<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 29 Apr 2026 23:28:14 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Smp”</title>
    <link>https://www.bsdnow.tv/tags/smp</link>
    <pubDate>Wed, 01 Jul 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>96: Lost Technology</title>
  <link>https://www.bsdnow.tv/96</link>
  <guid isPermaLink="false">a1813e16-466a-4617-9bb0-24dbdc1cb5f2</guid>
  <pubDate>Wed, 01 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a1813e16-466a-4617-9bb0-24dbdc1cb5f2.mp3" length="52701844" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He'll tell us what makes these old (and often forgotten) machines so interesting. As usual, we've also got answers to your emails and all this week's news on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:13:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He'll tell us what makes these old (and often forgotten) machines so interesting. As usual, we've also got answers to your emails and all this week's news on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;
Headlines
Out with the old, in with the less (http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less)
Our friend Ted Unangst has a new article up, talking about "various OpenBSD replacements and reductions"
"Instead of trying to fix known bugs, we’re trying to fix unknown bugs. It’s not based on the current buggy state of the code, but the anticipated future buggy state of the code. Past bugs are a bigger factor than current bugs."
In the post, he goes through some of the bigger (and smaller) examples of OpenBSD rewriting tools to be simpler and more secure
It starts off with a lesser-known SCSI driver that "tried to do too much" being replaced with three separate drivers
"Each driver can now be modified in isolation without unintentional side effects on other hardware, or the need to consider if and where further special cases need to be added. Despite the fact that these three drivers duplicate all the common boilerplate code, combined they only amount to about half as much code as the old driver."
In contrast to that example, he goes on to cite mandoc as taking a very non "unixy" direction, but at the same time being smaller and simpler than all the tools it replaced
The next case is the new http daemon, and he talks a bit about the recently-added rewrite support being done in a simple and secure way (as opposed to regex and its craziness)
He also talks about the rewritten "file" utility: "Almost by definition, its sole input will be untrusted input. Perversely, people will then trust what file tells them and then go about using that input, as if file somehow sanitized it."
Finally, sudo in OpenBSD's base system is moving to ports soon, and the article briefly describes a new tool that may or may not replace it (https://marc.info/?l=openbsd-ports&amp;amp;m=143481227122523&amp;amp;w=2), called "doas"
There's also a nice wrap-up of all the examples at the end, and the "Pruning and Polishing (http://www.openbsd.org/papers/pruning.html)" talk is good complementary reading material
***
More OpenZFS and BSDCan videos (https://www.youtube.com/channel/UC0IK6Y4Go2KtRueHDiQcxow/videos)
We mentioned last week (http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy) that some of the videos from the second OpenZFS conference in Europe were being uploaded - here's some more
Matt Ahrens did a Q&amp;amp;A session (https://www.youtube.com/watch?v=I6fXZ_6OT5c) and talked about ZFS send and receive (https://www.youtube.com/watch?v=iY44jPMvxog), as well as giving an overview of OpenZFS (https://www.youtube.com/watch?v=RQlMDmnty80)
George Wilson talked about a performance retrospective (https://www.youtube.com/watch?v=KBI6rRGUv4E)
Toshiba (https://www.youtube.com/watch?v=sSi47-k78IM), Syneto (https://www.youtube.com/watch?v=Hhje5KEF5cE) and HGST (https://www.youtube.com/watch?v=aKgxXipss8k) also gave some talks about their companies and how they're using ZFS
As for BSDCan, more of their BSD presentations have been uploaded too...
Ryan Stone, PCI SR-IOV on FreeBSD (https://www.youtube.com/watch?v=INeMd-i5jzM)
George Neville-Neil, Measure Twice, Code Once (https://www.youtube.com/watch?v=LE4wMsP7zeA)
Kris Moore, Unifying jail and package management for PC-BSD, FreeNAS and FreeBSD (https://www.youtube.com/watch?v=qNYXqpJiFN0)
Warner Losh, I/O Scheduling in CAM (https://www.youtube.com/watch?v=3WqOLolj5EU)
Kirk McKusick, An Introduction to the Implementation of ZFS (https://www.youtube.com/watch?v=l-RCLgLxuSc)
Midori Kato, Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support (https://www.youtube.com/watch?v=zZXvjhWcg_4)
Baptiste Daroussin, Packaging FreeBSD's (https://www.youtube.com/watch?v=Br6izhH5P1I) base system (https://www.youtube.com/watch?v=v7px6ktoDAI)
Matt Ahrens, New OpenZFS features supporting remote replication (https://www.youtube.com/watch?v=UOX7WDAjqso)
Ed Schouten, CloudABI Cloud computing meets fine-grained capabilities (https://www.youtube.com/watch?v=SVdF84x1EdA)
The audio of Ingo Schwarze's talk "mandoc: becoming the main BSD manual toolbox" got messed up, but there's an alternate recording here (http://www.bsdcan.org/2015/audio/mandoc.mp3), and the slides are here (http://www.openbsd.org/papers/bsdcan15-mandoc.pdf)
***
SMP steroids for PF (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143526329006942&amp;amp;w=2)
An Oracle employee that's been porting OpenBSD's PF to an upcoming Solaris release has sent in an interesting patch for review
Attached to the mail was what may be the beginnings of making native PF SMP-aware
Before you start partying, the road to SMP (specifically, giant lock removal) is a long and very complicated one, requiring every relevant bit of the stack to be written with it in mind - this is just one piece of the puzzle
The initial response (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143532243322281&amp;amp;w=2) has been quite positive though, with some back and forth (https://www.marc.info/?l=openbsd-tech&amp;amp;m=143532963824548&amp;amp;w=2) between developers and the submitter
For now, let's be patient and see what happens
***
DragonFly 4.2.0 released (http://www.dragonflybsd.org/release42/)
DragonFlyBSD has released the next big update of their 4.x branch, complete with a decent amount of new features and fixes
i915 and Radeon graphics have been updated, and DragonFly can claim the title of first BSD with Broadwell support in a release
Sendmail in the base system has been replaced with their homegrown DragonFly Mail Agent, and there's a wiki page (http://www.dragonflybsd.com/docs/docs/newhandbook/mta/) about configuring it
They've also switched the default compiler to GCC 5, though why they've gone in that direction instead of embracing Clang is a mystery
The announcement page also contains a list of kernel changes, details on the audio and graphics updates, removal of the SCTP protocol, improvements to the temperature sensors, various userland utility fixes and a list of updates to third party tools
Work is continuing on the second generation HAMMER filesystem, and Matt Dillon provides a status update in the release announcement
There was also some hacker news discussion (https://news.ycombinator.com/item?id=9797932) you can check out, as well as upgrade instructions (http://lists.dragonflybsd.org/pipermail/users/2015-June/207801.html)
***
OpenSMTPD 5.7.1 released (https://opensmtpd.org/announces/release-5.7.1.txt)
The OpenSMTPD guys have just released version 5.7.1, a major milestone version that we mentioned recently
Crypto-related bits have been vastly improved: the RSA engine is now privilege-separated, TLS errors are handled more gracefully, ciphers and curve preferences can now be specified, the PKI interface has been reworked to allow custom CAs, SNI and certificate verification have been simplified and the DH parameters are now 2048 bit by default
The long-awaited filter API is now enabled by default, though still considered slightly experimental
Documentation has been improved quite a bit, with more examples and common use cases (as well as exotic ones)
Many more small additions and bugfixes were made, so check the changelog for the full list
Starting with 5.7.1, releases are now cryptographically (https://twitter.com/OpenSMTPD/status/613257722574839808) signed (https://www.opensmtpd.org/archives/opensmtpd-5.7.1.sum.sig) to ensure integrity
This release has gone through some major stress testing to ensure stability - Gilles regularly asks their Twitter followers to flood a test server (https://twitter.com/OpenSMTPD/status/608399272447471616) with thousands of emails per second, even offering prizes (https://twitter.com/OpenSMTPD/status/608235180839567360) to whoever can DDoS them the hardest
OpenSMTPD runs on all the BSDs of course, and seems to be getting pretty popular lately
Let's all encourage (mailto:feedback@bsdnow.tv) Kris to stop procrastinating on switching from Postfix
***
Interview - Jun Ebihara (蛯原純) - jun@netbsd.org (mailto:jun@netbsd.org) / @ebijun (https://twitter.com/ebijun)
Lesser-known CPU architectures, embedded NetBSD devices
News Roundup
FreeBSD foundation at BSDCan (http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-steven-douglas.html)
The FreeBSD foundation has posted a few BSDCan summaries on their blog
The first, from Steven Douglas, begins with a sentiment a lot of us can probably identify with: "Where I live, there are only a handful of people that even know what BSD is, let alone can talk at a high level about it. That was one of my favorite things, being around like minded people."
He got to meet a lot of the people working on big-name projects, and enjoyed being able to ask them questions so easily
Their second (http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-ahmed-kamal.html) trip report is from Ahmed Kamal, who flew in all the way from Egypt
A bit starstruck, he seems to have enjoyed all the talks, particularly Andrew Tanenbaum's about MINIX and NetBSD
There are also two more wrap-ups from Zbigniew Bodek (http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-zbigniew-bodek.html) and Vsevolod Stakhov (http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-vsevolod-stakhov.html), so you've got plenty to read
***
OpenBSD from a veteran Linux user perspective (http://cfenollosa.com/blog/openbsd-from-a-veteran-linux-user-perspective.html)
In a new series of blog posts, a self-proclaimed veteran Linux user is giving OpenBSD a try for the first time
"For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an 'old-school' Linux admin, and I've felt out of place with the latest changes on the system administration."
The post is a collection of his thoughts about what's different between Linux and BSD, what surprised him as a beginner - admittedly, a lot of his knowledge carried over, and there were just minor differences in command flags
One of the things that surprised him (in a positive way) was the documentation: "OpenBSD's man pages are so nice that RTFMing somebody on the internet is not condescending but selfless."
He also goes through some of the basics, installing and updating software, following different branches
It concludes with "If you like UNIX, it will open your eyes to the fact that there is more than one way to do things, and that system administration can still be simple while modern."
***
FreeBSD on the desktop, am I crazy (http://sysconfig.org.uk/freebsd-on-the-desktop-am-i-crazy.html)
Similar to the previous article, the guy that wrote the SSH two factor authentication post we covered last week has another new article up - this time about FreeBSD on the desktop
He begins with a bit of forewarning for potential Linux switchers: "It certainly wasn't an easy journey, and I'm tempted to say do not try this at home to anybody who isn't going to leverage any of FreeBSD's strong points. Definitely don't try FreeBSD on the desktop if you haven't used it on servers or virtual machines before. It's got less in common with Linux than you might think."
With that out of the way, the list of positives is pretty large: a tidy base system, separation between base and ports, having the option to choose binary packages or ports, ZFS, jails, licensing and of course the lack of systemd
The rest of the post talks about some of the hurdles he had to overcome, namely with graphics and the infamous Adobe Flash
Also worth noting is that he found jails to be not only good for isolating daemons on a server, but pretty useful for desktop applications as well
In the end, he says it was worth all the trouble, and is even planning on converting his laptop to FreeBSD soon too
***
OpenIKED and Cisco CSR 1000v IPSEC (https://www.netflask.net/ipsec-ikev2-cisco-csr1000v-openiked/)
This article covers setting up a site-to-site IPSEC tunnel between a Cisco CSR 1000v router and an OpenBSD gateway running OpenIKED
What kind of networking blog post would be complete without a diagram where the internet is represented by a big cloud
There are lots of details (and example configuration files) for using IKEv2 and OpenBSD's built-in IKE daemon
It also goes to show that the BSDs generally play well with existing network infrastructure, so if you were a business that's afraid to try them… don't be
***
HardenedBSD improves stack randomization (https://github.com/HardenedBSD/hardenedBSD/commit/bd5cecb4dc7947a5e214fc100834399b4bffdee8)
The HardenedBSD guys have improved their FreeBSD ASLR patchset, specifically in the stack randomization area
In their initial implementation, the stack randomization was a random gap - this update makes the base address randomized as well
They're now stacking the new on top of the old as well, with the goal being even more entropy
This change triggered an ABI and API incompatibility, so their major version has been bumped
***
OpenSSH 6.9 released (https://lists.mindrot.org/pipermail/openssh-unix-announce/2015-July/000121.html)
The OpenSSH team has announced the release of a new version which, following their tick/tock major/minor release cycle, is focused mainly on bug fixes
There are a couple new things though - the "AuthorizedKeysCommand" config option now takes custom arguments
One very notable change is that the default cipher has changed as of this release
The traditional pairing of AES128 in counter mode with MD5 HMAC has been replaced by the ever-trendy ChaCha20-Poly1305 combo
Their next release, 7.0, is set to get rid a number of legacy items: PermitRootLogin will be switched to "no" by default, SSHv1 support will be totally disabled, the 1024bit diffie-hellman-group1-sha1 KEX will be disabled, old ssh-dss and v00 certs will be removed, a number of weak ciphers will be disabled by default (including all CBC ones) and RSA keys will be refused if they're under 1024 bits
Many small bugs fixes and improvements were also made, so check the announcement for everything else
The native version is in OpenBSD -current, and an update to the portable version should be hitting a ports or pkgsrc tree near you soon
***
Feedback/Questions
Brad writes in (http://slexy.org/view/s2Ws6Y2rZy)
Mason writes in (http://slexy.org/view/s21GvZ5xbs)
Jochen writes in (http://slexy.org/view/s209TrPK4e)
Simon writes in (http://slexy.org/view/s21TQjUjxv)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, osc, embedded, japanese, users group, pf, smp, multithreading, file, solaris, httpd, leap second, openzfs, zfs, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He&#39;ll tell us what makes these old (and often forgotten) machines so interesting. As usual, we&#39;ve also got answers to your emails and all this week&#39;s news on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">Out with the old, in with the less</a></h3>

<ul>
<li>Our friend Ted Unangst has a new article up, talking about &quot;various OpenBSD replacements and reductions&quot;</li>
<li>&quot;Instead of trying to fix known bugs, we’re trying to fix unknown bugs. It’s not based on the current buggy state of the code, but the anticipated future buggy state of the code. Past bugs are a bigger factor than current bugs.&quot;</li>
<li>In the post, he goes through some of the bigger (and smaller) examples of OpenBSD rewriting tools to be simpler and more secure</li>
<li>It starts off with a lesser-known SCSI driver that &quot;tried to do too much&quot; being replaced with three separate drivers</li>
<li>&quot;Each driver can now be modified in isolation without unintentional side effects on other hardware, or the need to consider if and where further special cases need to be added. Despite the fact that these three drivers duplicate all the common boilerplate code, combined they only amount to about half as much code as the old driver.&quot;</li>
<li>In contrast to that example, he goes on to cite mandoc as taking a very non &quot;unixy&quot; direction, but at the same time being smaller and simpler than all the tools it replaced</li>
<li>The next case is the new http daemon, and he talks a bit about the recently-added rewrite support being done in a simple and secure way (as opposed to regex and its craziness)</li>
<li>He also talks about the rewritten &quot;file&quot; utility: &quot;Almost by definition, its sole input will be untrusted input. Perversely, people will then trust what file tells them and then go about using that input, as if file somehow sanitized it.&quot;</li>
<li>Finally, sudo in OpenBSD&#39;s base system is moving to ports soon, and the article briefly describes a new tool that <a href="https://marc.info/?l=openbsd-ports&m=143481227122523&w=2" rel="nofollow">may or may not replace it</a>, called &quot;doas&quot;</li>
<li>There&#39;s also a nice wrap-up of all the examples at the end, and the &quot;<a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">Pruning and Polishing</a>&quot; talk is good complementary reading material
***</li>
</ul>

<h3><a href="https://www.youtube.com/channel/UC0IK6Y4Go2KtRueHDiQcxow/videos" rel="nofollow">More OpenZFS and BSDCan videos</a></h3>

<ul>
<li>We mentioned <a href="http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy" rel="nofollow">last week</a> that some of the videos from the second OpenZFS conference in Europe were being uploaded - here&#39;s some more</li>
<li>Matt Ahrens did <a href="https://www.youtube.com/watch?v=I6fXZ_6OT5c" rel="nofollow">a Q&amp;A session</a> and talked about ZFS <a href="https://www.youtube.com/watch?v=iY44jPMvxog" rel="nofollow">send and receive</a>, as well as giving an <a href="https://www.youtube.com/watch?v=RQlMDmnty80" rel="nofollow">overview of OpenZFS</a></li>
<li>George Wilson talked about a <a href="https://www.youtube.com/watch?v=KBI6rRGUv4E" rel="nofollow">performance retrospective</a></li>
<li><a href="https://www.youtube.com/watch?v=sSi47-k78IM" rel="nofollow">Toshiba</a>, <a href="https://www.youtube.com/watch?v=Hhje5KEF5cE" rel="nofollow">Syneto</a> and <a href="https://www.youtube.com/watch?v=aKgxXipss8k" rel="nofollow">HGST</a> also gave some talks about their companies and how they&#39;re using ZFS</li>
<li>As for BSDCan, more of their BSD presentations have been uploaded too...</li>
<li>Ryan Stone, <a href="https://www.youtube.com/watch?v=INeMd-i5jzM" rel="nofollow">PCI SR-IOV on FreeBSD</a></li>
<li>George Neville-Neil, <a href="https://www.youtube.com/watch?v=LE4wMsP7zeA" rel="nofollow">Measure Twice, Code Once</a></li>
<li>Kris Moore, <a href="https://www.youtube.com/watch?v=qNYXqpJiFN0" rel="nofollow">Unifying jail and package management for PC-BSD, FreeNAS and FreeBSD</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=3WqOLolj5EU" rel="nofollow">I/O Scheduling in CAM</a></li>
<li>Kirk McKusick, <a href="https://www.youtube.com/watch?v=l-RCLgLxuSc" rel="nofollow">An Introduction to the Implementation of ZFS</a></li>
<li>Midori Kato, <a href="https://www.youtube.com/watch?v=zZXvjhWcg_4" rel="nofollow">Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support</a></li>
<li>Baptiste Daroussin, <a href="https://www.youtube.com/watch?v=Br6izhH5P1I" rel="nofollow">Packaging FreeBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=v7px6ktoDAI" rel="nofollow">base system</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=UOX7WDAjqso" rel="nofollow">New OpenZFS features supporting remote replication</a></li>
<li>Ed Schouten, <a href="https://www.youtube.com/watch?v=SVdF84x1EdA" rel="nofollow">CloudABI Cloud computing meets fine-grained capabilities</a></li>
<li>The audio of Ingo Schwarze&#39;s talk &quot;mandoc: becoming the main BSD manual toolbox&quot; got messed up, but there&#39;s an alternate recording <a href="http://www.bsdcan.org/2015/audio/mandoc.mp3" rel="nofollow">here</a>, and the slides are <a href="http://www.openbsd.org/papers/bsdcan15-mandoc.pdf" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143526329006942&w=2" rel="nofollow">SMP steroids for PF</a></h3>

<ul>
<li>An Oracle employee that&#39;s been porting OpenBSD&#39;s PF to an upcoming Solaris release has sent in an interesting patch for review</li>
<li>Attached to the mail was what may be the beginnings of making native PF SMP-aware</li>
<li>Before you start partying, the road to SMP (specifically, giant lock removal) is a long and very complicated one, requiring every relevant bit of the stack to be written with it in mind - this is just one piece of the puzzle</li>
<li>The <a href="https://www.marc.info/?l=openbsd-tech&m=143532243322281&w=2" rel="nofollow">initial response</a> has been quite positive though, with some <a href="https://www.marc.info/?l=openbsd-tech&m=143532963824548&w=2" rel="nofollow">back and forth</a> between developers and the submitter</li>
<li>For now, let&#39;s be patient and see what happens
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release42/" rel="nofollow">DragonFly 4.2.0 released</a></h3>

<ul>
<li>DragonFlyBSD has released the next big update of their 4.x branch, complete with a decent amount of new features and fixes</li>
<li>i915 and Radeon graphics have been updated, and DragonFly can claim the title of first BSD with Broadwell support in a release</li>
<li>Sendmail in the base system has been replaced with their homegrown DragonFly Mail Agent, and there&#39;s <a href="http://www.dragonflybsd.com/docs/docs/newhandbook/mta/" rel="nofollow">a wiki page</a> about configuring it</li>
<li>They&#39;ve also switched the default compiler to GCC 5, though why they&#39;ve gone in that direction instead of embracing Clang is a mystery</li>
<li>The announcement page also contains a list of kernel changes, details on the audio and graphics updates, removal of the SCTP protocol, improvements to the temperature sensors, various userland utility fixes and a list of updates to third party tools</li>
<li>Work is continuing on the second generation HAMMER filesystem, and Matt Dillon provides a status update in the release announcement</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9797932" rel="nofollow">hacker news discussion</a> you can check out, as well as <a href="http://lists.dragonflybsd.org/pipermail/users/2015-June/207801.html" rel="nofollow">upgrade instructions</a>
***</li>
</ul>

<h3><a href="https://opensmtpd.org/announces/release-5.7.1.txt" rel="nofollow">OpenSMTPD 5.7.1 released</a></h3>

<ul>
<li>The OpenSMTPD guys have just released version 5.7.1, a major milestone version that we mentioned recently</li>
<li>Crypto-related bits have been vastly improved: the RSA engine is now privilege-separated, TLS errors are handled more gracefully, ciphers and curve preferences can now be specified, the PKI interface has been reworked to allow custom CAs, SNI and certificate verification have been simplified and the DH parameters are now 2048 bit by default</li>
<li>The long-awaited filter API is now enabled by default, though still considered slightly experimental</li>
<li>Documentation has been improved quite a bit, with more examples and common use cases (as well as exotic ones)</li>
<li>Many more small additions and bugfixes were made, so check the changelog for the full list</li>
<li>Starting with 5.7.1, releases are now <a href="https://twitter.com/OpenSMTPD/status/613257722574839808" rel="nofollow">cryptographically</a> <a href="https://www.opensmtpd.org/archives/opensmtpd-5.7.1.sum.sig" rel="nofollow">signed</a> to ensure integrity</li>
<li>This release has gone through some major stress testing to ensure stability - Gilles regularly asks their Twitter followers to <a href="https://twitter.com/OpenSMTPD/status/608399272447471616" rel="nofollow">flood a test server</a> with thousands of emails per second, even <a href="https://twitter.com/OpenSMTPD/status/608235180839567360" rel="nofollow">offering prizes</a> to whoever can DDoS them the hardest</li>
<li>OpenSMTPD runs on all the BSDs of course, and seems to be getting pretty popular lately</li>
<li>Let&#39;s all <a href="mailto:feedback@bsdnow.tv" rel="nofollow">encourage</a> Kris to stop procrastinating on switching from Postfix
***</li>
</ul>

<h2>Interview - Jun Ebihara (蛯原純) - <a href="mailto:jun@netbsd.org" rel="nofollow">jun@netbsd.org</a> / <a href="https://twitter.com/ebijun" rel="nofollow">@ebijun</a></h2>

<p>Lesser-known CPU architectures, embedded NetBSD devices</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-steven-douglas.html" rel="nofollow">FreeBSD foundation at BSDCan</a></h3>

<ul>
<li>The FreeBSD foundation has posted a few BSDCan summaries on their blog</li>
<li>The first, from Steven Douglas, begins with a sentiment a lot of us can probably identify with: &quot;Where I live, there are only a handful of people that even know what BSD is, let alone can talk at a high level about it. That was one of my favorite things, being around like minded people.&quot;</li>
<li>He got to meet a lot of the people working on big-name projects, and enjoyed being able to ask them questions so easily</li>
<li>Their <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-ahmed-kamal.html" rel="nofollow">second</a> trip report is from Ahmed Kamal, who flew in all the way from Egypt</li>
<li>A bit starstruck, he seems to have enjoyed all the talks, particularly Andrew Tanenbaum&#39;s about MINIX and NetBSD</li>
<li>There are also two more wrap-ups from <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-zbigniew-bodek.html" rel="nofollow">Zbigniew Bodek</a> and <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-vsevolod-stakhov.html" rel="nofollow">Vsevolod Stakhov</a>, so you&#39;ve got plenty to read
***</li>
</ul>

<h3><a href="http://cfenollosa.com/blog/openbsd-from-a-veteran-linux-user-perspective.html" rel="nofollow">OpenBSD from a veteran Linux user perspective</a></h3>

<ul>
<li>In a new series of blog posts, a self-proclaimed veteran Linux user is giving OpenBSD a try for the first time</li>
<li>&quot;For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an &#39;old-school&#39; Linux admin, and I&#39;ve felt out of place with the latest changes on the system administration.&quot;</li>
<li>The post is a collection of his thoughts about what&#39;s different between Linux and BSD, what surprised him as a beginner - admittedly, a lot of his knowledge carried over, and there were just minor differences in command flags</li>
<li>One of the things that surprised him (in a positive way) was the documentation: &quot;OpenBSD&#39;s man pages are so nice that RTFMing somebody on the internet is not condescending but selfless.&quot;</li>
<li>He also goes through some of the basics, installing and updating software, following different branches</li>
<li>It concludes with &quot;If you like UNIX, it will open your eyes to the fact that there is more than one way to do things, and that system administration can still be simple while modern.&quot;
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/freebsd-on-the-desktop-am-i-crazy.html" rel="nofollow">FreeBSD on the desktop, am I crazy</a></h3>

<ul>
<li>Similar to the previous article, the guy that wrote the SSH two factor authentication post we covered last week has another new article up - this time about FreeBSD on the desktop</li>
<li>He begins with a bit of forewarning for potential Linux switchers: &quot;It certainly wasn&#39;t an easy journey, and I&#39;m tempted to say do not try this at home to anybody who isn&#39;t going to leverage any of FreeBSD&#39;s strong points. Definitely don&#39;t try FreeBSD on the desktop if you haven&#39;t used it on servers or virtual machines before. It&#39;s got less in common with Linux than you might think.&quot;</li>
<li>With that out of the way, the list of positives is pretty large: a tidy base system, separation between base and ports, having the option to choose binary packages or ports, ZFS, jails, licensing and of course the lack of systemd</li>
<li>The rest of the post talks about some of the hurdles he had to overcome, namely with graphics and the infamous Adobe Flash</li>
<li>Also worth noting is that he found jails to be not only good for isolating daemons on a server, but pretty useful for desktop applications as well</li>
<li>In the end, he says it was worth all the trouble, and is even planning on converting his laptop to FreeBSD soon too
***</li>
</ul>

<h3><a href="https://www.netflask.net/ipsec-ikev2-cisco-csr1000v-openiked/" rel="nofollow">OpenIKED and Cisco CSR 1000v IPSEC</a></h3>

<ul>
<li>This article covers setting up a site-to-site IPSEC tunnel between a Cisco CSR 1000v router and an OpenBSD gateway running OpenIKED</li>
<li>What kind of networking blog post would be complete without a diagram where the internet is represented by a big cloud</li>
<li>There are lots of details (and example configuration files) for using IKEv2 and OpenBSD&#39;s built-in IKE daemon</li>
<li>It also goes to show that the BSDs generally play well with existing network infrastructure, so if you were a business that&#39;s afraid to try them… don&#39;t be
***</li>
</ul>

<h3><a href="https://github.com/HardenedBSD/hardenedBSD/commit/bd5cecb4dc7947a5e214fc100834399b4bffdee8" rel="nofollow">HardenedBSD improves stack randomization</a></h3>

<ul>
<li>The HardenedBSD guys have improved their FreeBSD ASLR patchset, specifically in the stack randomization area</li>
<li>In their initial implementation, the stack randomization was a random gap - this update makes the base address randomized as well</li>
<li>They&#39;re now stacking the new on top of the old as well, with the goal being even more entropy</li>
<li>This change triggered an ABI and API incompatibility, so their major version has been bumped
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2015-July/000121.html" rel="nofollow">OpenSSH 6.9 released</a></h3>

<ul>
<li>The OpenSSH team has announced the release of a new version which, following their tick/tock major/minor release cycle, is focused mainly on bug fixes</li>
<li>There are a couple new things though - the &quot;AuthorizedKeysCommand&quot; config option now takes custom arguments</li>
<li>One very notable change is that <strong>the default cipher has changed</strong> as of this release</li>
<li>The traditional pairing of AES128 in counter mode with MD5 HMAC has been <em>replaced</em> by the ever-trendy ChaCha20-Poly1305 combo</li>
<li>Their next release, 7.0, is set to get rid a number of legacy items: PermitRootLogin will be switched to &quot;no&quot; by default, SSHv1 support will be totally disabled, the 1024bit diffie-hellman-group1-sha1 KEX will be disabled, old ssh-dss and v00 certs will be removed, a number of weak ciphers will be disabled by default (including all CBC ones) and RSA keys will be refused if they&#39;re under 1024 bits</li>
<li>Many small bugs fixes and improvements were also made, so check the announcement for everything else</li>
<li>The native version is in OpenBSD -current, and an update to the portable version should be hitting a ports or pkgsrc tree near you soon
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2Ws6Y2rZy" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21GvZ5xbs" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s209TrPK4e" rel="nofollow">Jochen writes in</a></li>
<li><a href="http://slexy.org/view/s21TQjUjxv" rel="nofollow">Simon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He&#39;ll tell us what makes these old (and often forgotten) machines so interesting. As usual, we&#39;ve also got answers to your emails and all this week&#39;s news on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">Out with the old, in with the less</a></h3>

<ul>
<li>Our friend Ted Unangst has a new article up, talking about &quot;various OpenBSD replacements and reductions&quot;</li>
<li>&quot;Instead of trying to fix known bugs, we’re trying to fix unknown bugs. It’s not based on the current buggy state of the code, but the anticipated future buggy state of the code. Past bugs are a bigger factor than current bugs.&quot;</li>
<li>In the post, he goes through some of the bigger (and smaller) examples of OpenBSD rewriting tools to be simpler and more secure</li>
<li>It starts off with a lesser-known SCSI driver that &quot;tried to do too much&quot; being replaced with three separate drivers</li>
<li>&quot;Each driver can now be modified in isolation without unintentional side effects on other hardware, or the need to consider if and where further special cases need to be added. Despite the fact that these three drivers duplicate all the common boilerplate code, combined they only amount to about half as much code as the old driver.&quot;</li>
<li>In contrast to that example, he goes on to cite mandoc as taking a very non &quot;unixy&quot; direction, but at the same time being smaller and simpler than all the tools it replaced</li>
<li>The next case is the new http daemon, and he talks a bit about the recently-added rewrite support being done in a simple and secure way (as opposed to regex and its craziness)</li>
<li>He also talks about the rewritten &quot;file&quot; utility: &quot;Almost by definition, its sole input will be untrusted input. Perversely, people will then trust what file tells them and then go about using that input, as if file somehow sanitized it.&quot;</li>
<li>Finally, sudo in OpenBSD&#39;s base system is moving to ports soon, and the article briefly describes a new tool that <a href="https://marc.info/?l=openbsd-ports&m=143481227122523&w=2" rel="nofollow">may or may not replace it</a>, called &quot;doas&quot;</li>
<li>There&#39;s also a nice wrap-up of all the examples at the end, and the &quot;<a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">Pruning and Polishing</a>&quot; talk is good complementary reading material
***</li>
</ul>

<h3><a href="https://www.youtube.com/channel/UC0IK6Y4Go2KtRueHDiQcxow/videos" rel="nofollow">More OpenZFS and BSDCan videos</a></h3>

<ul>
<li>We mentioned <a href="http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy" rel="nofollow">last week</a> that some of the videos from the second OpenZFS conference in Europe were being uploaded - here&#39;s some more</li>
<li>Matt Ahrens did <a href="https://www.youtube.com/watch?v=I6fXZ_6OT5c" rel="nofollow">a Q&amp;A session</a> and talked about ZFS <a href="https://www.youtube.com/watch?v=iY44jPMvxog" rel="nofollow">send and receive</a>, as well as giving an <a href="https://www.youtube.com/watch?v=RQlMDmnty80" rel="nofollow">overview of OpenZFS</a></li>
<li>George Wilson talked about a <a href="https://www.youtube.com/watch?v=KBI6rRGUv4E" rel="nofollow">performance retrospective</a></li>
<li><a href="https://www.youtube.com/watch?v=sSi47-k78IM" rel="nofollow">Toshiba</a>, <a href="https://www.youtube.com/watch?v=Hhje5KEF5cE" rel="nofollow">Syneto</a> and <a href="https://www.youtube.com/watch?v=aKgxXipss8k" rel="nofollow">HGST</a> also gave some talks about their companies and how they&#39;re using ZFS</li>
<li>As for BSDCan, more of their BSD presentations have been uploaded too...</li>
<li>Ryan Stone, <a href="https://www.youtube.com/watch?v=INeMd-i5jzM" rel="nofollow">PCI SR-IOV on FreeBSD</a></li>
<li>George Neville-Neil, <a href="https://www.youtube.com/watch?v=LE4wMsP7zeA" rel="nofollow">Measure Twice, Code Once</a></li>
<li>Kris Moore, <a href="https://www.youtube.com/watch?v=qNYXqpJiFN0" rel="nofollow">Unifying jail and package management for PC-BSD, FreeNAS and FreeBSD</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=3WqOLolj5EU" rel="nofollow">I/O Scheduling in CAM</a></li>
<li>Kirk McKusick, <a href="https://www.youtube.com/watch?v=l-RCLgLxuSc" rel="nofollow">An Introduction to the Implementation of ZFS</a></li>
<li>Midori Kato, <a href="https://www.youtube.com/watch?v=zZXvjhWcg_4" rel="nofollow">Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support</a></li>
<li>Baptiste Daroussin, <a href="https://www.youtube.com/watch?v=Br6izhH5P1I" rel="nofollow">Packaging FreeBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=v7px6ktoDAI" rel="nofollow">base system</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=UOX7WDAjqso" rel="nofollow">New OpenZFS features supporting remote replication</a></li>
<li>Ed Schouten, <a href="https://www.youtube.com/watch?v=SVdF84x1EdA" rel="nofollow">CloudABI Cloud computing meets fine-grained capabilities</a></li>
<li>The audio of Ingo Schwarze&#39;s talk &quot;mandoc: becoming the main BSD manual toolbox&quot; got messed up, but there&#39;s an alternate recording <a href="http://www.bsdcan.org/2015/audio/mandoc.mp3" rel="nofollow">here</a>, and the slides are <a href="http://www.openbsd.org/papers/bsdcan15-mandoc.pdf" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143526329006942&w=2" rel="nofollow">SMP steroids for PF</a></h3>

<ul>
<li>An Oracle employee that&#39;s been porting OpenBSD&#39;s PF to an upcoming Solaris release has sent in an interesting patch for review</li>
<li>Attached to the mail was what may be the beginnings of making native PF SMP-aware</li>
<li>Before you start partying, the road to SMP (specifically, giant lock removal) is a long and very complicated one, requiring every relevant bit of the stack to be written with it in mind - this is just one piece of the puzzle</li>
<li>The <a href="https://www.marc.info/?l=openbsd-tech&m=143532243322281&w=2" rel="nofollow">initial response</a> has been quite positive though, with some <a href="https://www.marc.info/?l=openbsd-tech&m=143532963824548&w=2" rel="nofollow">back and forth</a> between developers and the submitter</li>
<li>For now, let&#39;s be patient and see what happens
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release42/" rel="nofollow">DragonFly 4.2.0 released</a></h3>

<ul>
<li>DragonFlyBSD has released the next big update of their 4.x branch, complete with a decent amount of new features and fixes</li>
<li>i915 and Radeon graphics have been updated, and DragonFly can claim the title of first BSD with Broadwell support in a release</li>
<li>Sendmail in the base system has been replaced with their homegrown DragonFly Mail Agent, and there&#39;s <a href="http://www.dragonflybsd.com/docs/docs/newhandbook/mta/" rel="nofollow">a wiki page</a> about configuring it</li>
<li>They&#39;ve also switched the default compiler to GCC 5, though why they&#39;ve gone in that direction instead of embracing Clang is a mystery</li>
<li>The announcement page also contains a list of kernel changes, details on the audio and graphics updates, removal of the SCTP protocol, improvements to the temperature sensors, various userland utility fixes and a list of updates to third party tools</li>
<li>Work is continuing on the second generation HAMMER filesystem, and Matt Dillon provides a status update in the release announcement</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9797932" rel="nofollow">hacker news discussion</a> you can check out, as well as <a href="http://lists.dragonflybsd.org/pipermail/users/2015-June/207801.html" rel="nofollow">upgrade instructions</a>
***</li>
</ul>

<h3><a href="https://opensmtpd.org/announces/release-5.7.1.txt" rel="nofollow">OpenSMTPD 5.7.1 released</a></h3>

<ul>
<li>The OpenSMTPD guys have just released version 5.7.1, a major milestone version that we mentioned recently</li>
<li>Crypto-related bits have been vastly improved: the RSA engine is now privilege-separated, TLS errors are handled more gracefully, ciphers and curve preferences can now be specified, the PKI interface has been reworked to allow custom CAs, SNI and certificate verification have been simplified and the DH parameters are now 2048 bit by default</li>
<li>The long-awaited filter API is now enabled by default, though still considered slightly experimental</li>
<li>Documentation has been improved quite a bit, with more examples and common use cases (as well as exotic ones)</li>
<li>Many more small additions and bugfixes were made, so check the changelog for the full list</li>
<li>Starting with 5.7.1, releases are now <a href="https://twitter.com/OpenSMTPD/status/613257722574839808" rel="nofollow">cryptographically</a> <a href="https://www.opensmtpd.org/archives/opensmtpd-5.7.1.sum.sig" rel="nofollow">signed</a> to ensure integrity</li>
<li>This release has gone through some major stress testing to ensure stability - Gilles regularly asks their Twitter followers to <a href="https://twitter.com/OpenSMTPD/status/608399272447471616" rel="nofollow">flood a test server</a> with thousands of emails per second, even <a href="https://twitter.com/OpenSMTPD/status/608235180839567360" rel="nofollow">offering prizes</a> to whoever can DDoS them the hardest</li>
<li>OpenSMTPD runs on all the BSDs of course, and seems to be getting pretty popular lately</li>
<li>Let&#39;s all <a href="mailto:feedback@bsdnow.tv" rel="nofollow">encourage</a> Kris to stop procrastinating on switching from Postfix
***</li>
</ul>

<h2>Interview - Jun Ebihara (蛯原純) - <a href="mailto:jun@netbsd.org" rel="nofollow">jun@netbsd.org</a> / <a href="https://twitter.com/ebijun" rel="nofollow">@ebijun</a></h2>

<p>Lesser-known CPU architectures, embedded NetBSD devices</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-steven-douglas.html" rel="nofollow">FreeBSD foundation at BSDCan</a></h3>

<ul>
<li>The FreeBSD foundation has posted a few BSDCan summaries on their blog</li>
<li>The first, from Steven Douglas, begins with a sentiment a lot of us can probably identify with: &quot;Where I live, there are only a handful of people that even know what BSD is, let alone can talk at a high level about it. That was one of my favorite things, being around like minded people.&quot;</li>
<li>He got to meet a lot of the people working on big-name projects, and enjoyed being able to ask them questions so easily</li>
<li>Their <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-ahmed-kamal.html" rel="nofollow">second</a> trip report is from Ahmed Kamal, who flew in all the way from Egypt</li>
<li>A bit starstruck, he seems to have enjoyed all the talks, particularly Andrew Tanenbaum&#39;s about MINIX and NetBSD</li>
<li>There are also two more wrap-ups from <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-zbigniew-bodek.html" rel="nofollow">Zbigniew Bodek</a> and <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-vsevolod-stakhov.html" rel="nofollow">Vsevolod Stakhov</a>, so you&#39;ve got plenty to read
***</li>
</ul>

<h3><a href="http://cfenollosa.com/blog/openbsd-from-a-veteran-linux-user-perspective.html" rel="nofollow">OpenBSD from a veteran Linux user perspective</a></h3>

<ul>
<li>In a new series of blog posts, a self-proclaimed veteran Linux user is giving OpenBSD a try for the first time</li>
<li>&quot;For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an &#39;old-school&#39; Linux admin, and I&#39;ve felt out of place with the latest changes on the system administration.&quot;</li>
<li>The post is a collection of his thoughts about what&#39;s different between Linux and BSD, what surprised him as a beginner - admittedly, a lot of his knowledge carried over, and there were just minor differences in command flags</li>
<li>One of the things that surprised him (in a positive way) was the documentation: &quot;OpenBSD&#39;s man pages are so nice that RTFMing somebody on the internet is not condescending but selfless.&quot;</li>
<li>He also goes through some of the basics, installing and updating software, following different branches</li>
<li>It concludes with &quot;If you like UNIX, it will open your eyes to the fact that there is more than one way to do things, and that system administration can still be simple while modern.&quot;
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/freebsd-on-the-desktop-am-i-crazy.html" rel="nofollow">FreeBSD on the desktop, am I crazy</a></h3>

<ul>
<li>Similar to the previous article, the guy that wrote the SSH two factor authentication post we covered last week has another new article up - this time about FreeBSD on the desktop</li>
<li>He begins with a bit of forewarning for potential Linux switchers: &quot;It certainly wasn&#39;t an easy journey, and I&#39;m tempted to say do not try this at home to anybody who isn&#39;t going to leverage any of FreeBSD&#39;s strong points. Definitely don&#39;t try FreeBSD on the desktop if you haven&#39;t used it on servers or virtual machines before. It&#39;s got less in common with Linux than you might think.&quot;</li>
<li>With that out of the way, the list of positives is pretty large: a tidy base system, separation between base and ports, having the option to choose binary packages or ports, ZFS, jails, licensing and of course the lack of systemd</li>
<li>The rest of the post talks about some of the hurdles he had to overcome, namely with graphics and the infamous Adobe Flash</li>
<li>Also worth noting is that he found jails to be not only good for isolating daemons on a server, but pretty useful for desktop applications as well</li>
<li>In the end, he says it was worth all the trouble, and is even planning on converting his laptop to FreeBSD soon too
***</li>
</ul>

<h3><a href="https://www.netflask.net/ipsec-ikev2-cisco-csr1000v-openiked/" rel="nofollow">OpenIKED and Cisco CSR 1000v IPSEC</a></h3>

<ul>
<li>This article covers setting up a site-to-site IPSEC tunnel between a Cisco CSR 1000v router and an OpenBSD gateway running OpenIKED</li>
<li>What kind of networking blog post would be complete without a diagram where the internet is represented by a big cloud</li>
<li>There are lots of details (and example configuration files) for using IKEv2 and OpenBSD&#39;s built-in IKE daemon</li>
<li>It also goes to show that the BSDs generally play well with existing network infrastructure, so if you were a business that&#39;s afraid to try them… don&#39;t be
***</li>
</ul>

<h3><a href="https://github.com/HardenedBSD/hardenedBSD/commit/bd5cecb4dc7947a5e214fc100834399b4bffdee8" rel="nofollow">HardenedBSD improves stack randomization</a></h3>

<ul>
<li>The HardenedBSD guys have improved their FreeBSD ASLR patchset, specifically in the stack randomization area</li>
<li>In their initial implementation, the stack randomization was a random gap - this update makes the base address randomized as well</li>
<li>They&#39;re now stacking the new on top of the old as well, with the goal being even more entropy</li>
<li>This change triggered an ABI and API incompatibility, so their major version has been bumped
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2015-July/000121.html" rel="nofollow">OpenSSH 6.9 released</a></h3>

<ul>
<li>The OpenSSH team has announced the release of a new version which, following their tick/tock major/minor release cycle, is focused mainly on bug fixes</li>
<li>There are a couple new things though - the &quot;AuthorizedKeysCommand&quot; config option now takes custom arguments</li>
<li>One very notable change is that <strong>the default cipher has changed</strong> as of this release</li>
<li>The traditional pairing of AES128 in counter mode with MD5 HMAC has been <em>replaced</em> by the ever-trendy ChaCha20-Poly1305 combo</li>
<li>Their next release, 7.0, is set to get rid a number of legacy items: PermitRootLogin will be switched to &quot;no&quot; by default, SSHv1 support will be totally disabled, the 1024bit diffie-hellman-group1-sha1 KEX will be disabled, old ssh-dss and v00 certs will be removed, a number of weak ciphers will be disabled by default (including all CBC ones) and RSA keys will be refused if they&#39;re under 1024 bits</li>
<li>Many small bugs fixes and improvements were also made, so check the announcement for everything else</li>
<li>The native version is in OpenBSD -current, and an update to the portable version should be hitting a ports or pkgsrc tree near you soon
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2Ws6Y2rZy" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21GvZ5xbs" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s209TrPK4e" rel="nofollow">Jochen writes in</a></li>
<li><a href="http://slexy.org/view/s21TQjUjxv" rel="nofollow">Simon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>47: DES Challenge IV</title>
  <link>https://www.bsdnow.tv/47</link>
  <guid isPermaLink="false">2c9f4e68-6474-41f9-ab80-bb40fbb76855</guid>
  <pubDate>Wed, 23 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2c9f4e68-6474-41f9-ab80-bb40fbb76855.mp3" length="66811828" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show! We've got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:32:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show! We've got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
g2k14 hackathon reports (http://www.openbsd.org/hackathons.html)
Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon
Lots of work got done - in just the first two weeks of July, there were over 1000 commits (http://marc.info/?l=openbsd-cvs&amp;amp;r=1&amp;amp;b=201407&amp;amp;w=2) to their CVS tree
Some of the developers wrote in to document what they were up to at the event
Bob Beck (http://undeadly.org/cgi?action=article&amp;amp;sid=20140713220618) planned to work on kernel stuff, but then "LibreSSL happened" and he spent most of his time working on that
Miod Vallat (http://undeadly.org/cgi?action=article&amp;amp;sid=20140718072312) also tells about his LibreSSL experiences
Brent Cook (http://undeadly.org/cgi?action=article&amp;amp;sid=20140718090456), a new developer, worked mainly on the portable version of LibreSSL (and we'll be interviewing him next week!)
Henning Brauer (http://undeadly.org/cgi?action=article&amp;amp;sid=20140714094454) worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)
Martin Pieuchot (http://undeadly.org/cgi?action=article&amp;amp;sid=20140714191912) fixed some bugs in the USB stack, softraid and misc other things
Marc Espie (http://undeadly.org/cgi?action=article&amp;amp;sid=20140714202157) improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency
Martin Pelikan (http://undeadly.org/cgi?action=article&amp;amp;sid=20140715120259) integrated read-only ext4 support
Vadim Zhukov (http://undeadly.org/cgi?action=article&amp;amp;sid=20140715094848) did lots of ports work, including working on KDE4
Theo de Raadt (http://undeadly.org/cgi?action=article&amp;amp;sid=20140715212333) created a new, more secure system call, "sendsyslog" and did a lot of work with /etc, sysmerge and the rc scripts
Paul Irofti (http://undeadly.org/cgi?action=article&amp;amp;sid=20140718134017) worked on the USB stack, specifically for the Octeon platform
Sebastian Benoit (http://undeadly.org/cgi?action=article&amp;amp;sid=20140719104939) worked on relayd filters and IPv6 code
Jasper Lievisse Adriaanse (http://undeadly.org/cgi?action=article&amp;amp;sid=20140719134058) did work with puppet, packages and the bootloader
Jonathan Gray (http://undeadly.org/cgi?action=article&amp;amp;sid=20140719082410) imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection
Stefan Sperling (http://undeadly.org/cgi?action=article&amp;amp;sid=20140721125235) fixed a lot of issues with wireless drivers
Florian Obser (http://undeadly.org/cgi?action=article&amp;amp;sid=20140721125020) did many things related to IPv6
Ingo Schwarze (http://undeadly.org/cgi?action=article&amp;amp;sid=20140721090411) worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface
Ken Westerback (http://undeadly.org/cgi?action=article&amp;amp;sid=20140722071413) hacked on dhclient and dhcpd, and also got dump working on 4k sector drives
Matthieu Herrb (http://undeadly.org/cgi?action=article&amp;amp;sid=20140723142224) worked on updating and modernizing parts of xenocara
***
FreeBSD pf discussion takes off (https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html)
Concerns from last week, about FreeBSD's packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the "questions" and "current" mailing lists (unfortunately people didn't always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)
Straight from the SMP FreeBSD pf maintainer: "no one right now [is actively developing pf on FreeBSD]"
Searching for documentation online for pf is troublesome because there are two incompatible syntaxes
FreeBSD's pf man pages are lacking, and some of FreeBSD's documentation still links to OpenBSD's pages, which won't work anymore - possibly turning away would-be BSD converts because it's frustrating
There's also the issue of importing patches from pfSense, but most of those still haven't been done either
Lots of disagreement among developers vs. users...
Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren't interested
Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions
Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning's claims about OpenBSD's improved speed as "uncorroborated claims" (but neither side has provided any public benchmarks)
Gleb had to abandon his work on FreeBSD's pf because funding ran out
***
LibreSSL progress update (http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched)
LibreSSL's first few portable releases have come out and they're making great progress, releasing 2.0.3 two days ago (http://marc.info/?l=openbsd-tech&amp;amp;m=140599450206255&amp;amp;w=2)
Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list
However, there has already been some drama... with Linux users
There was a problem with Linux's PRNG, and LibreSSL was unforgiving (https://twitter.com/MiodVallat/status/489122763610021888) of it, not making an effort to randomize something that could not provide real entropy
This "problem" doesn't affect OpenBSD's native implementation, only the portable version
The developers (http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl) decide to weigh in (http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit) to calm the misinformation and rage
A fix was added in 2.0.2, and Linux may even get a new system call (http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666) to handle this properly now - remember to say thanks, guys
Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) has a really good post (http://www.tedunangst.com/flak/post/this-is-why-software-sucks) about the whole situation, definitely check it out
As a follow-up from last week, bapt says they're working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you're a port maintainer, please test your ports against it
***
Preparation for NetBSD 7 (http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html)
The release process for NetBSD 7.0 is finally underway
The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September
If you run NetBSD, that'll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)
They're also looking for some help updating documentation and fixing any bugs that get reported
Another formal announcement will be made when the beta binaries are up
***
Interview - Dag-Erling Smørgrav - des@freebsd.org (mailto:des@freebsd.org) / @RealEvilDES (https://twitter.com/RealEvilDES)
The role of the FreeBSD Security Officer, recent ports features, various topics
News Roundup
BSDCan ports and packages WG (http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/)
Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages
Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages
There's also some detail about the signing infrastructure and different mirrors
Ports people and source people need to talk more often about ABI breakage
The post also includes information about pkg 1.3, the old pkg tools' EOL, the quarterly stable package sets and a lot more (it's a huge post!)
***
Cross-compiling ports with QEMU and poudriere (http://blog.ignoranthack.me/?p=212)
With recent QEMU features, you can basically chroot into a completely different architecture
This article goes through the process of building ARMv6 packages on a normal X86 box
Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now
The poudriere-devel port now has a "qemu user" option that will pull in all the requirements
Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***
Cloning FreeBSD with ZFS send (http://blather.michaelwlucas.com/archives/2108)
For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen
This post shows his entire process in creating a mirror machine, using ZFS for everything
The "zfs send" and "zfs snapshot" commands really come in handy for this
He does the whole thing from a live CD, pretty impressive
***
FreeBSD Overview series (http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/)
A new blog series we stumbled upon about a Linux user switching to BSD
In part one, he gives a little background on being "done with Linux distros" and documents his initial experience getting and installing FreeBSD 10
He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels
Most of what he was used to on Linux was already in the default FreeBSD (except bash...)
Part two (http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/) documents his experiences with pkgng and ports 
***
Feedback/Questions
Bostjan writes in (http://slexy.org/view/s214FYbOKL)
Rick writes in (http://slexy.org/view/s21cWLhzj4)
Clint writes in (http://slexy.org/view/s21A4grtH0)
Esteban writes in (http://slexy.org/view/s27fQHz8Se)
Ben writes in (http://slexy.org/view/s21QscO4Cr)
Matt sends in pictures of his FreeBSD CD collection (https://imgur.com/a/Ah444)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssl, libressl, prng, linux, des, aes, encryption, cryptography, Dag-Erling Smørgrav, security, hackathon, pf, packet filter, firewall, smp, multithreading, ixsystems, tarsnap, bsdcan, cheri, zfs, qemu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show! We&#39;ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/hackathons.html" rel="nofollow">g2k14 hackathon reports</a></h3>

<ul>
<li>Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon</li>
<li>Lots of work got done - in just the first two weeks of July, there were <a href="http://marc.info/?l=openbsd-cvs&r=1&b=201407&w=2" rel="nofollow">over 1000 commits</a> to their CVS tree</li>
<li>Some of the developers wrote in to document what they were up to at the event</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140713220618" rel="nofollow">Bob Beck</a> planned to work on kernel stuff, but then &quot;LibreSSL happened&quot; and he spent most of his time working on that</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718072312" rel="nofollow">Miod Vallat</a> also tells about his LibreSSL experiences</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718090456" rel="nofollow">Brent Cook</a>, a new developer, worked mainly on the portable version of LibreSSL (and we&#39;ll be interviewing him next week!)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714094454" rel="nofollow">Henning Brauer</a> worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714191912" rel="nofollow">Martin Pieuchot</a> fixed some bugs in the USB stack, softraid and misc other things</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714202157" rel="nofollow">Marc Espie</a> improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715120259" rel="nofollow">Martin Pelikan</a> integrated read-only ext4 support</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715094848" rel="nofollow">Vadim Zhukov</a> did lots of ports work, including working on KDE4</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715212333" rel="nofollow">Theo de Raadt</a> created a new, more secure system call, &quot;sendsyslog&quot; and did a lot of work with /etc, sysmerge and the rc scripts</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718134017" rel="nofollow">Paul Irofti</a> worked on the USB stack, specifically for the Octeon platform</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719104939" rel="nofollow">Sebastian Benoit</a> worked on relayd filters and IPv6 code</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719134058" rel="nofollow">Jasper Lievisse Adriaanse</a> did work with puppet, packages and the bootloader</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719082410" rel="nofollow">Jonathan Gray</a> imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125235" rel="nofollow">Stefan Sperling</a> fixed a lot of issues with wireless drivers</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125020" rel="nofollow">Florian Obser</a> did many things related to IPv6</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721090411" rel="nofollow">Ingo Schwarze</a> worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140722071413" rel="nofollow">Ken Westerback</a> hacked on dhclient and dhcpd, and also got dump working on 4k sector drives</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140723142224" rel="nofollow">Matthieu Herrb</a> worked on updating and modernizing parts of xenocara
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" rel="nofollow">FreeBSD pf discussion takes off</a></h3>

<ul>
<li>Concerns from last week, about FreeBSD&#39;s packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the &quot;questions&quot; and &quot;current&quot; mailing lists (unfortunately people didn&#39;t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)</li>
<li>Straight from the SMP FreeBSD pf maintainer: &quot;no one right now [is actively developing pf on FreeBSD]&quot;</li>
<li>Searching for documentation online for pf is troublesome because there are two incompatible syntaxes</li>
<li>FreeBSD&#39;s pf man pages are lacking, and some of FreeBSD&#39;s documentation still links to OpenBSD&#39;s pages, which won&#39;t work anymore - possibly turning away would-be BSD converts because it&#39;s frustrating</li>
<li>There&#39;s also the issue of importing patches from pfSense, but most of those still haven&#39;t been done either</li>
<li>Lots of disagreement among developers vs. users...</li>
<li>Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren&#39;t interested</li>
<li>Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions</li>
<li>Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning&#39;s claims about OpenBSD&#39;s improved speed as &quot;uncorroborated claims&quot; (but neither side has provided any public benchmarks)</li>
<li>Gleb had to abandon his work on FreeBSD&#39;s pf because funding ran out
***</li>
</ul>

<h3><a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" rel="nofollow">LibreSSL progress update</a></h3>

<ul>
<li>LibreSSL&#39;s first few portable releases have come out and they&#39;re making great progress, releasing 2.0.3 <a href="http://marc.info/?l=openbsd-tech&m=140599450206255&w=2" rel="nofollow">two days ago</a></li>
<li>Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list</li>
<li>However, there has already been some drama... with Linux users</li>
<li>There was a problem with Linux&#39;s PRNG, and LibreSSL was <a href="https://twitter.com/MiodVallat/status/489122763610021888" rel="nofollow">unforgiving</a> of it, not making an effort to randomize something that could not provide real entropy</li>
<li>This &quot;problem&quot; doesn&#39;t affect OpenBSD&#39;s native implementation, only the portable version</li>
<li><a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" rel="nofollow">The developers</a> decide to <a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" rel="nofollow">weigh in</a> to calm the misinformation and rage</li>
<li>A fix was added in 2.0.2, and Linux may even <a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" rel="nofollow">get a new system call</a> to handle this properly now - remember to say thanks, guys</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a <a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" rel="nofollow">really good post</a> about the whole situation, definitely check it out</li>
<li>As a follow-up from last week, bapt says they&#39;re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you&#39;re a port maintainer, please test your ports against it
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" rel="nofollow">Preparation for NetBSD 7</a></h3>

<ul>
<li>The release process for NetBSD 7.0 is finally underway</li>
<li>The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September</li>
<li>If you run NetBSD, that&#39;ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)</li>
<li>They&#39;re also looking for some help updating documentation and fixing any bugs that get reported</li>
<li>Another formal announcement will be made when the beta binaries are up
***</li>
</ul>

<h2>Interview - Dag-Erling Smørgrav - <a href="mailto:des@freebsd.org" rel="nofollow">des@freebsd.org</a> / <a href="https://twitter.com/RealEvilDES" rel="nofollow">@RealEvilDES</a></h2>

<p>The role of the FreeBSD Security Officer, recent ports features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" rel="nofollow">BSDCan ports and packages WG</a></h3>

<ul>
<li>Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages</li>
<li>Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages</li>
<li>There&#39;s also some detail about the signing infrastructure and different mirrors</li>
<li>Ports people and source people need to talk more often about ABI breakage</li>
<li>The post also includes information about pkg 1.3, the old pkg tools&#39; EOL, the quarterly stable package sets and a lot more (it&#39;s a huge post!)
***</li>
</ul>

<h3><a href="http://blog.ignoranthack.me/?p=212" rel="nofollow">Cross-compiling ports with QEMU and poudriere</a></h3>

<ul>
<li>With recent QEMU features, you can basically chroot into a completely different architecture</li>
<li>This article goes through the process of building ARMv6 packages on a normal X86 box</li>
<li>Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now</li>
<li>The poudriere-devel port now has a &quot;qemu user&quot; option that will pull in all the requirements</li>
<li>Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2108" rel="nofollow">Cloning FreeBSD with ZFS send</a></h3>

<ul>
<li>For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen</li>
<li>This post shows his entire process in creating a mirror machine, using ZFS for everything</li>
<li>The &quot;zfs send&quot; and &quot;zfs snapshot&quot; commands really come in handy for this</li>
<li>He does the whole thing from a live CD, pretty impressive
***</li>
</ul>

<h3><a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" rel="nofollow">FreeBSD Overview series</a></h3>

<ul>
<li>A new blog series we stumbled upon about a Linux user switching to BSD</li>
<li>In part one, he gives a little background on being &quot;done with Linux distros&quot; and documents his initial experience getting and installing FreeBSD 10</li>
<li>He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels</li>
<li>Most of what he was used to on Linux was already in the default FreeBSD (except bash...)</li>
<li><a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" rel="nofollow">Part two</a> documents his experiences with pkgng and ports 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s214FYbOKL" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21cWLhzj4" rel="nofollow">Rick writes in</a></li>
<li><a href="http://slexy.org/view/s21A4grtH0" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s27fQHz8Se" rel="nofollow">Esteban writes in</a></li>
<li><a href="http://slexy.org/view/s21QscO4Cr" rel="nofollow">Ben writes in</a></li>
<li><a href="https://imgur.com/a/Ah444" rel="nofollow">Matt sends in pictures of his FreeBSD CD collection</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show! We&#39;ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/hackathons.html" rel="nofollow">g2k14 hackathon reports</a></h3>

<ul>
<li>Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon</li>
<li>Lots of work got done - in just the first two weeks of July, there were <a href="http://marc.info/?l=openbsd-cvs&r=1&b=201407&w=2" rel="nofollow">over 1000 commits</a> to their CVS tree</li>
<li>Some of the developers wrote in to document what they were up to at the event</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140713220618" rel="nofollow">Bob Beck</a> planned to work on kernel stuff, but then &quot;LibreSSL happened&quot; and he spent most of his time working on that</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718072312" rel="nofollow">Miod Vallat</a> also tells about his LibreSSL experiences</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718090456" rel="nofollow">Brent Cook</a>, a new developer, worked mainly on the portable version of LibreSSL (and we&#39;ll be interviewing him next week!)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714094454" rel="nofollow">Henning Brauer</a> worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714191912" rel="nofollow">Martin Pieuchot</a> fixed some bugs in the USB stack, softraid and misc other things</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714202157" rel="nofollow">Marc Espie</a> improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715120259" rel="nofollow">Martin Pelikan</a> integrated read-only ext4 support</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715094848" rel="nofollow">Vadim Zhukov</a> did lots of ports work, including working on KDE4</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715212333" rel="nofollow">Theo de Raadt</a> created a new, more secure system call, &quot;sendsyslog&quot; and did a lot of work with /etc, sysmerge and the rc scripts</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718134017" rel="nofollow">Paul Irofti</a> worked on the USB stack, specifically for the Octeon platform</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719104939" rel="nofollow">Sebastian Benoit</a> worked on relayd filters and IPv6 code</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719134058" rel="nofollow">Jasper Lievisse Adriaanse</a> did work with puppet, packages and the bootloader</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719082410" rel="nofollow">Jonathan Gray</a> imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125235" rel="nofollow">Stefan Sperling</a> fixed a lot of issues with wireless drivers</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125020" rel="nofollow">Florian Obser</a> did many things related to IPv6</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721090411" rel="nofollow">Ingo Schwarze</a> worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140722071413" rel="nofollow">Ken Westerback</a> hacked on dhclient and dhcpd, and also got dump working on 4k sector drives</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140723142224" rel="nofollow">Matthieu Herrb</a> worked on updating and modernizing parts of xenocara
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" rel="nofollow">FreeBSD pf discussion takes off</a></h3>

<ul>
<li>Concerns from last week, about FreeBSD&#39;s packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the &quot;questions&quot; and &quot;current&quot; mailing lists (unfortunately people didn&#39;t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)</li>
<li>Straight from the SMP FreeBSD pf maintainer: &quot;no one right now [is actively developing pf on FreeBSD]&quot;</li>
<li>Searching for documentation online for pf is troublesome because there are two incompatible syntaxes</li>
<li>FreeBSD&#39;s pf man pages are lacking, and some of FreeBSD&#39;s documentation still links to OpenBSD&#39;s pages, which won&#39;t work anymore - possibly turning away would-be BSD converts because it&#39;s frustrating</li>
<li>There&#39;s also the issue of importing patches from pfSense, but most of those still haven&#39;t been done either</li>
<li>Lots of disagreement among developers vs. users...</li>
<li>Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren&#39;t interested</li>
<li>Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions</li>
<li>Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning&#39;s claims about OpenBSD&#39;s improved speed as &quot;uncorroborated claims&quot; (but neither side has provided any public benchmarks)</li>
<li>Gleb had to abandon his work on FreeBSD&#39;s pf because funding ran out
***</li>
</ul>

<h3><a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" rel="nofollow">LibreSSL progress update</a></h3>

<ul>
<li>LibreSSL&#39;s first few portable releases have come out and they&#39;re making great progress, releasing 2.0.3 <a href="http://marc.info/?l=openbsd-tech&m=140599450206255&w=2" rel="nofollow">two days ago</a></li>
<li>Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list</li>
<li>However, there has already been some drama... with Linux users</li>
<li>There was a problem with Linux&#39;s PRNG, and LibreSSL was <a href="https://twitter.com/MiodVallat/status/489122763610021888" rel="nofollow">unforgiving</a> of it, not making an effort to randomize something that could not provide real entropy</li>
<li>This &quot;problem&quot; doesn&#39;t affect OpenBSD&#39;s native implementation, only the portable version</li>
<li><a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" rel="nofollow">The developers</a> decide to <a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" rel="nofollow">weigh in</a> to calm the misinformation and rage</li>
<li>A fix was added in 2.0.2, and Linux may even <a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" rel="nofollow">get a new system call</a> to handle this properly now - remember to say thanks, guys</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a <a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" rel="nofollow">really good post</a> about the whole situation, definitely check it out</li>
<li>As a follow-up from last week, bapt says they&#39;re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you&#39;re a port maintainer, please test your ports against it
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" rel="nofollow">Preparation for NetBSD 7</a></h3>

<ul>
<li>The release process for NetBSD 7.0 is finally underway</li>
<li>The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September</li>
<li>If you run NetBSD, that&#39;ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)</li>
<li>They&#39;re also looking for some help updating documentation and fixing any bugs that get reported</li>
<li>Another formal announcement will be made when the beta binaries are up
***</li>
</ul>

<h2>Interview - Dag-Erling Smørgrav - <a href="mailto:des@freebsd.org" rel="nofollow">des@freebsd.org</a> / <a href="https://twitter.com/RealEvilDES" rel="nofollow">@RealEvilDES</a></h2>

<p>The role of the FreeBSD Security Officer, recent ports features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" rel="nofollow">BSDCan ports and packages WG</a></h3>

<ul>
<li>Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages</li>
<li>Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages</li>
<li>There&#39;s also some detail about the signing infrastructure and different mirrors</li>
<li>Ports people and source people need to talk more often about ABI breakage</li>
<li>The post also includes information about pkg 1.3, the old pkg tools&#39; EOL, the quarterly stable package sets and a lot more (it&#39;s a huge post!)
***</li>
</ul>

<h3><a href="http://blog.ignoranthack.me/?p=212" rel="nofollow">Cross-compiling ports with QEMU and poudriere</a></h3>

<ul>
<li>With recent QEMU features, you can basically chroot into a completely different architecture</li>
<li>This article goes through the process of building ARMv6 packages on a normal X86 box</li>
<li>Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now</li>
<li>The poudriere-devel port now has a &quot;qemu user&quot; option that will pull in all the requirements</li>
<li>Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2108" rel="nofollow">Cloning FreeBSD with ZFS send</a></h3>

<ul>
<li>For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen</li>
<li>This post shows his entire process in creating a mirror machine, using ZFS for everything</li>
<li>The &quot;zfs send&quot; and &quot;zfs snapshot&quot; commands really come in handy for this</li>
<li>He does the whole thing from a live CD, pretty impressive
***</li>
</ul>

<h3><a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" rel="nofollow">FreeBSD Overview series</a></h3>

<ul>
<li>A new blog series we stumbled upon about a Linux user switching to BSD</li>
<li>In part one, he gives a little background on being &quot;done with Linux distros&quot; and documents his initial experience getting and installing FreeBSD 10</li>
<li>He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels</li>
<li>Most of what he was used to on Linux was already in the default FreeBSD (except bash...)</li>
<li><a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" rel="nofollow">Part two</a> documents his experiences with pkgng and ports 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s214FYbOKL" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21cWLhzj4" rel="nofollow">Rick writes in</a></li>
<li><a href="http://slexy.org/view/s21A4grtH0" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s27fQHz8Se" rel="nofollow">Esteban writes in</a></li>
<li><a href="http://slexy.org/view/s21QscO4Cr" rel="nofollow">Ben writes in</a></li>
<li><a href="https://imgur.com/a/Ah444" rel="nofollow">Matt sends in pictures of his FreeBSD CD collection</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>46: Network Iodometry</title>
  <link>https://www.bsdnow.tv/46</link>
  <guid isPermaLink="false">e23303c8-31f0-4706-817c-1618e08cd149</guid>
  <pubDate>Wed, 16 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e23303c8-31f0-4706-817c-1618e08cd149.mp3" length="76226260" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
EuroBSDCon 2014 registration open (http://2014.eurobsdcon.org/registration/)
September is getting closer, and that means it's time for EuroBSDCon - held in Bulgaria this year
Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th
Tutorials, sessions, dev summits and everything else all have their own pricing as well
Registering between August 18th - September 12th will cost more for everything
You can register online here (http://registration.eurobsdcon.org/) and check hotels in the area (http://2014.eurobsdcon.org/registration/travel-and-stay/hotels)
The FreeBSD foundation is also accepting applications (https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html) for travel grants
***
OpenBSD SMP PF update (http://marc.info/?t=140440541000002&amp;amp;r=1&amp;amp;w=2)
A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded
With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump
In a recent mailing list thread, Henning Brauer (http://www.bsdnow.tv/episodes/2013_10_30-current_events) addresses some of the concerns
The short version (http://marc.info/?l=openbsd-misc&amp;amp;m=140479174521071&amp;amp;w=2) is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless
He also says (http://marc.info/?l=openbsd-misc&amp;amp;m=140481012425889&amp;amp;w=2) PF on OpenBSD is over four times faster than FreeBSD's old version, presumably due to those extra years of development it's gone through
There's also been even more recent concern (https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html) about the uncertain future of FreeBSD's PF, being mostly unmaintained since their SMP patches
We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***
Introduction to NetBSD pkgsrc (http://saveosx.org/pkgsrc-intro/)
An article from one of our listeners about how to create a new pkgsrc port or fix one that you need
The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format
It also lists all the different bmake targets and their functions in relation to the porting process
Finally, the post details the whole process of creating a new port
***
FreeBSD 9.3-RELEASE (https://www.freebsd.org/releases/9.3R/relnotes.html)
After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced today (https://www.freebsd.org/releases/9.3R/schedule.html) but actually came out yesterday
The full list of changes (https://www.freebsd.org/releases/9.3R/relnotes.html) is available, but it's mostly a smaller maintenance release
Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more
If you haven't jumped to the 10.x branch yet (and there are a lot of people who haven't!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon
Good news, this will be the first release (https://twitter.com/evilgjb/status/485909719522222080) with PGP-signed checksums on the FTP mirrors - a very welcome change
With that out of the way, the 10.1-RELEASE schedule was posted (https://www.freebsd.org/releases/10.1R/schedule.html)
***
Interview - Bryan Drewery - bdrewery@freebsd.org (mailto:bdrewery@freebsd.org) / @bdrewery (https://twitter.com/bdrewery)
The FreeBSD package building cluster, pkgng, ports, various topics
Tutorial
Tunneling traffic through DNS (http://www.bsdnow.tv/tutorials/ssh-dns)
News Roundup
SSH two-factor authentication on FreeBSD (http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/)
We've previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website
This blog post tells you how to do exactly that, but with your Google account and the pamgoogleauthenticator port
Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally
It's a really, really simple process once you have the port installed - full details on the page
***
Ditch tape backup in favor of FreeNAS (http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/)
The author of this post shares some of his horrible experiences with tape backups for a client
Having constant, daily errors and failed backups, he needed to find another solution
With 1TB of backups, tapes just weren't a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)
The rest of the article details his experiences with it and tells about his setup
***
NetBSD vs FreeBSD, desktop experiences (http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/)
A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job
Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver
"Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga."
He's become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***
PCBSD not-so-weekly digest (http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/)
Speaking of choices for a desktop system, it's the return of the PCBSD digest!
Warden and PBI_add have gotten some interesting new features
You can now create jails "on the fly" when adding a new PBI to your application library
Bulk jail creation is also possible now, and it's really easy
New Jenkins integration, with public access to poudriere logs as well (http://builds.pcbsd.org)
PkgNG 1.3.0.rc2 testing for EDGE users
***
Feedback/Questions
Jeff writes in (http://slexy.org/view/s21D05MP0t) - Sending Encrypted Backups over SSH (http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh) + Sending ZFS snapshots via user (http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System)
Bruce writes in (http://slexy.org/view/s2lzo1swzo)
Richard writes in (http://slexy.org/view/s20z841ean)
Jeff writes in (http://slexy.org/view/s2QYc8BOAo) - NYCBUG dmesg list (http://www.nycbug.org/index.cgi?action=dmesgd)
Steve writes in (http://slexy.org/view/s2V2e1m7S7)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pc-bsd, tutorial, howto, guide, bsd, interview, iodine, dns, tunnel, ssh, encryption, vpn, ids, bypass, detection, portmgr, pkgng, bypassing, firewall, pkgsrccon, pkgsrc, pf, smp, eurobsdcon, 2014, multithreaded, presentations, talks, two factor authentication, freenas, 9.3</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>44: Base ISO 100</title>
  <link>https://www.bsdnow.tv/44</link>
  <guid isPermaLink="false">cbf5ab1d-2355-4c2c-ade8-0e66250b204e</guid>
  <pubDate>Wed, 02 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf5ab1d-2355-4c2c-ade8-0e66250b204e.mp3" length="75659476" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
pfSense 2.1.4 released (https://blog.pfsense.org/?p=1377)
The pfSense team (http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense) has released 2.1.4, shortly after 2.1.3 - it's mainly a security release
Included within are eight security fixes, most of which are pfSense-specific
OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)
It also includes a large number of various other bug fixes
Update all your routers!
***
DragonflyBSD's pf gets SMP (http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html)
While we're on the topic of pf...
Dragonfly patches their old[er than even FreeBSD's] pf to support multithreading in many areas
Stemming from a user's complaint (http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html), Matthew Dillon did his own work on pf to make it SMP-aware
Altering your configuration (http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html)'s ruleset can also help speed things up, he found
When will OpenBSD, the source of pf, finally do the same?
***
ChaCha usage and deployment (http://ianix.com/pub/chacha-deployment.html)
A while back, we talked to djm (http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline) about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5
This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20
OpenSSH offers it as a stream cipher now, OpenBSD uses it for it's random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it
Both Google's fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not
Unfortunately, this article has one mistake: FreeBSD does not use it (https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html) - they still use the broken RC4 algorithm
***
BSDMag June 2014 issue (http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue)
The monthly online BSD magazine releases their newest issue
This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, "saving time and headaches using the robot framework for testing," an interview and an article about the increasing number of security vulnerabilities
The free pdf file is available for download as always
***
Interview - Craig Rodrigues - rodrigc@freebsd.org (mailto:rodrigc@freebsd.org)
FreeBSD's continuous (https://wiki.freebsd.org/Jenkins) testing (https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p) infrastructure (https://jenkins.freebsd.org/jenkins/)
Tutorial
Creating pre-patched OpenBSD ISOs (http://www.bsdnow.tv/tutorials/stable-iso)
News Roundup
Preauthenticated decryption considered harmful (http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful)
Responding to a post (https://www.imperialviolet.org/2014/06/27/streamingencryption.html) from Adam Langley, Ted Unangst (http://www.bsdnow.tv/episodes/2014_02_05-time_signatures) talks a little more about how signify and pkg_add handle signatures
In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns
With signify, now everything is fully downloaded and verified before tar is even invoked
The pkg_add utility works a little bit differently, but it's also been improved in this area - details in the post
Be sure to also read the original post from Adam, lots of good information
***
FreeBSD 9.3-RC2 is out (https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html)
As the -RELEASE inches closer, release candidate 2 is out and ready for testing
Since the last one, it's got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things
The updated bsdconfig will use pkgng style packages now too
A lesser known fact: there are also premade virtual machine images you can use too
***
pkgsrcCon 2014 wrap-up (http://saveosx.org/pkgsrcCon/)
In what may be the first real pkgsrcCon article we've ever had!
Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event
Unfortunately no recordings to be found...
***
PostgreSQL FreeBSD performance and scalability (https://kib.kiev.ua/kib/pgsql_perf.pdf)
FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales
On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings
Lots of technical details if you're interested in getting the best performance out of your hardware
It also includes specific kernel options he used and the rest of the configuration
If you don't want to open the pdf file, you can use this link (https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf) too
***
Feedback/Questions
James writes in (http://slexy.org/view/s24pFjUPe4)
Klemen writes in (http://slexy.org/view/s21OogIgTu)
John writes in (http://slexy.org/view/s21rLcemNN)
Brad writes in (http://slexy.org/view/s203Qsx6CZ)
Adam writes in (http://slexy.org/view/s2eBj0FfSL)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, iso, patch, stable, cd, dvd, cdr, pre-applied, applied, horrible puns, jenkins, testing, kyua, ixsystems, tarsnap, pfsense, freenas, tarsnap, ixsystems, pfsense, freenas, bsdmag, magazine, ssl, tls, hardening, hardened, security, pf, smp, multithreading, firewall, scalability, postgresql, mysql, sql, database, performance, openssl, libressl, boringssl, google, chacha, chacha20, salsa20, encryption, pkgsrc, pkgsrccon, signify, pkg_add, authenticated encryption, decryption, gcm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>25: A Sixth pfSense</title>
  <link>https://www.bsdnow.tv/25</link>
  <guid isPermaLink="false">dad040a2-8866-4876-88fb-43b036b3e691</guid>
  <pubDate>Wed, 19 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/dad040a2-8866-4876-88fb-43b036b3e691.mp3" length="48903556" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
EuroBSDCon and AsiaBSDCon (http://2014.eurobsdcon.org/calendar/call-for-papers/)
This year, EuroBSDCon will be in September in Sofia, Bulgaria
They've got a call for papers up now, so everyone can submit the talks they want to present
There will also be a tutorial section of the conference
AsiaBSDCon (http://2014.asiabsdcon.org/timetable.html.en) will be next month, in March!
All the info about the registration, tutorials, hotels, timetable and location have been posted
Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***
FreeBSD 10 on Ubiquiti EdgeRouter Lite (http://rtfm.net/FreeBSD/ERL/)
The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU
This article goes through the process of installing and configuring FreeBSD on it to use as a home router
Lots of good pictures of the hardware and specific details needed to get you set up
It also includes the scripts to create your own images if you don't want to use the ones rolled by someone else
For such a cheap price, might be a really fun weekend project to replace your shitty consumer router
Of course if you're more of an OpenBSD guy, you can always see our tutorial (http://www.bsdnow.tv/tutorials/openbsd-router) for that too
***
Signed pkgsrc package guide (http://blog.saveosx.org/signed-packages/)
We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up
It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)
He goes through the process of signing packages with a public key and how to verify the packages when you install them
The author also happens to be an EdgeBSD developer
***
Big batch of OpenBSD hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140212083627)
Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI
In the second (http://undeadly.org/cgi?action=article&amp;amp;sid=20140213065843), ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things
In the third (http://undeadly.org/cgi?action=article&amp;amp;sid=20140213173808), jsg updated libdrm and mesa and did various work on xenocara
In the fourth (http://undeadly.org/cgi?action=article&amp;amp;sid=20140214070023), dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he's done
In the fifth (http://undeadly.org/cgi?action=article&amp;amp;sid=20140214130039), claudio talks about some stuff he did for routing tables and misc. other things
***
Interview - Chris Buechler - cmb@pfsense.com (mailto:cmb@pfsense.com) / @cbuechler (https://twitter.com/cbuechler)
pfSense
Tutorial
pfSense walkthrough
News Roundup
FreeBSD challenge continues (http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/)
Our buddy from the Linux foundation continues his switching to BSD journey
In day 13, he covers some tips for new users, mentions trying things out in a VM first
In day 14 (http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/), he starts setting up XFCE and X11, feels like he's starting over as a new Linux user learning the ropes again - concludes that ports are the way to go
In day 15 (http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/), he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch
In day 16 (http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/), he dives into the world of FreeBSD jails (http://www.bsdnow.tv/tutorials/jails)!
***
BSD books in 2014 (http://blather.michaelwlucas.com/archives/1962)
BSD books are some of the highest quality technical writings available, and MWL has written a good number of them
In this post, he details some of his plans for 2014
In includes at least one OpenBSD book, at least one FreeBSD book and...
Very strong possibility of Absolute FreeBSD 3rd edition (watch our interview with him (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop))
Check the link for all the details
***
How to build FreeBSD/EC2 images (http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html)
Our friend Colin Percival (http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten) details how to build EC2 images in a new blog post
Most people just use the images he makes on their instances, but some people will want to make their own from scratch (https://svnweb.freebsd.org/base/user/cperciva/EC2-build/)
You build a regular disk image and then turn it into an AMI
It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/)
This time around we discuss how you can become a developer
Kris also details the length of supported releases
Expect lots of new features in 10.1
***
Feedback/Questions
Sean writes in (http://slexy.org/view/s216xJoCVG)
Jake writes in (http://slexy.org/view/s2gLrR3VVf)
Niclas writes in (http://slexy.org/view/s21gfG3Iho)
Steffan writes in (http://slexy.org/view/s2JNyw5BCn)
Antonio writes in (http://slexy.org/view/s2kg3zoRfm)
Chris writes in (http://slexy.org/view/s2ZwSIfRjm)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pfsense, pf, firewall, gateway, router, hangout, webui, web interface, php, ipfw, ipfilter, gateway, graphs, bandwidth, edgerouter, edgerouter lite, eurobsdcon, eurobsdcon2014, edge router, 2014, books, michael w lucas, freebsd journal, fosdem, asiabsdcon, mips, hackathon, new zealand, pkgsrc, signed packages, edgebsd, smp, ec2, amazon, images, instance, build, custom</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>24: The Cluster &amp; The Cloud</title>
  <link>https://www.bsdnow.tv/24</link>
  <guid isPermaLink="false">4472f6f6-5fb3-4ee9-b20c-04e927cf1299</guid>
  <pubDate>Wed, 12 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4472f6f6-5fb3-4ee9-b20c-04e927cf1299.mp3" length="50214172" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:09:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD 10 as a firewall (http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html)
Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead
Now, with the release of 10.0, he's apparently changed his mind and switched back over
It mentions the SMP version of pf, general performance advantages and more modern features
The author is a regular listener of BSD Now, hi Joe!
***
Network Noise Reduction Using Free Tools (http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html)
Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD
Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD's spamd and other security features to combat spam and malware
He goes through his experiences with content filtering and disappointment with a certain proprietary vendor
Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***
FreeBSD ASLR patches submitted (http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream)
So far, FreeBSD hasn't had Address Space Layout Randomization
ASLR is a nice security feature, see wikipedia (https://en.wikipedia.org/wiki/Address_space_layout_randomization) for more information
With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)
We might have Shawn on the show to talk about it, but he's also giving a presentation at BSDCan about his work with ASLR
***
Old-style pkg_ tools retired (http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/)
At last the old pkg_add tools are being retired in FreeBSD
pkgng (http://www.bsdnow.tv/tutorials/pkgng) is a huge improvement, and now portmgr@ thinks it's time to cut the cord on the legacy toolset
Ports aren't going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go
All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***
Interview - Luke Marsden - luke@hybridcluster.com (mailto:luke@hybridcluster.com) / @lmarsden (https://twitter.com/lmarsden)
BSD at HybridCluster
Tutorial
Filesharing with chrooted SFTP (http://www.bsdnow.tv/tutorials/chroot-sftp)
News Roundup
FreeBSD on OpenStack (http://pellaeon.github.io/bsd-cloudinit/)
OpenStack (https://en.wikipedia.org/wiki/OpenStack) is a cloud computing project
It consists of "a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API."
Until now, there wasn't a good way to run a full BSD instance on OpenStack
With a project in the vein of Colin Percival (http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten)'s AWS startup scripts, now that's no longer the case! 
***
FOSDEM BSD videos (https://fosdem.org/2014/schedule/track/bsd/)
This year's FOSDEM had seven BSD presentations
The videos are slowly being uploaded (https://video.fosdem.org/2014/) for your viewing pleasure
Not all of the BSD ones are up yet, but by the time you're watching this they might be!
Check this directory (https://video.fosdem.org/2014/AW1121/Saturday/) for most of 'em
The BSD dev room was full, lots of interest in what's going on from the other communities
***
The FreeBSD challenge finally returns! (http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/)
Due to prodding from a certain guy of a certain podcast, the "FreeBSD Challenge" series has finally resumed
Our friend from the Linux foundation picks up with day 11 (http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/) and day 12 (http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/) on his switching from Linux journey
This time he outlines the upgrade process of going from 9 to 10, using freebsd-update
There's also some notes about different options for upgrading ports and some extra tips
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/)
After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while
During their "fine tuning phase" users are encouraged to submit any and all bugs via the trac system
Warden got some fixes and the package manager got some updates as well
Huge size reduction in PBI format
***
Feedback/Questions
Derrick writes in (http://slexy.org/view/s21nbJKYmb)
Sean writes in (http://slexy.org/view/s2yhziVsBP)
Patrick writes in (http://slexy.org/view/s20PuccWbo)
Peter writes in (http://slexy.org/view/s22PL0SbUO)
Sean writes in (http://slexy.org/view/s20dkbjuOK)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, cluster, cloud, cloud computing, hybridcluster, jails, scaling, virtualization, zfs, big data, provisioning, webhosting, instances, web hosting, chroot, sftp, filesharing, file sharing, shell, linux, switching to bsd, linux user, smp, pkg_add, pkg, pkgng, binary packages, openstack, open stack, httperf, performance, http, vpn, nycbsdcon, nycbug, nyc, conference, convention, talks, presentation, keynote, ssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
