author got pkgsrc up and running on it too, and cleverly used distcc to offload the compiling jobs to something a bit more modern</li>
<li>He&#39;s also got a <a href="https://www.youtube.com/watch?v=hSLVnSZKB9I" rel="nofollow">couple</a> <a href="https://www.youtube.com/watch?v=mIA-NWEHLM4" rel="nofollow">videos</a> of the bootup process and running Xorg (neither of which we&#39;d call &quot;speedy&quot; by any stretch of the imagination)
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/04/from-trenches-tips-tricks-edition.html" rel="nofollow">FreeBSD from the trenches</a></h3>

<ul>
<li>The FreeBSD foundation has a new blog post up in their &quot;from the trenches&quot; series, detailing FreeBSD in some real-world use cases</li>
<li>In this installment, Glen Barber talks about how he sets up all his laptops with ZFS and GELI</li>
<li>While the installer allows for an automatic ZFS layout, Glen notes that it&#39;s not a one-size-fits-all thing, and goes through doing everything manually</li>
<li>Each command is explained, and he walks you through the process of doing <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">an encrypted installation</a> on your root zpool
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207671.html" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>DragonFlyBSD has officially won the race to get an Intel Broadwell graphics driver</li>
<li>Their i915 driver has been brought up to speed with Linux 3.14&#39;s, adding not only Broadwell support, but many other bugfixes for other cards too</li>
<li>It&#39;s planned for commit to the main tree very soon, but you can test it out with a git branch for the time being
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216QQcHyX" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21hGSk3c0" rel="nofollow">Hunter writes in</a></li>
<li><a href="http://slexy.org/view/s20JwPw9Je" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2x1GYr7y6" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s2swXxr2PX" rel="nofollow">Sergei writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2015-May/004541.html" rel="nofollow">How did you guess</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Ed Schouten about CloudABI. It&#39;s a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week&#39;s BSD news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2015-01-2015-03.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted a report of the activities that went on between January and March of this year</li>
<li>As usual, it&#39;s broken down into separate reports from the various teams in the project (ports, kernel, virtualization, etc)</li>
<li>The ports team continuing battling the flood of PRs, closing quite a lot of them and boasting nearly 7,000 commits this quarter</li>
<li>The core team and cluster admins dealt with the accidental deletion of the Bugzilla database, and are making plans for an improved backup strategy within the project going forward</li>
<li>FreeBSD&#39;s future release support model was also finalized and published in February, which should be a big improvement for both users and the release team</li>
<li>Some topics are still being discussed internally, mainly MFCing ZFS ARC responsiveness patches to the 10 branch and deciding whether to maintain or abandon C89 support in the kernel code</li>
<li>Lots of activity is happening in bhyve, some of which we&#39;ve covered <a href="http://www.bsdnow.tv/episodes/2015_04_29-on_the_list" rel="nofollow">recently</a>, and a number of improvements were made this quarter</li>
<li>Clang, LLVM and LLDB have been updated to the 3.6.0 branch in -CURRENT</li>
<li>Work to get FreeBSD booting natively on the POWER8 CPU architecture is also still in progress, but it does boot in KVM for the time being</li>
<li>The project to replace forth in the bootloader with lua is in its final stages, and can be used on x86 already</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">ASLR work</a> is still being done by the HardenedBSD guys, and their next aim is position-independent executable</li>
<li>The report also touches on multipath TCP support, the new automounter, opaque ifnet, pkgng updates, secureboot (which should be in 10.2-RELEASE), GNOME and KDE on FreeBSD, PCIe hotplugging, nested kernel support and more</li>
<li>Also of note: work is going on to make ARM a Tier 1 platform in the upcoming 11.0-RELEASE (and support for more ARM boards is still being added, including ARM64)
***</li>
</ul>

<h3><a href="http://www.openbsd.org/57.html" rel="nofollow">OpenBSD 5.7 released</a></h3>

<ul>
<li>OpenBSD has formally released another new version, complete with the giant changelog we&#39;ve come to expect</li>
<li>In the hardware department, 5.7 features many driver improvements and fixes, as well as support for some new things: USB 3.0 controllers, newer Intel and Atheros wireless cards and some additional 10gbit NICs</li>
<li>If you&#39;re using one of the Soekris boards, there&#39;s even <a href="http://bodgitandscarper.co.uk/openbsd/further-soekris-net6501-improvements-for-openbsd/" rel="nofollow">a new driver</a> to manipulate the GPIO and LEDs on them - this has some fun possibilities</li>
<li>Some new security improvements include: <a href="https://en.wikipedia.org/wiki/SipHash" rel="nofollow">SipHash</a> being sprinkled in some areas to protect hashing functions, big <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">W<sup>X</sup> improvements</a> in the kernel space, <a href="http://www.bsdnow.tv/episodes/2015_04_15-pie_in_the_sky" rel="nofollow">static PIE</a> on all architectures, deterministic &quot;random&quot; functions <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">being replaced</a> with strong randomness, and support for remote logging over TLS</li>
<li>The entire source tree has also been audited to use <a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray</a>, which unintentionally <a href="https://splone.com/blog/2015/3/11/integer-overflow-prevention-in-c" rel="nofollow">saved</a> OpenBSD&#39;s libc from being vulnerable to <a href="https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/" rel="nofollow">earlier attacks</a> affecting other BSDs&#39; implementations</li>
<li>Being that it&#39;s OpenBSD, a number of things have also been <em>removed</em> from the base system: procfs, sendmail, SSLv3 support and loadable kernel modules are all gone now (not to mention the continuing massacre of dead code in LibreSSL)</li>
<li>Some people seem to be surprised about the removal of loadable modules, but almost nothing utilized them in OpenBSD, so it was really just removing old code that no one used anymore - very different from FreeBSD or Linux in this regard, where kernel modules are used pretty heavily</li>
<li>BIND and nginx have been taken out, so you&#39;ll need to either use the versions in ports or switch to Unbound and the in-base HTTP daemon</li>
<li>Speaking of httpd, it&#39;s gotten a number of <a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" rel="nofollow">new</a> <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/httpd.conf.5" rel="nofollow">features</a>, and has had time to grow and mature since its initial debut - if you&#39;ve been considering trying it out, now would be a great time to do so</li>
<li>This release also includes the latest OpenSSH (with stronger fingerprint types and host key rotation), OpenNTPD (with the HTTPS constraints feature), OpenSMTPD, LibreSSL and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Check the <a href="http://www.openbsd.org/errata57.html" rel="nofollow">errata page</a> for any post-release fixes, and the <a href="http://www.openbsd.org/faq/upgrade57.html" rel="nofollow">upgrade guide</a> for specific instructions on updating from 5.6</li>
<li>Groundwork has also been laid for some major SMP scalability improvements - look forward to those in future releases</li>
<li>There&#39;s a <a href="http://www.openbsd.org/lyrics.html#57" rel="nofollow">song and artwork</a> to go along with the release as always, and CDs should be arriving within a few days - we&#39;ll show some pictures next week</li>
<li>Consider <a href="https://www.openbsdstore.com" rel="nofollow">picking one up</a> to support the project (and it&#39;s the only way to get puffy stickers)</li>
<li>For those of you paying close attention, the <a href="http://www.openbsd.org/images/puffy57.gif" rel="nofollow">banner image</a> for this release just might remind you of a <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">certain special episode</a> of BSD Now...
***</li>
</ul>

<h3><a href="https://torbsd.github.io/" rel="nofollow">Tor-BSD diversity project</a></h3>

<ul>
<li>We&#39;ve talked about Tor on the show a few times, and specifically about getting more of the network on BSD (Linux has an overwhelming majority right now)</li>
<li>A new initiative has started to do just that, called the Tor-BSD diversity project</li>
<li>&quot;Monocultures in nature are dangerous, as vulnerabilities are held in common across a broad spectrum. Diversity means single vulnerabilities are less likely to harm the entire ecosystem. [...] A single kernel vulnerability in GNU/Linux that impacting Tor relays could be devastating. We want to see a stronger Tor network, and we believe one critical ingredient for that is operating system diversity.&quot;</li>
<li>In addition to encouraging people to put up more relays, they&#39;re also continuing work on porting the Tor Browser Bundle to BSD, so more desktop users can have easy access to online privacy</li>
<li>There&#39;s an additional <a href="http://trac.haqistan.net/blog/tor-browser-ports-progress" rel="nofollow">progress report</a> for that part specifically, and it looks like most of the work is done now</li>
<li>Engaging the broader BSD community about Tor and fixing up the official documentation are also both on their todo list </li>
<li>If you&#39;ve been considering running a node to help out, there&#39;s always <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">our handy tutorial</a> on getting set up
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-now-available/" rel="nofollow">PC-BSD 10.1.2-RC1 released</a></h3>

<ul>
<li>If you want a sneak peek at the upcoming PC-BSD 10.1.2, the first release candidate is now available to grab</li>
<li>This quarterly update includes a number of new features, improvements and even some additional utilities</li>
<li>PersonaCrypt is one of them - it&#39;s a new tool for easily migrating encrypted home directories between systems</li>
<li>A new &quot;stealth mode&quot; option allows for a one-time login, using a blank home directory that gets wiped after use</li>
<li>Similarly, a new &quot;Tor mode&quot; allows for easy tunneling of all your traffic through the Tor network</li>
<li>IPFW is now the default firewall, offering improved VIMAGE capabilities</li>
<li>The life preserver backup tool now allows for bare-metal restores via the install CD</li>
<li>ISC&#39;s NTP daemon has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">OpenNTPD</a>, and OpenSSL has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" rel="nofollow">LibreSSL</a></li>
<li>It also includes the latest <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">Lumina</a> desktop, and there&#39;s another <a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-lumina-desktop-0-8-4-released/" rel="nofollow">post dedicated to that</a></li>
<li>Binary packages have also been updated to fresh versions from the ports tree</li>
<li>More details, including upgrade instructions, can be found in the linked blog post
***</li>
</ul>

<h2>Interview - Ed Schouten - <a href="mailto:ed@freebsd.org" rel="nofollow">ed@freebsd.org</a> / <a href="https://twitter.com/edschouten" rel="nofollow">@edschouten</a></h2>

<p><a href="https://www.bsdcan.org/2015/schedule/track/Security/524.en.html" rel="nofollow">CloudABI</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://code.saghul.net/index.php/2015/05/01/announcing-the-open-household-router-contraption/" rel="nofollow">Open Household Router Contraption</a></h3>

<ul>
<li>This article introduces OpenHRC, the &quot;Open Household Router Contraption&quot;</li>
<li>In short, it&#39;s a set of bootstrapping scripts to turn a vanilla OpenBSD install into a feature-rich gateway device</li>
<li>It also makes use of Ansible playbooks for configuration, allowing for a more &quot;mass deployment&quot; type of setup</li>
<li>Everything is configured via a simple text file, and you end up with a local NTP server, DHCP server, firewall (obviously) and local caching DNS resolver - it even does DNSSEC validation</li>
<li>All the code is open source <a href="https://github.com/ioc32/openhrc" rel="nofollow">and on Github</a>, so you can read through what&#39;s actually being changed and put in place</li>
<li>There&#39;s also a <a href="https://www.youtube.com/watch?v=LZeKDM5jc90" rel="nofollow">video guide</a> to the entire process, if you&#39;re more of a visual person
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=365.0" rel="nofollow">OPNsense 15.1.10 released</a></h3>

<ul>
<li>Speaking of BSD routers, if you&#39;re looking for a &quot;prebuilt and ready to go&quot; option, OPNsense has just released a new version</li>
<li>15.1.10 drops some of the legacy patches they inherited from pfSense, aiming to stay closer to the mainline FreeBSD source code</li>
<li>Going along with this theme, they&#39;ve redone how they do ports, and are now kept totally in sync with the regular ports tree</li>
<li>Their binary packages are now signed using the fingerprint-style method, various GUI menus have been rewritten and a number of other bugs were fixed</li>
<li>NanoBSD-based images are also available now, so you can try it out on hardware with constrained resources as well</li>
<li>Version <a href="https://twitter.com/opnsense/status/596009164746432512" rel="nofollow">15.1.10.1</a> was released shortly thereafter, including a hotfix for VLANs
***</li>
</ul>

<h3><a href="https://www.ibm.com/developerworks/community/blogs/hpcgoulash/entry/ibm_workpad_z50_netbsd_an_interesting_combination1?lang=en" rel="nofollow">IBM Workpad Z50 and NetBSD</a></h3>

<ul>
<li>Before the infamous netbook fad came and went, IBM had a handheld PDA device that looked pretty much the same</li>
<li>Back in 1999, they released <a href="http://www.hpcfactor.com/reviews/hardware/ibm/workpad-z50/" rel="nofollow">the Workpad Z50</a> with Windows CE, sporting a 131MHz MIPS CPU, 16MB of RAM and a 640x480 display</li>
<li>You can probably tell where this is going... the article is about installing NetBSD it</li>
<li>&quot;What prevents me from taking my pristine Workpad z50 to the local electronics recycling  facility is NetBSD. With a little effort it is possible to install recent versions of NetBSD on the Workpad z50 and even have XWindows running&quot;</li>
<li>The author got pkgsrc up and running on it too, and cleverly used distcc to offload the compiling jobs to something a bit more modern</li>
<li>He&#39;s also got a <a href="https://www.youtube.com/watch?v=hSLVnSZKB9I" rel="nofollow">couple</a> <a href="https://www.youtube.com/watch?v=mIA-NWEHLM4" rel="nofollow">videos</a> of the bootup process and running Xorg (neither of which we&#39;d call &quot;speedy&quot; by any stretch of the imagination)
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/04/from-trenches-tips-tricks-edition.html" rel="nofollow">FreeBSD from the trenches</a></h3>

<ul>
<li>The FreeBSD foundation has a new blog post up in their &quot;from the trenches&quot; series, detailing FreeBSD in some real-world use cases</li>
<li>In this installment, Glen Barber talks about how he sets up all his laptops with ZFS and GELI</li>
<li>While the installer allows for an automatic ZFS layout, Glen notes that it&#39;s not a one-size-fits-all thing, and goes through doing everything manually</li>
<li>Each command is explained, and he walks you through the process of doing <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">an encrypted installation</a> on your root zpool
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207671.html" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>DragonFlyBSD has officially won the race to get an Intel Broadwell graphics driver</li>
<li>Their i915 driver has been brought up to speed with Linux 3.14&#39;s, adding not only Broadwell support, but many other bugfixes for other cards too</li>
<li>It&#39;s planned for commit to the main tree very soon, but you can test it out with a git branch for the time being
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216QQcHyX" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21hGSk3c0" rel="nofollow">Hunter writes in</a></li>
<li><a href="http://slexy.org/view/s20JwPw9Je" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2x1GYr7y6" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s2swXxr2PX" rel="nofollow">Sergei writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2015-May/004541.html" rel="nofollow">How did you guess</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>81: Puffy in a Box</title>
  <link>https://www.bsdnow.tv/81</link>
  <guid isPermaLink="false">a8a11e67-acad-44db-b8d9-840c53f401f9</guid>
  <pubDate>Wed, 18 Mar 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a8a11e67-acad-44db-b8d9-840c53f401f9.mp3" length="62032180" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from AsiaBSDCon! This week on the show, we'll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They're getting BSD in the hands of Windows admins who don't even realize it. We also have all this week's news and answer to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back from AsiaBSDCon! This week on the show, we'll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They're getting BSD in the hands of Windows admins who don't even realize it. We also have all this week's news and answer to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Using OpenBGPD to distribute pf table updates (http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers)
For those not familiar, OpenBGPD (https://en.wikipedia.org/wiki/OpenBGPD) is a daemon for the Border Gateway Protocol (https://en.wikipedia.org/wiki/Border_Gateway_Protocol) - a way for routers on the internet to discover and exchange routes to different addresses
This post, inspired by a talk about using BGP to distribute spam lists (https://www.youtube.com/watch?v=Vet0eQB00X0), details how to use the protocol to distribute some other useful lists and information
It begins with "One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems."
If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files
OpenBGPD is part of the OpenBSD base system, but there's also an unofficial port to FreeBSD (https://www.freshports.org/net/openbgpd/) and a "work in progress" pkgsrc version (http://pkgsrc.se/wip/openbgpd)
***
Mounting removable media with autofs (http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html)
The FreeBSD foundation has a new article in the "FreeBSD from the trenches" series, this time about the sponsored autofs (https://www.freebsd.org/cgi/man.cgi?query=autofs&amp;amp;sektion=5) tool
It's written by one of the autofs developers, and he details his work on creating and using the utility
"The purpose of autofs(5) is to mount filesystems on access, in a way that's transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes."
He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives
It ends with a real-world example of something we're all probably familiar with: plugging in USB drives and watching the magic happen
There's also some more advanced bonus material on GEOM classes and all the more technical details
***
The Tor Browser on BSD (http://trac.haqistan.net/blog/adventures-ports-tor-browser)
The Tor Project has provided a "browser bundle (https://www.torproject.org/projects/torbrowser/design/)" for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source
Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost 
It has, however, only been released for Windows, OS X and Linux - no BSD version
"[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves."
Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started
If you've got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***
OpenSSH 6.8 released (https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html)
Continuing their "tick tock" pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it's a major upgrade, focused on new features (we like those better of course)
Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability
This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints
Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys
You can now require multiple, different public keys to be verified for a user to authenticate (useful if you're extra paranoid or don't have 100% confidence in any single key type)
The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon
Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***
NetBSD at AsiaBSDCon (https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html)
The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you'd expect
It covers their BoF session, the six NetBSD-related presentations and finally their "work in progress" session
There was a grand total of 34 different NetBSD gadgets (https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0) on display at the event
***
Interview - Lawrence Teo - lteo@openbsd.org (mailto:lteo@openbsd.org) / @lteo (https://twitter.com/lteo)
OpenBSD at Calyptix (http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf)
News Roundup
HardenedBSD introduces Integriforce (http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce)
A little bit of background on this one first: NetBSD has something called veriexec (https://www.netbsd.org/docs/guide/en/chap-veriexec.html), used for checking file integrity (http://wiki.netbsd.org/guide/veriexec/) at the kernel level
By doing it at the kernel level, similar to securelevels (https://en.wikipedia.org/wiki/Securelevel), it offers some level of protection even when the root account is compromised
HardenedBSD has introduced a similar mechanism into their "secadm" utility
You can list binaries in the config file that you want to be protected from changes, then specify whether those can't be run (http://i.imgur.com/wHp2eAN.png) at all, or if they just print a warning
They're looking for some more extensive testing of this new feature
***
More s2k15 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20150305100712&amp;amp;mode=flat)
A couple more Australian hackathon reports have poured in since the last time
The first comes from Jonathan Gray, who's done a lot of graphics-related work in OpenBSD recently
He worked on getting some newer "Southern Islands" and "Graphics Core Next" AMD GPUs working, as well as some OpenGL and DRM-related things
Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in mandoc (http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man)
Ted Unangst also sent in a report (http://undeadly.org/cgi?action=article&amp;amp;sid=20150307165135&amp;amp;mode=flat) to detail what he hacked on at the event
With a strong focus on improving SMP scalability, he tackled the virtual memory layer
His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8
All the trip reports are much more detailed than our short summaries, so give them a read if you're interested in all the technicalities
***
DragonFly 4.0.4 and IPFW3 (https://www.dragonflydigest.com/2015/03/10/15733.html)
DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4
It includes a minor list of fixes (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html), some of which include a HAMMER FS history fix, removing the no-longer-needed "new xorg" and "with kms" variables and a few LAGG fixes
There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version
Shortly after it was released, their new IPFW2 firewall was added to the tree (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html) and subsequently renamed to IPFW3 (http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html) (since it's technically the third revision)
***
NetBSD gets Raspberry Pi 2 support (https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added)
NetBSD has announced initial support for the second revision (http://www.raspberrypi.org/products/raspberry-pi-2-model-b/) of the ever-popular Raspberry Pi board
There are -current snapshots available for download, and multiprocessor support is also on the way
The NetBSD wiki page about the Raspberry Pi also has some more information (https://wiki.netbsd.org/ports/evbarm/raspberry_pi/) and an installation guide
The usual Hacker News discussion (https://news.ycombinator.com/item?id=9172100) on the subject
If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***
OpenIKED as a VPN gateway (http://puffysecurity.com/wiki/openikedoffshore.html)
In our first discussion segment, we talked about a few different ways to tunnel your traffic
While we've done full tutorials on things like SSH tunnels (http://www.bsdnow.tv/tutorials/stunnel), OpenVPN (http://www.bsdnow.tv/tutorials/openvpn) and Tor (http://www.bsdnow.tv/tutorials/tor), we haven't talked a whole lot about OpenBSD's IPSEC suite
This article should help fill that gap - it walks you through the complete IKED setup
From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide's got it all
***
Feedback/Questions
Gary writes in (http://slexy.org/view/s21G9TWALE)
Robert writes in (http://slexy.org/view/s206aZrxOi)
Joris writes in (http://slexy.org/view/s28Um5R7LG)
Mike writes in (http://slexy.org/view/s2yAJsl1Es)
Anders writes in (http://slexy.org/view/s21dMAE55M)
***
Mailing List Gold
Can you hear me now (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142577632205484&amp;amp;w=2)
He must be GNU here (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html)
I've seen some... (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142593175408756&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, calyptix, router, gateway, pfsense, opnsense, smb, asiabsdcon, 2015, openbgpd, openiked, hardenedbsd, tor, vpn, autofs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week on the show, we&#39;ll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They&#39;re getting BSD in the hands of Windows admins who don&#39;t even realize it. We also have all this week&#39;s news and answer to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers" rel="nofollow">Using OpenBGPD to distribute pf table updates</a></h3>

<ul>
<li>For those not familiar, <a href="https://en.wikipedia.org/wiki/OpenBGPD" rel="nofollow">OpenBGPD</a> is a daemon for the <a href="https://en.wikipedia.org/wiki/Border_Gateway_Protocol" rel="nofollow">Border Gateway Protocol</a> - a way for routers on the internet to discover and exchange routes to different addresses</li>
<li>This post, inspired by <a href="https://www.youtube.com/watch?v=Vet0eQB00X0" rel="nofollow">a talk about using BGP to distribute spam lists</a>, details how to use the protocol to distribute some other useful lists and information</li>
<li>It begins with &quot;One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems.&quot;</li>
<li>If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files</li>
<li>OpenBGPD is part of the OpenBSD base system, but there&#39;s also an unofficial port <a href="https://www.freshports.org/net/openbgpd/" rel="nofollow">to FreeBSD</a> and a &quot;work in progress&quot; <a href="http://pkgsrc.se/wip/openbgpd" rel="nofollow">pkgsrc version</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html" rel="nofollow">Mounting removable media with autofs</a></h3>

<ul>
<li>The FreeBSD foundation has a new article in the &quot;FreeBSD from the trenches&quot; series, this time about the sponsored <a href="https://www.freebsd.org/cgi/man.cgi?query=autofs&sektion=5" rel="nofollow">autofs</a> tool</li>
<li>It&#39;s written by one of the autofs developers, and he details his work on creating and using the utility</li>
<li>&quot;The purpose of autofs(5) is to mount filesystems on access, in a way that&#39;s transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes.&quot;</li>
<li>He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives</li>
<li>It ends with a real-world example of something we&#39;re all probably familiar with: plugging in USB drives and watching the magic happen</li>
<li>There&#39;s also some more advanced bonus material on GEOM classes and all the more technical details
***</li>
</ul>

<h3><a href="http://trac.haqistan.net/blog/adventures-ports-tor-browser" rel="nofollow">The Tor Browser on BSD</a></h3>

<ul>
<li>The Tor Project has provided a &quot;<a href="https://www.torproject.org/projects/torbrowser/design/" rel="nofollow">browser bundle</a>&quot; for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source</li>
<li>Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost </li>
<li>It has, however, only been released for Windows, OS X and Linux - no BSD version</li>
<li>&quot;[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves.&quot;</li>
<li>Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started</li>
<li>If you&#39;ve got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html" rel="nofollow">OpenSSH 6.8 released</a></h3>

<ul>
<li>Continuing their &quot;tick tock&quot; pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it&#39;s a major upgrade, focused on new features (we like those better of course)</li>
<li>Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability</li>
<li>This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints</li>
<li>Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys</li>
<li>You can now require multiple, different public keys to be verified for a user to authenticate (useful if you&#39;re extra paranoid or don&#39;t have 100% confidence in any single key type)</li>
<li>The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon</li>
<li>Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you&#39;d expect</li>
<li>It covers their BoF session, the six NetBSD-related presentations and finally their &quot;work in progress&quot; session</li>
<li>There was a grand total of <a href="https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0" rel="nofollow">34 different NetBSD gadgets</a> on display at the event
***</li>
</ul>

<h2>Interview - Lawrence Teo - <a href="mailto:lteo@openbsd.org" rel="nofollow">lteo@openbsd.org</a> / <a href="https://twitter.com/lteo" rel="nofollow">@lteo</a></h2>

<p>OpenBSD <a href="http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf" rel="nofollow">at Calyptix</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce" rel="nofollow">HardenedBSD introduces Integriforce</a></h3>

<ul>
<li>A little bit of background on this one first: NetBSD has something called <a href="https://www.netbsd.org/docs/guide/en/chap-veriexec.html" rel="nofollow">veriexec</a>, used for <a href="http://wiki.netbsd.org/guide/veriexec/" rel="nofollow">checking file integrity</a> at the kernel level</li>
<li>By doing it at the kernel level, similar to <a href="https://en.wikipedia.org/wiki/Securelevel" rel="nofollow">securelevels</a>, it offers some level of protection even when the root account is compromised</li>
<li>HardenedBSD has introduced a similar mechanism into their &quot;secadm&quot; utility</li>
<li>You can list binaries in the config file that you want to be protected from changes, then specify whether those <a href="http://i.imgur.com/wHp2eAN.png" rel="nofollow">can&#39;t be run</a> at all, or if they just print a warning</li>
<li>They&#39;re looking for some more extensive testing of this new feature
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150305100712&mode=flat" rel="nofollow">More s2k15 hackathon reports</a></h3>

<ul>
<li>A couple more Australian hackathon reports have poured in since the last time</li>
<li>The first comes from Jonathan Gray, who&#39;s done a lot of graphics-related work in OpenBSD recently</li>
<li>He worked on getting some newer &quot;Southern Islands&quot; and &quot;Graphics Core Next&quot; AMD GPUs working, as well as some OpenGL and DRM-related things</li>
<li>Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Ted Unangst also <a href="http://undeadly.org/cgi?action=article&sid=20150307165135&mode=flat" rel="nofollow">sent in a report</a> to detail what he hacked on at the event</li>
<li>With a strong focus on improving SMP scalability, he tackled the virtual memory layer</li>
<li>His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8</li>
<li>All the trip reports are <strong>much</strong> more detailed than our short summaries, so give them a read if you&#39;re interested in all the technicalities
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/03/10/15733.html" rel="nofollow">DragonFly 4.0.4 and IPFW3</a></h3>

<ul>
<li>DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4</li>
<li>It includes a minor <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html" rel="nofollow">list of fixes</a>, some of which include a HAMMER FS history fix, removing the no-longer-needed &quot;new xorg&quot; and &quot;with kms&quot; variables and a few LAGG fixes</li>
<li>There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version</li>
<li>Shortly after it was released, their new IPFW2 firewall was <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html" rel="nofollow">added to the tree</a> and subsequently renamed to <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html" rel="nofollow">IPFW3</a> (since it&#39;s technically the third revision)
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added" rel="nofollow">NetBSD gets Raspberry Pi 2 support</a></h3>

<ul>
<li>NetBSD has announced initial support for the <a href="http://www.raspberrypi.org/products/raspberry-pi-2-model-b/" rel="nofollow">second revision</a> of the ever-popular Raspberry Pi board</li>
<li>There are -current snapshots available for download, and multiprocessor support is also on the way</li>
<li>The NetBSD wiki page about the Raspberry Pi also has some <a href="https://wiki.netbsd.org/ports/evbarm/raspberry_pi/" rel="nofollow">more information</a> and an installation guide</li>
<li>The usual <a href="https://news.ycombinator.com/item?id=9172100" rel="nofollow">Hacker News discussion</a> on the subject</li>
<li>If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***</li>
</ul>

<h3><a href="http://puffysecurity.com/wiki/openikedoffshore.html" rel="nofollow">OpenIKED as a VPN gateway</a></h3>

<ul>
<li>In our first discussion segment, we talked about a few different ways to tunnel your traffic</li>
<li>While we&#39;ve done full tutorials on things like <a href="http://www.bsdnow.tv/tutorials/stunnel" rel="nofollow">SSH tunnels</a>, <a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">OpenVPN</a> and <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor</a>, we haven&#39;t talked a whole lot about OpenBSD&#39;s IPSEC suite</li>
<li>This article should help fill that gap - it walks you through the complete IKED setup</li>
<li>From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide&#39;s got it all
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G9TWALE" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s206aZrxOi" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s28Um5R7LG" rel="nofollow">Joris writes in</a></li>
<li><a href="http://slexy.org/view/s2yAJsl1Es" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21dMAE55M" rel="nofollow">Anders writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142577632205484&w=2" rel="nofollow">Can you hear me now</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html" rel="nofollow">He must be GNU here</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142593175408756&w=2" rel="nofollow">I&#39;ve seen some...</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week on the show, we&#39;ll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They&#39;re getting BSD in the hands of Windows admins who don&#39;t even realize it. We also have all this week&#39;s news and answer to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers" rel="nofollow">Using OpenBGPD to distribute pf table updates</a></h3>

<ul>
<li>For those not familiar, <a href="https://en.wikipedia.org/wiki/OpenBGPD" rel="nofollow">OpenBGPD</a> is a daemon for the <a href="https://en.wikipedia.org/wiki/Border_Gateway_Protocol" rel="nofollow">Border Gateway Protocol</a> - a way for routers on the internet to discover and exchange routes to different addresses</li>
<li>This post, inspired by <a href="https://www.youtube.com/watch?v=Vet0eQB00X0" rel="nofollow">a talk about using BGP to distribute spam lists</a>, details how to use the protocol to distribute some other useful lists and information</li>
<li>It begins with &quot;One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems.&quot;</li>
<li>If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files</li>
<li>OpenBGPD is part of the OpenBSD base system, but there&#39;s also an unofficial port <a href="https://www.freshports.org/net/openbgpd/" rel="nofollow">to FreeBSD</a> and a &quot;work in progress&quot; <a href="http://pkgsrc.se/wip/openbgpd" rel="nofollow">pkgsrc version</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html" rel="nofollow">Mounting removable media with autofs</a></h3>

<ul>
<li>The FreeBSD foundation has a new article in the &quot;FreeBSD from the trenches&quot; series, this time about the sponsored <a href="https://www.freebsd.org/cgi/man.cgi?query=autofs&sektion=5" rel="nofollow">autofs</a> tool</li>
<li>It&#39;s written by one of the autofs developers, and he details his work on creating and using the utility</li>
<li>&quot;The purpose of autofs(5) is to mount filesystems on access, in a way that&#39;s transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes.&quot;</li>
<li>He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives</li>
<li>It ends with a real-world example of something we&#39;re all probably familiar with: plugging in USB drives and watching the magic happen</li>
<li>There&#39;s also some more advanced bonus material on GEOM classes and all the more technical details
***</li>
</ul>

<h3><a href="http://trac.haqistan.net/blog/adventures-ports-tor-browser" rel="nofollow">The Tor Browser on BSD</a></h3>

<ul>
<li>The Tor Project has provided a &quot;<a href="https://www.torproject.org/projects/torbrowser/design/" rel="nofollow">browser bundle</a>&quot; for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source</li>
<li>Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost </li>
<li>It has, however, only been released for Windows, OS X and Linux - no BSD version</li>
<li>&quot;[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves.&quot;</li>
<li>Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started</li>
<li>If you&#39;ve got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html" rel="nofollow">OpenSSH 6.8 released</a></h3>

<ul>
<li>Continuing their &quot;tick tock&quot; pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it&#39;s a major upgrade, focused on new features (we like those better of course)</li>
<li>Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability</li>
<li>This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints</li>
<li>Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys</li>
<li>You can now require multiple, different public keys to be verified for a user to authenticate (useful if you&#39;re extra paranoid or don&#39;t have 100% confidence in any single key type)</li>
<li>The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon</li>
<li>Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you&#39;d expect</li>
<li>It covers their BoF session, the six NetBSD-related presentations and finally their &quot;work in progress&quot; session</li>
<li>There was a grand total of <a href="https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0" rel="nofollow">34 different NetBSD gadgets</a> on display at the event
***</li>
</ul>

<h2>Interview - Lawrence Teo - <a href="mailto:lteo@openbsd.org" rel="nofollow">lteo@openbsd.org</a> / <a href="https://twitter.com/lteo" rel="nofollow">@lteo</a></h2>

<p>OpenBSD <a href="http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf" rel="nofollow">at Calyptix</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce" rel="nofollow">HardenedBSD introduces Integriforce</a></h3>

<ul>
<li>A little bit of background on this one first: NetBSD has something called <a href="https://www.netbsd.org/docs/guide/en/chap-veriexec.html" rel="nofollow">veriexec</a>, used for <a href="http://wiki.netbsd.org/guide/veriexec/" rel="nofollow">checking file integrity</a> at the kernel level</li>
<li>By doing it at the kernel level, similar to <a href="https://en.wikipedia.org/wiki/Securelevel" rel="nofollow">securelevels</a>, it offers some level of protection even when the root account is compromised</li>
<li>HardenedBSD has introduced a similar mechanism into their &quot;secadm&quot; utility</li>
<li>You can list binaries in the config file that you want to be protected from changes, then specify whether those <a href="http://i.imgur.com/wHp2eAN.png" rel="nofollow">can&#39;t be run</a> at all, or if they just print a warning</li>
<li>They&#39;re looking for some more extensive testing of this new feature
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150305100712&mode=flat" rel="nofollow">More s2k15 hackathon reports</a></h3>

<ul>
<li>A couple more Australian hackathon reports have poured in since the last time</li>
<li>The first comes from Jonathan Gray, who&#39;s done a lot of graphics-related work in OpenBSD recently</li>
<li>He worked on getting some newer &quot;Southern Islands&quot; and &quot;Graphics Core Next&quot; AMD GPUs working, as well as some OpenGL and DRM-related things</li>
<li>Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Ted Unangst also <a href="http://undeadly.org/cgi?action=article&sid=20150307165135&mode=flat" rel="nofollow">sent in a report</a> to detail what he hacked on at the event</li>
<li>With a strong focus on improving SMP scalability, he tackled the virtual memory layer</li>
<li>His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8</li>
<li>All the trip reports are <strong>much</strong> more detailed than our short summaries, so give them a read if you&#39;re interested in all the technicalities
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/03/10/15733.html" rel="nofollow">DragonFly 4.0.4 and IPFW3</a></h3>

<ul>
<li>DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4</li>
<li>It includes a minor <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html" rel="nofollow">list of fixes</a>, some of which include a HAMMER FS history fix, removing the no-longer-needed &quot;new xorg&quot; and &quot;with kms&quot; variables and a few LAGG fixes</li>
<li>There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version</li>
<li>Shortly after it was released, their new IPFW2 firewall was <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html" rel="nofollow">added to the tree</a> and subsequently renamed to <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html" rel="nofollow">IPFW3</a> (since it&#39;s technically the third revision)
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added" rel="nofollow">NetBSD gets Raspberry Pi 2 support</a></h3>

<ul>
<li>NetBSD has announced initial support for the <a href="http://www.raspberrypi.org/products/raspberry-pi-2-model-b/" rel="nofollow">second revision</a> of the ever-popular Raspberry Pi board</li>
<li>There are -current snapshots available for download, and multiprocessor support is also on the way</li>
<li>The NetBSD wiki page about the Raspberry Pi also has some <a href="https://wiki.netbsd.org/ports/evbarm/raspberry_pi/" rel="nofollow">more information</a> and an installation guide</li>
<li>The usual <a href="https://news.ycombinator.com/item?id=9172100" rel="nofollow">Hacker News discussion</a> on the subject</li>
<li>If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***</li>
</ul>

<h3><a href="http://puffysecurity.com/wiki/openikedoffshore.html" rel="nofollow">OpenIKED as a VPN gateway</a></h3>

<ul>
<li>In our first discussion segment, we talked about a few different ways to tunnel your traffic</li>
<li>While we&#39;ve done full tutorials on things like <a href="http://www.bsdnow.tv/tutorials/stunnel" rel="nofollow">SSH tunnels</a>, <a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">OpenVPN</a> and <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor</a>, we haven&#39;t talked a whole lot about OpenBSD&#39;s IPSEC suite</li>
<li>This article should help fill that gap - it walks you through the complete IKED setup</li>
<li>From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide&#39;s got it all
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G9TWALE" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s206aZrxOi" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s28Um5R7LG" rel="nofollow">Joris writes in</a></li>
<li><a href="http://slexy.org/view/s2yAJsl1Es" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21dMAE55M" rel="nofollow">Anders writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142577632205484&w=2" rel="nofollow">Can you hear me now</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html" rel="nofollow">He must be GNU here</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142593175408756&w=2" rel="nofollow">I&#39;ve seen some...</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>73: Pipe Dreams</title>
  <link>https://www.bsdnow.tv/73</link>
  <guid isPermaLink="false">bca95163-7c0b-4440-902b-594ea8c61554</guid>
  <pubDate>Wed, 21 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/bca95163-7c0b-4440-902b-594ea8c61554.mp3" length="65969428" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be chatting with David Maxwell, a former NetBSD security officer. He's got an interesting project called Pipecut that takes a whole new approach to the commandline. We've also got answers to viewer-submitted questions and all this week's headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:31:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we'll be chatting with David Maxwell, a former NetBSD security officer. He's got an interesting project called Pipecut that takes a whole new approach to the commandline. We've also got answers to viewer-submitted questions and all this week's headlines, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2014-10-2014-12.html)
The FreeBSD team has posted an updated on some of their activities between October and December of 2014
They put a big focus on compatibility with other systems: the Linux emulation layer, bhyve (http://www.bsdnow.tv/tutorials/bhyve), WINE and Xen all got some nice improvements
As always, the report has lots of updates from the various teams working on different parts of the OS and ports infrastructure
The release engineering team got 10.1 out the door, the ports team shuffled a few members in and out and continued working on closing more PRs
FreeBSD's forums underwent a huge change, and discussion about the new support model for release cycles continues (hopefully taking effect after 11.0 is released)
Git was promoted from beta to an officially-supported version control system (Kris is happy)
The core team is also assembling a new QA team to ensure better code quality in critical areas, such as security and release engineering, after getting a number of complaints
Other notable entries include: lots of bhyve fixes, Clang/LLVM being updated to 3.5.0, ongoing work to the external toolchain, adding FreeBSD support to more "cloud" services, pkgng updates, work on SecureBoot, more ARM support and graphics stack improvements
Check out the full report for all the details that we didn't cover
***
OpenBSD package signature audit (http://linux-audit.com/vulnerabilities-and-digital-signatures-for-openbsd-software-packages/)
"Linux Audit" is a website focused on auditing and hardening systems, as well as educating people about securing their boxes
They recently did an article about OpenBSD, specifically their ports and package system (http://www.bsdnow.tv/tutorials/ports-obsd) and signing infrastructure
The author gives a little background on the difference between ports and binary packages, then goes through the technical details of how releases and packages are cryptographically signed
Package signature formats and public key distribution methods are also touched on
After some heckling, the author of the post said he plans to write more BSD security articles, so look forward to them in the future
If you haven't seen our episode about signify (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) with Ted Unangst, that would be a great one to check out after reading this
***
Replacing a Linux router with BSD (http://ask.slashdot.org/story/15/01/15/1547209/ask-slashdot-migrating-a-router-from-linux-to-bsd)
There was recently a Slashdot discussion about migrating a Linux-based router to a BSD-based one
The poster begins with "I'm in the camp that doesn't trust systemd. You can discuss the technical merits of all init solutions all you want, but if I wanted to run Windows NT I'd run Windows NT, not Linux. So I've decided to migrate my homebrew router/firewall/samba server to one of the BSDs."
A lot of people were quick to recommend OPNsense (http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach) and pfSense, being that they're very easy to administer (requiring basically no BSD knowledge at all)
Other commenters suggested a more hands-on approach, setting one up yourself with FreeBSD (http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/) or OpenBSD (http://www.bsdnow.tv/tutorials/openbsd-router)
If you've been thinking about moving some routers over from Linux or other commercial solution, this might be a good discussion to read through
Unfortunately, a lot of the comments are just Linux users bickering about systemd, so you'll have to wade through some of that to get to the good information
***
LibreSSL in FreeBSD and OPNsense (http://bsdxbsdx.blogspot.com/2015/01/switching-to-openssl-from-ports-in.html)
A FreeBSD sysadmin has started documenting his experience replacing OpenSSL in the base system with the one from ports (and also experimenting with LibreSSL)
The reasoning being that updates in base tend to lag behind (http://www.openbsd.org/papers/eurobsdcon2014-libressl.html), whereas the port can be updated for security very quickly
OPNsense developers are looking into (https://twitter.com/fitchitis/status/555625679614521345)  switching away (http://forum.opnsense.org/index.php?topic=21.0) from OpenSSL to LibreSSL's portable version (http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl), for both their ports and base system, which would be a pretty huge differentiator for their project
Some ports still need fixing (https://bugs.freebsd.org/bugzilla/buglist.cgi?order=Importance&amp;amp;query_format=advanced&amp;amp;short_desc=libressl&amp;amp;short_desc_type=allwordssubstr) to be compatible though, particularly a few (https://github.com/opnsense/ports/commit/c15af648e9d5fcecf0ae666292e8f41c08979057) python-related (https://github.com/pyca/cryptography/issues/928) ones
If you're a FreeBSD ports person, get involved and help squash some of the last remaining bugs
A lot of the work has already been done in OpenBSD's ports tree (http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/) - some patches just need to be adopted
More and more upstream projects are incorporating LibreSSL patches in their code - let your favorite software vendor know that you're using it
***
Interview - David Maxwell - david@netbsd.org (mailto:david@netbsd.org) / @davidwmaxwell (https://twitter.com/david_w_maxwell)
Pipecut (https://www.youtube.com/watch?v=CZHEZHK4jRc), text processing, commandline wizardry
News Roundup
Jetpack, a new jail container system (https://github.com/3ofcoins/jetpack)
A new project was launched to adapt FreeBSD jails to the "app container specification"
While still pretty experimental in terms of the development phase, this might be something to show your Linux friends who are in love with docker
It's a similar project to iocage (https://github.com/pannon/iocage) or bsdploy (https://github.com/ployground/bsdploy), which we haven't talked a whole lot about
There was also some discussion (https://news.ycombinator.com/item?id=8893630) about it on Hacker News
***
Separating base and package binaries (https://www.reddit.com/r/BSD/comments/2szofc)
All of the main BSDs make a strong separation between the base system and third party software
This is in contrast to Linux where there's no real concept of a "base system" - more recently, some distros have even merged all the binaries into a single directory
A user asks the community about the BSD way of doing it, trying to find out the advantages and disadvantages of both hierarchies
Read the comments for the full explanation, but having things separated really helps keep things organized
***
Updated i915kms driver for FreeBSD (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=277487)
This update brings the FreeBSD code closer inline with the Linux code, to make it easier to update going forward
It doesn't introduce Haswell support just yet, but was required before the Haswell bits can be added
***
Year of the OpenBSD desktop (http://zacbrown.org/2015/01/18/openbsd-as-a-desktop/)
Here we have an article about using OpenBSD as a daily driver for regular desktop usage
The author says he "ran fifty thousand different distributions, never being satisfied"
After dealing with the problems of Linux and fragmentation, he eventually gave up and bought a Macbook
He also used FreeBSD between versions 7 and 9, finding a "a mostly harmonious environment," but regressions lead him to give up on desktop *nix once again
Starting with 2015, he's back and is using OpenBSD on a Thinkpad x201
The rest of the article covers some of his configuration tweaks and gives an overall conclusion on his current setup
He apparently used our desktop tutorial (http://www.bsdnow.tv/tutorials/the-desktop-obsd) - thanks for watching!
***
Unattended FreeBSD installation (http://louwrentius.com/freebsd-101-unattended-install-over-pxe-http-no-nfs.html)
A new BSD user was looking to get some more experience, so he documented how to install FreeBSD over PXE
His goal was to have a setup similar to Redhat's "kickstart" or OpenBSD's autoinstall (http://www.bsdnow.tv/tutorials/autoinstall)
The article shows you how to set up DHCP and TFTP, with no NFS share setup required
He also gives a mention to mfsbsd, showing how you can customize its startup script to do most of the work for you
***
Feedback/Questions
Robert writes in (http://slexy.org/view/s20UsZjN4h)
Sean writes in (http://slexy.org/view/s219cMQz3U)
l33tname writes in (http://slexy.org/view/s2EkzMUMyb)
Charlie writes in (http://slexy.org/view/s2nq6L6H1n)
Eric writes in (http://slexy.org/view/s21EGqUYLd)
***
Mailing List Gold
Clowning around (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142159202606668&amp;amp;w=2)
Better than succeeding in this case (https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097734.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pipecut, david maxwell, commandline, shell, libressl, router, pf, cryptography, router, openssl, bhyve, digitalocean</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be chatting with David Maxwell, a former NetBSD security officer. He&#39;s got an interesting project called Pipecut that takes a whole new approach to the commandline. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-10-2014-12.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted an updated on some of their activities between October and December of 2014</li>
<li>They put a big focus on compatibility with other systems: the Linux emulation layer, <a href="http://www.bsdnow.tv/tutorials/bhyve" rel="nofollow">bhyve</a>, WINE and Xen all got some nice improvements</li>
<li>As always, the report has lots of updates from the various teams working on different parts of the OS and ports infrastructure</li>
<li>The release engineering team got 10.1 out the door, the ports team shuffled a few members in and out and continued working on closing more PRs</li>
<li>FreeBSD&#39;s forums underwent a huge change, and discussion about the new support model for release cycles continues (hopefully taking effect after 11.0 is released)</li>
<li>Git was promoted from beta to an officially-supported version control system (Kris is happy)</li>
<li>The core team is also assembling a new QA team to ensure better code quality in critical areas, such as security and release engineering, after getting a number of complaints</li>
<li>Other notable entries include: lots of bhyve fixes, Clang/LLVM being updated to 3.5.0, ongoing work to the external toolchain, adding FreeBSD support to more &quot;cloud&quot; services, pkgng updates, work on SecureBoot, more ARM support and graphics stack improvements</li>
<li>Check out the full report for all the details that we didn&#39;t cover
***</li>
</ul>

<h3><a href="http://linux-audit.com/vulnerabilities-and-digital-signatures-for-openbsd-software-packages/" rel="nofollow">OpenBSD package signature audit</a></h3>

<ul>
<li>&quot;Linux Audit&quot; is a website focused on auditing and hardening systems, as well as educating people about securing their boxes</li>
<li>They recently did an article about OpenBSD, specifically their <a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">ports and package system</a> and signing infrastructure</li>
<li>The author gives a little background on the difference between ports and binary packages, then goes through the technical details of how releases and packages are cryptographically signed</li>
<li>Package signature formats and public key distribution methods are also touched on</li>
<li>After some heckling, the author of the post said he plans to write more BSD security articles, so look forward to them in the future</li>
<li>If you haven&#39;t seen <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">our episode about signify</a> with Ted Unangst, that would be a great one to check out after reading this
***</li>
</ul>

<h3><a href="http://ask.slashdot.org/story/15/01/15/1547209/ask-slashdot-migrating-a-router-from-linux-to-bsd" rel="nofollow">Replacing a Linux router with BSD</a></h3>

<ul>
<li>There was recently a Slashdot discussion about migrating a Linux-based router to a BSD-based one</li>
<li>The poster begins with &quot;I&#39;m in the camp that doesn&#39;t trust systemd. You can discuss the technical merits of all init solutions all you want, but if I wanted to run Windows NT I&#39;d run Windows NT, not Linux. So I&#39;ve decided to migrate my homebrew router/firewall/samba server to one of the BSDs.&quot;</li>
<li>A lot of people were quick to recommend <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a> and pfSense, being that they&#39;re very easy to administer (requiring basically no BSD knowledge at all)</li>
<li>Other commenters suggested a more hands-on approach, setting one up yourself with <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a> or <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a></li>
<li>If you&#39;ve been thinking about moving some routers over from Linux or other commercial solution, this might be a good discussion to read through</li>
<li>Unfortunately, a lot of the comments are just Linux users bickering about systemd, so you&#39;ll have to wade through some of that to get to the good information
***</li>
</ul>

<h3><a href="http://bsdxbsdx.blogspot.com/2015/01/switching-to-openssl-from-ports-in.html" rel="nofollow">LibreSSL in FreeBSD and OPNsense</a></h3>

<ul>
<li>A FreeBSD sysadmin has started documenting his experience replacing OpenSSL in the base system with the one from ports (and also experimenting with LibreSSL)</li>
<li>The reasoning being that updates in base <a href="http://www.openbsd.org/papers/eurobsdcon2014-libressl.html" rel="nofollow">tend to lag behind</a>, whereas the port can be updated for security very quickly</li>
<li>OPNsense developers are <a href="https://twitter.com/fitchitis/status/555625679614521345" rel="nofollow">looking into</a>  <a href="http://forum.opnsense.org/index.php?topic=21.0" rel="nofollow">switching away</a> from OpenSSL to <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">LibreSSL&#39;s portable version</a>, for both their ports and base system, which would be a pretty huge differentiator for their project</li>
<li>Some ports <a href="https://bugs.freebsd.org/bugzilla/buglist.cgi?order=Importance&query_format=advanced&short_desc=libressl&short_desc_type=allwordssubstr" rel="nofollow">still need fixing</a> to be compatible though, particularly <a href="https://github.com/opnsense/ports/commit/c15af648e9d5fcecf0ae666292e8f41c08979057" rel="nofollow">a few</a> <a href="https://github.com/pyca/cryptography/issues/928" rel="nofollow">python-related</a> ones</li>
<li>If you&#39;re a FreeBSD ports person, get involved and help squash some of the last remaining bugs</li>
<li>A lot of the work has already been done <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/" rel="nofollow">in OpenBSD&#39;s ports tree</a> - some patches just need to be adopted</li>
<li>More and more upstream projects are incorporating LibreSSL patches in their code - let your favorite software vendor know that you&#39;re using it
***</li>
</ul>

<h2>Interview - David Maxwell - <a href="mailto:david@netbsd.org" rel="nofollow">david@netbsd.org</a> / <a href="https://twitter.com/david_w_maxwell" rel="nofollow">@david_w_maxwell</a></h2>

<p><a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">Pipecut</a>, text processing, commandline wizardry</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/3ofcoins/jetpack" rel="nofollow">Jetpack, a new jail container system</a></h3>

<ul>
<li>A new project was launched to adapt FreeBSD jails to the &quot;app container specification&quot;</li>
<li>While still pretty experimental in terms of the development phase, this might be something to show your Linux friends who are in love with docker</li>
<li>It&#39;s a similar project to <a href="https://github.com/pannon/iocage" rel="nofollow">iocage</a> or <a href="https://github.com/ployground/bsdploy" rel="nofollow">bsdploy</a>, which we haven&#39;t talked a whole lot about</li>
<li>There was also <a href="https://news.ycombinator.com/item?id=8893630" rel="nofollow">some discussion</a> about it on Hacker News
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2szofc" rel="nofollow">Separating base and package binaries</a></h3>

<ul>
<li>All of the main BSDs make a strong separation between the base system and third party software</li>
<li>This is in contrast to Linux where there&#39;s no real concept of a &quot;base system&quot; - more recently, some distros have even merged all the binaries into a single directory</li>
<li>A user asks the community about the BSD way of doing it, trying to find out the advantages and disadvantages of both hierarchies</li>
<li>Read the comments for the full explanation, but having things separated really helps keep things organized
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=277487" rel="nofollow">Updated i915kms driver for FreeBSD</a></h3>

<ul>
<li>This update brings the FreeBSD code closer inline with the Linux code, to make it easier to update going forward</li>
<li>It doesn&#39;t introduce Haswell support just yet, but was required before the Haswell bits can be added
***</li>
</ul>

<h3><a href="http://zacbrown.org/2015/01/18/openbsd-as-a-desktop/" rel="nofollow">Year of the OpenBSD desktop</a></h3>

<ul>
<li>Here we have an article about using OpenBSD as a daily driver for regular desktop usage</li>
<li>The author says he &quot;ran fifty thousand different distributions, never being satisfied&quot;</li>
<li>After dealing with the problems of Linux and fragmentation, he eventually gave up and bought a Macbook</li>
<li>He also used FreeBSD between versions 7 and 9, finding a &quot;a mostly harmonious environment,&quot; but regressions lead him to give up on desktop *nix once again</li>
<li>Starting with 2015, he&#39;s back and is using OpenBSD on a Thinkpad x201</li>
<li>The rest of the article covers some of his configuration tweaks and gives an overall conclusion on his current setup</li>
<li>He apparently used <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">our desktop tutorial</a> - thanks for watching!
***</li>
</ul>

<h3><a href="http://louwrentius.com/freebsd-101-unattended-install-over-pxe-http-no-nfs.html" rel="nofollow">Unattended FreeBSD installation</a></h3>

<ul>
<li>A new BSD user was looking to get some more experience, so he documented how to install FreeBSD over PXE</li>
<li>His goal was to have a setup similar to Redhat&#39;s &quot;kickstart&quot; or <a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">OpenBSD&#39;s autoinstall</a></li>
<li>The article shows you how to set up DHCP and TFTP, with no NFS share setup required</li>
<li>He also gives a mention to mfsbsd, showing how you can customize its startup script to do most of the work for you
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20UsZjN4h" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s219cMQz3U" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2EkzMUMyb" rel="nofollow">l33tname writes in</a></li>
<li><a href="http://slexy.org/view/s2nq6L6H1n" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21EGqUYLd" rel="nofollow">Eric writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142159202606668&w=2" rel="nofollow">Clowning around</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097734.html" rel="nofollow">Better than succeeding in this case</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be chatting with David Maxwell, a former NetBSD security officer. He&#39;s got an interesting project called Pipecut that takes a whole new approach to the commandline. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-10-2014-12.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted an updated on some of their activities between October and December of 2014</li>
<li>They put a big focus on compatibility with other systems: the Linux emulation layer, <a href="http://www.bsdnow.tv/tutorials/bhyve" rel="nofollow">bhyve</a>, WINE and Xen all got some nice improvements</li>
<li>As always, the report has lots of updates from the various teams working on different parts of the OS and ports infrastructure</li>
<li>The release engineering team got 10.1 out the door, the ports team shuffled a few members in and out and continued working on closing more PRs</li>
<li>FreeBSD&#39;s forums underwent a huge change, and discussion about the new support model for release cycles continues (hopefully taking effect after 11.0 is released)</li>
<li>Git was promoted from beta to an officially-supported version control system (Kris is happy)</li>
<li>The core team is also assembling a new QA team to ensure better code quality in critical areas, such as security and release engineering, after getting a number of complaints</li>
<li>Other notable entries include: lots of bhyve fixes, Clang/LLVM being updated to 3.5.0, ongoing work to the external toolchain, adding FreeBSD support to more &quot;cloud&quot; services, pkgng updates, work on SecureBoot, more ARM support and graphics stack improvements</li>
<li>Check out the full report for all the details that we didn&#39;t cover
***</li>
</ul>

<h3><a href="http://linux-audit.com/vulnerabilities-and-digital-signatures-for-openbsd-software-packages/" rel="nofollow">OpenBSD package signature audit</a></h3>

<ul>
<li>&quot;Linux Audit&quot; is a website focused on auditing and hardening systems, as well as educating people about securing their boxes</li>
<li>They recently did an article about OpenBSD, specifically their <a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">ports and package system</a> and signing infrastructure</li>
<li>The author gives a little background on the difference between ports and binary packages, then goes through the technical details of how releases and packages are cryptographically signed</li>
<li>Package signature formats and public key distribution methods are also touched on</li>
<li>After some heckling, the author of the post said he plans to write more BSD security articles, so look forward to them in the future</li>
<li>If you haven&#39;t seen <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">our episode about signify</a> with Ted Unangst, that would be a great one to check out after reading this
***</li>
</ul>

<h3><a href="http://ask.slashdot.org/story/15/01/15/1547209/ask-slashdot-migrating-a-router-from-linux-to-bsd" rel="nofollow">Replacing a Linux router with BSD</a></h3>

<ul>
<li>There was recently a Slashdot discussion about migrating a Linux-based router to a BSD-based one</li>
<li>The poster begins with &quot;I&#39;m in the camp that doesn&#39;t trust systemd. You can discuss the technical merits of all init solutions all you want, but if I wanted to run Windows NT I&#39;d run Windows NT, not Linux. So I&#39;ve decided to migrate my homebrew router/firewall/samba server to one of the BSDs.&quot;</li>
<li>A lot of people were quick to recommend <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a> and pfSense, being that they&#39;re very easy to administer (requiring basically no BSD knowledge at all)</li>
<li>Other commenters suggested a more hands-on approach, setting one up yourself with <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a> or <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a></li>
<li>If you&#39;ve been thinking about moving some routers over from Linux or other commercial solution, this might be a good discussion to read through</li>
<li>Unfortunately, a lot of the comments are just Linux users bickering about systemd, so you&#39;ll have to wade through some of that to get to the good information
***</li>
</ul>

<h3><a href="http://bsdxbsdx.blogspot.com/2015/01/switching-to-openssl-from-ports-in.html" rel="nofollow">LibreSSL in FreeBSD and OPNsense</a></h3>

<ul>
<li>A FreeBSD sysadmin has started documenting his experience replacing OpenSSL in the base system with the one from ports (and also experimenting with LibreSSL)</li>
<li>The reasoning being that updates in base <a href="http://www.openbsd.org/papers/eurobsdcon2014-libressl.html" rel="nofollow">tend to lag behind</a>, whereas the port can be updated for security very quickly</li>
<li>OPNsense developers are <a href="https://twitter.com/fitchitis/status/555625679614521345" rel="nofollow">looking into</a>  <a href="http://forum.opnsense.org/index.php?topic=21.0" rel="nofollow">switching away</a> from OpenSSL to <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">LibreSSL&#39;s portable version</a>, for both their ports and base system, which would be a pretty huge differentiator for their project</li>
<li>Some ports <a href="https://bugs.freebsd.org/bugzilla/buglist.cgi?order=Importance&query_format=advanced&short_desc=libressl&short_desc_type=allwordssubstr" rel="nofollow">still need fixing</a> to be compatible though, particularly <a href="https://github.com/opnsense/ports/commit/c15af648e9d5fcecf0ae666292e8f41c08979057" rel="nofollow">a few</a> <a href="https://github.com/pyca/cryptography/issues/928" rel="nofollow">python-related</a> ones</li>
<li>If you&#39;re a FreeBSD ports person, get involved and help squash some of the last remaining bugs</li>
<li>A lot of the work has already been done <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/" rel="nofollow">in OpenBSD&#39;s ports tree</a> - some patches just need to be adopted</li>
<li>More and more upstream projects are incorporating LibreSSL patches in their code - let your favorite software vendor know that you&#39;re using it
***</li>
</ul>

<h2>Interview - David Maxwell - <a href="mailto:david@netbsd.org" rel="nofollow">david@netbsd.org</a> / <a href="https://twitter.com/david_w_maxwell" rel="nofollow">@david_w_maxwell</a></h2>

<p><a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">Pipecut</a>, text processing, commandline wizardry</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/3ofcoins/jetpack" rel="nofollow">Jetpack, a new jail container system</a></h3>

<ul>
<li>A new project was launched to adapt FreeBSD jails to the &quot;app container specification&quot;</li>
<li>While still pretty experimental in terms of the development phase, this might be something to show your Linux friends who are in love with docker</li>
<li>It&#39;s a similar project to <a href="https://github.com/pannon/iocage" rel="nofollow">iocage</a> or <a href="https://github.com/ployground/bsdploy" rel="nofollow">bsdploy</a>, which we haven&#39;t talked a whole lot about</li>
<li>There was also <a href="https://news.ycombinator.com/item?id=8893630" rel="nofollow">some discussion</a> about it on Hacker News
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2szofc" rel="nofollow">Separating base and package binaries</a></h3>

<ul>
<li>All of the main BSDs make a strong separation between the base system and third party software</li>
<li>This is in contrast to Linux where there&#39;s no real concept of a &quot;base system&quot; - more recently, some distros have even merged all the binaries into a single directory</li>
<li>A user asks the community about the BSD way of doing it, trying to find out the advantages and disadvantages of both hierarchies</li>
<li>Read the comments for the full explanation, but having things separated really helps keep things organized
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=277487" rel="nofollow">Updated i915kms driver for FreeBSD</a></h3>

<ul>
<li>This update brings the FreeBSD code closer inline with the Linux code, to make it easier to update going forward</li>
<li>It doesn&#39;t introduce Haswell support just yet, but was required before the Haswell bits can be added
***</li>
</ul>

<h3><a href="http://zacbrown.org/2015/01/18/openbsd-as-a-desktop/" rel="nofollow">Year of the OpenBSD desktop</a></h3>

<ul>
<li>Here we have an article about using OpenBSD as a daily driver for regular desktop usage</li>
<li>The author says he &quot;ran fifty thousand different distributions, never being satisfied&quot;</li>
<li>After dealing with the problems of Linux and fragmentation, he eventually gave up and bought a Macbook</li>
<li>He also used FreeBSD between versions 7 and 9, finding a &quot;a mostly harmonious environment,&quot; but regressions lead him to give up on desktop *nix once again</li>
<li>Starting with 2015, he&#39;s back and is using OpenBSD on a Thinkpad x201</li>
<li>The rest of the article covers some of his configuration tweaks and gives an overall conclusion on his current setup</li>
<li>He apparently used <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">our desktop tutorial</a> - thanks for watching!
***</li>
</ul>

<h3><a href="http://louwrentius.com/freebsd-101-unattended-install-over-pxe-http-no-nfs.html" rel="nofollow">Unattended FreeBSD installation</a></h3>

<ul>
<li>A new BSD user was looking to get some more experience, so he documented how to install FreeBSD over PXE</li>
<li>His goal was to have a setup similar to Redhat&#39;s &quot;kickstart&quot; or <a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">OpenBSD&#39;s autoinstall</a></li>
<li>The article shows you how to set up DHCP and TFTP, with no NFS share setup required</li>
<li>He also gives a mention to mfsbsd, showing how you can customize its startup script to do most of the work for you
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20UsZjN4h" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s219cMQz3U" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2EkzMUMyb" rel="nofollow">l33tname writes in</a></li>
<li><a href="http://slexy.org/view/s2nq6L6H1n" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21EGqUYLd" rel="nofollow">Eric writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142159202606668&w=2" rel="nofollow">Clowning around</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097734.html" rel="nofollow">Better than succeeding in this case</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>72: Common *Sense Approach</title>
  <link>https://www.bsdnow.tv/72</link>
  <guid isPermaLink="false">efe89103-4a81-4974-89f3-cb650975dace</guid>
  <pubDate>Wed, 14 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/efe89103-4a81-4974-89f3-cb650975dace.mp3" length="57654580" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We'll learn some of the backstory and see what they've got planned for the future. We've also got all this week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We'll learn some of the backstory and see what they've got planned for the future. We've also got all this week's news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Be your own VPN provider with OpenBSD (http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html)
We've covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don't trust any VPN company?
It's easy for anyone to say "of course we don't run a modified version of OpenVPN that logs all your traffic... what are you talking about?"
The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk
With this guide, you'll be able to cut out the middleman and create your own VPN, using OpenBSD
It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***
FreeBSD vs Gentoo comparison (http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/)
People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software
This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems
The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things
If you're a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***
Kernel W^X in OpenBSD (https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2)
W^X, "Write XOR Execute (https://en.wikipedia.org/wiki/W%5EX)," is a security feature of OpenBSD with a rather strange-looking name
It's meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time
This helps prevent some types of buffer overflows: code injected into it won't execute, but will crash the program (quite obviously the lesser of the two evils)
Through some recent work, OpenBSD's kernel now has no part of the address space without this feature - whereas it was only enabled in the userland previously (http://www.openbsd.org/papers/ru13-deraadt/)
Doing this incorrectly in the kernel could lead to far worse consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that's been in the works for a while
More technical details can be found in some recent CVS commits (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141917924602780&amp;amp;w=2)
***
Building an IPFW-based router (http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/)
We've covered building routers with PF (http://www.bsdnow.tv/tutorials/openbsd-router) many times before, but what about IPFW (https://www.freebsd.org/doc/handbook/firewalls-ipfw.html)?
A certain host of a certain podcast decided it was finally time to replace his disappointing (https://github.com/jduck/asus-cmd) consumer router with something BSD-based
In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall
He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit
If you're an IPFW fan and are thinking about putting together a new router, give this post a read
***
Interview - Jos Schellevis - project@opnsense.org (mailto:project@opnsense.org) / @opnsense (https://twitter.com/opnsense)
The birth of OPNsense (http://opnsense.org)
News Roundup
On profiling HTTP (http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html)
Adrian Chadd, who we've had on the show before (http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan), has been doing some more ultra-high performance testing
Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools
According to him, it's "not very pretty"
He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process
You can check out his new code on Github (https://github.com/erikarn/libevhtp-http/) right now
***
Using divert(4) to reduce attacks (http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&amp;amp;t=8846)
We talked about using divert(4) (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4) with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)
It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you're running
PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won't work
The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious
Consider setting this up to reduce the attack spam in your logs if you run public services
***
ChaCha20 patchset for GELI (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html)
A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the disk encryption (http://www.bsdnow.tv/tutorials/fde) system
There are also some benchmarks that look pretty good in terms of performance
Currently, GELI defaults to AES in XTS mode (https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29) with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)
There's some discussion (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html) going on about whether a stream cipher (https://en.wikipedia.org/wiki/Stream_cipher) is suitable or not (https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html) for disk encryption though, so this might not be a match made in heaven just yet
***
PCBSD update system enhancements (http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/)
The PCBSD update utility has gotten an update itself, now supporting automatic upgrades
You can choose what parts of your system you want to let it automatically handle (packages, security updates)
The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality
There's also a new graphical frontend available for it
***
Feedback/Questions
Mat writes in (http://slexy.org/view/s2XJhAsffU)
Chris writes in (http://slexy.org/view/s20qnSHujZ)
Andy writes in (http://slexy.org/view/s21O0MShqi)
Beau writes in (http://slexy.org/view/s2LutVQOXN) 
Kutay writes in (http://slexy.org/view/s21Esexdrc)
***
Mailing List Gold
Wait, a real one? (https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html)
What's that glowing... (https://www.marc.info/?l=openbsd-misc&amp;amp;m=142125454022458&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, bsd, interview, opnsense, pfsense, m0n0wall, firewall, gateway, router, php, fork, deciso, netgate, portage, owncloud, soekris, apu, pcengines, alix, vpn, ipfw</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We&#39;ll learn some of the backstory and see what they&#39;ve got planned for the future. We&#39;ve also got all this week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" rel="nofollow">Be your own VPN provider with OpenBSD</a></h3>

<ul>
<li>We&#39;ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don&#39;t trust any VPN company?</li>
<li>It&#39;s easy for anyone to say &quot;of course we don&#39;t run a modified version of OpenVPN that logs all your traffic... what are you talking about?&quot;</li>
<li>The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk</li>
<li>With this guide, you&#39;ll be able to cut out the middleman and create your own VPN, using OpenBSD</li>
<li>It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***</li>
</ul>

<h3><a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" rel="nofollow">FreeBSD vs Gentoo comparison</a></h3>

<ul>
<li>People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software</li>
<li>This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems</li>
<li>The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things</li>
<li>If you&#39;re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">Kernel W<sup>X</sup> in OpenBSD</a></h3>

<ul>
<li>W<sup>X,</sup> &quot;<a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">Write XOR Execute</a>,&quot; is a security feature of OpenBSD with a rather strange-looking name</li>
<li>It&#39;s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time</li>
<li>This helps prevent some types of buffer overflows: code injected into it <em>won&#39;t</em> execute, but <em>will</em> crash the program (quite obviously the lesser of the two evils)</li>
<li>Through some recent work, OpenBSD&#39;s kernel now has no part of the address space without this feature - whereas it was only enabled in the userland <a href="http://www.openbsd.org/papers/ru13-deraadt/" rel="nofollow">previously</a></li>
<li>Doing this incorrectly in the kernel could lead to <strong>far worse</strong> consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that&#39;s been in the works for a while</li>
<li>More technical details can be found in some <a href="https://www.marc.info/?l=openbsd-cvs&m=141917924602780&w=2" rel="nofollow">recent CVS commits</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">Building an IPFW-based router</a></h3>

<ul>
<li>We&#39;ve covered building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">routers with PF</a> many times before, but what about <a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" rel="nofollow">IPFW</a>?</li>
<li>A certain host of a certain podcast decided it was finally time to replace his <a href="https://github.com/jduck/asus-cmd" rel="nofollow">disappointing</a> consumer router with something BSD-based</li>
<li>In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall</li>
<li>He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit</li>
<li>If you&#39;re an IPFW fan and are thinking about putting together a new router, give this post a read
***</li>
</ul>

<h2>Interview - Jos Schellevis - <a href="mailto:project@opnsense.org" rel="nofollow">project@opnsense.org</a> / <a href="https://twitter.com/opnsense" rel="nofollow">@opnsense</a></h2>

<p>The birth of <a href="http://opnsense.org" rel="nofollow">OPNsense</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" rel="nofollow">On profiling HTTP</a></h3>

<ul>
<li>Adrian Chadd, who <a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" rel="nofollow">we&#39;ve had on the show before</a>, has been doing some more ultra-high performance testing</li>
<li>Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools</li>
<li>According to him, it&#39;s &quot;not very pretty&quot;</li>
<li>He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process</li>
<li>You can check out his new code <a href="https://github.com/erikarn/libevhtp-http/" rel="nofollow">on Github</a> right now
***</li>
</ul>

<h3><a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&t=8846" rel="nofollow">Using divert(4) to reduce attacks</a></h3>

<ul>
<li>We talked about using <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" rel="nofollow">divert(4)</a> with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)</li>
<li>It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you&#39;re running</li>
<li>PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won&#39;t work</li>
<li>The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious</li>
<li>Consider setting this up to reduce the attack spam in your logs if you run public services
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" rel="nofollow">ChaCha20 patchset for GELI</a></h3>

<ul>
<li>A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">disk encryption</a> system</li>
<li>There are also some benchmarks that look pretty good in terms of performance</li>
<li>Currently, GELI defaults to AES <a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" rel="nofollow">in XTS mode</a> with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)</li>
<li>There&#39;s <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" rel="nofollow">some discussion</a> going on about whether a <a href="https://en.wikipedia.org/wiki/Stream_cipher" rel="nofollow">stream cipher</a> is <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" rel="nofollow">suitable or not</a> for disk encryption though, so this might not be a match made in heaven just yet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" rel="nofollow">PCBSD update system enhancements</a></h3>

<ul>
<li>The PCBSD update utility has gotten an update itself, now supporting automatic upgrades</li>
<li>You can choose what parts of your system you want to let it automatically handle (packages, security updates)</li>
<li>The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality</li>
<li>There&#39;s also a new graphical frontend available for it
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XJhAsffU" rel="nofollow">Mat writes in</a></li>
<li><a href="http://slexy.org/view/s20qnSHujZ" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s21O0MShqi" rel="nofollow">Andy writes in</a></li>
<li><a href="http://slexy.org/view/s2LutVQOXN" rel="nofollow">Beau writes in</a> </li>
<li><a href="http://slexy.org/view/s21Esexdrc" rel="nofollow">Kutay writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" rel="nofollow">Wait, a real one?</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142125454022458&w=2" rel="nofollow">What&#39;s that glowing...</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We&#39;ll learn some of the backstory and see what they&#39;ve got planned for the future. We&#39;ve also got all this week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" rel="nofollow">Be your own VPN provider with OpenBSD</a></h3>

<ul>
<li>We&#39;ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don&#39;t trust any VPN company?</li>
<li>It&#39;s easy for anyone to say &quot;of course we don&#39;t run a modified version of OpenVPN that logs all your traffic... what are you talking about?&quot;</li>
<li>The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk</li>
<li>With this guide, you&#39;ll be able to cut out the middleman and create your own VPN, using OpenBSD</li>
<li>It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***</li>
</ul>

<h3><a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" rel="nofollow">FreeBSD vs Gentoo comparison</a></h3>

<ul>
<li>People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software</li>
<li>This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems</li>
<li>The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things</li>
<li>If you&#39;re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">Kernel W<sup>X</sup> in OpenBSD</a></h3>

<ul>
<li>W<sup>X,</sup> &quot;<a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">Write XOR Execute</a>,&quot; is a security feature of OpenBSD with a rather strange-looking name</li>
<li>It&#39;s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time</li>
<li>This helps prevent some types of buffer overflows: code injected into it <em>won&#39;t</em> execute, but <em>will</em> crash the program (quite obviously the lesser of the two evils)</li>
<li>Through some recent work, OpenBSD&#39;s kernel now has no part of the address space without this feature - whereas it was only enabled in the userland <a href="http://www.openbsd.org/papers/ru13-deraadt/" rel="nofollow">previously</a></li>
<li>Doing this incorrectly in the kernel could lead to <strong>far worse</strong> consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that&#39;s been in the works for a while</li>
<li>More technical details can be found in some <a href="https://www.marc.info/?l=openbsd-cvs&m=141917924602780&w=2" rel="nofollow">recent CVS commits</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">Building an IPFW-based router</a></h3>

<ul>
<li>We&#39;ve covered building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">routers with PF</a> many times before, but what about <a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" rel="nofollow">IPFW</a>?</li>
<li>A certain host of a certain podcast decided it was finally time to replace his <a href="https://github.com/jduck/asus-cmd" rel="nofollow">disappointing</a> consumer router with something BSD-based</li>
<li>In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall</li>
<li>He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit</li>
<li>If you&#39;re an IPFW fan and are thinking about putting together a new router, give this post a read
***</li>
</ul>

<h2>Interview - Jos Schellevis - <a href="mailto:project@opnsense.org" rel="nofollow">project@opnsense.org</a> / <a href="https://twitter.com/opnsense" rel="nofollow">@opnsense</a></h2>

<p>The birth of <a href="http://opnsense.org" rel="nofollow">OPNsense</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" rel="nofollow">On profiling HTTP</a></h3>

<ul>
<li>Adrian Chadd, who <a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" rel="nofollow">we&#39;ve had on the show before</a>, has been doing some more ultra-high performance testing</li>
<li>Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools</li>
<li>According to him, it&#39;s &quot;not very pretty&quot;</li>
<li>He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process</li>
<li>You can check out his new code <a href="https://github.com/erikarn/libevhtp-http/" rel="nofollow">on Github</a> right now
***</li>
</ul>

<h3><a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&t=8846" rel="nofollow">Using divert(4) to reduce attacks</a></h3>

<ul>
<li>We talked about using <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" rel="nofollow">divert(4)</a> with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)</li>
<li>It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you&#39;re running</li>
<li>PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won&#39;t work</li>
<li>The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious</li>
<li>Consider setting this up to reduce the attack spam in your logs if you run public services
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" rel="nofollow">ChaCha20 patchset for GELI</a></h3>

<ul>
<li>A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">disk encryption</a> system</li>
<li>There are also some benchmarks that look pretty good in terms of performance</li>
<li>Currently, GELI defaults to AES <a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" rel="nofollow">in XTS mode</a> with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)</li>
<li>There&#39;s <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" rel="nofollow">some discussion</a> going on about whether a <a href="https://en.wikipedia.org/wiki/Stream_cipher" rel="nofollow">stream cipher</a> is <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" rel="nofollow">suitable or not</a> for disk encryption though, so this might not be a match made in heaven just yet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" rel="nofollow">PCBSD update system enhancements</a></h3>

<ul>
<li>The PCBSD update utility has gotten an update itself, now supporting automatic upgrades</li>
<li>You can choose what parts of your system you want to let it automatically handle (packages, security updates)</li>
<li>The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality</li>
<li>There&#39;s also a new graphical frontend available for it
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XJhAsffU" rel="nofollow">Mat writes in</a></li>
<li><a href="http://slexy.org/view/s20qnSHujZ" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s21O0MShqi" rel="nofollow">Andy writes in</a></li>
<li><a href="http://slexy.org/view/s2LutVQOXN" rel="nofollow">Beau writes in</a> </li>
<li><a href="http://slexy.org/view/s21Esexdrc" rel="nofollow">Kutay writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" rel="nofollow">Wait, a real one?</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142125454022458&w=2" rel="nofollow">What&#39;s that glowing...</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>66: Conference Connoisseur</title>
  <link>https://www.bsdnow.tv/66</link>
  <guid isPermaLink="false">e76cf015-25d3-4a75-89c3-629d1f6d9a87</guid>
  <pubDate>Wed, 03 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e76cf015-25d3-4a75-89c3-629d1f6d9a87.mp3" length="59426068" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We've also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:22:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we'll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We've also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
More BSD presentation videos (https://www.meetbsd.com/)
The MeetBSD video uploading spree continues with a few more talks, maybe this'll be the last batch
Corey Vixie, Web Apps in Embedded BSD (https://www.youtube.com/watch?v=Pbks12Mqpp8)
Allan Jude, UCL config (https://www.youtube.com/watch?v=TjP86iWsEzQ)
Kip Macy, iflib (https://www.youtube.com/watch?v=P4FRPKj7F80)
While we're on the topic of conferences, AsiaBSDCon's CFP was extended (https://twitter.com/asiabsdcon/status/538352055245492226) by one week
This year's ruBSD (https://events.yandex.ru/events/yagosti/rubsd14/) will be on December 13th in Moscow
Also, the BSDCan call for papers (http://lists.bsdcan.org/pipermail/bsdcan-announce/2014-December/000135.html) is out, and the event will be in June next year
Lastly, according to Rick Miller, "A potential vBSDcon 2015 event is being explored though a decision has yet to be made."
***
BSD-powered digital library in Africa (http://peercorpsglobal.org/nzegas-digital-library-becomes-a-reality/)
You probably haven't heard much about Nzega, Tanzania, but it's an East African country without much internet access
With physical schoolbooks being a rarity there, a few companies helped out to bring some BSD-powered reading material to a local school
They now have a pair of FreeNAS Minis at the center of their local network, with over 80,000 books and accompanying video content stored on them (~5TB of data currently)
The school's workstations also got wiped and reloaded with FreeBSD, and everyone there seems to really enjoy using it
***
pfSense 2.2 status update (https://blog.pfsense.org/?p=1486)
With lots of people asking when the 2.2 release will be done, some pfSense developers decided to provide a status update
2.2 will have a lot of changes: being based on FreeBSD 10.1, Unbound instead of BIND, updating PHP to something recent, including the new(ish) IPSEC stack updates, etc
All these things have taken more time than previously expected
The post also has some interesting graphs showing the ratio of opened and close bugs for the upcoming release
***
Recommended hardware threads (https://www.reddit.com/r/BSD/comments/2n8wrg/bsd_on_mini_itx/)
A few threads on caught our attention this week, all about hardware recommendations for BSD setups
In the first one, the OP asks about mini-ITX hardware to run a FreeBSD server and NAS
Everyone gave some good recommendations for low power, Atom-based systems
The second thread (https://www.marc.info/?t=141694918800006&amp;amp;r=1&amp;amp;w=2) started off asking about which CPU architecture is best for PF on an OpenBSD router, but ended up being another hardware thread
For a router, the ALIX, APU and Soekris boards still seem to be the most popular choices, with the third (https://www.reddit.com/r/homelab/comments/24m6tj/) and fourth (https://www.reddit.com/r/PFSENSE/comments/2nblgp/) threads confirming this
If you're thinking about building your first BSD box - server, router, NAS, whatever - these might be some good links to read
***
Interview - Paul Schenkeveld - freebsd@psconsult.nl (mailto:freebsd@psconsult.nl)
Running a BSD conference
News Roundup
From Linux to FreeBSD - for reals (https://www.reddit.com/r/freebsd/comments/2nqa60/)
Another Linux user is ready to switch to BSD, and takes to Reddit for some community encouragement (seems to be a common thing now)
After being a Linux guy for 20(!) years, he's ready to switch his systems over, and is looking for some helpful guides to transition
In the comments, a lot of new switchers offer some advice and reading material
If any of the listeners have some things that were helpful along your switching journey, maybe send 'em this guy's way
***
Running FreeBSD as a Xen Dom0 (http://wiki.xenproject.org/wiki/FreeBSD_Dom0)
Continuing progress has been made to allow FreeBSD to be a host for the Xen hypervisor
This wiki article explains how to run the Xen branch of FreeBSD and host virtual machines on it
Xen on FreeBSD currently supports PV guests (modified kernels) and HVM (unmodified kernels, uses hardware virtualization features)
The wiki provides instructions for running Debian (PV) and FreeBSD (HVM), and discusses the features that are not finished yet
***
HardenedBSD updates and changes (http://hardenedbsd.org/article/shawn-webb/2014-11-18/aout-and-null-mapping-support-removal)
a.out is the old executable format for Unix
The name stands for assembler output, and was coined by Ken Thompson as the fixed name for output of his PDP-7 assembler in 1968
FreeBSD, on which HardenedBSD is based, switched away from a.out in version 3.0
A restriction against NULL mapping was introduced in FreeBSD 7 (https://www.freebsd.org/security/advisories/FreeBSD-EN-09:05.null.asc) and enabled by default in FreeBSD 8
However, for reasons of compatibility, it could be switched off, allowing buggy applications to continue to run, at the risk of allowing a kernel bug to be exploited
HardenedBSD has removed the sysctl, making it impossible to run in ‘insecure mode’
Package building update: more consistent repo, no more i386 packages  (http://hardenedbsd.org/article/shawn-webb/2014-11-30/package-building-infrastructure-maintenance)
***
Feedback/Questions
Boris writes in (http://slexy.org/view/s2kVPKICqj)
Alex writes in (http://slexy.org/view/s21Fic4dZC) (&lt;b&gt;edit:&lt;/b&gt; adding "tinker panic 0" to the ntp.conf will disable the sanity check)
Chris writes in (http://slexy.org/view/s2zk1Tvfe9)
Robert writes in (http://slexy.org/view/s22alvJ4mu)
Jake writes in (http://slexy.org/view/s203YMc2zL)
***
Mailing List Gold
Real world authpf use (https://www.marc.info/?t=141711266800001&amp;amp;r=1&amp;amp;w=2)
The (https://svnweb.freebsd.org/ports/head/UPDATING?r1=373564&amp;amp;r2=373563&amp;amp;pathrev=373564) great (https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096788.html) perl (https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096799.html) event (https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010146.html) of (https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010149.html) 2014 (https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010167.html)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, eurobsdcon, meetbsd, bsdcan, asiabsdcon, conference, community, organization, foundation, pfsense, soekris, router, alix, apu, netgate, pcengines</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We&#39;ve also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">More BSD presentation videos</a></h3>

<ul>
<li>The MeetBSD video uploading spree continues with a few more talks, maybe this&#39;ll be the last batch</li>
<li>Corey Vixie, <a href="https://www.youtube.com/watch?v=Pbks12Mqpp8" rel="nofollow">Web Apps in Embedded BSD</a></li>
<li>Allan Jude, <a href="https://www.youtube.com/watch?v=TjP86iWsEzQ" rel="nofollow">UCL config</a></li>
<li>Kip Macy, <a href="https://www.youtube.com/watch?v=P4FRPKj7F80" rel="nofollow">iflib</a></li>
<li>While we&#39;re on the topic of conferences, AsiaBSDCon&#39;s CFP was <a href="https://twitter.com/asiabsdcon/status/538352055245492226" rel="nofollow">extended</a> by one week</li>
<li>This year&#39;s <a href="https://events.yandex.ru/events/yagosti/rubsd14/" rel="nofollow">ruBSD</a> will be on December 13th in Moscow</li>
<li>Also, the <a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2014-December/000135.html" rel="nofollow">BSDCan call for papers</a> is out, and the event will be in June next year</li>
<li>Lastly, according to Rick Miller, &quot;A potential vBSDcon 2015 event is being explored though a decision has yet to be made.&quot;
***</li>
</ul>

<h3><a href="http://peercorpsglobal.org/nzegas-digital-library-becomes-a-reality/" rel="nofollow">BSD-powered digital library in Africa</a></h3>

<ul>
<li>You probably haven&#39;t heard much about Nzega, Tanzania, but it&#39;s an East African country without much internet access</li>
<li>With physical schoolbooks being a rarity there, a few companies helped out to bring some BSD-powered reading material to a local school</li>
<li>They now have a pair of FreeNAS Minis at the center of their local network, with over 80,000 books and accompanying video content stored on them (~5TB of data currently)</li>
<li>The school&#39;s workstations also got wiped and reloaded with FreeBSD, and everyone there seems to really enjoy using it
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1486" rel="nofollow">pfSense 2.2 status update</a></h3>

<ul>
<li>With lots of people asking when the 2.2 release will be done, some pfSense developers decided to provide a status update</li>
<li>2.2 will have a lot of changes: being based on FreeBSD 10.1, Unbound instead of BIND, updating PHP to something recent, including the new(ish) IPSEC stack updates, etc</li>
<li>All these things have taken more time than previously expected</li>
<li>The post also has some interesting graphs showing the ratio of opened and close bugs for the upcoming release
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2n8wrg/bsd_on_mini_itx/" rel="nofollow">Recommended hardware threads</a></h3>

<ul>
<li>A few threads on caught our attention this week, all about hardware recommendations for BSD setups</li>
<li>In the first one, the OP asks about mini-ITX hardware to run a FreeBSD server and NAS</li>
<li>Everyone gave some good recommendations for low power, Atom-based systems</li>
<li>The <a href="https://www.marc.info/?t=141694918800006&r=1&w=2" rel="nofollow">second thread</a> started off asking about which CPU architecture is best for PF on an OpenBSD router, but ended up being another hardware thread</li>
<li>For a router, the ALIX, APU and Soekris boards still seem to be the most popular choices, with the <a href="https://www.reddit.com/r/homelab/comments/24m6tj/" rel="nofollow">third</a> and <a href="https://www.reddit.com/r/PFSENSE/comments/2nblgp/" rel="nofollow">fourth</a> threads confirming this</li>
<li>If you&#39;re thinking about building your first BSD box - server, router, NAS, whatever - these might be some good links to read
***</li>
</ul>

<h2>Interview - Paul Schenkeveld - <a href="mailto:freebsd@psconsult.nl" rel="nofollow">freebsd@psconsult.nl</a></h2>

<p>Running a BSD conference</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2nqa60/" rel="nofollow">From Linux to FreeBSD - for reals</a></h3>

<ul>
<li>Another Linux user is ready to switch to BSD, and takes to Reddit for some community encouragement (seems to be a common thing now)</li>
<li>After being a Linux guy for 20(!) years, he&#39;s ready to switch his systems over, and is looking for some helpful guides to transition</li>
<li>In the comments, a lot of new switchers offer some advice and reading material</li>
<li>If any of the listeners have some things that were helpful along your switching journey, maybe send &#39;em this guy&#39;s way
***</li>
</ul>

<h3><a href="http://wiki.xenproject.org/wiki/FreeBSD_Dom0" rel="nofollow">Running FreeBSD as a Xen Dom0</a></h3>

<ul>
<li>Continuing progress has been made to allow FreeBSD to be a host for the Xen hypervisor</li>
<li>This wiki article explains how to run the Xen branch of FreeBSD and host virtual machines on it</li>
<li>Xen on FreeBSD currently supports PV guests (modified kernels) and HVM (unmodified kernels, uses hardware virtualization features)</li>
<li>The wiki provides instructions for running Debian (PV) and FreeBSD (HVM), and discusses the features that are not finished yet
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-11-18/aout-and-null-mapping-support-removal" rel="nofollow">HardenedBSD updates and changes</a></h3>

<ul>
<li>a.out is the old executable format for Unix</li>
<li>The name stands for assembler output, and was coined by Ken Thompson as the fixed name for output of his PDP-7 assembler in 1968</li>
<li>FreeBSD, on which HardenedBSD is based, switched away from a.out in version 3.0</li>
<li>A restriction against NULL mapping was introduced in <a href="https://www.freebsd.org/security/advisories/FreeBSD-EN-09:05.null.asc" rel="nofollow">FreeBSD 7</a> and enabled by default in FreeBSD 8</li>
<li>However, for reasons of compatibility, it could be switched off, allowing buggy applications to continue to run, at the risk of allowing a kernel bug to be exploited</li>
<li>HardenedBSD has removed the sysctl, making it impossible to run in ‘insecure mode’</li>
<li>Package building update: <a href="http://hardenedbsd.org/article/shawn-webb/2014-11-30/package-building-infrastructure-maintenance" rel="nofollow">more consistent repo, no more i386 packages </a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2kVPKICqj" rel="nofollow">Boris writes in</a></li>
<li><a href="http://slexy.org/view/s21Fic4dZC" rel="nofollow">Alex writes in</a> (<b>edit:</b> adding &quot;tinker panic 0&quot; to the ntp.conf will disable the sanity check)</li>
<li><a href="http://slexy.org/view/s2zk1Tvfe9" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s22alvJ4mu" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s203YMc2zL" rel="nofollow">Jake writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141711266800001&r=1&w=2" rel="nofollow">Real world authpf use</a></li>
<li><a href="https://svnweb.freebsd.org/ports/head/UPDATING?r1=373564&r2=373563&pathrev=373564" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096788.html" rel="nofollow">great</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096799.html" rel="nofollow">perl</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010146.html" rel="nofollow">event</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010149.html" rel="nofollow">of</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010167.html" rel="nofollow">2014</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We&#39;ve also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">More BSD presentation videos</a></h3>

<ul>
<li>The MeetBSD video uploading spree continues with a few more talks, maybe this&#39;ll be the last batch</li>
<li>Corey Vixie, <a href="https://www.youtube.com/watch?v=Pbks12Mqpp8" rel="nofollow">Web Apps in Embedded BSD</a></li>
<li>Allan Jude, <a href="https://www.youtube.com/watch?v=TjP86iWsEzQ" rel="nofollow">UCL config</a></li>
<li>Kip Macy, <a href="https://www.youtube.com/watch?v=P4FRPKj7F80" rel="nofollow">iflib</a></li>
<li>While we&#39;re on the topic of conferences, AsiaBSDCon&#39;s CFP was <a href="https://twitter.com/asiabsdcon/status/538352055245492226" rel="nofollow">extended</a> by one week</li>
<li>This year&#39;s <a href="https://events.yandex.ru/events/yagosti/rubsd14/" rel="nofollow">ruBSD</a> will be on December 13th in Moscow</li>
<li>Also, the <a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2014-December/000135.html" rel="nofollow">BSDCan call for papers</a> is out, and the event will be in June next year</li>
<li>Lastly, according to Rick Miller, &quot;A potential vBSDcon 2015 event is being explored though a decision has yet to be made.&quot;
***</li>
</ul>

<h3><a href="http://peercorpsglobal.org/nzegas-digital-library-becomes-a-reality/" rel="nofollow">BSD-powered digital library in Africa</a></h3>

<ul>
<li>You probably haven&#39;t heard much about Nzega, Tanzania, but it&#39;s an East African country without much internet access</li>
<li>With physical schoolbooks being a rarity there, a few companies helped out to bring some BSD-powered reading material to a local school</li>
<li>They now have a pair of FreeNAS Minis at the center of their local network, with over 80,000 books and accompanying video content stored on them (~5TB of data currently)</li>
<li>The school&#39;s workstations also got wiped and reloaded with FreeBSD, and everyone there seems to really enjoy using it
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1486" rel="nofollow">pfSense 2.2 status update</a></h3>

<ul>
<li>With lots of people asking when the 2.2 release will be done, some pfSense developers decided to provide a status update</li>
<li>2.2 will have a lot of changes: being based on FreeBSD 10.1, Unbound instead of BIND, updating PHP to something recent, including the new(ish) IPSEC stack updates, etc</li>
<li>All these things have taken more time than previously expected</li>
<li>The post also has some interesting graphs showing the ratio of opened and close bugs for the upcoming release
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2n8wrg/bsd_on_mini_itx/" rel="nofollow">Recommended hardware threads</a></h3>

<ul>
<li>A few threads on caught our attention this week, all about hardware recommendations for BSD setups</li>
<li>In the first one, the OP asks about mini-ITX hardware to run a FreeBSD server and NAS</li>
<li>Everyone gave some good recommendations for low power, Atom-based systems</li>
<li>The <a href="https://www.marc.info/?t=141694918800006&r=1&w=2" rel="nofollow">second thread</a> started off asking about which CPU architecture is best for PF on an OpenBSD router, but ended up being another hardware thread</li>
<li>For a router, the ALIX, APU and Soekris boards still seem to be the most popular choices, with the <a href="https://www.reddit.com/r/homelab/comments/24m6tj/" rel="nofollow">third</a> and <a href="https://www.reddit.com/r/PFSENSE/comments/2nblgp/" rel="nofollow">fourth</a> threads confirming this</li>
<li>If you&#39;re thinking about building your first BSD box - server, router, NAS, whatever - these might be some good links to read
***</li>
</ul>

<h2>Interview - Paul Schenkeveld - <a href="mailto:freebsd@psconsult.nl" rel="nofollow">freebsd@psconsult.nl</a></h2>

<p>Running a BSD conference</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2nqa60/" rel="nofollow">From Linux to FreeBSD - for reals</a></h3>

<ul>
<li>Another Linux user is ready to switch to BSD, and takes to Reddit for some community encouragement (seems to be a common thing now)</li>
<li>After being a Linux guy for 20(!) years, he&#39;s ready to switch his systems over, and is looking for some helpful guides to transition</li>
<li>In the comments, a lot of new switchers offer some advice and reading material</li>
<li>If any of the listeners have some things that were helpful along your switching journey, maybe send &#39;em this guy&#39;s way
***</li>
</ul>

<h3><a href="http://wiki.xenproject.org/wiki/FreeBSD_Dom0" rel="nofollow">Running FreeBSD as a Xen Dom0</a></h3>

<ul>
<li>Continuing progress has been made to allow FreeBSD to be a host for the Xen hypervisor</li>
<li>This wiki article explains how to run the Xen branch of FreeBSD and host virtual machines on it</li>
<li>Xen on FreeBSD currently supports PV guests (modified kernels) and HVM (unmodified kernels, uses hardware virtualization features)</li>
<li>The wiki provides instructions for running Debian (PV) and FreeBSD (HVM), and discusses the features that are not finished yet
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-11-18/aout-and-null-mapping-support-removal" rel="nofollow">HardenedBSD updates and changes</a></h3>

<ul>
<li>a.out is the old executable format for Unix</li>
<li>The name stands for assembler output, and was coined by Ken Thompson as the fixed name for output of his PDP-7 assembler in 1968</li>
<li>FreeBSD, on which HardenedBSD is based, switched away from a.out in version 3.0</li>
<li>A restriction against NULL mapping was introduced in <a href="https://www.freebsd.org/security/advisories/FreeBSD-EN-09:05.null.asc" rel="nofollow">FreeBSD 7</a> and enabled by default in FreeBSD 8</li>
<li>However, for reasons of compatibility, it could be switched off, allowing buggy applications to continue to run, at the risk of allowing a kernel bug to be exploited</li>
<li>HardenedBSD has removed the sysctl, making it impossible to run in ‘insecure mode’</li>
<li>Package building update: <a href="http://hardenedbsd.org/article/shawn-webb/2014-11-30/package-building-infrastructure-maintenance" rel="nofollow">more consistent repo, no more i386 packages </a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2kVPKICqj" rel="nofollow">Boris writes in</a></li>
<li><a href="http://slexy.org/view/s21Fic4dZC" rel="nofollow">Alex writes in</a> (<b>edit:</b> adding &quot;tinker panic 0&quot; to the ntp.conf will disable the sanity check)</li>
<li><a href="http://slexy.org/view/s2zk1Tvfe9" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s22alvJ4mu" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s203YMc2zL" rel="nofollow">Jake writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141711266800001&r=1&w=2" rel="nofollow">Real world authpf use</a></li>
<li><a href="https://svnweb.freebsd.org/ports/head/UPDATING?r1=373564&r2=373563&pathrev=373564" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096788.html" rel="nofollow">great</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096799.html" rel="nofollow">perl</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010146.html" rel="nofollow">event</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010149.html" rel="nofollow">of</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010167.html" rel="nofollow">2014</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>60: Don't Buy a Router</title>
  <link>https://www.bsdnow.tv/60</link>
  <guid isPermaLink="false">e61941d1-74ff-40d0-91f6-86ff864cf99b</guid>
  <pubDate>Wed, 22 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e61941d1-74ff-40d0-91f6-86ff864cf99b.mp3" length="49443412" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we're joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We'll be discussing what the BSD Router Project is, what it's for and where it's going. All this week's headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:08:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we're joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We'll be discussing what the BSD Router Project is, what it's for and where it's going. All this week's headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSD Devroom CFP (https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html)
This year's FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom
They've issued a call for papers on anything BSD-related, and we always love more presentations
If you're in the Belgium area or plan on going, submit a talk about something cool you're doing
There's also a mailing list (https://lists.fosdem.org/listinfo/bsd-devroom) and some more information in the original post
***
Bhyve SVM code merge (https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html)
The bhyve_svm code has been in the "projects" tree of FreeBSD, but is now ready (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=273375) for -CURRENT
This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only
All the supported operating systems and utilities should work on both now
One thing to note: bhyve doesn't support PCI passthrough on AMD just yet
There may still be some issues (https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html) though
***
NetBSD at Open Source Conference Tokyo (https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html)
The Japanese NetBSD users group held a booth at another recent open source conference
As always, they were running NetBSD on everything you can imagine
One of the users reports back to the mailing list on their experience, providing lots of pictures and links
Here's an interesting screenshot of NetBSD running various other BSDs in Xen (https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large)
***
More BSD switchers every day (https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/)
A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community
Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect
So far, he's found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion
There's also another semi-related thread (https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/) about another Linux user wanting to switch to BSD because of systemd and GNU people
There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read
Maybe the OPs should've just watched this show
***
Interview - Olivier Cochard-Labbé - olivier@cochard.me (mailto:olivier@cochard.me) / @ocochardlabbe (https://twitter.com/ocochardlabbe)
The BSD Router Project
News Roundup
FreeBSD -CURRENT on a T420 (https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420)
Thinkpads are quite popular with BSD developers and users
Most of the hardware seems to be supported across the BSDs (especially wifi)
This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI
If you've got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***
FreeNAS on a Supermicro 5018A-MHN4 (https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/)
More and more people are migrating their NAS devices to BSD-based solutions
In this post, the author goes through setting up FreeNAS on some of his new hardware
His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor
The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***
Hardening procfs and linprocfs (http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs)
There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux
There exists a native procfs in FreeBSD, which was the target point of that exploit, but it's not used very often
The Linux emulation layer also supports its own linprocfs, which was affected as well
The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs
If you want to learn more about ASLR and HardenedBSD, be sure to check out our interview with Shawn (http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover) too
***
pfSense monitoring with bandwidthd (http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/)
A lot of people run pfSense on their home network, and it's really useful to monitor the bandwidth usage
This article will walk you through setting up bandwidthd to do exactly that
bandwidthd monitors based on the IP address, rather than per-interface
It can also build some cool HTML graphs, and we love those pfSense graphs
Have a look at our bandwidth monitoring and testing (http://www.bsdnow.tv/tutorials/vnstat-iperf) tutorial for some more ideas
***
Feedback/Questions
Dave writes in (http://slexy.org/view/s2b5ZZ5qCv)
Chris writes in (http://slexy.org/view/s20aVvhv2d)
Zeke writes in (http://slexy.org/view/s2Vmwxy1QM)
Bostjan writes in (http://slexy.org/view/s2LB6MKoNT)
Patrick writes in (http://slexy.org/view/s2xxB9uOuV)
***
Mailing List Gold
More (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141357595922692&amp;amp;w=2) old bugs (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141358124924479&amp;amp;w=2)
The Right Font™ (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141332534304117&amp;amp;w=2) (see also (https://twitter.com/blakkheim/status/522162864409546753))
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bsdrp, bsd router project, freenas, nas4free, router, gateway, firewall, pfsense, nanobsd, hardenedbsd, bhyve, devroom, fosdem</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;re joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We&#39;ll be discussing what the BSD Router Project is, what it&#39;s for and where it&#39;s going. All this week&#39;s headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html" rel="nofollow">BSD Devroom CFP</a></h3>

<ul>
<li>This year&#39;s FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom</li>
<li>They&#39;ve issued a call for papers on anything BSD-related, and we always love more presentations</li>
<li>If you&#39;re in the Belgium area or plan on going, submit a talk about something cool you&#39;re doing</li>
<li>There&#39;s also <a href="https://lists.fosdem.org/listinfo/bsd-devroom" rel="nofollow">a mailing list</a> and some more information in the original post
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html" rel="nofollow">Bhyve SVM code merge</a></h3>

<ul>
<li>The bhyve_svm code has been in the &quot;projects&quot; tree of FreeBSD, but is <a href="https://svnweb.freebsd.org/base?view=revision&revision=273375" rel="nofollow">now ready</a> for -CURRENT</li>
<li>This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only</li>
<li>All the supported operating systems and utilities should work on both now</li>
<li>One thing to note: bhyve doesn&#39;t support PCI passthrough on AMD just yet</li>
<li>There may still be <a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html" rel="nofollow">some issues</a> though
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html" rel="nofollow">NetBSD at Open Source Conference Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group held a booth at another recent open source conference</li>
<li>As always, they were running NetBSD on everything you can imagine</li>
<li>One of the users reports back to the mailing list on their experience, providing lots of pictures and links</li>
<li>Here&#39;s an interesting <a href="https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large" rel="nofollow">screenshot of NetBSD running various other BSDs in Xen</a>
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/" rel="nofollow">More BSD switchers every day</a></h3>

<ul>
<li>A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community</li>
<li>Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect</li>
<li>So far, he&#39;s found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion</li>
<li>There&#39;s also <a href="https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/" rel="nofollow">another semi-related thread</a> about another Linux user wanting to switch to BSD because of systemd and GNU people</li>
<li>There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read</li>
<li>Maybe the OPs should&#39;ve just watched this show
***</li>
</ul>

<h2>Interview - Olivier Cochard-Labbé - <a href="mailto:olivier@cochard.me" rel="nofollow">olivier@cochard.me</a> / <a href="https://twitter.com/ocochardlabbe" rel="nofollow">@ocochardlabbe</a></h2>

<p>The BSD Router Project</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420" rel="nofollow">FreeBSD -CURRENT on a T420</a></h3>

<ul>
<li>Thinkpads are quite popular with BSD developers and users</li>
<li>Most of the hardware seems to be supported across the BSDs (especially wifi)</li>
<li>This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI</li>
<li>If you&#39;ve got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***</li>
</ul>

<h3><a href="https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/" rel="nofollow">FreeNAS on a Supermicro 5018A-MHN4</a></h3>

<ul>
<li>More and more people are migrating their NAS devices to BSD-based solutions</li>
<li>In this post, the author goes through setting up FreeNAS on some of his new hardware</li>
<li>His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor</li>
<li>The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs" rel="nofollow">Hardening procfs and linprocfs</a></h3>

<ul>
<li>There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux</li>
<li>There exists a native procfs in FreeBSD, which was the target point of that exploit, but it&#39;s not used very often</li>
<li>The Linux emulation layer also supports its own linprocfs, which was affected as well</li>
<li>The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs</li>
<li>If you want to learn more about ASLR and HardenedBSD, be sure to check out <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">our interview with Shawn</a> too
***</li>
</ul>

<h3><a href="http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/" rel="nofollow">pfSense monitoring with bandwidthd</a></h3>

<ul>
<li>A lot of people run pfSense on their home network, and it&#39;s really useful to monitor the bandwidth usage</li>
<li>This article will walk you through setting up bandwidthd to do exactly that</li>
<li>bandwidthd monitors based on the IP address, rather than per-interface</li>
<li>It can also build some cool HTML graphs, and we love those pfSense graphs</li>
<li>Have a look at our <a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">bandwidth monitoring and testing</a> tutorial for some more ideas
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b5ZZ5qCv" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s20aVvhv2d" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2Vmwxy1QM" rel="nofollow">Zeke writes in</a></li>
<li><a href="http://slexy.org/view/s2LB6MKoNT" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2xxB9uOuV" rel="nofollow">Patrick writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141357595922692&w=2" rel="nofollow">More</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=141358124924479&w=2" rel="nofollow">old bugs</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141332534304117&w=2" rel="nofollow">The Right Font™</a> (<a href="https://twitter.com/blakkheim/status/522162864409546753" rel="nofollow">see also</a>)
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;re joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We&#39;ll be discussing what the BSD Router Project is, what it&#39;s for and where it&#39;s going. All this week&#39;s headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html" rel="nofollow">BSD Devroom CFP</a></h3>

<ul>
<li>This year&#39;s FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom</li>
<li>They&#39;ve issued a call for papers on anything BSD-related, and we always love more presentations</li>
<li>If you&#39;re in the Belgium area or plan on going, submit a talk about something cool you&#39;re doing</li>
<li>There&#39;s also <a href="https://lists.fosdem.org/listinfo/bsd-devroom" rel="nofollow">a mailing list</a> and some more information in the original post
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html" rel="nofollow">Bhyve SVM code merge</a></h3>

<ul>
<li>The bhyve_svm code has been in the &quot;projects&quot; tree of FreeBSD, but is <a href="https://svnweb.freebsd.org/base?view=revision&revision=273375" rel="nofollow">now ready</a> for -CURRENT</li>
<li>This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only</li>
<li>All the supported operating systems and utilities should work on both now</li>
<li>One thing to note: bhyve doesn&#39;t support PCI passthrough on AMD just yet</li>
<li>There may still be <a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html" rel="nofollow">some issues</a> though
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html" rel="nofollow">NetBSD at Open Source Conference Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group held a booth at another recent open source conference</li>
<li>As always, they were running NetBSD on everything you can imagine</li>
<li>One of the users reports back to the mailing list on their experience, providing lots of pictures and links</li>
<li>Here&#39;s an interesting <a href="https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large" rel="nofollow">screenshot of NetBSD running various other BSDs in Xen</a>
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/" rel="nofollow">More BSD switchers every day</a></h3>

<ul>
<li>A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community</li>
<li>Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect</li>
<li>So far, he&#39;s found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion</li>
<li>There&#39;s also <a href="https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/" rel="nofollow">another semi-related thread</a> about another Linux user wanting to switch to BSD because of systemd and GNU people</li>
<li>There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read</li>
<li>Maybe the OPs should&#39;ve just watched this show
***</li>
</ul>

<h2>Interview - Olivier Cochard-Labbé - <a href="mailto:olivier@cochard.me" rel="nofollow">olivier@cochard.me</a> / <a href="https://twitter.com/ocochardlabbe" rel="nofollow">@ocochardlabbe</a></h2>

<p>The BSD Router Project</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420" rel="nofollow">FreeBSD -CURRENT on a T420</a></h3>

<ul>
<li>Thinkpads are quite popular with BSD developers and users</li>
<li>Most of the hardware seems to be supported across the BSDs (especially wifi)</li>
<li>This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI</li>
<li>If you&#39;ve got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***</li>
</ul>

<h3><a href="https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/" rel="nofollow">FreeNAS on a Supermicro 5018A-MHN4</a></h3>

<ul>
<li>More and more people are migrating their NAS devices to BSD-based solutions</li>
<li>In this post, the author goes through setting up FreeNAS on some of his new hardware</li>
<li>His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor</li>
<li>The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs" rel="nofollow">Hardening procfs and linprocfs</a></h3>

<ul>
<li>There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux</li>
<li>There exists a native procfs in FreeBSD, which was the target point of that exploit, but it&#39;s not used very often</li>
<li>The Linux emulation layer also supports its own linprocfs, which was affected as well</li>
<li>The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs</li>
<li>If you want to learn more about ASLR and HardenedBSD, be sure to check out <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">our interview with Shawn</a> too
***</li>
</ul>

<h3><a href="http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/" rel="nofollow">pfSense monitoring with bandwidthd</a></h3>

<ul>
<li>A lot of people run pfSense on their home network, and it&#39;s really useful to monitor the bandwidth usage</li>
<li>This article will walk you through setting up bandwidthd to do exactly that</li>
<li>bandwidthd monitors based on the IP address, rather than per-interface</li>
<li>It can also build some cool HTML graphs, and we love those pfSense graphs</li>
<li>Have a look at our <a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">bandwidth monitoring and testing</a> tutorial for some more ideas
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b5ZZ5qCv" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s20aVvhv2d" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2Vmwxy1QM" rel="nofollow">Zeke writes in</a></li>
<li><a href="http://slexy.org/view/s2LB6MKoNT" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2xxB9uOuV" rel="nofollow">Patrick writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141357595922692&w=2" rel="nofollow">More</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=141358124924479&w=2" rel="nofollow">old bugs</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141332534304117&w=2" rel="nofollow">The Right Font™</a> (<a href="https://twitter.com/blakkheim/status/522162864409546753" rel="nofollow">see also</a>)
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>42: Devious Methods</title>
  <link>https://www.bsdnow.tv/42</link>
  <guid isPermaLink="false">95dc548f-e688-476d-9fd7-8e78ff3cd16f</guid>
  <pubDate>Wed, 18 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/95dc548f-e688-476d-9fd7-8e78ff3cd16f.mp3" length="60629908" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:24:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
PIE and ASLR in FreeBSD update (https://www.soldierx.com/news/Position-Independent-Executable-Support-Added-FreeBSD)
A status update for Shawn Webb's ASLR and PIE work for FreeBSD
One major part of the code, position-independent executable support, has finally been merged into the -CURRENT tree
"FreeBSD has supported loading PIEs for a while now, but the applications in base weren't compiled as PIEs. Given that ASLR is useless without PIE, getting base compiled with PIE support is a mandatory first step in proper ASLR support"
If you're running -CURRENT, just add "WITH_PIE=1" to your /etc/src.conf and /etc/make.conf
The next step is working on the ASLR coding style and getting more developers to look through it
Shawn will also be at EuroBSDCon (in September) giving an updated version of his BSDCan talk about ASLR
***
Misc. pfSense news (https://blog.pfsense.org/?p=1347)
Couple of pfSense news items this week, including some hardware news
Someone's gotta test the pfSense hardware devices before they're sold, which involves powering them all on at least once
To make that process faster, they're building a controllable power board (and include some cool pics)
There will be more info on that device a bit later on
On Friday, June 27th, there will be another video session (https://blog.pfsense.org/?p=1367) (for paying customers only...) about virtualized firewalls
pfSense University (https://blog.pfsense.org/?p=1332), a new paid training course, was also announced
A single two-day class costs $2000, ouch
***
ZFS stripe width (http://blog.delphix.com/matt/2014/06/06/zfs-stripe-width/)
A new blog post from Matt Ahrens (http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods) about ZFS stripe width
"The popularity of OpenZFS has spawned a great community of users, sysadmins, architects and developers, contributing a wealth of advice, tips and tricks, and rules of thumb on how to configure ZFS. In general, this is a great aspect of the ZFS community, but I’d like to take the opportunity to address one piece of misinformed advice"
Matt goes through different situations where you would set up your zpool differently, each with their own advantages and disadvantages
He covers best performance on random IOPS, best reliability, and best space efficiency use cases
It includes a lot of detail on each one, including graphs, and addresses some misconceptions about different RAID-Z levels' overhead factor
***
FreeBSD 9.3-BETA3 released (https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/078959.html)
The third BETA in the 9.3 release cycle is out, we're slowly getting closer to the release
This is expected to be the final BETA, next will come the RCs
There have mostly just been small bug fixes since BETA2, but OpenSSL was also updated and the arc4random code was updated to match what's in -CURRENT (but still isn't using ChaCha20)
The FreeBSD foundation has a blog post (http://freebsdfoundation.blogspot.com/2014/06/freebsd-93-beta3-now-available.html) about it too
There's a list of changes (https://www.freebsd.org/relnotes/9-STABLE/relnotes/article.html) between 9.2 and 9.3 as well, but we'll be sure to cover it when the -RELEASE hits
***
Interview - Bryce Chidester - brycec@devio.us (mailto:brycec@devio.us) / @brycied00d (https://twitter.com/brycied00d)
Running a BSD shell provider
Tutorial
Chaining SSH connections (http://www.bsdnow.tv/tutorials/ssh-chaining)
News Roundup
My FreeBSD adventure (https://www.linuxquestions.org/questions/*bsd-17/my-freebsd-adventure-continued-4175508055/)
A Slackware user from the "linux questions" forum decides to try out BSD, and documents his initial impressions and findings
After ruling out (https://www.linuxquestions.org/questions/*bsd-17/pc-bsd-10-0-is-now-available-4175493047/page2.html#post5142465) PCBSD due to the demanding hardware requirements and NetBSD due to "politics" (whatever that means, his words) he decides to start off with FreeBSD 10, but also mentions trying OpenBSD later on
In his forum post, he covers the documentation (and how easy it makes it for a switcher), dual booting, packages vs ports, network configuration and some other little things
So far, he seems to really enjoy BSD and thinks that it makes a lot of sense compared to Linux
Might be an interesting, ongoing series we can follow up on later
***
Even more BSDCan trip reports (http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-li-wen-hsu.html)
BSDCan may be over until next year, but trip reports are still pouring in
This time we have a summary from Li-Wen Hsu, who was paid for by the FreeBSD foundation
He's part of the "Jenkins CI for FreeBSD" group and went to BSDCan mostly for that
Nice long post about all of his experiences at the event, definitely worth a read
He even talks about... the food
***
FreeBSD disk partitioning (http://blather.michaelwlucas.com/archives/2096)
For his latest book series on FreeBSD's GEOM system, MWL asked the hackers mailing list for some clarification
This erupted into a very long discussion (https://lists.freebsd.org/pipermail/freebsd-hackers/2014-June/045246.html) about fdisk vs gnop vs gpart
So you don't have to read the 500 mailing list posts, he's summarized the findings in a blog post
It covers MBR vs GPT, disk sector sizes and how to handle all of them with which tools
***
BSD Router Project version 1.51 (http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.51)
A new version of the BSD Router Project has been released, 1.51
It's now based on FreeBSD 10-STABLE instead of 10.0-RELEASE
Includes lots of bugfixes and small updates, as well as some patches from pfSense and elsewhere
Check the sourceforge page for the complete list of changes
Bad news... the minimum disk size requirement has increased to 512MB... getting pretty bloated
***
Feedback/Questions
Fongaboo writes in (http://slexy.org/view/s21X4hl28g)
David writes in (http://slexy.org/view/s20DELplMw)
Kristian writes in (http://slexy.org/view/s2tmazORRN)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, openssh, chaining, tor, hopping, jump host, tunnel, vpn, cowsay, 9.3, beta, release, pie, aslr, zfs, zpool, matt ahrens, delphix, foundation, devious, devio.us, bcallah is a noob, shell, shell provider, free, hosting, vps, vpn, ixsystems, tarsnap, bsdcan, report, bsd router project, router, pfsense, m0n0wall, openstack, security, linux, slackware, switching, linux vs bsd, netgate, firewall, university, hangout</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.soldierx.com/news/Position-Independent-Executable-Support-Added-FreeBSD" rel="nofollow">PIE and ASLR in FreeBSD update</a></h3>

<ul>
<li>A status update for Shawn Webb&#39;s ASLR and PIE work for FreeBSD</li>
<li>One major part of the code, position-independent executable support, has finally been merged into the -CURRENT tree</li>
<li>&quot;FreeBSD has supported loading PIEs for a while now, but the applications in base weren&#39;t compiled as PIEs. Given that ASLR is useless without PIE, getting base compiled with PIE support is a mandatory first step in proper ASLR support&quot;</li>
<li>If you&#39;re running -CURRENT, just add &quot;WITH_PIE=1&quot; to your /etc/src.conf and /etc/make.conf</li>
<li>The next step is working on the ASLR coding style and getting more developers to look through it</li>
<li>Shawn will also be at EuroBSDCon (in September) giving an updated version of his BSDCan talk about ASLR
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1347" rel="nofollow">Misc. pfSense news</a></h3>

<ul>
<li>Couple of pfSense news items this week, including some hardware news</li>
<li>Someone&#39;s gotta test the pfSense hardware devices before they&#39;re sold, which involves powering them all on at least once</li>
<li>To make that process faster, they&#39;re building a controllable power board (and include some cool pics)</li>
<li>There will be more info on that device a bit later on</li>
<li>On Friday, June 27th, there will be <a href="https://blog.pfsense.org/?p=1367" rel="nofollow">another video session</a> (for paying customers only...) about virtualized firewalls</li>
<li>pfSense <a href="https://blog.pfsense.org/?p=1332" rel="nofollow">University</a>, a new paid training course, was also announced</li>
<li>A single two-day class costs $2000, ouch
***</li>
</ul>

<h3><a href="http://blog.delphix.com/matt/2014/06/06/zfs-stripe-width/" rel="nofollow">ZFS stripe width</a></h3>

<ul>
<li>A new blog post from <a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matt Ahrens</a> about ZFS stripe width</li>
<li>&quot;The popularity of OpenZFS has spawned a great community of users, sysadmins, architects and developers, contributing a wealth of advice, tips and tricks, and rules of thumb on how to configure ZFS. In general, this is a great aspect of the ZFS community, but I’d like to take the opportunity to address one piece of misinformed advice&quot;</li>
<li>Matt goes through different situations where you would set up your zpool differently, each with their own advantages and disadvantages</li>
<li>He covers best performance on random IOPS, best reliability, and best space efficiency use cases</li>
<li>It includes a lot of detail on each one, including graphs, and addresses some misconceptions about different RAID-Z levels&#39; overhead factor
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/078959.html" rel="nofollow">FreeBSD 9.3-BETA3 released</a></h3>

<ul>
<li>The third BETA in the 9.3 release cycle is out, we&#39;re slowly getting closer to the release</li>
<li>This is expected to be the final BETA, next will come the RCs</li>
<li>There have mostly just been small bug fixes since BETA2, but OpenSSL was also updated and the arc4random code was updated to match what&#39;s in -CURRENT (but still isn&#39;t using ChaCha20)</li>
<li>The FreeBSD foundation has <a href="http://freebsdfoundation.blogspot.com/2014/06/freebsd-93-beta3-now-available.html" rel="nofollow">a blog post</a> about it too</li>
<li>There&#39;s <a href="https://www.freebsd.org/relnotes/9-STABLE/relnotes/article.html" rel="nofollow">a list of changes</a> between 9.2 and 9.3 as well, but we&#39;ll be sure to cover it when the -RELEASE hits
***</li>
</ul>

<h2>Interview - Bryce Chidester - <a href="mailto:brycec@devio.us" rel="nofollow">brycec@devio.us</a> / <a href="https://twitter.com/brycied00d" rel="nofollow">@brycied00d</a></h2>

<p>Running a BSD shell provider</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-chaining" rel="nofollow">Chaining SSH connections</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.linuxquestions.org/questions/*bsd-17/my-freebsd-adventure-continued-4175508055/" rel="nofollow">My FreeBSD adventure</a></h3>

<ul>
<li>A Slackware user from the &quot;linux questions&quot; forum decides to try out BSD, and documents his initial impressions and findings</li>
<li>After <a href="https://www.linuxquestions.org/questions/*bsd-17/pc-bsd-10-0-is-now-available-4175493047/page2.html#post5142465" rel="nofollow">ruling out</a> PCBSD due to the demanding hardware requirements and NetBSD due to &quot;politics&quot; (whatever that means, his words) he decides to start off with FreeBSD 10, but also mentions trying OpenBSD later on</li>
<li>In his forum post, he covers the documentation (and how easy it makes it for a switcher), dual booting, packages vs ports, network configuration and some other little things</li>
<li>So far, he seems to really enjoy BSD and thinks that it makes a lot of sense compared to Linux</li>
<li>Might be an interesting, ongoing series we can follow up on later
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-li-wen-hsu.html" rel="nofollow">Even more BSDCan trip reports</a></h3>

<ul>
<li>BSDCan may be over until next year, but trip reports are still pouring in</li>
<li>This time we have a summary from Li-Wen Hsu, who was paid for by the FreeBSD foundation</li>
<li>He&#39;s part of the &quot;Jenkins CI for FreeBSD&quot; group and went to BSDCan mostly for that</li>
<li>Nice long post about all of his experiences at the event, definitely worth a read</li>
<li>He even talks about... the food
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2096" rel="nofollow">FreeBSD disk partitioning</a></h3>

<ul>
<li>For his latest book series on FreeBSD&#39;s GEOM system, MWL asked the hackers mailing list for some clarification</li>
<li>This erupted into a very <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-June/045246.html" rel="nofollow">long discussion</a> about fdisk vs gnop vs gpart</li>
<li>So you don&#39;t have to read the 500 mailing list posts, he&#39;s summarized the findings in a blog post</li>
<li>It covers MBR vs GPT, disk sector sizes and how to handle all of them with which tools
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.51" rel="nofollow">BSD Router Project version 1.51</a></h3>

<ul>
<li>A new version of the BSD Router Project has been released, 1.51</li>
<li>It&#39;s now based on FreeBSD 10-STABLE instead of 10.0-RELEASE</li>
<li>Includes lots of bugfixes and small updates, as well as some patches from pfSense and elsewhere</li>
<li>Check the sourceforge page for the complete list of changes</li>
<li>Bad news... the minimum disk size requirement has increased to 512MB... getting pretty bloated
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21X4hl28g" rel="nofollow">Fongaboo writes in</a></li>
<li><a href="http://slexy.org/view/s20DELplMw" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2tmazORRN" rel="nofollow">Kristian writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.soldierx.com/news/Position-Independent-Executable-Support-Added-FreeBSD" rel="nofollow">PIE and ASLR in FreeBSD update</a></h3>

<ul>
<li>A status update for Shawn Webb&#39;s ASLR and PIE work for FreeBSD</li>
<li>One major part of the code, position-independent executable support, has finally been merged into the -CURRENT tree</li>
<li>&quot;FreeBSD has supported loading PIEs for a while now, but the applications in base weren&#39;t compiled as PIEs. Given that ASLR is useless without PIE, getting base compiled with PIE support is a mandatory first step in proper ASLR support&quot;</li>
<li>If you&#39;re running -CURRENT, just add &quot;WITH_PIE=1&quot; to your /etc/src.conf and /etc/make.conf</li>
<li>The next step is working on the ASLR coding style and getting more developers to look through it</li>
<li>Shawn will also be at EuroBSDCon (in September) giving an updated version of his BSDCan talk about ASLR
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1347" rel="nofollow">Misc. pfSense news</a></h3>

<ul>
<li>Couple of pfSense news items this week, including some hardware news</li>
<li>Someone&#39;s gotta test the pfSense hardware devices before they&#39;re sold, which involves powering them all on at least once</li>
<li>To make that process faster, they&#39;re building a controllable power board (and include some cool pics)</li>
<li>There will be more info on that device a bit later on</li>
<li>On Friday, June 27th, there will be <a href="https://blog.pfsense.org/?p=1367" rel="nofollow">another video session</a> (for paying customers only...) about virtualized firewalls</li>
<li>pfSense <a href="https://blog.pfsense.org/?p=1332" rel="nofollow">University</a>, a new paid training course, was also announced</li>
<li>A single two-day class costs $2000, ouch
***</li>
</ul>

<h3><a href="http://blog.delphix.com/matt/2014/06/06/zfs-stripe-width/" rel="nofollow">ZFS stripe width</a></h3>

<ul>
<li>A new blog post from <a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matt Ahrens</a> about ZFS stripe width</li>
<li>&quot;The popularity of OpenZFS has spawned a great community of users, sysadmins, architects and developers, contributing a wealth of advice, tips and tricks, and rules of thumb on how to configure ZFS. In general, this is a great aspect of the ZFS community, but I’d like to take the opportunity to address one piece of misinformed advice&quot;</li>
<li>Matt goes through different situations where you would set up your zpool differently, each with their own advantages and disadvantages</li>
<li>He covers best performance on random IOPS, best reliability, and best space efficiency use cases</li>
<li>It includes a lot of detail on each one, including graphs, and addresses some misconceptions about different RAID-Z levels&#39; overhead factor
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/078959.html" rel="nofollow">FreeBSD 9.3-BETA3 released</a></h3>

<ul>
<li>The third BETA in the 9.3 release cycle is out, we&#39;re slowly getting closer to the release</li>
<li>This is expected to be the final BETA, next will come the RCs</li>
<li>There have mostly just been small bug fixes since BETA2, but OpenSSL was also updated and the arc4random code was updated to match what&#39;s in -CURRENT (but still isn&#39;t using ChaCha20)</li>
<li>The FreeBSD foundation has <a href="http://freebsdfoundation.blogspot.com/2014/06/freebsd-93-beta3-now-available.html" rel="nofollow">a blog post</a> about it too</li>
<li>There&#39;s <a href="https://www.freebsd.org/relnotes/9-STABLE/relnotes/article.html" rel="nofollow">a list of changes</a> between 9.2 and 9.3 as well, but we&#39;ll be sure to cover it when the -RELEASE hits
***</li>
</ul>

<h2>Interview - Bryce Chidester - <a href="mailto:brycec@devio.us" rel="nofollow">brycec@devio.us</a> / <a href="https://twitter.com/brycied00d" rel="nofollow">@brycied00d</a></h2>

<p>Running a BSD shell provider</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-chaining" rel="nofollow">Chaining SSH connections</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.linuxquestions.org/questions/*bsd-17/my-freebsd-adventure-continued-4175508055/" rel="nofollow">My FreeBSD adventure</a></h3>

<ul>
<li>A Slackware user from the &quot;linux questions&quot; forum decides to try out BSD, and documents his initial impressions and findings</li>
<li>After <a href="https://www.linuxquestions.org/questions/*bsd-17/pc-bsd-10-0-is-now-available-4175493047/page2.html#post5142465" rel="nofollow">ruling out</a> PCBSD due to the demanding hardware requirements and NetBSD due to &quot;politics&quot; (whatever that means, his words) he decides to start off with FreeBSD 10, but also mentions trying OpenBSD later on</li>
<li>In his forum post, he covers the documentation (and how easy it makes it for a switcher), dual booting, packages vs ports, network configuration and some other little things</li>
<li>So far, he seems to really enjoy BSD and thinks that it makes a lot of sense compared to Linux</li>
<li>Might be an interesting, ongoing series we can follow up on later
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-li-wen-hsu.html" rel="nofollow">Even more BSDCan trip reports</a></h3>

<ul>
<li>BSDCan may be over until next year, but trip reports are still pouring in</li>
<li>This time we have a summary from Li-Wen Hsu, who was paid for by the FreeBSD foundation</li>
<li>He&#39;s part of the &quot;Jenkins CI for FreeBSD&quot; group and went to BSDCan mostly for that</li>
<li>Nice long post about all of his experiences at the event, definitely worth a read</li>
<li>He even talks about... the food
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2096" rel="nofollow">FreeBSD disk partitioning</a></h3>

<ul>
<li>For his latest book series on FreeBSD&#39;s GEOM system, MWL asked the hackers mailing list for some clarification</li>
<li>This erupted into a very <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-June/045246.html" rel="nofollow">long discussion</a> about fdisk vs gnop vs gpart</li>
<li>So you don&#39;t have to read the 500 mailing list posts, he&#39;s summarized the findings in a blog post</li>
<li>It covers MBR vs GPT, disk sector sizes and how to handle all of them with which tools
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.51" rel="nofollow">BSD Router Project version 1.51</a></h3>

<ul>
<li>A new version of the BSD Router Project has been released, 1.51</li>
<li>It&#39;s now based on FreeBSD 10-STABLE instead of 10.0-RELEASE</li>
<li>Includes lots of bugfixes and small updates, as well as some patches from pfSense and elsewhere</li>
<li>Check the sourceforge page for the complete list of changes</li>
<li>Bad news... the minimum disk size requirement has increased to 512MB... getting pretty bloated
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21X4hl28g" rel="nofollow">Fongaboo writes in</a></li>
<li><a href="http://slexy.org/view/s20DELplMw" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2tmazORRN" rel="nofollow">Kristian writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>36: Let's Get RAID</title>
  <link>https://www.bsdnow.tv/36</link>
  <guid isPermaLink="false">485b12e9-ea67-4bc6-9709-4b0e38a76184</guid>
  <pubDate>Wed, 07 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/485b12e9-ea67-4bc6-9709-4b0e38a76184.mp3" length="65368948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
OpenBSD 5.5 released (http://www.openbsd.org/55.html)
If you ordered (https://https.openbsd.org/cgi-bin/order) a CD set (https://twitter.com/blakkheim/status/461909893813784576) then you've probably had it for a little while already, but OpenBSD has formally announced the public release (http://undeadly.org/cgi?action=article&amp;amp;sid=20140501153339) of 5.5
This is one of the biggest releases to date, with a very long list of changes and improvements
Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more
The full list of changes (http://www.openbsd.org/plus55.html) is HUGE, be sure to read through it all if you're interested in the details
If you're doing an upgrade from 5.4 instead of a fresh install, pay careful attention to the upgrade guide (http://www.openbsd.org/faq/upgrade55.html) as there are some very specific steps for this version
Also be sure to apply the errata patches (http://www.openbsd.org/errata55.html) on your new installations... especially those OpenSSL ones (some of which still aren't fixed (http://marc.info/?l=oss-security&amp;amp;m=139906348230995&amp;amp;w=2) in the other BSDs yet)
On the topic of errata patches, the project is now going to also send them out (signed (http://undeadly.org/cgi?action=article&amp;amp;sid=20140502103355)) via the announce mailing list (http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&amp;amp;passw=&amp;amp;func=lists-long-full&amp;amp;extra=announce), a very welcome change
Congrats to the whole team on this great release - 5.6 is going to be even more awesome with "Libre"SSL and lots of other stuff that's currently in development
***
FreeBSD foundation funding highlights (http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html)
The FreeBSD foundation posts a new update on how they're spending the money that everyone donates
"As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we've done to help FreeBSD become the most innovative, reliable, and high-performance operation system"
During this spring, they want to highlight the new UEFI boot support and newcons (http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html)
There's a lot of details about what exactly UEFI is and why we need it going forward
FreeBSD has also needed some updates to its console to support UTF8 and wide characters
Hopefully this series will continue and we'll get to see what other work is being sponsored
***
OpenSSH without OpenSSL (http://marc.info/?l=openbsd-cvs&amp;amp;m=139879453001957&amp;amp;w=2)
The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional
Since it won't have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security
This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the new combination (http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain) of the Chacha20 stream cipher with Poly1305 for packet integrity
Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs
No support for RSA, DSA or ECDSA public keys - only Ed25519
It also includes a new buffer API (http://marc.info/?l=openbsd-cvs&amp;amp;m=139883582313750&amp;amp;w=2) and a set of wrappers to make it compatible with the existing API
Believe it or not, this was planned before all the heartbleed craziness
Maybe someday soon we'll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***
BSDMag's April 2014 issue is out (http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue)
The free monthly BSD magazine has got a new issue available for download
This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online
Anyone can contribute to the magazine, just send the editors an email about what you want to write
No Linux articles this time around, good
***
Interview - David Chisnall - theraven@freebsd.org (mailto:theraven@freebsd.org)
The LLVM/Clang switch, FreeBSD's core team, various topics
Tutorial
RAID in FreeBSD and OpenBSD (http://www.bsdnow.tv/tutorials/raid)
News Roundup
BSDTalk episode 240 (http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html)
Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time
Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more
GNN also talks a little about the Precision Time Protocol (https://en.wikipedia.org/wiki/Precision_Time_Protocol) and how it's different than NTP
Two people (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) we've interviewed (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) talking to each other, awesome
If you're interested in NTP, be sure to see our tutorial (http://www.bsdnow.tv/tutorials/ntpd) too
***
m2k14 trip reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140502092427)
We've got a few more reports from the recent OpenBSD hackathon in Morocco
The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the OpenBSD desktop tutorial (http://www.bsdnow.tv/tutorials/the-desktop-obsd))
"Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do"
He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports' compatibility with LibreSSL
Speaking of LibreSSL, there's an article (http://undeadly.org/cgi?action=article&amp;amp;sid=20140505062023) all would-be portable version writers should probably read and take into consideration
Jasper Adriaanse also writes (http://undeadly.org/cgi?action=article&amp;amp;sid=20140501185019) about what he got done over there
He cleaned up and fixed the puppet port to work better with OpenBSD
***
Why you should use FreeBSD on your cloud VPS (https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/)
Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD
Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows
The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options
The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/)
Big changes coming in the way PCBSD manages software
The PBI system, AppCafe and related tools are all going to use pkgng now
The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree
New rating system coming soon and much more
***
Feedback/Questions
Martin writes in (http://slexy.org/view/s21bk2oPuQ)
John writes in (http://slexy.org/view/s2n9fx1Rpw)
Alex writes in (http://slexy.org/view/s2rBBKLA4u)
Goetz writes in (http://slexy.org/view/s20JY6ZI71)
Jarrad writes in (http://slexy.org/view/s20YV5Ohpa)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, theraven, david chisnall, core, core team, clang, gcc, llvm, raid, stripe, mirror, bioctl, gstripe, zfs, gmirror, graid, ufs, ffs, disks, the worst pun i've done so far, i regret this already, redundancy, raid0, raid1, raid5, raidz, raid-z, filesystem, 5.5, pie, aslr, cd set, demo, tour, opensmtpd, pf, gnome, gnome3, marcusports, ports, router, signify, hackathon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>35: Puffy Firewall</title>
  <link>https://www.bsdnow.tv/35</link>
  <guid isPermaLink="false">203904d9-509c-4727-918f-d5e6a6276cf8</guid>
  <pubDate>Wed, 30 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/203904d9-509c-4727-918f-d5e6a6276cf8.mp3" length="57157492" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back again! On this week's packed show, we've got one of the biggest tutorials we've done in a while. It's an in-depth look at PF, OpenBSD's firewall, with some practical examples and different use cases. We'll also be talking to Peter Hansteen about the new edition of "The Book of PF." Of course, we've got news and answers to your emails too, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:19:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back again! On this week's packed show, we've got one of the biggest tutorials we've done in a while. It's an in-depth look at PF, OpenBSD's firewall, with some practical examples and different use cases. We'll also be talking to Peter Hansteen about the new edition of "The Book of PF." Of course, we've got news and answers to your emails too, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
ALTQ removed from PF (http://undeadly.org/cgi?action=article&amp;amp;sid=20140419151959)
Kicking off our big PF episode...
The classic packet queueing system, ALTQ, was recently removed from OpenBSD -current
There will be a transitional phase between 5.5 and 5.6 where you can still use it by replacing the "queue" keyword with "oldqueue" in your pf.conf
As of 5.6, due about six months from now, you'll have to change your ruleset to the new syntax if you're using it for bandwidth shaping
After more than ten years, bandwidth queueing has matured quite a bit and we can finally put ALTQ to rest, in favor of the new queueing subsystem
This doesn't affect FreeBSD, PCBSD, NetBSD or DragonflyBSD since all of their PFs are older and maintained separately.
***
FreeBSD Quarterly Status Report (https://www.freebsd.org/news/status/report-2014-01-2014-03.html)
The quarterly status report from FreeBSD is out, detailing some of the project's ongoing tasks
Some highlights include the first "stable" branch of ports, ARM improvements (including SMP), bhyve improvements, more work on the test suite, desktop improvements including the new vt console driver and UEFI booting support finally being added
We've got some specific updates from the cluster admin team, core team, documentation team, portmgr team, email team and release engineering team
LOTS of details and LOTS of topics to cover, give it a read
***
OpenBSD's OpenSSL rewrite continues with m2k14 (http://undeadly.org/cgi?action=article&amp;amp;sid=20140417184158)
A mini OpenBSD hackathon (http://www.openbsd.org/hackathons.html) begins in Morocco, Africa
You can follow the changes in the -current CVS log (http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/), but a lot of work (http://undeadly.org/cgi?action=article&amp;amp;sid=20140418063443) is mainly going towards the OpenSSL cleaning
We've got two trip (http://undeadly.org/cgi?action=article&amp;amp;sid=20140429121423) reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140425115340) so far, hopefully we'll have some more to show you in a future episode
You can see some of the more interesting quotes (http://opensslrampage.org/) from the tear-down or see everything (http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf)
Apparently (http://undeadly.org/cgi?action=article&amp;amp;sid=20140423045847) they are going to call the fork "LibreSSL (https://news.ycombinator.com/item?id=7623789)" ....
What were the OpenSSL developers thinking (http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf)? The RSA private key was used to seed the entropy!
We also got some mainstream news coverage (http://www.zdnet.com/openbsd-forks-prunes-fixes-openssl-7000028613/) and another post from Ted (http://www.tedunangst.com/flak/post/origins-of-libressl) about the history of the fork
Definitely consider donating to the OpenBSD foundation (http://www.openbsdfoundation.org/donations.html), this fork will benefit all the other BSDs too
***
NetBSD 6.1.4 and 6.0.5 released (https://blog.netbsd.org/tnf/entry/netbsd_6_1_4_and)
New updates for the 6.1 and 6.0 branches of NetBSD, focusing on bugfixes
The main update is - of course - the heartbleed vulnerability
Also includes fixes for other security issues and even a kernel panic... on Atari
Patch your Ataris right now, this is serious business
***
Interview - Peter Hansteen - peter@bsdly.net (mailto:peter@bsdly.net) / @pitrh (https://twitter.com/pitrh)
The Book of PF: 3rd edition
Tutorial
BSD Firewalls: PF (http://www.bsdnow.tv/tutorials/pf)
News Roundup
New Xorg now the default in FreeBSD (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=351411)
For quite a while now, FreeBSD has had two versions of X11 in ports
The older, stable version was the default, but you could install a newer one by having "WITHNEWXORG" in /etc/make.conf
They've finally made the switch for 10-STABLE and 9-STABLE
Check this wiki page (https://wiki.freebsd.org/Graphics) for more info
***
GSoC-accepted BSD projects (https://www.google-melange.com/gsoc/org2/google/gsoc2014/openbsdfoundation)
The Google Summer of Code team has got the list of accepted project proposals uploaded so we can see what's planned
OpenBSD's list includes DHCP configuration parsing improvements, systemd replacements, porting capsicum, GPT and UEFI support, and modernizing the DHCP daemon
The FreeBSD list (https://www.google-melange.com/gsoc/org2/google/gsoc2014/freebsd) was also posted
Theirs includes porting FreeBSD to the Android emulator, CTF in the kernel debugger, improved unicode support, converting firewall rules to a C module, pkgng improvements, MicroBlaze support, PXE fixes, bhyve caching, bootsplash and lots more
Good luck to all the students participating, hopefully they become full time BSD users
***
Complexity of FreeBSD VFS using ZFS as an example (http://www.hybridcluster.com/blog/complexity-freebsd-vfs-using-zfs-example-part-2/)
HybridCluster posted the second part of their VFS and ZFS series
This new post has lots of technical details once again, definitely worth reading if you're a ZFS guy
Of course, also watch episode 24 (http://www.bsdnow.tv/episodes/2014_02_12-the_cluster_the_cloud) for our interview with HybridCluster - they do really interesting stuff
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/04/weekly-feature-digest-26-the-lumina-project-and-preload/)
Preload has been ported over, it's a daemon that prefetches applications
PCBSD is developing their own desktop environment, Lumina (there's also an FAQ (http://blog.pcbsd.org/2014/04/quick-lumina-desktop-faq/))
It's still in active development, but you can try it out by installing from ports
We'll be showing a live demo of it in a few weeks (when development settles down a bit)
Some kid in Australia subjects his poor mother to being on camera (https://www.youtube.com/watch?v=ETxhbf3-z18) while she tries out PCBSD and gives her impressions of it
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pf, firewall, pfsense, ipfw, ipfilter, router, packet filter, book of pf, third edition, 3rd, bsdcan, presentation, security, peter hansteen, peter n.m. hansteen, pitrh, iptables, npf, nostarch, no starch press, m2k14, hackathon, libressl, openssl, fork</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back again! On this week&#39;s packed show, we&#39;ve got one of the biggest tutorials we&#39;ve done in a while. It&#39;s an in-depth look at PF, OpenBSD&#39;s firewall, with some practical examples and different use cases. We&#39;ll also be talking to Peter Hansteen about the new edition of &quot;The Book of PF.&quot; Of course, we&#39;ve got news and answers to your emails too, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">ALTQ removed from PF</a></h3>

<ul>
<li>Kicking off our big PF episode...</li>
<li>The classic packet queueing system, ALTQ, was recently removed from OpenBSD -current</li>
<li>There will be a transitional phase between 5.5 and 5.6 where you can still use it by replacing the &quot;queue&quot; keyword with &quot;oldqueue&quot; in your pf.conf</li>
<li>As of 5.6, due about six months from now, you&#39;ll have to change your ruleset to the new syntax if you&#39;re using it for bandwidth shaping</li>
<li>After more than ten years, bandwidth queueing has matured quite a bit and we can finally put ALTQ to rest, in favor of the new queueing subsystem</li>
<li>This doesn&#39;t affect FreeBSD, PCBSD, NetBSD or DragonflyBSD since all of their PFs are older and maintained separately.
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-01-2014-03.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The quarterly status report from FreeBSD is out, detailing some of the project&#39;s ongoing tasks</li>
<li>Some highlights include the first &quot;stable&quot; branch of ports, ARM improvements (including SMP), bhyve improvements, more work on the test suite, desktop improvements including the new vt console driver and UEFI booting support finally being added</li>
<li>We&#39;ve got some specific updates from the cluster admin team, core team, documentation team, portmgr team, email team and release engineering team</li>
<li>LOTS of details and LOTS of topics to cover, give it a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140417184158" rel="nofollow">OpenBSD&#39;s OpenSSL rewrite continues with m2k14</a></h3>

<ul>
<li>A mini OpenBSD <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a> begins in Morocco, Africa</li>
<li>You can follow the changes in <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/" rel="nofollow">the -current CVS log</a>, but <a href="http://undeadly.org/cgi?action=article&sid=20140418063443" rel="nofollow">a lot of work</a> is mainly going towards the OpenSSL cleaning</li>
<li>We&#39;ve got two <a href="http://undeadly.org/cgi?action=article&sid=20140429121423" rel="nofollow">trip</a> <a href="http://undeadly.org/cgi?action=article&sid=20140425115340" rel="nofollow">reports</a> so far, hopefully we&#39;ll have some more to show you in a future episode</li>
<li>You can see some of the <a href="http://opensslrampage.org/" rel="nofollow">more interesting quotes</a> from the tear-down or <a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">see everything</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140423045847" rel="nofollow">Apparently</a> they are going to call the fork &quot;<a href="https://news.ycombinator.com/item?id=7623789" rel="nofollow">LibreSSL</a>&quot; ....</li>
<li><a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">What were the OpenSSL developers thinking</a>? The RSA private key was used to seed the entropy!</li>
<li>We also got <a href="http://www.zdnet.com/openbsd-forks-prunes-fixes-openssl-7000028613/" rel="nofollow">some mainstream news coverage</a> and <a href="http://www.tedunangst.com/flak/post/origins-of-libressl" rel="nofollow">another post from Ted</a> about the history of the fork</li>
<li>Definitely consider <a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">donating to the OpenBSD foundation</a>, this fork will benefit all the other BSDs too
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_4_and" rel="nofollow">NetBSD 6.1.4 and 6.0.5 released</a></h3>

<ul>
<li>New updates for the 6.1 and 6.0 branches of NetBSD, focusing on bugfixes</li>
<li>The main update is - of course - the heartbleed vulnerability</li>
<li>Also includes fixes for other security issues and even a kernel panic... on Atari</li>
<li>Patch your Ataris right now, this is serious business
***</li>
</ul>

<h2>Interview - Peter Hansteen - <a href="mailto:peter@bsdly.net" rel="nofollow">peter@bsdly.net</a> / <a href="https://twitter.com/pitrh" rel="nofollow">@pitrh</a></h2>

<p>The Book of PF: 3rd edition</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">BSD Firewalls: PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=351411" rel="nofollow">New Xorg now the default in FreeBSD</a></h3>

<ul>
<li>For quite a while now, FreeBSD has had two versions of X11 in ports</li>
<li>The older, stable version was the default, but you could install a newer one by having &quot;WITH_NEW_XORG&quot; in /etc/make.conf</li>
<li>They&#39;ve finally made the switch for 10-STABLE and 9-STABLE</li>
<li>Check <a href="https://wiki.freebsd.org/Graphics" rel="nofollow">this wiki page</a> for more info
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/openbsdfoundation" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code team has got the list of accepted project proposals uploaded so we can see what&#39;s planned</li>
<li>OpenBSD&#39;s list includes DHCP configuration parsing improvements, systemd replacements, porting capsicum, GPT and UEFI support, and modernizing the DHCP daemon</li>
<li>The <a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/freebsd" rel="nofollow">FreeBSD list</a> was also posted</li>
<li>Theirs includes porting FreeBSD to the Android emulator, CTF in the kernel debugger, improved unicode support, converting firewall rules to a C module, pkgng improvements, MicroBlaze support, PXE fixes, bhyve caching, bootsplash and lots more</li>
<li>Good luck to all the students participating, hopefully they become full time BSD users
***</li>
</ul>

<h3><a href="http://www.hybridcluster.com/blog/complexity-freebsd-vfs-using-zfs-example-part-2/" rel="nofollow">Complexity of FreeBSD VFS using ZFS as an example</a></h3>

<ul>
<li>HybridCluster posted the second part of their VFS and ZFS series</li>
<li>This new post has lots of technical details once again, definitely worth reading if you&#39;re a ZFS guy</li>
<li>Of course, also watch <a href="http://www.bsdnow.tv/episodes/2014_02_12-the_cluster_the_cloud" rel="nofollow">episode 24</a> for our interview with HybridCluster - they do really interesting stuff
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/weekly-feature-digest-26-the-lumina-project-and-preload/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Preload has been ported over, it&#39;s a daemon that prefetches applications</li>
<li>PCBSD is developing their own desktop environment, Lumina (<a href="http://blog.pcbsd.org/2014/04/quick-lumina-desktop-faq/" rel="nofollow">there&#39;s also an FAQ</a>)</li>
<li>It&#39;s still in active development, but you can try it out by installing from ports</li>
<li>We&#39;ll be showing a live demo of it in a few weeks (when development settles down a bit)</li>
<li>Some kid in Australia <a href="https://www.youtube.com/watch?v=ETxhbf3-z18" rel="nofollow">subjects his poor mother to being on camera</a> while she tries out PCBSD and gives her impressions of it
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back again! On this week&#39;s packed show, we&#39;ve got one of the biggest tutorials we&#39;ve done in a while. It&#39;s an in-depth look at PF, OpenBSD&#39;s firewall, with some practical examples and different use cases. We&#39;ll also be talking to Peter Hansteen about the new edition of &quot;The Book of PF.&quot; Of course, we&#39;ve got news and answers to your emails too, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">ALTQ removed from PF</a></h3>

<ul>
<li>Kicking off our big PF episode...</li>
<li>The classic packet queueing system, ALTQ, was recently removed from OpenBSD -current</li>
<li>There will be a transitional phase between 5.5 and 5.6 where you can still use it by replacing the &quot;queue&quot; keyword with &quot;oldqueue&quot; in your pf.conf</li>
<li>As of 5.6, due about six months from now, you&#39;ll have to change your ruleset to the new syntax if you&#39;re using it for bandwidth shaping</li>
<li>After more than ten years, bandwidth queueing has matured quite a bit and we can finally put ALTQ to rest, in favor of the new queueing subsystem</li>
<li>This doesn&#39;t affect FreeBSD, PCBSD, NetBSD or DragonflyBSD since all of their PFs are older and maintained separately.
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-01-2014-03.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The quarterly status report from FreeBSD is out, detailing some of the project&#39;s ongoing tasks</li>
<li>Some highlights include the first &quot;stable&quot; branch of ports, ARM improvements (including SMP), bhyve improvements, more work on the test suite, desktop improvements including the new vt console driver and UEFI booting support finally being added</li>
<li>We&#39;ve got some specific updates from the cluster admin team, core team, documentation team, portmgr team, email team and release engineering team</li>
<li>LOTS of details and LOTS of topics to cover, give it a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140417184158" rel="nofollow">OpenBSD&#39;s OpenSSL rewrite continues with m2k14</a></h3>

<ul>
<li>A mini OpenBSD <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a> begins in Morocco, Africa</li>
<li>You can follow the changes in <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/" rel="nofollow">the -current CVS log</a>, but <a href="http://undeadly.org/cgi?action=article&sid=20140418063443" rel="nofollow">a lot of work</a> is mainly going towards the OpenSSL cleaning</li>
<li>We&#39;ve got two <a href="http://undeadly.org/cgi?action=article&sid=20140429121423" rel="nofollow">trip</a> <a href="http://undeadly.org/cgi?action=article&sid=20140425115340" rel="nofollow">reports</a> so far, hopefully we&#39;ll have some more to show you in a future episode</li>
<li>You can see some of the <a href="http://opensslrampage.org/" rel="nofollow">more interesting quotes</a> from the tear-down or <a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">see everything</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140423045847" rel="nofollow">Apparently</a> they are going to call the fork &quot;<a href="https://news.ycombinator.com/item?id=7623789" rel="nofollow">LibreSSL</a>&quot; ....</li>
<li><a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">What were the OpenSSL developers thinking</a>? The RSA private key was used to seed the entropy!</li>
<li>We also got <a href="http://www.zdnet.com/openbsd-forks-prunes-fixes-openssl-7000028613/" rel="nofollow">some mainstream news coverage</a> and <a href="http://www.tedunangst.com/flak/post/origins-of-libressl" rel="nofollow">another post from Ted</a> about the history of the fork</li>
<li>Definitely consider <a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">donating to the OpenBSD foundation</a>, this fork will benefit all the other BSDs too
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_4_and" rel="nofollow">NetBSD 6.1.4 and 6.0.5 released</a></h3>

<ul>
<li>New updates for the 6.1 and 6.0 branches of NetBSD, focusing on bugfixes</li>
<li>The main update is - of course - the heartbleed vulnerability</li>
<li>Also includes fixes for other security issues and even a kernel panic... on Atari</li>
<li>Patch your Ataris right now, this is serious business
***</li>
</ul>

<h2>Interview - Peter Hansteen - <a href="mailto:peter@bsdly.net" rel="nofollow">peter@bsdly.net</a> / <a href="https://twitter.com/pitrh" rel="nofollow">@pitrh</a></h2>

<p>The Book of PF: 3rd edition</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">BSD Firewalls: PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=351411" rel="nofollow">New Xorg now the default in FreeBSD</a></h3>

<ul>
<li>For quite a while now, FreeBSD has had two versions of X11 in ports</li>
<li>The older, stable version was the default, but you could install a newer one by having &quot;WITH_NEW_XORG&quot; in /etc/make.conf</li>
<li>They&#39;ve finally made the switch for 10-STABLE and 9-STABLE</li>
<li>Check <a href="https://wiki.freebsd.org/Graphics" rel="nofollow">this wiki page</a> for more info
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/openbsdfoundation" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code team has got the list of accepted project proposals uploaded so we can see what&#39;s planned</li>
<li>OpenBSD&#39;s list includes DHCP configuration parsing improvements, systemd replacements, porting capsicum, GPT and UEFI support, and modernizing the DHCP daemon</li>
<li>The <a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/freebsd" rel="nofollow">FreeBSD list</a> was also posted</li>
<li>Theirs includes porting FreeBSD to the Android emulator, CTF in the kernel debugger, improved unicode support, converting firewall rules to a C module, pkgng improvements, MicroBlaze support, PXE fixes, bhyve caching, bootsplash and lots more</li>
<li>Good luck to all the students participating, hopefully they become full time BSD users
***</li>
</ul>

<h3><a href="http://www.hybridcluster.com/blog/complexity-freebsd-vfs-using-zfs-example-part-2/" rel="nofollow">Complexity of FreeBSD VFS using ZFS as an example</a></h3>

<ul>
<li>HybridCluster posted the second part of their VFS and ZFS series</li>
<li>This new post has lots of technical details once again, definitely worth reading if you&#39;re a ZFS guy</li>
<li>Of course, also watch <a href="http://www.bsdnow.tv/episodes/2014_02_12-the_cluster_the_cloud" rel="nofollow">episode 24</a> for our interview with HybridCluster - they do really interesting stuff
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/weekly-feature-digest-26-the-lumina-project-and-preload/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Preload has been ported over, it&#39;s a daemon that prefetches applications</li>
<li>PCBSD is developing their own desktop environment, Lumina (<a href="http://blog.pcbsd.org/2014/04/quick-lumina-desktop-faq/" rel="nofollow">there&#39;s also an FAQ</a>)</li>
<li>It&#39;s still in active development, but you can try it out by installing from ports</li>
<li>We&#39;ll be showing a live demo of it in a few weeks (when development settles down a bit)</li>
<li>Some kid in Australia <a href="https://www.youtube.com/watch?v=ETxhbf3-z18" rel="nofollow">subjects his poor mother to being on camera</a> while she tries out PCBSD and gives her impressions of it
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>30: Documentation is King</title>
  <link>https://www.bsdnow.tv/30</link>
  <guid isPermaLink="false">ab836072-6c9b-4d13-9011-8d9ddf4294e7</guid>
  <pubDate>Wed, 26 Mar 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ab836072-6c9b-4d13-9011-8d9ddf4294e7.mp3" length="59694113" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Finally hit 30 episodes! Today we'll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you've ever wondered about the scary world of mailing lists, today's tutorial will show you the basics of how to get help and contribute back. There's lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:22:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Finally hit 30 episodes! Today we'll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you've ever wondered about the scary world of mailing lists, today's tutorial will show you the basics of how to get help and contribute back. There's lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
OpenBSD on a Sun T5120 (http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120)
Our buddy Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) got himself a cool Sun box
Of course he had to write a post about installing and running OpenBSD on it
The post goes through some of the quirks and steps to go through in case you're interested in one of these fine SPARC machines
He's also got another post about OpenBSD on a Dell CS24-SC server (http://www.tedunangst.com/flak/post/Dell-CS24-SC-server)
***
Bhyvecon 2014 videos are up (https://www.youtube.com/results?search_query=bhyvecon%20tokyo&amp;amp;sm=3)
Like we mentioned last week, Bhyvecon (http://bhyvecon.org/) was an almost-impromptu conference before AsiaBSDCon
The talks have apparently already been uploaded!
Subjects include Bhyve's past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization
Lots more detail in the videos, so check 'em all out
***
Building a FreeBSD wireless access point (http://blog.khubla.com/freebsd/building-my-own-wireless-point)
We've got a new blog post about creating a wireless access point with FreeBSD
After all the recent news of consumer routers being pwned like candy, it's time for people to start building BSD routers (http://www.bsdnow.tv/tutorials/openbsd-router)
The author goes through a lot of the process of getting one set up using good ol' FreeBSD
Using hostapd, he's able to share his wireless card in hostap mode and offer DHCP to all the clients
Plenty of config files and more messy details in the post
***
Switching from Synology to FreeNAS (http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/)
The author has been considering getting a NAS for quite a while and documents his research
He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY
After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice
The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***
Interview - Warren Block - wblock@freebsd.org (mailto:wblock@freebsd.org)
FreeBSD's documentation project, igor, doceng
Tutorial
The world of BSD mailing lists (http://www.bsdnow.tv/tutorials/mailing-lists)
News Roundup
HAMMER2 work and notes (http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html)
Matthew Dillon has posted some updated notes about the development of the new HAMMER version
The start of a cluster API was committed to the tree
There are also links to design document, a freemap design document, a changes list and a todo list
***
BSD Breaking Barriers (https://www.youtube.com/watch?v=buo5JlMnGPI)
Our friend MWL (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) gave a talk at NYCBSDCon about BSD "breaking barriers"
"What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We'll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years."
He also has another upcoming talk, (or "webcast") called "Beyond Security: Getting to Know OpenBSD's Real Purpose (http://oreillynet.com/pub/e/3059)"
"OpenBSD is frequently billed as a high-security operating system. That's true, but security isn't the OpenBSD Project's main goal. This webcast will introduce systems administrators to OpenBSD, explain the project's mission, and discuss the features and benefits."
It's on May 27th and will hopefully be recorded
***
FreeBSD in a chroot (http://dreamcat4.github.io/finch/)
Finch, "FreeBSD running IN a CHroot," is a new project
It's a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)
All the details and some interesting use cases are on the github page
He really needs to change the project name (https://www.freshports.org/net-im/finch) though
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/)
Lots of bugfixes for PCBSD coming down the tubes
LZ4 compression is now enabled by default on the whole pool
The latest 10-STABLE has been imported and builds are going
Also the latest GNOME and Cinnamon builds have been imported and much more
***
Feedback/Questions
Bostjan writes in (http://slexy.org/view/s20SlvTcwd) (IRC suggests md5deep)
Don writes in (http://slexy.org/view/s2PeMqXFid)
kaltheat writes in (http://slexy.org/view/s21yii6KZe) (We use R0DE Podcast microphones and Logitech C920 HD webcams)
Harri writes in (http://slexy.org/view/s21SkX19Cp)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, rtfm, mailing lists, lists, documentation, doceng, igor, man pages, manpages, wireless, access point, wap, router, pfsense, sun, t5120, dell, cs24-c, server, bhyve, bhyvecon, asiabsdcon, 2014, synology, freenas, ixsystems, megaport, foundation, rack, datacenter, mail, hammer, hammer2, hammerfs, fs, filesystem, rump kernels</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Finally hit 30 episodes! Today we&#39;ll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you&#39;ve ever wondered about the scary world of mailing lists, today&#39;s tutorial will show you the basics of how to get help and contribute back. There&#39;s lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120" rel="nofollow">OpenBSD on a Sun T5120</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> got himself a cool Sun box</li>
<li>Of course he had to write a post about installing and running OpenBSD on it</li>
<li>The post goes through some of the quirks and steps to go through in case you&#39;re interested in one of these fine SPARC machines</li>
<li>He&#39;s also got another post about OpenBSD on a <a href="http://www.tedunangst.com/flak/post/Dell-CS24-SC-server" rel="nofollow">Dell CS24-SC server</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/results?search_query=bhyvecon%20tokyo&sm=3" rel="nofollow">Bhyvecon 2014 videos are up</a></h3>

<ul>
<li>Like we mentioned last week, <a href="http://bhyvecon.org/" rel="nofollow">Bhyvecon</a> was an almost-impromptu conference before AsiaBSDCon</li>
<li>The talks have apparently already been uploaded!</li>
<li>Subjects include Bhyve&#39;s past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization</li>
<li>Lots more detail in the videos, so check &#39;em all out
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/building-my-own-wireless-point" rel="nofollow">Building a FreeBSD wireless access point</a></h3>

<ul>
<li>We&#39;ve got a new blog post about creating a wireless access point with FreeBSD</li>
<li>After all the recent news of consumer routers being pwned like candy, it&#39;s time for people to start building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">BSD routers</a></li>
<li>The author goes through a lot of the process of getting one set up using good ol&#39; FreeBSD</li>
<li>Using hostapd, he&#39;s able to share his wireless card in hostap mode and offer DHCP to all the clients</li>
<li>Plenty of config files and more messy details in the post
***</li>
</ul>

<h3><a href="http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/" rel="nofollow">Switching from Synology to FreeNAS</a></h3>

<ul>
<li>The author has been considering getting a NAS for quite a while and documents his research</li>
<li>He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY</li>
<li>After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice</li>
<li>The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***</li>
</ul>

<h2>Interview - Warren Block - <a href="mailto:wblock@freebsd.org" rel="nofollow">wblock@freebsd.org</a></h2>

<p>FreeBSD&#39;s documentation project, igor, doceng</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/mailing-lists" rel="nofollow">The world of BSD mailing lists</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html" rel="nofollow">HAMMER2 work and notes</a></h3>

<ul>
<li>Matthew Dillon has posted some updated notes about the development of the new HAMMER version</li>
<li>The start of a cluster API was committed to the tree</li>
<li>There are also links to design document, a freemap design document, a changes list and a todo list
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">BSD Breaking Barriers</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> gave a talk at NYCBSDCon about BSD &quot;breaking barriers&quot;</li>
<li>&quot;What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We&#39;ll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years.&quot;</li>
<li>He also has another upcoming talk, (or &quot;webcast&quot;) called &quot;<a href="http://oreillynet.com/pub/e/3059" rel="nofollow">Beyond Security: Getting to Know OpenBSD&#39;s Real Purpose</a>&quot;</li>
<li>&quot;OpenBSD is frequently billed as a high-security operating system. That&#39;s true, but security isn&#39;t the OpenBSD Project&#39;s main goal. This webcast will introduce systems administrators to OpenBSD, explain the project&#39;s mission, and discuss the features and benefits.&quot;</li>
<li>It&#39;s on May 27th and will hopefully be recorded
***</li>
</ul>

<h3><a href="http://dreamcat4.github.io/finch/" rel="nofollow">FreeBSD in a chroot</a></h3>

<ul>
<li>Finch, &quot;FreeBSD running IN a CHroot,&quot; is a new project</li>
<li>It&#39;s a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)</li>
<li>All the details and some interesting use cases are on the github page</li>
<li>He really needs to <a href="https://www.freshports.org/net-im/finch" rel="nofollow">change the project name</a> though
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of bugfixes for PCBSD coming down the tubes</li>
<li>LZ4 compression is now enabled by default on the whole pool</li>
<li>The latest 10-STABLE has been imported and builds are going</li>
<li>Also the latest GNOME and Cinnamon builds have been imported and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20SlvTcwd" rel="nofollow">Bostjan writes in</a> (IRC suggests md5deep)</li>
<li><a href="http://slexy.org/view/s2PeMqXFid" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s21yii6KZe" rel="nofollow">kaltheat writes in</a> (We use R0DE Podcast microphones and Logitech C920 HD webcams)</li>
<li><a href="http://slexy.org/view/s21SkX19Cp" rel="nofollow">Harri writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Finally hit 30 episodes! Today we&#39;ll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you&#39;ve ever wondered about the scary world of mailing lists, today&#39;s tutorial will show you the basics of how to get help and contribute back. There&#39;s lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120" rel="nofollow">OpenBSD on a Sun T5120</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> got himself a cool Sun box</li>
<li>Of course he had to write a post about installing and running OpenBSD on it</li>
<li>The post goes through some of the quirks and steps to go through in case you&#39;re interested in one of these fine SPARC machines</li>
<li>He&#39;s also got another post about OpenBSD on a <a href="http://www.tedunangst.com/flak/post/Dell-CS24-SC-server" rel="nofollow">Dell CS24-SC server</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/results?search_query=bhyvecon%20tokyo&sm=3" rel="nofollow">Bhyvecon 2014 videos are up</a></h3>

<ul>
<li>Like we mentioned last week, <a href="http://bhyvecon.org/" rel="nofollow">Bhyvecon</a> was an almost-impromptu conference before AsiaBSDCon</li>
<li>The talks have apparently already been uploaded!</li>
<li>Subjects include Bhyve&#39;s past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization</li>
<li>Lots more detail in the videos, so check &#39;em all out
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/building-my-own-wireless-point" rel="nofollow">Building a FreeBSD wireless access point</a></h3>

<ul>
<li>We&#39;ve got a new blog post about creating a wireless access point with FreeBSD</li>
<li>After all the recent news of consumer routers being pwned like candy, it&#39;s time for people to start building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">BSD routers</a></li>
<li>The author goes through a lot of the process of getting one set up using good ol&#39; FreeBSD</li>
<li>Using hostapd, he&#39;s able to share his wireless card in hostap mode and offer DHCP to all the clients</li>
<li>Plenty of config files and more messy details in the post
***</li>
</ul>

<h3><a href="http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/" rel="nofollow">Switching from Synology to FreeNAS</a></h3>

<ul>
<li>The author has been considering getting a NAS for quite a while and documents his research</li>
<li>He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY</li>
<li>After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice</li>
<li>The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***</li>
</ul>

<h2>Interview - Warren Block - <a href="mailto:wblock@freebsd.org" rel="nofollow">wblock@freebsd.org</a></h2>

<p>FreeBSD&#39;s documentation project, igor, doceng</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/mailing-lists" rel="nofollow">The world of BSD mailing lists</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html" rel="nofollow">HAMMER2 work and notes</a></h3>

<ul>
<li>Matthew Dillon has posted some updated notes about the development of the new HAMMER version</li>
<li>The start of a cluster API was committed to the tree</li>
<li>There are also links to design document, a freemap design document, a changes list and a todo list
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">BSD Breaking Barriers</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> gave a talk at NYCBSDCon about BSD &quot;breaking barriers&quot;</li>
<li>&quot;What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We&#39;ll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years.&quot;</li>
<li>He also has another upcoming talk, (or &quot;webcast&quot;) called &quot;<a href="http://oreillynet.com/pub/e/3059" rel="nofollow">Beyond Security: Getting to Know OpenBSD&#39;s Real Purpose</a>&quot;</li>
<li>&quot;OpenBSD is frequently billed as a high-security operating system. That&#39;s true, but security isn&#39;t the OpenBSD Project&#39;s main goal. This webcast will introduce systems administrators to OpenBSD, explain the project&#39;s mission, and discuss the features and benefits.&quot;</li>
<li>It&#39;s on May 27th and will hopefully be recorded
***</li>
</ul>

<h3><a href="http://dreamcat4.github.io/finch/" rel="nofollow">FreeBSD in a chroot</a></h3>

<ul>
<li>Finch, &quot;FreeBSD running IN a CHroot,&quot; is a new project</li>
<li>It&#39;s a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)</li>
<li>All the details and some interesting use cases are on the github page</li>
<li>He really needs to <a href="https://www.freshports.org/net-im/finch" rel="nofollow">change the project name</a> though
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of bugfixes for PCBSD coming down the tubes</li>
<li>LZ4 compression is now enabled by default on the whole pool</li>
<li>The latest 10-STABLE has been imported and builds are going</li>
<li>Also the latest GNOME and Cinnamon builds have been imported and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20SlvTcwd" rel="nofollow">Bostjan writes in</a> (IRC suggests md5deep)</li>
<li><a href="http://slexy.org/view/s2PeMqXFid" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s21yii6KZe" rel="nofollow">kaltheat writes in</a> (We use R0DE Podcast microphones and Logitech C920 HD webcams)</li>
<li><a href="http://slexy.org/view/s21SkX19Cp" rel="nofollow">Harri writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>25: A Sixth pfSense</title>
  <link>https://www.bsdnow.tv/25</link>
  <guid isPermaLink="false">dad040a2-8866-4876-88fb-43b036b3e691</guid>
  <pubDate>Wed, 19 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/dad040a2-8866-4876-88fb-43b036b3e691.mp3" length="48903556" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
EuroBSDCon and AsiaBSDCon (http://2014.eurobsdcon.org/calendar/call-for-papers/)
This year, EuroBSDCon will be in September in Sofia, Bulgaria
They've got a call for papers up now, so everyone can submit the talks they want to present
There will also be a tutorial section of the conference
AsiaBSDCon (http://2014.asiabsdcon.org/timetable.html.en) will be next month, in March!
All the info about the registration, tutorials, hotels, timetable and location have been posted
Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***
FreeBSD 10 on Ubiquiti EdgeRouter Lite (http://rtfm.net/FreeBSD/ERL/)
The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU
This article goes through the process of installing and configuring FreeBSD on it to use as a home router
Lots of good pictures of the hardware and specific details needed to get you set up
It also includes the scripts to create your own images if you don't want to use the ones rolled by someone else
For such a cheap price, might be a really fun weekend project to replace your shitty consumer router
Of course if you're more of an OpenBSD guy, you can always see our tutorial (http://www.bsdnow.tv/tutorials/openbsd-router) for that too
***
Signed pkgsrc package guide (http://blog.saveosx.org/signed-packages/)
We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up
It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)
He goes through the process of signing packages with a public key and how to verify the packages when you install them
The author also happens to be an EdgeBSD developer
***
Big batch of OpenBSD hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140212083627)
Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI
In the second (http://undeadly.org/cgi?action=article&amp;amp;sid=20140213065843), ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things
In the third (http://undeadly.org/cgi?action=article&amp;amp;sid=20140213173808), jsg updated libdrm and mesa and did various work on xenocara
In the fourth (http://undeadly.org/cgi?action=article&amp;amp;sid=20140214070023), dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he's done
In the fifth (http://undeadly.org/cgi?action=article&amp;amp;sid=20140214130039), claudio talks about some stuff he did for routing tables and misc. other things
***
Interview - Chris Buechler - cmb@pfsense.com (mailto:cmb@pfsense.com) / @cbuechler (https://twitter.com/cbuechler)
pfSense
Tutorial
pfSense walkthrough
News Roundup
FreeBSD challenge continues (http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/)
Our buddy from the Linux foundation continues his switching to BSD journey
In day 13, he covers some tips for new users, mentions trying things out in a VM first
In day 14 (http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/), he starts setting up XFCE and X11, feels like he's starting over as a new Linux user learning the ropes again - concludes that ports are the way to go
In day 15 (http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/), he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch
In day 16 (http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/), he dives into the world of FreeBSD jails (http://www.bsdnow.tv/tutorials/jails)!
***
BSD books in 2014 (http://blather.michaelwlucas.com/archives/1962)
BSD books are some of the highest quality technical writings available, and MWL has written a good number of them
In this post, he details some of his plans for 2014
In includes at least one OpenBSD book, at least one FreeBSD book and...
Very strong possibility of Absolute FreeBSD 3rd edition (watch our interview with him (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop))
Check the link for all the details
***
How to build FreeBSD/EC2 images (http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html)
Our friend Colin Percival (http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten) details how to build EC2 images in a new blog post
Most people just use the images he makes on their instances, but some people will want to make their own from scratch (https://svnweb.freebsd.org/base/user/cperciva/EC2-build/)
You build a regular disk image and then turn it into an AMI
It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/)
This time around we discuss how you can become a developer
Kris also details the length of supported releases
Expect lots of new features in 10.1
***
Feedback/Questions
Sean writes in (http://slexy.org/view/s216xJoCVG)
Jake writes in (http://slexy.org/view/s2gLrR3VVf)
Niclas writes in (http://slexy.org/view/s21gfG3Iho)
Steffan writes in (http://slexy.org/view/s2JNyw5BCn)
Antonio writes in (http://slexy.org/view/s2kg3zoRfm)
Chris writes in (http://slexy.org/view/s2ZwSIfRjm)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pfsense, pf, firewall, gateway, router, hangout, webui, web interface, php, ipfw, ipfilter, gateway, graphs, bandwidth, edgerouter, edgerouter lite, eurobsdcon, eurobsdcon2014, edge router, 2014, books, michael w lucas, freebsd journal, fosdem, asiabsdcon, mips, hackathon, new zealand, pkgsrc, signed packages, edgebsd, smp, ec2, amazon, images, instance, build, custom</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>19: The Installfest</title>
  <link>https://www.bsdnow.tv/19</link>
  <guid isPermaLink="false">6e52e1f8-72f4-4ef7-be58-b8d78ab97072</guid>
  <pubDate>Wed, 08 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6e52e1f8-72f4-4ef7-be58-b8d78ab97072.mp3" length="58342747" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We've got some special treats for you this week on the show. It's the long-awaited "installfest" segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There's a lot to get to today on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:21:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We've got some special treats for you this week on the show. It's the long-awaited "installfest" segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There's a lot to get to today on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD's new testing infrastructure (https://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/044009.html)
A new test suite was added to FreeBSD, with 3 powerful machines available
Both -CURRENT and stable/10 have got the test suite build infrastructure in place
Designed to help developers test and improve major scalability across huge amounts of CPUs and RAM
More details available here (http://julipedia.meroh.net/2013/12/introducing-freebsd-test-suite.html)
Could the iXsystems monster server be involved...?
***
OpenBSD gets signify (http://marc.info/?l=openbsd-cvs&amp;amp;m=138845902916897&amp;amp;w=2)
At long last, OpenBSD gets support for signed releases!
For "the world's most secure OS" it was very easy to MITM kernel patches, updates, installer isos, everything
A commit to the -current tree reveals a new "signify" tool is currently being kicked around
More details in a blog post (http://www.tedunangst.com/flak/post/signify) from the guy who committed it
Quote: "yeah, briefly, the plan is to sign sets and packages. that's still work in progress."
***
Faces of FreeBSD (http://freebsdfoundation.blogspot.ca/2013/12/faces-of-freebsd-isabell-long.html)
This time they interview Isabell Long
She's a volunteer staff member on the freenode IRC network
In 2011, she participated in the Google Code-In contest and became involved with documentation
"The new committer mentoring process proved very useful and that, plus the accepting community of FreeBSD, are reasons why I stay involved."
***
pkgsrc-2013Q4 branched (http://mail-index.netbsd.org/pkgsrc-users/2013/12/31/msg019107.html)
The quarterly pkgsrc branch from NetBSD is out
13472 total packages for NetBSD-current/amd64 + 13049 binary packages built with clang!
Lots of numbers and stats in the announcement
pkgsrc works on quite a few different OSes, not just NetBSD
See our interview (http://www.bsdnow.tv/episodes/2013_11_20-collecting_shells) with Amitai Schlair for a bit about pkgsrc
***
OpenBSD on Google's Compute Engine (http://marc.info/?l=openbsd-misc&amp;amp;m=138610199311393&amp;amp;w=2)
Google Compute Engine is a "cloud computing" platform similar to EC2
Unfortunately, they only offer poor choices for the OS (Debian and CentOS)
Recently it's been announced that there is a custom OS option
It's using a WIP virtio-scsi driver, lots of things still need more work
Lots of technical and networking details about the struggles to get OpenBSD working on it
***
The Installfest
We'll be showing you the installer of each of the main BSDs. As of the date this episode airs, we're using:
FreeBSD 10.0
OpenBSD 5.4
NetBSD 6.1.2
DragonflyBSD 3.6
PCBSD 10.0
***
News Roundup
Building an OpenBSD wireless access point (http://ctors.net/2013/12/30/openbsd_wireless_access_point)
A neat write up we found around the internet about making an OpenBSD wifi router
Goes through the process of PXE booting, installing base, using a serial console, setting up networking and wireless
Even includes a puffy sticker on the Soekris box at the end, how cute
***
FreeBSD 4.X jails on 10.0 (http://blather.michaelwlucas.com/archives/1919)
Blog entry from our buddy Michael Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop)
For whatever reason (an "in-house application"), he needed to run a FreeBSD 4 jail in FreeBSD 10
Talks about the options he had: porting software, virtualizing, dealing with slow old hardware
He goes through the whole process of making an ancient jail
It's "an acceptable trade-off, if it means I don’t have to touch actual PHP code."
***
Unscrewed: a story about OpenBSD (http://www.skeptech.org/blog/2013/01/13/unscrewed-a-story-about-openbsd/)
Pretty long blog post about how a network admin used OpenBSD to save the day
To set the tone, "It was 5am, and the network was down"
Great war story about replacing expensive routers and networking equipment with cheaper hardware and BSD
Mentions a lot of the built in tools and how OpenBSD is great for routers and high security applications
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-2/)
10.0-RC3 is out and ready to be tested
New detection of ATI Hybrid Graphics, they're working on nVidia next
Re-classifying Linux jails as unsupported / experimental
***
Feedback/Questions
Daniel writes in (http://slexy.org/view/s2uns1hMml)
Erik writes in (http://slexy.org/view/s2MeJNCCiu)
SW writes in (http://slexy.org/view/s21fBXkP2K)
[Bostjan writes in[(http://slexy.org/view/s20N9bfkum)
Samuel writes in (http://slexy.org/view/s20FU9wUO5)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, contest, pillow, giveaway, competition, sweepstakes, router, tuning, performance, dnscrypt, dnscurve, opendns, pkgsrc, testing, megacore, ixsystems, signify, signed packages, sets, mitm, gce, google compute engine, access point, jails, installfest, installer, sysinstall, bsdinstall, pc-sysinstall</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;ve got some special treats for you this week on the show. It&#39;s the long-awaited &quot;installfest&quot; segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There&#39;s a lot to get to today on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/044009.html" rel="nofollow">FreeBSD&#39;s new testing infrastructure</a></h3>

<ul>
<li>A new test suite was added to FreeBSD, with 3 powerful machines available</li>
<li>Both -CURRENT and stable/10 have got the test suite build infrastructure in place</li>
<li>Designed to help developers test and improve major scalability across huge amounts of CPUs and RAM</li>
<li>More details <a href="http://julipedia.meroh.net/2013/12/introducing-freebsd-test-suite.html" rel="nofollow">available here</a></li>
<li>Could the iXsystems monster server be involved...?
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=138845902916897&w=2" rel="nofollow">OpenBSD gets signify</a></h3>

<ul>
<li>At long last, OpenBSD gets support for signed releases!</li>
<li>For &quot;the world&#39;s most secure OS&quot; it was very easy to MITM kernel patches, updates, installer isos, everything</li>
<li>A commit to the -current tree reveals a new &quot;signify&quot; tool is currently being kicked around</li>
<li>More details in <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">a blog post</a> from the guy who committed it</li>
<li>Quote: &quot;yeah, briefly, the plan is to sign sets and packages. that&#39;s still work in progress.&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.ca/2013/12/faces-of-freebsd-isabell-long.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>This time they interview Isabell Long</li>
<li>She&#39;s a volunteer staff member on the freenode IRC network</li>
<li>In 2011, she participated in the Google Code-In contest and became involved with documentation</li>
<li>&quot;The new committer mentoring process proved very useful and that, plus the accepting community of FreeBSD, are reasons why I stay involved.&quot;
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/12/31/msg019107.html" rel="nofollow">pkgsrc-2013Q4 branched</a></h3>

<ul>
<li>The quarterly pkgsrc branch from NetBSD is out</li>
<li>13472 total packages for NetBSD-current/amd64 + 13049 binary packages built with clang!</li>
<li>Lots of numbers and stats in the announcement</li>
<li>pkgsrc works on quite a few different OSes, not just NetBSD</li>
<li>See <a href="http://www.bsdnow.tv/episodes/2013_11_20-collecting_shells" rel="nofollow">our interview</a> with Amitai Schlair for a bit about pkgsrc
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=138610199311393&w=2" rel="nofollow">OpenBSD on Google&#39;s Compute Engine</a></h3>

<ul>
<li>Google Compute Engine is a &quot;cloud computing&quot; platform similar to EC2</li>
<li>Unfortunately, they only offer poor choices for the OS (Debian and CentOS)</li>
<li>Recently it&#39;s been announced that there is a custom OS option</li>
<li>It&#39;s using a WIP virtio-scsi driver, lots of things still need more work</li>
<li>Lots of technical and networking details about the struggles to get OpenBSD working on it
***</li>
</ul>

<h2>The Installfest</h2>

<p>We&#39;ll be showing you the installer of each of the main BSDs. As of the date this episode airs, we&#39;re using:</p>

<ul>
<li>FreeBSD 10.0</li>
<li>OpenBSD 5.4</li>
<li>NetBSD 6.1.2</li>
<li>DragonflyBSD 3.6</li>
<li>PCBSD 10.0
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://ctors.net/2013/12/30/openbsd_wireless_access_point" rel="nofollow">Building an OpenBSD wireless access point</a></h3>

<ul>
<li>A neat write up we found around the internet about making an OpenBSD wifi router</li>
<li>Goes through the process of PXE booting, installing base, using a serial console, setting up networking and wireless</li>
<li>Even includes a puffy sticker on the Soekris box at the end, how cute
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1919" rel="nofollow">FreeBSD 4.X jails on 10.0</a></h3>

<ul>
<li>Blog entry from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>For whatever reason (an &quot;in-house application&quot;), he needed to run a FreeBSD 4 jail in FreeBSD 10</li>
<li>Talks about the options he had: porting software, virtualizing, dealing with slow old hardware</li>
<li>He goes through the whole process of making an ancient jail</li>
<li>It&#39;s &quot;an acceptable trade-off, if it means I don’t have to touch actual PHP code.&quot;
***</li>
</ul>

<h3><a href="http://www.skeptech.org/blog/2013/01/13/unscrewed-a-story-about-openbsd/" rel="nofollow">Unscrewed: a story about OpenBSD</a></h3>

<ul>
<li>Pretty long blog post about how a network admin used OpenBSD to save the day</li>
<li>To set the tone, &quot;It was 5am, and the network was down&quot;</li>
<li>Great war story about replacing expensive routers and networking equipment with cheaper hardware and BSD</li>
<li>Mentions a lot of the built in tools and how OpenBSD is great for routers and high security applications
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC3 is out and ready to be tested</li>
<li>New detection of ATI Hybrid Graphics, they&#39;re working on nVidia next</li>
<li>Re-classifying Linux jails as unsupported / experimental
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2uns1hMml" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2MeJNCCiu" rel="nofollow">Erik writes in</a></li>
<li><a href="http://slexy.org/view/s21fBXkP2K" rel="nofollow">SW writes in</a></li>
<li>[Bostjan writes in[(<a href="http://slexy.org/view/s20N9bfkum" rel="nofollow">http://slexy.org/view/s20N9bfkum</a>)</li>
<li><a href="http://slexy.org/view/s20FU9wUO5" rel="nofollow">Samuel writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;ve got some special treats for you this week on the show. It&#39;s the long-awaited &quot;installfest&quot; segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There&#39;s a lot to get to today on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/044009.html" rel="nofollow">FreeBSD&#39;s new testing infrastructure</a></h3>

<ul>
<li>A new test suite was added to FreeBSD, with 3 powerful machines available</li>
<li>Both -CURRENT and stable/10 have got the test suite build infrastructure in place</li>
<li>Designed to help developers test and improve major scalability across huge amounts of CPUs and RAM</li>
<li>More details <a href="http://julipedia.meroh.net/2013/12/introducing-freebsd-test-suite.html" rel="nofollow">available here</a></li>
<li>Could the iXsystems monster server be involved...?
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=138845902916897&w=2" rel="nofollow">OpenBSD gets signify</a></h3>

<ul>
<li>At long last, OpenBSD gets support for signed releases!</li>
<li>For &quot;the world&#39;s most secure OS&quot; it was very easy to MITM kernel patches, updates, installer isos, everything</li>
<li>A commit to the -current tree reveals a new &quot;signify&quot; tool is currently being kicked around</li>
<li>More details in <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">a blog post</a> from the guy who committed it</li>
<li>Quote: &quot;yeah, briefly, the plan is to sign sets and packages. that&#39;s still work in progress.&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.ca/2013/12/faces-of-freebsd-isabell-long.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>This time they interview Isabell Long</li>
<li>She&#39;s a volunteer staff member on the freenode IRC network</li>
<li>In 2011, she participated in the Google Code-In contest and became involved with documentation</li>
<li>&quot;The new committer mentoring process proved very useful and that, plus the accepting community of FreeBSD, are reasons why I stay involved.&quot;
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/12/31/msg019107.html" rel="nofollow">pkgsrc-2013Q4 branched</a></h3>

<ul>
<li>The quarterly pkgsrc branch from NetBSD is out</li>
<li>13472 total packages for NetBSD-current/amd64 + 13049 binary packages built with clang!</li>
<li>Lots of numbers and stats in the announcement</li>
<li>pkgsrc works on quite a few different OSes, not just NetBSD</li>
<li>See <a href="http://www.bsdnow.tv/episodes/2013_11_20-collecting_shells" rel="nofollow">our interview</a> with Amitai Schlair for a bit about pkgsrc
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=138610199311393&w=2" rel="nofollow">OpenBSD on Google&#39;s Compute Engine</a></h3>

<ul>
<li>Google Compute Engine is a &quot;cloud computing&quot; platform similar to EC2</li>
<li>Unfortunately, they only offer poor choices for the OS (Debian and CentOS)</li>
<li>Recently it&#39;s been announced that there is a custom OS option</li>
<li>It&#39;s using a WIP virtio-scsi driver, lots of things still need more work</li>
<li>Lots of technical and networking details about the struggles to get OpenBSD working on it
***</li>
</ul>

<h2>The Installfest</h2>

<p>We&#39;ll be showing you the installer of each of the main BSDs. As of the date this episode airs, we&#39;re using:</p>

<ul>
<li>FreeBSD 10.0</li>
<li>OpenBSD 5.4</li>
<li>NetBSD 6.1.2</li>
<li>DragonflyBSD 3.6</li>
<li>PCBSD 10.0
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://ctors.net/2013/12/30/openbsd_wireless_access_point" rel="nofollow">Building an OpenBSD wireless access point</a></h3>

<ul>
<li>A neat write up we found around the internet about making an OpenBSD wifi router</li>
<li>Goes through the process of PXE booting, installing base, using a serial console, setting up networking and wireless</li>
<li>Even includes a puffy sticker on the Soekris box at the end, how cute
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1919" rel="nofollow">FreeBSD 4.X jails on 10.0</a></h3>

<ul>
<li>Blog entry from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>For whatever reason (an &quot;in-house application&quot;), he needed to run a FreeBSD 4 jail in FreeBSD 10</li>
<li>Talks about the options he had: porting software, virtualizing, dealing with slow old hardware</li>
<li>He goes through the whole process of making an ancient jail</li>
<li>It&#39;s &quot;an acceptable trade-off, if it means I don’t have to touch actual PHP code.&quot;
***</li>
</ul>

<h3><a href="http://www.skeptech.org/blog/2013/01/13/unscrewed-a-story-about-openbsd/" rel="nofollow">Unscrewed: a story about OpenBSD</a></h3>

<ul>
<li>Pretty long blog post about how a network admin used OpenBSD to save the day</li>
<li>To set the tone, &quot;It was 5am, and the network was down&quot;</li>
<li>Great war story about replacing expensive routers and networking equipment with cheaper hardware and BSD</li>
<li>Mentions a lot of the built in tools and how OpenBSD is great for routers and high security applications
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC3 is out and ready to be tested</li>
<li>New detection of ATI Hybrid Graphics, they&#39;re working on nVidia next</li>
<li>Re-classifying Linux jails as unsupported / experimental
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2uns1hMml" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2MeJNCCiu" rel="nofollow">Erik writes in</a></li>
<li><a href="http://slexy.org/view/s21fBXkP2K" rel="nofollow">SW writes in</a></li>
<li>[Bostjan writes in[(<a href="http://slexy.org/view/s20N9bfkum" rel="nofollow">http://slexy.org/view/s20N9bfkum</a>)</li>
<li><a href="http://slexy.org/view/s20FU9wUO5" rel="nofollow">Samuel writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>13: Bridging the Gap</title>
  <link>https://www.bsdnow.tv/13</link>
  <guid isPermaLink="false">bf19202c-3646-4560-bc01-29393b43dde4</guid>
  <pubDate>Wed, 27 Nov 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/bf19202c-3646-4560-bc01-29393b43dde4.mp3" length="49103236" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we sit down for an interview with Jordan Hubbard, one of the founders of the FreeBSD project - and the one who invented ports! Later in the show, we'll be showing you some new updates to the OpenBSD router tutorial from a couple weeks ago. We've also got news, your questions and even our first viewer-submitted video, right here on BSD Now.. the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:08:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, we sit down for an interview with Jordan Hubbard, one of the founders of the FreeBSD project - and the one who invented ports! Later in the show, we'll be showing you some new updates to the OpenBSD router tutorial from a couple weeks ago. We've also got news, your questions and even our first viewer-submitted video, right here on BSD Now.. the place to B.. SD.
Headlines
Getting to know your portmgr (http://blogs.freebsdish.org/portmgr/2013/11/18/getting-to-know-your-portmgr-erwin-lansing/)
In this interview they talk to one of the "Annoying Reminder Guys" - Erwin Lansing, the second longest serving member of FreeBSD's portmgr (also vice-president of the FreeBSD Foundation)
He actually maintains the .dk ccTLD
Describes FreeBSD as "the best well-hidden success story in operating systems, by now in the hands of more people than one can count and used by even more people, and not one of them knows it! It’s not only the best operating system currently around, but also the most supportive and inspiring community."
In the next one (http://blogs.freebsdish.org/portmgr/2013/11/25/getting-to-know-your-portmgr-martin-wilke/) they speak with Martin Wilke (miwi@)
The usual, "what inspires you about FreeBSD" "how did you get into it" etc.
***
vBSDCon wrap-up compilation (http://blog.hostileadmin.com/2013/11/20/vbsdcon-wrap-ups/)
Lots of write-ups about vBSDCon gathered in one place
Some from OpenBSD guys (http://undeadly.org/cgi?action=article&amp;amp;sid=20131121050402)
Some from FreeBSD guys (http://freebsdfoundation.blogspot.com/2013/11/vbsdcon-trip-report-john-mark-gurney.html)
Some from RootBSD (http://www.rootbsd.net/vbsdcon-2013-wrap-up/)
Some from iXsystems (http://www.ixsystems.com/resources/ix/blog/vbsdcon-2013.html)
Some from Verisign (http://blogs.verisigninc.com/blog/entry/builders_and_archaeologists)
And of course our own wrap-up chat in BSD Now Episode 009 (http://www.bsdnow.tv/episodes/2013_10_30-current_events)
***
Faces of FreeBSD (http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-each-week-we-are-going.html)
This week they talk to Gábor Páli from Hungary
Talks about his past as a game programmer and how it got involved with FreeBSD
"I met János Háber, who admired the technical merits of FreeBSD and recommended it over the popular GNU/Linux distributions. I downloaded FreeBSD 4.3-RELEASE, found it reliable, consistent, easy to install, update and use."
He's been contributing since 2008 and does lots of work with Haskell in ports
He also organizes EuroBSDCon and is secretary of the FreeBSD Core Team
***
Dragonfly 3.6 released (http://www.dragonflybsd.org/release36/)
dports now default instead of pkgsrc
Big SMP scaling improvements
Experimental i915 and KMS support
See our interview (http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug) with Justin Sherrill if you want to hear (a lot) more about it - nearly an hour long
***
Interview - Jordan Hubbard - jkh@freebsd.org (mailto:jkh@freebsd.org) / @omgjkh (https://twitter.com/omgjkh)
FreeBSD's founding and future
Tutorial
Building an OpenBSD router, part 2 (http://www.bsdnow.tv/tutorials/openbsd-router)
Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.
***
News Roundup
pfSense 2.1 on AWS EC2 (http://blog.pfsense.org/?p=1132)
We now have pfSense 2.1 available on Amazon’s Elastic Compute Cloud (EC2)
In keeping with the community spirit, they’re also offering a free "public" AMI
Check the FAQ and User Guide on their site for additional details
Interesting possibilities with pfSense in the cloud
***
Puffy on the desktop (http://distrowatch.com/weekly.php?issue=20131118#feature)
Distrowatch, a primarily Linux-focused site, features an OpenBSD 5.4 review
They talk about using it on the desktop, how to set it up
Very long write-up, curious Linux users should give it a read
Ends with "Most people will still see OpenBSD as an operating system for servers and firewalls, but OpenBSD can also be used in desktop environments if the user doesn't mind a little manual work. The payoff is a very light, responsive system that is unlikely to ever misbehave"
***
Two-factor authentication with SSH (http://cmacr.ae/openbsd/security/networking/2013/11/25/ssh-yubi.html)
Blog post about using a yubikey with SSH public keys
Uses a combination of a OTP, BSDAuth and OpenBSD's login.conf, but it can be used with PAM on other systems as well
Allows for two-factor authentication (a la gmail) in case your private key is compromised
Anyone interested in an extra-hardened SSH server should give it a read
***
PCBSD weekly digest (http://blog.pcbsd.org/2013/11/weekly-feature-digest-112313/)
10.0 has approximately 400 PBIs for public consumption
They will be merging the GNOME3, MATE and Cinnamon desktops into the 10.0 ports tree - please help test them, this is pretty big news in and of itself!
PCDM is coming along nicely, more bugs are getting fixed
Added ZFS dataset options to PCBSD’s new text installer front-end
***
Feedback/Questions
Ben writes in (http://slexy.org/view/s2ag1fA7Ug)
Florian writes in (http://slexy.org/view/s2TSIvZzVO)
Zach writes in (http://slexy.org/view/s20Po4soFF)
Addison writes in (http://slexy.org/view/s20ntzqi9c)
Adam writes in (http://slexy.org/view/s2EYJjVKBk)
Adam (https://twitter.com/redshirtlinux)'s BSD Router Project tutorial can be downloaded here (http://bsdnow.cdn.scaleengine.net/bsdrouterproject.m4v).
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, jordan hubbard, jhk, founder, portmgr, openzfs, pfsense, puffy, ec2, amazon, firewall, router, high performance, email alerts, tunneling, errata, patches, cron, script, current, stable, release, cvs, anoncvs, bsd router project</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we sit down for an interview with Jordan Hubbard, one of the founders of the FreeBSD project - and the one who invented ports! Later in the show, we&#39;ll be showing you some new updates to the OpenBSD router tutorial from a couple weeks ago. We&#39;ve also got news, your questions and even our first viewer-submitted video, right here on BSD Now.. the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/18/getting-to-know-your-portmgr-erwin-lansing/" rel="nofollow">Getting to know your portmgr</a></h3>

<ul>
<li>In this interview they talk to one of the &quot;Annoying Reminder Guys&quot; - Erwin Lansing, the second longest serving member of FreeBSD&#39;s portmgr (also vice-president of the FreeBSD Foundation)</li>
<li>He actually maintains the .dk ccTLD</li>
<li>Describes FreeBSD as &quot;the best well-hidden success story in operating systems, by now in the hands of more people than one can count and used by even more people, and not one of them knows it! It’s not only the best operating system currently around, but also the most supportive and inspiring community.&quot;</li>
<li>In <a href="http://blogs.freebsdish.org/portmgr/2013/11/25/getting-to-know-your-portmgr-martin-wilke/" rel="nofollow">the next one</a> they speak with Martin Wilke (miwi@)</li>
<li>The usual, &quot;what inspires you about FreeBSD&quot; &quot;how did you get into it&quot; etc.
***</li>
</ul>

<h3><a href="http://blog.hostileadmin.com/2013/11/20/vbsdcon-wrap-ups/" rel="nofollow">vBSDCon wrap-up compilation</a></h3>

<ul>
<li>Lots of write-ups about vBSDCon gathered in one place</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20131121050402" rel="nofollow">Some from OpenBSD guys</a></li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/11/vbsdcon-trip-report-john-mark-gurney.html" rel="nofollow">Some from FreeBSD guys</a></li>
<li><a href="http://www.rootbsd.net/vbsdcon-2013-wrap-up/" rel="nofollow">Some from RootBSD</a></li>
<li><a href="http://www.ixsystems.com/resources/ix/blog/vbsdcon-2013.html" rel="nofollow">Some from iXsystems</a></li>
<li><a href="http://blogs.verisigninc.com/blog/entry/builders_and_archaeologists" rel="nofollow">Some from Verisign</a></li>
<li>And of course our own wrap-up chat in <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">BSD Now Episode 009</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-each-week-we-are-going.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>This week they talk to Gábor Páli from Hungary</li>
<li>Talks about his past as a game programmer and how it got involved with FreeBSD</li>
<li>&quot;I met János Háber, who admired the technical merits of FreeBSD and recommended it over the popular GNU/Linux distributions. I downloaded FreeBSD 4.3-RELEASE, found it reliable, consistent, easy to install, update and use.&quot;</li>
<li>He&#39;s been contributing since 2008 and does lots of work with Haskell in ports</li>
<li>He also organizes EuroBSDCon and is secretary of the FreeBSD Core Team
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release36/" rel="nofollow">Dragonfly 3.6 released</a></h3>

<ul>
<li>dports now default instead of pkgsrc</li>
<li>Big SMP scaling improvements</li>
<li>Experimental i915 and KMS support</li>
<li>See <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">our interview</a> with Justin Sherrill if you want to hear (a lot) more about it - nearly an hour long
***</li>
</ul>

<h2>Interview - Jordan Hubbard - <a href="mailto:jkh@freebsd.org" rel="nofollow">jkh@freebsd.org</a> / <a href="https://twitter.com/omgjkh" rel="nofollow">@omgjkh</a></h2>

<p>FreeBSD&#39;s founding and future</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD router, part 2</a></h3>

<ul>
<li><strong>Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.</strong>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://blog.pfsense.org/?p=1132" rel="nofollow">pfSense 2.1 on AWS EC2</a></h3>

<ul>
<li>We now have pfSense 2.1 available on Amazon’s Elastic Compute Cloud (EC2)</li>
<li>In keeping with the community spirit, they’re also offering a free &quot;public&quot; AMI</li>
<li>Check the FAQ and User Guide on their site for additional details</li>
<li>Interesting possibilities with pfSense in the cloud
***</li>
</ul>

<h3><a href="http://distrowatch.com/weekly.php?issue=20131118#feature" rel="nofollow">Puffy on the desktop</a></h3>

<ul>
<li>Distrowatch, a primarily Linux-focused site, features an OpenBSD 5.4 review</li>
<li>They talk about using it on the desktop, how to set it up</li>
<li>Very long write-up, curious Linux users should give it a read</li>
<li>Ends with &quot;Most people will still see OpenBSD as an operating system for servers and firewalls, but OpenBSD can also be used in desktop environments if the user doesn&#39;t mind a little manual work. The payoff is a very light, responsive system that is unlikely to ever misbehave&quot;
***</li>
</ul>

<h3><a href="http://cmacr.ae/openbsd/security/networking/2013/11/25/ssh-yubi.html" rel="nofollow">Two-factor authentication with SSH</a></h3>

<ul>
<li>Blog post about using a yubikey with SSH public keys</li>
<li>Uses a combination of a OTP, BSDAuth and OpenBSD&#39;s login.conf, but it can be used with PAM on other systems as well</li>
<li>Allows for two-factor authentication (a la gmail) in case your private key is compromised</li>
<li>Anyone interested in an extra-hardened SSH server should give it a read
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/weekly-feature-digest-112313/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 has approximately 400 PBIs for public consumption</li>
<li>They will be merging the GNOME3, MATE and Cinnamon desktops into the 10.0 ports tree - please help test them, this is pretty big news in and of itself!</li>
<li>PCDM is coming along nicely, more bugs are getting fixed</li>
<li>Added ZFS dataset options to PCBSD’s new text installer front-end
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ag1fA7Ug" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2TSIvZzVO" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s20Po4soFF" rel="nofollow">Zach writes in</a></li>
<li><a href="http://slexy.org/view/s20ntzqi9c" rel="nofollow">Addison writes in</a></li>
<li><a href="http://slexy.org/view/s2EYJjVKBk" rel="nofollow">Adam writes in</a></li>
<li><a href="https://twitter.com/redshirtlinux" rel="nofollow">Adam</a>&#39;s BSD Router Project tutorial can be downloaded <a href="http://bsdnow.cdn.scaleengine.net/bsdrouterproject.m4v" rel="nofollow">here</a>.
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we sit down for an interview with Jordan Hubbard, one of the founders of the FreeBSD project - and the one who invented ports! Later in the show, we&#39;ll be showing you some new updates to the OpenBSD router tutorial from a couple weeks ago. We&#39;ve also got news, your questions and even our first viewer-submitted video, right here on BSD Now.. the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/18/getting-to-know-your-portmgr-erwin-lansing/" rel="nofollow">Getting to know your portmgr</a></h3>

<ul>
<li>In this interview they talk to one of the &quot;Annoying Reminder Guys&quot; - Erwin Lansing, the second longest serving member of FreeBSD&#39;s portmgr (also vice-president of the FreeBSD Foundation)</li>
<li>He actually maintains the .dk ccTLD</li>
<li>Describes FreeBSD as &quot;the best well-hidden success story in operating systems, by now in the hands of more people than one can count and used by even more people, and not one of them knows it! It’s not only the best operating system currently around, but also the most supportive and inspiring community.&quot;</li>
<li>In <a href="http://blogs.freebsdish.org/portmgr/2013/11/25/getting-to-know-your-portmgr-martin-wilke/" rel="nofollow">the next one</a> they speak with Martin Wilke (miwi@)</li>
<li>The usual, &quot;what inspires you about FreeBSD&quot; &quot;how did you get into it&quot; etc.
***</li>
</ul>

<h3><a href="http://blog.hostileadmin.com/2013/11/20/vbsdcon-wrap-ups/" rel="nofollow">vBSDCon wrap-up compilation</a></h3>

<ul>
<li>Lots of write-ups about vBSDCon gathered in one place</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20131121050402" rel="nofollow">Some from OpenBSD guys</a></li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/11/vbsdcon-trip-report-john-mark-gurney.html" rel="nofollow">Some from FreeBSD guys</a></li>
<li><a href="http://www.rootbsd.net/vbsdcon-2013-wrap-up/" rel="nofollow">Some from RootBSD</a></li>
<li><a href="http://www.ixsystems.com/resources/ix/blog/vbsdcon-2013.html" rel="nofollow">Some from iXsystems</a></li>
<li><a href="http://blogs.verisigninc.com/blog/entry/builders_and_archaeologists" rel="nofollow">Some from Verisign</a></li>
<li>And of course our own wrap-up chat in <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">BSD Now Episode 009</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-each-week-we-are-going.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>This week they talk to Gábor Páli from Hungary</li>
<li>Talks about his past as a game programmer and how it got involved with FreeBSD</li>
<li>&quot;I met János Háber, who admired the technical merits of FreeBSD and recommended it over the popular GNU/Linux distributions. I downloaded FreeBSD 4.3-RELEASE, found it reliable, consistent, easy to install, update and use.&quot;</li>
<li>He&#39;s been contributing since 2008 and does lots of work with Haskell in ports</li>
<li>He also organizes EuroBSDCon and is secretary of the FreeBSD Core Team
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release36/" rel="nofollow">Dragonfly 3.6 released</a></h3>

<ul>
<li>dports now default instead of pkgsrc</li>
<li>Big SMP scaling improvements</li>
<li>Experimental i915 and KMS support</li>
<li>See <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">our interview</a> with Justin Sherrill if you want to hear (a lot) more about it - nearly an hour long
***</li>
</ul>

<h2>Interview - Jordan Hubbard - <a href="mailto:jkh@freebsd.org" rel="nofollow">jkh@freebsd.org</a> / <a href="https://twitter.com/omgjkh" rel="nofollow">@omgjkh</a></h2>

<p>FreeBSD&#39;s founding and future</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD router, part 2</a></h3>

<ul>
<li><strong>Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.</strong>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://blog.pfsense.org/?p=1132" rel="nofollow">pfSense 2.1 on AWS EC2</a></h3>

<ul>
<li>We now have pfSense 2.1 available on Amazon’s Elastic Compute Cloud (EC2)</li>
<li>In keeping with the community spirit, they’re also offering a free &quot;public&quot; AMI</li>
<li>Check the FAQ and User Guide on their site for additional details</li>
<li>Interesting possibilities with pfSense in the cloud
***</li>
</ul>

<h3><a href="http://distrowatch.com/weekly.php?issue=20131118#feature" rel="nofollow">Puffy on the desktop</a></h3>

<ul>
<li>Distrowatch, a primarily Linux-focused site, features an OpenBSD 5.4 review</li>
<li>They talk about using it on the desktop, how to set it up</li>
<li>Very long write-up, curious Linux users should give it a read</li>
<li>Ends with &quot;Most people will still see OpenBSD as an operating system for servers and firewalls, but OpenBSD can also be used in desktop environments if the user doesn&#39;t mind a little manual work. The payoff is a very light, responsive system that is unlikely to ever misbehave&quot;
***</li>
</ul>

<h3><a href="http://cmacr.ae/openbsd/security/networking/2013/11/25/ssh-yubi.html" rel="nofollow">Two-factor authentication with SSH</a></h3>

<ul>
<li>Blog post about using a yubikey with SSH public keys</li>
<li>Uses a combination of a OTP, BSDAuth and OpenBSD&#39;s login.conf, but it can be used with PAM on other systems as well</li>
<li>Allows for two-factor authentication (a la gmail) in case your private key is compromised</li>
<li>Anyone interested in an extra-hardened SSH server should give it a read
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/weekly-feature-digest-112313/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 has approximately 400 PBIs for public consumption</li>
<li>They will be merging the GNOME3, MATE and Cinnamon desktops into the 10.0 ports tree - please help test them, this is pretty big news in and of itself!</li>
<li>PCDM is coming along nicely, more bugs are getting fixed</li>
<li>Added ZFS dataset options to PCBSD’s new text installer front-end
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ag1fA7Ug" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2TSIvZzVO" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s20Po4soFF" rel="nofollow">Zach writes in</a></li>
<li><a href="http://slexy.org/view/s20ntzqi9c" rel="nofollow">Addison writes in</a></li>
<li><a href="http://slexy.org/view/s2EYJjVKBk" rel="nofollow">Adam writes in</a></li>
<li><a href="https://twitter.com/redshirtlinux" rel="nofollow">Adam</a>&#39;s BSD Router Project tutorial can be downloaded <a href="http://bsdnow.cdn.scaleengine.net/bsdrouterproject.m4v" rel="nofollow">here</a>.
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>11: The Gateway Drug</title>
  <link>https://www.bsdnow.tv/11</link>
  <guid isPermaLink="false">43438bdb-8de0-4237-81e2-da2f448be5ef</guid>
  <pubDate>Wed, 13 Nov 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/43438bdb-8de0-4237-81e2-da2f448be5ef.mp3" length="78628291" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we'll be showing you a huge tutorial that's been baking for over a month - how to build an OpenBSD router that'll destroy any consumer router on the market! There's lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:49:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we'll be showing you a huge tutorial that's been baking for over a month - how to build an OpenBSD router that'll destroy any consumer router on the market! There's lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.
Headlines
OpenSSH 6.4 released (http://openssh.com/txt/release-6.4)
Security fixes in OpenSSH (http://openssh.com/) don't happen very often
6.4 fixes a memory corruption problem, no new features
If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.
Disabling AES-GCM in the server configuration is a workaround
Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9's base OpenSSL is unaffected, for example)
Full details here (http://www.openssh.com/txt/gcmrekey.adv)
***
Getting to know your portmgr-lurkers (http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/)
Next entry in portmgr interview series
This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously
Lots of questions ranging from why he uses BSD to what he had for breakfast
Another one (http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/) was since released, with Antoine Brodin aka antoine@
***
FUSE in OpenBSD (http://undeadly.org/cgi?action=article&amp;amp;sid=20131108082749)
As we glossed over last week, FUSE was recently added to OpenBSD
Now the guys from the OpenBSD Journal have tracked down more information
This version is released under an ISC license
Should be in OpenBSD 5.5, released a little less than 6 months from now
Will finally enable things like SSHFS to work in OpenBSD
***
Automated submission of kernel panic reports (https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html)
New tool from Colin Percival
Saves information about kernel panics and emails it to FreeBSD
Lets you review before sending so you can edit out any private info
Automatically encrypted before being sent
FreeBSD never kernel panics so this won't get much use
***
Interview - Justin Sherrill - justin@dragonflybsd.org (mailto:justin@dragonflybsd.org) / @dragonflybsd (https://twitter.com/dragonflybsd)
DragonflyBSD 3.6 and the Dragonfly Digest (http://www.shiningsilence.com/dbsdlog/)
Tutorial
Building an OpenBSD Router (http://www.bsdnow.tv/tutorials/openbsd-router)
News Roundup
BSD router project 1.5 released (http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/)
Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router
It's an alternative to pfSense, but not nearly as well known or popular
New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes
Fits on a 256MB Compact Flash/USB drive
***
Curve25519 now default key exchange (http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e)
We mentioned in an earlier episode about a patch for curve25519 (http://cr.yp.to/ecdh.html)
Now it's become the default for key exchange
Will probably make its way into OpenSSH 6.5, would've been in 6.4 if we didn't have that security vulnerability
It's interesting to see all these big changes in cryptography in OpenBSD lately
***
FreeBSD kernel selection in boot menu (https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=257650)
Adds a kernel selection menu to the beastie menu
List of kernels is taken from 'kernels' in loader.conf as a space or comma separated list of names to display (up to 9)
From our good buddy Devin Teske (http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities)
***
PCBSD weekly digest (http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/)
PCDM has officially replaced GDM as the default login manager
New ISO build scripts (we got a sneak preview last week)
Lots of bug fixes
Second set of 10-STABLE ISOs available with new artwork and much more
***
Theo de Raadt speaking at MUUG (http://undeadly.org/cgi?action=article&amp;amp;sid=20131113074042&amp;amp;mode=expanded&amp;amp;count=0)
Theo will be speaking at Manitoba UNIX User Group in Winnipeg
On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)
If you're watching the show live you have time to make plans, if you're watching the downloaded version it might be happening right now!
No agenda, but expect some OpenBSD discussion
***
Feedback/Questions
Dave writes in (http://slexy.org/view/s21YXhiLRB)
James writes in (http://slexy.org/view/s215EjcgdM)
Allen writes in (http://slexy.org/view/s21mCP2ecL)
Chess writes in (http://slexy.org/view/s207ePFrna)
Frank writes in (http://slexy.org/view/s20iVFXJve)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, building, bsd, router, gateway, soho, small home office, pcbsd, server, tutorial, guide, howto, interview, firewall, network, hammer fs, dragonfly, openssh, 6.4, dragonfly digest, aes gcm, openssl, bsd router project, tbrp, portmgr, fuse, filesystem in userspace, kernel panic, automatic</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we&#39;ll be showing you a huge tutorial that&#39;s been baking for over a month - how to build an OpenBSD router that&#39;ll destroy any consumer router on the market! There&#39;s lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://openssh.com/txt/release-6.4" rel="nofollow">OpenSSH 6.4 released</a></h3>

<ul>
<li>Security fixes in <a href="http://openssh.com/" rel="nofollow">OpenSSH</a> don&#39;t happen very often</li>
<li>6.4 fixes a memory corruption problem, no new features</li>
<li>If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.</li>
<li>Disabling AES-GCM in the server configuration is a workaround</li>
<li>Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9&#39;s base OpenSSL is unaffected, for example)</li>
<li>Full details <a href="http://www.openssh.com/txt/gcmrekey.adv" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>Next entry in portmgr interview series</li>
<li>This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously</li>
<li>Lots of questions ranging from why he uses BSD to what he had for breakfast</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/" rel="nofollow">Another one</a> was since released, with Antoine Brodin aka antoine@
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131108082749" rel="nofollow">FUSE in OpenBSD</a></h3>

<ul>
<li>As we glossed over last week, FUSE was recently added to OpenBSD</li>
<li>Now the guys from the OpenBSD Journal have tracked down more information</li>
<li>This version is released under an ISC license</li>
<li>Should be in OpenBSD 5.5, released a little less than 6 months from now</li>
<li>Will finally enable things like SSHFS to work in OpenBSD
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html" rel="nofollow">Automated submission of kernel panic reports</a></h3>

<ul>
<li>New tool from Colin Percival</li>
<li>Saves information about kernel panics and emails it to FreeBSD</li>
<li>Lets you review before sending so you can edit out any private info</li>
<li>Automatically encrypted before being sent</li>
<li>FreeBSD never kernel panics so this won&#39;t get much use
***</li>
</ul>

<h2>Interview - Justin Sherrill - <a href="mailto:justin@dragonflybsd.org" rel="nofollow">justin@dragonflybsd.org</a> / <a href="https://twitter.com/dragonflybsd" rel="nofollow">@dragonflybsd</a></h2>

<p>DragonflyBSD 3.6 and the <a href="http://www.shiningsilence.com/dbsdlog/" rel="nofollow">Dragonfly Digest</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD Router</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/" rel="nofollow">BSD router project 1.5 released</a></h3>

<ul>
<li>Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router</li>
<li>It&#39;s an alternative to pfSense, but not nearly as well known or popular</li>
<li>New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes</li>
<li>Fits on a 256MB Compact Flash/USB drive
***</li>
</ul>

<h3><a href="http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e" rel="nofollow">Curve25519 now default key exchange</a></h3>

<ul>
<li>We mentioned in an earlier episode about a patch for <a href="http://cr.yp.to/ecdh.html" rel="nofollow">curve25519</a></li>
<li>Now it&#39;s become the default for key exchange</li>
<li>Will probably make its way into OpenSSH 6.5, would&#39;ve been in 6.4 if we didn&#39;t have that security vulnerability</li>
<li>It&#39;s interesting to see all these big changes in cryptography in OpenBSD lately
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=257650" rel="nofollow">FreeBSD kernel selection in boot menu</a></h3>

<ul>
<li>Adds a kernel selection menu to the beastie menu</li>
<li>List of kernels is taken from &#39;kernels&#39; in loader.conf as a space or comma separated list of names to display (up to 9)</li>
<li>From our good buddy <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCDM has officially replaced GDM as the default login manager</li>
<li>New ISO build scripts (we got a sneak preview last week)</li>
<li>Lots of bug fixes</li>
<li>Second set of 10-STABLE ISOs available with new artwork and much more
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131113074042&mode=expanded&count=0" rel="nofollow">Theo de Raadt speaking at MUUG</a></h3>

<ul>
<li>Theo will be speaking at Manitoba UNIX User Group in Winnipeg</li>
<li>On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)</li>
<li>If you&#39;re watching the show live you have time to make plans, if you&#39;re watching the downloaded version it might be happening right now!</li>
<li>No agenda, but expect some OpenBSD discussion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21YXhiLRB" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s215EjcgdM" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21mCP2ecL" rel="nofollow">Allen writes in</a></li>
<li><a href="http://slexy.org/view/s207ePFrna" rel="nofollow">Chess writes in</a></li>
<li><a href="http://slexy.org/view/s20iVFXJve" rel="nofollow">Frank writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we&#39;ll be showing you a huge tutorial that&#39;s been baking for over a month - how to build an OpenBSD router that&#39;ll destroy any consumer router on the market! There&#39;s lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://openssh.com/txt/release-6.4" rel="nofollow">OpenSSH 6.4 released</a></h3>

<ul>
<li>Security fixes in <a href="http://openssh.com/" rel="nofollow">OpenSSH</a> don&#39;t happen very often</li>
<li>6.4 fixes a memory corruption problem, no new features</li>
<li>If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.</li>
<li>Disabling AES-GCM in the server configuration is a workaround</li>
<li>Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9&#39;s base OpenSSL is unaffected, for example)</li>
<li>Full details <a href="http://www.openssh.com/txt/gcmrekey.adv" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>Next entry in portmgr interview series</li>
<li>This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously</li>
<li>Lots of questions ranging from why he uses BSD to what he had for breakfast</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/" rel="nofollow">Another one</a> was since released, with Antoine Brodin aka antoine@
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131108082749" rel="nofollow">FUSE in OpenBSD</a></h3>

<ul>
<li>As we glossed over last week, FUSE was recently added to OpenBSD</li>
<li>Now the guys from the OpenBSD Journal have tracked down more information</li>
<li>This version is released under an ISC license</li>
<li>Should be in OpenBSD 5.5, released a little less than 6 months from now</li>
<li>Will finally enable things like SSHFS to work in OpenBSD
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html" rel="nofollow">Automated submission of kernel panic reports</a></h3>

<ul>
<li>New tool from Colin Percival</li>
<li>Saves information about kernel panics and emails it to FreeBSD</li>
<li>Lets you review before sending so you can edit out any private info</li>
<li>Automatically encrypted before being sent</li>
<li>FreeBSD never kernel panics so this won&#39;t get much use
***</li>
</ul>

<h2>Interview - Justin Sherrill - <a href="mailto:justin@dragonflybsd.org" rel="nofollow">justin@dragonflybsd.org</a> / <a href="https://twitter.com/dragonflybsd" rel="nofollow">@dragonflybsd</a></h2>

<p>DragonflyBSD 3.6 and the <a href="http://www.shiningsilence.com/dbsdlog/" rel="nofollow">Dragonfly Digest</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD Router</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/" rel="nofollow">BSD router project 1.5 released</a></h3>

<ul>
<li>Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router</li>
<li>It&#39;s an alternative to pfSense, but not nearly as well known or popular</li>
<li>New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes</li>
<li>Fits on a 256MB Compact Flash/USB drive
***</li>
</ul>

<h3><a href="http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e" rel="nofollow">Curve25519 now default key exchange</a></h3>

<ul>
<li>We mentioned in an earlier episode about a patch for <a href="http://cr.yp.to/ecdh.html" rel="nofollow">curve25519</a></li>
<li>Now it&#39;s become the default for key exchange</li>
<li>Will probably make its way into OpenSSH 6.5, would&#39;ve been in 6.4 if we didn&#39;t have that security vulnerability</li>
<li>It&#39;s interesting to see all these big changes in cryptography in OpenBSD lately
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=257650" rel="nofollow">FreeBSD kernel selection in boot menu</a></h3>

<ul>
<li>Adds a kernel selection menu to the beastie menu</li>
<li>List of kernels is taken from &#39;kernels&#39; in loader.conf as a space or comma separated list of names to display (up to 9)</li>
<li>From our good buddy <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCDM has officially replaced GDM as the default login manager</li>
<li>New ISO build scripts (we got a sneak preview last week)</li>
<li>Lots of bug fixes</li>
<li>Second set of 10-STABLE ISOs available with new artwork and much more
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131113074042&mode=expanded&count=0" rel="nofollow">Theo de Raadt speaking at MUUG</a></h3>

<ul>
<li>Theo will be speaking at Manitoba UNIX User Group in Winnipeg</li>
<li>On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)</li>
<li>If you&#39;re watching the show live you have time to make plans, if you&#39;re watching the downloaded version it might be happening right now!</li>
<li>No agenda, but expect some OpenBSD discussion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21YXhiLRB" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s215EjcgdM" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21mCP2ecL" rel="nofollow">Allen writes in</a></li>
<li><a href="http://slexy.org/view/s207ePFrna" rel="nofollow">Chess writes in</a></li>
<li><a href="http://slexy.org/view/s20iVFXJve" rel="nofollow">Frank writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
