<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 05 May 2026 13:56:28 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Ssh”</title>
    <link>https://www.bsdnow.tv/tags/ssh</link>
    <pubDate>Thu, 01 May 2025 09:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>609: Toe-Dipping in Amsterdam</title>
  <link>https://www.bsdnow.tv/609</link>
  <guid isPermaLink="false">6ea22d34-c89b-4ee8-9c3a-b85dcf18e5b1</guid>
  <pubDate>Thu, 01 May 2025 09:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6ea22d34-c89b-4ee8-9c3a-b85dcf18e5b1.mp3" length="52603008" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Inside FreeBSD Netgraph: Behind the Curtain of Advanced Networking, Launching BSSG - My Journey from Dynamic CMS to Bash Static Site Generator, OpenZFS Cheat Sheet, Dipping my toes in OpenBSD in Amsterdam, SSH keys from a command: sshd's AuthorizedKeysCommand directive, How to move bhyve VM and Jail container from one host to another host, and more</itunes:subtitle>
  <itunes:duration>54:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Inside FreeBSD Netgraph: Behind the Curtain of Advanced Networking, Launching BSSG - My Journey from Dynamic CMS to Bash Static Site Generator, OpenZFS Cheat Sheet, Dipping my toes in OpenBSD in Amsterdam, SSH keys from a command: sshd's AuthorizedKeysCommand directive, How to move bhyve VM and Jail container from one host to another host, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://klarasystems.com/articles/inside-freebsd-netgraph-advanced-networking/?utm_source=BSD%20Now&amp;amp;utm_medium=Podcast" target="_blank" rel="nofollow noopener"&gt;Inside FreeBSD Netgraph: Behind the Curtain of Advanced Networking&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://it-notes.dragas.net/2025/04/07/launching-bssg-my-journey-from-dynamic-cms-to-bash-static-site-generator/" target="_blank" rel="nofollow noopener"&gt;Launching BSSG - My Journey from Dynamic CMS to Bash Static Site Generator&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://freebsdfoundation.org/blog/openzfs-cheat-sheet/" target="_blank" rel="nofollow noopener"&gt;OpenZFS Cheat Sheet&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://ewintr.nl/posts/2025/dipping-my-toes-in-openbsd-in-amsterdam/" target="_blank" rel="nofollow noopener"&gt;Dipping my toes in OpenBSD, in Amsterdam&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://jpmens.net/2025/03/25/authorizedkeyscommand-in-sshd/" target="_blank" rel="nofollow noopener"&gt;SSH keys from a command: sshd's AuthorizedKeysCommand directive&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://vincentdelft.be/post/post_20250215" target="_blank" rel="nofollow noopener"&gt;How to move bhyve VM and Jail container from one host to another host ?&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tarsnap&lt;/h2&gt;

&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/tree/master/episodes/609/feedback" target="_blank" rel="nofollow noopener"&gt;Dave - Webstack&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Join us and other BSD Fans in our &lt;a href="https://t.me/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSD Now Telegram channel&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, netgraph, Advanced networking, bssg, dynamic cms, bash static site generator, cheat sheet, AuthorizedKeysCommand, ssh, sshd, secure shell, bhyve migration, vm migration</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Inside FreeBSD Netgraph: Behind the Curtain of Advanced Networking, Launching BSSG - My Journey from Dynamic CMS to Bash Static Site Generator, OpenZFS Cheat Sheet, Dipping my toes in OpenBSD in Amsterdam, SSH keys from a command: sshd&#39;s AuthorizedKeysCommand directive, How to move bhyve VM and Jail container from one host to another host, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/inside-freebsd-netgraph-advanced-networking/?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">Inside FreeBSD Netgraph: Behind the Curtain of Advanced Networking</a></p>

<hr>

<p><a href="https://it-notes.dragas.net/2025/04/07/launching-bssg-my-journey-from-dynamic-cms-to-bash-static-site-generator/" rel="nofollow">Launching BSSG - My Journey from Dynamic CMS to Bash Static Site Generator</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://freebsdfoundation.org/blog/openzfs-cheat-sheet/" rel="nofollow">OpenZFS Cheat Sheet</a></p>

<hr>

<p><a href="https://ewintr.nl/posts/2025/dipping-my-toes-in-openbsd-in-amsterdam/" rel="nofollow">Dipping my toes in OpenBSD, in Amsterdam</a></p>

<hr>

<p><a href="https://jpmens.net/2025/03/25/authorizedkeyscommand-in-sshd/" rel="nofollow">SSH keys from a command: sshd&#39;s AuthorizedKeysCommand directive</a></p>

<hr>

<p><a href="https://vincentdelft.be/post/post_20250215" rel="nofollow">How to move bhyve VM and Jail container from one host to another host ?</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/tree/master/episodes/609/feedback" rel="nofollow">Dave - Webstack</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Inside FreeBSD Netgraph: Behind the Curtain of Advanced Networking, Launching BSSG - My Journey from Dynamic CMS to Bash Static Site Generator, OpenZFS Cheat Sheet, Dipping my toes in OpenBSD in Amsterdam, SSH keys from a command: sshd&#39;s AuthorizedKeysCommand directive, How to move bhyve VM and Jail container from one host to another host, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://klarasystems.com/articles/inside-freebsd-netgraph-advanced-networking/?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">Inside FreeBSD Netgraph: Behind the Curtain of Advanced Networking</a></p>

<hr>

<p><a href="https://it-notes.dragas.net/2025/04/07/launching-bssg-my-journey-from-dynamic-cms-to-bash-static-site-generator/" rel="nofollow">Launching BSSG - My Journey from Dynamic CMS to Bash Static Site Generator</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://freebsdfoundation.org/blog/openzfs-cheat-sheet/" rel="nofollow">OpenZFS Cheat Sheet</a></p>

<hr>

<p><a href="https://ewintr.nl/posts/2025/dipping-my-toes-in-openbsd-in-amsterdam/" rel="nofollow">Dipping my toes in OpenBSD, in Amsterdam</a></p>

<hr>

<p><a href="https://jpmens.net/2025/03/25/authorizedkeyscommand-in-sshd/" rel="nofollow">SSH keys from a command: sshd&#39;s AuthorizedKeysCommand directive</a></p>

<hr>

<p><a href="https://vincentdelft.be/post/post_20250215" rel="nofollow">How to move bhyve VM and Jail container from one host to another host ?</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/tree/master/episodes/609/feedback" rel="nofollow">Dave - Webstack</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>573: Kyua Graduation</title>
  <link>https://www.bsdnow.tv/573</link>
  <guid isPermaLink="false">aec16048-9802-4728-a4b9-33cacc3e00c3</guid>
  <pubDate>Thu, 22 Aug 2024 08:30:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/aec16048-9802-4728-a4b9-33cacc3e00c3.mp3" length="52131072" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>What Would It Take to Recreate Bell Labs?, Human Scale Software vs Open Source, How to run Visual Studio (VS) Code Remote over SSH on FreeBSD 13 and 14, Why are some emails from Charlie Root and others are from root?, Backward compatibility has real costs even for settings, Kyua graduates, and more</itunes:subtitle>
  <itunes:duration>54:18</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;What Would It Take to Recreate Bell Labs?, Human Scale Software vs Open Source, How to run Visual Studio (VS) Code Remote over SSH on FreeBSD 13 and 14, Why are some emails from Charlie Root and others are from root?, Backward compatibility has real costs even for settings, Kyua graduates, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.construction-physics.com/p/what-would-it-take-to-recreate-bell" target="_blank" rel="nofollow noopener"&gt;What Would It Take to Recreate Bell Labs?&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://posixcafe.org/blogs/2024/07/31/0/" target="_blank" rel="nofollow noopener"&gt;Human Scale Software vs Open Source&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://group.miletic.net/en/blog/2024-06-14-how-to-run-visual-studio-vs-code-remote-over-ssh-on-freebsd-13-and-14" target="_blank" rel="nofollow noopener"&gt;How to run Visual Studio (VS) Code Remote over SSH on FreeBSD 13 and 14&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://dan.langille.org/2024/07/27/why-are-some-emails-from-charlie-root-and-others-are-from-root/" target="_blank" rel="nofollow noopener"&gt;Why are some emails from Charlie Root and others are from root?&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/programming/BackwardCompatibilityHasCosts" target="_blank" rel="nofollow noopener"&gt;Backward compatibility, even for settings, has real costs&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://jmmv.dev/2024/08/kyua-graduates.html" target="_blank" rel="nofollow noopener"&gt;Kyua graduates&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tarsnap&lt;/h2&gt;

&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;p&gt;573 - &lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/573/feedback/Vedran%20-%20linuxulator" target="_blank" rel="nofollow noopener"&gt;Vedran - linuxulator&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Join us and other BSD Fans in our &lt;a href="https://t.me/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSD Now Telegram channel&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, bell labs, recreate, human scale software, visual studio code, remote, ssh, email, charlie root, backward compatibility, kyua, test framework, testing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What Would It Take to Recreate Bell Labs?, Human Scale Software vs Open Source, How to run Visual Studio (VS) Code Remote over SSH on FreeBSD 13 and 14, Why are some emails from Charlie Root and others are from root?, Backward compatibility has real costs even for settings, Kyua graduates, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.construction-physics.com/p/what-would-it-take-to-recreate-bell" rel="nofollow">What Would It Take to Recreate Bell Labs?</a></p>

<hr>

<p><a href="https://posixcafe.org/blogs/2024/07/31/0/" rel="nofollow">Human Scale Software vs Open Source</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://group.miletic.net/en/blog/2024-06-14-how-to-run-visual-studio-vs-code-remote-over-ssh-on-freebsd-13-and-14" rel="nofollow">How to run Visual Studio (VS) Code Remote over SSH on FreeBSD 13 and 14</a></p>

<hr>

<p><a href="https://dan.langille.org/2024/07/27/why-are-some-emails-from-charlie-root-and-others-are-from-root/" rel="nofollow">Why are some emails from Charlie Root and others are from root?</a></p>

<hr>

<p><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/programming/BackwardCompatibilityHasCosts" rel="nofollow">Backward compatibility, even for settings, has real costs</a></p>

<hr>

<p><a href="https://jmmv.dev/2024/08/kyua-graduates.html" rel="nofollow">Kyua graduates</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<p>573 - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/573/feedback/Vedran%20-%20linuxulator" rel="nofollow">Vedran - linuxulator</a></p>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What Would It Take to Recreate Bell Labs?, Human Scale Software vs Open Source, How to run Visual Studio (VS) Code Remote over SSH on FreeBSD 13 and 14, Why are some emails from Charlie Root and others are from root?, Backward compatibility has real costs even for settings, Kyua graduates, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.construction-physics.com/p/what-would-it-take-to-recreate-bell" rel="nofollow">What Would It Take to Recreate Bell Labs?</a></p>

<hr>

<p><a href="https://posixcafe.org/blogs/2024/07/31/0/" rel="nofollow">Human Scale Software vs Open Source</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://group.miletic.net/en/blog/2024-06-14-how-to-run-visual-studio-vs-code-remote-over-ssh-on-freebsd-13-and-14" rel="nofollow">How to run Visual Studio (VS) Code Remote over SSH on FreeBSD 13 and 14</a></p>

<hr>

<p><a href="https://dan.langille.org/2024/07/27/why-are-some-emails-from-charlie-root-and-others-are-from-root/" rel="nofollow">Why are some emails from Charlie Root and others are from root?</a></p>

<hr>

<p><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/programming/BackwardCompatibilityHasCosts" rel="nofollow">Backward compatibility, even for settings, has real costs</a></p>

<hr>

<p><a href="https://jmmv.dev/2024/08/kyua-graduates.html" rel="nofollow">Kyua graduates</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<p>573 - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/573/feedback/Vedran%20-%20linuxulator" rel="nofollow">Vedran - linuxulator</a></p>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>568: regreSSHion</title>
  <link>https://www.bsdnow.tv/568</link>
  <guid isPermaLink="false">a0464306-5fee-4eba-a81c-b26393ebd0f2</guid>
  <pubDate>Thu, 18 Jul 2024 12:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a0464306-5fee-4eba-a81c-b26393ebd0f2.mp3" length="78023565" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>regreSSHion vulnerability, Improving and debugging FreeBSDs Intel wifi support, FreeBSD adds an implementation of the 9P filesystem, FreeBSD Zero to Desktop Speedrun Challenge, Why and how to run your own FreeBSD package cache, Game of Trees Hub, Why Does FreeBSD Default to Csh/Tcsh, and more</itunes:subtitle>
  <itunes:duration>54:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;regreSSHion vulnerability, Improving and debugging FreeBSDs Intel wifi support, FreeBSD adds an implementation of the 9P filesystem, FreeBSD Zero to Desktop Speedrun Challenge, Why and how to run your own FreeBSD package cache, Game of Trees Hub, Why Does FreeBSD Default to Csh/Tcsh, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt" target="_blank" rel="nofollow noopener"&gt;regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems&lt;/a&gt; and &lt;a href="https://undeadly.org/cgi?action=article;sid=20240701102851" target="_blank" rel="nofollow noopener"&gt;OpenBSD 9.8&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://freebsdfoundation.org/blog/improving-and-debugging-freebsds-intel-wi-fi-support-cheng-cuis-key-role-in-the-iwlwifi-project/" target="_blank" rel="nofollow noopener"&gt;Improving and debugging FreeBSDs Intel wifi support&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://cgit.freebsd.org/src/commit/?id=e97ad33a89a78f55280b0485b3249ee9b907a718" target="_blank" rel="nofollow noopener"&gt;FreeBSD adds an implementation of the 9P filesystem&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://vermaden.wordpress.com/2024/04/05/freebsd-zero-to-desktop-speedrun-challenge/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Zero to Desktop Speedrun Challenge&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://blog.rlwinm.de/why-and-how-to-run-your-own-freebsd-package-cache-3wbg" target="_blank" rel="nofollow noopener"&gt;Why and how to run your own FreeBSD package cache&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article;sid=20240621074337" target="_blank" rel="nofollow noopener"&gt;Game of Trees Hub: A Git Repository Hosting Service Based on OpenBSD&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://lobste.rs/s/iuzuge/why_does_freebsd_default_csh_tcsh" target="_blank" rel="nofollow noopener"&gt;Why Does FreeBSD Default to Csh/Tcsh? Exploring Its Advantages&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://whynothugo.nl/journal/2023/03/23/ai-assisted-computer-interfaces-of-the-future/" target="_blank" rel="nofollow noopener"&gt;AI-assisted computer interfaces of the future&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tarsnap&lt;/h2&gt;

&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Join us and other BSD Fans in our &lt;a href="https://t.me/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSD Now Telegram channel&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, regresshion, vulnerability, ssh, intel wifi, support, debugging, improving, 9P filesystem, 9pfs, zero to desktop, challenge, package cache, game of trees hub, csh, tcsh, default</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>regreSSHion vulnerability, Improving and debugging FreeBSDs Intel wifi support, FreeBSD adds an implementation of the 9P filesystem, FreeBSD Zero to Desktop Speedrun Challenge, Why and how to run your own FreeBSD package cache, Game of Trees Hub, Why Does FreeBSD Default to Csh/Tcsh, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt" rel="nofollow">regreSSHion: RCE in OpenSSH&#39;s server, on glibc-based Linux systems</a> and <a href="https://undeadly.org/cgi?action=article;sid=20240701102851" rel="nofollow">OpenBSD 9.8</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/improving-and-debugging-freebsds-intel-wi-fi-support-cheng-cuis-key-role-in-the-iwlwifi-project/" rel="nofollow">Improving and debugging FreeBSDs Intel wifi support</a></p>

<hr>

<p><a href="https://cgit.freebsd.org/src/commit/?id=e97ad33a89a78f55280b0485b3249ee9b907a718" rel="nofollow">FreeBSD adds an implementation of the 9P filesystem</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://vermaden.wordpress.com/2024/04/05/freebsd-zero-to-desktop-speedrun-challenge/" rel="nofollow">FreeBSD Zero to Desktop Speedrun Challenge</a></p>

<hr>

<p><a href="https://blog.rlwinm.de/why-and-how-to-run-your-own-freebsd-package-cache-3wbg" rel="nofollow">Why and how to run your own FreeBSD package cache</a></p>

<hr>

<p><a href="http://undeadly.org/cgi?action=article;sid=20240621074337" rel="nofollow">Game of Trees Hub: A Git Repository Hosting Service Based on OpenBSD</a></p>

<hr>

<p><a href="https://lobste.rs/s/iuzuge/why_does_freebsd_default_csh_tcsh" rel="nofollow">Why Does FreeBSD Default to Csh/Tcsh? Exploring Its Advantages</a></p>

<hr>

<p><a href="https://whynothugo.nl/journal/2023/03/23/ai-assisted-computer-interfaces-of-the-future/" rel="nofollow">AI-assisted computer interfaces of the future</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>regreSSHion vulnerability, Improving and debugging FreeBSDs Intel wifi support, FreeBSD adds an implementation of the 9P filesystem, FreeBSD Zero to Desktop Speedrun Challenge, Why and how to run your own FreeBSD package cache, Game of Trees Hub, Why Does FreeBSD Default to Csh/Tcsh, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt" rel="nofollow">regreSSHion: RCE in OpenSSH&#39;s server, on glibc-based Linux systems</a> and <a href="https://undeadly.org/cgi?action=article;sid=20240701102851" rel="nofollow">OpenBSD 9.8</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/improving-and-debugging-freebsds-intel-wi-fi-support-cheng-cuis-key-role-in-the-iwlwifi-project/" rel="nofollow">Improving and debugging FreeBSDs Intel wifi support</a></p>

<hr>

<p><a href="https://cgit.freebsd.org/src/commit/?id=e97ad33a89a78f55280b0485b3249ee9b907a718" rel="nofollow">FreeBSD adds an implementation of the 9P filesystem</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://vermaden.wordpress.com/2024/04/05/freebsd-zero-to-desktop-speedrun-challenge/" rel="nofollow">FreeBSD Zero to Desktop Speedrun Challenge</a></p>

<hr>

<p><a href="https://blog.rlwinm.de/why-and-how-to-run-your-own-freebsd-package-cache-3wbg" rel="nofollow">Why and how to run your own FreeBSD package cache</a></p>

<hr>

<p><a href="http://undeadly.org/cgi?action=article;sid=20240621074337" rel="nofollow">Game of Trees Hub: A Git Repository Hosting Service Based on OpenBSD</a></p>

<hr>

<p><a href="https://lobste.rs/s/iuzuge/why_does_freebsd_default_csh_tcsh" rel="nofollow">Why Does FreeBSD Default to Csh/Tcsh? Exploring Its Advantages</a></p>

<hr>

<p><a href="https://whynothugo.nl/journal/2023/03/23/ai-assisted-computer-interfaces-of-the-future/" rel="nofollow">AI-assisted computer interfaces of the future</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>567: To the Core</title>
  <link>https://www.bsdnow.tv/567</link>
  <guid isPermaLink="false">d7de607e-7822-486f-8649-0053e89207a6</guid>
  <pubDate>Thu, 11 Jul 2024 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d7de607e-7822-486f-8649-0053e89207a6.mp3" length="60410304" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more</itunes:subtitle>
  <itunes:duration>41:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://whynothugo.nl/journal/2024/06/13/ssh-as-a-sudo-replacement/" target="_blank" rel="nofollow noopener"&gt;SSH as a sudo replacement&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://lists.freebsd.org/archives/freebsd-announce/2024-June/000136.html" target="_blank" rel="nofollow noopener"&gt;Core.13 is Now In Office&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.tumfatig.net/2024/running-gotosocial-on-netbsd/" target="_blank" rel="nofollow noopener"&gt;Running GoToSocial on NetBSD&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://briancallahan.net/blog/20240609.html" target="_blank" rel="nofollow noopener"&gt;A DMD package for OpenIndiana&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://neirac.srht.site/posts/omnios-add-swap.html" target="_blank" rel="nofollow noopener"&gt;Adding more swap space to Omnios&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20240620105457" target="_blank" rel="nofollow noopener"&gt;OpenBSD added initial support for Qualcomm Snapdragon Elite X after 1 day&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tarsnap&lt;/h2&gt;

&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/567/feedback/Isa%20-%20Pinebook%20Question.md" target="_blank" rel="nofollow noopener"&gt;Isa - Pinebook Question.md&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Join us and other BSD Fans in our &lt;a href="https://t.me/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSD Now Telegram channel&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, sudo, replacement, ssh, core.13, gotosocial, DMD, openindiana, omnios, qualcomm, snapdragon elite X</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://whynothugo.nl/journal/2024/06/13/ssh-as-a-sudo-replacement/" rel="nofollow">SSH as a sudo replacement</a></p>

<hr>

<p><a href="https://lists.freebsd.org/archives/freebsd-announce/2024-June/000136.html" rel="nofollow">Core.13 is Now In Office</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/running-gotosocial-on-netbsd/" rel="nofollow">Running GoToSocial on NetBSD</a></p>

<hr>

<p><a href="https://briancallahan.net/blog/20240609.html" rel="nofollow">A DMD package for OpenIndiana</a></p>

<hr>

<p><a href="https://neirac.srht.site/posts/omnios-add-swap.html" rel="nofollow">Adding more swap space to Omnios</a></p>

<hr>

<p><a href="https://undeadly.org/cgi?action=article;sid=20240620105457" rel="nofollow">OpenBSD added initial support for Qualcomm Snapdragon Elite X after 1 day</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/567/feedback/Isa%20-%20Pinebook%20Question.md" rel="nofollow">Isa - Pinebook Question.md</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://whynothugo.nl/journal/2024/06/13/ssh-as-a-sudo-replacement/" rel="nofollow">SSH as a sudo replacement</a></p>

<hr>

<p><a href="https://lists.freebsd.org/archives/freebsd-announce/2024-June/000136.html" rel="nofollow">Core.13 is Now In Office</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/running-gotosocial-on-netbsd/" rel="nofollow">Running GoToSocial on NetBSD</a></p>

<hr>

<p><a href="https://briancallahan.net/blog/20240609.html" rel="nofollow">A DMD package for OpenIndiana</a></p>

<hr>

<p><a href="https://neirac.srht.site/posts/omnios-add-swap.html" rel="nofollow">Adding more swap space to Omnios</a></p>

<hr>

<p><a href="https://undeadly.org/cgi?action=article;sid=20240620105457" rel="nofollow">OpenBSD added initial support for Qualcomm Snapdragon Elite X after 1 day</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/567/feedback/Isa%20-%20Pinebook%20Question.md" rel="nofollow">Isa - Pinebook Question.md</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>548: NTP - In Memoriam</title>
  <link>https://www.bsdnow.tv/548</link>
  <guid isPermaLink="false">9fc45182-53da-4b7a-8fa2-a408b12d8a5b</guid>
  <pubDate>Thu, 29 Feb 2024 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9fc45182-53da-4b7a-8fa2-a408b12d8a5b.mp3" length="54708480" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD Status Report Q4 2023, In Memorium of the NTP inventor, Migrate a FreeBSD bhyve virtual machine to OmniOS, AI-free blog, Hard disk LEDs and Noisy Machines, SSH based comment system, NetBSD 10 RC.4 is available, and more</itunes:subtitle>
  <itunes:duration>56:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FreeBSD Status Report Q4 2023, In Memorium of the NTP inventor, Migrate a FreeBSD bhyve virtual machine to OmniOS, AI-free blog, Hard disk LEDs and Noisy Machines, SSH based comment system, NetBSD 10 RC.4 is available, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.freebsd.org/status/report-2023-10-2023-12/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Status Report Fourth Quarter 2023&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://arstechnica.com/gadgets/2024/01/inventor-of-ntp-protocol-that-keeps-time-on-billions-of-devices-dies-at-age-85/" target="_blank" rel="nofollow noopener"&gt;In Memoriam : Inventor of NTP protocol that keeps time on billions of devices dies at age 85&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.tumfatig.net/2024/migrate-a-freebsd-bhyve-virtual-machine-to-omnios/?utm_source=bsdweekly" target="_blank" rel="nofollow noopener"&gt;Migrate a FreeBSD bhyve virtual machine to OmniOS&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://dataswamp.org/%7Esolene/2024-01-18-no-ai.html" target="_blank" rel="nofollow noopener"&gt;This blog is AI free&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://jmmv.dev/2023/12/hard-disk-leds-and-noisy-machines.html" target="_blank" rel="nofollow noopener"&gt;Hard disk LEDs and Noisy Machines&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://blog.haschek.at/2023/ssh-based-comment-system.html" target="_blank" rel="nofollow noopener"&gt;SSH based comment system&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_10_0_rc4_available" target="_blank" rel="nofollow noopener"&gt;NetBSD 10 RC.4 is available&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;hr&gt;

&lt;h2&gt;Tarsnap&lt;/h2&gt;

&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Join us and other BSD Fans in our &lt;a href="https://t.me/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSD Now Telegram channel&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, status report, ntp, memorium, inventor, migration, migrate, bhyve, vm, virtual machine, omnios, ai-free, blog, LED, hard disk, machine, ssh-based, ssh, comment system, netbsd 10 rc 4</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD Status Report Q4 2023, In Memorium of the NTP inventor, Migrate a FreeBSD bhyve virtual machine to OmniOS, AI-free blog, Hard disk LEDs and Noisy Machines, SSH based comment system, NetBSD 10 RC.4 is available, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.freebsd.org/status/report-2023-10-2023-12/" rel="nofollow">FreeBSD Status Report Fourth Quarter 2023</a></p>

<hr>

<p><a href="https://arstechnica.com/gadgets/2024/01/inventor-of-ntp-protocol-that-keeps-time-on-billions-of-devices-dies-at-age-85/" rel="nofollow">In Memoriam : Inventor of NTP protocol that keeps time on billions of devices dies at age 85</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/migrate-a-freebsd-bhyve-virtual-machine-to-omnios/?utm_source=bsdweekly" rel="nofollow">Migrate a FreeBSD bhyve virtual machine to OmniOS</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2024-01-18-no-ai.html" rel="nofollow">This blog is AI free</a></p>

<hr>

<p><a href="https://jmmv.dev/2023/12/hard-disk-leds-and-noisy-machines.html" rel="nofollow">Hard disk LEDs and Noisy Machines</a></p>

<hr>

<p><a href="https://blog.haschek.at/2023/ssh-based-comment-system.html" rel="nofollow">SSH based comment system</a></p>

<hr>

<p><a href="https://blog.netbsd.org/tnf/entry/netbsd_10_0_rc4_available" rel="nofollow">NetBSD 10 RC.4 is available</a></p>

<hr>

<h2>Beastie Bits</h2>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD Status Report Q4 2023, In Memorium of the NTP inventor, Migrate a FreeBSD bhyve virtual machine to OmniOS, AI-free blog, Hard disk LEDs and Noisy Machines, SSH based comment system, NetBSD 10 RC.4 is available, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.freebsd.org/status/report-2023-10-2023-12/" rel="nofollow">FreeBSD Status Report Fourth Quarter 2023</a></p>

<hr>

<p><a href="https://arstechnica.com/gadgets/2024/01/inventor-of-ntp-protocol-that-keeps-time-on-billions-of-devices-dies-at-age-85/" rel="nofollow">In Memoriam : Inventor of NTP protocol that keeps time on billions of devices dies at age 85</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/migrate-a-freebsd-bhyve-virtual-machine-to-omnios/?utm_source=bsdweekly" rel="nofollow">Migrate a FreeBSD bhyve virtual machine to OmniOS</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2024-01-18-no-ai.html" rel="nofollow">This blog is AI free</a></p>

<hr>

<p><a href="https://jmmv.dev/2023/12/hard-disk-leds-and-noisy-machines.html" rel="nofollow">Hard disk LEDs and Noisy Machines</a></p>

<hr>

<p><a href="https://blog.haschek.at/2023/ssh-based-comment-system.html" rel="nofollow">SSH based comment system</a></p>

<hr>

<p><a href="https://blog.netbsd.org/tnf/entry/netbsd_10_0_rc4_available" rel="nofollow">NetBSD 10 RC.4 is available</a></p>

<hr>

<h2>Beastie Bits</h2>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>540: Terrapin Attacks SSH</title>
  <link>https://www.bsdnow.tv/540</link>
  <guid isPermaLink="false">4f2e9d92-a578-459d-a42d-5d8e1d83db1c</guid>
  <pubDate>Thu, 04 Jan 2024 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4f2e9d92-a578-459d-a42d-5d8e1d83db1c.mp3" length="51090432" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Terrapin Attack, SSH Hardening with ssh-audit, MidnightBSD 3.1.2, syscall(2) removed from -current, 2024 FreeBSD Community Survey is Here</itunes:subtitle>
  <itunes:duration>53:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Terrapin Attack, SSH Hardening with ssh-audit, MidnightBSD 3.1.2, syscall(2) removed from -current, 2024 FreeBSD Community Survey is Here&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://terrapin-attack.com" target="_blank" rel="nofollow noopener"&gt;Terrapin Attack&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20231219122431" target="_blank" rel="nofollow noopener"&gt;OpenSSH 9.6 is out&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/011_ssh.patch.sig" target="_blank" rel="nofollow noopener"&gt;OpenBSD Patches&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc" target="_blank" rel="nofollow noopener"&gt;FreeBSD Patches&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;em&gt;If anyone is aware of NetBSD Patches, please send them into the show so I can update the show notes&lt;/em&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://thoughts.greyh.at/posts/ssh-audit/" target="_blank" rel="nofollow noopener"&gt;SSH Hardening with ssh-audit&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://bsdsec.net/articles/midnightbsd-security-midnightbsd-3-1-2" target="_blank" rel="nofollow noopener"&gt;MidnightBSD 3.1.2&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20231213062827" target="_blank" rel="nofollow noopener"&gt;syscall(2) removed from -current&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://freebsdfoundation.org/blog/2024-freebsd-community-survey-is-here/" target="_blank" rel="nofollow noopener"&gt;2024 FreeBSD Community Survey is Here&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;(Markus - how to verify FreeBSD deliverables](&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/Markus%20-%20how%20to%20verify%20FreeBSD%20deliverables.md" target="_blank" rel="nofollow noopener"&gt;https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/Markus%20-%20how%20to%20verify%20FreeBSD%20deliverables.md&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;(neb - tui](&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/neb%20-%20tui.md" target="_blank" rel="nofollow noopener"&gt;https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/neb%20-%20tui.md&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Join us and other BSD Fans in our &lt;a href="https://t.me/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSD Now Telegram channel&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, terrapin, attack, ssh, crypto, hardening, ssh-audit, midnightbsd 3.1.2, syscall, community survey</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Terrapin Attack, SSH Hardening with ssh-audit, MidnightBSD 3.1.2, syscall(2) removed from -current, 2024 FreeBSD Community Survey is Here</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://terrapin-attack.com" rel="nofollow">Terrapin Attack</a></h3>

<ul>
<li><a href="https://undeadly.org/cgi?action=article;sid=20231219122431" rel="nofollow">OpenSSH 9.6 is out</a></li>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/011_ssh.patch.sig" rel="nofollow">OpenBSD Patches</a></li>
<li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc" rel="nofollow">FreeBSD Patches</a></li>
<li><em>If anyone is aware of NetBSD Patches, please send them into the show so I can update the show notes</em></li>
</ul>

<hr>

<h3><a href="https://thoughts.greyh.at/posts/ssh-audit/" rel="nofollow">SSH Hardening with ssh-audit</a></h3>

<hr>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://bsdsec.net/articles/midnightbsd-security-midnightbsd-3-1-2" rel="nofollow">MidnightBSD 3.1.2</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20231213062827" rel="nofollow">syscall(2) removed from -current</a></h3>

<hr>

<h3><a href="https://freebsdfoundation.org/blog/2024-freebsd-community-survey-is-here/" rel="nofollow">2024 FreeBSD Community Survey is Here</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>(Markus - how to verify FreeBSD deliverables](<a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/Markus%20-%20how%20to%20verify%20FreeBSD%20deliverables.md" rel="nofollow">https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/Markus%20-%20how%20to%20verify%20FreeBSD%20deliverables.md</a>)</li>
<li>(neb - tui](<a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/neb%20-%20tui.md" rel="nofollow">https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/neb%20-%20tui.md</a>)</li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Terrapin Attack, SSH Hardening with ssh-audit, MidnightBSD 3.1.2, syscall(2) removed from -current, 2024 FreeBSD Community Survey is Here</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://terrapin-attack.com" rel="nofollow">Terrapin Attack</a></h3>

<ul>
<li><a href="https://undeadly.org/cgi?action=article;sid=20231219122431" rel="nofollow">OpenSSH 9.6 is out</a></li>
<li><a href="https://ftp.openbsd.org/pub/OpenBSD/patches/7.4/common/011_ssh.patch.sig" rel="nofollow">OpenBSD Patches</a></li>
<li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc" rel="nofollow">FreeBSD Patches</a></li>
<li><em>If anyone is aware of NetBSD Patches, please send them into the show so I can update the show notes</em></li>
</ul>

<hr>

<h3><a href="https://thoughts.greyh.at/posts/ssh-audit/" rel="nofollow">SSH Hardening with ssh-audit</a></h3>

<hr>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://bsdsec.net/articles/midnightbsd-security-midnightbsd-3-1-2" rel="nofollow">MidnightBSD 3.1.2</a></h3>

<hr>

<h3><a href="https://undeadly.org/cgi?action=article;sid=20231213062827" rel="nofollow">syscall(2) removed from -current</a></h3>

<hr>

<h3><a href="https://freebsdfoundation.org/blog/2024-freebsd-community-survey-is-here/" rel="nofollow">2024 FreeBSD Community Survey is Here</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>(Markus - how to verify FreeBSD deliverables](<a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/Markus%20-%20how%20to%20verify%20FreeBSD%20deliverables.md" rel="nofollow">https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/Markus%20-%20how%20to%20verify%20FreeBSD%20deliverables.md</a>)</li>
<li>(neb - tui](<a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/neb%20-%20tui.md" rel="nofollow">https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/539/feedback/neb%20-%20tui.md</a>)</li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>537: Authentic SSH Host</title>
  <link>https://www.bsdnow.tv/537</link>
  <guid isPermaLink="false">e7c69b69-7499-4f5f-bc76-c7c76b266218</guid>
  <pubDate>Thu, 14 Dec 2023 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e7c69b69-7499-4f5f-bc76-c7c76b266218.mp3" length="51144960" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenZFS Storage Best Practices and Use Cases pt 2,  MNT Reform – almost a year on, Why do I know shell, and how can you, Authenticate the SSH servers you are connecting to, dsynth in DragonFly, Navigating around in shell, and more</itunes:subtitle>
  <itunes:duration>53:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;OpenZFS Storage Best Practices and Use Cases pt 2,  MNT Reform – almost a year on, Why do I know shell, and how can you, Authenticate the SSH servers you are connecting to, dsynth in DragonFly, Navigating around in shell, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/openzfs-storage-best-practices-and-use-cases-part-2-file-serving-and-sans/" target="_blank" rel="nofollow noopener"&gt;OpenZFS Storage Best Practices and Use Cases – Part 2: File Serving and SANs&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.geeklan.co.uk/?p=3215" target="_blank" rel="nofollow noopener"&gt;My MNT Reform – almost a year on&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://jmmv.dev/2023/11/why-do-i-know-shell-and-how-can-you.html" target="_blank" rel="nofollow noopener"&gt;Why do I know shell, and how can you?&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/%7Esolene/2023-08-05-sshfp-dns-entries.html" target="_blank" rel="nofollow noopener"&gt;Authenticate the SSH servers you are connecting to&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2023/11/30/dsynth-in-dragonfly/" target="_blank" rel="nofollow noopener"&gt;dsynth in DragonFly&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://blog.meain.io/2023/navigating-around-in-shell/" target="_blank" rel="nofollow noopener"&gt;Navigating around in shell&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/537/feedback/Brad%20-%20jail%20manager%20questions.md" target="_blank" rel="nofollow noopener"&gt;Brad - jail manager questions&lt;/a&gt;
Jail manager comparison: &lt;a href="https://appjail.readthedocs.io/en/latest/compare/" target="_blank" rel="nofollow noopener"&gt;https://appjail.readthedocs.io/en/latest/compare/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/537/feedback/nixbytes%20-%20sharing%20a%20link.md" target="_blank" rel="nofollow noopener"&gt;nixbytes - sharing a link.md&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Join us and other BSD Fans in our &lt;a href="https://t.me/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSD Now Telegram channel&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, best practices, use case, mnt reform, learn, authenticate, ssh, host, synth, navigation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenZFS Storage Best Practices and Use Cases pt 2,  MNT Reform – almost a year on, Why do I know shell, and how can you, Authenticate the SSH servers you are connecting to, dsynth in DragonFly, Navigating around in shell, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/openzfs-storage-best-practices-and-use-cases-part-2-file-serving-and-sans/" rel="nofollow">OpenZFS Storage Best Practices and Use Cases – Part 2: File Serving and SANs</a></h3>

<hr>

<h3><a href="https://www.geeklan.co.uk/?p=3215" rel="nofollow">My MNT Reform – almost a year on</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://jmmv.dev/2023/11/why-do-i-know-shell-and-how-can-you.html" rel="nofollow">Why do I know shell, and how can you?</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2023-08-05-sshfp-dns-entries.html" rel="nofollow">Authenticate the SSH servers you are connecting to</a></h3>

<hr>

<h3><a href="https://www.dragonflydigest.com/2023/11/30/dsynth-in-dragonfly/" rel="nofollow">dsynth in DragonFly</a></h3>

<hr>

<h3><a href="https://blog.meain.io/2023/navigating-around-in-shell/" rel="nofollow">Navigating around in shell</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/537/feedback/Brad%20-%20jail%20manager%20questions.md" rel="nofollow">Brad - jail manager questions</a>
Jail manager comparison: <a href="https://appjail.readthedocs.io/en/latest/compare/" rel="nofollow">https://appjail.readthedocs.io/en/latest/compare/</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/537/feedback/nixbytes%20-%20sharing%20a%20link.md" rel="nofollow">nixbytes - sharing a link.md</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenZFS Storage Best Practices and Use Cases pt 2,  MNT Reform – almost a year on, Why do I know shell, and how can you, Authenticate the SSH servers you are connecting to, dsynth in DragonFly, Navigating around in shell, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/openzfs-storage-best-practices-and-use-cases-part-2-file-serving-and-sans/" rel="nofollow">OpenZFS Storage Best Practices and Use Cases – Part 2: File Serving and SANs</a></h3>

<hr>

<h3><a href="https://www.geeklan.co.uk/?p=3215" rel="nofollow">My MNT Reform – almost a year on</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://jmmv.dev/2023/11/why-do-i-know-shell-and-how-can-you.html" rel="nofollow">Why do I know shell, and how can you?</a></h3>

<hr>

<h3><a href="https://dataswamp.org/%7Esolene/2023-08-05-sshfp-dns-entries.html" rel="nofollow">Authenticate the SSH servers you are connecting to</a></h3>

<hr>

<h3><a href="https://www.dragonflydigest.com/2023/11/30/dsynth-in-dragonfly/" rel="nofollow">dsynth in DragonFly</a></h3>

<hr>

<h3><a href="https://blog.meain.io/2023/navigating-around-in-shell/" rel="nofollow">Navigating around in shell</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/537/feedback/Brad%20-%20jail%20manager%20questions.md" rel="nofollow">Brad - jail manager questions</a>
Jail manager comparison: <a href="https://appjail.readthedocs.io/en/latest/compare/" rel="nofollow">https://appjail.readthedocs.io/en/latest/compare/</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/537/feedback/nixbytes%20-%20sharing%20a%20link.md" rel="nofollow">nixbytes - sharing a link.md</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>504: Release the BSD</title>
  <link>https://www.bsdnow.tv/504</link>
  <guid isPermaLink="false">2d02bfb1-4e33-4be1-8424-a707ddbeac55</guid>
  <pubDate>Thu, 27 Apr 2023 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2d02bfb1-4e33-4be1-8424-a707ddbeac55.mp3" length="34665600" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more</itunes:subtitle>
  <itunes:duration>36:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/13.2R/announce/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 13.2 Release Announcement&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://axcient.com/blog/using-dtrace-to-find-block-sizes-of-zfs-nfs-and-iscsi/" target="_blank" rel="nofollow noopener"&gt;Using DTrace to find block sizes of ZFS, NFS, and iSCSI&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.phoronix.com/news/MidnightBSD-3.0.1" target="_blank" rel="nofollow noopener"&gt;Midnight BSD 3.0.1&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://davidisaksson.dev/posts/closing-stale-ssh-connections/" target="_blank" rel="nofollow noopener"&gt;Closing a stale SSH connection&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://sleeplessbeastie.eu/2023/04/10/how-to-automatically-add-identity-to-the-ssh-authentication-agent/" target="_blank" rel="nofollow noopener"&gt;How to automatically add identity to the SSH authentication agent&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Dan%20-%20ZFS%20question.md" target="_blank" rel="nofollow noopener"&gt;Dan - ZFS question&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Matt%20-%20Thanks.md" target="_blank" rel="nofollow noopener"&gt;Matt - Thanks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, cli, unix, os, berkeley, software, distribution, development, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, dtrace, nfs, iscsi, block size, midnightbsd, ssh, connection, identity, public key, authentication, agent, virtual server</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/13.2R/announce/" rel="nofollow">FreeBSD 13.2 Release Announcement</a></h3>

<hr>

<h3><a href="https://axcient.com/blog/using-dtrace-to-find-block-sizes-of-zfs-nfs-and-iscsi/" rel="nofollow">Using DTrace to find block sizes of ZFS, NFS, and iSCSI</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.phoronix.com/news/MidnightBSD-3.0.1" rel="nofollow">Midnight BSD 3.0.1</a></h3>

<hr>

<h3><a href="https://davidisaksson.dev/posts/closing-stale-ssh-connections/" rel="nofollow">Closing a stale SSH connection</a></h3>

<hr>

<h3><a href="https://sleeplessbeastie.eu/2023/04/10/how-to-automatically-add-identity-to-the-ssh-authentication-agent/" rel="nofollow">How to automatically add identity to the SSH authentication agent</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Dan%20-%20ZFS%20question.md" rel="nofollow">Dan - ZFS question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Matt%20-%20Thanks.md" rel="nofollow">Matt - Thanks</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD 13.2 Release, Using DTrace to find block sizes of ZFS, NFS, and iSCSI, Midnight BSD 3.0.1, Closing a stale SSH connection, How to automatically add identity to the SSH authentication agent, Pros and Cons of FreeBSD for virtual Servers, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/13.2R/announce/" rel="nofollow">FreeBSD 13.2 Release Announcement</a></h3>

<hr>

<h3><a href="https://axcient.com/blog/using-dtrace-to-find-block-sizes-of-zfs-nfs-and-iscsi/" rel="nofollow">Using DTrace to find block sizes of ZFS, NFS, and iSCSI</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.phoronix.com/news/MidnightBSD-3.0.1" rel="nofollow">Midnight BSD 3.0.1</a></h3>

<hr>

<h3><a href="https://davidisaksson.dev/posts/closing-stale-ssh-connections/" rel="nofollow">Closing a stale SSH connection</a></h3>

<hr>

<h3><a href="https://sleeplessbeastie.eu/2023/04/10/how-to-automatically-add-identity-to-the-ssh-authentication-agent/" rel="nofollow">How to automatically add identity to the SSH authentication agent</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Dan%20-%20ZFS%20question.md" rel="nofollow">Dan - ZFS question</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/504/feedback/Matt%20-%20Thanks.md" rel="nofollow">Matt - Thanks</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>496: Hacking the CLI</title>
  <link>https://www.bsdnow.tv/496</link>
  <guid isPermaLink="false">2c0b464e-375e-42af-b44a-62ca75b4b31a</guid>
  <pubDate>Thu, 02 Mar 2023 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2c0b464e-375e-42af-b44a-62ca75b4b31a.mp3" length="43280256" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Automation and Hacking Your FreeBSD CLI, Run your own instant messaging service on FreeBSD, Watch Netflix on FreeBSD, HardenedBSD January 2023 Status Report, How To Set Up SSH Keys With YubiKey as two-factor authentication, OpenSSH fixes double-free memory bug that’s pokable over the network, A late announcement, but better late than never, Next NYC*BUG and more</itunes:subtitle>
  <itunes:duration>45:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Automation and Hacking Your FreeBSD CLI, Run your own instant messaging service on FreeBSD, Watch Netflix on FreeBSD, HardenedBSD January 2023 Status Report, How To Set Up SSH Keys With YubiKey as two-factor authentication, OpenSSH fixes double-free memory bug that’s pokable over the network, A late announcement, but better late than never, Next NYC*BUG and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/automation-and-hacking-your-freebsd-cli/" target="_blank" rel="nofollow noopener"&gt;Automation and Hacking Your FreeBSD CLI&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://xn--gckvb8fzb.com/run-your-own-instant-messaging-service-on-freebsd/" target="_blank" rel="nofollow noopener"&gt;Run your own instant messaging service on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://byte--sized-de.translate.goog/linux-unix/netflix-auf-freebsd-schauen/?_x_tr_sl=de&amp;amp;_x_tr_tl=en&amp;amp;_x_tr_hl=en&amp;amp;_x_tr_pto=wapp" target="_blank" rel="nofollow noopener"&gt;Watch Netflix on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://hardenedbsd.org/article/shawn-webb/2023-01-31/hardenedbsd-january-2023-status-report" target="_blank" rel="nofollow noopener"&gt;HardenedBSD January 2023 Status Report&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.cyberciti.biz/security/how-to-set-up-ssh-keys-with-yubikey-as-two-factor-authentication-u2f-fido2/" target="_blank" rel="nofollow noopener"&gt;How To Set Up SSH Keys With YubiKey as two-factor authentication (U2F/FIDO2)&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://nakedsecurity.sophos.com/2023/02/03/openssh-fixes-double-free-memory-bug-thats-pokable-over-the-network/" target="_blank" rel="nofollow noopener"&gt;OpenSSH fixes double-free memory bug that’s pokable over the network&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://github.com/chettrick/discobsd/releases/tag/DISCOBSD_2_0" target="_blank" rel="nofollow noopener"&gt;A late announcement, but better late than never&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://lists.nycbug.org:8443/pipermail/talk/2023-February/018550.html" target="_blank" rel="nofollow noopener"&gt;Next NYC*BUG: March? April? Certainly May!&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/496/feedback/Daniel%20-%20Plan%209%20lives.md" target="_blank" rel="nofollow noopener"&gt;Daniel - Plan 9 lives&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/496/feedback/Jason%20-%20nvd%20driver.md" target="_blank" rel="nofollow noopener"&gt;Jason - nvd driver&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, development, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, automation, hacking, cli, instant message, messaging, netflix, status report, ssh, keys, 2fa, memory, bug, bugfix, fix, discobsd, nycbug</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Automation and Hacking Your FreeBSD CLI, Run your own instant messaging service on FreeBSD, Watch Netflix on FreeBSD, HardenedBSD January 2023 Status Report, How To Set Up SSH Keys With YubiKey as two-factor authentication, OpenSSH fixes double-free memory bug that’s pokable over the network, A late announcement, but better late than never, Next NYC*BUG and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/automation-and-hacking-your-freebsd-cli/" rel="nofollow">Automation and Hacking Your FreeBSD CLI</a></h3>

<hr>

<h3><a href="https://xn--gckvb8fzb.com/run-your-own-instant-messaging-service-on-freebsd/" rel="nofollow">Run your own instant messaging service on FreeBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://byte--sized-de.translate.goog/linux-unix/netflix-auf-freebsd-schauen/?_x_tr_sl=de&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp" rel="nofollow">Watch Netflix on FreeBSD</a></h3>

<hr>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2023-01-31/hardenedbsd-january-2023-status-report" rel="nofollow">HardenedBSD January 2023 Status Report</a></h3>

<hr>

<h3><a href="https://www.cyberciti.biz/security/how-to-set-up-ssh-keys-with-yubikey-as-two-factor-authentication-u2f-fido2/" rel="nofollow">How To Set Up SSH Keys With YubiKey as two-factor authentication (U2F/FIDO2)</a></h3>

<hr>

<h3><a href="https://nakedsecurity.sophos.com/2023/02/03/openssh-fixes-double-free-memory-bug-thats-pokable-over-the-network/" rel="nofollow">OpenSSH fixes double-free memory bug that’s pokable over the network</a></h3>

<hr>

<h3><a href="https://github.com/chettrick/discobsd/releases/tag/DISCOBSD_2_0" rel="nofollow">A late announcement, but better late than never</a></h3>

<hr>

<h3><a href="https://lists.nycbug.org:8443/pipermail/talk/2023-February/018550.html" rel="nofollow">Next NYC*BUG: March? April? Certainly May!</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/496/feedback/Daniel%20-%20Plan%209%20lives.md" rel="nofollow">Daniel - Plan 9 lives</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/496/feedback/Jason%20-%20nvd%20driver.md" rel="nofollow">Jason - nvd driver</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Automation and Hacking Your FreeBSD CLI, Run your own instant messaging service on FreeBSD, Watch Netflix on FreeBSD, HardenedBSD January 2023 Status Report, How To Set Up SSH Keys With YubiKey as two-factor authentication, OpenSSH fixes double-free memory bug that’s pokable over the network, A late announcement, but better late than never, Next NYC*BUG and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/automation-and-hacking-your-freebsd-cli/" rel="nofollow">Automation and Hacking Your FreeBSD CLI</a></h3>

<hr>

<h3><a href="https://xn--gckvb8fzb.com/run-your-own-instant-messaging-service-on-freebsd/" rel="nofollow">Run your own instant messaging service on FreeBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://byte--sized-de.translate.goog/linux-unix/netflix-auf-freebsd-schauen/?_x_tr_sl=de&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp" rel="nofollow">Watch Netflix on FreeBSD</a></h3>

<hr>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2023-01-31/hardenedbsd-january-2023-status-report" rel="nofollow">HardenedBSD January 2023 Status Report</a></h3>

<hr>

<h3><a href="https://www.cyberciti.biz/security/how-to-set-up-ssh-keys-with-yubikey-as-two-factor-authentication-u2f-fido2/" rel="nofollow">How To Set Up SSH Keys With YubiKey as two-factor authentication (U2F/FIDO2)</a></h3>

<hr>

<h3><a href="https://nakedsecurity.sophos.com/2023/02/03/openssh-fixes-double-free-memory-bug-thats-pokable-over-the-network/" rel="nofollow">OpenSSH fixes double-free memory bug that’s pokable over the network</a></h3>

<hr>

<h3><a href="https://github.com/chettrick/discobsd/releases/tag/DISCOBSD_2_0" rel="nofollow">A late announcement, but better late than never</a></h3>

<hr>

<h3><a href="https://lists.nycbug.org:8443/pipermail/talk/2023-February/018550.html" rel="nofollow">Next NYC*BUG: March? April? Certainly May!</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/496/feedback/Daniel%20-%20Plan%209%20lives.md" rel="nofollow">Daniel - Plan 9 lives</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/496/feedback/Jason%20-%20nvd%20driver.md" rel="nofollow">Jason - nvd driver</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>494: Unix workstation extinction</title>
  <link>https://www.bsdnow.tv/494</link>
  <guid isPermaLink="false">b6bd08a9-8d1d-4bc9-8024-a8153fe7b304</guid>
  <pubDate>Thu, 16 Feb 2023 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b6bd08a9-8d1d-4bc9-8024-a8153fe7b304.mp3" length="44895744" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Mass extinction of UNIX workstations, Determine Who Can Log In to an SSH Server, Factors When Considering FreeBSD vs. Linux Packages, A Visual Guide to SSH Tunnels, Harvesting the Noise While it’s Fresh, Bastille - The Jail Manager on FreeBSD, and more</itunes:subtitle>
  <itunes:duration>46:45</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Mass extinction of UNIX workstations, Determine Who Can Log In to an SSH Server, Factors When Considering FreeBSD vs. Linux Packages, A Visual Guide to SSH Tunnels, Harvesting the Noise While it’s Fresh, Bastille - The Jail Manager on FreeBSD, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.osnews.com/story/135605/the-mass-extinction-of-unix-workstations/" target="_blank" rel="nofollow noopener"&gt;The mass extinction of UNIX workstations&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.agwa.name/blog/post/whoarethey" target="_blank" rel="nofollow noopener"&gt;whoarethey: Determine Who Can Log In to an SSH Server&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/freebsd-vs-linux-5-factors-when-considering-freebsd-vs-linux-package-management/" target="_blank" rel="nofollow noopener"&gt;FreeBSD vs. Linux 5 Factors When Considering FreeBSD vs. Linux: Packages&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://iximiuz.com/en/posts/ssh-tunnels/" target="_blank" rel="nofollow noopener"&gt;A Visual Guide to SSH Tunnels: Local and Remote Port Forwarding&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://medium.com/@peter.hansteen/harvesting-the-noise-while-its-fresh-revisited-3da1894cc8a7" target="_blank" rel="nofollow noopener"&gt;Harvesting the Noise While it’s Fresh, Revisited&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://byte--sized-de.translate.goog/linux-unix/bastille-der-jail-manager-unter-freebsd/?_x_tr_sl=de&amp;amp;_x_tr_tl=en&amp;amp;_x_tr_hl=en&amp;amp;_x_tr_pto=wapp" target="_blank" rel="nofollow noopener"&gt;Bastille - The Jail Manager on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
***&lt;/li&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, development, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, workstation, factors, deciding, decision, comparison, ssh, login, visual guide, tunnel, bastille, jail manager</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Mass extinction of UNIX workstations, Determine Who Can Log In to an SSH Server, Factors When Considering FreeBSD vs. Linux Packages, A Visual Guide to SSH Tunnels, Harvesting the Noise While it’s Fresh, Bastille - The Jail Manager on FreeBSD, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.osnews.com/story/135605/the-mass-extinction-of-unix-workstations/" rel="nofollow">The mass extinction of UNIX workstations</a></h3>

<hr>

<h3><a href="https://www.agwa.name/blog/post/whoarethey" rel="nofollow">whoarethey: Determine Who Can Log In to an SSH Server</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://klarasystems.com/articles/freebsd-vs-linux-5-factors-when-considering-freebsd-vs-linux-package-management/" rel="nofollow">FreeBSD vs. Linux 5 Factors When Considering FreeBSD vs. Linux: Packages</a></h3>

<hr>

<h3><a href="https://iximiuz.com/en/posts/ssh-tunnels/" rel="nofollow">A Visual Guide to SSH Tunnels: Local and Remote Port Forwarding</a></h3>

<hr>

<h3><a href="https://medium.com/@peter.hansteen/harvesting-the-noise-while-its-fresh-revisited-3da1894cc8a7" rel="nofollow">Harvesting the Noise While it’s Fresh, Revisited</a></h3>

<hr>

<h3><a href="https://byte--sized-de.translate.goog/linux-unix/bastille-der-jail-manager-unter-freebsd/?_x_tr_sl=de&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp" rel="nofollow">Bastille - The Jail Manager on FreeBSD</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Mass extinction of UNIX workstations, Determine Who Can Log In to an SSH Server, Factors When Considering FreeBSD vs. Linux Packages, A Visual Guide to SSH Tunnels, Harvesting the Noise While it’s Fresh, Bastille - The Jail Manager on FreeBSD, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.osnews.com/story/135605/the-mass-extinction-of-unix-workstations/" rel="nofollow">The mass extinction of UNIX workstations</a></h3>

<hr>

<h3><a href="https://www.agwa.name/blog/post/whoarethey" rel="nofollow">whoarethey: Determine Who Can Log In to an SSH Server</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://klarasystems.com/articles/freebsd-vs-linux-5-factors-when-considering-freebsd-vs-linux-package-management/" rel="nofollow">FreeBSD vs. Linux 5 Factors When Considering FreeBSD vs. Linux: Packages</a></h3>

<hr>

<h3><a href="https://iximiuz.com/en/posts/ssh-tunnels/" rel="nofollow">A Visual Guide to SSH Tunnels: Local and Remote Port Forwarding</a></h3>

<hr>

<h3><a href="https://medium.com/@peter.hansteen/harvesting-the-noise-while-its-fresh-revisited-3da1894cc8a7" rel="nofollow">Harvesting the Noise While it’s Fresh, Revisited</a></h3>

<hr>

<h3><a href="https://byte--sized-de.translate.goog/linux-unix/bastille-der-jail-manager-unter-freebsd/?_x_tr_sl=de&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=wapp" rel="nofollow">Bastille - The Jail Manager on FreeBSD</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>488: Old ping(8) bug</title>
  <link>https://www.bsdnow.tv/488</link>
  <guid isPermaLink="false">0ebed5dc-4761-4816-b5e6-9c17f80612b6</guid>
  <pubDate>Thu, 05 Jan 2023 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0ebed5dc-4761-4816-b5e6-9c17f80612b6.mp3" length="34010112" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Finding a 24 year old bug in ping(8), The Role of Operating Systems in IOT, Authentication gateway with SSH on OpenBSD, FreeBSD 12.4 is out, and more</itunes:subtitle>
  <itunes:duration>35:25</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Finding a 24 year old bug in ping(8), The Role of Operating Systems in IOT, Authentication gateway with SSH on OpenBSD, FreeBSD 12.4 is out, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://tlakh.xyz/fuzzing-ping.html" target="_blank" rel="nofollow noopener"&gt;Fuzzing ping(8) … and finding a 24 year old bug&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/the-role-of-operating-systems-in-iot/" target="_blank" rel="nofollow noopener"&gt;The Role of Operating Systems in IOT&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/%7Esolene/2022-12-01-openbsd-authpf.html" target="_blank" rel="nofollow noopener"&gt;Authentication gateway with SSH on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/archives/freebsd-announce/2022-December/000059.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 12.4 is out&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://github.com/punktDe/vagrant-freebsd-boxbuilder" target="_blank" rel="nofollow noopener"&gt;Vagrant FreeBSD Boxbuilder&lt;/a&gt;&lt;br&gt;
&lt;a href="https://undeadly.org/cgi?action=article;sid=20221212183516" target="_blank" rel="nofollow noopener"&gt;LibreSSL 3.7.0 Released&lt;/a&gt;&lt;br&gt;
&lt;a href="https://opnsense.org/opnsense-22-7-9-released" target="_blank" rel="nofollow noopener"&gt;OPNsense 22.7.9 released&lt;/a&gt;&lt;br&gt;
&lt;a href="https://undeadly.org/cgi?action=article;sid=20221211164822" target="_blank" rel="nofollow noopener"&gt;BIOS Memory Map for vmd(8) Rewrite in Progress&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
***&lt;/li&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, bug, debugging, ping, iot, internet of things, authentication gateway, ssh, fundraising, foundation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Finding a 24 year old bug in ping(8), The Role of Operating Systems in IOT, Authentication gateway with SSH on OpenBSD, FreeBSD 12.4 is out, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://tlakh.xyz/fuzzing-ping.html" rel="nofollow">Fuzzing ping(8) … and finding a 24 year old bug</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/the-role-of-operating-systems-in-iot/" rel="nofollow">The Role of Operating Systems in IOT</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2022-12-01-openbsd-authpf.html" rel="nofollow">Authentication gateway with SSH on OpenBSD</a></h3>

<hr>

<h3><a href="https://lists.freebsd.org/archives/freebsd-announce/2022-December/000059.html" rel="nofollow">FreeBSD 12.4 is out</a></h3>

<hr>

<h2>Beastie Bits</h2>

<p><a href="https://github.com/punktDe/vagrant-freebsd-boxbuilder" rel="nofollow">Vagrant FreeBSD Boxbuilder</a><br>
<a href="https://undeadly.org/cgi?action=article;sid=20221212183516" rel="nofollow">LibreSSL 3.7.0 Released</a><br>
<a href="https://opnsense.org/opnsense-22-7-9-released" rel="nofollow">OPNsense 22.7.9 released</a><br>
<a href="https://undeadly.org/cgi?action=article;sid=20221211164822" rel="nofollow">BIOS Memory Map for vmd(8) Rewrite in Progress</a></p>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Finding a 24 year old bug in ping(8), The Role of Operating Systems in IOT, Authentication gateway with SSH on OpenBSD, FreeBSD 12.4 is out, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://tlakh.xyz/fuzzing-ping.html" rel="nofollow">Fuzzing ping(8) … and finding a 24 year old bug</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/the-role-of-operating-systems-in-iot/" rel="nofollow">The Role of Operating Systems in IOT</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2022-12-01-openbsd-authpf.html" rel="nofollow">Authentication gateway with SSH on OpenBSD</a></h3>

<hr>

<h3><a href="https://lists.freebsd.org/archives/freebsd-announce/2022-December/000059.html" rel="nofollow">FreeBSD 12.4 is out</a></h3>

<hr>

<h2>Beastie Bits</h2>

<p><a href="https://github.com/punktDe/vagrant-freebsd-boxbuilder" rel="nofollow">Vagrant FreeBSD Boxbuilder</a><br>
<a href="https://undeadly.org/cgi?action=article;sid=20221212183516" rel="nofollow">LibreSSL 3.7.0 Released</a><br>
<a href="https://opnsense.org/opnsense-22-7-9-released" rel="nofollow">OPNsense 22.7.9 released</a><br>
<a href="https://undeadly.org/cgi?action=article;sid=20221211164822" rel="nofollow">BIOS Memory Map for vmd(8) Rewrite in Progress</a></p>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>322: Happy Birthday, Unix</title>
  <link>https://www.bsdnow.tv/322</link>
  <guid isPermaLink="false">9f37f100-02f4-4b71-9eeb-3e9fa09f147c</guid>
  <pubDate>Thu, 31 Oct 2019 07:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9f37f100-02f4-4b71-9eeb-3e9fa09f147c.mp3" length="49383869" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Unix is 50, Hunting down Ken's PDP-7, OpenBSD and OPNSense have new releases, Clarification on what GhostBSD is, sshuttle  - VPN over SSH, and more.</itunes:subtitle>
  <itunes:duration>1:07:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Unix is 50, Hunting down Ken's PDP-7, OpenBSD and OPNSense have new releases, Clarification on what GhostBSD is, sshuttle  - VPN over SSH, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bell-labs.com/unix50/" target="_blank" rel="nofollow noopener"&gt;Unix is 50&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; In the summer of 1969 computer scientists Ken Thompson and Dennis Ritchie created the first implementation of Unix with the goal of designing an elegant and economical operating system for a little-used PDP-7 minicomputer at Bell Labs. That modest project, however, would have a far-reaching legacy. Unix made large-scale networking of diverse computing systems — and the Internet — practical. The Unix team went on to develop the C language, which brought an unprecedented combination of efficiency and expressiveness to programming. Both made computing more "portable". Today, Linux, the most popular descendent of Unix, powers the vast majority of servers, and elements of Unix and Linux are found in most mobile devices. Meanwhile C++ remains one of the most widely used programming languages today. Unix may be a half-century old but its influence is only growing.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://bsdimp.blogspot.com/2019/10/video-footage-of-first-pdp-7-to-run-unix.html" target="_blank" rel="nofollow noopener"&gt;Hunting down Ken's PDP-7: video footage found&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; In my prior blog post, I traced Ken's scrounged PDP-7 to SN 34. In this post I'll show that we have actual video footage of that PDP-7 due to an old film from Bell Labs. this gives us almost a minute of footage of the PDP-7 Ken later used to create Unix.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://openbsd.org/66.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.6 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Announce: &lt;a href="https://marc.info/?l=openbsd-tech&amp;amp;m=157132024225971&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;https://marc.info/?l=openbsd-tech&amp;amp;amp;m=157132024225971&amp;amp;amp;w=2&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Upgrade Guide: &lt;a href="https://openbsd.org/faq/upgrade66.html" target="_blank" rel="nofollow noopener"&gt;https://openbsd.org/faq/upgrade66.html&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Changelog: &lt;a href="https://openbsd.org/plus66.html" target="_blank" rel="nofollow noopener"&gt;https://openbsd.org/plus66.html&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://opnsense.org/opnsense-19-7-5-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 19.7.5 released&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Hello friends and followers, Lots of plugin and ports updates this time with a few minor improvements in all core areas. Behind the scenes we are starting to migrate the base system to version&lt;/p&gt;

&lt;p&gt;12.1 which is supposed to hit the next 20.1 release.  Stay tuned for more infos in the next month or so.&lt;/p&gt;

&lt;p&gt;Here are the full patch notes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;system: show all swap partitions in system information widget&lt;/li&gt;
&lt;li&gt;system: flatten services_get() in preparation for removal&lt;/li&gt;
&lt;li&gt;system: pin Syslog-ng version to specific package name&lt;/li&gt;
&lt;li&gt;system: fix LDAP/StartTLS with user import page&lt;/li&gt;
&lt;li&gt;system: fix a PHP warning on authentication server page&lt;/li&gt;
&lt;li&gt;system: replace most subprocess.call use&lt;/li&gt;
&lt;li&gt;interfaces: fix devd handling of carp devices (contributed by stumbaumr)&lt;/li&gt;
&lt;li&gt;firewall: improve firewall rules inline toggles&lt;/li&gt;
&lt;li&gt;firewall: only allow TCP flags on TCP protocol&lt;/li&gt;
&lt;li&gt;firewall: simplify help text for direction setting&lt;/li&gt;
&lt;li&gt;firewall: make protocol log summary case insensitive&lt;/li&gt;
&lt;li&gt;reporting: ignore malformed flow records&lt;/li&gt;
&lt;li&gt;captive portal: fix type mismatch for timeout read&lt;/li&gt;
&lt;li&gt;dhcp: add note for static lease limitation with lease registration (contributed by Northguy)&lt;/li&gt;
&lt;li&gt;ipsec: add margintime and rekeyfuzz options&lt;/li&gt;
&lt;li&gt;ipsec: clear $dpdline correctly if not set&lt;/li&gt;
&lt;li&gt;ui: fix tokenizer reorder on multiple saves&lt;/li&gt;
&lt;li&gt;plugins: os-acme-client 1.26[1]&lt;/li&gt;
&lt;li&gt;plugins: os-bind will reload bind on record change (contributed by blablup)&lt;/li&gt;
&lt;li&gt;plugins: os-etpro-telemetry minor subprocess.call replacement&lt;/li&gt;
&lt;li&gt;plugins: os-freeradius 1.9.4[2]&lt;/li&gt;
&lt;li&gt;plugins: os-frr 1.12[3]&lt;/li&gt;
&lt;li&gt;plugins: os-haproxy 2.19[4]&lt;/li&gt;
&lt;li&gt;plugins: os-mailtrail 1.2[5]&lt;/li&gt;
&lt;li&gt;plugins: os-postfix 1.11[6]&lt;/li&gt;
&lt;li&gt;plugins: os-rspamd 1.8[7]&lt;/li&gt;
&lt;li&gt;plugins: os-sunnyvalley LibreSSL support (contributed by Sunny Valley Networks)&lt;/li&gt;
&lt;li&gt;plugins: os-telegraf 1.7.6[8]&lt;/li&gt;
&lt;li&gt;plugins: os-theme-cicada 1.21 (contributed by Team Rebellion)&lt;/li&gt;
&lt;li&gt;plugins: os-theme-tukan 1.21 (contributed by Team Rebellion)&lt;/li&gt;
&lt;li&gt;plugins: os-tinc minor subprocess.call replacement&lt;/li&gt;
&lt;li&gt;plugins: os-tor 1.8 adds dormant mode disable option (contributed by Fabian Franz)&lt;/li&gt;
&lt;li&gt;plugins: os-virtualbox 1.0 (contributed by andrewhotlab)&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://ghostbsd.org/node/194" target="_blank" rel="nofollow noopener"&gt;Dealing with the misunderstandings of what is GhostBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Since the release of 19.09, I have seen a lot of misunderstandings on what is GhostBSD and the future of GhostBSD. GhostBSD is based on TrueOS with FreeBSD 12 STABLE with our twist to it. We are still continuing to use TrueOS for OpenRC, and the new package's system for the base system that is built from ports. GhostBSD is becoming a slow-moving rolling release base on the latest TrueOS with FreeBSD 12 STABLE. When FreeBSD 13 STABLE gets released, GhostBSD will be upgraded to TrueOS with FreeBSD 13 STABLE.&lt;/p&gt;

&lt;p&gt;&amp;gt; Our official desktop is MATE, which means that the leading developer of GhostBSD does not officially support XFCE. Community releases are maintained by the community and for the community. GhostBSD project will provide help to build and to host the community release. If anyone wants to have a particular desktop supported, it is up to the community. Sure I will help where I can, answer questions and guide new community members that contribute to community release.&lt;/p&gt;

&lt;p&gt;&amp;gt; There is some effort going on for Plasma5 desktop. If anyone is interested in helping with XFCE and Plasma5 or in creating another community release, you are well come to contribute. Also, Contribution to the GhostBSD base system, to ports and new ports, and in house software are welcome. We are mostly active on Telegram &lt;a href="https://t.me/ghostbsd" target="_blank" rel="nofollow noopener"&gt;https://t.me/ghostbsd&lt;/a&gt;, but you can also reach us on the forum.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.terminalbytes.com/sshuttle-vpn-over-ssh-vpn-alternative/" target="_blank" rel="nofollow noopener"&gt;SHUTTLE – VPN over SSH | VPN Alternative&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Looking for a lightweight VPN client, but are not ready to spend a monthly recurring amount on a VPN? VPNs can be expensive depending upon the quality of service and amount of privacy you want. A good VPN plan can easily set you back by 10$ a month and even that doesn’t guarantee your privacy. There is no way to be sure whether the VPN is storing your confidential information and traffic logs or not. sshuttle is the answer to your problem it provides VPN over ssh and in this article we’re going to explore this cheap yet powerful alternative to the expensive VPNs. By using open source tools you can control your own privacy.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;VPN over SSH – sshuttle&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; sshuttle is an awesome program that allows you to create a VPN connection from your local machine to any remote server that you have ssh access on. The tunnel established over the ssh connection can then be used to route all your traffic from client machine through the remote machine including all the dns traffic. In the bare bones sshuttle is just a proxy server which runs on the client machine and forwards all the traffic to a ssh tunnel. Since its open source it holds quite a lot of major advantages over traditional VPN.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.openssh.com/txt/release-8.1" target="_blank" rel="nofollow noopener"&gt;OpenSSH 8.1 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Security&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ssh(1), sshd(8), ssh-add(1), ssh-keygen(1): an exploitable integer overflow bug was found in the private key parsing code for the XMSS key type. This key type is still experimental and support for it is not compiled by default. No user-facing autoconf option exists in portable OpenSSH to enable it. This bug was found by Adam Zabrocki and reported via SecuriTeam's SSD program.&lt;/li&gt;
&lt;li&gt;ssh(1), sshd(8), ssh-agent(1): add protection for private keys at rest in RAM against speculation and memory side-channel attacks like Spectre, Meltdown and Rambleed. This release encrypts private keys when they are not in use with a symmetric key that is derived from a relatively large "prekey" consisting of random data (currently 16KB).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;This release includes a number of changes that may affect existing configurations:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ssh-keygen(1): when acting as a CA and signing certificates with an RSA key, default to using the rsa-sha2-512 signature algorithm. Certificates signed by RSA keys will therefore be incompatible with OpenSSH versions prior to 7.2 unless the default is overridden (using "ssh-keygen -t ssh-rsa -s ...").&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;New Features&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ssh(1): Allow %n to be expanded in ProxyCommand strings&lt;/li&gt;
&lt;li&gt;ssh(1), sshd(8): Allow prepending a list of algorithms to the default set by starting the list with the '&lt;sup&gt;'&lt;/sup&gt; character, E.g. "HostKeyAlgorithms &lt;sup&gt;ssh-ed25519"&lt;/sup&gt;
&lt;/li&gt;
&lt;li&gt;ssh-keygen(1): add an experimental lightweight signature and verification ability. Signatures may be made using regular ssh keys held on disk or stored in a ssh-agent and verified against an authorized_keys-like list of allowed keys. Signatures embed a namespace that prevents confusion and attacks between different usage domains (e.g. files vs email).&lt;/li&gt;
&lt;li&gt;ssh-keygen(1): print key comment when extracting public key from a private key.&lt;/li&gt;
&lt;li&gt;ssh-keygen(1): accept the verbose flag when searching for host keys in known hosts (i.e. "ssh-keygen -vF host") to print the matching host's random-art signature too.&lt;/li&gt;
&lt;li&gt;All: support PKCS8 as an optional format for storage of private keys to disk.  The OpenSSH native key format remains the default, but PKCS8 is a superior format to PEM if interoperability with non-OpenSSH software is required, as it may use a less insecure key derivation function than PEM's.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://twitter.com/jmcwhatever/status/1185584719183962112" target="_blank" rel="nofollow noopener"&gt;Say goodbye to the 32 CPU limit in NetBSD/aarch64&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/channel/UCvcdrOSlYOSzOzLjv_n1_GQ/videos" target="_blank" rel="nofollow noopener"&gt;vBSDcon 2019 videos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=3Hfda0Tjqsg&amp;amp;feature=youtu.be" target="_blank" rel="nofollow noopener"&gt;Browse the web in the terminal - W3M&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://netbsd.org/%7Ekamil/GSoC2019.html#slide1" target="_blank" rel="nofollow noopener"&gt;NetBSD 9 and GSoC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/playlist?list=PLeF8ZihVdpFegPoAKppaDSoYmsBvpnSZv" target="_blank" rel="nofollow noopener"&gt;BSDCan 2019 Videos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.nycbug.org/index?action=view&amp;amp;id=10673" target="_blank" rel="nofollow noopener"&gt;NYC*BUG Install Fest: Nov 6th 18:45 @ Suspenders&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsdfoundation.org/blog/freebsd-miniconf-at-linux-conf-au-2020-call-for-sessions-now-open/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Miniconf at linux.conf.au 2020 Call for Sessions Now Open&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://people.freebsd.org/%7Erodrigo/fosdem20/" target="_blank" rel="nofollow noopener"&gt;FOSDEM 2020 - BSD Devroom Call for Participation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/ed_maste/status/1184865668317007874" target="_blank" rel="nofollow noopener"&gt;University of Cambridge looking for Research Assistants/Associates&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Trenton - &lt;a href="http://dpaste.com/0ZEXNM6#wrap" target="_blank" rel="nofollow noopener"&gt;Beeping Thinkpad&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Alex - &lt;a href="http://dpaste.com/1K31A65#wrap" target="_blank" rel="nofollow noopener"&gt;Per user ZFS Datasets&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D2272" target="_blank" rel="nofollow noopener"&gt;Allan’s old patch from 2015&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Javier - &lt;a href="http://dpaste.com/1XX4NNA#wrap" target="_blank" rel="nofollow noopener"&gt;FBSD 12.0 + ZFS + encryption&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0322.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, unix, 50 years unix, pdp 7, pdp, release, opnsense, ghostbsd, sshuttle, vpn, ssh, vpn over ssh, openssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Unix is 50, Hunting down Ken&#39;s PDP-7, OpenBSD and OPNSense have new releases, Clarification on what GhostBSD is, sshuttle  - VPN over SSH, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.bell-labs.com/unix50/" rel="nofollow">Unix is 50</a></h3>

<blockquote>
<p>In the summer of 1969 computer scientists Ken Thompson and Dennis Ritchie created the first implementation of Unix with the goal of designing an elegant and economical operating system for a little-used PDP-7 minicomputer at Bell Labs. That modest project, however, would have a far-reaching legacy. Unix made large-scale networking of diverse computing systems — and the Internet — practical. The Unix team went on to develop the C language, which brought an unprecedented combination of efficiency and expressiveness to programming. Both made computing more &quot;portable&quot;. Today, Linux, the most popular descendent of Unix, powers the vast majority of servers, and elements of Unix and Linux are found in most mobile devices. Meanwhile C++ remains one of the most widely used programming languages today. Unix may be a half-century old but its influence is only growing.</p>
</blockquote>

<hr>

<h3><a href="https://bsdimp.blogspot.com/2019/10/video-footage-of-first-pdp-7-to-run-unix.html" rel="nofollow">Hunting down Ken&#39;s PDP-7: video footage found</a></h3>

<blockquote>
<p>In my prior blog post, I traced Ken&#39;s scrounged PDP-7 to SN 34. In this post I&#39;ll show that we have actual video footage of that PDP-7 due to an old film from Bell Labs. this gives us almost a minute of footage of the PDP-7 Ken later used to create Unix.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://openbsd.org/66.html" rel="nofollow">OpenBSD 6.6 Released</a></h3>

<ul>
<li>Announce: <a href="https://marc.info/?l=openbsd-tech&m=157132024225971&w=2" rel="nofollow">https://marc.info/?l=openbsd-tech&amp;m=157132024225971&amp;w=2</a></li>
<li>Upgrade Guide: <a href="https://openbsd.org/faq/upgrade66.html" rel="nofollow">https://openbsd.org/faq/upgrade66.html</a></li>
<li>Changelog: <a href="https://openbsd.org/plus66.html" rel="nofollow">https://openbsd.org/plus66.html</a></li>
</ul>

<hr>

<h3><a href="https://opnsense.org/opnsense-19-7-5-released/" rel="nofollow">OPNsense 19.7.5 released</a></h3>

<blockquote>
<p>Hello friends and followers, Lots of plugin and ports updates this time with a few minor improvements in all core areas. Behind the scenes we are starting to migrate the base system to version</p>
</blockquote>

<p>12.1 which is supposed to hit the next 20.1 release.  Stay tuned for more infos in the next month or so.</p>

<p>Here are the full patch notes:</p>

<ul>
<li>system: show all swap partitions in system information widget</li>
<li>system: flatten services_get() in preparation for removal</li>
<li>system: pin Syslog-ng version to specific package name</li>
<li>system: fix LDAP/StartTLS with user import page</li>
<li>system: fix a PHP warning on authentication server page</li>
<li>system: replace most subprocess.call use</li>
<li>interfaces: fix devd handling of carp devices (contributed by stumbaumr)</li>
<li>firewall: improve firewall rules inline toggles</li>
<li>firewall: only allow TCP flags on TCP protocol</li>
<li>firewall: simplify help text for direction setting</li>
<li>firewall: make protocol log summary case insensitive</li>
<li>reporting: ignore malformed flow records</li>
<li>captive portal: fix type mismatch for timeout read</li>
<li>dhcp: add note for static lease limitation with lease registration (contributed by Northguy)</li>
<li>ipsec: add margintime and rekeyfuzz options</li>
<li>ipsec: clear $dpdline correctly if not set</li>
<li>ui: fix tokenizer reorder on multiple saves</li>
<li>plugins: os-acme-client 1.26[1]</li>
<li>plugins: os-bind will reload bind on record change (contributed by blablup)</li>
<li>plugins: os-etpro-telemetry minor subprocess.call replacement</li>
<li>plugins: os-freeradius 1.9.4[2]</li>
<li>plugins: os-frr 1.12[3]</li>
<li>plugins: os-haproxy 2.19[4]</li>
<li>plugins: os-mailtrail 1.2[5]</li>
<li>plugins: os-postfix 1.11[6]</li>
<li>plugins: os-rspamd 1.8[7]</li>
<li>plugins: os-sunnyvalley LibreSSL support (contributed by Sunny Valley Networks)</li>
<li>plugins: os-telegraf 1.7.6[8]</li>
<li>plugins: os-theme-cicada 1.21 (contributed by Team Rebellion)</li>
<li>plugins: os-theme-tukan 1.21 (contributed by Team Rebellion)</li>
<li>plugins: os-tinc minor subprocess.call replacement</li>
<li>plugins: os-tor 1.8 adds dormant mode disable option (contributed by Fabian Franz)</li>
<li>plugins: os-virtualbox 1.0 (contributed by andrewhotlab)</li>
</ul>

<hr>

<h3><a href="http://ghostbsd.org/node/194" rel="nofollow">Dealing with the misunderstandings of what is GhostBSD</a></h3>

<blockquote>
<p>Since the release of 19.09, I have seen a lot of misunderstandings on what is GhostBSD and the future of GhostBSD. GhostBSD is based on TrueOS with FreeBSD 12 STABLE with our twist to it. We are still continuing to use TrueOS for OpenRC, and the new package&#39;s system for the base system that is built from ports. GhostBSD is becoming a slow-moving rolling release base on the latest TrueOS with FreeBSD 12 STABLE. When FreeBSD 13 STABLE gets released, GhostBSD will be upgraded to TrueOS with FreeBSD 13 STABLE.</p>

<p>Our official desktop is MATE, which means that the leading developer of GhostBSD does not officially support XFCE. Community releases are maintained by the community and for the community. GhostBSD project will provide help to build and to host the community release. If anyone wants to have a particular desktop supported, it is up to the community. Sure I will help where I can, answer questions and guide new community members that contribute to community release.</p>

<p>There is some effort going on for Plasma5 desktop. If anyone is interested in helping with XFCE and Plasma5 or in creating another community release, you are well come to contribute. Also, Contribution to the GhostBSD base system, to ports and new ports, and in house software are welcome. We are mostly active on Telegram <a href="https://t.me/ghostbsd" rel="nofollow">https://t.me/ghostbsd</a>, but you can also reach us on the forum.</p>
</blockquote>

<hr>

<h3><a href="https://www.terminalbytes.com/sshuttle-vpn-over-ssh-vpn-alternative/" rel="nofollow">SHUTTLE – VPN over SSH | VPN Alternative</a></h3>

<blockquote>
<p>Looking for a lightweight VPN client, but are not ready to spend a monthly recurring amount on a VPN? VPNs can be expensive depending upon the quality of service and amount of privacy you want. A good VPN plan can easily set you back by 10$ a month and even that doesn’t guarantee your privacy. There is no way to be sure whether the VPN is storing your confidential information and traffic logs or not. sshuttle is the answer to your problem it provides VPN over ssh and in this article we’re going to explore this cheap yet powerful alternative to the expensive VPNs. By using open source tools you can control your own privacy.</p>
</blockquote>

<ul>
<li>VPN over SSH – sshuttle</li>
</ul>

<blockquote>
<p>sshuttle is an awesome program that allows you to create a VPN connection from your local machine to any remote server that you have ssh access on. The tunnel established over the ssh connection can then be used to route all your traffic from client machine through the remote machine including all the dns traffic. In the bare bones sshuttle is just a proxy server which runs on the client machine and forwards all the traffic to a ssh tunnel. Since its open source it holds quite a lot of major advantages over traditional VPN.</p>
</blockquote>

<hr>

<h3><a href="http://www.openssh.com/txt/release-8.1" rel="nofollow">OpenSSH 8.1 Released</a></h3>

<ul>
<li><p>Security</p>

<ul>
<li>ssh(1), sshd(8), ssh-add(1), ssh-keygen(1): an exploitable integer overflow bug was found in the private key parsing code for the XMSS key type. This key type is still experimental and support for it is not compiled by default. No user-facing autoconf option exists in portable OpenSSH to enable it. This bug was found by Adam Zabrocki and reported via SecuriTeam&#39;s SSD program.</li>
<li>ssh(1), sshd(8), ssh-agent(1): add protection for private keys at rest in RAM against speculation and memory side-channel attacks like Spectre, Meltdown and Rambleed. This release encrypts private keys when they are not in use with a symmetric key that is derived from a relatively large &quot;prekey&quot; consisting of random data (currently 16KB).</li>
</ul></li>
<li><p>This release includes a number of changes that may affect existing configurations:</p>

<ul>
<li>ssh-keygen(1): when acting as a CA and signing certificates with an RSA key, default to using the rsa-sha2-512 signature algorithm. Certificates signed by RSA keys will therefore be incompatible with OpenSSH versions prior to 7.2 unless the default is overridden (using &quot;ssh-keygen -t ssh-rsa -s ...&quot;).</li>
</ul></li>
<li><p>New Features</p>

<ul>
<li>ssh(1): Allow %n to be expanded in ProxyCommand strings</li>
<li>ssh(1), sshd(8): Allow prepending a list of algorithms to the default set by starting the list with the &#39;<sup>&#39;</sup> character, E.g. &quot;HostKeyAlgorithms <sup>ssh-ed25519&quot;</sup></li>
<li>ssh-keygen(1): add an experimental lightweight signature and verification ability. Signatures may be made using regular ssh keys held on disk or stored in a ssh-agent and verified against an authorized_keys-like list of allowed keys. Signatures embed a namespace that prevents confusion and attacks between different usage domains (e.g. files vs email).</li>
<li>ssh-keygen(1): print key comment when extracting public key from a private key.</li>
<li>ssh-keygen(1): accept the verbose flag when searching for host keys in known hosts (i.e. &quot;ssh-keygen -vF host&quot;) to print the matching host&#39;s random-art signature too.</li>
<li>All: support PKCS8 as an optional format for storage of private keys to disk.  The OpenSSH native key format remains the default, but PKCS8 is a superior format to PEM if interoperability with non-OpenSSH software is required, as it may use a less insecure key derivation function than PEM&#39;s.</li>
</ul></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/jmcwhatever/status/1185584719183962112" rel="nofollow">Say goodbye to the 32 CPU limit in NetBSD/aarch64</a></li>
<li><a href="https://www.youtube.com/channel/UCvcdrOSlYOSzOzLjv_n1_GQ/videos" rel="nofollow">vBSDcon 2019 videos</a></li>
<li><a href="https://www.youtube.com/watch?v=3Hfda0Tjqsg&feature=youtu.be" rel="nofollow">Browse the web in the terminal - W3M</a></li>
<li><a href="http://netbsd.org/%7Ekamil/GSoC2019.html#slide1" rel="nofollow">NetBSD 9 and GSoC</a></li>
<li><a href="https://www.youtube.com/playlist?list=PLeF8ZihVdpFegPoAKppaDSoYmsBvpnSZv" rel="nofollow">BSDCan 2019 Videos</a></li>
<li><a href="https://www.nycbug.org/index?action=view&id=10673" rel="nofollow">NYC*BUG Install Fest: Nov 6th 18:45 @ Suspenders</a></li>
<li><a href="https://www.freebsdfoundation.org/blog/freebsd-miniconf-at-linux-conf-au-2020-call-for-sessions-now-open/" rel="nofollow">FreeBSD Miniconf at linux.conf.au 2020 Call for Sessions Now Open</a></li>
<li><a href="https://people.freebsd.org/%7Erodrigo/fosdem20/" rel="nofollow">FOSDEM 2020 - BSD Devroom Call for Participation</a></li>
<li><a href="https://twitter.com/ed_maste/status/1184865668317007874" rel="nofollow">University of Cambridge looking for Research Assistants/Associates</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Trenton - <a href="http://dpaste.com/0ZEXNM6#wrap" rel="nofollow">Beeping Thinkpad</a></li>
<li>Alex - <a href="http://dpaste.com/1K31A65#wrap" rel="nofollow">Per user ZFS Datasets</a>

<ul>
<li><a href="https://reviews.freebsd.org/D2272" rel="nofollow">Allan’s old patch from 2015</a></li>
</ul></li>
<li>Javier - <a href="http://dpaste.com/1XX4NNA#wrap" rel="nofollow">FBSD 12.0 + ZFS + encryption</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0322.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Unix is 50, Hunting down Ken&#39;s PDP-7, OpenBSD and OPNSense have new releases, Clarification on what GhostBSD is, sshuttle  - VPN over SSH, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.bell-labs.com/unix50/" rel="nofollow">Unix is 50</a></h3>

<blockquote>
<p>In the summer of 1969 computer scientists Ken Thompson and Dennis Ritchie created the first implementation of Unix with the goal of designing an elegant and economical operating system for a little-used PDP-7 minicomputer at Bell Labs. That modest project, however, would have a far-reaching legacy. Unix made large-scale networking of diverse computing systems — and the Internet — practical. The Unix team went on to develop the C language, which brought an unprecedented combination of efficiency and expressiveness to programming. Both made computing more &quot;portable&quot;. Today, Linux, the most popular descendent of Unix, powers the vast majority of servers, and elements of Unix and Linux are found in most mobile devices. Meanwhile C++ remains one of the most widely used programming languages today. Unix may be a half-century old but its influence is only growing.</p>
</blockquote>

<hr>

<h3><a href="https://bsdimp.blogspot.com/2019/10/video-footage-of-first-pdp-7-to-run-unix.html" rel="nofollow">Hunting down Ken&#39;s PDP-7: video footage found</a></h3>

<blockquote>
<p>In my prior blog post, I traced Ken&#39;s scrounged PDP-7 to SN 34. In this post I&#39;ll show that we have actual video footage of that PDP-7 due to an old film from Bell Labs. this gives us almost a minute of footage of the PDP-7 Ken later used to create Unix.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://openbsd.org/66.html" rel="nofollow">OpenBSD 6.6 Released</a></h3>

<ul>
<li>Announce: <a href="https://marc.info/?l=openbsd-tech&m=157132024225971&w=2" rel="nofollow">https://marc.info/?l=openbsd-tech&amp;m=157132024225971&amp;w=2</a></li>
<li>Upgrade Guide: <a href="https://openbsd.org/faq/upgrade66.html" rel="nofollow">https://openbsd.org/faq/upgrade66.html</a></li>
<li>Changelog: <a href="https://openbsd.org/plus66.html" rel="nofollow">https://openbsd.org/plus66.html</a></li>
</ul>

<hr>

<h3><a href="https://opnsense.org/opnsense-19-7-5-released/" rel="nofollow">OPNsense 19.7.5 released</a></h3>

<blockquote>
<p>Hello friends and followers, Lots of plugin and ports updates this time with a few minor improvements in all core areas. Behind the scenes we are starting to migrate the base system to version</p>
</blockquote>

<p>12.1 which is supposed to hit the next 20.1 release.  Stay tuned for more infos in the next month or so.</p>

<p>Here are the full patch notes:</p>

<ul>
<li>system: show all swap partitions in system information widget</li>
<li>system: flatten services_get() in preparation for removal</li>
<li>system: pin Syslog-ng version to specific package name</li>
<li>system: fix LDAP/StartTLS with user import page</li>
<li>system: fix a PHP warning on authentication server page</li>
<li>system: replace most subprocess.call use</li>
<li>interfaces: fix devd handling of carp devices (contributed by stumbaumr)</li>
<li>firewall: improve firewall rules inline toggles</li>
<li>firewall: only allow TCP flags on TCP protocol</li>
<li>firewall: simplify help text for direction setting</li>
<li>firewall: make protocol log summary case insensitive</li>
<li>reporting: ignore malformed flow records</li>
<li>captive portal: fix type mismatch for timeout read</li>
<li>dhcp: add note for static lease limitation with lease registration (contributed by Northguy)</li>
<li>ipsec: add margintime and rekeyfuzz options</li>
<li>ipsec: clear $dpdline correctly if not set</li>
<li>ui: fix tokenizer reorder on multiple saves</li>
<li>plugins: os-acme-client 1.26[1]</li>
<li>plugins: os-bind will reload bind on record change (contributed by blablup)</li>
<li>plugins: os-etpro-telemetry minor subprocess.call replacement</li>
<li>plugins: os-freeradius 1.9.4[2]</li>
<li>plugins: os-frr 1.12[3]</li>
<li>plugins: os-haproxy 2.19[4]</li>
<li>plugins: os-mailtrail 1.2[5]</li>
<li>plugins: os-postfix 1.11[6]</li>
<li>plugins: os-rspamd 1.8[7]</li>
<li>plugins: os-sunnyvalley LibreSSL support (contributed by Sunny Valley Networks)</li>
<li>plugins: os-telegraf 1.7.6[8]</li>
<li>plugins: os-theme-cicada 1.21 (contributed by Team Rebellion)</li>
<li>plugins: os-theme-tukan 1.21 (contributed by Team Rebellion)</li>
<li>plugins: os-tinc minor subprocess.call replacement</li>
<li>plugins: os-tor 1.8 adds dormant mode disable option (contributed by Fabian Franz)</li>
<li>plugins: os-virtualbox 1.0 (contributed by andrewhotlab)</li>
</ul>

<hr>

<h3><a href="http://ghostbsd.org/node/194" rel="nofollow">Dealing with the misunderstandings of what is GhostBSD</a></h3>

<blockquote>
<p>Since the release of 19.09, I have seen a lot of misunderstandings on what is GhostBSD and the future of GhostBSD. GhostBSD is based on TrueOS with FreeBSD 12 STABLE with our twist to it. We are still continuing to use TrueOS for OpenRC, and the new package&#39;s system for the base system that is built from ports. GhostBSD is becoming a slow-moving rolling release base on the latest TrueOS with FreeBSD 12 STABLE. When FreeBSD 13 STABLE gets released, GhostBSD will be upgraded to TrueOS with FreeBSD 13 STABLE.</p>

<p>Our official desktop is MATE, which means that the leading developer of GhostBSD does not officially support XFCE. Community releases are maintained by the community and for the community. GhostBSD project will provide help to build and to host the community release. If anyone wants to have a particular desktop supported, it is up to the community. Sure I will help where I can, answer questions and guide new community members that contribute to community release.</p>

<p>There is some effort going on for Plasma5 desktop. If anyone is interested in helping with XFCE and Plasma5 or in creating another community release, you are well come to contribute. Also, Contribution to the GhostBSD base system, to ports and new ports, and in house software are welcome. We are mostly active on Telegram <a href="https://t.me/ghostbsd" rel="nofollow">https://t.me/ghostbsd</a>, but you can also reach us on the forum.</p>
</blockquote>

<hr>

<h3><a href="https://www.terminalbytes.com/sshuttle-vpn-over-ssh-vpn-alternative/" rel="nofollow">SHUTTLE – VPN over SSH | VPN Alternative</a></h3>

<blockquote>
<p>Looking for a lightweight VPN client, but are not ready to spend a monthly recurring amount on a VPN? VPNs can be expensive depending upon the quality of service and amount of privacy you want. A good VPN plan can easily set you back by 10$ a month and even that doesn’t guarantee your privacy. There is no way to be sure whether the VPN is storing your confidential information and traffic logs or not. sshuttle is the answer to your problem it provides VPN over ssh and in this article we’re going to explore this cheap yet powerful alternative to the expensive VPNs. By using open source tools you can control your own privacy.</p>
</blockquote>

<ul>
<li>VPN over SSH – sshuttle</li>
</ul>

<blockquote>
<p>sshuttle is an awesome program that allows you to create a VPN connection from your local machine to any remote server that you have ssh access on. The tunnel established over the ssh connection can then be used to route all your traffic from client machine through the remote machine including all the dns traffic. In the bare bones sshuttle is just a proxy server which runs on the client machine and forwards all the traffic to a ssh tunnel. Since its open source it holds quite a lot of major advantages over traditional VPN.</p>
</blockquote>

<hr>

<h3><a href="http://www.openssh.com/txt/release-8.1" rel="nofollow">OpenSSH 8.1 Released</a></h3>

<ul>
<li><p>Security</p>

<ul>
<li>ssh(1), sshd(8), ssh-add(1), ssh-keygen(1): an exploitable integer overflow bug was found in the private key parsing code for the XMSS key type. This key type is still experimental and support for it is not compiled by default. No user-facing autoconf option exists in portable OpenSSH to enable it. This bug was found by Adam Zabrocki and reported via SecuriTeam&#39;s SSD program.</li>
<li>ssh(1), sshd(8), ssh-agent(1): add protection for private keys at rest in RAM against speculation and memory side-channel attacks like Spectre, Meltdown and Rambleed. This release encrypts private keys when they are not in use with a symmetric key that is derived from a relatively large &quot;prekey&quot; consisting of random data (currently 16KB).</li>
</ul></li>
<li><p>This release includes a number of changes that may affect existing configurations:</p>

<ul>
<li>ssh-keygen(1): when acting as a CA and signing certificates with an RSA key, default to using the rsa-sha2-512 signature algorithm. Certificates signed by RSA keys will therefore be incompatible with OpenSSH versions prior to 7.2 unless the default is overridden (using &quot;ssh-keygen -t ssh-rsa -s ...&quot;).</li>
</ul></li>
<li><p>New Features</p>

<ul>
<li>ssh(1): Allow %n to be expanded in ProxyCommand strings</li>
<li>ssh(1), sshd(8): Allow prepending a list of algorithms to the default set by starting the list with the &#39;<sup>&#39;</sup> character, E.g. &quot;HostKeyAlgorithms <sup>ssh-ed25519&quot;</sup></li>
<li>ssh-keygen(1): add an experimental lightweight signature and verification ability. Signatures may be made using regular ssh keys held on disk or stored in a ssh-agent and verified against an authorized_keys-like list of allowed keys. Signatures embed a namespace that prevents confusion and attacks between different usage domains (e.g. files vs email).</li>
<li>ssh-keygen(1): print key comment when extracting public key from a private key.</li>
<li>ssh-keygen(1): accept the verbose flag when searching for host keys in known hosts (i.e. &quot;ssh-keygen -vF host&quot;) to print the matching host&#39;s random-art signature too.</li>
<li>All: support PKCS8 as an optional format for storage of private keys to disk.  The OpenSSH native key format remains the default, but PKCS8 is a superior format to PEM if interoperability with non-OpenSSH software is required, as it may use a less insecure key derivation function than PEM&#39;s.</li>
</ul></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/jmcwhatever/status/1185584719183962112" rel="nofollow">Say goodbye to the 32 CPU limit in NetBSD/aarch64</a></li>
<li><a href="https://www.youtube.com/channel/UCvcdrOSlYOSzOzLjv_n1_GQ/videos" rel="nofollow">vBSDcon 2019 videos</a></li>
<li><a href="https://www.youtube.com/watch?v=3Hfda0Tjqsg&feature=youtu.be" rel="nofollow">Browse the web in the terminal - W3M</a></li>
<li><a href="http://netbsd.org/%7Ekamil/GSoC2019.html#slide1" rel="nofollow">NetBSD 9 and GSoC</a></li>
<li><a href="https://www.youtube.com/playlist?list=PLeF8ZihVdpFegPoAKppaDSoYmsBvpnSZv" rel="nofollow">BSDCan 2019 Videos</a></li>
<li><a href="https://www.nycbug.org/index?action=view&id=10673" rel="nofollow">NYC*BUG Install Fest: Nov 6th 18:45 @ Suspenders</a></li>
<li><a href="https://www.freebsdfoundation.org/blog/freebsd-miniconf-at-linux-conf-au-2020-call-for-sessions-now-open/" rel="nofollow">FreeBSD Miniconf at linux.conf.au 2020 Call for Sessions Now Open</a></li>
<li><a href="https://people.freebsd.org/%7Erodrigo/fosdem20/" rel="nofollow">FOSDEM 2020 - BSD Devroom Call for Participation</a></li>
<li><a href="https://twitter.com/ed_maste/status/1184865668317007874" rel="nofollow">University of Cambridge looking for Research Assistants/Associates</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Trenton - <a href="http://dpaste.com/0ZEXNM6#wrap" rel="nofollow">Beeping Thinkpad</a></li>
<li>Alex - <a href="http://dpaste.com/1K31A65#wrap" rel="nofollow">Per user ZFS Datasets</a>

<ul>
<li><a href="https://reviews.freebsd.org/D2272" rel="nofollow">Allan’s old patch from 2015</a></li>
</ul></li>
<li>Javier - <a href="http://dpaste.com/1XX4NNA#wrap" rel="nofollow">FBSD 12.0 + ZFS + encryption</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0322.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>298: BSD On The Road</title>
  <link>https://www.bsdnow.tv/298</link>
  <guid isPermaLink="false">85a43874-a080-4a57-9fb0-2a0210e9718e</guid>
  <pubDate>Wed, 15 May 2019 23:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/85a43874-a080-4a57-9fb0-2a0210e9718e.mp3" length="31937689" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>36 year old UFS bug fixed, a BSD for the road, automatic upgrades with OpenBSD, DTrace ext2fs support in FreeBSD, Dedicated SSH tunnel user, upgrading VMM VMs to OpenBSD 6.5, and more.</itunes:subtitle>
  <itunes:duration>52:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;36 year old UFS bug fixed, a BSD for the road, automatic upgrades with OpenBSD, DTrace ext2fs support in FreeBSD, Dedicated SSH tunnel user, upgrading VMM VMs to OpenBSD 6.5, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=347066" target="_blank" rel="nofollow noopener"&gt;36+ year old bug in FFS/UFS discovered and patched &lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;This update eliminates a kernel stack disclosure bug in UFS/FFS directory entries that is caused by uninitialized directory entry padding written to the disk.&lt;/p&gt;
  
  &lt;ul&gt;
  &lt;li&gt;When the directory entry is written to disk, it is written as a full 32bit entry, and the unused bytes were not initialized, so could possibly contain sensitive data from the kernel stack
  It can be viewed by any user with read access to that directory. Up to 3 bytes of kernel stack are disclosed per file entry, depending on the the amount of padding the kernel needs to pad out the entry to a 32 bit boundary. The offset in the kernel stack that is disclosed is a function of the filename size. Furthermore, if the user can create files in a directory, this 3 byte window can be expanded 3 bytes at a time to a 254 byte window with 75% of the data in that window exposed. The additional exposure is done by removing the entry, creating a new entry with a 4-byte longer name, extracting 3 more bytes by reading the directory, and repeating until a 252 byte name is created.
  This exploit works in part because the area of the kernel stack that is being disclosed is in an area that typically doesn't change that often (perhaps a few times a second on a lightly loaded system), and these file creates and unlinks themselves don't overwrite the area of kernel stack being disclosed.
  It appears that this bug originated with the creation of the Fast File System in 4.1b-BSD (Circa 1982, more than 36 years ago!), and is likely present in every Unix or Unix-like system that uses UFS/FFS. Amazingly, nobody noticed until now.
  This update also adds the -z flag to fsck_ffs to have it scrub the leaked information in the name padding of existing directories. It only needs to be run once on each UFS/FFS filesystem after a patched kernel is installed and running.
  Submitted by: David G. Lawrence &lt;a href="mailto:dg@dglawrence.com" target="_blank" rel="nofollow noopener"&gt;dg@dglawrence.com&lt;/a&gt;
&lt;/li&gt;
  
  &lt;li&gt;So a patched kernel will no longer leak this data, and running the &lt;code&gt;fsck_ffs -z&lt;/code&gt; command will erase any leaked data that may exist on your system&lt;/li&gt;
  
  &lt;li&gt;
&lt;a href="https://marc.info/?l=openbsd-cvs&amp;amp;m=155699268122858&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD commit with additional detail on mitigations&lt;/a&gt;
  The impact on OpenBSD is very limited:
  1 - such stack bytes can be found in raw-device reads, from group operator. If you can read the raw disks you can undertake other more powerful actions.
  2 - read(2) upon directory fd was disabled July 1997 because I didn't like how grep * would display garbage and mess up the tty, and applying vis(3) for just directory reads seemed silly.  read(2) was changed to return 0 (EOF).  Sep 2016 this was further changed to EISDIR, so you still cannot see the bad bytes.
  3 - In 2013 when guenther adapted the getdents(2) directory-reading system call to 64-bit ino_t, the userland data format changed to 8-byte-alignment, making it incompatible with the 4-byte-alignment UFS on-disk format.  As a result of code refactoring the bad bytes were not copied to userland. Bad bytes will remain in old directories on old filesystems, but nothing makes those bytes user visible.
  There will be no errata or syspatch issued.  I urge other systems which do expose the information to userland to issue errata quickly, since this is a 254 byte infoleak of the stack which is great for ROP-chain building to attack some other bug. Especially if the kernel has no layout/link-order randomization ...&lt;/li&gt;
  &lt;/ul&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://itsfoss.com/nomadbsd/" target="_blank" rel="nofollow noopener"&gt;NomadBSD, a BSD for the Road&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;As regular It’s FOSS readers should know, I like diving into the world of BSDs. Recently, I came across an interesting BSD that is designed to live on a thumb drive. Let’s take a look at NomadBSD.
  NomadBSD is different than most available BSDs. NomadBSD is a live system based on FreeBSD. It comes with automatic hardware detection and an initial config tool. NomadBSD is designed to “be used as a desktop system that works out of the box, but can also be used for data recovery, for educational purposes, or to test FreeBSD’s hardware compatibility.”
  This German BSD comes with an OpenBox-based desktop with the Plank application dock. NomadBSD makes use of the DSB project. DSB stands for “Desktop Suite (for) (Free)BSD” and consists of a collection of programs designed to create a simple and working environment without needing a ton of dependencies to use one tool. DSB is created by Marcel Kaiser one of the lead devs of NomadBSD.
  Just like the original BSD projects, you can contact the NomadBSD developers via a mailing list.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Version 1.2 Released&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;NomadBSD recently released version 1.2 on April 21, 2019. This means that NomadBSD is now based on FreeBSD 12.0-p3. TRIM is now enabled by default. One of the biggest changes is that the initial command-line setup was replaced with a Qt graphical interface. They also added a Qt5 tool to install NomadBSD to your hard drive. A number of fixes were included to improve graphics support. They also added support for creating 32-bit images.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Thoughts on NomadBSD&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;I first discovered NomadBSD back in January when they released 1.2-RC1. At the time, I had been unable to install Project Trident on my laptop and was very frustrated with BSDs. I downloaded NomadBSD and tried it out. I initially ran into issues reaching the desktop, but RC2 fixed that issue. However, I was unable to get on the internet, even though I had an Ethernet cable plugged in. Luckily, I found the wifi manager in the menu and was able to connect to my wifi.
  Overall, my experience with NomadBSD was pleasant. Once I figured out a few things, I was good to go. I hope that NomadBSD is the first of a new generation of BSDs that focus on mobility and ease of use. BSD has conquered the server world, it’s about time they figured out how to be more user-friendly.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;[OpenBSD automatic&lt;/h3&gt;

&lt;p&gt;upgrade](https://www.tumfatig.net/20190426/openbsd-automatic-upgrade/)&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;OpenBSD 6.5 advertises for an installer improvement: rdsetroot(8) (a build-time tool) is now available for general use. Used in combination with autoinstall.8, it is now really easy to do automatic upgrades of your OpenBSD instances.
  I first manually upgraded my OpenBSD sandbox to 6.5. Once that was done, I could use the stock rdsetroot(8) tool. The plan is quite simple: write an unattended installation response file, insert it to a bsd.rd 6.5 installation image and reboot my other OpenBSD instances using that image.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Extra notes&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;There must be a way to run onetime commands (in the manner of fw_update) to automatically run sysmerge and packages upgrades. As for now, I’d rather do it manually.
  This worked like a charm on two Synology KVM instances using a single sd0 disk, on my Thinkpad X260 using Encrypted root with Keydisk and on a Vultr instance using Encrypted root with passphrase. And BTW, the upgrade on the X260 used the (iwn0) wireless connection.
  I just read that florian@ has released the sysupgrade(8) utility which should be released with OpenBSD 6.6. That will make upgrades even easier! Until then, happy upgrading.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://reviews.freebsd.org/D19848" target="_blank" rel="nofollow noopener"&gt;FreeBSD Dtrace ext2fs Support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Which logs were replaced by dtrace-probes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Misc printf's under DEBUG macro in the blocks allocation path.&lt;/li&gt;

&lt;li&gt;Different on-disk structures validation errors, now the filesystem will silently return EIO's.&lt;/li&gt;

&lt;li&gt;Misc checksum errors, same as above.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;&lt;p&gt;The only debug macro, which was leaved is EXT2FS&lt;em&gt;PRINT&lt;/em&gt;EXTENTS.&lt;/p&gt;&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;&lt;p&gt;It is impossible to replace it by dtrace-probes, because the additional logic is required to walk thru file extents.&lt;/p&gt;&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;

&lt;p&gt;The user still be able to see mount errors in the dmesg in case of:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Filesystem features incompatibility.&lt;/li&gt;

&lt;p&gt;&lt;/p&gt;
&lt;li&gt;Superblock checksum error.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/~solene/2019-04-17-ssh-tunneling.html" target="_blank" rel="nofollow noopener"&gt;Create a dedicated user for ssh tunneling only&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;I use ssh tunneling A LOT, for everything. Yesterday, I removed the public access of my IMAP server, it’s now only available through ssh tunneling to access the daemon listening on localhost. I have plenty of daemons listening only on localhost that I can only reach through a ssh tunnel. If you don’t want to bother with ssh and redirect ports you need, you can also make a VPN (using ssh, openvpn, iked, tinc…) between your system and your server. I tend to avoid setting up VPN for the current use case as it requires more work and more maintenance than running ssh server and a ssh client.
  The last change, for my IMAP server, added an issue. I want my phone to access the IMAP server but I don’t want to connect to my main account from my phone for security reasons. So, I need a dedicated user that will only be allowed to forward ports.
  This is done very easily on OpenBSD.
  The steps are: 1. generate ssh keys for the new user 2. add an user with no password 3. allow public key for port forwarding
  Obviously, you must allow users (or only this one) to make port forwarding in your sshd_config.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://openbsd.amsterdam/upgrade.html" target="_blank" rel="nofollow noopener"&gt;That was easy. Some info on upgrading VMM VMs to 6.5&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;We're running dedicated vmm(4)/vmd(8) servers to host opinionated VMs.
  OpenBSD 6.5 is released! There are two ways you can upgrade your VM.
  Either do a manual upgrade or leverage autoinstall(8). You can take care of it via the console with vmctl(8).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade yourself&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;To get connected to the console you need to have access to the host your VM is running on. The same username and public SSH key, as provided for the VM, are used to create a local user on the host.
  When this is done you can use vmctl(8) to manage your VM. The options you have are:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;pre&gt;&lt;code class="$ vmctl console id``` language-$ vmctl console id```"&gt;```$ vmctl start id [-c]```
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;$ vmctl stop id [-fw]```&lt;/p&gt;

&lt;pre&gt;&lt;code class="-f Forcefully stop the VM without attempting a graceful shutdown.``` language--f Forcefully stop the VM without attempting a graceful shutdown.```"&gt;```-w Wait until the VM has been terminated.```
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;-c Automatically connect to the VM console.```&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See the Article for the rest of the guide&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://inks.tedunangst.com/l/3791" target="_blank" rel="nofollow noopener"&gt;powerpc64 architecture support in FreeBSD ports&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://twitter.com/ribalinux/status/1117856218251517956" target="_blank" rel="nofollow noopener"&gt;GhostBSD 19.04 overview&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://twitter.com/lattera/status/1119018409575026688" target="_blank" rel="nofollow noopener"&gt;HardenedBSD will have two user selectable ASLR implementations&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=S_aTzXVRRlM&amp;amp;feature=youtu.be" target="_blank" rel="nofollow noopener"&gt;NYCBUG 2016 Talk Shell-Fu Uploaded&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="http://blog.zarfhome.com/2019/04/what-is-zil-anyway.html" target="_blank" rel="nofollow noopener"&gt;What is ZIL anyway?&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Quentin - &lt;a href="http://dpaste.com/0K9PQW9#wrap" target="_blank" rel="nofollow noopener"&gt;Organize an Ada/BSD interview&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;DJ - &lt;a href="http://dpaste.com/3KTQ45G#wrap" target="_blank" rel="nofollow noopener"&gt;Update&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Patrick - &lt;a href="http://dpaste.com/07V6ZJN" target="_blank" rel="nofollow noopener"&gt;Bhyve frontends&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;A small programming note: After BSDNow episode 300, the podcast will switch to audio-only, using a new higher quality recording and production system. The live stream will likely still include video.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0298.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, ssh, nomadbsd, dtrace, ext2, unleashed, vmm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>36 year old UFS bug fixed, a BSD for the road, automatic upgrades with OpenBSD, DTrace ext2fs support in FreeBSD, Dedicated SSH tunnel user, upgrading VMM VMs to OpenBSD 6.5, and more.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="36yearoldbuginffsufsdiscoveredandpatchedhttpssvnwebfreebsdorgbaseviewrevisionrevision347066"><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=347066">36+ year old bug in FFS/UFS discovered and patched </a></h3>

<blockquote>
  <p>This update eliminates a kernel stack disclosure bug in UFS/FFS directory entries that is caused by uninitialized directory entry padding written to the disk.</p>
  
  <ul>
  <li>When the directory entry is written to disk, it is written as a full 32bit entry, and the unused bytes were not initialized, so could possibly contain sensitive data from the kernel stack
  It can be viewed by any user with read access to that directory. Up to 3 bytes of kernel stack are disclosed per file entry, depending on the the amount of padding the kernel needs to pad out the entry to a 32 bit boundary. The offset in the kernel stack that is disclosed is a function of the filename size. Furthermore, if the user can create files in a directory, this 3 byte window can be expanded 3 bytes at a time to a 254 byte window with 75% of the data in that window exposed. The additional exposure is done by removing the entry, creating a new entry with a 4-byte longer name, extracting 3 more bytes by reading the directory, and repeating until a 252 byte name is created.
  This exploit works in part because the area of the kernel stack that is being disclosed is in an area that typically doesn't change that often (perhaps a few times a second on a lightly loaded system), and these file creates and unlinks themselves don't overwrite the area of kernel stack being disclosed.
  It appears that this bug originated with the creation of the Fast File System in 4.1b-BSD (Circa 1982, more than 36 years ago!), and is likely present in every Unix or Unix-like system that uses UFS/FFS. Amazingly, nobody noticed until now.
  This update also adds the -z flag to fsck_ffs to have it scrub the leaked information in the name padding of existing directories. It only needs to be run once on each UFS/FFS filesystem after a patched kernel is installed and running.
  Submitted by: David G. Lawrence <a href="&#109;a&#105;&#108;&#116;&#111;:&#x64;&#x67;&#64;&#100;&#103;&#x6c;&#97;&#x77;&#x72;&#101;n&#x63;&#101;&#x2e;&#x63;&#x6f;&#109;">&#x64;&#x67;&#64;&#100;&#103;&#x6c;&#97;&#x77;&#x72;&#101;n&#x63;&#101;&#x2e;&#x63;&#x6f;&#109;</a></li>
  
  <li>So a patched kernel will no longer leak this data, and running the <code>fsck_ffs -z</code> command will erase any leaked data that may exist on your system</li>
  
  <li><a href="https://marc.info/?l=openbsd-cvs&amp;m=155699268122858&amp;w=2">OpenBSD commit with additional detail on mitigations</a>
  The impact on OpenBSD is very limited:
  1 - such stack bytes can be found in raw-device reads, from group operator. If you can read the raw disks you can undertake other more powerful actions.
  2 - read(2) upon directory fd was disabled July 1997 because I didn't like how grep * would display garbage and mess up the tty, and applying vis(3) for just directory reads seemed silly.  read(2) was changed to return 0 (EOF).  Sep 2016 this was further changed to EISDIR, so you still cannot see the bad bytes.
  3 - In 2013 when guenther adapted the getdents(2) directory-reading system call to 64-bit ino_t, the userland data format changed to 8-byte-alignment, making it incompatible with the 4-byte-alignment UFS on-disk format.  As a result of code refactoring the bad bytes were not copied to userland. Bad bytes will remain in old directories on old filesystems, but nothing makes those bytes user visible.
  There will be no errata or syspatch issued.  I urge other systems which do expose the information to userland to issue errata quickly, since this is a 254 byte infoleak of the stack which is great for ROP-chain building to attack some other bug. Especially if the kernel has no layout/link-order randomization ...</li>
  </ul>
  
  <hr />
</blockquote>

<h3 id="nomadbsdabsdfortheroadhttpsitsfosscomnomadbsd"><a href="https://itsfoss.com/nomadbsd/">NomadBSD, a BSD for the Road</a></h3>

<blockquote>
  <p>As regular It’s FOSS readers should know, I like diving into the world of BSDs. Recently, I came across an interesting BSD that is designed to live on a thumb drive. Let’s take a look at NomadBSD.
  NomadBSD is different than most available BSDs. NomadBSD is a live system based on FreeBSD. It comes with automatic hardware detection and an initial config tool. NomadBSD is designed to “be used as a desktop system that works out of the box, but can also be used for data recovery, for educational purposes, or to test FreeBSD’s hardware compatibility.”
  This German BSD comes with an OpenBox-based desktop with the Plank application dock. NomadBSD makes use of the DSB project. DSB stands for “Desktop Suite (for) (Free)BSD” and consists of a collection of programs designed to create a simple and working environment without needing a ton of dependencies to use one tool. DSB is created by Marcel Kaiser one of the lead devs of NomadBSD.
  Just like the original BSD projects, you can contact the NomadBSD developers via a mailing list.</p>
</blockquote>

<ul>
<li>Version 1.2 Released</li>
</ul>

<blockquote>
  <p>NomadBSD recently released version 1.2 on April 21, 2019. This means that NomadBSD is now based on FreeBSD 12.0-p3. TRIM is now enabled by default. One of the biggest changes is that the initial command-line setup was replaced with a Qt graphical interface. They also added a Qt5 tool to install NomadBSD to your hard drive. A number of fixes were included to improve graphics support. They also added support for creating 32-bit images.</p>
</blockquote>

<ul>
<li>Thoughts on NomadBSD</li>
</ul>

<blockquote>
  <p>I first discovered NomadBSD back in January when they released 1.2-RC1. At the time, I had been unable to install Project Trident on my laptop and was very frustrated with BSDs. I downloaded NomadBSD and tried it out. I initially ran into issues reaching the desktop, but RC2 fixed that issue. However, I was unable to get on the internet, even though I had an Ethernet cable plugged in. Luckily, I found the wifi manager in the menu and was able to connect to my wifi.
  Overall, my experience with NomadBSD was pleasant. Once I figured out a few things, I was good to go. I hope that NomadBSD is the first of a new generation of BSDs that focus on mobility and ease of use. BSD has conquered the server world, it’s about time they figured out how to be more user-friendly.</p>
  
  <hr />
</blockquote>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="openbsdautomatic">[OpenBSD automatic</h3>

<p>upgrade](https://www.tumfatig.net/20190426/openbsd-automatic-upgrade/)</p>

<blockquote>
  <p>OpenBSD 6.5 advertises for an installer improvement: rdsetroot(8) (a build-time tool) is now available for general use. Used in combination with autoinstall.8, it is now really easy to do automatic upgrades of your OpenBSD instances.
  I first manually upgraded my OpenBSD sandbox to 6.5. Once that was done, I could use the stock rdsetroot(8) tool. The plan is quite simple: write an unattended installation response file, insert it to a bsd.rd 6.5 installation image and reboot my other OpenBSD instances using that image.</p>
</blockquote>

<ul>
<li>Extra notes</li>
</ul>

<blockquote>
  <p>There must be a way to run onetime commands (in the manner of fw_update) to automatically run sysmerge and packages upgrades. As for now, I’d rather do it manually.
  This worked like a charm on two Synology KVM instances using a single sd0 disk, on my Thinkpad X260 using Encrypted root with Keydisk and on a Vultr instance using Encrypted root with passphrase. And BTW, the upgrade on the X260 used the (iwn0) wireless connection.
  I just read that florian@ has released the sysupgrade(8) utility which should be released with OpenBSD 6.6. That will make upgrades even easier! Until then, happy upgrading.</p>
</blockquote>

<p><hr /></p>

<h3 id="freebsddtraceext2fssupporthttpsreviewsfreebsdorgd19848"><a href="https://reviews.freebsd.org/D19848">FreeBSD Dtrace ext2fs Support</a></h3>

<ul>
<li><p>Which logs were replaced by dtrace-probes:</p>

<ul>
<li>Misc printf's under DEBUG macro in the blocks allocation path.</li>

<li>Different on-disk structures validation errors, now the filesystem will silently return EIO's.</li>

<li>Misc checksum errors, same as above.</li></ul></li>

<li><p>The only debug macro, which was leaved is EXT2FS<em>PRINT</em>EXTENTS.</p></li>

<li><p>It is impossible to replace it by dtrace-probes, because the additional logic is required to walk thru file extents.</p></li>

<li><p>The user still be able to see mount errors in the dmesg in case of:</p>

<p><ul>
<li>Filesystem features incompatibility.</li></p>

<p><li>Superblock checksum error.</li></ul>

<p></p></li>
</ul></p>

<hr />

<h3 id="createadedicateduserforsshtunnelingonlyhttpsdataswamporgtsolene20190417sshtunnelinghtml"><a href="https://dataswamp.org/~solene/2019-04-17-ssh-tunneling.html">Create a dedicated user for ssh tunneling only</a></h3>

<blockquote>
  <p>I use ssh tunneling A LOT, for everything. Yesterday, I removed the public access of my IMAP server, it’s now only available through ssh tunneling to access the daemon listening on localhost. I have plenty of daemons listening only on localhost that I can only reach through a ssh tunnel. If you don’t want to bother with ssh and redirect ports you need, you can also make a VPN (using ssh, openvpn, iked, tinc…) between your system and your server. I tend to avoid setting up VPN for the current use case as it requires more work and more maintenance than running ssh server and a ssh client.
  The last change, for my IMAP server, added an issue. I want my phone to access the IMAP server but I don’t want to connect to my main account from my phone for security reasons. So, I need a dedicated user that will only be allowed to forward ports.
  This is done very easily on OpenBSD.
  The steps are: 1. generate ssh keys for the new user 2. add an user with no password 3. allow public key for port forwarding
  Obviously, you must allow users (or only this one) to make port forwarding in your sshd_config.</p>
  
  <hr />
</blockquote>

<h3 id="thatwaseasysomeinfoonupgradingvmmvmsto65httpsopenbsdamsterdamupgradehtml"><a href="https://openbsd.amsterdam/upgrade.html">That was easy. Some info on upgrading VMM VMs to 6.5</a></h3>

<blockquote>
  <p>We're running dedicated vmm(4)/vmd(8) servers to host opinionated VMs.
  OpenBSD 6.5 is released! There are two ways you can upgrade your VM.
  Either do a manual upgrade or leverage autoinstall(8). You can take care of it via the console with vmctl(8).</p>
</blockquote>

<ul>
<li>Upgrade yourself</li>
</ul>

<blockquote>
  <p>To get connected to the console you need to have access to the host your VM is running on. The same username and public SSH key, as provided for the VM, are used to create a local user on the host.
  When this is done you can use vmctl(8) to manage your VM. The options you have are:</p>
</blockquote>

<pre><code class="$ vmctl console id``` language-$ vmctl console id```">```$ vmctl start id [-c]```
</code></pre>

<p>$ vmctl stop id [-fw]```</p>

<pre><code class="-f Forcefully stop the VM without attempting a graceful shutdown.``` language--f Forcefully stop the VM without attempting a graceful shutdown.```">```-w Wait until the VM has been terminated.```
</code></pre>

<p>-c Automatically connect to the VM console.```</p>

<ul>
<li>See the Article for the rest of the guide</li>
</ul>

<p><hr /></p>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://inks.tedunangst.com/l/3791">powerpc64 architecture support in FreeBSD ports</a></li>

<li><a href="https://twitter.com/ribalinux/status/1117856218251517956">GhostBSD 19.04 overview</a></li>

<li><a href="https://twitter.com/lattera/status/1119018409575026688">HardenedBSD will have two user selectable ASLR implementations</a></li>

<li><a href="https://www.youtube.com/watch?v=S_aTzXVRRlM&amp;feature=youtu.be">NYCBUG 2016 Talk Shell-Fu Uploaded</a></li>

<li><a href="http://blog.zarfhome.com/2019/04/what-is-zil-anyway.html">What is ZIL anyway?</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Quentin - <a href="http://dpaste.com/0K9PQW9#wrap">Organize an Ada/BSD interview</a></li>

<li>DJ - <a href="http://dpaste.com/3KTQ45G#wrap">Update</a></li>

<li>Patrick - <a href="http://dpaste.com/07V6ZJN">Bhyve frontends</a></li>

<li>A small programming note: After BSDNow episode 300, the podcast will switch to audio-only, using a new higher quality recording and production system. The live stream will likely still include video.</li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0298.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>36 year old UFS bug fixed, a BSD for the road, automatic upgrades with OpenBSD, DTrace ext2fs support in FreeBSD, Dedicated SSH tunnel user, upgrading VMM VMs to OpenBSD 6.5, and more.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="36yearoldbuginffsufsdiscoveredandpatchedhttpssvnwebfreebsdorgbaseviewrevisionrevision347066"><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=347066">36+ year old bug in FFS/UFS discovered and patched </a></h3>

<blockquote>
  <p>This update eliminates a kernel stack disclosure bug in UFS/FFS directory entries that is caused by uninitialized directory entry padding written to the disk.</p>
  
  <ul>
  <li>When the directory entry is written to disk, it is written as a full 32bit entry, and the unused bytes were not initialized, so could possibly contain sensitive data from the kernel stack
  It can be viewed by any user with read access to that directory. Up to 3 bytes of kernel stack are disclosed per file entry, depending on the the amount of padding the kernel needs to pad out the entry to a 32 bit boundary. The offset in the kernel stack that is disclosed is a function of the filename size. Furthermore, if the user can create files in a directory, this 3 byte window can be expanded 3 bytes at a time to a 254 byte window with 75% of the data in that window exposed. The additional exposure is done by removing the entry, creating a new entry with a 4-byte longer name, extracting 3 more bytes by reading the directory, and repeating until a 252 byte name is created.
  This exploit works in part because the area of the kernel stack that is being disclosed is in an area that typically doesn't change that often (perhaps a few times a second on a lightly loaded system), and these file creates and unlinks themselves don't overwrite the area of kernel stack being disclosed.
  It appears that this bug originated with the creation of the Fast File System in 4.1b-BSD (Circa 1982, more than 36 years ago!), and is likely present in every Unix or Unix-like system that uses UFS/FFS. Amazingly, nobody noticed until now.
  This update also adds the -z flag to fsck_ffs to have it scrub the leaked information in the name padding of existing directories. It only needs to be run once on each UFS/FFS filesystem after a patched kernel is installed and running.
  Submitted by: David G. Lawrence <a href="&#109;a&#105;&#108;&#116;&#111;:&#x64;&#x67;&#64;&#100;&#103;&#x6c;&#97;&#x77;&#x72;&#101;n&#x63;&#101;&#x2e;&#x63;&#x6f;&#109;">&#x64;&#x67;&#64;&#100;&#103;&#x6c;&#97;&#x77;&#x72;&#101;n&#x63;&#101;&#x2e;&#x63;&#x6f;&#109;</a></li>
  
  <li>So a patched kernel will no longer leak this data, and running the <code>fsck_ffs -z</code> command will erase any leaked data that may exist on your system</li>
  
  <li><a href="https://marc.info/?l=openbsd-cvs&amp;m=155699268122858&amp;w=2">OpenBSD commit with additional detail on mitigations</a>
  The impact on OpenBSD is very limited:
  1 - such stack bytes can be found in raw-device reads, from group operator. If you can read the raw disks you can undertake other more powerful actions.
  2 - read(2) upon directory fd was disabled July 1997 because I didn't like how grep * would display garbage and mess up the tty, and applying vis(3) for just directory reads seemed silly.  read(2) was changed to return 0 (EOF).  Sep 2016 this was further changed to EISDIR, so you still cannot see the bad bytes.
  3 - In 2013 when guenther adapted the getdents(2) directory-reading system call to 64-bit ino_t, the userland data format changed to 8-byte-alignment, making it incompatible with the 4-byte-alignment UFS on-disk format.  As a result of code refactoring the bad bytes were not copied to userland. Bad bytes will remain in old directories on old filesystems, but nothing makes those bytes user visible.
  There will be no errata or syspatch issued.  I urge other systems which do expose the information to userland to issue errata quickly, since this is a 254 byte infoleak of the stack which is great for ROP-chain building to attack some other bug. Especially if the kernel has no layout/link-order randomization ...</li>
  </ul>
  
  <hr />
</blockquote>

<h3 id="nomadbsdabsdfortheroadhttpsitsfosscomnomadbsd"><a href="https://itsfoss.com/nomadbsd/">NomadBSD, a BSD for the Road</a></h3>

<blockquote>
  <p>As regular It’s FOSS readers should know, I like diving into the world of BSDs. Recently, I came across an interesting BSD that is designed to live on a thumb drive. Let’s take a look at NomadBSD.
  NomadBSD is different than most available BSDs. NomadBSD is a live system based on FreeBSD. It comes with automatic hardware detection and an initial config tool. NomadBSD is designed to “be used as a desktop system that works out of the box, but can also be used for data recovery, for educational purposes, or to test FreeBSD’s hardware compatibility.”
  This German BSD comes with an OpenBox-based desktop with the Plank application dock. NomadBSD makes use of the DSB project. DSB stands for “Desktop Suite (for) (Free)BSD” and consists of a collection of programs designed to create a simple and working environment without needing a ton of dependencies to use one tool. DSB is created by Marcel Kaiser one of the lead devs of NomadBSD.
  Just like the original BSD projects, you can contact the NomadBSD developers via a mailing list.</p>
</blockquote>

<ul>
<li>Version 1.2 Released</li>
</ul>

<blockquote>
  <p>NomadBSD recently released version 1.2 on April 21, 2019. This means that NomadBSD is now based on FreeBSD 12.0-p3. TRIM is now enabled by default. One of the biggest changes is that the initial command-line setup was replaced with a Qt graphical interface. They also added a Qt5 tool to install NomadBSD to your hard drive. A number of fixes were included to improve graphics support. They also added support for creating 32-bit images.</p>
</blockquote>

<ul>
<li>Thoughts on NomadBSD</li>
</ul>

<blockquote>
  <p>I first discovered NomadBSD back in January when they released 1.2-RC1. At the time, I had been unable to install Project Trident on my laptop and was very frustrated with BSDs. I downloaded NomadBSD and tried it out. I initially ran into issues reaching the desktop, but RC2 fixed that issue. However, I was unable to get on the internet, even though I had an Ethernet cable plugged in. Luckily, I found the wifi manager in the menu and was able to connect to my wifi.
  Overall, my experience with NomadBSD was pleasant. Once I figured out a few things, I was good to go. I hope that NomadBSD is the first of a new generation of BSDs that focus on mobility and ease of use. BSD has conquered the server world, it’s about time they figured out how to be more user-friendly.</p>
  
  <hr />
</blockquote>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="openbsdautomatic">[OpenBSD automatic</h3>

<p>upgrade](https://www.tumfatig.net/20190426/openbsd-automatic-upgrade/)</p>

<blockquote>
  <p>OpenBSD 6.5 advertises for an installer improvement: rdsetroot(8) (a build-time tool) is now available for general use. Used in combination with autoinstall.8, it is now really easy to do automatic upgrades of your OpenBSD instances.
  I first manually upgraded my OpenBSD sandbox to 6.5. Once that was done, I could use the stock rdsetroot(8) tool. The plan is quite simple: write an unattended installation response file, insert it to a bsd.rd 6.5 installation image and reboot my other OpenBSD instances using that image.</p>
</blockquote>

<ul>
<li>Extra notes</li>
</ul>

<blockquote>
  <p>There must be a way to run onetime commands (in the manner of fw_update) to automatically run sysmerge and packages upgrades. As for now, I’d rather do it manually.
  This worked like a charm on two Synology KVM instances using a single sd0 disk, on my Thinkpad X260 using Encrypted root with Keydisk and on a Vultr instance using Encrypted root with passphrase. And BTW, the upgrade on the X260 used the (iwn0) wireless connection.
  I just read that florian@ has released the sysupgrade(8) utility which should be released with OpenBSD 6.6. That will make upgrades even easier! Until then, happy upgrading.</p>
</blockquote>

<p><hr /></p>

<h3 id="freebsddtraceext2fssupporthttpsreviewsfreebsdorgd19848"><a href="https://reviews.freebsd.org/D19848">FreeBSD Dtrace ext2fs Support</a></h3>

<ul>
<li><p>Which logs were replaced by dtrace-probes:</p>

<ul>
<li>Misc printf's under DEBUG macro in the blocks allocation path.</li>

<li>Different on-disk structures validation errors, now the filesystem will silently return EIO's.</li>

<li>Misc checksum errors, same as above.</li></ul></li>

<li><p>The only debug macro, which was leaved is EXT2FS<em>PRINT</em>EXTENTS.</p></li>

<li><p>It is impossible to replace it by dtrace-probes, because the additional logic is required to walk thru file extents.</p></li>

<li><p>The user still be able to see mount errors in the dmesg in case of:</p>

<p><ul>
<li>Filesystem features incompatibility.</li></p>

<p><li>Superblock checksum error.</li></ul>

<p></p></li>
</ul></p>

<hr />

<h3 id="createadedicateduserforsshtunnelingonlyhttpsdataswamporgtsolene20190417sshtunnelinghtml"><a href="https://dataswamp.org/~solene/2019-04-17-ssh-tunneling.html">Create a dedicated user for ssh tunneling only</a></h3>

<blockquote>
  <p>I use ssh tunneling A LOT, for everything. Yesterday, I removed the public access of my IMAP server, it’s now only available through ssh tunneling to access the daemon listening on localhost. I have plenty of daemons listening only on localhost that I can only reach through a ssh tunnel. If you don’t want to bother with ssh and redirect ports you need, you can also make a VPN (using ssh, openvpn, iked, tinc…) between your system and your server. I tend to avoid setting up VPN for the current use case as it requires more work and more maintenance than running ssh server and a ssh client.
  The last change, for my IMAP server, added an issue. I want my phone to access the IMAP server but I don’t want to connect to my main account from my phone for security reasons. So, I need a dedicated user that will only be allowed to forward ports.
  This is done very easily on OpenBSD.
  The steps are: 1. generate ssh keys for the new user 2. add an user with no password 3. allow public key for port forwarding
  Obviously, you must allow users (or only this one) to make port forwarding in your sshd_config.</p>
  
  <hr />
</blockquote>

<h3 id="thatwaseasysomeinfoonupgradingvmmvmsto65httpsopenbsdamsterdamupgradehtml"><a href="https://openbsd.amsterdam/upgrade.html">That was easy. Some info on upgrading VMM VMs to 6.5</a></h3>

<blockquote>
  <p>We're running dedicated vmm(4)/vmd(8) servers to host opinionated VMs.
  OpenBSD 6.5 is released! There are two ways you can upgrade your VM.
  Either do a manual upgrade or leverage autoinstall(8). You can take care of it via the console with vmctl(8).</p>
</blockquote>

<ul>
<li>Upgrade yourself</li>
</ul>

<blockquote>
  <p>To get connected to the console you need to have access to the host your VM is running on. The same username and public SSH key, as provided for the VM, are used to create a local user on the host.
  When this is done you can use vmctl(8) to manage your VM. The options you have are:</p>
</blockquote>

<pre><code class="$ vmctl console id``` language-$ vmctl console id```">```$ vmctl start id [-c]```
</code></pre>

<p>$ vmctl stop id [-fw]```</p>

<pre><code class="-f Forcefully stop the VM without attempting a graceful shutdown.``` language--f Forcefully stop the VM without attempting a graceful shutdown.```">```-w Wait until the VM has been terminated.```
</code></pre>

<p>-c Automatically connect to the VM console.```</p>

<ul>
<li>See the Article for the rest of the guide</li>
</ul>

<p><hr /></p>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://inks.tedunangst.com/l/3791">powerpc64 architecture support in FreeBSD ports</a></li>

<li><a href="https://twitter.com/ribalinux/status/1117856218251517956">GhostBSD 19.04 overview</a></li>

<li><a href="https://twitter.com/lattera/status/1119018409575026688">HardenedBSD will have two user selectable ASLR implementations</a></li>

<li><a href="https://www.youtube.com/watch?v=S_aTzXVRRlM&amp;feature=youtu.be">NYCBUG 2016 Talk Shell-Fu Uploaded</a></li>

<li><a href="http://blog.zarfhome.com/2019/04/what-is-zil-anyway.html">What is ZIL anyway?</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Quentin - <a href="http://dpaste.com/0K9PQW9#wrap">Organize an Ada/BSD interview</a></li>

<li>DJ - <a href="http://dpaste.com/3KTQ45G#wrap">Update</a></li>

<li>Patrick - <a href="http://dpaste.com/07V6ZJN">Bhyve frontends</a></li>

<li>A small programming note: After BSDNow episode 300, the podcast will switch to audio-only, using a new higher quality recording and production system. The live stream will likely still include video.</li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0298.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>297: Dragonfly In The Wild</title>
  <link>https://www.bsdnow.tv/297</link>
  <guid isPermaLink="false">b83c5930-57a8-4c27-855a-97b6d88f5f00</guid>
  <pubDate>Thu, 09 May 2019 00:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b83c5930-57a8-4c27-855a-97b6d88f5f00.mp3" length="24677382" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FreeBSD ZFS vs. ZoL performance, Dragonfly 5.4.2 has been release, containing web services with iocell, Solaris 11.4 SRU8, Problem with SSH Agent forwarding, OpenBSD 6.4 to 6.5 upgrade guide, and more.</itunes:subtitle>
  <itunes:duration>40:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FreeBSD ZFS vs. ZoL performance, Dragonfly 5.4.2 has been release, containing web services with iocell, Solaris 11.4 SRU8, Problem with SSH Agent forwarding, OpenBSD 6.4 to 6.5 upgrade guide, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.phoronix.com/scan.php?page=article&amp;amp;item=freebsd-zol-april&amp;amp;num=1" target="_blank" rel="nofollow noopener"&gt;FreeBSD ZFS vs. ZoL Performance, Ubuntu ZFS On Linux Reference&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;With iX Systems having released new images of FreeBSD reworked with their ZFS On Linux code that is in development to ultimately replace their existing FreeBSD ZFS support derived from the code originally found in the Illumos source tree, here are some fresh benchmarks looking at the FreeBSD 12 performance of ZFS vs. ZoL vs. UFS and compared to Ubuntu Linux on the same system with EXT4 and ZFS.
  Using an Intel Xeon E3-1275 v6 with ASUS P10S-M WS motherboard, 2 x 8GB DDR4-2400 ECC UDIMMs, and Samsung 970 EVO Plus 500GB NVMe solid-state drive was used for all of this round of testing. Just a single modern NVMe SSD was used for this round of ZFS testing while as the FreeBSD ZoL code matures I'll test on multiple systems using a more diverse range of storage devices.
  FreeBSD 12 ZoL was tested using the iX Systems image and then fresh installs done of FreeBSD 12.0-RELEASE when defaulting to the existing ZFS root file-system support and again when using the aging UFS file-system. Ubuntu 18.04.2 LTS with the Linux 4.18 kernel was used when testing its default EXT4 file-system and then again when using the Ubuntu-ZFS ZoL support. Via the Phoronix Test Suite various BSD/Linux I/O benchmarks were carried out.
  Overall, the FreeBSD ZFS On Linux port is looking good so far and we are looking forward to it hopefully maturing in time for FreeBSD 13.0. Nice job to iX Systems and all of those involved, especially the ZFS On Linux project. Those wanting to help in testing can try the FreeBSD ZoL spins. Stay tuned for more benchmarks and on more diverse hardware as time allows and the FreeBSD ZoL support further matures, but so far at least the performance numbers are in good shape.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflybsd.org/release54/" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD 5.4.2 is out&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2019-April/358160.html" target="_blank" rel="nofollow noopener"&gt;Upgrading guide&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
  &lt;p&gt;Here's the tag commit, for what has changed from &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2019-April/718697.html" target="_blank" rel="nofollow noopener"&gt;5.4.1 to 5.4.2&lt;/a&gt;
  The normal ISO and IMG files are available for download and install, plus an uncompressed ISO image for those installing remotely.  I uploaded them to mirror-master.dragonflybsd.org last night so they should be at your local mirror or will be soon.  This version includes Matt's fix for the HAMMER2 corruption bug he identified recently.
  If you have an existing 5.4 system and are running a generic kernel, the normal upgrade process will work.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;pre&gt;&lt;code&gt;&amp;gt; cd /usr/src
&amp;gt; git pull
&amp;gt; make buildworld.
&amp;gt; make buildkernel.
&amp;gt; make installkernel.
&amp;gt; make installworld
&amp;gt; make upgrade
&lt;/code&gt;&lt;/pre&gt;

&lt;blockquote&gt;
  &lt;p&gt;After your next reboot, you can optionally update your rescue system:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;pre&gt;&lt;code&gt;&amp;gt; cd /usr/src
&amp;gt; make initrd
&lt;/code&gt;&lt;/pre&gt;

&lt;blockquote&gt;
  &lt;p&gt;As always, make sure your packages are up to date:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;pre&gt;&lt;code&gt;&amp;gt; pkg update
&amp;gt; pkg upgrade
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://gioarc.me/2017/03/05/containing-web-services-with-iocell/" target="_blank" rel="nofollow noopener"&gt;Containing web services with iocell&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;I'm a huge fan of the FreeBSD jails feature. It is a great system for splitting services into logical units with all the performance of the bare metal system. In fact, this very site runs in its own jail! If this is starting to sound like LXC or Docker, it might surprise you to learn that OS-level virtualization has existed for quite some time. Kudos to the Linux folks for finally getting around to it. 😛 
  If you're interested in the history behind Jails, there is an excellent talk from Papers We Love on the subject: https://www.youtube.com/watch?v=hgN8pCMLI2U&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Getting started&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;There are plenty of options when it comes to setting up the jail system. Ezjail and Iocage seem popular, or you could do things manually. Iocage was recently rewritten in python, but was originally a set of shell scripts. That version has since been forked under the name Iocell, and I think it's pretty neat, so this tutorial will be using Iocell.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;To start, you'll need the following:


&lt;ul&gt;
&lt;li&gt;A FreeBSD install (we'll be using 11.0)&lt;/li&gt;

&lt;li&gt;The iocell package (available as a package, also in the ports tree)&lt;/li&gt;

&lt;li&gt;A ZFS pool for hosting the jails&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;p&gt;Once you have installed iocell and configured your ZFS pool, you'll need to run a few commands before creating your first jail. First, tell iocell which ZFS pool to use by issuing  iocell activate $POOLNAME. Iocell will create a few datasets.&lt;/p&gt;
  
  &lt;p&gt;As you can imagine, your jails are contained within the /iocell/jails dataset. The  /iocell/releases dataset is used for storing the next command we need to run,  iocell fetch. Iocell will ask you which release you'd like to pull down. Since we're running 11.0 on the host, pick 11.0-RELEASE. Iocell will download the necessary txz files and unpack them in /iocell/releases.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;See Article for the rest of the walkthrough.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://blogs.oracle.com/solaris/announcing-oracle-solaris-114-sru8" target="_blank" rel="nofollow noopener"&gt;Oracle Solaris 11.4 SRU8&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Today we are releasing the SRU 8 for Oracle Solaris 11.4. It is available via 'pkg update' from the support repository or by downloading the SRU from My Oracle Support Doc ID 2433412.1.&lt;/p&gt;
  
  &lt;ul&gt;
  &lt;li&gt;This SRU introduces the following enhancements:
  
  
  &lt;ul&gt;
  &lt;li&gt;Integration of 28060039 introduced an issue where any firmware update/query commands will log eereports and repeated execution of such commands led to faulty/degraded NIC. The issue has been addressed in this SRU.&lt;/li&gt;
  
  &lt;li&gt;UCB (libucb, librpcsoc, libdbm, libtermcap, and libcurses) libraries have been reinstated for Oracle Solaris 11.4&lt;/li&gt;
  
  &lt;li&gt;Re-introduction of the service fc-fabric.&lt;/li&gt;
  
  &lt;li&gt;ibus has been updated to 1.5.19&lt;/li&gt;
&lt;/ul&gt;
  &lt;/li&gt;
  &lt;/ul&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;The following components have also been updated to address security issues:


&lt;ul&gt;
&lt;li&gt;NTP has been updated to 4.2.8p12&lt;/li&gt;

&lt;li&gt;Firefox has been updated to 60.6.0esr&lt;/li&gt;

&lt;li&gt;BIND has been updated to 9.11.6&lt;/li&gt;

&lt;li&gt;OpenSSL has been updated to 1.0.2r&lt;/li&gt;

&lt;li&gt;MySQL has been updated to 5.6.43 &amp;amp; 5.7.25&lt;/li&gt;

&lt;li&gt;libxml2 has been updated to 2.9.9&lt;/li&gt;

&lt;li&gt;libxslt has been updated to 1.1.33&lt;/li&gt;

&lt;li&gt;Wireshark has been updated to 2.6.7&lt;/li&gt;

&lt;li&gt;ncurses has been updated to 6.1.0.20190105&lt;/li&gt;

&lt;li&gt;Apache Web Server has been updated to 2.4.38&lt;/li&gt;

&lt;li&gt;perl 5.22&lt;/li&gt;

&lt;li&gt;pkg.depot&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://defn.io/2019/04/12/ssh-forwarding/" target="_blank" rel="nofollow noopener"&gt;The Problem with SSH Agent Forwarding&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;After hacking the matrix.org website today, the attacker opened a series of GitHub issues mentioning the flaws he discovered. In one of those issues, he mentions that “complete compromise could have been avoided if developers were prohibited from using [SSH agent forwarding].”
  Here’s what man ssh_config has to say about ForwardAgent:  "Agent forwarding should be enabled with caution. Users with the ability to bypass file permissions on the remote host (for the agent’s Unix-domain socket) can access the local agent through the forwarded connection. An attacker cannot obtain key material from the agent, however they can perform operations on the keys that enable them to authenticate using the identities loaded into the agent.""
  Simply put: if your jump box is compromised and you use SSH agent forwarding to connect to another machine through it, then you risk also compromising the target machine!
  Instead, you should use either ProxyCommand or ProxyJump (added in OpenSSH 7.3). That way, ssh will forward the TCP connection to the target host via the jump box and the actual connection will be made on your workstation. If someone on the jump box tries to MITM your connection, then you will be warned by ssh.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;[&lt;a href="https://www.openbsd.org/faq/upgrade65.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD Upgrade Guide: 6.4 to 6.5&lt;/a&gt;
&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Start by performing the pre-upgrade steps. Next, boot from the install kernel, bsd.rd: use bootable install media, or place the 6.5 version of bsd.rd in the root of your filesystem and instruct the boot loader to boot this kernel. Once this kernel is booted, choose the (U)pgrade option and follow the prompts. Apply the configuration changes and remove the old files. Finish up by upgrading the packages: pkg_add -u.
  Alternatively, you can use the manual upgrade process.
  You may wish to check the errata page or upgrade to the stable branch to get any post-release fixes.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Before rebooting into the install kernel&lt;/li&gt;

&lt;li&gt;Configuration and syntax changes&lt;/li&gt;

&lt;li&gt;Files to remove&lt;/li&gt;

&lt;li&gt;Special packages&lt;/li&gt;

&lt;li&gt;Upgrade without the install kernel&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2019-April/001873.html" target="_blank" rel="nofollow noopener"&gt;2019 FreeBSD Community Survey&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://blog.seagate.com/craftsman-ship/seagate-shows-dual-actuator-speed-gains-in-real-world-setup/" target="_blank" rel="nofollow noopener"&gt;Seagate runs Mach.2 demo on FreeBSD&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=2KoD-jXjHok&amp;amp;t=7s" target="_blank" rel="nofollow noopener"&gt;FreeBSD: Resizing and Growing Disks&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://old.reddit.com/r/freebsd/comments/bh1abv/loading_49_on_an_old_tandy_4025lx_386_16mb_1gb_hd/" target="_blank" rel="nofollow noopener"&gt;Loading 4.9 on an old Tandy 4025LX - 386, 16MB, 1GB HD. Good old external SCSI CD&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://forums.os108.org/d/6-os108-mate-20190422-released" target="_blank" rel="nofollow noopener"&gt;OS108 MATE 20190422 released&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Casey - &lt;a href="http://dpaste.com/39VJ7NH#wrap" target="_blank" rel="nofollow noopener"&gt;Oklahoma City &amp;amp; James&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Michael - &lt;a href="http://dpaste.com/2VSKEGW#wrap" target="_blank" rel="nofollow noopener"&gt;Question on SAS backplane (camcontrol?)&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Ales - &lt;a href="http://dpaste.com/0AD0HBY#wrap" target="_blank" rel="nofollow noopener"&gt;OpenBSD, FreeNAS, OpenZFS questions&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0297.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, ZoL, iocell, Solaris, SSH, forwarding</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FreeBSD ZFS vs. ZoL performance, Dragonfly 5.4.2 has been release, containing web services with iocell, Solaris 11.4 SRU8, Problem with SSH Agent forwarding, OpenBSD 6.4 to 6.5 upgrade guide, and more.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="freebsdzfsvszolperformanceubuntuzfsonlinuxreferencehttpswwwphoronixcomscanphppagearticleitemfreebsdzolaprilnum1"><a href="https://www.phoronix.com/scan.php?page=article&amp;item=freebsd-zol-april&amp;num=1">FreeBSD ZFS vs. ZoL Performance, Ubuntu ZFS On Linux Reference</a></h3>

<blockquote>
  <p>With iX Systems having released new images of FreeBSD reworked with their ZFS On Linux code that is in development to ultimately replace their existing FreeBSD ZFS support derived from the code originally found in the Illumos source tree, here are some fresh benchmarks looking at the FreeBSD 12 performance of ZFS vs. ZoL vs. UFS and compared to Ubuntu Linux on the same system with EXT4 and ZFS.
  Using an Intel Xeon E3-1275 v6 with ASUS P10S-M WS motherboard, 2 x 8GB DDR4-2400 ECC UDIMMs, and Samsung 970 EVO Plus 500GB NVMe solid-state drive was used for all of this round of testing. Just a single modern NVMe SSD was used for this round of ZFS testing while as the FreeBSD ZoL code matures I'll test on multiple systems using a more diverse range of storage devices.
  FreeBSD 12 ZoL was tested using the iX Systems image and then fresh installs done of FreeBSD 12.0-RELEASE when defaulting to the existing ZFS root file-system support and again when using the aging UFS file-system. Ubuntu 18.04.2 LTS with the Linux 4.18 kernel was used when testing its default EXT4 file-system and then again when using the Ubuntu-ZFS ZoL support. Via the Phoronix Test Suite various BSD/Linux I/O benchmarks were carried out.
  Overall, the FreeBSD ZFS On Linux port is looking good so far and we are looking forward to it hopefully maturing in time for FreeBSD 13.0. Nice job to iX Systems and all of those involved, especially the ZFS On Linux project. Those wanting to help in testing can try the FreeBSD ZoL spins. Stay tuned for more benchmarks and on more diverse hardware as time allows and the FreeBSD ZoL support further matures, but so far at least the performance numbers are in good shape.</p>
</blockquote>

<p><hr /></p>

<h3 id="dragonflybsd542isouthttpswwwdragonflybsdorgrelease54"><a href="https://www.dragonflybsd.org/release54/">DragonFlyBSD 5.4.2 is out</a></h3>

<p><a href="http://lists.dragonflybsd.org/pipermail/users/2019-April/358160.html">Upgrading guide</a></p>

<blockquote>
  <p>Here's the tag commit, for what has changed from <a href="http://lists.dragonflybsd.org/pipermail/commits/2019-April/718697.html">5.4.1 to 5.4.2</a>
  The normal ISO and IMG files are available for download and install, plus an uncompressed ISO image for those installing remotely.  I uploaded them to mirror-master.dragonflybsd.org last night so they should be at your local mirror or will be soon.  This version includes Matt's fix for the HAMMER2 corruption bug he identified recently.
  If you have an existing 5.4 system and are running a generic kernel, the normal upgrade process will work.</p>
</blockquote>

<pre><code>&gt; cd /usr/src
&gt; git pull
&gt; make buildworld.
&gt; make buildkernel.
&gt; make installkernel.
&gt; make installworld
&gt; make upgrade
</code></pre>

<blockquote>
  <p>After your next reboot, you can optionally update your rescue system:</p>
</blockquote>

<pre><code>&gt; cd /usr/src
&gt; make initrd
</code></pre>

<blockquote>
  <p>As always, make sure your packages are up to date:</p>
</blockquote>

<pre><code>&gt; pkg update
&gt; pkg upgrade
</code></pre>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="containingwebserviceswithiocellhttpsgioarcme20170305containingwebserviceswithiocell"><a href="https://gioarc.me/2017/03/05/containing-web-services-with-iocell/">Containing web services with iocell</a></h3>

<blockquote>
  <p>I'm a huge fan of the FreeBSD jails feature. It is a great system for splitting services into logical units with all the performance of the bare metal system. In fact, this very site runs in its own jail! If this is starting to sound like LXC or Docker, it might surprise you to learn that OS-level virtualization has existed for quite some time. Kudos to the Linux folks for finally getting around to it. 😛 
  If you're interested in the history behind Jails, there is an excellent talk from Papers We Love on the subject: https://www.youtube.com/watch?v=hgN8pCMLI2U</p>
</blockquote>

<ul>
<li>Getting started</li>
</ul>

<blockquote>
  <p>There are plenty of options when it comes to setting up the jail system. Ezjail and Iocage seem popular, or you could do things manually. Iocage was recently rewritten in python, but was originally a set of shell scripts. That version has since been forked under the name Iocell, and I think it's pretty neat, so this tutorial will be using Iocell.</p>
</blockquote>

<ul>
<li>To start, you'll need the following:


<ul>
<li>A FreeBSD install (we'll be using 11.0)</li>

<li>The iocell package (available as a package, also in the ports tree)</li>

<li>A ZFS pool for hosting the jails</li></ul>
</li>
</ul>

<blockquote>
  <p>Once you have installed iocell and configured your ZFS pool, you'll need to run a few commands before creating your first jail. First, tell iocell which ZFS pool to use by issuing  iocell activate $POOLNAME. Iocell will create a few datasets.</p>
  
  <p>As you can imagine, your jails are contained within the /iocell/jails dataset. The  /iocell/releases dataset is used for storing the next command we need to run,  iocell fetch. Iocell will ask you which release you'd like to pull down. Since we're running 11.0 on the host, pick 11.0-RELEASE. Iocell will download the necessary txz files and unpack them in /iocell/releases.</p>
</blockquote>

<ul>
<li>See Article for the rest of the walkthrough.</li>
</ul>

<p><hr /></p>

<h3 id="oraclesolaris114sru8httpsblogsoraclecomsolarisannouncingoraclesolaris114sru8"><a href="https://blogs.oracle.com/solaris/announcing-oracle-solaris-114-sru8">Oracle Solaris 11.4 SRU8</a></h3>

<blockquote>
  <p>Today we are releasing the SRU 8 for Oracle Solaris 11.4. It is available via 'pkg update' from the support repository or by downloading the SRU from My Oracle Support Doc ID 2433412.1.</p>
  
  <ul>
  <li>This SRU introduces the following enhancements:
  
  
  <ul>
  <li>Integration of 28060039 introduced an issue where any firmware update/query commands will log eereports and repeated execution of such commands led to faulty/degraded NIC. The issue has been addressed in this SRU.</li>
  
  <li>UCB (libucb, librpcsoc, libdbm, libtermcap, and libcurses) libraries have been reinstated for Oracle Solaris 11.4</li>
  
  <li>Re-introduction of the service fc-fabric.</li>
  
  <li>ibus has been updated to 1.5.19</li></ul>
  </li>
  </ul>
</blockquote>

<ul>
<li>The following components have also been updated to address security issues:


<ul>
<li>NTP has been updated to 4.2.8p12</li>

<li>Firefox has been updated to 60.6.0esr</li>

<li>BIND has been updated to 9.11.6</li>

<li>OpenSSL has been updated to 1.0.2r</li>

<li>MySQL has been updated to 5.6.43 &amp; 5.7.25</li>

<li>libxml2 has been updated to 2.9.9</li>

<li>libxslt has been updated to 1.1.33</li>

<li>Wireshark has been updated to 2.6.7</li>

<li>ncurses has been updated to 6.1.0.20190105</li>

<li>Apache Web Server has been updated to 2.4.38</li>

<li>perl 5.22</li>

<li>pkg.depot</li></ul>
</li>
</ul>

<p><hr /></p>

<h3 id="theproblemwithsshagentforwardinghttpsdefnio20190412sshforwarding"><a href="https://defn.io/2019/04/12/ssh-forwarding/">The Problem with SSH Agent Forwarding</a></h3>

<blockquote>
  <p>After hacking the matrix.org website today, the attacker opened a series of GitHub issues mentioning the flaws he discovered. In one of those issues, he mentions that “complete compromise could have been avoided if developers were prohibited from using [SSH agent forwarding].”
  Here’s what man ssh_config has to say about ForwardAgent:  "Agent forwarding should be enabled with caution. Users with the ability to bypass file permissions on the remote host (for the agent’s Unix-domain socket) can access the local agent through the forwarded connection. An attacker cannot obtain key material from the agent, however they can perform operations on the keys that enable them to authenticate using the identities loaded into the agent.""
  Simply put: if your jump box is compromised and you use SSH agent forwarding to connect to another machine through it, then you risk also compromising the target machine!
  Instead, you should use either ProxyCommand or ProxyJump (added in OpenSSH 7.3). That way, ssh will forward the TCP connection to the target host via the jump box and the actual connection will be made on your workstation. If someone on the jump box tries to MITM your connection, then you will be warned by ssh.</p>
</blockquote>

<p><hr /></p>

<h3 id="openbsdupgradeguide64to65httpswwwopenbsdorgfaqupgrade65html">[<a href="https://www.openbsd.org/faq/upgrade65.html">OpenBSD Upgrade Guide: 6.4 to 6.5</a></h3>

<blockquote>
  <p>Start by performing the pre-upgrade steps. Next, boot from the install kernel, bsd.rd: use bootable install media, or place the 6.5 version of bsd.rd in the root of your filesystem and instruct the boot loader to boot this kernel. Once this kernel is booted, choose the (U)pgrade option and follow the prompts. Apply the configuration changes and remove the old files. Finish up by upgrading the packages: pkg_add -u.
  Alternatively, you can use the manual upgrade process.
  You may wish to check the errata page or upgrade to the stable branch to get any post-release fixes.</p>
</blockquote>

<ul>
<li>Before rebooting into the install kernel</li>

<li>Configuration and syntax changes</li>

<li>Files to remove</li>

<li>Special packages</li>

<li>Upgrade without the install kernel</li>
</ul>

<p><hr /></p>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2019-April/001873.html">2019 FreeBSD Community Survey</a></li>

<li><a href="https://blog.seagate.com/craftsman-ship/seagate-shows-dual-actuator-speed-gains-in-real-world-setup/">Seagate runs Mach.2 demo on FreeBSD</a></li>

<li><a href="https://www.youtube.com/watch?v=2KoD-jXjHok&amp;t=7s">FreeBSD: Resizing and Growing Disks</a></li>

<li><a href="https://old.reddit.com/r/freebsd/comments/bh1abv/loading_49_on_an_old_tandy_4025lx_386_16mb_1gb_hd/">Loading 4.9 on an old Tandy 4025LX - 386, 16MB, 1GB HD. Good old external SCSI CD</a></li>

<li><a href="https://forums.os108.org/d/6-os108-mate-20190422-released">OS108 MATE 20190422 released</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Casey - <a href="http://dpaste.com/39VJ7NH#wrap">Oklahoma City &amp; James</a></li>

<li>Michael - <a href="http://dpaste.com/2VSKEGW#wrap">Question on SAS backplane (camcontrol?)</a></li>

<li>Ales - <a href="http://dpaste.com/0AD0HBY#wrap">OpenBSD, FreeNAS, OpenZFS questions</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0297.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FreeBSD ZFS vs. ZoL performance, Dragonfly 5.4.2 has been release, containing web services with iocell, Solaris 11.4 SRU8, Problem with SSH Agent forwarding, OpenBSD 6.4 to 6.5 upgrade guide, and more.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="freebsdzfsvszolperformanceubuntuzfsonlinuxreferencehttpswwwphoronixcomscanphppagearticleitemfreebsdzolaprilnum1"><a href="https://www.phoronix.com/scan.php?page=article&amp;item=freebsd-zol-april&amp;num=1">FreeBSD ZFS vs. ZoL Performance, Ubuntu ZFS On Linux Reference</a></h3>

<blockquote>
  <p>With iX Systems having released new images of FreeBSD reworked with their ZFS On Linux code that is in development to ultimately replace their existing FreeBSD ZFS support derived from the code originally found in the Illumos source tree, here are some fresh benchmarks looking at the FreeBSD 12 performance of ZFS vs. ZoL vs. UFS and compared to Ubuntu Linux on the same system with EXT4 and ZFS.
  Using an Intel Xeon E3-1275 v6 with ASUS P10S-M WS motherboard, 2 x 8GB DDR4-2400 ECC UDIMMs, and Samsung 970 EVO Plus 500GB NVMe solid-state drive was used for all of this round of testing. Just a single modern NVMe SSD was used for this round of ZFS testing while as the FreeBSD ZoL code matures I'll test on multiple systems using a more diverse range of storage devices.
  FreeBSD 12 ZoL was tested using the iX Systems image and then fresh installs done of FreeBSD 12.0-RELEASE when defaulting to the existing ZFS root file-system support and again when using the aging UFS file-system. Ubuntu 18.04.2 LTS with the Linux 4.18 kernel was used when testing its default EXT4 file-system and then again when using the Ubuntu-ZFS ZoL support. Via the Phoronix Test Suite various BSD/Linux I/O benchmarks were carried out.
  Overall, the FreeBSD ZFS On Linux port is looking good so far and we are looking forward to it hopefully maturing in time for FreeBSD 13.0. Nice job to iX Systems and all of those involved, especially the ZFS On Linux project. Those wanting to help in testing can try the FreeBSD ZoL spins. Stay tuned for more benchmarks and on more diverse hardware as time allows and the FreeBSD ZoL support further matures, but so far at least the performance numbers are in good shape.</p>
</blockquote>

<p><hr /></p>

<h3 id="dragonflybsd542isouthttpswwwdragonflybsdorgrelease54"><a href="https://www.dragonflybsd.org/release54/">DragonFlyBSD 5.4.2 is out</a></h3>

<p><a href="http://lists.dragonflybsd.org/pipermail/users/2019-April/358160.html">Upgrading guide</a></p>

<blockquote>
  <p>Here's the tag commit, for what has changed from <a href="http://lists.dragonflybsd.org/pipermail/commits/2019-April/718697.html">5.4.1 to 5.4.2</a>
  The normal ISO and IMG files are available for download and install, plus an uncompressed ISO image for those installing remotely.  I uploaded them to mirror-master.dragonflybsd.org last night so they should be at your local mirror or will be soon.  This version includes Matt's fix for the HAMMER2 corruption bug he identified recently.
  If you have an existing 5.4 system and are running a generic kernel, the normal upgrade process will work.</p>
</blockquote>

<pre><code>&gt; cd /usr/src
&gt; git pull
&gt; make buildworld.
&gt; make buildkernel.
&gt; make installkernel.
&gt; make installworld
&gt; make upgrade
</code></pre>

<blockquote>
  <p>After your next reboot, you can optionally update your rescue system:</p>
</blockquote>

<pre><code>&gt; cd /usr/src
&gt; make initrd
</code></pre>

<blockquote>
  <p>As always, make sure your packages are up to date:</p>
</blockquote>

<pre><code>&gt; pkg update
&gt; pkg upgrade
</code></pre>

<p><hr /></p>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="containingwebserviceswithiocellhttpsgioarcme20170305containingwebserviceswithiocell"><a href="https://gioarc.me/2017/03/05/containing-web-services-with-iocell/">Containing web services with iocell</a></h3>

<blockquote>
  <p>I'm a huge fan of the FreeBSD jails feature. It is a great system for splitting services into logical units with all the performance of the bare metal system. In fact, this very site runs in its own jail! If this is starting to sound like LXC or Docker, it might surprise you to learn that OS-level virtualization has existed for quite some time. Kudos to the Linux folks for finally getting around to it. 😛 
  If you're interested in the history behind Jails, there is an excellent talk from Papers We Love on the subject: https://www.youtube.com/watch?v=hgN8pCMLI2U</p>
</blockquote>

<ul>
<li>Getting started</li>
</ul>

<blockquote>
  <p>There are plenty of options when it comes to setting up the jail system. Ezjail and Iocage seem popular, or you could do things manually. Iocage was recently rewritten in python, but was originally a set of shell scripts. That version has since been forked under the name Iocell, and I think it's pretty neat, so this tutorial will be using Iocell.</p>
</blockquote>

<ul>
<li>To start, you'll need the following:


<ul>
<li>A FreeBSD install (we'll be using 11.0)</li>

<li>The iocell package (available as a package, also in the ports tree)</li>

<li>A ZFS pool for hosting the jails</li></ul>
</li>
</ul>

<blockquote>
  <p>Once you have installed iocell and configured your ZFS pool, you'll need to run a few commands before creating your first jail. First, tell iocell which ZFS pool to use by issuing  iocell activate $POOLNAME. Iocell will create a few datasets.</p>
  
  <p>As you can imagine, your jails are contained within the /iocell/jails dataset. The  /iocell/releases dataset is used for storing the next command we need to run,  iocell fetch. Iocell will ask you which release you'd like to pull down. Since we're running 11.0 on the host, pick 11.0-RELEASE. Iocell will download the necessary txz files and unpack them in /iocell/releases.</p>
</blockquote>

<ul>
<li>See Article for the rest of the walkthrough.</li>
</ul>

<p><hr /></p>

<h3 id="oraclesolaris114sru8httpsblogsoraclecomsolarisannouncingoraclesolaris114sru8"><a href="https://blogs.oracle.com/solaris/announcing-oracle-solaris-114-sru8">Oracle Solaris 11.4 SRU8</a></h3>

<blockquote>
  <p>Today we are releasing the SRU 8 for Oracle Solaris 11.4. It is available via 'pkg update' from the support repository or by downloading the SRU from My Oracle Support Doc ID 2433412.1.</p>
  
  <ul>
  <li>This SRU introduces the following enhancements:
  
  
  <ul>
  <li>Integration of 28060039 introduced an issue where any firmware update/query commands will log eereports and repeated execution of such commands led to faulty/degraded NIC. The issue has been addressed in this SRU.</li>
  
  <li>UCB (libucb, librpcsoc, libdbm, libtermcap, and libcurses) libraries have been reinstated for Oracle Solaris 11.4</li>
  
  <li>Re-introduction of the service fc-fabric.</li>
  
  <li>ibus has been updated to 1.5.19</li></ul>
  </li>
  </ul>
</blockquote>

<ul>
<li>The following components have also been updated to address security issues:


<ul>
<li>NTP has been updated to 4.2.8p12</li>

<li>Firefox has been updated to 60.6.0esr</li>

<li>BIND has been updated to 9.11.6</li>

<li>OpenSSL has been updated to 1.0.2r</li>

<li>MySQL has been updated to 5.6.43 &amp; 5.7.25</li>

<li>libxml2 has been updated to 2.9.9</li>

<li>libxslt has been updated to 1.1.33</li>

<li>Wireshark has been updated to 2.6.7</li>

<li>ncurses has been updated to 6.1.0.20190105</li>

<li>Apache Web Server has been updated to 2.4.38</li>

<li>perl 5.22</li>

<li>pkg.depot</li></ul>
</li>
</ul>

<p><hr /></p>

<h3 id="theproblemwithsshagentforwardinghttpsdefnio20190412sshforwarding"><a href="https://defn.io/2019/04/12/ssh-forwarding/">The Problem with SSH Agent Forwarding</a></h3>

<blockquote>
  <p>After hacking the matrix.org website today, the attacker opened a series of GitHub issues mentioning the flaws he discovered. In one of those issues, he mentions that “complete compromise could have been avoided if developers were prohibited from using [SSH agent forwarding].”
  Here’s what man ssh_config has to say about ForwardAgent:  "Agent forwarding should be enabled with caution. Users with the ability to bypass file permissions on the remote host (for the agent’s Unix-domain socket) can access the local agent through the forwarded connection. An attacker cannot obtain key material from the agent, however they can perform operations on the keys that enable them to authenticate using the identities loaded into the agent.""
  Simply put: if your jump box is compromised and you use SSH agent forwarding to connect to another machine through it, then you risk also compromising the target machine!
  Instead, you should use either ProxyCommand or ProxyJump (added in OpenSSH 7.3). That way, ssh will forward the TCP connection to the target host via the jump box and the actual connection will be made on your workstation. If someone on the jump box tries to MITM your connection, then you will be warned by ssh.</p>
</blockquote>

<p><hr /></p>

<h3 id="openbsdupgradeguide64to65httpswwwopenbsdorgfaqupgrade65html">[<a href="https://www.openbsd.org/faq/upgrade65.html">OpenBSD Upgrade Guide: 6.4 to 6.5</a></h3>

<blockquote>
  <p>Start by performing the pre-upgrade steps. Next, boot from the install kernel, bsd.rd: use bootable install media, or place the 6.5 version of bsd.rd in the root of your filesystem and instruct the boot loader to boot this kernel. Once this kernel is booted, choose the (U)pgrade option and follow the prompts. Apply the configuration changes and remove the old files. Finish up by upgrading the packages: pkg_add -u.
  Alternatively, you can use the manual upgrade process.
  You may wish to check the errata page or upgrade to the stable branch to get any post-release fixes.</p>
</blockquote>

<ul>
<li>Before rebooting into the install kernel</li>

<li>Configuration and syntax changes</li>

<li>Files to remove</li>

<li>Special packages</li>

<li>Upgrade without the install kernel</li>
</ul>

<p><hr /></p>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2019-April/001873.html">2019 FreeBSD Community Survey</a></li>

<li><a href="https://blog.seagate.com/craftsman-ship/seagate-shows-dual-actuator-speed-gains-in-real-world-setup/">Seagate runs Mach.2 demo on FreeBSD</a></li>

<li><a href="https://www.youtube.com/watch?v=2KoD-jXjHok&amp;t=7s">FreeBSD: Resizing and Growing Disks</a></li>

<li><a href="https://old.reddit.com/r/freebsd/comments/bh1abv/loading_49_on_an_old_tandy_4025lx_386_16mb_1gb_hd/">Loading 4.9 on an old Tandy 4025LX - 386, 16MB, 1GB HD. Good old external SCSI CD</a></li>

<li><a href="https://forums.os108.org/d/6-os108-mate-20190422-released">OS108 MATE 20190422 released</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Casey - <a href="http://dpaste.com/39VJ7NH#wrap">Oklahoma City &amp; James</a></li>

<li>Michael - <a href="http://dpaste.com/2VSKEGW#wrap">Question on SAS backplane (camcontrol?)</a></li>

<li>Ales - <a href="http://dpaste.com/0AD0HBY#wrap">OpenBSD, FreeNAS, OpenZFS questions</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0297.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>294: The SSH Tarpit</title>
  <link>https://www.bsdnow.tv/294</link>
  <guid isPermaLink="false">b1d75436-414e-48d2-bc93-a09aae8e7d82</guid>
  <pubDate>Thu, 18 Apr 2019 12:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b1d75436-414e-48d2-bc93-a09aae8e7d82.mp3" length="34751503" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>A PI-powered Plan 9 cluster, an SSH tarpit, rdist for when Ansible is too much, falling in love with OpenBSD again, how I created my first FreeBSD port, the Tilde Institute of OpenBSD education and more.</itunes:subtitle>
  <itunes:duration>57:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;A PI-powered Plan 9 cluster, an SSH tarpit, rdist for when Ansible is too much, falling in love with OpenBSD again, how I created my first FreeBSD port, the Tilde Institute of OpenBSD education and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.rs-online.com/designspark/a-pi-powered-plan-9-cluster" target="_blank" rel="nofollow noopener"&gt;A Pi-Powered Plan 9 Cluster&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Plan 9 from Bell Labs comes from the same stable as the UNIX operating system, which of course Linux was designed after, and Apple’s OS X runs on top of a certified UNIX operating system. Just like UNIX, Plan 9 was developed as a research O/S — a vehicle for trying out new concepts — with it building on key UNIX principles and taking the idea of devices are just files even further.
  In this post, we take a quick look at the Plan 9 O/S and some of the notable features, before moving on to the construction of a self-contained 4-node Raspberry Pi cluster that will provide a compact platform for experimentation.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://nullprogram.com/blog/2019/03/22/" target="_blank" rel="nofollow noopener"&gt;Endlessh: an SSH Tarpit&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;I’m a big fan of tarpits: a network service that intentionally inserts delays in its protocol, slowing down clients by forcing them to wait. This arrests the speed at which a bad actor can attack or probe the host system, and it ties up some of the attacker’s resources that might otherwise be spent attacking another host. When done well, a tarpit imposes more cost on the attacker than the defender.
  The Internet is a very hostile place, and anyone who’s ever stood up an Internet-facing IPv4 host has witnessed the immediate and continuous attacks against their server. I’ve maintained such a server for nearly six years now, and more than 99% of my incoming traffic has ill intent. One part of my defenses has been tarpits in various forms.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://chargen.one/obsdams/rdist-1-when-ansible-is-too-much" target="_blank" rel="nofollow noopener"&gt;rdist(1) – when Ansible is too much&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;The post written about rdist(1) on johan.huldtgren.com sparked
  us to write one as well. It's a great, underappreciated, tool. And we wanted to show how we wrapped doas(1) around it.
  There are two services in our infrastructure for which we were looking to keep the configuration in sync and to reload the process when the configuration had indeed changed. There is a pair of nsd(8)/unbound(8) hosts and a pair of hosts running relayd(8)/httpd(8) with carp(4) between them.
  We didn't have a requirement to go full configuration management with tools like Ansible or Salt Stack. And there wasn't any interest in building additional logic on top of rsync or repositories. &amp;gt; Enter rdist(1), rdist is a program to maintain identical copies of files over multiple hosts. It preserves the owner, group, mode, and mtime of files if possible and can update programs that are executing.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://functionallyparanoid.com/2019/03/13/well-its-been-a-while-falling-in-love-with-openbsd-again/" target="_blank" rel="nofollow noopener"&gt;Falling in love with OpenBSD again&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;I was checking the other day and was appalled at how long it has been since I posted here.  I had been working a job during 2018 that had me traveling 3,600 miles by air every week so that is at least a viable excuse.
  So what is my latest project?  I wanted to get something better than the clunky old T500 “freedom laptop” that I could use as my daily driver.  Some background here.  My first paid gig as a programmer was on SunOS 4 (predecessor to Solaris) and Ultrix (on a DEC MicroVAX).  I went from there to a Commodore Amiga (preemptive multitasking in 1985!).  I went from there to OS/2 (I know, patron saint of lost causes) and then finally decided to “sell out” and move to Windows as the path of least resistance in the mid 90’s.
  My wife bought me an iPod literally just as they started working with computers other than Macs and I watched with fascination as Apple made the big gamble and moved away from PowerPC chips to Intel.  That was the beginning of the Apple Fan Boi years for me.  My gateway drug was a G4 MacMini and I managed somehow to get in on the pre-production, developer build of an Intel-based Mac.  I was quite happy on the platform until about three years ago.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://aikchar.dev/blog/how-i-created-my-first-freebsd-port.html" target="_blank" rel="nofollow noopener"&gt;How I Created My First FreeBSD Port&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;I created my first FreeBSD port recently. I found that FreeBSD didn't have a port for GoCD, which is a continuous integration and continuous deployment (CI/CD) system. This was a great opportunity to learn how to build a FreeBSD port while also contributing back to the community&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h3&gt;&lt;a href="https://tilde.institute/" target="_blank" rel="nofollow noopener"&gt;The Tilde Institute of OpenBSD Education&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;
  &lt;p&gt;Welcome to tilde.institute! This is an OpenBSD machine whose purpose is to provide a space in the tildeverse for experimentation with and education of the OpenBSD operating system. A variety of editors, shells, and compilers are installed to allow for development in a native OpenBSD environment. OpenBSD's httpd(8) is configured with slowcgi(8) as the fastcgi provider and sqlite3 available. This allows users to experiment with web development using compiled CGI in C, aka the BCHS Stack. In addition to php7.0 and mysql (mariadb) by request, this provides an environment where the development of complex web apps is possible.&lt;/p&gt;
  
  &lt;hr&gt;
&lt;/blockquote&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.solobsd.org/index.php/2019/03/26/solobsd-19-03-stable/" target="_blank" rel="nofollow noopener"&gt;SoloBSD 19.03-STABLE&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://docs.google.com/presentation/d/1BbveYtY9IhuPCOLsEafwXMefkiY3REJBYl-opMAKQC0/edit#slide=id.p" target="_blank" rel="nofollow noopener"&gt;WireGuard for NetBSD&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;[NetBSD - Removing PF](https://mail-index.netbsd.org/tech-kern/2019/03/29/msg024883.html
)&lt;/li&gt;

&lt;li&gt;&lt;a href="https://devblogs.microsoft.com/oldnewthing/20190325-00/?p=102359" target="_blank" rel="nofollow noopener"&gt;What does the N in nmake stand for?&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://kottke.org/19/03/a-map-of-the-internet-from-may-1973" target="_blank" rel="nofollow noopener"&gt;A Map of the Internet from May 1973&lt;/a&gt;&lt;/li&gt;

&lt;li&gt;&lt;a href="https://hackaday.io/project/164343-nsa-b-gone" target="_blank" rel="nofollow noopener"&gt;NSA-B-Gone : A sketchy hardware security device for your x220&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Jake - &lt;a href="http://dpaste.com/1Y22ZJM" target="_blank" rel="nofollow noopener"&gt;A single jail as a VPN client&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;Matt - &lt;a href="http://dpaste.com/2FAFC3A#wrap" target="_blank" rel="nofollow noopener"&gt;Surprising BSD Features&lt;/a&gt;
&lt;/li&gt;

&lt;li&gt;cia - &lt;a href="http://dpaste.com/2T4J7G3" target="_blank" rel="nofollow noopener"&gt;Routing and ZFS&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0294.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, plan9, ssh, ansible, rdist, wireguard, solobsd, nmake</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A PI-powered Plan 9 cluster, an SSH tarpit, rdist for when Ansible is too much, falling in love with OpenBSD again, how I created my first FreeBSD port, the Tilde Institute of OpenBSD education and more.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="apipoweredplan9clusterhttpswwwrsonlinecomdesignsparkapipoweredplan9cluster"><a href="https://www.rs-online.com/designspark/a-pi-powered-plan-9-cluster">A Pi-Powered Plan 9 Cluster</a></h3>

<blockquote>
  <p>Plan 9 from Bell Labs comes from the same stable as the UNIX operating system, which of course Linux was designed after, and Apple’s OS X runs on top of a certified UNIX operating system. Just like UNIX, Plan 9 was developed as a research O/S — a vehicle for trying out new concepts — with it building on key UNIX principles and taking the idea of devices are just files even further.
  In this post, we take a quick look at the Plan 9 O/S and some of the notable features, before moving on to the construction of a self-contained 4-node Raspberry Pi cluster that will provide a compact platform for experimentation.</p>
  
  <hr />
</blockquote>

<h3 id="endlesshansshtarpithttpsnullprogramcomblog20190322"><a href="https://nullprogram.com/blog/2019/03/22/">Endlessh: an SSH Tarpit</a></h3>

<blockquote>
  <p>I’m a big fan of tarpits: a network service that intentionally inserts delays in its protocol, slowing down clients by forcing them to wait. This arrests the speed at which a bad actor can attack or probe the host system, and it ties up some of the attacker’s resources that might otherwise be spent attacking another host. When done well, a tarpit imposes more cost on the attacker than the defender.
  The Internet is a very hostile place, and anyone who’s ever stood up an Internet-facing IPv4 host has witnessed the immediate and continuous attacks against their server. I’ve maintained such a server for nearly six years now, and more than 99% of my incoming traffic has ill intent. One part of my defenses has been tarpits in various forms.</p>
  
  <hr />
</blockquote>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="rdist1whenansibleistoomuchhttpschargenoneobsdamsrdist1whenansibleistoomuch"><a href="https://chargen.one/obsdams/rdist-1-when-ansible-is-too-much">rdist(1) – when Ansible is too much</a></h3>

<blockquote>
  <p>The post written about rdist(1) on johan.huldtgren.com sparked
  us to write one as well. It's a great, underappreciated, tool. And we wanted to show how we wrapped doas(1) around it.
  There are two services in our infrastructure for which we were looking to keep the configuration in sync and to reload the process when the configuration had indeed changed. There is a pair of nsd(8)/unbound(8) hosts and a pair of hosts running relayd(8)/httpd(8) with carp(4) between them.
  We didn't have a requirement to go full configuration management with tools like Ansible or Salt Stack. And there wasn't any interest in building additional logic on top of rsync or repositories. > Enter rdist(1), rdist is a program to maintain identical copies of files over multiple hosts. It preserves the owner, group, mode, and mtime of files if possible and can update programs that are executing.</p>
  
  <hr />
</blockquote>

<h3 id="fallinginlovewithopenbsdagainhttpsfunctionallyparanoidcom20190313wellitsbeenawhilefallinginlovewithopenbsdagain"><a href="https://functionallyparanoid.com/2019/03/13/well-its-been-a-while-falling-in-love-with-openbsd-again/">Falling in love with OpenBSD again</a></h3>

<blockquote>
  <p>I was checking the other day and was appalled at how long it has been since I posted here.  I had been working a job during 2018 that had me traveling 3,600 miles by air every week so that is at least a viable excuse.
  So what is my latest project?  I wanted to get something better than the clunky old T500 “freedom laptop” that I could use as my daily driver.  Some background here.  My first paid gig as a programmer was on SunOS 4 (predecessor to Solaris) and Ultrix (on a DEC MicroVAX).  I went from there to a Commodore Amiga (preemptive multitasking in 1985!).  I went from there to OS/2 (I know, patron saint of lost causes) and then finally decided to “sell out” and move to Windows as the path of least resistance in the mid 90’s.
  My wife bought me an iPod literally just as they started working with computers other than Macs and I watched with fascination as Apple made the big gamble and moved away from PowerPC chips to Intel.  That was the beginning of the Apple Fan Boi years for me.  My gateway drug was a G4 MacMini and I managed somehow to get in on the pre-production, developer build of an Intel-based Mac.  I was quite happy on the platform until about three years ago.</p>
  
  <hr />
</blockquote>

<h3 id="howicreatedmyfirstfreebsdporthttpsaikchardevbloghowicreatedmyfirstfreebsdporthtml"><a href="https://aikchar.dev/blog/how-i-created-my-first-freebsd-port.html">How I Created My First FreeBSD Port</a></h3>

<blockquote>
  <p>I created my first FreeBSD port recently. I found that FreeBSD didn't have a port for GoCD, which is a continuous integration and continuous deployment (CI/CD) system. This was a great opportunity to learn how to build a FreeBSD port while also contributing back to the community</p>
  
  <hr />
</blockquote>

<h3 id="thetildeinstituteofopenbsdeducationhttpstildeinstitute"><a href="https://tilde.institute/">The Tilde Institute of OpenBSD Education</a></h3>

<blockquote>
  <p>Welcome to tilde.institute! This is an OpenBSD machine whose purpose is to provide a space in the tildeverse for experimentation with and education of the OpenBSD operating system. A variety of editors, shells, and compilers are installed to allow for development in a native OpenBSD environment. OpenBSD's httpd(8) is configured with slowcgi(8) as the fastcgi provider and sqlite3 available. This allows users to experiment with web development using compiled CGI in C, aka the BCHS Stack. In addition to php7.0 and mysql (mariadb) by request, this provides an environment where the development of complex web apps is possible.</p>
  
  <hr />
</blockquote>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://www.solobsd.org/index.php/2019/03/26/solobsd-19-03-stable/">SoloBSD 19.03-STABLE</a></li>

<li><a href="https://docs.google.com/presentation/d/1BbveYtY9IhuPCOLsEafwXMefkiY3REJBYl-opMAKQC0/edit#slide=id.p">WireGuard for NetBSD</a></li>

<li>[NetBSD - Removing PF](https://mail-index.netbsd.org/tech-kern/2019/03/29/msg024883.html
)</li>

<li><a href="https://devblogs.microsoft.com/oldnewthing/20190325-00/?p=102359">What does the N in nmake stand for?</a></li>

<li><a href="https://kottke.org/19/03/a-map-of-the-internet-from-may-1973">A Map of the Internet from May 1973</a></li>

<li><a href="https://hackaday.io/project/164343-nsa-b-gone">NSA-B-Gone : A sketchy hardware security device for your x220</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Jake - <a href="http://dpaste.com/1Y22ZJM">A single jail as a VPN client</a></li>

<li>Matt - <a href="http://dpaste.com/2FAFC3A#wrap">Surprising BSD Features</a></li>

<li>cia - <a href="http://dpaste.com/2T4J7G3">Routing and ZFS</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0294.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A PI-powered Plan 9 cluster, an SSH tarpit, rdist for when Ansible is too much, falling in love with OpenBSD again, how I created my first FreeBSD port, the Tilde Institute of OpenBSD education and more.</p>

<h2 id="headlines">Headlines</h2>

<h3 id="apipoweredplan9clusterhttpswwwrsonlinecomdesignsparkapipoweredplan9cluster"><a href="https://www.rs-online.com/designspark/a-pi-powered-plan-9-cluster">A Pi-Powered Plan 9 Cluster</a></h3>

<blockquote>
  <p>Plan 9 from Bell Labs comes from the same stable as the UNIX operating system, which of course Linux was designed after, and Apple’s OS X runs on top of a certified UNIX operating system. Just like UNIX, Plan 9 was developed as a research O/S — a vehicle for trying out new concepts — with it building on key UNIX principles and taking the idea of devices are just files even further.
  In this post, we take a quick look at the Plan 9 O/S and some of the notable features, before moving on to the construction of a self-contained 4-node Raspberry Pi cluster that will provide a compact platform for experimentation.</p>
  
  <hr />
</blockquote>

<h3 id="endlesshansshtarpithttpsnullprogramcomblog20190322"><a href="https://nullprogram.com/blog/2019/03/22/">Endlessh: an SSH Tarpit</a></h3>

<blockquote>
  <p>I’m a big fan of tarpits: a network service that intentionally inserts delays in its protocol, slowing down clients by forcing them to wait. This arrests the speed at which a bad actor can attack or probe the host system, and it ties up some of the attacker’s resources that might otherwise be spent attacking another host. When done well, a tarpit imposes more cost on the attacker than the defender.
  The Internet is a very hostile place, and anyone who’s ever stood up an Internet-facing IPv4 host has witnessed the immediate and continuous attacks against their server. I’ve maintained such a server for nearly six years now, and more than 99% of my incoming traffic has ill intent. One part of my defenses has been tarpits in various forms.</p>
  
  <hr />
</blockquote>

<h2 id="newsroundup">News Roundup</h2>

<h3 id="rdist1whenansibleistoomuchhttpschargenoneobsdamsrdist1whenansibleistoomuch"><a href="https://chargen.one/obsdams/rdist-1-when-ansible-is-too-much">rdist(1) – when Ansible is too much</a></h3>

<blockquote>
  <p>The post written about rdist(1) on johan.huldtgren.com sparked
  us to write one as well. It's a great, underappreciated, tool. And we wanted to show how we wrapped doas(1) around it.
  There are two services in our infrastructure for which we were looking to keep the configuration in sync and to reload the process when the configuration had indeed changed. There is a pair of nsd(8)/unbound(8) hosts and a pair of hosts running relayd(8)/httpd(8) with carp(4) between them.
  We didn't have a requirement to go full configuration management with tools like Ansible or Salt Stack. And there wasn't any interest in building additional logic on top of rsync or repositories. > Enter rdist(1), rdist is a program to maintain identical copies of files over multiple hosts. It preserves the owner, group, mode, and mtime of files if possible and can update programs that are executing.</p>
  
  <hr />
</blockquote>

<h3 id="fallinginlovewithopenbsdagainhttpsfunctionallyparanoidcom20190313wellitsbeenawhilefallinginlovewithopenbsdagain"><a href="https://functionallyparanoid.com/2019/03/13/well-its-been-a-while-falling-in-love-with-openbsd-again/">Falling in love with OpenBSD again</a></h3>

<blockquote>
  <p>I was checking the other day and was appalled at how long it has been since I posted here.  I had been working a job during 2018 that had me traveling 3,600 miles by air every week so that is at least a viable excuse.
  So what is my latest project?  I wanted to get something better than the clunky old T500 “freedom laptop” that I could use as my daily driver.  Some background here.  My first paid gig as a programmer was on SunOS 4 (predecessor to Solaris) and Ultrix (on a DEC MicroVAX).  I went from there to a Commodore Amiga (preemptive multitasking in 1985!).  I went from there to OS/2 (I know, patron saint of lost causes) and then finally decided to “sell out” and move to Windows as the path of least resistance in the mid 90’s.
  My wife bought me an iPod literally just as they started working with computers other than Macs and I watched with fascination as Apple made the big gamble and moved away from PowerPC chips to Intel.  That was the beginning of the Apple Fan Boi years for me.  My gateway drug was a G4 MacMini and I managed somehow to get in on the pre-production, developer build of an Intel-based Mac.  I was quite happy on the platform until about three years ago.</p>
  
  <hr />
</blockquote>

<h3 id="howicreatedmyfirstfreebsdporthttpsaikchardevbloghowicreatedmyfirstfreebsdporthtml"><a href="https://aikchar.dev/blog/how-i-created-my-first-freebsd-port.html">How I Created My First FreeBSD Port</a></h3>

<blockquote>
  <p>I created my first FreeBSD port recently. I found that FreeBSD didn't have a port for GoCD, which is a continuous integration and continuous deployment (CI/CD) system. This was a great opportunity to learn how to build a FreeBSD port while also contributing back to the community</p>
  
  <hr />
</blockquote>

<h3 id="thetildeinstituteofopenbsdeducationhttpstildeinstitute"><a href="https://tilde.institute/">The Tilde Institute of OpenBSD Education</a></h3>

<blockquote>
  <p>Welcome to tilde.institute! This is an OpenBSD machine whose purpose is to provide a space in the tildeverse for experimentation with and education of the OpenBSD operating system. A variety of editors, shells, and compilers are installed to allow for development in a native OpenBSD environment. OpenBSD's httpd(8) is configured with slowcgi(8) as the fastcgi provider and sqlite3 available. This allows users to experiment with web development using compiled CGI in C, aka the BCHS Stack. In addition to php7.0 and mysql (mariadb) by request, this provides an environment where the development of complex web apps is possible.</p>
  
  <hr />
</blockquote>

<h2 id="beastiebits">Beastie Bits</h2>

<ul>
<li><a href="https://www.solobsd.org/index.php/2019/03/26/solobsd-19-03-stable/">SoloBSD 19.03-STABLE</a></li>

<li><a href="https://docs.google.com/presentation/d/1BbveYtY9IhuPCOLsEafwXMefkiY3REJBYl-opMAKQC0/edit#slide=id.p">WireGuard for NetBSD</a></li>

<li>[NetBSD - Removing PF](https://mail-index.netbsd.org/tech-kern/2019/03/29/msg024883.html
)</li>

<li><a href="https://devblogs.microsoft.com/oldnewthing/20190325-00/?p=102359">What does the N in nmake stand for?</a></li>

<li><a href="https://kottke.org/19/03/a-map-of-the-internet-from-may-1973">A Map of the Internet from May 1973</a></li>

<li><a href="https://hackaday.io/project/164343-nsa-b-gone">NSA-B-Gone : A sketchy hardware security device for your x220</a></li>
</ul>

<p><hr /></p>

<h2 id="feedbackquestions">Feedback/Questions</h2>

<ul>
<li>Jake - <a href="http://dpaste.com/1Y22ZJM">A single jail as a VPN client</a></li>

<li>Matt - <a href="http://dpaste.com/2FAFC3A#wrap">Surprising BSD Features</a></li>

<li>cia - <a href="http://dpaste.com/2T4J7G3">Routing and ZFS</a></li>
</ul>

<p><hr /></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0294.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 280: FOSS Clothing | BSD Now 280</title>
  <link>https://www.bsdnow.tv/280</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-3132</guid>
  <pubDate>Thu, 10 Jan 2019 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/bad2a854-7f51-4ff6-84a9-7c324c5cf277.mp3" length="31619268" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>A EULA in FOSS clothing, NetBSD with more LLVM support, Thoughts on FreeBSD 12.0, FreeBSD Performance against Windows and Linux on Xeon, Microsoft shipping NetBSD, and more.</itunes:subtitle>
  <itunes:duration>52:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;A EULA in FOSS clothing, NetBSD with more LLVM support, Thoughts on FreeBSD 12.0, FreeBSD Performance against Windows and Linux on Xeon, Microsoft shipping NetBSD, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://dtrace.org/blogs/bmc/2018/12/16/a-eula-in-foss-clothing/" target="_blank" rel="nofollow noopener"&gt;A EULA in FOSS clothing?&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;There was a tremendous amount of reaction to and discussion about &lt;a href="http://dtrace.org/blogs/bmc/2018/12/14/open-source-confronts-its-midlife-crisis/" target="_blank" rel="nofollow noopener"&gt;my blog entry on the midlife crisis in open source&lt;/a&gt;. As part of this discussion on HN, Jay Kreps of Confluent took the time to write a &lt;a href="https://news.ycombinator.com/item?id=18687498#18689179" target="_blank" rel="nofollow noopener"&gt;detailed response&lt;/a&gt; — which he shortly thereafter elevated into a &lt;a href="https://medium.com/@jaykreps/a-quick-comment-on-bryan-cantrills-blog-on-licensing-8dccee41d9e6" target="_blank" rel="nofollow noopener"&gt;blog entry&lt;/a&gt;.&lt;/blockquote&gt;

&lt;blockquote&gt;Let me be clear that I hold Jay in high regard, as both a software engineer and an entrepreneur — and I appreciate the time he took to write a thoughtful response. That said, there are aspects of his response that I found troubling enough to closely re-read the Confluent Community License — and that in turn has led me to a deeply disturbing realization about what is potentially going on here.&lt;/blockquote&gt;

&lt;blockquote&gt;To GitHub: Assuming that this is in fact a EULA, I think it is perilous to allow EULAs to sit in public repositories. It’s one thing to have one click through to accept a license (though again, that itself is dubious), but to say that a git clone is an implicit acceptance of a contract that happens to be sitting somewhere in the repository beggars belief. With efforts like &lt;a href="http://choosealicense.com" target="_blank" rel="nofollow noopener"&gt;choosealicense.com&lt;/a&gt;, GitHub has been a model in guiding projects with respect to licensing; it would be helpful for GitHub’s counsel to weigh in on their view of this new strain of source-available proprietary software and the degree to which it comes into conflict with GitHub’s own terms of service.&lt;/blockquote&gt;

&lt;blockquote&gt;To foundations concerned with software liberties, including the Apache Foundation, the Linux Foundation, the Free Software Foundation, the Electronic Frontier Foundation, the Open Source Initiative, and the Software Freedom Conservancy: the open source community needs your legal review on this! I don’t think I’m being too alarmist when I say that this is potentially a dangerous new precedent being set; it would be very helpful to have your lawyers offer their perspectives on this, even if they disagree with one another. We seem to be in some terrible new era of frankenlicenses, where the worst of proprietary licenses are bolted on to the goodwill created by open source licenses; we need your legal voices before these creatures destroy the village!&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;NetBSD and LLVM&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_entering_2019_with_more" target="_blank" rel="nofollow noopener"&gt;NetBSD entering 2019 with more complete LLVM support&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;I’m recently helping the NetBSD developers to improve the support for this operating system in various LLVM components. As you can read in my previous report, I’ve been focusing on fixing build and test failures for the purpose of improving the buildbot coverage.
Previously, I’ve resolved test failures in LLVM, Clang, LLD, libunwind, openmp and partially libc++. During the remainder of the month, I’ve been working on the remaining libc++ test failures, improving the NetBSD clang driver and helping Kamil Rytarowski with compiler-rt.&lt;/blockquote&gt;

&lt;p&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/the_process_of_upstreaming_support" target="_blank" rel="nofollow noopener"&gt;The process of upstreaming support to LLVM sanitizers has been finalized&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;I’ve finished the process of upstreaming patches to LLVM sanitizers (almost 2000LOC of local code) and submitted to upstream new improvements for the NetBSD support. Today out of the box (in unpatched version) we have support for a variety of compiler-rt LLVM features: ASan (finds unauthorized memory access), UBSan (finds unspecified code semantics), TSan (finds threading bugs), MSan (finds uninitialized memory use), SafeStack (double stack hardening), Profile (code coverage), XRay (dynamic code tracing); while other ones such as Scudo (hardened allocator) or DFSan (generic data flow sanitizer) are not far away from completeness.
The NetBSD support is no longer visibly lacking behind Linux in sanitizers, although there are still failing tests on NetBSD that are not observed on Linux. On the other hand there are features working on NetBSD that are not functional on Linux, like sanitizing programs during early initialization process of OS (this is caused by /proc dependency on Linux that is mounted by startup programs, while NetBSD relies on sysctl(3) interfaces that is always available).&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://distrowatch.com/weekly.php?issue=20190107#freebsd" target="_blank" rel="nofollow noopener"&gt;Thoughts on FreeBSD 12.0&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;Playing with FreeBSD with past week I don’t feel as though there were any big surprises or changes in this release compared to FreeBSD 11. In typical FreeBSD fashion, progress tends to be evolutionary rather than revolutionary, and this release feels like a polished and improved incremental step forward. I like that the installer handles both UFS and ZFS guided partitioning now and in a friendly manner. In the past I had trouble getting FreeBSD’s boot menu to work with boot environments, but that has been fixed for this release.
I like the security options in the installer too. These are not new, but I think worth mentioning. FreeBSD, unlike most Linux distributions, offers several low-level security options (like hiding other users’ processes and randomizing PIDs) and I like having these presented at install time. It’s harder for people to attack what they cannot see, or predict, and FreeBSD optionally makes these little adjustment for us.
Something which stands out about FreeBSD, compared to most Linux distributions I run, is that FreeBSD rarely holds the user’s hand, but also rarely surprises the user. This means there is more reading to do up front and new users may struggle to get used to editing configuration files in a text editor. But FreeBSD rarely does anything unless told to do it. Updates rarely change the system’s behaviour, working technology rarely gets swapped out for something new, the system and its applications never crashed during my trial. Everything was rock solid. The operating system may seem like a minimal, blank slate to new users, but it’s wonderfully dependable and predictable in my experience.
I probably wouldn’t recommend FreeBSD for desktop use. It’s close relative, GhostBSD, ships with a friendly desktop and does special work to make end user applications run smoothly. But for people who want to run servers, possible for years without change or issues, FreeBSD is a great option. It’s also an attractive choice, in my opinion, for people who like to build their system from the ground up, like you would with Debian’s server install or Arch Linux. Apart from the base tools and documentation, there is nothing on a FreeBSD system apart from what we put on it.&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.phoronix.com/scan.php?page=article&amp;amp;item=freebsd-12-windows&amp;amp;num=1" target="_blank" rel="nofollow noopener"&gt;FreeBSD 12.0 Performance Against Windows &amp;amp; Linux On An Intel Xeon Server&lt;/a&gt;&lt;/h3&gt;

&lt;blockquote&gt;Last week I posted benchmarks of Windows Server 2019 against various Linux distributions using a Tyan dual socket Intel Xeon server. In this article are some complementary results when adding in the performance of FreeBSD 11.2 against the new FreeBSD 12.0 stable release for this leading BSD operating system. As some fun benchmarks to end out 2018, here are the results of FreeBSD 11.2/12.0 (including an additional run when using GCC rather than Clang) up against Windows Server and several enterprise-ready Linux distributions.
While FreeBSD 12.0 had picked up just one win of the Windows/Linux comparisons run, the FreeBSD performance is moving in the right direction. FreeBSD 12.0 was certainly faster than FreeBSD 11.2 on this dual Intel Xeon Scalable server based on a Tyan 1U platform. Meanwhile, to no surprise given the data last week, Clear Linux was by far the fastest out-of-the-box operating system tested.
I did run some extra benchmarks on FreeBSD 11.2/12.0 with this hardware: in total I ran 120 benchmarks for these BSD tests. Of the 120 tests, there were just 15 cases where FreeBSD 11.2 was faster than 12.0. Seeing FreeBSD 12.0 faster than 11.2 nearly 90% of the time is an accomplishment and usually with other operating systems we see more of a mixed bag on new releases with not such solidly better performance. It was also great seeing the competitive performance out of FreeBSD when using the Clang compiler for the source-based tests compared to the GCC8 performance. Additional data available via this &lt;a href="http://OpenBenchmarking.org" target="_blank" rel="nofollow noopener"&gt;OpenBenchmarking.org&lt;/a&gt; result file.&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://fogey.com/contemplating/?p=1023" target="_blank" rel="nofollow noopener"&gt;How NetBSD came to be shipped by Microsoft&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://webcache.googleusercontent.com/search?q=cache:5XwAm5tvJ4AJ:fogey.com/contemplating/%3Fp%3D1023+&amp;amp;cd=1&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;gl=us" target="_blank" rel="nofollow noopener"&gt;Google cache in case the site is down&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;In 2000, Joe Britt, Matt Hershenson and Andy Rubin formed Danger Incorporated. Danger developed the world’s first recognizable smartphone, the Danger HipTop. T-Mobile sold the first HipTop under the brand name Sidekick in October of 2002.
Danger had a well developed kernel that had been designed and built in house. The kernel came to be viewed as not a core intellectual property and Danger started a search for a replacement. For business reasons, mostly to do with legal concerns over the Gnu Public License, Danger rejected Linux and began to consider BSD Unix as a replacement for the kernel.
In 2006 I was hired by Mike Chen, the manager of the kernel development group to investigate the feasibility of replacing the Danger kernel with a BSD kernel, to select the version of BSD to use, to develop a prototype and to develop the plan for adapting BSD to Danger’s requirements.
NetBSD was easily the best choice among the BSD variations at the time because it had well developed cross development tools. It was easy to use a NetBSD desktop running an Intel release to cross compile a NetBSD kernel and runtime for a device running an ARM processor. (Those interested in mailing list archaeology might be amused to investigate NetBSD technical mailing list for mail from picovex, particularly from Bucky Katz at picovex.)
We began product development on the specific prototype of the phone that would become the Sidekick LX2009 in 2007 and contracts for the phone were written with T-Mobile. We were about half way through the two year development cycle when Microsoft purchased Danger in 2008.
Microsoft would have preferred to ship the Sidekick running Windows/CE rather than NetBSD, but a schedule analysis performed by me, and another by an independent outside contractor, indicated that doing so would result in unacceptable delay.&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
    &lt;li&gt;&lt;a href="http://lists.31bits.net/archives/devel/2018-December/000033.html" target="_blank" rel="nofollow noopener"&gt;Unleashed 1.2 Released&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://media.ccc.de/v/35c3-9647-taming_the_chaos_can_we_build_systems_that_actually_work" target="_blank" rel="nofollow noopener"&gt;35th CCC - Taming the Chaos: Can we build systems that actually work? &lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://rachelbythebay.com/w/2018/12/30/v6/" target="_blank" rel="nofollow noopener"&gt;Potholes to avoid when migrating to IPv6&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.jwz.org/blog/2018/12/xscreensaver-5-41/" target="_blank" rel="nofollow noopener"&gt;XScreenSaver 5.42&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://hackertarget.com/ssh-examples-tunnels/" target="_blank" rel="nofollow noopener"&gt;SSH Examples and Tunnels&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://old.reddit.com/r/freebsd/comments/abevqa/mbuf9_request_for_comment/" target="_blank" rel="nofollow noopener"&gt;Help request - mbuf(9) - request for comment&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://www.zdnet.com/article/nsa-to-release-a-free-reverse-engineering-tool/" target="_blank" rel="nofollow noopener"&gt;NSA to release free Reverse Engineering Tool&lt;/a&gt;&lt;/li&gt;
    &lt;li&gt;&lt;a href="https://blog.grem.de/sysadmin/FreeBSD-On-rpi3-With-crochet-2018-10-27-18-00.html" target="_blank" rel="nofollow noopener"&gt;Running FreeBSD on a Raspberry Pi3 using a custom image created with crochet and poudriere&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
    &lt;li&gt;Dries - &lt;a href="http://dpaste.com/2DCEJD6#wrap" target="_blank" rel="nofollow noopener"&gt;Lets talk a bit about VIMAGE jails&lt;/a&gt;
&lt;/li&gt;
    &lt;li&gt;ohb - &lt;a href="http://dpaste.com/1EGDSKQ#wrap" target="_blank" rel="nofollow noopener"&gt;Question About ZFS Root Dataset&lt;/a&gt;
&lt;/li&gt;
    &lt;li&gt;Micah - &lt;a href="http://dpaste.com/3TK2JWF#wrap" target="_blank" rel="nofollow noopener"&gt;Active-Active NAS Sync recommendations&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
    &lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, EULA, github, llvm, microsoft, sidekick, danger, CCC, xscreensaver, ssh, nsa</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A EULA in FOSS clothing, NetBSD with more LLVM support, Thoughts on FreeBSD 12.0, FreeBSD Performance against Windows and Linux on Xeon, Microsoft shipping NetBSD, and more.</p>

<h2>Headlines</h2>

<h3><a href="http://dtrace.org/blogs/bmc/2018/12/16/a-eula-in-foss-clothing/">A EULA in FOSS clothing?</a></h3>

<blockquote>There was a tremendous amount of reaction to and discussion about <a href="http://dtrace.org/blogs/bmc/2018/12/14/open-source-confronts-its-midlife-crisis/">my blog entry on the midlife crisis in open source</a>. As part of this discussion on HN, Jay Kreps of Confluent took the time to write a <a href="https://news.ycombinator.com/item?id=18687498#18689179">detailed response</a> — which he shortly thereafter elevated into a <a href="https://medium.com/@jaykreps/a-quick-comment-on-bryan-cantrills-blog-on-licensing-8dccee41d9e6">blog entry</a>.</blockquote>

<blockquote>Let me be clear that I hold Jay in high regard, as both a software engineer and an entrepreneur — and I appreciate the time he took to write a thoughtful response. That said, there are aspects of his response that I found troubling enough to closely re-read the Confluent Community License — and that in turn has led me to a deeply disturbing realization about what is potentially going on here.</blockquote>

<blockquote>To GitHub: Assuming that this is in fact a EULA, I think it is perilous to allow EULAs to sit in public repositories. It’s one thing to have one click through to accept a license (though again, that itself is dubious), but to say that a git clone is an implicit acceptance of a contract that happens to be sitting somewhere in the repository beggars belief. With efforts like <a href="http://choosealicense.com">choosealicense.com</a>, GitHub has been a model in guiding projects with respect to licensing; it would be helpful for GitHub’s counsel to weigh in on their view of this new strain of source-available proprietary software and the degree to which it comes into conflict with GitHub’s own terms of service.</blockquote>

<blockquote>To foundations concerned with software liberties, including the Apache Foundation, the Linux Foundation, the Free Software Foundation, the Electronic Frontier Foundation, the Open Source Initiative, and the Software Freedom Conservancy: the open source community needs your legal review on this! I don’t think I’m being too alarmist when I say that this is potentially a dangerous new precedent being set; it would be very helpful to have your lawyers offer their perspectives on this, even if they disagree with one another. We seem to be in some terrible new era of frankenlicenses, where the worst of proprietary licenses are bolted on to the goodwill created by open source licenses; we need your legal voices before these creatures destroy the village!</blockquote>

<p><hr /></p>

<h3>NetBSD and LLVM</h3>

<p><a href="https://blog.netbsd.org/tnf/entry/netbsd_entering_2019_with_more">NetBSD entering 2019 with more complete LLVM support</a></p>

<blockquote>I’m recently helping the NetBSD developers to improve the support for this operating system in various LLVM components. As you can read in my previous report, I’ve been focusing on fixing build and test failures for the purpose of improving the buildbot coverage.
Previously, I’ve resolved test failures in LLVM, Clang, LLD, libunwind, openmp and partially libc++. During the remainder of the month, I’ve been working on the remaining libc++ test failures, improving the NetBSD clang driver and helping Kamil Rytarowski with compiler-rt.</blockquote>

<p><a href="https://blog.netbsd.org/tnf/entry/the_process_of_upstreaming_support">The process of upstreaming support to LLVM sanitizers has been finalized</a></p>

<blockquote>I’ve finished the process of upstreaming patches to LLVM sanitizers (almost 2000LOC of local code) and submitted to upstream new improvements for the NetBSD support. Today out of the box (in unpatched version) we have support for a variety of compiler-rt LLVM features: ASan (finds unauthorized memory access), UBSan (finds unspecified code semantics), TSan (finds threading bugs), MSan (finds uninitialized memory use), SafeStack (double stack hardening), Profile (code coverage), XRay (dynamic code tracing); while other ones such as Scudo (hardened allocator) or DFSan (generic data flow sanitizer) are not far away from completeness.
The NetBSD support is no longer visibly lacking behind Linux in sanitizers, although there are still failing tests on NetBSD that are not observed on Linux. On the other hand there are features working on NetBSD that are not functional on Linux, like sanitizing programs during early initialization process of OS (this is caused by /proc dependency on Linux that is mounted by startup programs, while NetBSD relies on sysctl(3) interfaces that is always available).</blockquote>

<p><hr /></p>

<h2>News Roundup</h2>

<h3><a href="https://distrowatch.com/weekly.php?issue=20190107#freebsd">Thoughts on FreeBSD 12.0</a></h3>

<blockquote>Playing with FreeBSD with past week I don’t feel as though there were any big surprises or changes in this release compared to FreeBSD 11. In typical FreeBSD fashion, progress tends to be evolutionary rather than revolutionary, and this release feels like a polished and improved incremental step forward. I like that the installer handles both UFS and ZFS guided partitioning now and in a friendly manner. In the past I had trouble getting FreeBSD’s boot menu to work with boot environments, but that has been fixed for this release.
I like the security options in the installer too. These are not new, but I think worth mentioning. FreeBSD, unlike most Linux distributions, offers several low-level security options (like hiding other users’ processes and randomizing PIDs) and I like having these presented at install time. It’s harder for people to attack what they cannot see, or predict, and FreeBSD optionally makes these little adjustment for us.
Something which stands out about FreeBSD, compared to most Linux distributions I run, is that FreeBSD rarely holds the user’s hand, but also rarely surprises the user. This means there is more reading to do up front and new users may struggle to get used to editing configuration files in a text editor. But FreeBSD rarely does anything unless told to do it. Updates rarely change the system’s behaviour, working technology rarely gets swapped out for something new, the system and its applications never crashed during my trial. Everything was rock solid. The operating system may seem like a minimal, blank slate to new users, but it’s wonderfully dependable and predictable in my experience.
I probably wouldn’t recommend FreeBSD for desktop use. It’s close relative, GhostBSD, ships with a friendly desktop and does special work to make end user applications run smoothly. But for people who want to run servers, possible for years without change or issues, FreeBSD is a great option. It’s also an attractive choice, in my opinion, for people who like to build their system from the ground up, like you would with Debian’s server install or Arch Linux. Apart from the base tools and documentation, there is nothing on a FreeBSD system apart from what we put on it.</blockquote>

<p><hr /></p>

<h3><a href="https://www.phoronix.com/scan.php?page=article&amp;item=freebsd-12-windows&amp;num=1">FreeBSD 12.0 Performance Against Windows &amp; Linux On An Intel Xeon Server</a></h3>

<blockquote>Last week I posted benchmarks of Windows Server 2019 against various Linux distributions using a Tyan dual socket Intel Xeon server. In this article are some complementary results when adding in the performance of FreeBSD 11.2 against the new FreeBSD 12.0 stable release for this leading BSD operating system. As some fun benchmarks to end out 2018, here are the results of FreeBSD 11.2/12.0 (including an additional run when using GCC rather than Clang) up against Windows Server and several enterprise-ready Linux distributions.
While FreeBSD 12.0 had picked up just one win of the Windows/Linux comparisons run, the FreeBSD performance is moving in the right direction. FreeBSD 12.0 was certainly faster than FreeBSD 11.2 on this dual Intel Xeon Scalable server based on a Tyan 1U platform. Meanwhile, to no surprise given the data last week, Clear Linux was by far the fastest out-of-the-box operating system tested.
I did run some extra benchmarks on FreeBSD 11.2/12.0 with this hardware: in total I ran 120 benchmarks for these BSD tests. Of the 120 tests, there were just 15 cases where FreeBSD 11.2 was faster than 12.0. Seeing FreeBSD 12.0 faster than 11.2 nearly 90% of the time is an accomplishment and usually with other operating systems we see more of a mixed bag on new releases with not such solidly better performance. It was also great seeing the competitive performance out of FreeBSD when using the Clang compiler for the source-based tests compared to the GCC8 performance. Additional data available via this <a href="http://OpenBenchmarking.org">OpenBenchmarking.org</a> result file.</blockquote>

<p><hr /></p>

<h3><a href="http://fogey.com/contemplating/?p=1023">How NetBSD came to be shipped by Microsoft</a></h3>

<p><a href="https://webcache.googleusercontent.com/search?q=cache:5XwAm5tvJ4AJ:fogey.com/contemplating/%3Fp%3D1023+&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us">Google cache in case the site is down</a></p>

<blockquote>In 2000, Joe Britt, Matt Hershenson and Andy Rubin formed Danger Incorporated. Danger developed the world’s first recognizable smartphone, the Danger HipTop. T-Mobile sold the first HipTop under the brand name Sidekick in October of 2002.
Danger had a well developed kernel that had been designed and built in house. The kernel came to be viewed as not a core intellectual property and Danger started a search for a replacement. For business reasons, mostly to do with legal concerns over the Gnu Public License, Danger rejected Linux and began to consider BSD Unix as a replacement for the kernel.
In 2006 I was hired by Mike Chen, the manager of the kernel development group to investigate the feasibility of replacing the Danger kernel with a BSD kernel, to select the version of BSD to use, to develop a prototype and to develop the plan for adapting BSD to Danger’s requirements.
NetBSD was easily the best choice among the BSD variations at the time because it had well developed cross development tools. It was easy to use a NetBSD desktop running an Intel release to cross compile a NetBSD kernel and runtime for a device running an ARM processor. (Those interested in mailing list archaeology might be amused to investigate NetBSD technical mailing list for mail from picovex, particularly from Bucky Katz at picovex.)
We began product development on the specific prototype of the phone that would become the Sidekick LX2009 in 2007 and contracts for the phone were written with T-Mobile. We were about half way through the two year development cycle when Microsoft purchased Danger in 2008.
Microsoft would have preferred to ship the Sidekick running Windows/CE rather than NetBSD, but a schedule analysis performed by me, and another by an independent outside contractor, indicated that doing so would result in unacceptable delay.</blockquote>

<p><hr /></p>

<h2>Beastie Bits</h2>

<ul>
    <li><a href="http://lists.31bits.net/archives/devel/2018-December/000033.html">Unleashed 1.2 Released</a></li>
    <li><a href="https://media.ccc.de/v/35c3-9647-taming_the_chaos_can_we_build_systems_that_actually_work">35th CCC - Taming the Chaos: Can we build systems that actually work? </a></li>
    <li><a href="https://rachelbythebay.com/w/2018/12/30/v6/">Potholes to avoid when migrating to IPv6</a></li>
    <li><a href="https://www.jwz.org/blog/2018/12/xscreensaver-5-41/">XScreenSaver 5.42</a></li>
    <li><a href="https://hackertarget.com/ssh-examples-tunnels/">SSH Examples and Tunnels</a></li>
    <li><a href="https://old.reddit.com/r/freebsd/comments/abevqa/mbuf9_request_for_comment/">Help request - mbuf(9) - request for comment</a></li>
    <li><a href="https://www.zdnet.com/article/nsa-to-release-a-free-reverse-engineering-tool/">NSA to release free Reverse Engineering Tool</a></li>
    <li><a href="https://blog.grem.de/sysadmin/FreeBSD-On-rpi3-With-crochet-2018-10-27-18-00.html">Running FreeBSD on a Raspberry Pi3 using a custom image created with crochet and poudriere</a></li>
</ul>

<p><hr /></p>

<h2>Feedback/Questions</h2>

<ul>
    <li>Dries - <a href="http://dpaste.com/2DCEJD6#wrap">Lets talk a bit about VIMAGE jails</a></li>
    <li>ohb - <a href="http://dpaste.com/1EGDSKQ#wrap">Question About ZFS Root Dataset</a></li>
    <li>Micah - <a href="http://dpaste.com/3TK2JWF#wrap">Active-Active NAS Sync recommendations</a></li>
</ul>

<p><hr /></p>

<ul>
    <li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A EULA in FOSS clothing, NetBSD with more LLVM support, Thoughts on FreeBSD 12.0, FreeBSD Performance against Windows and Linux on Xeon, Microsoft shipping NetBSD, and more.</p>

<h2>Headlines</h2>

<h3><a href="http://dtrace.org/blogs/bmc/2018/12/16/a-eula-in-foss-clothing/">A EULA in FOSS clothing?</a></h3>

<blockquote>There was a tremendous amount of reaction to and discussion about <a href="http://dtrace.org/blogs/bmc/2018/12/14/open-source-confronts-its-midlife-crisis/">my blog entry on the midlife crisis in open source</a>. As part of this discussion on HN, Jay Kreps of Confluent took the time to write a <a href="https://news.ycombinator.com/item?id=18687498#18689179">detailed response</a> — which he shortly thereafter elevated into a <a href="https://medium.com/@jaykreps/a-quick-comment-on-bryan-cantrills-blog-on-licensing-8dccee41d9e6">blog entry</a>.</blockquote>

<blockquote>Let me be clear that I hold Jay in high regard, as both a software engineer and an entrepreneur — and I appreciate the time he took to write a thoughtful response. That said, there are aspects of his response that I found troubling enough to closely re-read the Confluent Community License — and that in turn has led me to a deeply disturbing realization about what is potentially going on here.</blockquote>

<blockquote>To GitHub: Assuming that this is in fact a EULA, I think it is perilous to allow EULAs to sit in public repositories. It’s one thing to have one click through to accept a license (though again, that itself is dubious), but to say that a git clone is an implicit acceptance of a contract that happens to be sitting somewhere in the repository beggars belief. With efforts like <a href="http://choosealicense.com">choosealicense.com</a>, GitHub has been a model in guiding projects with respect to licensing; it would be helpful for GitHub’s counsel to weigh in on their view of this new strain of source-available proprietary software and the degree to which it comes into conflict with GitHub’s own terms of service.</blockquote>

<blockquote>To foundations concerned with software liberties, including the Apache Foundation, the Linux Foundation, the Free Software Foundation, the Electronic Frontier Foundation, the Open Source Initiative, and the Software Freedom Conservancy: the open source community needs your legal review on this! I don’t think I’m being too alarmist when I say that this is potentially a dangerous new precedent being set; it would be very helpful to have your lawyers offer their perspectives on this, even if they disagree with one another. We seem to be in some terrible new era of frankenlicenses, where the worst of proprietary licenses are bolted on to the goodwill created by open source licenses; we need your legal voices before these creatures destroy the village!</blockquote>

<p><hr /></p>

<h3>NetBSD and LLVM</h3>

<p><a href="https://blog.netbsd.org/tnf/entry/netbsd_entering_2019_with_more">NetBSD entering 2019 with more complete LLVM support</a></p>

<blockquote>I’m recently helping the NetBSD developers to improve the support for this operating system in various LLVM components. As you can read in my previous report, I’ve been focusing on fixing build and test failures for the purpose of improving the buildbot coverage.
Previously, I’ve resolved test failures in LLVM, Clang, LLD, libunwind, openmp and partially libc++. During the remainder of the month, I’ve been working on the remaining libc++ test failures, improving the NetBSD clang driver and helping Kamil Rytarowski with compiler-rt.</blockquote>

<p><a href="https://blog.netbsd.org/tnf/entry/the_process_of_upstreaming_support">The process of upstreaming support to LLVM sanitizers has been finalized</a></p>

<blockquote>I’ve finished the process of upstreaming patches to LLVM sanitizers (almost 2000LOC of local code) and submitted to upstream new improvements for the NetBSD support. Today out of the box (in unpatched version) we have support for a variety of compiler-rt LLVM features: ASan (finds unauthorized memory access), UBSan (finds unspecified code semantics), TSan (finds threading bugs), MSan (finds uninitialized memory use), SafeStack (double stack hardening), Profile (code coverage), XRay (dynamic code tracing); while other ones such as Scudo (hardened allocator) or DFSan (generic data flow sanitizer) are not far away from completeness.
The NetBSD support is no longer visibly lacking behind Linux in sanitizers, although there are still failing tests on NetBSD that are not observed on Linux. On the other hand there are features working on NetBSD that are not functional on Linux, like sanitizing programs during early initialization process of OS (this is caused by /proc dependency on Linux that is mounted by startup programs, while NetBSD relies on sysctl(3) interfaces that is always available).</blockquote>

<p><hr /></p>

<h2>News Roundup</h2>

<h3><a href="https://distrowatch.com/weekly.php?issue=20190107#freebsd">Thoughts on FreeBSD 12.0</a></h3>

<blockquote>Playing with FreeBSD with past week I don’t feel as though there were any big surprises or changes in this release compared to FreeBSD 11. In typical FreeBSD fashion, progress tends to be evolutionary rather than revolutionary, and this release feels like a polished and improved incremental step forward. I like that the installer handles both UFS and ZFS guided partitioning now and in a friendly manner. In the past I had trouble getting FreeBSD’s boot menu to work with boot environments, but that has been fixed for this release.
I like the security options in the installer too. These are not new, but I think worth mentioning. FreeBSD, unlike most Linux distributions, offers several low-level security options (like hiding other users’ processes and randomizing PIDs) and I like having these presented at install time. It’s harder for people to attack what they cannot see, or predict, and FreeBSD optionally makes these little adjustment for us.
Something which stands out about FreeBSD, compared to most Linux distributions I run, is that FreeBSD rarely holds the user’s hand, but also rarely surprises the user. This means there is more reading to do up front and new users may struggle to get used to editing configuration files in a text editor. But FreeBSD rarely does anything unless told to do it. Updates rarely change the system’s behaviour, working technology rarely gets swapped out for something new, the system and its applications never crashed during my trial. Everything was rock solid. The operating system may seem like a minimal, blank slate to new users, but it’s wonderfully dependable and predictable in my experience.
I probably wouldn’t recommend FreeBSD for desktop use. It’s close relative, GhostBSD, ships with a friendly desktop and does special work to make end user applications run smoothly. But for people who want to run servers, possible for years without change or issues, FreeBSD is a great option. It’s also an attractive choice, in my opinion, for people who like to build their system from the ground up, like you would with Debian’s server install or Arch Linux. Apart from the base tools and documentation, there is nothing on a FreeBSD system apart from what we put on it.</blockquote>

<p><hr /></p>

<h3><a href="https://www.phoronix.com/scan.php?page=article&amp;item=freebsd-12-windows&amp;num=1">FreeBSD 12.0 Performance Against Windows &amp; Linux On An Intel Xeon Server</a></h3>

<blockquote>Last week I posted benchmarks of Windows Server 2019 against various Linux distributions using a Tyan dual socket Intel Xeon server. In this article are some complementary results when adding in the performance of FreeBSD 11.2 against the new FreeBSD 12.0 stable release for this leading BSD operating system. As some fun benchmarks to end out 2018, here are the results of FreeBSD 11.2/12.0 (including an additional run when using GCC rather than Clang) up against Windows Server and several enterprise-ready Linux distributions.
While FreeBSD 12.0 had picked up just one win of the Windows/Linux comparisons run, the FreeBSD performance is moving in the right direction. FreeBSD 12.0 was certainly faster than FreeBSD 11.2 on this dual Intel Xeon Scalable server based on a Tyan 1U platform. Meanwhile, to no surprise given the data last week, Clear Linux was by far the fastest out-of-the-box operating system tested.
I did run some extra benchmarks on FreeBSD 11.2/12.0 with this hardware: in total I ran 120 benchmarks for these BSD tests. Of the 120 tests, there were just 15 cases where FreeBSD 11.2 was faster than 12.0. Seeing FreeBSD 12.0 faster than 11.2 nearly 90% of the time is an accomplishment and usually with other operating systems we see more of a mixed bag on new releases with not such solidly better performance. It was also great seeing the competitive performance out of FreeBSD when using the Clang compiler for the source-based tests compared to the GCC8 performance. Additional data available via this <a href="http://OpenBenchmarking.org">OpenBenchmarking.org</a> result file.</blockquote>

<p><hr /></p>

<h3><a href="http://fogey.com/contemplating/?p=1023">How NetBSD came to be shipped by Microsoft</a></h3>

<p><a href="https://webcache.googleusercontent.com/search?q=cache:5XwAm5tvJ4AJ:fogey.com/contemplating/%3Fp%3D1023+&amp;cd=1&amp;hl=en&amp;ct=clnk&amp;gl=us">Google cache in case the site is down</a></p>

<blockquote>In 2000, Joe Britt, Matt Hershenson and Andy Rubin formed Danger Incorporated. Danger developed the world’s first recognizable smartphone, the Danger HipTop. T-Mobile sold the first HipTop under the brand name Sidekick in October of 2002.
Danger had a well developed kernel that had been designed and built in house. The kernel came to be viewed as not a core intellectual property and Danger started a search for a replacement. For business reasons, mostly to do with legal concerns over the Gnu Public License, Danger rejected Linux and began to consider BSD Unix as a replacement for the kernel.
In 2006 I was hired by Mike Chen, the manager of the kernel development group to investigate the feasibility of replacing the Danger kernel with a BSD kernel, to select the version of BSD to use, to develop a prototype and to develop the plan for adapting BSD to Danger’s requirements.
NetBSD was easily the best choice among the BSD variations at the time because it had well developed cross development tools. It was easy to use a NetBSD desktop running an Intel release to cross compile a NetBSD kernel and runtime for a device running an ARM processor. (Those interested in mailing list archaeology might be amused to investigate NetBSD technical mailing list for mail from picovex, particularly from Bucky Katz at picovex.)
We began product development on the specific prototype of the phone that would become the Sidekick LX2009 in 2007 and contracts for the phone were written with T-Mobile. We were about half way through the two year development cycle when Microsoft purchased Danger in 2008.
Microsoft would have preferred to ship the Sidekick running Windows/CE rather than NetBSD, but a schedule analysis performed by me, and another by an independent outside contractor, indicated that doing so would result in unacceptable delay.</blockquote>

<p><hr /></p>

<h2>Beastie Bits</h2>

<ul>
    <li><a href="http://lists.31bits.net/archives/devel/2018-December/000033.html">Unleashed 1.2 Released</a></li>
    <li><a href="https://media.ccc.de/v/35c3-9647-taming_the_chaos_can_we_build_systems_that_actually_work">35th CCC - Taming the Chaos: Can we build systems that actually work? </a></li>
    <li><a href="https://rachelbythebay.com/w/2018/12/30/v6/">Potholes to avoid when migrating to IPv6</a></li>
    <li><a href="https://www.jwz.org/blog/2018/12/xscreensaver-5-41/">XScreenSaver 5.42</a></li>
    <li><a href="https://hackertarget.com/ssh-examples-tunnels/">SSH Examples and Tunnels</a></li>
    <li><a href="https://old.reddit.com/r/freebsd/comments/abevqa/mbuf9_request_for_comment/">Help request - mbuf(9) - request for comment</a></li>
    <li><a href="https://www.zdnet.com/article/nsa-to-release-a-free-reverse-engineering-tool/">NSA to release free Reverse Engineering Tool</a></li>
    <li><a href="https://blog.grem.de/sysadmin/FreeBSD-On-rpi3-With-crochet-2018-10-27-18-00.html">Running FreeBSD on a Raspberry Pi3 using a custom image created with crochet and poudriere</a></li>
</ul>

<p><hr /></p>

<h2>Feedback/Questions</h2>

<ul>
    <li>Dries - <a href="http://dpaste.com/2DCEJD6#wrap">Lets talk a bit about VIMAGE jails</a></li>
    <li>ohb - <a href="http://dpaste.com/1EGDSKQ#wrap">Question About ZFS Root Dataset</a></li>
    <li>Micah - <a href="http://dpaste.com/3TK2JWF#wrap">Active-Active NAS Sync recommendations</a></li>
</ul>

<p><hr /></p>

<ul>
    <li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr /></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 268: Netcat Demystified | BSD Now 268</title>
  <link>https://www.bsdnow.tv/268</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2721</guid>
  <pubDate>Wed, 17 Oct 2018 01:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/78b4306b-b0ac-4221-b4f4-60d2bde9628e.mp3" length="40587288" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>6 metrics for zpool performance, 2FA with ssh on OpenBSD, ZFS maintaining file type information in dirs, everything old is new again, netcat demystified, and more.</itunes:subtitle>
  <itunes:duration>1:07:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;6 metrics for zpool performance, 2FA with ssh on OpenBSD, ZFS maintaining file type information in dirs, everything old is new again, netcat demystified, and more.&lt;/p&gt;

&lt;p&gt;##Headlines&lt;br&gt;
###&lt;a href="https://www.ixsystems.com/blog/zfs-pool-performance-1/" target="_blank" rel="nofollow noopener"&gt;Six Metrics for Measuring ZFS Pool Performance Part 1&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The layout of a ZFS storage pool has a significant impact on system performance under various workloads. Given the importance of picking the right configuration for your workload and the fact that making changes to an in-use ZFS pool is far from trivial, it is important for an administrator to understand the mechanics of pool performance when designing a storage system.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;To quantify pool performance, we will consider six primary metrics:&lt;/li&gt;
&lt;li&gt;Read I/O operations per second (IOPS)&lt;/li&gt;
&lt;li&gt;Write IOPS&lt;/li&gt;
&lt;li&gt;Streaming read speed&lt;/li&gt;
&lt;li&gt;Streaming write speed&lt;/li&gt;
&lt;li&gt;Storage space efficiency (usable capacity after parity versus total raw capacity)&lt;/li&gt;
&lt;li&gt;Fault tolerance (maximum number of drives that can fail before data loss)&lt;/li&gt;
&lt;li&gt;For the sake of comparison, we’ll use an example system with 12 drives, each one sized at 6TB, and say that each drive does 100MB/s streaming reads and writes and can do 250 read and write IOPS. We will visualize how the data is spread across the drives by writing 12 multi-colored blocks, shown below. The blocks are written to the pool starting with the brown block on the left (number one), and working our way to the pink block on the right (number 12).&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Note that when we calculate data rates and IOPS values for the example system, they are only approximations. Many other factors can impact pool access speeds for better (compression, caching) or worse (poor CPU performance, not enough memory).&lt;br&gt;
There is no single configuration that maximizes all six metrics. Like so many things in life, our objective is to find an appropriate balance of the metrics to match a target workload. For example, a cold-storage backup system will likely want a pool configuration that emphasizes usable storage space and fault tolerance over the other data-rate focused metrics.&lt;br&gt;
Let’s start with a quick review of ZFS storage pools before diving into specific configuration options. ZFS storage pools are comprised of one or more virtual devices, or vdevs. Each vdev is comprised of one or more storage providers, typically physical hard disks. All disk-level redundancy is configured at the vdev level. That is, the RAID layout is set on each vdev as opposed to on the storage pool. Data written to the storage pool is then striped across all the vdevs. Because pool data is striped across the vdevs, the loss of any one vdev means total pool failure. This is perhaps the single most important fact to keep in mind when designing a ZFS storage system. We will circle back to this point in the next post, but keep it in mind as we go through the vdev configuration options.&lt;br&gt;
Because storage pools are made up of one or more vdevs with the pool data striped over the top, we’ll take a look at pool configuration in terms of various vdev configurations. There are three basic vdev configurations: striping, mirroring, and RAIDZ (which itself has three different varieties). The first section will cover striped and mirrored vdevs in this post; the second post will cover RAIDZ and some example scenarios.&lt;br&gt;
A striped vdev is the simplest configuration. Each vdev consists of a single disk with no redundancy. When several of these single-disk, striped vdevs are combined into a single storage pool, the total usable storage space would be the sum of all the drives. When you write data to a pool made of striped vdevs, the data is broken into small chunks called “blocks” and distributed across all the disks in the pool. The blocks are written in “round-robin” sequence, meaning after all the disks receive one row of blocks, called a stripe, it loops back around and writes another stripe under the first. A striped pool has excellent performance and storage space efficiency, but absolutely zero fault tolerance. If even a single drive in the pool fails, the entire pool will fail and all data stored on that pool will be lost.&lt;br&gt;
The excellent performance of a striped pool comes from the fact that all of the disks can work independently for all read and write operations. If you have a bunch of small read or write operations (IOPS), each disk can work independently to fetch the next block. For streaming reads and writes, each disk can fetch the next block in line synchronized with its neighbors. For example, if a given disk is fetching block n, its neighbor to the left can be fetching block n-1, and its neighbor to the right can be fetching block n+1. Therefore, the speed of all read and write operations as well as the quantity of read and write operations (IOPS) on a striped pool will scale with the number of vdevs. Note here that I said the speeds and IOPS scale with the number of vdevs rather than the number of drives; there’s a reason for this and we’ll cover it in the next post when we discuss RAID-Z.&lt;br&gt;
Here’s a summary of the total pool performance (where N is the number of disks in the pool):&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;N-wide striped:&lt;/li&gt;
&lt;li&gt;Read IOPS: N * Read IOPS of a single drive&lt;/li&gt;
&lt;li&gt;Write IOPS: N * Write IOPS of a single drive&lt;/li&gt;
&lt;li&gt;Streaming read speed: N * Streaming read speed of a single drive&lt;/li&gt;
&lt;li&gt;Streaming write speed: N * Streaming write speed of a single drive&lt;/li&gt;
&lt;li&gt;Storage space efficiency: 100%&lt;/li&gt;
&lt;li&gt;Fault tolerance: None!&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Let’s apply this to our example system, configured with a 12-wide striped pool:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;12-wide striped:&lt;/li&gt;
&lt;li&gt;Read IOPS: 3000&lt;/li&gt;
&lt;li&gt;Write IOPS: 3000&lt;/li&gt;
&lt;li&gt;Streaming read speed: 1200 MB/s&lt;/li&gt;
&lt;li&gt;Streaming write speed: 1200 MB/s&lt;/li&gt;
&lt;li&gt;Storage space efficiency: 72 TB&lt;/li&gt;
&lt;li&gt;Fault tolerance: None!&lt;/li&gt;
&lt;li&gt;Below is a visual depiction of our 12 rainbow blocks written to this pool configuration:&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;The blocks are simply striped across the 12 disks in the pool. The LBA column on the left stands for “Logical Block Address”. If we treat each disk as a column in an array, each LBA would be a row. It’s also easy to see that if any single disk fails, we would be missing a color in the rainbow and our data would be incomplete. While this configuration has fantastic read and write speeds and can handle a ton of IOPS, the data stored on the pool is very vulnerable. This configuration is not recommended unless you’re comfortable losing all of your pool’s data whenever any single drive fails.&lt;br&gt;
A mirrored vdev consists of two or more disks. A mirrored vdev stores an exact copy of all the data written to it on each one of its drives. Traditional RAID-1 mirrors usually only support two drive mirrors, but ZFS allows for more drives per mirror to increase redundancy and fault tolerance. All disks in a mirrored vdev have to fail for the vdev, and thus the whole pool, to fail. Total storage space will be equal to the size of a single drive in the vdev. If you’re using mismatched drive sizes in your mirrors, the total size will be that of the smallest drive in the mirror.&lt;br&gt;
Streaming read speeds and read IOPS on a mirrored vdev will be faster than write speeds and IOPS. When reading from a mirrored vdev, the drives can “divide and conquer” the operations, similar to what we saw above in the striped pool. This is because each drive in the mirror has an identical copy of the data. For write operations, all of the drives need to write a copy of the data, so the mirrored vdev will be limited to the streaming write speed and IOPS of a single disk.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;Here’s a summary:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;N-way mirror:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Read IOPS: N * Read IOPS of a single drive&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Write IOPS: Write IOPS of a single drive&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Streaming read speed: N * Streaming read speed of a single drive&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Streaming write speed: Streaming write speed of a single drive&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Storage space efficiency: 50% for 2-way, 33% for 3-way, 25% for 4-way, etc. [(N-1)/N]&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Fault tolerance: 1 disk per vdev for 2-way, 2 for 3-way, 3 for 4-way, etc. [N-1]&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;For our first example configuration, let’s do something ridiculous and create a 12-way mirror. ZFS supports this kind of thing, but your management probably will not.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;1x 12-way mirror:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Read IOPS: 3000&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Write IOPS: 250&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Streaming read speed: 1200 MB/s&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Streaming write speed: 100 MB/s&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Storage space efficiency: 8.3% (6 TB)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Fault tolerance: 11&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;As we can clearly see from the diagram, every single disk in the vdev gets a full copy of our rainbow data. The chainlink icons between the disk labels in the column headers indicate the disks are part of a single vdev. We can lose up to 11 disks in this vdev and still have a complete rainbow. Of course, the data takes up far too much room on the pool, occupying a full 12 LBAs in the data array.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;Obviously, this is far from the best use of 12 drives. Let’s do something a little more practical and configure the pool with the ZFS equivalent of RAID-10. We’ll configure six 2-way mirror vdevs. ZFS will stripe the data across all 6 of the vdevs. We can use the work we did in the striped vdev section to determine how the pool as a whole will behave. Let’s first calculate the performance per vdev, then we can work on the full pool:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;1x 2-way mirror:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Read IOPS: 500&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Write IOPS: 250&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Streaming read speed: 200 MB/s&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Streaming write speed: 100 MB/s&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Storage space efficiency: 50% (6 TB)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Fault tolerance: 1&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Now we can pretend we have 6 drives with the performance statistics listed above and run them through our striped vdev performance calculator to get the total pool’s performance:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;6x 2-way mirror:&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Read IOPS: 3000&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Write IOPS: 1500&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Streaming read speed: 3000 MB/s&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Streaming write speed: 1500 MB/s&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Storage space efficiency: 50% (36 TB)&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Fault tolerance: 1 per vdev, 6 total&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Again, we will examine the configuration from a visual perspective:&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Each vdev gets a block of data and ZFS writes that data to all of (or in this case, both of) the disks in the mirror. As long as we have at least one functional disk in each vdev, we can retrieve our rainbow. As before, the chain link icons denote the disks are part of a single vdev. This configuration emphasizes performance over raw capacity but doesn’t totally disregard fault tolerance as our striped pool did. It’s a very popular configuration for systems that need a lot of fast I/O. Let’s look at one more example configuration using four 3-way mirrors. We’ll skip the individual vdev performance calculation and go straight to the full pool:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;4x 3-way mirror:&lt;/li&gt;
&lt;li&gt;Read IOPS: 3000&lt;/li&gt;
&lt;li&gt;Write IOPS: 1000&lt;/li&gt;
&lt;li&gt;Streaming read speed: 3000 MB/s&lt;/li&gt;
&lt;li&gt;Streaming write speed: 400 MB/s&lt;/li&gt;
&lt;li&gt;Storage space efficiency: 33% (24 TB)&lt;/li&gt;
&lt;li&gt;Fault tolerance: 2 per vdev, 8 total&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;While we have sacrificed some write performance and capacity, the pool is now extremely fault tolerant. This configuration is probably not practical for most applications and it would make more sense to use lower fault tolerance and set up an offsite backup system.&lt;br&gt;
Striped and mirrored vdevs are fantastic for access speed performance, but they either leave you with no redundancy whatsoever or impose at least a 50% penalty on the total usable space of your pool. In the next post, we will cover RAIDZ, which lets you keep data redundancy without sacrificing as much storage space efficiency. We’ll also look at some example workload scenarios and decide which layout would be the best fit for each.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://chown.me/blog/2FA-with-ssh-on-OpenBSD.html" target="_blank" rel="nofollow noopener"&gt;2FA with ssh on OpenBSD&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Five years ago I wrote about using a yubikey on OpenBSD. The only problem with doing this is that there’s no validation server available on OpenBSD, so you need to use a different OTP slot for each machine. (You don’t want to risk a replay attack if someone succeeds in capturing an OTP on one machine, right?) Yubikey has two OTP slots per device, so you would need a yubikey for every two machines with which you’d like to use it. You could use a bastion—and use only one yubikey—but I don’t like the SPOF aspect of a bastion. YMMV.&lt;br&gt;
After I played with TOTP, I wanted to use them as a 2FA for ssh. At the time of writing, we can’t do that using only the tools in base. This article focuses on OpenBSD; if you use another operating system, here are two handy links.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;SEED CONFIGURATION&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;The first thing we need to do is to install the software which will be used to verify the OTPs we submit.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;# pkg_add login_oath&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;We need to create a secret - aka, the seed - that will be used to calculate the Time-based One-Time Passwords. We should make sure no one can read or change it.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;$ openssl rand -hex 20 &amp;gt; ~/.totp-key&lt;/code&gt;&lt;br&gt;
&lt;code&gt;$ chmod 400 ~/.totp-key&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Now we have a hexadecimal key, but apps usually want a base32 secret. I initially wrote a small script to do the conversion.&lt;br&gt;
While writing this article, I took the opportunity to improve it. When I initially wrote this utility for my use, python-qrcode hadn’t yet been imported to the OpenBSD ports/packages system. It’s easy to install now, so let’s use it.&lt;br&gt;
Here’s the improved version. It will ask for the hex key and output the secret as a base32-encoded string, both with and without spacing so you can copy-paste it into your password manager or easily retype it. It will then ask for the information needed to generate a QR code. Adding our new OTP secret to any mobile app using the QR code will be super easy!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;SYSTEM CONFIGURATION&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;We can now move to the configuration of the system to put our new TOTP to use. As you might guess, it’s going to be quite close to what we did with the yubikey.&lt;br&gt;
We need to tweak login.conf. Be careful and keep a root shell open at all times. The few times I broke my OpenBSD were because I messed with login.conf without showing enough care.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;SSHD CONFIGURATION&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Again, keeping a root shell around decreases the risk of losing access to the system and being locked outside.&lt;br&gt;
A good standard is to use PasswordAuthentication no and to use public key only. Except… have a guess what the P stands for in TOTP. Yes, congrats, you guessed it!&lt;br&gt;
We need to switch to PasswordAuthentication yes. However, if we made this change alone, sshd would then accept a public key OR a password (which are TOTP because of our login.conf). 2FA uses both at the same time.&lt;br&gt;
To inform sshd we intend to use both, we need to set AuthenticationMethods publickey,password. This way, the user trying to login will first need to perform the traditional publickey authentication. Once that’s done, ssh will prompt for a password and the user will need to submit a valid TOTP for the system.&lt;br&gt;
We could do this the other way around, but I think bots could try passwords, wasting resources. Evaluated in this order, failing to provide a public key leads to sshd immediately declining your attempt.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;IMPROVING SECURITY WITHOUT IMPACTING UX&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;My phone has a long enough password that most of the time, I fail to type it correctly on the first try. Of course, if I had to unlock my phone, launch my TOTP app and use my keyboard to enter what I see on my phone’s screen, I would quickly disable 2FA.&lt;br&gt;
To find a balance, I have whitelisted certain IP addresses and users. If I connect from a particular IP address or as a specific user, I don’t want to go through 2FA. For some users, I might not even enable 2FA.&lt;br&gt;
To sum up, we covered how to create a seed, how to perform a hexadecimal to base32 conversion and how to create a QR code for mobile applications. We configured the login system with login.conf so that ssh authentication uses the TOTP login system, and we told sshd to ask for both the public key and the Time-based One-Time Password. Now you should be all set to use two-factor ssh authentication on OpenBSD!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##News Roundup&lt;br&gt;
###&lt;a href="https://utcc.utoronto.ca/~cks/space/blog/solaris/ZFSAndDirectoryDType" target="_blank" rel="nofollow noopener"&gt;How ZFS maintains file type information in directories&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;As an aside in yesterday’s history of file type information being available in Unix directories, I mentioned that it was possible for a filesystem to support this even though its Unix didn’t. By supporting it, I mean that the filesystem maintains this information in its on disk format for directories, even though the rest of the kernel will never ask for it. This is what ZFS does.&lt;br&gt;
The easiest way to see that ZFS does this is to use zdb to dump a directory. I’m going to do this on an OmniOS machine, to make it more convincing, and it turns out that this has some interesting results. Since this is OmniOS, we don’t have the convenience of just naming a directory in zdb, so let’s find the root directory of a filesystem, starting from dnode 1 (as seen before).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;# zdb -dddd fs3-corestaff-01/h/281 1&lt;/code&gt;&lt;br&gt;
&lt;code&gt;Dataset [....]&lt;/code&gt;&lt;br&gt;
&lt;code&gt;[...]&lt;/code&gt;&lt;br&gt;
&lt;code&gt;microzap: 512 bytes, 4 entries&lt;/code&gt;&lt;br&gt;
&lt;code&gt;[...]&lt;/code&gt;&lt;br&gt;
&lt;code&gt;ROOT = 3&lt;/code&gt;&lt;br&gt;
&lt;code&gt;&lt;/code&gt;&lt;br&gt;
&lt;code&gt;# zdb -dddd fs3-corestaff-01/h/281 3&lt;/code&gt;&lt;br&gt;
&lt;code&gt;Object lvl iblk dblk dsize lsize %full type&lt;/code&gt;&lt;br&gt;
&lt;code&gt;3 1 16K 1K 8K 1K 100.00 ZFS directory&lt;/code&gt;&lt;br&gt;
&lt;code&gt;[...]&lt;/code&gt;&lt;br&gt;
&lt;code&gt;microzap: 1024 bytes, 8 entries&lt;/code&gt;&lt;br&gt;
&lt;code&gt;&lt;/code&gt;&lt;br&gt;
&lt;code&gt;RESTORED = 4396504 (type: Directory)&lt;/code&gt;&lt;br&gt;
&lt;code&gt;ckstst = 12017 (type: not specified)&lt;/code&gt;&lt;br&gt;
&lt;code&gt;ckstst3 = 25069 (type: Directory)&lt;/code&gt;&lt;br&gt;
&lt;code&gt;.demo-file = 5832188 (type: Regular File)&lt;/code&gt;&lt;br&gt;
&lt;code&gt;.peergroup = 12590 (type: not specified)&lt;/code&gt;&lt;br&gt;
&lt;code&gt;cks = 5 (type: not specified)&lt;/code&gt;&lt;br&gt;
&lt;code&gt;cksimap1 = 5247832 (type: Directory)&lt;/code&gt;&lt;br&gt;
&lt;code&gt;.diskuse = 12016 (type: not specified)&lt;/code&gt;&lt;br&gt;
&lt;code&gt;ckstst2 = 12535 (type: not specified)&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This is actually an old filesystem (it dates from Solaris 10 and has been transferred around with ‘zfs send | zfs recv’ since then), but various home directories for real and test users have been created in it over time (you can probably guess which one is the oldest one). Sufficiently old directories and files have no file type information, but more recent ones have this information, including .demo-file, which I made just now so this would have an entry that was a regular file with type information.&lt;br&gt;
Once I dug into it, this turned out to be a change introduced (or activated) in ZFS filesystem version 2, which is described in ‘zfs upgrade -v’ as ‘enhanced directory entries’. As an actual change in (Open)Solaris, it dates from mid 2007, although I’m not sure what Solaris release it made it into. The upshot is that if you made your ZFS filesystem any time in the last decade, you’ll have this file type information in your directories.&lt;br&gt;
How ZFS stores this file type information is interesting and clever, especially when it comes to backwards compatibility. I’ll start by quoting the comment from zfs_znode.h:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;/*&lt;/code&gt;&lt;br&gt;
&lt;code&gt;* The directory entry has the type (currently unused on&lt;/code&gt;&lt;br&gt;
&lt;code&gt;* Solaris) in the top 4 bits, and the object number in&lt;/code&gt;&lt;br&gt;
&lt;code&gt;* the low 48 bits. The "middle" 12 bits are unused.&lt;/code&gt;&lt;br&gt;
&lt;code&gt;*/&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In yesterday’s entry I said that Unix directory entries need to store at least the filename and the inode number of the file. What ZFS is doing here is reusing the 64 bit field used for the ‘inode’ (the ZFS dnode number) to also store the file type, because it knows that object numbers have only a limited range. This also makes old directory entries compatible, by making type 0 (all 4 bits 0) mean ‘not specified’. Since old directory entries only stored the object number and the object number is 48 bits or less, the higher bits are guaranteed to be all zero.&lt;br&gt;
The reason this needed a new ZFS filesystem version is now clear. If you tried to read directory entries with file type information on a version of ZFS that didn’t know about them, the old version would likely see crazy (and non-existent) object numbers and nothing would work. In order to even read a ‘file type in directory entries’ filesystem, you need to know to only look at the low 48 bits of the object number field in directory entries.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://euroquis.nl/bobulate/?p=1976" target="_blank" rel="nofollow noopener"&gt;Everything old is new again&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Just because KDE4-era software has been deprecated by the KDE-FreeBSD team in the official ports-repository, doesn’t mean we don’t care for it while we still need to. KDE4 was released on January 11th, 2008 — I still have the T-shirt — which was a very different C++ world than what we now live in. Much of the code pre-dates the availability of C&lt;ins&gt;11 — certainly the availability of compilers with C&lt;/ins&gt;11 support. The language has changed a great deal in those ten years since the original release.&lt;br&gt;
The platforms we run KDE code on have, too — FreeBSD 12 is a long way from the FreeBSD 6 or 7 that were current at release (although at the time, I was more into OpenSolaris). In particular, since then the FreeBSD world has switched over to Clang, and FreeBSD current is experimenting with Clang 7. So we’re seeing KDE4-era code being built, and running, on FreeBSD 12 with Clang 7. That’s a platform with a very different idea of what constitutes correct code, than what the code was originally written for. (Not quite as big a difference as Helio’s KDE1 efforts, though)&lt;br&gt;
So, while we’re counting down to removing KDE4 from the FreeBSD ports tree, we’re also going through and fixing it to work with Clang 7, which defaults to a newer C++ standard and which is quite picky about some things. Some time in the distant past, when pointers were integers and NULL was zero, there was some confusion about booleans. So there’s lots of code that does list.contains(element) &amp;gt; 0 … this must have been a trick before booleans were a supported type in all our compilers. In any case it breaks with Clang 7, since contains() returns a QBool which converts to a nullptr (when false) which isn’t comparable to the integer 0. Suffice to say I’ve spent more time reading KDE4-era code this month, than in the past two years.&lt;br&gt;
However, work is proceeding apace, so if you really really want to, you can still get your old-school kicks on a new platform. Because we care about packaging things right, even when we want to get rid of it.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://nanxiao.gitbooks.io/openbsd-netcat-demystified/" target="_blank" rel="nofollow noopener"&gt;OpenBSD netcat demystified&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Owing to its versatile functionalities, netcat earns the reputation as “TCP/IP Swiss army knife”. For example, you can create a simple chat app using netcat:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;(1) Open a terminal and input following command:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;# nc -l 3003&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This means a netcat process will listen on 3003 port in this machine (the IP address of current machine is 192.168.35.176).&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;(2) Connect aforemontioned netcat process in another machine, and send a greeting:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;# nc 192.168.35.176 3003&lt;/code&gt;&lt;br&gt;
&lt;code&gt;hello&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Then in the first machine’s terminal, you will see the “hello” text:&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;code&gt;# nc -l 3003&lt;/code&gt;&lt;br&gt;
&lt;code&gt;hello&lt;/code&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;A primitive chatroom is built successfully. Very cool! Isn’t it? I think many people can’t wait to explore more features of netcatnow. If you are among them, congratulations! This tutorial may be the correct place for you.&lt;br&gt;
In the following parts, I will delve into OpenBSD’s netcatcode to give a detailed anatomy of it. The reason of picking OpenBSD’s netcat rather than others’ is because its code repository is small (~2000 lines of code) and neat. Furthermore, I also hope this little book can assist you learn more socket programming knowledge not just grasping usage of netcat.&lt;br&gt;
We’re all set. Let’s go!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##Beastie Bits&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.geeklan.co.uk/files/eurobsdcon2018.pdf" target="_blank" rel="nofollow noopener"&gt;What’s in store for NetBSD 9.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2018/09/25/msg000783.html" target="_blank" rel="nofollow noopener"&gt;NetBSD machines at Open Source Conference 2018 Hiroshima&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://vincentdelft.be/post/post_20180922" target="_blank" rel="nofollow noopener"&gt;nmctl adapted with limited privileges: nmctl-0.6.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsdfoundation.org/blog/submit-your-work-check-out-scale-17x-and-fosdem-19-cfps/" target="_blank" rel="nofollow noopener"&gt;Submit Your Work: Check out SCALE 17x and FOSDEM ’19 CFPs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/64.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.4 site is up! (with a partial list of new features)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.blackcatenterprises.us/using-alpine-to-read-your-email/" target="_blank" rel="nofollow noopener"&gt;Using Alpine to Read Your Email on OpenBSD&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##Feedback/Questions&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Morgan - &lt;a href="http://dpaste.com/0EXPWQK#wrap" target="_blank" rel="nofollow noopener"&gt;Send/Receive to Manage Fragmentation?&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ryan - &lt;a href="http://dpaste.com/0B6C0Y0" target="_blank" rel="nofollow noopener"&gt;ZFS and mmap&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Marcus - &lt;a href="http://dpaste.com/1DT26S8#wrap" target="_blank" rel="nofollow noopener"&gt;Linux Compat&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ben - &lt;a href="http://dpaste.com/20GTHZE#wrap" target="_blank" rel="nofollow noopener"&gt;Multiple Pools&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, netcat, kde yubikey, 2fa, ssh, zfs, performance</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>6 metrics for zpool performance, 2FA with ssh on OpenBSD, ZFS maintaining file type information in dirs, everything old is new again, netcat demystified, and more.</p>

<p>##Headlines<br>
###<a href="https://www.ixsystems.com/blog/zfs-pool-performance-1/">Six Metrics for Measuring ZFS Pool Performance Part 1</a></p>

<blockquote>
<p>The layout of a ZFS storage pool has a significant impact on system performance under various workloads. Given the importance of picking the right configuration for your workload and the fact that making changes to an in-use ZFS pool is far from trivial, it is important for an administrator to understand the mechanics of pool performance when designing a storage system.</p>
</blockquote>

<ul>
<li>To quantify pool performance, we will consider six primary metrics:</li>
<li>Read I/O operations per second (IOPS)</li>
<li>Write IOPS</li>
<li>Streaming read speed</li>
<li>Streaming write speed</li>
<li>Storage space efficiency (usable capacity after parity versus total raw capacity)</li>
<li>Fault tolerance (maximum number of drives that can fail before data loss)</li>
<li>For the sake of comparison, we’ll use an example system with 12 drives, each one sized at 6TB, and say that each drive does 100MB/s streaming reads and writes and can do 250 read and write IOPS. We will visualize how the data is spread across the drives by writing 12 multi-colored blocks, shown below. The blocks are written to the pool starting with the brown block on the left (number one), and working our way to the pink block on the right (number 12).</li>
</ul>

<blockquote>
<p>Note that when we calculate data rates and IOPS values for the example system, they are only approximations. Many other factors can impact pool access speeds for better (compression, caching) or worse (poor CPU performance, not enough memory).<br>
There is no single configuration that maximizes all six metrics. Like so many things in life, our objective is to find an appropriate balance of the metrics to match a target workload. For example, a cold-storage backup system will likely want a pool configuration that emphasizes usable storage space and fault tolerance over the other data-rate focused metrics.<br>
Let’s start with a quick review of ZFS storage pools before diving into specific configuration options. ZFS storage pools are comprised of one or more virtual devices, or vdevs. Each vdev is comprised of one or more storage providers, typically physical hard disks. All disk-level redundancy is configured at the vdev level. That is, the RAID layout is set on each vdev as opposed to on the storage pool. Data written to the storage pool is then striped across all the vdevs. Because pool data is striped across the vdevs, the loss of any one vdev means total pool failure. This is perhaps the single most important fact to keep in mind when designing a ZFS storage system. We will circle back to this point in the next post, but keep it in mind as we go through the vdev configuration options.<br>
Because storage pools are made up of one or more vdevs with the pool data striped over the top, we’ll take a look at pool configuration in terms of various vdev configurations. There are three basic vdev configurations: striping, mirroring, and RAIDZ (which itself has three different varieties). The first section will cover striped and mirrored vdevs in this post; the second post will cover RAIDZ and some example scenarios.<br>
A striped vdev is the simplest configuration. Each vdev consists of a single disk with no redundancy. When several of these single-disk, striped vdevs are combined into a single storage pool, the total usable storage space would be the sum of all the drives. When you write data to a pool made of striped vdevs, the data is broken into small chunks called “blocks” and distributed across all the disks in the pool. The blocks are written in “round-robin” sequence, meaning after all the disks receive one row of blocks, called a stripe, it loops back around and writes another stripe under the first. A striped pool has excellent performance and storage space efficiency, but absolutely zero fault tolerance. If even a single drive in the pool fails, the entire pool will fail and all data stored on that pool will be lost.<br>
The excellent performance of a striped pool comes from the fact that all of the disks can work independently for all read and write operations. If you have a bunch of small read or write operations (IOPS), each disk can work independently to fetch the next block. For streaming reads and writes, each disk can fetch the next block in line synchronized with its neighbors. For example, if a given disk is fetching block n, its neighbor to the left can be fetching block n-1, and its neighbor to the right can be fetching block n+1. Therefore, the speed of all read and write operations as well as the quantity of read and write operations (IOPS) on a striped pool will scale with the number of vdevs. Note here that I said the speeds and IOPS scale with the number of vdevs rather than the number of drives; there’s a reason for this and we’ll cover it in the next post when we discuss RAID-Z.<br>
Here’s a summary of the total pool performance (where N is the number of disks in the pool):</p>
</blockquote>

<ul>
<li>N-wide striped:</li>
<li>Read IOPS: N * Read IOPS of a single drive</li>
<li>Write IOPS: N * Write IOPS of a single drive</li>
<li>Streaming read speed: N * Streaming read speed of a single drive</li>
<li>Streaming write speed: N * Streaming write speed of a single drive</li>
<li>Storage space efficiency: 100%</li>
<li>Fault tolerance: None!</li>
</ul>

<blockquote>
<p>Let’s apply this to our example system, configured with a 12-wide striped pool:</p>
</blockquote>

<ul>
<li>12-wide striped:</li>
<li>Read IOPS: 3000</li>
<li>Write IOPS: 3000</li>
<li>Streaming read speed: 1200 MB/s</li>
<li>Streaming write speed: 1200 MB/s</li>
<li>Storage space efficiency: 72 TB</li>
<li>Fault tolerance: None!</li>
<li>Below is a visual depiction of our 12 rainbow blocks written to this pool configuration:</li>
</ul>

<blockquote>
<p>The blocks are simply striped across the 12 disks in the pool. The LBA column on the left stands for “Logical Block Address”. If we treat each disk as a column in an array, each LBA would be a row. It’s also easy to see that if any single disk fails, we would be missing a color in the rainbow and our data would be incomplete. While this configuration has fantastic read and write speeds and can handle a ton of IOPS, the data stored on the pool is very vulnerable. This configuration is not recommended unless you’re comfortable losing all of your pool’s data whenever any single drive fails.<br>
A mirrored vdev consists of two or more disks. A mirrored vdev stores an exact copy of all the data written to it on each one of its drives. Traditional RAID-1 mirrors usually only support two drive mirrors, but ZFS allows for more drives per mirror to increase redundancy and fault tolerance. All disks in a mirrored vdev have to fail for the vdev, and thus the whole pool, to fail. Total storage space will be equal to the size of a single drive in the vdev. If you’re using mismatched drive sizes in your mirrors, the total size will be that of the smallest drive in the mirror.<br>
Streaming read speeds and read IOPS on a mirrored vdev will be faster than write speeds and IOPS. When reading from a mirrored vdev, the drives can “divide and conquer” the operations, similar to what we saw above in the striped pool. This is because each drive in the mirror has an identical copy of the data. For write operations, all of the drives need to write a copy of the data, so the mirrored vdev will be limited to the streaming write speed and IOPS of a single disk.</p>
</blockquote>

<blockquote>
<p>Here’s a summary:</p>
</blockquote>

<ul>
<li>
<p>N-way mirror:</p>
</li>
<li>
<p>Read IOPS: N * Read IOPS of a single drive</p>
</li>
<li>
<p>Write IOPS: Write IOPS of a single drive</p>
</li>
<li>
<p>Streaming read speed: N * Streaming read speed of a single drive</p>
</li>
<li>
<p>Streaming write speed: Streaming write speed of a single drive</p>
</li>
<li>
<p>Storage space efficiency: 50% for 2-way, 33% for 3-way, 25% for 4-way, etc. [(N-1)/N]</p>
</li>
<li>
<p>Fault tolerance: 1 disk per vdev for 2-way, 2 for 3-way, 3 for 4-way, etc. [N-1]</p>
</li>
<li>
<p>For our first example configuration, let’s do something ridiculous and create a 12-way mirror. ZFS supports this kind of thing, but your management probably will not.</p>
</li>
<li>
<p>1x 12-way mirror:</p>
</li>
<li>
<p>Read IOPS: 3000</p>
</li>
<li>
<p>Write IOPS: 250</p>
</li>
<li>
<p>Streaming read speed: 1200 MB/s</p>
</li>
<li>
<p>Streaming write speed: 100 MB/s</p>
</li>
<li>
<p>Storage space efficiency: 8.3% (6 TB)</p>
</li>
<li>
<p>Fault tolerance: 11</p>
</li>
</ul>

<blockquote>
<p>As we can clearly see from the diagram, every single disk in the vdev gets a full copy of our rainbow data. The chainlink icons between the disk labels in the column headers indicate the disks are part of a single vdev. We can lose up to 11 disks in this vdev and still have a complete rainbow. Of course, the data takes up far too much room on the pool, occupying a full 12 LBAs in the data array.</p>
</blockquote>

<blockquote>
<p>Obviously, this is far from the best use of 12 drives. Let’s do something a little more practical and configure the pool with the ZFS equivalent of RAID-10. We’ll configure six 2-way mirror vdevs. ZFS will stripe the data across all 6 of the vdevs. We can use the work we did in the striped vdev section to determine how the pool as a whole will behave. Let’s first calculate the performance per vdev, then we can work on the full pool:</p>
</blockquote>

<ul>
<li>
<p>1x 2-way mirror:</p>
</li>
<li>
<p>Read IOPS: 500</p>
</li>
<li>
<p>Write IOPS: 250</p>
</li>
<li>
<p>Streaming read speed: 200 MB/s</p>
</li>
<li>
<p>Streaming write speed: 100 MB/s</p>
</li>
<li>
<p>Storage space efficiency: 50% (6 TB)</p>
</li>
<li>
<p>Fault tolerance: 1</p>
</li>
<li>
<p>Now we can pretend we have 6 drives with the performance statistics listed above and run them through our striped vdev performance calculator to get the total pool’s performance:</p>
</li>
<li>
<p>6x 2-way mirror:</p>
</li>
<li>
<p>Read IOPS: 3000</p>
</li>
<li>
<p>Write IOPS: 1500</p>
</li>
<li>
<p>Streaming read speed: 3000 MB/s</p>
</li>
<li>
<p>Streaming write speed: 1500 MB/s</p>
</li>
<li>
<p>Storage space efficiency: 50% (36 TB)</p>
</li>
<li>
<p>Fault tolerance: 1 per vdev, 6 total</p>
</li>
<li>
<p>Again, we will examine the configuration from a visual perspective:</p>
</li>
</ul>

<blockquote>
<p>Each vdev gets a block of data and ZFS writes that data to all of (or in this case, both of) the disks in the mirror. As long as we have at least one functional disk in each vdev, we can retrieve our rainbow. As before, the chain link icons denote the disks are part of a single vdev. This configuration emphasizes performance over raw capacity but doesn’t totally disregard fault tolerance as our striped pool did. It’s a very popular configuration for systems that need a lot of fast I/O. Let’s look at one more example configuration using four 3-way mirrors. We’ll skip the individual vdev performance calculation and go straight to the full pool:</p>
</blockquote>

<ul>
<li>4x 3-way mirror:</li>
<li>Read IOPS: 3000</li>
<li>Write IOPS: 1000</li>
<li>Streaming read speed: 3000 MB/s</li>
<li>Streaming write speed: 400 MB/s</li>
<li>Storage space efficiency: 33% (24 TB)</li>
<li>Fault tolerance: 2 per vdev, 8 total</li>
</ul>

<blockquote>
<p>While we have sacrificed some write performance and capacity, the pool is now extremely fault tolerant. This configuration is probably not practical for most applications and it would make more sense to use lower fault tolerance and set up an offsite backup system.<br>
Striped and mirrored vdevs are fantastic for access speed performance, but they either leave you with no redundancy whatsoever or impose at least a 50% penalty on the total usable space of your pool. In the next post, we will cover RAIDZ, which lets you keep data redundancy without sacrificing as much storage space efficiency. We’ll also look at some example workload scenarios and decide which layout would be the best fit for each.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://chown.me/blog/2FA-with-ssh-on-OpenBSD.html">2FA with ssh on OpenBSD</a></p>

<blockquote>
<p>Five years ago I wrote about using a yubikey on OpenBSD. The only problem with doing this is that there’s no validation server available on OpenBSD, so you need to use a different OTP slot for each machine. (You don’t want to risk a replay attack if someone succeeds in capturing an OTP on one machine, right?) Yubikey has two OTP slots per device, so you would need a yubikey for every two machines with which you’d like to use it. You could use a bastion—and use only one yubikey—but I don’t like the SPOF aspect of a bastion. YMMV.<br>
After I played with TOTP, I wanted to use them as a 2FA for ssh. At the time of writing, we can’t do that using only the tools in base. This article focuses on OpenBSD; if you use another operating system, here are two handy links.</p>
</blockquote>

<ul>
<li>SEED CONFIGURATION</li>
</ul>

<blockquote>
<p>The first thing we need to do is to install the software which will be used to verify the OTPs we submit.</p>
</blockquote>

<p><code># pkg_add login_oath</code></p>

<blockquote>
<p>We need to create a secret - aka, the seed - that will be used to calculate the Time-based One-Time Passwords. We should make sure no one can read or change it.</p>
</blockquote>

<p><code>$ openssl rand -hex 20 &gt; ~/.totp-key</code><br>
<code>$ chmod 400 ~/.totp-key</code></p>

<blockquote>
<p>Now we have a hexadecimal key, but apps usually want a base32 secret. I initially wrote a small script to do the conversion.<br>
While writing this article, I took the opportunity to improve it. When I initially wrote this utility for my use, python-qrcode hadn’t yet been imported to the OpenBSD ports/packages system. It’s easy to install now, so let’s use it.<br>
Here’s the improved version. It will ask for the hex key and output the secret as a base32-encoded string, both with and without spacing so you can copy-paste it into your password manager or easily retype it. It will then ask for the information needed to generate a QR code. Adding our new OTP secret to any mobile app using the QR code will be super easy!</p>
</blockquote>

<ul>
<li>SYSTEM CONFIGURATION</li>
</ul>

<blockquote>
<p>We can now move to the configuration of the system to put our new TOTP to use. As you might guess, it’s going to be quite close to what we did with the yubikey.<br>
We need to tweak login.conf. Be careful and keep a root shell open at all times. The few times I broke my OpenBSD were because I messed with login.conf without showing enough care.</p>
</blockquote>

<ul>
<li>SSHD CONFIGURATION</li>
</ul>

<blockquote>
<p>Again, keeping a root shell around decreases the risk of losing access to the system and being locked outside.<br>
A good standard is to use PasswordAuthentication no and to use public key only. Except… have a guess what the P stands for in TOTP. Yes, congrats, you guessed it!<br>
We need to switch to PasswordAuthentication yes. However, if we made this change alone, sshd would then accept a public key OR a password (which are TOTP because of our login.conf). 2FA uses both at the same time.<br>
To inform sshd we intend to use both, we need to set AuthenticationMethods publickey,password. This way, the user trying to login will first need to perform the traditional publickey authentication. Once that’s done, ssh will prompt for a password and the user will need to submit a valid TOTP for the system.<br>
We could do this the other way around, but I think bots could try passwords, wasting resources. Evaluated in this order, failing to provide a public key leads to sshd immediately declining your attempt.</p>
</blockquote>

<ul>
<li>IMPROVING SECURITY WITHOUT IMPACTING UX</li>
</ul>

<blockquote>
<p>My phone has a long enough password that most of the time, I fail to type it correctly on the first try. Of course, if I had to unlock my phone, launch my TOTP app and use my keyboard to enter what I see on my phone’s screen, I would quickly disable 2FA.<br>
To find a balance, I have whitelisted certain IP addresses and users. If I connect from a particular IP address or as a specific user, I don’t want to go through 2FA. For some users, I might not even enable 2FA.<br>
To sum up, we covered how to create a seed, how to perform a hexadecimal to base32 conversion and how to create a QR code for mobile applications. We configured the login system with login.conf so that ssh authentication uses the TOTP login system, and we told sshd to ask for both the public key and the Time-based One-Time Password. Now you should be all set to use two-factor ssh authentication on OpenBSD!</p>
</blockquote>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://utcc.utoronto.ca/~cks/space/blog/solaris/ZFSAndDirectoryDType">How ZFS maintains file type information in directories</a></p>

<blockquote>
<p>As an aside in yesterday’s history of file type information being available in Unix directories, I mentioned that it was possible for a filesystem to support this even though its Unix didn’t. By supporting it, I mean that the filesystem maintains this information in its on disk format for directories, even though the rest of the kernel will never ask for it. This is what ZFS does.<br>
The easiest way to see that ZFS does this is to use zdb to dump a directory. I’m going to do this on an OmniOS machine, to make it more convincing, and it turns out that this has some interesting results. Since this is OmniOS, we don’t have the convenience of just naming a directory in zdb, so let’s find the root directory of a filesystem, starting from dnode 1 (as seen before).</p>
</blockquote>

<p><code># zdb -dddd fs3-corestaff-01/h/281 1</code><br>
<code>Dataset [....]</code><br>
<code>[...]</code><br>
<code>microzap: 512 bytes, 4 entries</code><br>
<code>[...]</code><br>
<code>ROOT = 3</code><br>
<code></code><br>
<code># zdb -dddd fs3-corestaff-01/h/281 3</code><br>
<code>Object lvl iblk dblk dsize lsize %full type</code><br>
<code>3 1 16K 1K 8K 1K 100.00 ZFS directory</code><br>
<code>[...]</code><br>
<code>microzap: 1024 bytes, 8 entries</code><br>
<code></code><br>
<code>RESTORED = 4396504 (type: Directory)</code><br>
<code>ckstst = 12017 (type: not specified)</code><br>
<code>ckstst3 = 25069 (type: Directory)</code><br>
<code>.demo-file = 5832188 (type: Regular File)</code><br>
<code>.peergroup = 12590 (type: not specified)</code><br>
<code>cks = 5 (type: not specified)</code><br>
<code>cksimap1 = 5247832 (type: Directory)</code><br>
<code>.diskuse = 12016 (type: not specified)</code><br>
<code>ckstst2 = 12535 (type: not specified)</code></p>

<blockquote>
<p>This is actually an old filesystem (it dates from Solaris 10 and has been transferred around with ‘zfs send | zfs recv’ since then), but various home directories for real and test users have been created in it over time (you can probably guess which one is the oldest one). Sufficiently old directories and files have no file type information, but more recent ones have this information, including .demo-file, which I made just now so this would have an entry that was a regular file with type information.<br>
Once I dug into it, this turned out to be a change introduced (or activated) in ZFS filesystem version 2, which is described in ‘zfs upgrade -v’ as ‘enhanced directory entries’. As an actual change in (Open)Solaris, it dates from mid 2007, although I’m not sure what Solaris release it made it into. The upshot is that if you made your ZFS filesystem any time in the last decade, you’ll have this file type information in your directories.<br>
How ZFS stores this file type information is interesting and clever, especially when it comes to backwards compatibility. I’ll start by quoting the comment from zfs_znode.h:</p>
</blockquote>

<p><code>/*</code><br>
<code>* The directory entry has the type (currently unused on</code><br>
<code>* Solaris) in the top 4 bits, and the object number in</code><br>
<code>* the low 48 bits. The &quot;middle&quot; 12 bits are unused.</code><br>
<code>*/</code></p>

<blockquote>
<p>In yesterday’s entry I said that Unix directory entries need to store at least the filename and the inode number of the file. What ZFS is doing here is reusing the 64 bit field used for the ‘inode’ (the ZFS dnode number) to also store the file type, because it knows that object numbers have only a limited range. This also makes old directory entries compatible, by making type 0 (all 4 bits 0) mean ‘not specified’. Since old directory entries only stored the object number and the object number is 48 bits or less, the higher bits are guaranteed to be all zero.<br>
The reason this needed a new ZFS filesystem version is now clear. If you tried to read directory entries with file type information on a version of ZFS that didn’t know about them, the old version would likely see crazy (and non-existent) object numbers and nothing would work. In order to even read a ‘file type in directory entries’ filesystem, you need to know to only look at the low 48 bits of the object number field in directory entries.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://euroquis.nl/bobulate/?p=1976">Everything old is new again</a></p>

<blockquote>
<p>Just because KDE4-era software has been deprecated by the KDE-FreeBSD team in the official ports-repository, doesn’t mean we don’t care for it while we still need to. KDE4 was released on January 11th, 2008 — I still have the T-shirt — which was a very different C++ world than what we now live in. Much of the code pre-dates the availability of C<ins>11 — certainly the availability of compilers with C</ins>11 support. The language has changed a great deal in those ten years since the original release.<br>
The platforms we run KDE code on have, too — FreeBSD 12 is a long way from the FreeBSD 6 or 7 that were current at release (although at the time, I was more into OpenSolaris). In particular, since then the FreeBSD world has switched over to Clang, and FreeBSD current is experimenting with Clang 7. So we’re seeing KDE4-era code being built, and running, on FreeBSD 12 with Clang 7. That’s a platform with a very different idea of what constitutes correct code, than what the code was originally written for. (Not quite as big a difference as Helio’s KDE1 efforts, though)<br>
So, while we’re counting down to removing KDE4 from the FreeBSD ports tree, we’re also going through and fixing it to work with Clang 7, which defaults to a newer C++ standard and which is quite picky about some things. Some time in the distant past, when pointers were integers and NULL was zero, there was some confusion about booleans. So there’s lots of code that does list.contains(element) &gt; 0 … this must have been a trick before booleans were a supported type in all our compilers. In any case it breaks with Clang 7, since contains() returns a QBool which converts to a nullptr (when false) which isn’t comparable to the integer 0. Suffice to say I’ve spent more time reading KDE4-era code this month, than in the past two years.<br>
However, work is proceeding apace, so if you really really want to, you can still get your old-school kicks on a new platform. Because we care about packaging things right, even when we want to get rid of it.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://nanxiao.gitbooks.io/openbsd-netcat-demystified/">OpenBSD netcat demystified</a></p>

<blockquote>
<p>Owing to its versatile functionalities, netcat earns the reputation as “TCP/IP Swiss army knife”. For example, you can create a simple chat app using netcat:</p>
</blockquote>

<ul>
<li>(1) Open a terminal and input following command:</li>
</ul>

<p><code># nc -l 3003</code></p>

<blockquote>
<p>This means a netcat process will listen on 3003 port in this machine (the IP address of current machine is 192.168.35.176).</p>
</blockquote>

<ul>
<li>(2) Connect aforemontioned netcat process in another machine, and send a greeting:</li>
</ul>

<p><code># nc 192.168.35.176 3003</code><br>
<code>hello</code></p>

<blockquote>
<p>Then in the first machine’s terminal, you will see the “hello” text:</p>
</blockquote>

<p><code># nc -l 3003</code><br>
<code>hello</code></p>

<blockquote>
<p>A primitive chatroom is built successfully. Very cool! Isn’t it? I think many people can’t wait to explore more features of netcatnow. If you are among them, congratulations! This tutorial may be the correct place for you.<br>
In the following parts, I will delve into OpenBSD’s netcatcode to give a detailed anatomy of it. The reason of picking OpenBSD’s netcat rather than others’ is because its code repository is small (~2000 lines of code) and neat. Furthermore, I also hope this little book can assist you learn more socket programming knowledge not just grasping usage of netcat.<br>
We’re all set. Let’s go!</p>
</blockquote>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://www.geeklan.co.uk/files/eurobsdcon2018.pdf">What’s in store for NetBSD 9.0</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-advocacy/2018/09/25/msg000783.html">NetBSD machines at Open Source Conference 2018 Hiroshima</a></li>
<li><a href="http://vincentdelft.be/post/post_20180922">nmctl adapted with limited privileges: nmctl-0.6.0</a></li>
<li><a href="https://www.freebsdfoundation.org/blog/submit-your-work-check-out-scale-17x-and-fosdem-19-cfps/">Submit Your Work: Check out SCALE 17x and FOSDEM ’19 CFPs</a></li>
<li><a href="https://www.openbsd.org/64.html">OpenBSD 6.4 site is up! (with a partial list of new features)</a></li>
<li><a href="https://www.blackcatenterprises.us/using-alpine-to-read-your-email/">Using Alpine to Read Your Email on OpenBSD</a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Morgan - <a href="http://dpaste.com/0EXPWQK#wrap">Send/Receive to Manage Fragmentation?</a></li>
<li>Ryan - <a href="http://dpaste.com/0B6C0Y0">ZFS and mmap</a></li>
<li>Marcus - <a href="http://dpaste.com/1DT26S8#wrap">Linux Compat</a></li>
<li>Ben - <a href="http://dpaste.com/20GTHZE#wrap">Multiple Pools</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>6 metrics for zpool performance, 2FA with ssh on OpenBSD, ZFS maintaining file type information in dirs, everything old is new again, netcat demystified, and more.</p>

<p>##Headlines<br>
###<a href="https://www.ixsystems.com/blog/zfs-pool-performance-1/">Six Metrics for Measuring ZFS Pool Performance Part 1</a></p>

<blockquote>
<p>The layout of a ZFS storage pool has a significant impact on system performance under various workloads. Given the importance of picking the right configuration for your workload and the fact that making changes to an in-use ZFS pool is far from trivial, it is important for an administrator to understand the mechanics of pool performance when designing a storage system.</p>
</blockquote>

<ul>
<li>To quantify pool performance, we will consider six primary metrics:</li>
<li>Read I/O operations per second (IOPS)</li>
<li>Write IOPS</li>
<li>Streaming read speed</li>
<li>Streaming write speed</li>
<li>Storage space efficiency (usable capacity after parity versus total raw capacity)</li>
<li>Fault tolerance (maximum number of drives that can fail before data loss)</li>
<li>For the sake of comparison, we’ll use an example system with 12 drives, each one sized at 6TB, and say that each drive does 100MB/s streaming reads and writes and can do 250 read and write IOPS. We will visualize how the data is spread across the drives by writing 12 multi-colored blocks, shown below. The blocks are written to the pool starting with the brown block on the left (number one), and working our way to the pink block on the right (number 12).</li>
</ul>

<blockquote>
<p>Note that when we calculate data rates and IOPS values for the example system, they are only approximations. Many other factors can impact pool access speeds for better (compression, caching) or worse (poor CPU performance, not enough memory).<br>
There is no single configuration that maximizes all six metrics. Like so many things in life, our objective is to find an appropriate balance of the metrics to match a target workload. For example, a cold-storage backup system will likely want a pool configuration that emphasizes usable storage space and fault tolerance over the other data-rate focused metrics.<br>
Let’s start with a quick review of ZFS storage pools before diving into specific configuration options. ZFS storage pools are comprised of one or more virtual devices, or vdevs. Each vdev is comprised of one or more storage providers, typically physical hard disks. All disk-level redundancy is configured at the vdev level. That is, the RAID layout is set on each vdev as opposed to on the storage pool. Data written to the storage pool is then striped across all the vdevs. Because pool data is striped across the vdevs, the loss of any one vdev means total pool failure. This is perhaps the single most important fact to keep in mind when designing a ZFS storage system. We will circle back to this point in the next post, but keep it in mind as we go through the vdev configuration options.<br>
Because storage pools are made up of one or more vdevs with the pool data striped over the top, we’ll take a look at pool configuration in terms of various vdev configurations. There are three basic vdev configurations: striping, mirroring, and RAIDZ (which itself has three different varieties). The first section will cover striped and mirrored vdevs in this post; the second post will cover RAIDZ and some example scenarios.<br>
A striped vdev is the simplest configuration. Each vdev consists of a single disk with no redundancy. When several of these single-disk, striped vdevs are combined into a single storage pool, the total usable storage space would be the sum of all the drives. When you write data to a pool made of striped vdevs, the data is broken into small chunks called “blocks” and distributed across all the disks in the pool. The blocks are written in “round-robin” sequence, meaning after all the disks receive one row of blocks, called a stripe, it loops back around and writes another stripe under the first. A striped pool has excellent performance and storage space efficiency, but absolutely zero fault tolerance. If even a single drive in the pool fails, the entire pool will fail and all data stored on that pool will be lost.<br>
The excellent performance of a striped pool comes from the fact that all of the disks can work independently for all read and write operations. If you have a bunch of small read or write operations (IOPS), each disk can work independently to fetch the next block. For streaming reads and writes, each disk can fetch the next block in line synchronized with its neighbors. For example, if a given disk is fetching block n, its neighbor to the left can be fetching block n-1, and its neighbor to the right can be fetching block n+1. Therefore, the speed of all read and write operations as well as the quantity of read and write operations (IOPS) on a striped pool will scale with the number of vdevs. Note here that I said the speeds and IOPS scale with the number of vdevs rather than the number of drives; there’s a reason for this and we’ll cover it in the next post when we discuss RAID-Z.<br>
Here’s a summary of the total pool performance (where N is the number of disks in the pool):</p>
</blockquote>

<ul>
<li>N-wide striped:</li>
<li>Read IOPS: N * Read IOPS of a single drive</li>
<li>Write IOPS: N * Write IOPS of a single drive</li>
<li>Streaming read speed: N * Streaming read speed of a single drive</li>
<li>Streaming write speed: N * Streaming write speed of a single drive</li>
<li>Storage space efficiency: 100%</li>
<li>Fault tolerance: None!</li>
</ul>

<blockquote>
<p>Let’s apply this to our example system, configured with a 12-wide striped pool:</p>
</blockquote>

<ul>
<li>12-wide striped:</li>
<li>Read IOPS: 3000</li>
<li>Write IOPS: 3000</li>
<li>Streaming read speed: 1200 MB/s</li>
<li>Streaming write speed: 1200 MB/s</li>
<li>Storage space efficiency: 72 TB</li>
<li>Fault tolerance: None!</li>
<li>Below is a visual depiction of our 12 rainbow blocks written to this pool configuration:</li>
</ul>

<blockquote>
<p>The blocks are simply striped across the 12 disks in the pool. The LBA column on the left stands for “Logical Block Address”. If we treat each disk as a column in an array, each LBA would be a row. It’s also easy to see that if any single disk fails, we would be missing a color in the rainbow and our data would be incomplete. While this configuration has fantastic read and write speeds and can handle a ton of IOPS, the data stored on the pool is very vulnerable. This configuration is not recommended unless you’re comfortable losing all of your pool’s data whenever any single drive fails.<br>
A mirrored vdev consists of two or more disks. A mirrored vdev stores an exact copy of all the data written to it on each one of its drives. Traditional RAID-1 mirrors usually only support two drive mirrors, but ZFS allows for more drives per mirror to increase redundancy and fault tolerance. All disks in a mirrored vdev have to fail for the vdev, and thus the whole pool, to fail. Total storage space will be equal to the size of a single drive in the vdev. If you’re using mismatched drive sizes in your mirrors, the total size will be that of the smallest drive in the mirror.<br>
Streaming read speeds and read IOPS on a mirrored vdev will be faster than write speeds and IOPS. When reading from a mirrored vdev, the drives can “divide and conquer” the operations, similar to what we saw above in the striped pool. This is because each drive in the mirror has an identical copy of the data. For write operations, all of the drives need to write a copy of the data, so the mirrored vdev will be limited to the streaming write speed and IOPS of a single disk.</p>
</blockquote>

<blockquote>
<p>Here’s a summary:</p>
</blockquote>

<ul>
<li>
<p>N-way mirror:</p>
</li>
<li>
<p>Read IOPS: N * Read IOPS of a single drive</p>
</li>
<li>
<p>Write IOPS: Write IOPS of a single drive</p>
</li>
<li>
<p>Streaming read speed: N * Streaming read speed of a single drive</p>
</li>
<li>
<p>Streaming write speed: Streaming write speed of a single drive</p>
</li>
<li>
<p>Storage space efficiency: 50% for 2-way, 33% for 3-way, 25% for 4-way, etc. [(N-1)/N]</p>
</li>
<li>
<p>Fault tolerance: 1 disk per vdev for 2-way, 2 for 3-way, 3 for 4-way, etc. [N-1]</p>
</li>
<li>
<p>For our first example configuration, let’s do something ridiculous and create a 12-way mirror. ZFS supports this kind of thing, but your management probably will not.</p>
</li>
<li>
<p>1x 12-way mirror:</p>
</li>
<li>
<p>Read IOPS: 3000</p>
</li>
<li>
<p>Write IOPS: 250</p>
</li>
<li>
<p>Streaming read speed: 1200 MB/s</p>
</li>
<li>
<p>Streaming write speed: 100 MB/s</p>
</li>
<li>
<p>Storage space efficiency: 8.3% (6 TB)</p>
</li>
<li>
<p>Fault tolerance: 11</p>
</li>
</ul>

<blockquote>
<p>As we can clearly see from the diagram, every single disk in the vdev gets a full copy of our rainbow data. The chainlink icons between the disk labels in the column headers indicate the disks are part of a single vdev. We can lose up to 11 disks in this vdev and still have a complete rainbow. Of course, the data takes up far too much room on the pool, occupying a full 12 LBAs in the data array.</p>
</blockquote>

<blockquote>
<p>Obviously, this is far from the best use of 12 drives. Let’s do something a little more practical and configure the pool with the ZFS equivalent of RAID-10. We’ll configure six 2-way mirror vdevs. ZFS will stripe the data across all 6 of the vdevs. We can use the work we did in the striped vdev section to determine how the pool as a whole will behave. Let’s first calculate the performance per vdev, then we can work on the full pool:</p>
</blockquote>

<ul>
<li>
<p>1x 2-way mirror:</p>
</li>
<li>
<p>Read IOPS: 500</p>
</li>
<li>
<p>Write IOPS: 250</p>
</li>
<li>
<p>Streaming read speed: 200 MB/s</p>
</li>
<li>
<p>Streaming write speed: 100 MB/s</p>
</li>
<li>
<p>Storage space efficiency: 50% (6 TB)</p>
</li>
<li>
<p>Fault tolerance: 1</p>
</li>
<li>
<p>Now we can pretend we have 6 drives with the performance statistics listed above and run them through our striped vdev performance calculator to get the total pool’s performance:</p>
</li>
<li>
<p>6x 2-way mirror:</p>
</li>
<li>
<p>Read IOPS: 3000</p>
</li>
<li>
<p>Write IOPS: 1500</p>
</li>
<li>
<p>Streaming read speed: 3000 MB/s</p>
</li>
<li>
<p>Streaming write speed: 1500 MB/s</p>
</li>
<li>
<p>Storage space efficiency: 50% (36 TB)</p>
</li>
<li>
<p>Fault tolerance: 1 per vdev, 6 total</p>
</li>
<li>
<p>Again, we will examine the configuration from a visual perspective:</p>
</li>
</ul>

<blockquote>
<p>Each vdev gets a block of data and ZFS writes that data to all of (or in this case, both of) the disks in the mirror. As long as we have at least one functional disk in each vdev, we can retrieve our rainbow. As before, the chain link icons denote the disks are part of a single vdev. This configuration emphasizes performance over raw capacity but doesn’t totally disregard fault tolerance as our striped pool did. It’s a very popular configuration for systems that need a lot of fast I/O. Let’s look at one more example configuration using four 3-way mirrors. We’ll skip the individual vdev performance calculation and go straight to the full pool:</p>
</blockquote>

<ul>
<li>4x 3-way mirror:</li>
<li>Read IOPS: 3000</li>
<li>Write IOPS: 1000</li>
<li>Streaming read speed: 3000 MB/s</li>
<li>Streaming write speed: 400 MB/s</li>
<li>Storage space efficiency: 33% (24 TB)</li>
<li>Fault tolerance: 2 per vdev, 8 total</li>
</ul>

<blockquote>
<p>While we have sacrificed some write performance and capacity, the pool is now extremely fault tolerant. This configuration is probably not practical for most applications and it would make more sense to use lower fault tolerance and set up an offsite backup system.<br>
Striped and mirrored vdevs are fantastic for access speed performance, but they either leave you with no redundancy whatsoever or impose at least a 50% penalty on the total usable space of your pool. In the next post, we will cover RAIDZ, which lets you keep data redundancy without sacrificing as much storage space efficiency. We’ll also look at some example workload scenarios and decide which layout would be the best fit for each.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://chown.me/blog/2FA-with-ssh-on-OpenBSD.html">2FA with ssh on OpenBSD</a></p>

<blockquote>
<p>Five years ago I wrote about using a yubikey on OpenBSD. The only problem with doing this is that there’s no validation server available on OpenBSD, so you need to use a different OTP slot for each machine. (You don’t want to risk a replay attack if someone succeeds in capturing an OTP on one machine, right?) Yubikey has two OTP slots per device, so you would need a yubikey for every two machines with which you’d like to use it. You could use a bastion—and use only one yubikey—but I don’t like the SPOF aspect of a bastion. YMMV.<br>
After I played with TOTP, I wanted to use them as a 2FA for ssh. At the time of writing, we can’t do that using only the tools in base. This article focuses on OpenBSD; if you use another operating system, here are two handy links.</p>
</blockquote>

<ul>
<li>SEED CONFIGURATION</li>
</ul>

<blockquote>
<p>The first thing we need to do is to install the software which will be used to verify the OTPs we submit.</p>
</blockquote>

<p><code># pkg_add login_oath</code></p>

<blockquote>
<p>We need to create a secret - aka, the seed - that will be used to calculate the Time-based One-Time Passwords. We should make sure no one can read or change it.</p>
</blockquote>

<p><code>$ openssl rand -hex 20 &gt; ~/.totp-key</code><br>
<code>$ chmod 400 ~/.totp-key</code></p>

<blockquote>
<p>Now we have a hexadecimal key, but apps usually want a base32 secret. I initially wrote a small script to do the conversion.<br>
While writing this article, I took the opportunity to improve it. When I initially wrote this utility for my use, python-qrcode hadn’t yet been imported to the OpenBSD ports/packages system. It’s easy to install now, so let’s use it.<br>
Here’s the improved version. It will ask for the hex key and output the secret as a base32-encoded string, both with and without spacing so you can copy-paste it into your password manager or easily retype it. It will then ask for the information needed to generate a QR code. Adding our new OTP secret to any mobile app using the QR code will be super easy!</p>
</blockquote>

<ul>
<li>SYSTEM CONFIGURATION</li>
</ul>

<blockquote>
<p>We can now move to the configuration of the system to put our new TOTP to use. As you might guess, it’s going to be quite close to what we did with the yubikey.<br>
We need to tweak login.conf. Be careful and keep a root shell open at all times. The few times I broke my OpenBSD were because I messed with login.conf without showing enough care.</p>
</blockquote>

<ul>
<li>SSHD CONFIGURATION</li>
</ul>

<blockquote>
<p>Again, keeping a root shell around decreases the risk of losing access to the system and being locked outside.<br>
A good standard is to use PasswordAuthentication no and to use public key only. Except… have a guess what the P stands for in TOTP. Yes, congrats, you guessed it!<br>
We need to switch to PasswordAuthentication yes. However, if we made this change alone, sshd would then accept a public key OR a password (which are TOTP because of our login.conf). 2FA uses both at the same time.<br>
To inform sshd we intend to use both, we need to set AuthenticationMethods publickey,password. This way, the user trying to login will first need to perform the traditional publickey authentication. Once that’s done, ssh will prompt for a password and the user will need to submit a valid TOTP for the system.<br>
We could do this the other way around, but I think bots could try passwords, wasting resources. Evaluated in this order, failing to provide a public key leads to sshd immediately declining your attempt.</p>
</blockquote>

<ul>
<li>IMPROVING SECURITY WITHOUT IMPACTING UX</li>
</ul>

<blockquote>
<p>My phone has a long enough password that most of the time, I fail to type it correctly on the first try. Of course, if I had to unlock my phone, launch my TOTP app and use my keyboard to enter what I see on my phone’s screen, I would quickly disable 2FA.<br>
To find a balance, I have whitelisted certain IP addresses and users. If I connect from a particular IP address or as a specific user, I don’t want to go through 2FA. For some users, I might not even enable 2FA.<br>
To sum up, we covered how to create a seed, how to perform a hexadecimal to base32 conversion and how to create a QR code for mobile applications. We configured the login system with login.conf so that ssh authentication uses the TOTP login system, and we told sshd to ask for both the public key and the Time-based One-Time Password. Now you should be all set to use two-factor ssh authentication on OpenBSD!</p>
</blockquote>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://utcc.utoronto.ca/~cks/space/blog/solaris/ZFSAndDirectoryDType">How ZFS maintains file type information in directories</a></p>

<blockquote>
<p>As an aside in yesterday’s history of file type information being available in Unix directories, I mentioned that it was possible for a filesystem to support this even though its Unix didn’t. By supporting it, I mean that the filesystem maintains this information in its on disk format for directories, even though the rest of the kernel will never ask for it. This is what ZFS does.<br>
The easiest way to see that ZFS does this is to use zdb to dump a directory. I’m going to do this on an OmniOS machine, to make it more convincing, and it turns out that this has some interesting results. Since this is OmniOS, we don’t have the convenience of just naming a directory in zdb, so let’s find the root directory of a filesystem, starting from dnode 1 (as seen before).</p>
</blockquote>

<p><code># zdb -dddd fs3-corestaff-01/h/281 1</code><br>
<code>Dataset [....]</code><br>
<code>[...]</code><br>
<code>microzap: 512 bytes, 4 entries</code><br>
<code>[...]</code><br>
<code>ROOT = 3</code><br>
<code></code><br>
<code># zdb -dddd fs3-corestaff-01/h/281 3</code><br>
<code>Object lvl iblk dblk dsize lsize %full type</code><br>
<code>3 1 16K 1K 8K 1K 100.00 ZFS directory</code><br>
<code>[...]</code><br>
<code>microzap: 1024 bytes, 8 entries</code><br>
<code></code><br>
<code>RESTORED = 4396504 (type: Directory)</code><br>
<code>ckstst = 12017 (type: not specified)</code><br>
<code>ckstst3 = 25069 (type: Directory)</code><br>
<code>.demo-file = 5832188 (type: Regular File)</code><br>
<code>.peergroup = 12590 (type: not specified)</code><br>
<code>cks = 5 (type: not specified)</code><br>
<code>cksimap1 = 5247832 (type: Directory)</code><br>
<code>.diskuse = 12016 (type: not specified)</code><br>
<code>ckstst2 = 12535 (type: not specified)</code></p>

<blockquote>
<p>This is actually an old filesystem (it dates from Solaris 10 and has been transferred around with ‘zfs send | zfs recv’ since then), but various home directories for real and test users have been created in it over time (you can probably guess which one is the oldest one). Sufficiently old directories and files have no file type information, but more recent ones have this information, including .demo-file, which I made just now so this would have an entry that was a regular file with type information.<br>
Once I dug into it, this turned out to be a change introduced (or activated) in ZFS filesystem version 2, which is described in ‘zfs upgrade -v’ as ‘enhanced directory entries’. As an actual change in (Open)Solaris, it dates from mid 2007, although I’m not sure what Solaris release it made it into. The upshot is that if you made your ZFS filesystem any time in the last decade, you’ll have this file type information in your directories.<br>
How ZFS stores this file type information is interesting and clever, especially when it comes to backwards compatibility. I’ll start by quoting the comment from zfs_znode.h:</p>
</blockquote>

<p><code>/*</code><br>
<code>* The directory entry has the type (currently unused on</code><br>
<code>* Solaris) in the top 4 bits, and the object number in</code><br>
<code>* the low 48 bits. The &quot;middle&quot; 12 bits are unused.</code><br>
<code>*/</code></p>

<blockquote>
<p>In yesterday’s entry I said that Unix directory entries need to store at least the filename and the inode number of the file. What ZFS is doing here is reusing the 64 bit field used for the ‘inode’ (the ZFS dnode number) to also store the file type, because it knows that object numbers have only a limited range. This also makes old directory entries compatible, by making type 0 (all 4 bits 0) mean ‘not specified’. Since old directory entries only stored the object number and the object number is 48 bits or less, the higher bits are guaranteed to be all zero.<br>
The reason this needed a new ZFS filesystem version is now clear. If you tried to read directory entries with file type information on a version of ZFS that didn’t know about them, the old version would likely see crazy (and non-existent) object numbers and nothing would work. In order to even read a ‘file type in directory entries’ filesystem, you need to know to only look at the low 48 bits of the object number field in directory entries.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://euroquis.nl/bobulate/?p=1976">Everything old is new again</a></p>

<blockquote>
<p>Just because KDE4-era software has been deprecated by the KDE-FreeBSD team in the official ports-repository, doesn’t mean we don’t care for it while we still need to. KDE4 was released on January 11th, 2008 — I still have the T-shirt — which was a very different C++ world than what we now live in. Much of the code pre-dates the availability of C<ins>11 — certainly the availability of compilers with C</ins>11 support. The language has changed a great deal in those ten years since the original release.<br>
The platforms we run KDE code on have, too — FreeBSD 12 is a long way from the FreeBSD 6 or 7 that were current at release (although at the time, I was more into OpenSolaris). In particular, since then the FreeBSD world has switched over to Clang, and FreeBSD current is experimenting with Clang 7. So we’re seeing KDE4-era code being built, and running, on FreeBSD 12 with Clang 7. That’s a platform with a very different idea of what constitutes correct code, than what the code was originally written for. (Not quite as big a difference as Helio’s KDE1 efforts, though)<br>
So, while we’re counting down to removing KDE4 from the FreeBSD ports tree, we’re also going through and fixing it to work with Clang 7, which defaults to a newer C++ standard and which is quite picky about some things. Some time in the distant past, when pointers were integers and NULL was zero, there was some confusion about booleans. So there’s lots of code that does list.contains(element) &gt; 0 … this must have been a trick before booleans were a supported type in all our compilers. In any case it breaks with Clang 7, since contains() returns a QBool which converts to a nullptr (when false) which isn’t comparable to the integer 0. Suffice to say I’ve spent more time reading KDE4-era code this month, than in the past two years.<br>
However, work is proceeding apace, so if you really really want to, you can still get your old-school kicks on a new platform. Because we care about packaging things right, even when we want to get rid of it.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://nanxiao.gitbooks.io/openbsd-netcat-demystified/">OpenBSD netcat demystified</a></p>

<blockquote>
<p>Owing to its versatile functionalities, netcat earns the reputation as “TCP/IP Swiss army knife”. For example, you can create a simple chat app using netcat:</p>
</blockquote>

<ul>
<li>(1) Open a terminal and input following command:</li>
</ul>

<p><code># nc -l 3003</code></p>

<blockquote>
<p>This means a netcat process will listen on 3003 port in this machine (the IP address of current machine is 192.168.35.176).</p>
</blockquote>

<ul>
<li>(2) Connect aforemontioned netcat process in another machine, and send a greeting:</li>
</ul>

<p><code># nc 192.168.35.176 3003</code><br>
<code>hello</code></p>

<blockquote>
<p>Then in the first machine’s terminal, you will see the “hello” text:</p>
</blockquote>

<p><code># nc -l 3003</code><br>
<code>hello</code></p>

<blockquote>
<p>A primitive chatroom is built successfully. Very cool! Isn’t it? I think many people can’t wait to explore more features of netcatnow. If you are among them, congratulations! This tutorial may be the correct place for you.<br>
In the following parts, I will delve into OpenBSD’s netcatcode to give a detailed anatomy of it. The reason of picking OpenBSD’s netcat rather than others’ is because its code repository is small (~2000 lines of code) and neat. Furthermore, I also hope this little book can assist you learn more socket programming knowledge not just grasping usage of netcat.<br>
We’re all set. Let’s go!</p>
</blockquote>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://www.geeklan.co.uk/files/eurobsdcon2018.pdf">What’s in store for NetBSD 9.0</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-advocacy/2018/09/25/msg000783.html">NetBSD machines at Open Source Conference 2018 Hiroshima</a></li>
<li><a href="http://vincentdelft.be/post/post_20180922">nmctl adapted with limited privileges: nmctl-0.6.0</a></li>
<li><a href="https://www.freebsdfoundation.org/blog/submit-your-work-check-out-scale-17x-and-fosdem-19-cfps/">Submit Your Work: Check out SCALE 17x and FOSDEM ’19 CFPs</a></li>
<li><a href="https://www.openbsd.org/64.html">OpenBSD 6.4 site is up! (with a partial list of new features)</a></li>
<li><a href="https://www.blackcatenterprises.us/using-alpine-to-read-your-email/">Using Alpine to Read Your Email on OpenBSD</a></li>
</ul>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Morgan - <a href="http://dpaste.com/0EXPWQK#wrap">Send/Receive to Manage Fragmentation?</a></li>
<li>Ryan - <a href="http://dpaste.com/0B6C0Y0">ZFS and mmap</a></li>
<li>Marcus - <a href="http://dpaste.com/1DT26S8#wrap">Linux Compat</a></li>
<li>Ben - <a href="http://dpaste.com/20GTHZE#wrap">Multiple Pools</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 267: Absolute FreeBSD | BSD Now 267</title>
  <link>https://www.bsdnow.tv/267</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2689</guid>
  <pubDate>Wed, 10 Oct 2018 06:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/065b608e-9204-46f2-a689-63ccf08c58a2.mp3" length="40763471" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We have a long interview with fiction and non-fiction author Michael W. Lucas for you this week as well as questions from the audience.</itunes:subtitle>
  <itunes:duration>1:07:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We have a long interview with fiction and non-fiction author Michael W. Lucas for you this week as well as questions from the audience.&lt;/p&gt;

&lt;p&gt;##Headlines&lt;br&gt;
##Interview - Michael W. Lucas - &lt;a href="mailto:mwlucas@michaelwlucas.com" target="_blank" rel="nofollow noopener"&gt;mwlucas@michaelwlucas.com&lt;/a&gt; / &lt;a href="https://twitter.com/mwlauthor" target="_blank" rel="nofollow noopener"&gt;@mwlauthor&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;BR: [Welcome Back]&lt;/li&gt;
&lt;li&gt;AJ: What have you been doing since last we talked to you [ed, ssh, and af3e]&lt;/li&gt;
&lt;li&gt;BR: Tell us more about AF3e&lt;/li&gt;
&lt;li&gt;AJ: How did the first Absolute FreeBSD come about?&lt;/li&gt;
&lt;li&gt;BR: Do you have anything special planned for MeetBSD?&lt;/li&gt;
&lt;li&gt;AJ: What are you working on now? [FM:Jails, Git sync Murder]&lt;/li&gt;
&lt;li&gt;BR: What are your plans for next year?&lt;/li&gt;
&lt;li&gt;AJ: How has SEMIBug been going?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Auction at &lt;a href="https://mwl.io" target="_blank" rel="nofollow noopener"&gt;https://mwl.io&lt;/a&gt;&lt;br&gt;
Patreon Link:&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##Feedback/Questions&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Paul - &lt;a href="http://dpaste.com/0Q6C25T#wrap" target="_blank" rel="nofollow noopener"&gt;Recent bhyve related videos (daemon)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Michael - &lt;a href="http://dpaste.com/1YTR9FZ" target="_blank" rel="nofollow noopener"&gt;freebsd-update question&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Sigflup - &lt;a href="http://dpaste.com/3799BBX#wrap" target="_blank" rel="nofollow noopener"&gt;pkg file search&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt; 
</description>
  <itunes:keywords>freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview,netcat,kde yubikey,2fa,ssh,zfs,performance</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We have a long interview with fiction and non-fiction author Michael W. Lucas for you this week as well as questions from the audience.</p>

<p>##Headlines<br>
##Interview - Michael W. Lucas - <a href="mailto:mwlucas@michaelwlucas.com">mwlucas@michaelwlucas.com</a> / <a href="https://twitter.com/mwlauthor">@mwlauthor</a></p>

<ul>
<li>BR: [Welcome Back]</li>
<li>AJ: What have you been doing since last we talked to you [ed, ssh, and af3e]</li>
<li>BR: Tell us more about AF3e</li>
<li>AJ: How did the first Absolute FreeBSD come about?</li>
<li>BR: Do you have anything special planned for MeetBSD?</li>
<li>AJ: What are you working on now? [FM:Jails, Git sync Murder]</li>
<li>BR: What are your plans for next year?</li>
<li>AJ: How has SEMIBug been going?</li>
</ul>

<p>Auction at <a href="https://mwl.io">https://mwl.io</a><br>
Patreon Link:</p>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Paul - <a href="http://dpaste.com/0Q6C25T#wrap">Recent bhyve related videos (daemon)</a></li>
<li>Michael - <a href="http://dpaste.com/1YTR9FZ">freebsd-update question</a></li>
<li>Sigflup - <a href="http://dpaste.com/3799BBX#wrap">pkg file search</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We have a long interview with fiction and non-fiction author Michael W. Lucas for you this week as well as questions from the audience.</p>

<p>##Headlines<br>
##Interview - Michael W. Lucas - <a href="mailto:mwlucas@michaelwlucas.com">mwlucas@michaelwlucas.com</a> / <a href="https://twitter.com/mwlauthor">@mwlauthor</a></p>

<ul>
<li>BR: [Welcome Back]</li>
<li>AJ: What have you been doing since last we talked to you [ed, ssh, and af3e]</li>
<li>BR: Tell us more about AF3e</li>
<li>AJ: How did the first Absolute FreeBSD come about?</li>
<li>BR: Do you have anything special planned for MeetBSD?</li>
<li>AJ: What are you working on now? [FM:Jails, Git sync Murder]</li>
<li>BR: What are your plans for next year?</li>
<li>AJ: How has SEMIBug been going?</li>
</ul>

<p>Auction at <a href="https://mwl.io">https://mwl.io</a><br>
Patreon Link:</p>

<p><hr></p>

<p>##Feedback/Questions</p>

<ul>
<li>Paul - <a href="http://dpaste.com/0Q6C25T#wrap">Recent bhyve related videos (daemon)</a></li>
<li>Michael - <a href="http://dpaste.com/1YTR9FZ">freebsd-update question</a></li>
<li>Sigflup - <a href="http://dpaste.com/3799BBX#wrap">pkg file search</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>]]>
  </itunes:summary>
</item>
<item>
  <title>76: Time for a Change</title>
  <link>https://www.bsdnow.tv/76</link>
  <guid isPermaLink="false">b872a625-f3d6-477b-b162-fd4248aef998</guid>
  <pubDate>Wed, 11 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b872a625-f3d6-477b-b162-fd4248aef998.mp3" length="64285204" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we'll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we'll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:29:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, we'll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we'll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html" target="_blank" rel="nofollow noopener"&gt;Strange timer bug in FreeBSD 11&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure" target="_blank" rel="nofollow noopener"&gt;Peter Wemm&lt;/a&gt; wrote in to the FreeBSD -CURRENT mailing list with an interesting observation&lt;/li&gt;
&lt;li&gt;Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime&lt;/li&gt;
&lt;li&gt;This meant things like cron and sleep would break, TCP/IP wouldn't time out or resend packets, a lot of things would break&lt;/li&gt;
&lt;li&gt;A workaround until it was fixed was to reboot every 24 days, but this is BSD we're talking about - uptime is our game&lt;/li&gt;
&lt;li&gt;An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap&lt;/li&gt;
&lt;li&gt;Peter disagreed and &lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html" target="_blank" rel="nofollow noopener"&gt;gave some background&lt;/a&gt;, offering a different patch to &lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html" target="_blank" rel="nofollow noopener"&gt;fix&lt;/a&gt; the issue and &lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html" target="_blank" rel="nofollow noopener"&gt;detect it early&lt;/a&gt; if it happens again&lt;/li&gt;
&lt;li&gt;Ultimately, the problem was traced back to an issue with a recent clang import&lt;/li&gt;
&lt;li&gt;It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://technoquarter.blogspot.com/p/series.html" target="_blank" rel="nofollow noopener"&gt;An OpenBSD mail server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There's been a recent influx of blog posts about building a BSD mail server for some reason&lt;/li&gt;
&lt;li&gt;In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux&lt;/li&gt;
&lt;li&gt;In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin&lt;/li&gt;
&lt;li&gt;It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd&lt;/li&gt;
&lt;li&gt;That means this is more of a "complete solution" - right down to what the end users see&lt;/li&gt;
&lt;li&gt;The series is split up into categories so it's very easy to follow along step-by-step
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html" target="_blank" rel="nofollow noopener"&gt;How DragonFlyBSD uses git&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code&lt;/li&gt;
&lt;li&gt;In a &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html" target="_blank" rel="nofollow noopener"&gt;series&lt;/a&gt; of &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html" target="_blank" rel="nofollow noopener"&gt;posts&lt;/a&gt;, Matthew Dillon (the project lead) details their internal setup&lt;/li&gt;
&lt;li&gt;They're using vanilla git over ssh, with the developers' accounts set to git-only (no shell access)&lt;/li&gt;
&lt;li&gt;The maintainers of the server are the only ones with shell access available&lt;/li&gt;
&lt;li&gt;He also details how a cron job syncs from the master to a public box that anyone can check out code from&lt;/li&gt;
&lt;li&gt;It would be interesting to hear about how other BSD projects manage their master source repository
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd" target="_blank" rel="nofollow noopener"&gt;Why not try PCBSD?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;ITwire, another more mainstream tech site, published a recent article about switching to PCBSD&lt;/li&gt;
&lt;li&gt;They interview a guy named Kris that we've never heard of before&lt;/li&gt;
&lt;li&gt;In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same&lt;/li&gt;
&lt;li&gt;"With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD."&lt;/li&gt;
&lt;li&gt;If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Henning Brauer - &lt;a href="mailto:henning@openbsd.org" target="_blank" rel="nofollow noopener"&gt;henning@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/henningbrauer" target="_blank" rel="nofollow noopener"&gt;@henningbrauer&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://openntpd.org/" target="_blank" rel="nofollow noopener"&gt;OpenNTPD&lt;/a&gt; and its portable variant&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142356166731390&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Authenticated time in OpenNTPD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated &lt;em&gt;already&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;While at the hackathon, some developers came up with an &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142355043928397&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;alternate way&lt;/a&gt; to get authenticated NTP responses&lt;/li&gt;
&lt;li&gt;You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool&lt;/li&gt;
&lt;li&gt;OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header&lt;/li&gt;
&lt;li&gt;It's not intended to be a direct time source, just a constraint to keep things within reason&lt;/li&gt;
&lt;li&gt;If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142363215730069&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Henning&lt;/a&gt; and &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142363400330522&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Theo&lt;/a&gt; also weigh in to give some of the backstory on the idea&lt;/li&gt;
&lt;li&gt;Lots more detail can be found in Reyk's email explaining the new feature (and it's optional of course)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Open Source Conference 2015 Oita and Hamanako&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It's been a while since we've featured one of these trip reports, but the Japanese NetBSD users group is still doing them&lt;/li&gt;
&lt;li&gt;This time the conferences were in Oita &lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html" target="_blank" rel="nofollow noopener"&gt;and Hamanako&lt;/a&gt;, Japan&lt;/li&gt;
&lt;li&gt;Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices&lt;/li&gt;
&lt;li&gt;As always, they took lots of pictures from the event of NetBSD on all these weird machines
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/" target="_blank" rel="nofollow noopener"&gt;Poudriere in a jail&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A common question we get about our &lt;a href="http://www.bsdnow.tv/tutorials/poudriere" target="_blank" rel="nofollow noopener"&gt;poudriere tutorial&lt;/a&gt; is "how do I run it in a jail?" - this blog post is about exactly that&lt;/li&gt;
&lt;li&gt;It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh" target="_blank" rel="nofollow noopener"&gt;Bruteblock, another way to stop bruteforce&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf's built-in rate limiting&lt;/li&gt;
&lt;li&gt;Bruteblock is a similar tool, but it's not just for ssh logins - it can do a number of other services&lt;/li&gt;
&lt;li&gt;It can also work directly with IPFW, which is a plus if you're using that as your firewall&lt;/li&gt;
&lt;li&gt;Add a few lines to your syslog.conf and bruteblock will get executed automatically&lt;/li&gt;
&lt;li&gt;The rest of the article takes you through the different settings you can configure for blocking
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142325218626853&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;New iwm(4) driver and cross-polination&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenBSD guys recently imported a new "iwm" driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)&lt;/li&gt;
&lt;li&gt;NetBSD wasted no time in &lt;a href="https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html" target="_blank" rel="nofollow noopener"&gt;porting it over&lt;/a&gt;, giving a bit of interesting backstory&lt;/li&gt;
&lt;li&gt;According to &lt;a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" target="_blank" rel="nofollow noopener"&gt;Antti Kantee&lt;/a&gt;, "it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace"&lt;/li&gt;
&lt;li&gt;Both projects would appreciate further testing if you have the hardware and can provide useful bug reports&lt;/li&gt;
&lt;li&gt;Maybe FreeBSD and DragonFly will port it over too, or come up with something that's partially based on the code
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/" target="_blank" rel="nofollow noopener"&gt;PCBSD current images&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The first PCBSD -CURRENT images should be available this weekend&lt;/li&gt;
&lt;li&gt;This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates&lt;/li&gt;
&lt;li&gt;For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2E4NbJwzs" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2FkxcSYKy" target="_blank" rel="nofollow noopener"&gt;Richard writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s217EgA1JC" target="_blank" rel="nofollow noopener"&gt;Charlie writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21vlCbGDt" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html" target="_blank" rel="nofollow noopener"&gt;A systematic effort&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html" target="_blank" rel="nofollow noopener"&gt;GCC's lunch&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://marc.info/?l=openbsd-cvs&amp;amp;m=142331891908776&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Hopes and dreams&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Discussion&lt;/h2&gt;

&lt;h3&gt;Comparison of ways to securely tunnel your traffic&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://openvpn.net/index.php/open-source.html" target="_blank" rel="nofollow noopener"&gt;OpenVPN&lt;/a&gt;, &lt;a href="http://www.openiked.org/" target="_blank" rel="nofollow noopener"&gt;OpenBSD IKED&lt;/a&gt;, &lt;a href="https://www.freebsd.org/doc/handbook/ipsec.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD IPSEC&lt;/a&gt;, &lt;a href="http://www.openssh.com/" target="_blank" rel="nofollow noopener"&gt;OpenSSH&lt;/a&gt;, &lt;a href="https://www.torproject.org/" target="_blank" rel="nofollow noopener"&gt;Tor&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ntp, ntpd, ntimed, openntpd, time keeping, stratum, ipsec, openvpn, ssh, openiked, ike, tor, tunneling, bhws, afl-fuzz, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we&#39;ll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we&#39;ll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html" rel="nofollow">Strange timer bug in FreeBSD 11</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure" rel="nofollow">Peter Wemm</a> wrote in to the FreeBSD -CURRENT mailing list with an interesting observation</li>
<li>Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime</li>
<li>This meant things like cron and sleep would break, TCP/IP wouldn&#39;t time out or resend packets, a lot of things would break</li>
<li>A workaround until it was fixed was to reboot every 24 days, but this is BSD we&#39;re talking about - uptime is our game</li>
<li>An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap</li>
<li>Peter disagreed and <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html" rel="nofollow">gave some background</a>, offering a different patch to <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html" rel="nofollow">fix</a> the issue and <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html" rel="nofollow">detect it early</a> if it happens again</li>
<li>Ultimately, the problem was traced back to an issue with a recent clang import</li>
<li>It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***</li>
</ul>

<h3><a href="http://technoquarter.blogspot.com/p/series.html" rel="nofollow">An OpenBSD mail server</a></h3>

<ul>
<li>There&#39;s been a recent influx of blog posts about building a BSD mail server for some reason</li>
<li>In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux</li>
<li>In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin</li>
<li>It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd</li>
<li>That means this is more of a &quot;complete solution&quot; - right down to what the end users see</li>
<li>The series is split up into categories so it&#39;s very easy to follow along step-by-step
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html" rel="nofollow">How DragonFlyBSD uses git</a></h3>

<ul>
<li>DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code</li>
<li>In a <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html" rel="nofollow">series</a> of <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html" rel="nofollow">posts</a>, Matthew Dillon (the project lead) details their internal setup</li>
<li>They&#39;re using vanilla git over ssh, with the developers&#39; accounts set to git-only (no shell access)</li>
<li>The maintainers of the server are the only ones with shell access available</li>
<li>He also details how a cron job syncs from the master to a public box that anyone can check out code from</li>
<li>It would be interesting to hear about how other BSD projects manage their master source repository
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd" rel="nofollow">Why not try PCBSD?</a></h3>

<ul>
<li>ITwire, another more mainstream tech site, published a recent article about switching to PCBSD</li>
<li>They interview a guy named Kris that we&#39;ve never heard of before</li>
<li>In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same</li>
<li>&quot;With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD.&quot;</li>
<li>If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***</li>
</ul>

<h2>Interview - Henning Brauer - <a href="mailto:henning@openbsd.org" rel="nofollow">henning@openbsd.org</a> / <a href="https://twitter.com/henningbrauer" rel="nofollow">@henningbrauer</a></h2>

<p><a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> and its portable variant</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142356166731390&w=2" rel="nofollow">Authenticated time in OpenNTPD</a></h3>

<ul>
<li>We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated <em>already</em></li>
<li>While at the hackathon, some developers came up with an <a href="https://www.marc.info/?l=openbsd-cvs&m=142355043928397&w=2" rel="nofollow">alternate way</a> to get authenticated NTP responses</li>
<li>You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool</li>
<li>OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header</li>
<li>It&#39;s not intended to be a direct time source, just a constraint to keep things within reason</li>
<li>If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid</li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=142363215730069&w=2" rel="nofollow">Henning</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=142363400330522&w=2" rel="nofollow">Theo</a> also weigh in to give some of the backstory on the idea</li>
<li>Lots more detail can be found in Reyk&#39;s email explaining the new feature (and it&#39;s optional of course)
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html" rel="nofollow">NetBSD at Open Source Conference 2015 Oita and Hamanako</a></h3>

<ul>
<li>It&#39;s been a while since we&#39;ve featured one of these trip reports, but the Japanese NetBSD users group is still doing them</li>
<li>This time the conferences were in Oita <a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html" rel="nofollow">and Hamanako</a>, Japan</li>
<li>Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices</li>
<li>As always, they took lots of pictures from the event of NetBSD on all these weird machines
***</li>
</ul>

<h3><a href="http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/" rel="nofollow">Poudriere in a jail</a></h3>

<ul>
<li>A common question we get about our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a> is &quot;how do I run it in a jail?&quot; - this blog post is about exactly that</li>
<li>It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***</li>
</ul>

<h3><a href="http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh" rel="nofollow">Bruteblock, another way to stop bruteforce</a></h3>

<ul>
<li>We&#39;ve mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf&#39;s built-in rate limiting</li>
<li>Bruteblock is a similar tool, but it&#39;s not just for ssh logins - it can do a number of other services</li>
<li>It can also work directly with IPFW, which is a plus if you&#39;re using that as your firewall</li>
<li>Add a few lines to your syslog.conf and bruteblock will get executed automatically</li>
<li>The rest of the article takes you through the different settings you can configure for blocking
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142325218626853&w=2" rel="nofollow">New iwm(4) driver and cross-polination</a></h3>

<ul>
<li>The OpenBSD guys recently imported a new &quot;iwm&quot; driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)</li>
<li>NetBSD wasted no time in <a href="https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html" rel="nofollow">porting it over</a>, giving a bit of interesting backstory</li>
<li>According to <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, &quot;it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace&quot;</li>
<li>Both projects would appreciate further testing if you have the hardware and can provide useful bug reports</li>
<li>Maybe FreeBSD and DragonFly will port it over too, or come up with something that&#39;s partially based on the code
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/" rel="nofollow">PCBSD current images</a></h3>

<ul>
<li>The first PCBSD -CURRENT images should be available this weekend</li>
<li>This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates</li>
<li>For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2E4NbJwzs" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2FkxcSYKy" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s217EgA1JC" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21vlCbGDt" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html" rel="nofollow">A systematic effort</a></li>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html" rel="nofollow">GCC&#39;s lunch</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=142331891908776&w=2" rel="nofollow">Hopes and dreams</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of ways to securely tunnel your traffic</h3>

<ul>
<li><a href="https://openvpn.net/index.php/open-source.html" rel="nofollow">OpenVPN</a>, <a href="http://www.openiked.org/" rel="nofollow">OpenBSD IKED</a>, <a href="https://www.freebsd.org/doc/handbook/ipsec.html" rel="nofollow">FreeBSD IPSEC</a>, <a href="http://www.openssh.com/" rel="nofollow">OpenSSH</a>, <a href="https://www.torproject.org/" rel="nofollow">Tor</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we&#39;ll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we&#39;ll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html" rel="nofollow">Strange timer bug in FreeBSD 11</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure" rel="nofollow">Peter Wemm</a> wrote in to the FreeBSD -CURRENT mailing list with an interesting observation</li>
<li>Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime</li>
<li>This meant things like cron and sleep would break, TCP/IP wouldn&#39;t time out or resend packets, a lot of things would break</li>
<li>A workaround until it was fixed was to reboot every 24 days, but this is BSD we&#39;re talking about - uptime is our game</li>
<li>An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap</li>
<li>Peter disagreed and <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html" rel="nofollow">gave some background</a>, offering a different patch to <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html" rel="nofollow">fix</a> the issue and <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html" rel="nofollow">detect it early</a> if it happens again</li>
<li>Ultimately, the problem was traced back to an issue with a recent clang import</li>
<li>It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***</li>
</ul>

<h3><a href="http://technoquarter.blogspot.com/p/series.html" rel="nofollow">An OpenBSD mail server</a></h3>

<ul>
<li>There&#39;s been a recent influx of blog posts about building a BSD mail server for some reason</li>
<li>In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux</li>
<li>In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin</li>
<li>It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd</li>
<li>That means this is more of a &quot;complete solution&quot; - right down to what the end users see</li>
<li>The series is split up into categories so it&#39;s very easy to follow along step-by-step
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html" rel="nofollow">How DragonFlyBSD uses git</a></h3>

<ul>
<li>DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code</li>
<li>In a <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html" rel="nofollow">series</a> of <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html" rel="nofollow">posts</a>, Matthew Dillon (the project lead) details their internal setup</li>
<li>They&#39;re using vanilla git over ssh, with the developers&#39; accounts set to git-only (no shell access)</li>
<li>The maintainers of the server are the only ones with shell access available</li>
<li>He also details how a cron job syncs from the master to a public box that anyone can check out code from</li>
<li>It would be interesting to hear about how other BSD projects manage their master source repository
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd" rel="nofollow">Why not try PCBSD?</a></h3>

<ul>
<li>ITwire, another more mainstream tech site, published a recent article about switching to PCBSD</li>
<li>They interview a guy named Kris that we&#39;ve never heard of before</li>
<li>In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same</li>
<li>&quot;With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD.&quot;</li>
<li>If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***</li>
</ul>

<h2>Interview - Henning Brauer - <a href="mailto:henning@openbsd.org" rel="nofollow">henning@openbsd.org</a> / <a href="https://twitter.com/henningbrauer" rel="nofollow">@henningbrauer</a></h2>

<p><a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> and its portable variant</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142356166731390&w=2" rel="nofollow">Authenticated time in OpenNTPD</a></h3>

<ul>
<li>We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated <em>already</em></li>
<li>While at the hackathon, some developers came up with an <a href="https://www.marc.info/?l=openbsd-cvs&m=142355043928397&w=2" rel="nofollow">alternate way</a> to get authenticated NTP responses</li>
<li>You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool</li>
<li>OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header</li>
<li>It&#39;s not intended to be a direct time source, just a constraint to keep things within reason</li>
<li>If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid</li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=142363215730069&w=2" rel="nofollow">Henning</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=142363400330522&w=2" rel="nofollow">Theo</a> also weigh in to give some of the backstory on the idea</li>
<li>Lots more detail can be found in Reyk&#39;s email explaining the new feature (and it&#39;s optional of course)
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html" rel="nofollow">NetBSD at Open Source Conference 2015 Oita and Hamanako</a></h3>

<ul>
<li>It&#39;s been a while since we&#39;ve featured one of these trip reports, but the Japanese NetBSD users group is still doing them</li>
<li>This time the conferences were in Oita <a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html" rel="nofollow">and Hamanako</a>, Japan</li>
<li>Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices</li>
<li>As always, they took lots of pictures from the event of NetBSD on all these weird machines
***</li>
</ul>

<h3><a href="http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/" rel="nofollow">Poudriere in a jail</a></h3>

<ul>
<li>A common question we get about our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a> is &quot;how do I run it in a jail?&quot; - this blog post is about exactly that</li>
<li>It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***</li>
</ul>

<h3><a href="http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh" rel="nofollow">Bruteblock, another way to stop bruteforce</a></h3>

<ul>
<li>We&#39;ve mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf&#39;s built-in rate limiting</li>
<li>Bruteblock is a similar tool, but it&#39;s not just for ssh logins - it can do a number of other services</li>
<li>It can also work directly with IPFW, which is a plus if you&#39;re using that as your firewall</li>
<li>Add a few lines to your syslog.conf and bruteblock will get executed automatically</li>
<li>The rest of the article takes you through the different settings you can configure for blocking
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142325218626853&w=2" rel="nofollow">New iwm(4) driver and cross-polination</a></h3>

<ul>
<li>The OpenBSD guys recently imported a new &quot;iwm&quot; driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)</li>
<li>NetBSD wasted no time in <a href="https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html" rel="nofollow">porting it over</a>, giving a bit of interesting backstory</li>
<li>According to <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, &quot;it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace&quot;</li>
<li>Both projects would appreciate further testing if you have the hardware and can provide useful bug reports</li>
<li>Maybe FreeBSD and DragonFly will port it over too, or come up with something that&#39;s partially based on the code
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/" rel="nofollow">PCBSD current images</a></h3>

<ul>
<li>The first PCBSD -CURRENT images should be available this weekend</li>
<li>This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates</li>
<li>For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2E4NbJwzs" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2FkxcSYKy" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s217EgA1JC" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21vlCbGDt" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html" rel="nofollow">A systematic effort</a></li>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html" rel="nofollow">GCC&#39;s lunch</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=142331891908776&w=2" rel="nofollow">Hopes and dreams</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of ways to securely tunnel your traffic</h3>

<ul>
<li><a href="https://openvpn.net/index.php/open-source.html" rel="nofollow">OpenVPN</a>, <a href="http://www.openiked.org/" rel="nofollow">OpenBSD IKED</a>, <a href="https://www.freebsd.org/doc/handbook/ipsec.html" rel="nofollow">FreeBSD IPSEC</a>, <a href="http://www.openssh.com/" rel="nofollow">OpenSSH</a>, <a href="https://www.torproject.org/" rel="nofollow">Tor</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>75: From the Foundation (Part 1)</title>
  <link>https://www.bsdnow.tv/75</link>
  <guid isPermaLink="false">34bf4647-35b0-4919-9b96-c12799506f14</guid>
  <pubDate>Wed, 04 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/34bf4647-35b0-4919-9b96-c12799506f14.mp3" length="61549780" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we'll talk about what all they've been up to lately. All this week's news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:25:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we'll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we'll talk about what all they've been up to lately. All this week's news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.djm.net.au/2015/02/key-rotation-in-openssh-68.html" target="_blank" rel="nofollow noopener"&gt;Key rotation in OpenSSH 6.8&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;Damien Miller&lt;/a&gt; posted a new blog entry about one of the features in the upcoming OpenSSH 6.8&lt;/li&gt;
&lt;li&gt;Times changes, key types change, problems are found with old algorithms and we switch to new ones&lt;/li&gt;
&lt;li&gt;In OpenSSH (and the SSH protocol) however, there hasn't been an easy way to rotate host keys... until now&lt;/li&gt;
&lt;li&gt;With this change, when you connect to a server, it will log &lt;em&gt;all&lt;/em&gt; the server's public keys in your known_hosts file, instead of just the first one used during the key exchange&lt;/li&gt;
&lt;li&gt;Keys that are in your known_hosts file but not on the server will get automatically removed&lt;/li&gt;
&lt;li&gt;This fixes the problem of old servers still authenticating with ancient DSA or small RSA keys, as well as providing a way for the server to rotate keys every so often&lt;/li&gt;
&lt;li&gt;There are some instructions in the blog post for how you'll be able to rotate host keys and eventually phase out the older ones - it's really simple&lt;/li&gt;
&lt;li&gt;There are a lot of big changes coming in OpenSSH 6.8, so we'll be sure to cover them all when it's released
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/port-arm/2015/01/30/msg002809.html" target="_blank" rel="nofollow noopener"&gt;NetBSD Banana Pi images&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked about the &lt;a href="http://www.bananapi.org/p/product.html" target="_blank" rel="nofollow noopener"&gt;Banana Pi&lt;/a&gt; a bit before - it's a small ARM board that's comparable to the popular Raspberry Pi&lt;/li&gt;
&lt;li&gt;Some NetBSD -current images were posted on the mailing list, so now you can get some BSD action on one of these little devices&lt;/li&gt;
&lt;li&gt;There are even a set of prebuilt pkgsrc packages, so you won't have to compile everything initially&lt;/li&gt;
&lt;li&gt;The email includes some steps to get everything working and an overview of what comes with the image&lt;/li&gt;
&lt;li&gt;Also check &lt;a href="https://wiki.netbsd.org/ports/evbarm/allwinner/" target="_blank" rel="nofollow noopener"&gt;the wiki page&lt;/a&gt; for some related boards and further instructions on getting set up&lt;/li&gt;
&lt;li&gt;On a related note, NetBSD also recently &lt;a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_gpu_acceleration_in" target="_blank" rel="nofollow noopener"&gt;got GPU acceleration working&lt;/a&gt; for the Raspberry Pi (which is a first for their ARM port)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=142255048510669&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;LibreSSL shirts and other BSD goodies&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've been keeping up with the LibreSSL saga and want a shirt to show your support, they're finally available to buy online&lt;/li&gt;
&lt;li&gt;There are two versions, either "&lt;a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTLSSL.jpg" target="_blank" rel="nofollow noopener"&gt;keep calm and use LibreSSL&lt;/a&gt;" or the slightly more snarky "&lt;a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTOSSL.jpg" target="_blank" rel="nofollow noopener"&gt;keep calm and abandon OpenSSL&lt;/a&gt;"&lt;/li&gt;
&lt;li&gt;While on the topic, we thought it would be good to make people aware of shirts for other BSD projects too&lt;/li&gt;
&lt;li&gt;You can get some FreeBSD, &lt;a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=pc-bsd" target="_blank" rel="nofollow noopener"&gt;PCBSD&lt;/a&gt; and FreeNAS &lt;a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=shirts" target="_blank" rel="nofollow noopener"&gt;stuff&lt;/a&gt; from the &lt;a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=tshirt" target="_blank" rel="nofollow noopener"&gt;FreeBSD mall site&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OpenBSD recently launched their &lt;a href="https://www.openbsdstore.com" target="_blank" rel="nofollow noopener"&gt;new store&lt;/a&gt;, but the selection is still a bit limited right now&lt;/li&gt;
&lt;li&gt;NetBSD has a &lt;a href="https://www.netbsd.org/gallery/devotionalia.html#cafepress" target="_blank" rel="nofollow noopener"&gt;couple places&lt;/a&gt; where you can buy shirts and other apparel with the flag logo on it&lt;/li&gt;
&lt;li&gt;We couldn't find any DragonFlyBSD shirts unfortunately, which is a shame since &lt;a href="http://www.dragonflybsd.org/images/small_logo.png" target="_blank" rel="nofollow noopener"&gt;their logo&lt;/a&gt; is pretty cool&lt;/li&gt;
&lt;li&gt;Profits from the sale of the gear go back to the projects, so pick up some swag and support your BSD of choice (and of course wear them at any Linux events you happen to go to)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forum.opnsense.org/index.php?topic=35.0" target="_blank" rel="nofollow noopener"&gt;OPNsense 15.1.4 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OPNsense guys have been hard at work since &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;we spoke to them&lt;/a&gt;, fixing lots of bugs and keeping everything up to date&lt;/li&gt;
&lt;li&gt;A number of versions have come out since then, with 15.1.4 being the latest (assuming they haven't updated it &lt;strong&gt;again&lt;/strong&gt; by the time this airs)&lt;/li&gt;
&lt;li&gt;This version includes the latest round of FreeBSD kernel security patches, as well as minor SSL and GUI fixes&lt;/li&gt;
&lt;li&gt;They're doing a great job of getting upstream fixes pushed out to users quickly, a very welcome change&lt;/li&gt;
&lt;li&gt;A developer has also posted an interesting write-up titled "&lt;a href="http://lastsummer.de/development-workflow-in-opnsense/" target="_blank" rel="nofollow noopener"&gt;Development Workflow in OPNsense&lt;/a&gt;"&lt;/li&gt;
&lt;li&gt;If any of our listeners are trying OPNsense as their gateway firewall, let us know how you like it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ed Maste - &lt;a href="mailto:board@freebsdfoundation.org" target="_blank" rel="nofollow noopener"&gt;board@freebsdfoundation.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/donate" target="_blank" rel="nofollow noopener"&gt;The FreeBSD foundation&lt;/a&gt;'s activities&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://homing-on-code.blogspot.com/2015/02/rolling-with-snapshots.html" target="_blank" rel="nofollow noopener"&gt;Rolling with OpenBSD snapshots&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the cool things about the -current branch of OpenBSD is that it doesn't require any compiling&lt;/li&gt;
&lt;li&gt;There are signed binary snapshots being continuously re-rolled and posted on the FTP sites for every architecture&lt;/li&gt;
&lt;li&gt;This provides an easy method to get onboard with the latest features, and you can also easily upgrade between them without reformatting or rebuilding&lt;/li&gt;
&lt;li&gt;This blog post will walk you through the process of using snapshots to stay on the bleeding edge of OpenBSD goodness&lt;/li&gt;
&lt;li&gt;After using -current for seven weeks, the author comes to the conclusion that it's not as unstable as people might think&lt;/li&gt;
&lt;li&gt;He's now helping test out patches and new ports since he's running the same code as the developers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/tech-pkg/2015/02/02/msg014224.html" target="_blank" rel="nofollow noopener"&gt;Signing pkgsrc packages&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As of the time this show airs, the official &lt;a href="http://www.bsdnow.tv/tutorials/pkgsrc" target="_blank" rel="nofollow noopener"&gt;pkgsrc&lt;/a&gt; packages aren't cryptographically signed&lt;/li&gt;
&lt;li&gt;Someone from Joyent has been working on that, since they'd like to sign their pkgsrc packages for SmartOS&lt;/li&gt;
&lt;li&gt;Using GNUPG pulled in a lot of dependencies, and they're trying to keep the bootstrapping process minimal&lt;/li&gt;
&lt;li&gt;Instead, they're using netpgpverify, a fork of NetBSD's &lt;a href="https://en.wikipedia.org/wiki/Netpgp" target="_blank" rel="nofollow noopener"&gt;netpgp&lt;/a&gt; utility&lt;/li&gt;
&lt;li&gt;Maybe someday this will become the official way to sign packages in NetBSD?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-February/001624.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD support model changes&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Starting with 11.0-RELEASE, which won't be for a few months probably, FreeBSD releases are going to have a different support model&lt;/li&gt;
&lt;li&gt;The plan is to move "from a point release-based support model to a set of releases from a branch with a guaranteed support lifetime"&lt;/li&gt;
&lt;li&gt;There will now be a five-year lifespan for each major release, regardless of how many minor point releases it gets&lt;/li&gt;
&lt;li&gt;This new model should reduce the turnaround time for errata and security patches, since there will be a lot less work involved to build and verify them&lt;/li&gt;
&lt;li&gt;Lots more detail can be found in the mailing list post, including some important changes to the -STABLE branch, so give it a read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://guillaumevincent.com/2015/01/31/OpenSMTPD-Dovecot-SpamAssassin.html" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD, Dovecot and SpamAssassin&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've been talking about setting up your own BSD-based mail server on the last couple episodes&lt;/li&gt;
&lt;li&gt;Here we have another post from a user setting up OpenSMTPD, including Dovecot for IMAP and SpamAssassin for spam filtering&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;lot&lt;/strong&gt; of people &lt;a href="http://permalink.gmane.org/gmane.mail.opensmtpd.general/2265" target="_blank" rel="nofollow noopener"&gt;regularly ask the developers&lt;/a&gt; how to combine OpenSMTPD with spam filtering, and this post should finally reveal the dark secrets&lt;/li&gt;
&lt;li&gt;In addition, it also covers SSL certificates, PKI and setting up MX records - some things that previous posts have lacked&lt;/li&gt;
&lt;li&gt;Just be sure to replace those "apt-get" commands and "eth0" interface names with something a bit more sane…&lt;/li&gt;
&lt;li&gt;In related news, OpenSMTPD has got some interesting new features &lt;a href="http://article.gmane.org/gmane.mail.opensmtpd.general/2272" target="_blank" rel="nofollow noopener"&gt;coming soon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;They're also planning to &lt;a href="https://github.com/OpenSMTPD/OpenSMTPD/issues/534" target="_blank" rel="nofollow noopener"&gt;switch to LibreSSL by default&lt;/a&gt; for the portable version
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lastsummer.de/freebsd-desktop-on-the-t400/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10 on the Thinkpad T400&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSD laptop articles are becoming popular it seems - this one is about FreeBSD on a T400&lt;/li&gt;
&lt;li&gt;Like most of the ones we've mentioned before, it shows you how to get a BSD desktop set up with all the little tweaks you might not think to do&lt;/li&gt;
&lt;li&gt;This one differs in that it takes a more minimal approach to graphics: instead of a full-featured environment like XFCE or KDE, it uses the i3 tiling window manager&lt;/li&gt;
&lt;li&gt;If you're a commandline junkie that basically just uses X11 to run more than one terminal at once, this might be an ideal setup for you&lt;/li&gt;
&lt;li&gt;The post also includes some bits about the DRM and KMS in the 10.x branch, as well as vt
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/02/1810/" target="_blank" rel="nofollow noopener"&gt;PC-BSD 10.1.1 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Automatic background updater now in&lt;/li&gt;
&lt;li&gt;Shiny new Qt5 utils&lt;/li&gt;
&lt;li&gt;OVA files for VM’s&lt;/li&gt;
&lt;li&gt;Full disk encryption with GELI v7
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2MsjllAyU" target="_blank" rel="nofollow noopener"&gt;Camio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20eYELsAg" target="_blank" rel="nofollow noopener"&gt;Sha'ul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20Y2GN1az" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20ARVQ1T6" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt; (&lt;a href="http://slexy.org/view/s212XezEYt" target="_blank" rel="nofollow noopener"&gt;TJ's lengthy reply&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2DRgEv4j8" target="_blank" rel="nofollow noopener"&gt;Christopher writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264010.html" target="_blank" rel="nofollow noopener"&gt;Special Instructions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://mail-index.netbsd.org/netbsd-users/2015/01/19/msg015669.html" target="_blank" rel="nofollow noopener"&gt;Pretending to be a VT220&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, ed25519, banana pi, opnsense, libressl, t400, opensmtpd, dovecot, mail server, spamassassin, foundation, donations</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we&#39;ll talk about what all they&#39;ve been up to lately. All this week&#39;s news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.djm.net.au/2015/02/key-rotation-in-openssh-68.html" rel="nofollow">Key rotation in OpenSSH 6.8</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> posted a new blog entry about one of the features in the upcoming OpenSSH 6.8</li>
<li>Times changes, key types change, problems are found with old algorithms and we switch to new ones</li>
<li>In OpenSSH (and the SSH protocol) however, there hasn&#39;t been an easy way to rotate host keys... until now</li>
<li>With this change, when you connect to a server, it will log <em>all</em> the server&#39;s public keys in your known_hosts file, instead of just the first one used during the key exchange</li>
<li>Keys that are in your known_hosts file but not on the server will get automatically removed</li>
<li>This fixes the problem of old servers still authenticating with ancient DSA or small RSA keys, as well as providing a way for the server to rotate keys every so often</li>
<li>There are some instructions in the blog post for how you&#39;ll be able to rotate host keys and eventually phase out the older ones - it&#39;s really simple</li>
<li>There are a lot of big changes coming in OpenSSH 6.8, so we&#39;ll be sure to cover them all when it&#39;s released
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/port-arm/2015/01/30/msg002809.html" rel="nofollow">NetBSD Banana Pi images</a></h3>

<ul>
<li>We&#39;ve talked about the <a href="http://www.bananapi.org/p/product.html" rel="nofollow">Banana Pi</a> a bit before - it&#39;s a small ARM board that&#39;s comparable to the popular Raspberry Pi</li>
<li>Some NetBSD -current images were posted on the mailing list, so now you can get some BSD action on one of these little devices</li>
<li>There are even a set of prebuilt pkgsrc packages, so you won&#39;t have to compile everything initially</li>
<li>The email includes some steps to get everything working and an overview of what comes with the image</li>
<li>Also check <a href="https://wiki.netbsd.org/ports/evbarm/allwinner/" rel="nofollow">the wiki page</a> for some related boards and further instructions on getting set up</li>
<li>On a related note, NetBSD also recently <a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_gpu_acceleration_in" rel="nofollow">got GPU acceleration working</a> for the Raspberry Pi (which is a first for their ARM port)
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142255048510669&w=2" rel="nofollow">LibreSSL shirts and other BSD goodies</a></h3>

<ul>
<li>If you&#39;ve been keeping up with the LibreSSL saga and want a shirt to show your support, they&#39;re finally available to buy online</li>
<li>There are two versions, either &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTLSSL.jpg" rel="nofollow">keep calm and use LibreSSL</a>&quot; or the slightly more snarky &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTOSSL.jpg" rel="nofollow">keep calm and abandon OpenSSL</a>&quot;</li>
<li>While on the topic, we thought it would be good to make people aware of shirts for other BSD projects too</li>
<li>You can get some FreeBSD, <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=pc-bsd" rel="nofollow">PCBSD</a> and FreeNAS <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=shirts" rel="nofollow">stuff</a> from the <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=tshirt" rel="nofollow">FreeBSD mall site</a></li>
<li>OpenBSD recently launched their <a href="https://www.openbsdstore.com" rel="nofollow">new store</a>, but the selection is still a bit limited right now</li>
<li>NetBSD has a <a href="https://www.netbsd.org/gallery/devotionalia.html#cafepress" rel="nofollow">couple places</a> where you can buy shirts and other apparel with the flag logo on it</li>
<li>We couldn&#39;t find any DragonFlyBSD shirts unfortunately, which is a shame since <a href="http://www.dragonflybsd.org/images/small_logo.png" rel="nofollow">their logo</a> is pretty cool</li>
<li>Profits from the sale of the gear go back to the projects, so pick up some swag and support your BSD of choice (and of course wear them at any Linux events you happen to go to)
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=35.0" rel="nofollow">OPNsense 15.1.4 released</a></h3>

<ul>
<li>The OPNsense guys have been hard at work since <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">we spoke to them</a>, fixing lots of bugs and keeping everything up to date</li>
<li>A number of versions have come out since then, with 15.1.4 being the latest (assuming they haven&#39;t updated it <strong>again</strong> by the time this airs)</li>
<li>This version includes the latest round of FreeBSD kernel security patches, as well as minor SSL and GUI fixes</li>
<li>They&#39;re doing a great job of getting upstream fixes pushed out to users quickly, a very welcome change</li>
<li>A developer has also posted an interesting write-up titled &quot;<a href="http://lastsummer.de/development-workflow-in-opnsense/" rel="nofollow">Development Workflow in OPNsense</a>&quot;</li>
<li>If any of our listeners are trying OPNsense as their gateway firewall, let us know how you like it
***</li>
</ul>

<h2>Interview - Ed Maste - <a href="mailto:board@freebsdfoundation.org" rel="nofollow">board@freebsdfoundation.org</a></h2>

<p><a href="https://www.freebsdfoundation.org/donate" rel="nofollow">The FreeBSD foundation</a>&#39;s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homing-on-code.blogspot.com/2015/02/rolling-with-snapshots.html" rel="nofollow">Rolling with OpenBSD snapshots</a></h3>

<ul>
<li>One of the cool things about the -current branch of OpenBSD is that it doesn&#39;t require any compiling</li>
<li>There are signed binary snapshots being continuously re-rolled and posted on the FTP sites for every architecture</li>
<li>This provides an easy method to get onboard with the latest features, and you can also easily upgrade between them without reformatting or rebuilding</li>
<li>This blog post will walk you through the process of using snapshots to stay on the bleeding edge of OpenBSD goodness</li>
<li>After using -current for seven weeks, the author comes to the conclusion that it&#39;s not as unstable as people might think</li>
<li>He&#39;s now helping test out patches and new ports since he&#39;s running the same code as the developers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/tech-pkg/2015/02/02/msg014224.html" rel="nofollow">Signing pkgsrc packages</a></h3>

<ul>
<li>As of the time this show airs, the official <a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">pkgsrc</a> packages aren&#39;t cryptographically signed</li>
<li>Someone from Joyent has been working on that, since they&#39;d like to sign their pkgsrc packages for SmartOS</li>
<li>Using GNUPG pulled in a lot of dependencies, and they&#39;re trying to keep the bootstrapping process minimal</li>
<li>Instead, they&#39;re using netpgpverify, a fork of NetBSD&#39;s <a href="https://en.wikipedia.org/wiki/Netpgp" rel="nofollow">netpgp</a> utility</li>
<li>Maybe someday this will become the official way to sign packages in NetBSD?
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-February/001624.html" rel="nofollow">FreeBSD support model changes</a></h3>

<ul>
<li>Starting with 11.0-RELEASE, which won&#39;t be for a few months probably, FreeBSD releases are going to have a different support model</li>
<li>The plan is to move &quot;from a point release-based support model to a set of releases from a branch with a guaranteed support lifetime&quot;</li>
<li>There will now be a five-year lifespan for each major release, regardless of how many minor point releases it gets</li>
<li>This new model should reduce the turnaround time for errata and security patches, since there will be a lot less work involved to build and verify them</li>
<li>Lots more detail can be found in the mailing list post, including some important changes to the -STABLE branch, so give it a read
***</li>
</ul>

<h3><a href="http://guillaumevincent.com/2015/01/31/OpenSMTPD-Dovecot-SpamAssassin.html" rel="nofollow">OpenSMTPD, Dovecot and SpamAssassin</a></h3>

<ul>
<li>We&#39;ve been talking about setting up your own BSD-based mail server on the last couple episodes</li>
<li>Here we have another post from a user setting up OpenSMTPD, including Dovecot for IMAP and SpamAssassin for spam filtering</li>
<li>A <strong>lot</strong> of people <a href="http://permalink.gmane.org/gmane.mail.opensmtpd.general/2265" rel="nofollow">regularly ask the developers</a> how to combine OpenSMTPD with spam filtering, and this post should finally reveal the dark secrets</li>
<li>In addition, it also covers SSL certificates, PKI and setting up MX records - some things that previous posts have lacked</li>
<li>Just be sure to replace those &quot;apt-get&quot; commands and &quot;eth0&quot; interface names with something a bit more sane…</li>
<li>In related news, OpenSMTPD has got some interesting new features <a href="http://article.gmane.org/gmane.mail.opensmtpd.general/2272" rel="nofollow">coming soon</a></li>
<li>They&#39;re also planning to <a href="https://github.com/OpenSMTPD/OpenSMTPD/issues/534" rel="nofollow">switch to LibreSSL by default</a> for the portable version
***</li>
</ul>

<h3><a href="http://lastsummer.de/freebsd-desktop-on-the-t400/" rel="nofollow">FreeBSD 10 on the Thinkpad T400</a></h3>

<ul>
<li>BSD laptop articles are becoming popular it seems - this one is about FreeBSD on a T400</li>
<li>Like most of the ones we&#39;ve mentioned before, it shows you how to get a BSD desktop set up with all the little tweaks you might not think to do</li>
<li>This one differs in that it takes a more minimal approach to graphics: instead of a full-featured environment like XFCE or KDE, it uses the i3 tiling window manager</li>
<li>If you&#39;re a commandline junkie that basically just uses X11 to run more than one terminal at once, this might be an ideal setup for you</li>
<li>The post also includes some bits about the DRM and KMS in the 10.x branch, as well as vt
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/1810/" rel="nofollow">PC-BSD 10.1.1 Released</a></h3>

<ul>
<li>Automatic background updater now in</li>
<li>Shiny new Qt5 utils</li>
<li>OVA files for VM’s</li>
<li>Full disk encryption with GELI v7
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2MsjllAyU" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s20eYELsAg" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s20Y2GN1az" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20ARVQ1T6" rel="nofollow">Sean writes in</a> (<a href="http://slexy.org/view/s212XezEYt" rel="nofollow">TJ&#39;s lengthy reply</a>)</li>
<li><a href="http://slexy.org/view/s2DRgEv4j8" rel="nofollow">Christopher writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264010.html" rel="nofollow">Special Instructions</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-users/2015/01/19/msg015669.html" rel="nofollow">Pretending to be a VT220</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we&#39;ll talk about what all they&#39;ve been up to lately. All this week&#39;s news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.djm.net.au/2015/02/key-rotation-in-openssh-68.html" rel="nofollow">Key rotation in OpenSSH 6.8</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> posted a new blog entry about one of the features in the upcoming OpenSSH 6.8</li>
<li>Times changes, key types change, problems are found with old algorithms and we switch to new ones</li>
<li>In OpenSSH (and the SSH protocol) however, there hasn&#39;t been an easy way to rotate host keys... until now</li>
<li>With this change, when you connect to a server, it will log <em>all</em> the server&#39;s public keys in your known_hosts file, instead of just the first one used during the key exchange</li>
<li>Keys that are in your known_hosts file but not on the server will get automatically removed</li>
<li>This fixes the problem of old servers still authenticating with ancient DSA or small RSA keys, as well as providing a way for the server to rotate keys every so often</li>
<li>There are some instructions in the blog post for how you&#39;ll be able to rotate host keys and eventually phase out the older ones - it&#39;s really simple</li>
<li>There are a lot of big changes coming in OpenSSH 6.8, so we&#39;ll be sure to cover them all when it&#39;s released
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/port-arm/2015/01/30/msg002809.html" rel="nofollow">NetBSD Banana Pi images</a></h3>

<ul>
<li>We&#39;ve talked about the <a href="http://www.bananapi.org/p/product.html" rel="nofollow">Banana Pi</a> a bit before - it&#39;s a small ARM board that&#39;s comparable to the popular Raspberry Pi</li>
<li>Some NetBSD -current images were posted on the mailing list, so now you can get some BSD action on one of these little devices</li>
<li>There are even a set of prebuilt pkgsrc packages, so you won&#39;t have to compile everything initially</li>
<li>The email includes some steps to get everything working and an overview of what comes with the image</li>
<li>Also check <a href="https://wiki.netbsd.org/ports/evbarm/allwinner/" rel="nofollow">the wiki page</a> for some related boards and further instructions on getting set up</li>
<li>On a related note, NetBSD also recently <a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_gpu_acceleration_in" rel="nofollow">got GPU acceleration working</a> for the Raspberry Pi (which is a first for their ARM port)
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142255048510669&w=2" rel="nofollow">LibreSSL shirts and other BSD goodies</a></h3>

<ul>
<li>If you&#39;ve been keeping up with the LibreSSL saga and want a shirt to show your support, they&#39;re finally available to buy online</li>
<li>There are two versions, either &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTLSSL.jpg" rel="nofollow">keep calm and use LibreSSL</a>&quot; or the slightly more snarky &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTOSSL.jpg" rel="nofollow">keep calm and abandon OpenSSL</a>&quot;</li>
<li>While on the topic, we thought it would be good to make people aware of shirts for other BSD projects too</li>
<li>You can get some FreeBSD, <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=pc-bsd" rel="nofollow">PCBSD</a> and FreeNAS <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=shirts" rel="nofollow">stuff</a> from the <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=tshirt" rel="nofollow">FreeBSD mall site</a></li>
<li>OpenBSD recently launched their <a href="https://www.openbsdstore.com" rel="nofollow">new store</a>, but the selection is still a bit limited right now</li>
<li>NetBSD has a <a href="https://www.netbsd.org/gallery/devotionalia.html#cafepress" rel="nofollow">couple places</a> where you can buy shirts and other apparel with the flag logo on it</li>
<li>We couldn&#39;t find any DragonFlyBSD shirts unfortunately, which is a shame since <a href="http://www.dragonflybsd.org/images/small_logo.png" rel="nofollow">their logo</a> is pretty cool</li>
<li>Profits from the sale of the gear go back to the projects, so pick up some swag and support your BSD of choice (and of course wear them at any Linux events you happen to go to)
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=35.0" rel="nofollow">OPNsense 15.1.4 released</a></h3>

<ul>
<li>The OPNsense guys have been hard at work since <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">we spoke to them</a>, fixing lots of bugs and keeping everything up to date</li>
<li>A number of versions have come out since then, with 15.1.4 being the latest (assuming they haven&#39;t updated it <strong>again</strong> by the time this airs)</li>
<li>This version includes the latest round of FreeBSD kernel security patches, as well as minor SSL and GUI fixes</li>
<li>They&#39;re doing a great job of getting upstream fixes pushed out to users quickly, a very welcome change</li>
<li>A developer has also posted an interesting write-up titled &quot;<a href="http://lastsummer.de/development-workflow-in-opnsense/" rel="nofollow">Development Workflow in OPNsense</a>&quot;</li>
<li>If any of our listeners are trying OPNsense as their gateway firewall, let us know how you like it
***</li>
</ul>

<h2>Interview - Ed Maste - <a href="mailto:board@freebsdfoundation.org" rel="nofollow">board@freebsdfoundation.org</a></h2>

<p><a href="https://www.freebsdfoundation.org/donate" rel="nofollow">The FreeBSD foundation</a>&#39;s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homing-on-code.blogspot.com/2015/02/rolling-with-snapshots.html" rel="nofollow">Rolling with OpenBSD snapshots</a></h3>

<ul>
<li>One of the cool things about the -current branch of OpenBSD is that it doesn&#39;t require any compiling</li>
<li>There are signed binary snapshots being continuously re-rolled and posted on the FTP sites for every architecture</li>
<li>This provides an easy method to get onboard with the latest features, and you can also easily upgrade between them without reformatting or rebuilding</li>
<li>This blog post will walk you through the process of using snapshots to stay on the bleeding edge of OpenBSD goodness</li>
<li>After using -current for seven weeks, the author comes to the conclusion that it&#39;s not as unstable as people might think</li>
<li>He&#39;s now helping test out patches and new ports since he&#39;s running the same code as the developers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/tech-pkg/2015/02/02/msg014224.html" rel="nofollow">Signing pkgsrc packages</a></h3>

<ul>
<li>As of the time this show airs, the official <a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">pkgsrc</a> packages aren&#39;t cryptographically signed</li>
<li>Someone from Joyent has been working on that, since they&#39;d like to sign their pkgsrc packages for SmartOS</li>
<li>Using GNUPG pulled in a lot of dependencies, and they&#39;re trying to keep the bootstrapping process minimal</li>
<li>Instead, they&#39;re using netpgpverify, a fork of NetBSD&#39;s <a href="https://en.wikipedia.org/wiki/Netpgp" rel="nofollow">netpgp</a> utility</li>
<li>Maybe someday this will become the official way to sign packages in NetBSD?
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-February/001624.html" rel="nofollow">FreeBSD support model changes</a></h3>

<ul>
<li>Starting with 11.0-RELEASE, which won&#39;t be for a few months probably, FreeBSD releases are going to have a different support model</li>
<li>The plan is to move &quot;from a point release-based support model to a set of releases from a branch with a guaranteed support lifetime&quot;</li>
<li>There will now be a five-year lifespan for each major release, regardless of how many minor point releases it gets</li>
<li>This new model should reduce the turnaround time for errata and security patches, since there will be a lot less work involved to build and verify them</li>
<li>Lots more detail can be found in the mailing list post, including some important changes to the -STABLE branch, so give it a read
***</li>
</ul>

<h3><a href="http://guillaumevincent.com/2015/01/31/OpenSMTPD-Dovecot-SpamAssassin.html" rel="nofollow">OpenSMTPD, Dovecot and SpamAssassin</a></h3>

<ul>
<li>We&#39;ve been talking about setting up your own BSD-based mail server on the last couple episodes</li>
<li>Here we have another post from a user setting up OpenSMTPD, including Dovecot for IMAP and SpamAssassin for spam filtering</li>
<li>A <strong>lot</strong> of people <a href="http://permalink.gmane.org/gmane.mail.opensmtpd.general/2265" rel="nofollow">regularly ask the developers</a> how to combine OpenSMTPD with spam filtering, and this post should finally reveal the dark secrets</li>
<li>In addition, it also covers SSL certificates, PKI and setting up MX records - some things that previous posts have lacked</li>
<li>Just be sure to replace those &quot;apt-get&quot; commands and &quot;eth0&quot; interface names with something a bit more sane…</li>
<li>In related news, OpenSMTPD has got some interesting new features <a href="http://article.gmane.org/gmane.mail.opensmtpd.general/2272" rel="nofollow">coming soon</a></li>
<li>They&#39;re also planning to <a href="https://github.com/OpenSMTPD/OpenSMTPD/issues/534" rel="nofollow">switch to LibreSSL by default</a> for the portable version
***</li>
</ul>

<h3><a href="http://lastsummer.de/freebsd-desktop-on-the-t400/" rel="nofollow">FreeBSD 10 on the Thinkpad T400</a></h3>

<ul>
<li>BSD laptop articles are becoming popular it seems - this one is about FreeBSD on a T400</li>
<li>Like most of the ones we&#39;ve mentioned before, it shows you how to get a BSD desktop set up with all the little tweaks you might not think to do</li>
<li>This one differs in that it takes a more minimal approach to graphics: instead of a full-featured environment like XFCE or KDE, it uses the i3 tiling window manager</li>
<li>If you&#39;re a commandline junkie that basically just uses X11 to run more than one terminal at once, this might be an ideal setup for you</li>
<li>The post also includes some bits about the DRM and KMS in the 10.x branch, as well as vt
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/1810/" rel="nofollow">PC-BSD 10.1.1 Released</a></h3>

<ul>
<li>Automatic background updater now in</li>
<li>Shiny new Qt5 utils</li>
<li>OVA files for VM’s</li>
<li>Full disk encryption with GELI v7
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2MsjllAyU" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s20eYELsAg" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s20Y2GN1az" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20ARVQ1T6" rel="nofollow">Sean writes in</a> (<a href="http://slexy.org/view/s212XezEYt" rel="nofollow">TJ&#39;s lengthy reply</a>)</li>
<li><a href="http://slexy.org/view/s2DRgEv4j8" rel="nofollow">Christopher writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264010.html" rel="nofollow">Special Instructions</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-users/2015/01/19/msg015669.html" rel="nofollow">Pretending to be a VT220</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>56: Beastly Infrastructure</title>
  <link>https://www.bsdnow.tv/56</link>
  <guid isPermaLink="false">ef260b07-d765-4154-9f4e-3fc616050361</guid>
  <pubDate>Wed, 24 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ef260b07-d765-4154-9f4e-3fc616050361.mp3" length="41104084" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we're on the other side of the Atlantic, attending EuroBSDCon. For now, we've got an awesome interview with Peter Wemm about the FreeBSD web cluster and infrastructure. It's an inside look that you probably won't hear about anywhere else! We'll also get to a couple of your emails today, and be back next week with all the usual goodies, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>57:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we're on the other side of the Atlantic, attending EuroBSDCon. For now, we've got an awesome interview with Peter Wemm about the FreeBSD web cluster and infrastructure. It's an inside look that you probably won't hear about anywhere else! We'll also get to a couple of your emails today, and be back next week with all the usual goodies, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Peter Wemm - &lt;a href="mailto:peter@freebsd.org" target="_blank" rel="nofollow noopener"&gt;peter@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/karinjiri" target="_blank" rel="nofollow noopener"&gt;@karinjiri&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The FreeBSD web cluster and infrastructure&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2LRZu3hlI" target="_blank" rel="nofollow noopener"&gt;Todd writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21JeoW1rn" target="_blank" rel="nofollow noopener"&gt;Brandon writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, eurobsdcon, 2014, cluster, infrastructure, web, servers, datacenter, internal, ssh, jails</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;re on the other side of the Atlantic, attending EuroBSDCon. For now, we&#39;ve got an awesome interview with Peter Wemm about the FreeBSD web cluster and infrastructure. It&#39;s an inside look that you probably won&#39;t hear about anywhere else! We&#39;ll also get to a couple of your emails today, and be back next week with all the usual goodies, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Interview - Peter Wemm - <a href="mailto:peter@freebsd.org" rel="nofollow">peter@freebsd.org</a> / <a href="https://twitter.com/karinjiri" rel="nofollow">@karinjiri</a></h2>

<p>The FreeBSD web cluster and infrastructure</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2LRZu3hlI" rel="nofollow">Todd writes in</a></li>
<li><a href="http://slexy.org/view/s21JeoW1rn" rel="nofollow">Brandon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;re on the other side of the Atlantic, attending EuroBSDCon. For now, we&#39;ve got an awesome interview with Peter Wemm about the FreeBSD web cluster and infrastructure. It&#39;s an inside look that you probably won&#39;t hear about anywhere else! We&#39;ll also get to a couple of your emails today, and be back next week with all the usual goodies, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Interview - Peter Wemm - <a href="mailto:peter@freebsd.org" rel="nofollow">peter@freebsd.org</a> / <a href="https://twitter.com/karinjiri" rel="nofollow">@karinjiri</a></h2>

<p>The FreeBSD web cluster and infrastructure</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2LRZu3hlI" rel="nofollow">Todd writes in</a></li>
<li><a href="http://slexy.org/view/s21JeoW1rn" rel="nofollow">Brandon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>52: Reverse Takeover</title>
  <link>https://www.bsdnow.tv/52</link>
  <guid isPermaLink="false">67ad6e78-144e-4d1c-a713-49b54e5b679e</guid>
  <pubDate>Wed, 27 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/67ad6e78-144e-4d1c-a713-49b54e5b679e.mp3" length="53663188" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we'll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:14:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we'll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2014augupdate.pdf" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation August update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The foundation has published a new PDF detailing some of their recent activities&lt;/li&gt;
&lt;li&gt;It includes project development updates, the 10.1-RELEASE schedule and some of its new features&lt;/li&gt;
&lt;li&gt;There is also a short interview with &lt;a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" target="_blank" rel="nofollow noopener"&gt;Dru Lavigne&lt;/a&gt; in the "voices from the community" section&lt;/li&gt;
&lt;li&gt;If you're into hardware, there's another section about some new FreeBSD server equipment&lt;/li&gt;
&lt;li&gt;In closing, there's an update on funding too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.prado.it/2014/08/20/how-to-run-master-nsd-on-freebsd-10-0/" target="_blank" rel="nofollow noopener"&gt;NSD for an authoritative nameserver&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With BIND having been removed from FreeBSD 10.0, you might be looking to replace your old DNS setup&lt;/li&gt;
&lt;li&gt;This article shows how to use NSD for an authoritative DNS nameserver&lt;/li&gt;
&lt;li&gt;It's also got a link to a similar article on Unbound, the new favorite recursive and caching resolver (they work great together)&lt;/li&gt;
&lt;li&gt;All the instructions are presented very neatly, with all the little details included&lt;/li&gt;
&lt;li&gt;Less BIND means less vulnerabilities, everybody's happy
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=140873518514033&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;BIND and Nginx removed from OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While we're on the topic of DNS servers, BIND was finally removed from OpenBSD as well&lt;/li&gt;
&lt;li&gt;The base system contains both NSD and Unbound, so users can transition over between 5.6 (November of this year) and 5.7 (May of next year)&lt;/li&gt;
&lt;li&gt;They've also &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=140908174910713&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;removed nginx&lt;/a&gt; from the base system, in favor of the new custom HTTP daemon&lt;/li&gt;
&lt;li&gt;BIND and Nginx are still available in ports if you don't want to switch&lt;/li&gt;
&lt;li&gt;We're hoping to have Reyk Floeter on the show next week to talk about it, but scheduling might not work out, so it may be a little later on&lt;/li&gt;
&lt;li&gt;With Apache gone in the upcoming 5.6, It's also likely that sendmail will be removed before 5.7 - hooray for modern alternatives
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/user/tsutsuii/videos" target="_blank" rel="nofollow noopener"&gt;NetBSD demo videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A Japanese NetBSD developer has been uploading lots of interesting videos&lt;/li&gt;
&lt;li&gt;Unsurprisingly, they're all featuring NetBSD running on exotic and weird hardware&lt;/li&gt;
&lt;li&gt;Most of them are demoing sound or running a modern Twitter client on an ancient computer&lt;/li&gt;
&lt;li&gt;They're from the same guy that did the conference wrap-up we mentioned recently
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Shawn Webb - &lt;a href="mailto:shawn.webb@hardenedbsd.org" target="_blank" rel="nofollow noopener"&gt;shawn.webb@hardenedbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/lattera" target="_blank" rel="nofollow noopener"&gt;@lattera&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Address space layout randomization &lt;a href="http://hardenedbsd.org/" target="_blank" rel="nofollow noopener"&gt;in FreeBSD&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/reverse-ssh" target="_blank" rel="nofollow noopener"&gt;Reverse SSH tunneling&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://deuterion.net/puppet-master-agent-installation-on-freebsd/" target="_blank" rel="nofollow noopener"&gt;Puppet master-agent installation on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got a lot of BSD boxes under your control, or if you're just lazy, you've probably looked into Puppet before&lt;/li&gt;
&lt;li&gt;The author claims a lack of BSD-specific Puppet documentation, so he decided to write up some notes of his own&lt;/li&gt;
&lt;li&gt;He goes through some advantages of using this type of tool for deployments, even when you don't have a huge number of systems&lt;/li&gt;
&lt;li&gt;The rest of the post explains how to set up both the master and the agent configurations
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.mondaiji.com/blog/other/it/10175-the-hunt-for-the-ultimate-free-open-source-firewall-distro" target="_blank" rel="nofollow noopener"&gt;Misc. pfSense items&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We found a few miscellaneous pfSense articles this past week &lt;/li&gt;
&lt;li&gt;The first one is about the hunt for the "ultimate" free open source firewall, where pfSense is obviously a strong contender&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://willbradley.name/2014/08/20/logging-natfirewallstate-entries-in-pfsense/" target="_blank" rel="nofollow noopener"&gt;The second one&lt;/a&gt; shows how to log NAT firewall states (a good way to find out which family member has been torrenting!)&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.proteansec.com/linux/pfsense-automatically-backup-configuration-files/" target="_blank" rel="nofollow noopener"&gt;the third&lt;/a&gt;, you can see how to automatically back up your configuration files&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://vidarw.wordpress.com/2014/07/09/network-boot-with-pfsense-and-tftpd32/" target="_blank" rel="nofollow noopener"&gt;The fourth item&lt;/a&gt; shows how to set up PXE booting with pfSense, similar to one of our tutorials
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.khubla.com/freebsd/timemachine-backups-on-freebsd-10" target="_blank" rel="nofollow noopener"&gt;Time Machine backups on ZFS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got a Mac you need to keep backed up, a FreeBSD server with ZFS can take the place of an expensive "time capsule"&lt;/li&gt;
&lt;li&gt;This post walks you through setting up netatalk and mDNS for a very versatile Time Machine backup system&lt;/li&gt;
&lt;li&gt;With a single command on the OS X side, you can write to and read from the BSD box just like a regular external drive&lt;/li&gt;
&lt;li&gt;Surprisingly simple to do, recommended for anyone with Macs on their network
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/08/pc-bsd-10-0-3-preview-lumina-desktop/" target="_blank" rel="nofollow noopener"&gt;Lumina desktop preview&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lumina, the BSD-exclusive desktop environment, seems to be coming along nicely&lt;/li&gt;
&lt;li&gt;The main developer has posted an update on the PCBSD blog with some screenshots&lt;/li&gt;
&lt;li&gt;Lots of new features have been added, many of which are documented in the post&lt;/li&gt;
&lt;li&gt;There just might be a BSD Now episode about Lumina coming up.. (cough cough)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21eLBvf1l" target="_blank" rel="nofollow noopener"&gt;Gary writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20xqTKNrf" target="_blank" rel="nofollow noopener"&gt;Cedric writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21q428tPj" target="_blank" rel="nofollow noopener"&gt;Caldwell writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2uVLhqCaO" target="_blank" rel="nofollow noopener"&gt;Cary writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, tunnel, reverse tunnel, encryption, aslr, pie, address space layout randomization, position-independent executables, nsd, bind, unbound, dns server, pfsense, shawn webb, time machine, os x, nginx</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we&#39;ll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014augupdate.pdf" rel="nofollow">FreeBSD foundation August update</a></h3>

<ul>
<li>The foundation has published a new PDF detailing some of their recent activities</li>
<li>It includes project development updates, the 10.1-RELEASE schedule and some of its new features</li>
<li>There is also a short interview with <a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" rel="nofollow">Dru Lavigne</a> in the &quot;voices from the community&quot; section</li>
<li>If you&#39;re into hardware, there&#39;s another section about some new FreeBSD server equipment</li>
<li>In closing, there&#39;s an update on funding too
***</li>
</ul>

<h3><a href="http://www.prado.it/2014/08/20/how-to-run-master-nsd-on-freebsd-10-0/" rel="nofollow">NSD for an authoritative nameserver</a></h3>

<ul>
<li>With BIND having been removed from FreeBSD 10.0, you might be looking to replace your old DNS setup</li>
<li>This article shows how to use NSD for an authoritative DNS nameserver</li>
<li>It&#39;s also got a link to a similar article on Unbound, the new favorite recursive and caching resolver (they work great together)</li>
<li>All the instructions are presented very neatly, with all the little details included</li>
<li>Less BIND means less vulnerabilities, everybody&#39;s happy
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=140873518514033&w=2" rel="nofollow">BIND and Nginx removed from OpenBSD</a></h3>

<ul>
<li>While we&#39;re on the topic of DNS servers, BIND was finally removed from OpenBSD as well</li>
<li>The base system contains both NSD and Unbound, so users can transition over between 5.6 (November of this year) and 5.7 (May of next year)</li>
<li>They&#39;ve also <a href="http://marc.info/?l=openbsd-cvs&m=140908174910713&w=2" rel="nofollow">removed nginx</a> from the base system, in favor of the new custom HTTP daemon</li>
<li>BIND and Nginx are still available in ports if you don&#39;t want to switch</li>
<li>We&#39;re hoping to have Reyk Floeter on the show next week to talk about it, but scheduling might not work out, so it may be a little later on</li>
<li>With Apache gone in the upcoming 5.6, It&#39;s also likely that sendmail will be removed before 5.7 - hooray for modern alternatives
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/tsutsuii/videos" rel="nofollow">NetBSD demo videos</a></h3>

<ul>
<li>A Japanese NetBSD developer has been uploading lots of interesting videos</li>
<li>Unsurprisingly, they&#39;re all featuring NetBSD running on exotic and weird hardware</li>
<li>Most of them are demoing sound or running a modern Twitter client on an ancient computer</li>
<li>They&#39;re from the same guy that did the conference wrap-up we mentioned recently
***</li>
</ul>

<h2>Interview - Shawn Webb - <a href="mailto:shawn.webb@hardenedbsd.org" rel="nofollow">shawn.webb@hardenedbsd.org</a> / <a href="https://twitter.com/lattera" rel="nofollow">@lattera</a></h2>

<p>Address space layout randomization <a href="http://hardenedbsd.org/" rel="nofollow">in FreeBSD</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/reverse-ssh" rel="nofollow">Reverse SSH tunneling</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://deuterion.net/puppet-master-agent-installation-on-freebsd/" rel="nofollow">Puppet master-agent installation on FreeBSD</a></h3>

<ul>
<li>If you&#39;ve got a lot of BSD boxes under your control, or if you&#39;re just lazy, you&#39;ve probably looked into Puppet before</li>
<li>The author claims a lack of BSD-specific Puppet documentation, so he decided to write up some notes of his own</li>
<li>He goes through some advantages of using this type of tool for deployments, even when you don&#39;t have a huge number of systems</li>
<li>The rest of the post explains how to set up both the master and the agent configurations
***</li>
</ul>

<h3><a href="http://www.mondaiji.com/blog/other/it/10175-the-hunt-for-the-ultimate-free-open-source-firewall-distro" rel="nofollow">Misc. pfSense items</a></h3>

<ul>
<li>We found a few miscellaneous pfSense articles this past week </li>
<li>The first one is about the hunt for the &quot;ultimate&quot; free open source firewall, where pfSense is obviously a strong contender</li>
<li><a href="http://willbradley.name/2014/08/20/logging-natfirewallstate-entries-in-pfsense/" rel="nofollow">The second one</a> shows how to log NAT firewall states (a good way to find out which family member has been torrenting!)</li>
<li>In <a href="http://www.proteansec.com/linux/pfsense-automatically-backup-configuration-files/" rel="nofollow">the third</a>, you can see how to automatically back up your configuration files</li>
<li><a href="https://vidarw.wordpress.com/2014/07/09/network-boot-with-pfsense-and-tftpd32/" rel="nofollow">The fourth item</a> shows how to set up PXE booting with pfSense, similar to one of our tutorials
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/timemachine-backups-on-freebsd-10" rel="nofollow">Time Machine backups on ZFS</a></h3>

<ul>
<li>If you&#39;ve got a Mac you need to keep backed up, a FreeBSD server with ZFS can take the place of an expensive &quot;time capsule&quot;</li>
<li>This post walks you through setting up netatalk and mDNS for a very versatile Time Machine backup system</li>
<li>With a single command on the OS X side, you can write to and read from the BSD box just like a regular external drive</li>
<li>Surprisingly simple to do, recommended for anyone with Macs on their network
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/08/pc-bsd-10-0-3-preview-lumina-desktop/" rel="nofollow">Lumina desktop preview</a></h3>

<ul>
<li>Lumina, the BSD-exclusive desktop environment, seems to be coming along nicely</li>
<li>The main developer has posted an update on the PCBSD blog with some screenshots</li>
<li>Lots of new features have been added, many of which are documented in the post</li>
<li>There just might be a BSD Now episode about Lumina coming up.. (cough cough)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21eLBvf1l" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s20xqTKNrf" rel="nofollow">Cedric writes in</a></li>
<li><a href="http://slexy.org/view/s21q428tPj" rel="nofollow">Caldwell writes in</a></li>
<li><a href="http://slexy.org/view/s2uVLhqCaO" rel="nofollow">Cary writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we&#39;ll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014augupdate.pdf" rel="nofollow">FreeBSD foundation August update</a></h3>

<ul>
<li>The foundation has published a new PDF detailing some of their recent activities</li>
<li>It includes project development updates, the 10.1-RELEASE schedule and some of its new features</li>
<li>There is also a short interview with <a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" rel="nofollow">Dru Lavigne</a> in the &quot;voices from the community&quot; section</li>
<li>If you&#39;re into hardware, there&#39;s another section about some new FreeBSD server equipment</li>
<li>In closing, there&#39;s an update on funding too
***</li>
</ul>

<h3><a href="http://www.prado.it/2014/08/20/how-to-run-master-nsd-on-freebsd-10-0/" rel="nofollow">NSD for an authoritative nameserver</a></h3>

<ul>
<li>With BIND having been removed from FreeBSD 10.0, you might be looking to replace your old DNS setup</li>
<li>This article shows how to use NSD for an authoritative DNS nameserver</li>
<li>It&#39;s also got a link to a similar article on Unbound, the new favorite recursive and caching resolver (they work great together)</li>
<li>All the instructions are presented very neatly, with all the little details included</li>
<li>Less BIND means less vulnerabilities, everybody&#39;s happy
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=140873518514033&w=2" rel="nofollow">BIND and Nginx removed from OpenBSD</a></h3>

<ul>
<li>While we&#39;re on the topic of DNS servers, BIND was finally removed from OpenBSD as well</li>
<li>The base system contains both NSD and Unbound, so users can transition over between 5.6 (November of this year) and 5.7 (May of next year)</li>
<li>They&#39;ve also <a href="http://marc.info/?l=openbsd-cvs&m=140908174910713&w=2" rel="nofollow">removed nginx</a> from the base system, in favor of the new custom HTTP daemon</li>
<li>BIND and Nginx are still available in ports if you don&#39;t want to switch</li>
<li>We&#39;re hoping to have Reyk Floeter on the show next week to talk about it, but scheduling might not work out, so it may be a little later on</li>
<li>With Apache gone in the upcoming 5.6, It&#39;s also likely that sendmail will be removed before 5.7 - hooray for modern alternatives
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/tsutsuii/videos" rel="nofollow">NetBSD demo videos</a></h3>

<ul>
<li>A Japanese NetBSD developer has been uploading lots of interesting videos</li>
<li>Unsurprisingly, they&#39;re all featuring NetBSD running on exotic and weird hardware</li>
<li>Most of them are demoing sound or running a modern Twitter client on an ancient computer</li>
<li>They&#39;re from the same guy that did the conference wrap-up we mentioned recently
***</li>
</ul>

<h2>Interview - Shawn Webb - <a href="mailto:shawn.webb@hardenedbsd.org" rel="nofollow">shawn.webb@hardenedbsd.org</a> / <a href="https://twitter.com/lattera" rel="nofollow">@lattera</a></h2>

<p>Address space layout randomization <a href="http://hardenedbsd.org/" rel="nofollow">in FreeBSD</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/reverse-ssh" rel="nofollow">Reverse SSH tunneling</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://deuterion.net/puppet-master-agent-installation-on-freebsd/" rel="nofollow">Puppet master-agent installation on FreeBSD</a></h3>

<ul>
<li>If you&#39;ve got a lot of BSD boxes under your control, or if you&#39;re just lazy, you&#39;ve probably looked into Puppet before</li>
<li>The author claims a lack of BSD-specific Puppet documentation, so he decided to write up some notes of his own</li>
<li>He goes through some advantages of using this type of tool for deployments, even when you don&#39;t have a huge number of systems</li>
<li>The rest of the post explains how to set up both the master and the agent configurations
***</li>
</ul>

<h3><a href="http://www.mondaiji.com/blog/other/it/10175-the-hunt-for-the-ultimate-free-open-source-firewall-distro" rel="nofollow">Misc. pfSense items</a></h3>

<ul>
<li>We found a few miscellaneous pfSense articles this past week </li>
<li>The first one is about the hunt for the &quot;ultimate&quot; free open source firewall, where pfSense is obviously a strong contender</li>
<li><a href="http://willbradley.name/2014/08/20/logging-natfirewallstate-entries-in-pfsense/" rel="nofollow">The second one</a> shows how to log NAT firewall states (a good way to find out which family member has been torrenting!)</li>
<li>In <a href="http://www.proteansec.com/linux/pfsense-automatically-backup-configuration-files/" rel="nofollow">the third</a>, you can see how to automatically back up your configuration files</li>
<li><a href="https://vidarw.wordpress.com/2014/07/09/network-boot-with-pfsense-and-tftpd32/" rel="nofollow">The fourth item</a> shows how to set up PXE booting with pfSense, similar to one of our tutorials
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/timemachine-backups-on-freebsd-10" rel="nofollow">Time Machine backups on ZFS</a></h3>

<ul>
<li>If you&#39;ve got a Mac you need to keep backed up, a FreeBSD server with ZFS can take the place of an expensive &quot;time capsule&quot;</li>
<li>This post walks you through setting up netatalk and mDNS for a very versatile Time Machine backup system</li>
<li>With a single command on the OS X side, you can write to and read from the BSD box just like a regular external drive</li>
<li>Surprisingly simple to do, recommended for anyone with Macs on their network
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/08/pc-bsd-10-0-3-preview-lumina-desktop/" rel="nofollow">Lumina desktop preview</a></h3>

<ul>
<li>Lumina, the BSD-exclusive desktop environment, seems to be coming along nicely</li>
<li>The main developer has posted an update on the PCBSD blog with some screenshots</li>
<li>Lots of new features have been added, many of which are documented in the post</li>
<li>There just might be a BSD Now episode about Lumina coming up.. (cough cough)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21eLBvf1l" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s20xqTKNrf" rel="nofollow">Cedric writes in</a></li>
<li><a href="http://slexy.org/view/s21q428tPj" rel="nofollow">Caldwell writes in</a></li>
<li><a href="http://slexy.org/view/s2uVLhqCaO" rel="nofollow">Cary writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>50: VPN, My Dear Watson</title>
  <link>https://www.bsdnow.tv/50</link>
  <guid isPermaLink="false">b0306dc5-ee87-4a03-aeea-9a89b915ff5e</guid>
  <pubDate>Wed, 13 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b0306dc5-ee87-4a03-aeea-9a89b915ff5e.mp3" length="62998996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:27:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" target="_blank" rel="nofollow noopener"&gt;MeetBSD 2014 is approaching&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California&lt;/li&gt;
&lt;li&gt;MeetBSD has an "unconference" format, which means there will be both planned talks and community events&lt;/li&gt;
&lt;li&gt;All the extra details will be on &lt;a href="https://www.meetbsd.com/" target="_blank" rel="nofollow noopener"&gt;their site&lt;/a&gt; soon&lt;/li&gt;
&lt;li&gt;It also has hotels and various other bits of useful information - hopefully with more info on the talks to come&lt;/li&gt;
&lt;li&gt;Of course, EuroBSDCon is coming up before then
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" target="_blank" rel="nofollow noopener"&gt;First experiences with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog post that leads off with "tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven't tried before"&lt;/li&gt;
&lt;li&gt;The author read the famous "&lt;a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" target="_blank" rel="nofollow noopener"&gt;BSD for Linux users&lt;/a&gt;" series (that most of us have surely seen) and decided to give BSD a try&lt;/li&gt;
&lt;li&gt;He details his different OS and distro history, concluding with how he "eventually became annoyed at the poor quality of Linux userland software"&lt;/li&gt;
&lt;li&gt;From there, it talks about how he used the OpenBSD USB image and got a fully-working system&lt;/li&gt;
&lt;li&gt;He especially liked the simplicity of OpenBSD's "hostname.if" system for network configuration&lt;/li&gt;
&lt;li&gt;Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" target="_blank" rel="nofollow noopener"&gt;NetBSD rump kernels on bare metal (and Kansai OSC report)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;When you're developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right&lt;/li&gt;
&lt;li&gt;However, NetBSD's rump kernels - a very unique concept - make this process a lot easier&lt;/li&gt;
&lt;li&gt;This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week&lt;/li&gt;
&lt;li&gt;Also have a look back at &lt;a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" target="_blank" rel="nofollow noopener"&gt;episode 8&lt;/a&gt; for our interview about rump kernels and what exactly they do&lt;/li&gt;
&lt;li&gt;While on the topic of NetBSD, there were also a couple of &lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" target="_blank" rel="nofollow noopener"&gt;very detailed reports&lt;/a&gt; (with lots of pictures!) of the various NetBSD-themed booths at the 2014 &lt;a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" target="_blank" rel="nofollow noopener"&gt;Kansai Open Source Conference&lt;/a&gt; that we wanted to highlight
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.openssl.org/news/secadv_20140806.txt" target="_blank" rel="nofollow noopener"&gt;OpenSSL and LibreSSL updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)&lt;/li&gt;
&lt;li&gt;Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=140752295222929&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;LibreSSL released a new version&lt;/a&gt; to address most of the vulnerabilities, but wasn't affected by some of them&lt;/li&gt;
&lt;li&gt;Whichever version of whatever SSL you use, make sure it's patched for these issues&lt;/li&gt;
&lt;li&gt;DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Robert Watson - &lt;a href="mailto:rwatson@freebsd.org" target="_blank" rel="nofollow noopener"&gt;rwatson@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD architecture, security research techniques, exploit mitigation&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/openvpn" target="_blank" rel="nofollow noopener"&gt;Protecting traffic with a BSD-based VPN&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" target="_blank" rel="nofollow noopener"&gt;A FreeBSD-based CGit server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you use git (like a certain host of this show) then you've probably considered setting up your own server&lt;/li&gt;
&lt;li&gt;This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend&lt;/li&gt;
&lt;li&gt;It even shows you how to set up multiple repos with key-based user separation and other cool things&lt;/li&gt;
&lt;li&gt;The author of the post is also a listener of the show, thanks for sending it in!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" target="_blank" rel="nofollow noopener"&gt;Backup devices for small businesses&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this article, different methods of data storage and backup are compared&lt;/li&gt;
&lt;li&gt;After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer&lt;/li&gt;
&lt;li&gt;He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers&lt;/li&gt;
&lt;li&gt;It also goes over some of the hardware specifics in the FreeNAS Mini
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" target="_blank" rel="nofollow noopener"&gt;A new Xenocara interview&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As a follow up to last week's OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara&lt;/li&gt;
&lt;li&gt;If you're not familiar with Xenocara, it's OpenBSD's version of Xorg with some custom patches&lt;/li&gt;
&lt;li&gt;In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing&lt;/li&gt;
&lt;li&gt;Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it's natural for him to do a lot of the maintainership work there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" target="_blank" rel="nofollow noopener"&gt;Building a high performance FreeBSD samba server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what's the best solution?&lt;/li&gt;
&lt;li&gt;FreeBSD, ZFS and Samba obviously!&lt;/li&gt;
&lt;li&gt;The master image and related files clock in at over 20GB, and will be accessed at the same time by &lt;em&gt;all&lt;/em&gt; of those clients&lt;/li&gt;
&lt;li&gt;This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)&lt;/li&gt;
&lt;li&gt;It doesn't even require the newest or best hardware with the right changes, pretty cool
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" target="_blank" rel="nofollow noopener"&gt;An interesting Reddit thread&lt;/a&gt; (&lt;a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" target="_blank" rel="nofollow noopener"&gt;or two&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21t7L5bqO" target="_blank" rel="nofollow noopener"&gt;PB writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20MFywDqZ" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Td6nq11J" target="_blank" rel="nofollow noopener"&gt;Steve writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s215MlpJYV" target="_blank" rel="nofollow noopener"&gt;Lachlan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2N4JKkoKt" target="_blank" rel="nofollow noopener"&gt;Justin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, vpn, vps, openvpn, tunnel, ssh, security, exploit mitigation, zfs, lzo, tls, xenocara, x11, xorg, freenas, freenas mini, ixsystems, network attached storage, nas, meetbsd, rump kernels, libressl, openssl, kansai</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>46: Network Iodometry</title>
  <link>https://www.bsdnow.tv/46</link>
  <guid isPermaLink="false">e23303c8-31f0-4706-817c-1618e08cd149</guid>
  <pubDate>Wed, 16 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e23303c8-31f0-4706-817c-1618e08cd149.mp3" length="76226260" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're back, and this week we'll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2014.eurobsdcon.org/registration/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2014 registration open&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;September is getting closer, and that means it's time for EuroBSDCon - held in Bulgaria this year&lt;/li&gt;
&lt;li&gt;Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th&lt;/li&gt;
&lt;li&gt;Tutorials, sessions, dev summits and everything else all have their own pricing as well&lt;/li&gt;
&lt;li&gt;Registering between August 18th - September 12th will cost more for everything&lt;/li&gt;
&lt;li&gt;You can &lt;a href="http://registration.eurobsdcon.org/" target="_blank" rel="nofollow noopener"&gt;register online here&lt;/a&gt; and &lt;a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" target="_blank" rel="nofollow noopener"&gt;check hotels in the area&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The FreeBSD foundation is also &lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" target="_blank" rel="nofollow noopener"&gt;accepting applications&lt;/a&gt; for travel grants
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?t=140440541000002&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD SMP PF update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded&lt;/li&gt;
&lt;li&gt;With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump&lt;/li&gt;
&lt;li&gt;In a recent mailing list thread, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" target="_blank" rel="nofollow noopener"&gt;Henning Brauer&lt;/a&gt; addresses some of the concerns&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=140479174521071&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;short version&lt;/a&gt; is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless&lt;/li&gt;
&lt;li&gt;He &lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=140481012425889&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;also says&lt;/a&gt; PF on OpenBSD is over four times faster than FreeBSD's old version, presumably due to those extra years of development it's gone through&lt;/li&gt;
&lt;li&gt;There's also been &lt;a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" target="_blank" rel="nofollow noopener"&gt;even more recent concern&lt;/a&gt; about the uncertain future of FreeBSD's PF, being mostly unmaintained since their SMP patches&lt;/li&gt;
&lt;li&gt;We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://saveosx.org/pkgsrc-intro/" target="_blank" rel="nofollow noopener"&gt;Introduction to NetBSD pkgsrc&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An article from one of our listeners about how to create a new pkgsrc port or fix one that you need&lt;/li&gt;
&lt;li&gt;The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format&lt;/li&gt;
&lt;li&gt;It also lists all the different bmake targets and their functions in relation to the porting process&lt;/li&gt;
&lt;li&gt;Finally, the post details the whole process of creating a new port
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/9.3R/relnotes.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 9.3-RELEASE&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced &lt;a href="https://www.freebsd.org/releases/9.3R/schedule.html" target="_blank" rel="nofollow noopener"&gt;today&lt;/a&gt; but actually came out yesterday&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.freebsd.org/releases/9.3R/relnotes.html" target="_blank" rel="nofollow noopener"&gt;The full list of changes&lt;/a&gt; is available, but it's mostly a smaller maintenance release&lt;/li&gt;
&lt;li&gt;Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more&lt;/li&gt;
&lt;li&gt;If you haven't jumped to the 10.x branch yet (and there are a lot of people who haven't!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon&lt;/li&gt;
&lt;li&gt;Good news, this will be &lt;a href="https://twitter.com/evilgjb/status/485909719522222080" target="_blank" rel="nofollow noopener"&gt;the first release&lt;/a&gt; with PGP-signed checksums on the FTP mirrors - a very welcome change&lt;/li&gt;
&lt;li&gt;With that out of the way, the 10.1-RELEASE schedule &lt;a href="https://www.freebsd.org/releases/10.1R/schedule.html" target="_blank" rel="nofollow noopener"&gt;was posted&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Bryan Drewery - &lt;a href="mailto:bdrewery@freebsd.org" target="_blank" rel="nofollow noopener"&gt;bdrewery@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/bdrewery" target="_blank" rel="nofollow noopener"&gt;@bdrewery&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The FreeBSD package building cluster, pkgng, ports, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/ssh-dns" target="_blank" rel="nofollow noopener"&gt;Tunneling traffic through DNS&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" target="_blank" rel="nofollow noopener"&gt;SSH two-factor authentication on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website&lt;/li&gt;
&lt;li&gt;This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port&lt;/li&gt;
&lt;li&gt;Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally&lt;/li&gt;
&lt;li&gt;It's a really, really simple process once you have the port installed - full details on the page
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" target="_blank" rel="nofollow noopener"&gt;Ditch tape backup in favor of FreeNAS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The author of this post shares some of his horrible experiences with tape backups for a client&lt;/li&gt;
&lt;li&gt;Having constant, daily errors and failed backups, he needed to find another solution&lt;/li&gt;
&lt;li&gt;With 1TB of backups, tapes just weren't a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)&lt;/li&gt;
&lt;li&gt;The rest of the article details his experiences with it and tells about his setup
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" target="_blank" rel="nofollow noopener"&gt;NetBSD vs FreeBSD, desktop experiences&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job&lt;/li&gt;
&lt;li&gt;Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver&lt;/li&gt;
&lt;li&gt;"Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga."&lt;/li&gt;
&lt;li&gt;He's become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" target="_blank" rel="nofollow noopener"&gt;PCBSD not-so-weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Speaking of choices for a desktop system, it's the return of the PCBSD digest!&lt;/li&gt;
&lt;li&gt;Warden and PBI_add have gotten some interesting new features&lt;/li&gt;
&lt;li&gt;You can now create jails "on the fly" when adding a new PBI to your application library&lt;/li&gt;
&lt;li&gt;Bulk jail creation is also possible now, and it's really easy&lt;/li&gt;
&lt;li&gt;New Jenkins integration, with public access to &lt;a href="http://builds.pcbsd.org" target="_blank" rel="nofollow noopener"&gt;poudriere logs as well&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;PkgNG 1.3.0.rc2 testing for EDGE users
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21D05MP0t" target="_blank" rel="nofollow noopener"&gt;Jeff writes in&lt;/a&gt; - &lt;a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" target="_blank" rel="nofollow noopener"&gt;Sending Encrypted Backups over SSH&lt;/a&gt; + &lt;a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" target="_blank" rel="nofollow noopener"&gt;Sending ZFS snapshots via user&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2lzo1swzo" target="_blank" rel="nofollow noopener"&gt;Bruce writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20z841ean" target="_blank" rel="nofollow noopener"&gt;Richard writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2QYc8BOAo" target="_blank" rel="nofollow noopener"&gt;Jeff writes in&lt;/a&gt; - &lt;a href="http://www.nycbug.org/index.cgi?action=dmesgd" target="_blank" rel="nofollow noopener"&gt;NYCBUG dmesg list&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2V2e1m7S7" target="_blank" rel="nofollow noopener"&gt;Steve writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pc-bsd, tutorial, howto, guide, bsd, interview, iodine, dns, tunnel, ssh, encryption, vpn, ids, bypass, detection, portmgr, pkgng, bypassing, firewall, pkgsrccon, pkgsrc, pf, smp, eurobsdcon, 2014, multithreaded, presentations, talks, two factor authentication, freenas, 9.3</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back, and this week we&#39;ll be showing you how to tunnel out of a restrictive network using only DNS queries. We also sat down with Bryan Drewery, from the FreeBSD portmgr team, to talk all about their building cluster and some recent changes. All the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/registration/" rel="nofollow">EuroBSDCon 2014 registration open</a></h3>

<ul>
<li>September is getting closer, and that means it&#39;s time for EuroBSDCon - held in Bulgaria this year</li>
<li>Registration is finally open to the public, with prices for businesses ($287), individuals ($217) and students ($82) for the main conference until August 18th</li>
<li>Tutorials, sessions, dev summits and everything else all have their own pricing as well</li>
<li>Registering between August 18th - September 12th will cost more for everything</li>
<li>You can <a href="http://registration.eurobsdcon.org/" rel="nofollow">register online here</a> and <a href="http://2014.eurobsdcon.org/registration/travel-and-stay/hotels" rel="nofollow">check hotels in the area</a></li>
<li>The FreeBSD foundation is also <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-July/001577.html" rel="nofollow">accepting applications</a> for travel grants
***</li>
</ul>

<h3><a href="http://marc.info/?t=140440541000002&r=1&w=2" rel="nofollow">OpenBSD SMP PF update</a></h3>

<ul>
<li>A couple weeks ago we talked about how DragonflyBSD updated their PF to be multithreaded</li>
<li>With them joining the SMP ranks along with FreeBSD, a lot of users have been asking about when OpenBSD is going to make the jump</li>
<li>In a recent mailing list thread, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> addresses some of the concerns</li>
<li>The <a href="http://marc.info/?l=openbsd-misc&m=140479174521071&w=2" rel="nofollow">short version</a> is that too many things in OpenBSD are currently single-threaded for it to matter - just reworking PF by itself would be useless</li>
<li>He <a href="http://marc.info/?l=openbsd-misc&m=140481012425889&w=2" rel="nofollow">also says</a> PF on OpenBSD is over four times faster than FreeBSD&#39;s old version, presumably due to those extra years of development it&#39;s gone through</li>
<li>There&#39;s also been <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-July/thread.html" rel="nofollow">even more recent concern</a> about the uncertain future of FreeBSD&#39;s PF, being mostly unmaintained since their SMP patches</li>
<li>We reached out to four developers (over week ago) about coming on the show to talk about OpenBSD network performance and SMP, but they all ignored us
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrc-intro/" rel="nofollow">Introduction to NetBSD pkgsrc</a></h3>

<ul>
<li>An article from one of our listeners about how to create a new pkgsrc port or fix one that you need</li>
<li>The post starts off with how to get the pkgsrc tree, shows how to get the developer tools and finally goes through the Makefile format</li>
<li>It also lists all the different bmake targets and their functions in relation to the porting process</li>
<li>Finally, the post details the whole process of creating a new port
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">FreeBSD 9.3-RELEASE</a></h3>

<ul>
<li>After three RCs, FreeBSD 9.3 was scheduled to be finalized and announced <a href="https://www.freebsd.org/releases/9.3R/schedule.html" rel="nofollow">today</a> but actually came out yesterday</li>
<li><a href="https://www.freebsd.org/releases/9.3R/relnotes.html" rel="nofollow">The full list of changes</a> is available, but it&#39;s mostly a smaller maintenance release</li>
<li>Lots of driver updates, ZFS issues fixed, hardware RNGs are entirely disabled by default, netmap framework updates, read-only ext4 support was added, the vt driver was merged from -CURRENT, new hardware support (including radeon KMS), various userland tools got new features, OpenSSL and OpenSSH were updated... and much more</li>
<li>If you haven&#39;t jumped to the 10.x branch yet (and there are a lot of people who haven&#39;t!) this is a worthwhile upgrade - 9.2-RELEASE will reach EOL soon</li>
<li>Good news, this will be <a href="https://twitter.com/evilgjb/status/485909719522222080" rel="nofollow">the first release</a> with PGP-signed checksums on the FTP mirrors - a very welcome change</li>
<li>With that out of the way, the 10.1-RELEASE schedule <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">was posted</a>
***</li>
</ul>

<h2>Interview - Bryan Drewery - <a href="mailto:bdrewery@freebsd.org" rel="nofollow">bdrewery@freebsd.org</a> / <a href="https://twitter.com/bdrewery" rel="nofollow">@bdrewery</a></h2>

<p>The FreeBSD package building cluster, pkgng, ports, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-dns" rel="nofollow">Tunneling traffic through DNS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.feld.me/posts/2014/07/ssh-two-factor-authentication-on-freebsd/" rel="nofollow">SSH two-factor authentication on FreeBSD</a></h3>

<ul>
<li>We&#39;ve previously mentioned stories on how to do two-factor authentication with a Yubikey or via a third party website</li>
<li>This blog post tells you how to do exactly that, but with your Google account and the pam_google_authenticator port</li>
<li>Using this setup, every user that logs in with a password will have an extra requirement before they can gain access - but users with public keys can login normally</li>
<li>It&#39;s a really, really simple process once you have the port installed - full details on the page
***</li>
</ul>

<h3><a href="http://www.darvilleit.com/why-i-ditched-tape-backup-for-a-custom-made-freenas-backup/" rel="nofollow">Ditch tape backup in favor of FreeNAS</a></h3>

<ul>
<li>The author of this post shares some of his horrible experiences with tape backups for a client</li>
<li>Having constant, daily errors and failed backups, he needed to find another solution</li>
<li>With 1TB of backups, tapes just weren&#39;t a good option anymore - so he switched to FreeNAS (after also ruling out a pre-built NAS)</li>
<li>The rest of the article details his experiences with it and tells about his setup
***</li>
</ul>

<h3><a href="http://imil.net/wp/2014/07/02/back-to-2000-2005-freebsd-desktop-2/" rel="nofollow">NetBSD vs FreeBSD, desktop experiences</a></h3>

<ul>
<li>A NetBSD and pkgsrc developer details his experiences running NetBSD on a workstation at his job</li>
<li>Becoming more and more disappointed with graphics performance, he finally decides to give FreeBSD 10 a try - especially since it has a native nVidia driver</li>
<li>&quot;Running on VAX, PlayStation 2 and Amiga is fun, but I’ll tell you a little secret: nobody cares anymore about VAX, PlayStation 2 and Amiga.&quot;</li>
<li>He&#39;s become pretty satisfied with FreeBSD, a modern choice for a 2014 desktop system 
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/07/pc-bsd-feature-digest-31-warden-cli-upgrade-irc-announcement/" rel="nofollow">PCBSD not-so-weekly digest</a></h3>

<ul>
<li>Speaking of choices for a desktop system, it&#39;s the return of the PCBSD digest!</li>
<li>Warden and PBI_add have gotten some interesting new features</li>
<li>You can now create jails &quot;on the fly&quot; when adding a new PBI to your application library</li>
<li>Bulk jail creation is also possible now, and it&#39;s really easy</li>
<li>New Jenkins integration, with public access to <a href="http://builds.pcbsd.org" rel="nofollow">poudriere logs as well</a></li>
<li>PkgNG 1.3.0.rc2 testing for EDGE users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21D05MP0t" rel="nofollow">Jeff writes in</a> - <a href="http://allanjude.com/zfs_handbook/zfs-zfs.html#zfs-send-ssh" rel="nofollow">Sending Encrypted Backups over SSH</a> + <a href="http://wiki.pcbsd.org/index.php/Life_Preserver/10.0#Backing_Up_to_a_FreeNAS_System" rel="nofollow">Sending ZFS snapshots via user</a></li>
<li><a href="http://slexy.org/view/s2lzo1swzo" rel="nofollow">Bruce writes in</a></li>
<li><a href="http://slexy.org/view/s20z841ean" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s2QYc8BOAo" rel="nofollow">Jeff writes in</a> - <a href="http://www.nycbug.org/index.cgi?action=dmesgd" rel="nofollow">NYCBUG dmesg list</a></li>
<li><a href="http://slexy.org/view/s2V2e1m7S7" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>42: Devious Methods</title>
  <link>https://www.bsdnow.tv/42</link>
  <guid isPermaLink="false">95dc548f-e688-476d-9fd7-8e78ff3cd16f</guid>
  <pubDate>Wed, 18 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/95dc548f-e688-476d-9fd7-8e78ff3cd16f.mp3" length="60629908" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:24:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.soldierx.com/news/Position-Independent-Executable-Support-Added-FreeBSD" target="_blank" rel="nofollow noopener"&gt;PIE and ASLR in FreeBSD update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A status update for Shawn Webb's ASLR and PIE work for FreeBSD&lt;/li&gt;
&lt;li&gt;One major part of the code, position-independent executable support, has finally been merged into the -CURRENT tree&lt;/li&gt;
&lt;li&gt;"FreeBSD has supported loading PIEs for a while now, but the applications in base weren't compiled as PIEs. Given that ASLR is useless without PIE, getting base compiled with PIE support is a mandatory first step in proper ASLR support"&lt;/li&gt;
&lt;li&gt;If you're running -CURRENT, just add "WITH_PIE=1" to your /etc/src.conf and /etc/make.conf&lt;/li&gt;
&lt;li&gt;The next step is working on the ASLR coding style and getting more developers to look through it&lt;/li&gt;
&lt;li&gt;Shawn will also be at EuroBSDCon (in September) giving an updated version of his BSDCan talk about ASLR
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1347" target="_blank" rel="nofollow noopener"&gt;Misc. pfSense news&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Couple of pfSense news items this week, including some hardware news&lt;/li&gt;
&lt;li&gt;Someone's gotta test the pfSense hardware devices before they're sold, which involves powering them all on at least once&lt;/li&gt;
&lt;li&gt;To make that process faster, they're building a controllable power board (and include some cool pics)&lt;/li&gt;
&lt;li&gt;There will be more info on that device a bit later on&lt;/li&gt;
&lt;li&gt;On Friday, June 27th, there will be &lt;a href="https://blog.pfsense.org/?p=1367" target="_blank" rel="nofollow noopener"&gt;another video session&lt;/a&gt; (for paying customers only...) about virtualized firewalls&lt;/li&gt;
&lt;li&gt;pfSense &lt;a href="https://blog.pfsense.org/?p=1332" target="_blank" rel="nofollow noopener"&gt;University&lt;/a&gt;, a new paid training course, was also announced&lt;/li&gt;
&lt;li&gt;A single two-day class costs $2000, ouch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.delphix.com/matt/2014/06/06/zfs-stripe-width/" target="_blank" rel="nofollow noopener"&gt;ZFS stripe width&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog post from &lt;a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" target="_blank" rel="nofollow noopener"&gt;Matt Ahrens&lt;/a&gt; about ZFS stripe width&lt;/li&gt;
&lt;li&gt;"The popularity of OpenZFS has spawned a great community of users, sysadmins, architects and developers, contributing a wealth of advice, tips and tricks, and rules of thumb on how to configure ZFS. In general, this is a great aspect of the ZFS community, but I’d like to take the opportunity to address one piece of misinformed advice"&lt;/li&gt;
&lt;li&gt;Matt goes through different situations where you would set up your zpool differently, each with their own advantages and disadvantages&lt;/li&gt;
&lt;li&gt;He covers best performance on random IOPS, best reliability, and best space efficiency use cases&lt;/li&gt;
&lt;li&gt;It includes a lot of detail on each one, including graphs, and addresses some misconceptions about different RAID-Z levels' overhead factor
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/078959.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 9.3-BETA3 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The third BETA in the 9.3 release cycle is out, we're slowly getting closer to the release&lt;/li&gt;
&lt;li&gt;This is expected to be the final BETA, next will come the RCs&lt;/li&gt;
&lt;li&gt;There have mostly just been small bug fixes since BETA2, but OpenSSL was also updated and the arc4random code was updated to match what's in -CURRENT (but still isn't using ChaCha20)&lt;/li&gt;
&lt;li&gt;The FreeBSD foundation has &lt;a href="http://freebsdfoundation.blogspot.com/2014/06/freebsd-93-beta3-now-available.html" target="_blank" rel="nofollow noopener"&gt;a blog post&lt;/a&gt; about it too&lt;/li&gt;
&lt;li&gt;There's &lt;a href="https://www.freebsd.org/relnotes/9-STABLE/relnotes/article.html" target="_blank" rel="nofollow noopener"&gt;a list of changes&lt;/a&gt; between 9.2 and 9.3 as well, but we'll be sure to cover it when the -RELEASE hits
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Bryce Chidester - &lt;a href="mailto:brycec@devio.us" target="_blank" rel="nofollow noopener"&gt;brycec@devio.us&lt;/a&gt; / &lt;a href="https://twitter.com/brycied00d" target="_blank" rel="nofollow noopener"&gt;@brycied00d&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Running a BSD shell provider&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/ssh-chaining" target="_blank" rel="nofollow noopener"&gt;Chaining SSH connections&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.linuxquestions.org/questions/*bsd-17/my-freebsd-adventure-continued-4175508055/" target="_blank" rel="nofollow noopener"&gt;My FreeBSD adventure&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A Slackware user from the "linux questions" forum decides to try out BSD, and documents his initial impressions and findings&lt;/li&gt;
&lt;li&gt;After &lt;a href="https://www.linuxquestions.org/questions/*bsd-17/pc-bsd-10-0-is-now-available-4175493047/page2.html#post5142465" target="_blank" rel="nofollow noopener"&gt;ruling out&lt;/a&gt; PCBSD due to the demanding hardware requirements and NetBSD due to "politics" (whatever that means, his words) he decides to start off with FreeBSD 10, but also mentions trying OpenBSD later on&lt;/li&gt;
&lt;li&gt;In his forum post, he covers the documentation (and how easy it makes it for a switcher), dual booting, packages vs ports, network configuration and some other little things&lt;/li&gt;
&lt;li&gt;So far, he seems to really enjoy BSD and thinks that it makes a lot of sense compared to Linux&lt;/li&gt;
&lt;li&gt;Might be an interesting, ongoing series we can follow up on later
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-li-wen-hsu.html" target="_blank" rel="nofollow noopener"&gt;Even more BSDCan trip reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSDCan may be over until next year, but trip reports are still pouring in&lt;/li&gt;
&lt;li&gt;This time we have a summary from Li-Wen Hsu, who was paid for by the FreeBSD foundation&lt;/li&gt;
&lt;li&gt;He's part of the "Jenkins CI for FreeBSD" group and went to BSDCan mostly for that&lt;/li&gt;
&lt;li&gt;Nice long post about all of his experiences at the event, definitely worth a read&lt;/li&gt;
&lt;li&gt;He even talks about... the food
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2096" target="_blank" rel="nofollow noopener"&gt;FreeBSD disk partitioning&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For his latest book series on FreeBSD's GEOM system, MWL asked the hackers mailing list for some clarification&lt;/li&gt;
&lt;li&gt;This erupted into a very &lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-June/045246.html" target="_blank" rel="nofollow noopener"&gt;long discussion&lt;/a&gt; about fdisk vs gnop vs gpart&lt;/li&gt;
&lt;li&gt;So you don't have to read the 500 mailing list posts, he's summarized the findings in a blog post&lt;/li&gt;
&lt;li&gt;It covers MBR vs GPT, disk sector sizes and how to handle all of them with which tools
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.51" target="_blank" rel="nofollow noopener"&gt;BSD Router Project version 1.51&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new version of the BSD Router Project has been released, 1.51&lt;/li&gt;
&lt;li&gt;It's now based on FreeBSD 10-STABLE instead of 10.0-RELEASE&lt;/li&gt;
&lt;li&gt;Includes lots of bugfixes and small updates, as well as some patches from pfSense and elsewhere&lt;/li&gt;
&lt;li&gt;Check the sourceforge page for the complete list of changes&lt;/li&gt;
&lt;li&gt;Bad news... the minimum disk size requirement has increased to 512MB... getting pretty bloated
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21X4hl28g" target="_blank" rel="nofollow noopener"&gt;Fongaboo writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20DELplMw" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2tmazORRN" target="_blank" rel="nofollow noopener"&gt;Kristian writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, openssh, chaining, tor, hopping, jump host, tunnel, vpn, cowsay, 9.3, beta, release, pie, aslr, zfs, zpool, matt ahrens, delphix, foundation, devious, devio.us, bcallah is a noob, shell, shell provider, free, hosting, vps, vpn, ixsystems, tarsnap, bsdcan, report, bsd router project, router, pfsense, m0n0wall, openstack, security, linux, slackware, switching, linux vs bsd, netgate, firewall, university, hangout</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.soldierx.com/news/Position-Independent-Executable-Support-Added-FreeBSD" rel="nofollow">PIE and ASLR in FreeBSD update</a></h3>

<ul>
<li>A status update for Shawn Webb&#39;s ASLR and PIE work for FreeBSD</li>
<li>One major part of the code, position-independent executable support, has finally been merged into the -CURRENT tree</li>
<li>&quot;FreeBSD has supported loading PIEs for a while now, but the applications in base weren&#39;t compiled as PIEs. Given that ASLR is useless without PIE, getting base compiled with PIE support is a mandatory first step in proper ASLR support&quot;</li>
<li>If you&#39;re running -CURRENT, just add &quot;WITH_PIE=1&quot; to your /etc/src.conf and /etc/make.conf</li>
<li>The next step is working on the ASLR coding style and getting more developers to look through it</li>
<li>Shawn will also be at EuroBSDCon (in September) giving an updated version of his BSDCan talk about ASLR
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1347" rel="nofollow">Misc. pfSense news</a></h3>

<ul>
<li>Couple of pfSense news items this week, including some hardware news</li>
<li>Someone&#39;s gotta test the pfSense hardware devices before they&#39;re sold, which involves powering them all on at least once</li>
<li>To make that process faster, they&#39;re building a controllable power board (and include some cool pics)</li>
<li>There will be more info on that device a bit later on</li>
<li>On Friday, June 27th, there will be <a href="https://blog.pfsense.org/?p=1367" rel="nofollow">another video session</a> (for paying customers only...) about virtualized firewalls</li>
<li>pfSense <a href="https://blog.pfsense.org/?p=1332" rel="nofollow">University</a>, a new paid training course, was also announced</li>
<li>A single two-day class costs $2000, ouch
***</li>
</ul>

<h3><a href="http://blog.delphix.com/matt/2014/06/06/zfs-stripe-width/" rel="nofollow">ZFS stripe width</a></h3>

<ul>
<li>A new blog post from <a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matt Ahrens</a> about ZFS stripe width</li>
<li>&quot;The popularity of OpenZFS has spawned a great community of users, sysadmins, architects and developers, contributing a wealth of advice, tips and tricks, and rules of thumb on how to configure ZFS. In general, this is a great aspect of the ZFS community, but I’d like to take the opportunity to address one piece of misinformed advice&quot;</li>
<li>Matt goes through different situations where you would set up your zpool differently, each with their own advantages and disadvantages</li>
<li>He covers best performance on random IOPS, best reliability, and best space efficiency use cases</li>
<li>It includes a lot of detail on each one, including graphs, and addresses some misconceptions about different RAID-Z levels&#39; overhead factor
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/078959.html" rel="nofollow">FreeBSD 9.3-BETA3 released</a></h3>

<ul>
<li>The third BETA in the 9.3 release cycle is out, we&#39;re slowly getting closer to the release</li>
<li>This is expected to be the final BETA, next will come the RCs</li>
<li>There have mostly just been small bug fixes since BETA2, but OpenSSL was also updated and the arc4random code was updated to match what&#39;s in -CURRENT (but still isn&#39;t using ChaCha20)</li>
<li>The FreeBSD foundation has <a href="http://freebsdfoundation.blogspot.com/2014/06/freebsd-93-beta3-now-available.html" rel="nofollow">a blog post</a> about it too</li>
<li>There&#39;s <a href="https://www.freebsd.org/relnotes/9-STABLE/relnotes/article.html" rel="nofollow">a list of changes</a> between 9.2 and 9.3 as well, but we&#39;ll be sure to cover it when the -RELEASE hits
***</li>
</ul>

<h2>Interview - Bryce Chidester - <a href="mailto:brycec@devio.us" rel="nofollow">brycec@devio.us</a> / <a href="https://twitter.com/brycied00d" rel="nofollow">@brycied00d</a></h2>

<p>Running a BSD shell provider</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-chaining" rel="nofollow">Chaining SSH connections</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.linuxquestions.org/questions/*bsd-17/my-freebsd-adventure-continued-4175508055/" rel="nofollow">My FreeBSD adventure</a></h3>

<ul>
<li>A Slackware user from the &quot;linux questions&quot; forum decides to try out BSD, and documents his initial impressions and findings</li>
<li>After <a href="https://www.linuxquestions.org/questions/*bsd-17/pc-bsd-10-0-is-now-available-4175493047/page2.html#post5142465" rel="nofollow">ruling out</a> PCBSD due to the demanding hardware requirements and NetBSD due to &quot;politics&quot; (whatever that means, his words) he decides to start off with FreeBSD 10, but also mentions trying OpenBSD later on</li>
<li>In his forum post, he covers the documentation (and how easy it makes it for a switcher), dual booting, packages vs ports, network configuration and some other little things</li>
<li>So far, he seems to really enjoy BSD and thinks that it makes a lot of sense compared to Linux</li>
<li>Might be an interesting, ongoing series we can follow up on later
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-li-wen-hsu.html" rel="nofollow">Even more BSDCan trip reports</a></h3>

<ul>
<li>BSDCan may be over until next year, but trip reports are still pouring in</li>
<li>This time we have a summary from Li-Wen Hsu, who was paid for by the FreeBSD foundation</li>
<li>He&#39;s part of the &quot;Jenkins CI for FreeBSD&quot; group and went to BSDCan mostly for that</li>
<li>Nice long post about all of his experiences at the event, definitely worth a read</li>
<li>He even talks about... the food
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2096" rel="nofollow">FreeBSD disk partitioning</a></h3>

<ul>
<li>For his latest book series on FreeBSD&#39;s GEOM system, MWL asked the hackers mailing list for some clarification</li>
<li>This erupted into a very <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-June/045246.html" rel="nofollow">long discussion</a> about fdisk vs gnop vs gpart</li>
<li>So you don&#39;t have to read the 500 mailing list posts, he&#39;s summarized the findings in a blog post</li>
<li>It covers MBR vs GPT, disk sector sizes and how to handle all of them with which tools
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.51" rel="nofollow">BSD Router Project version 1.51</a></h3>

<ul>
<li>A new version of the BSD Router Project has been released, 1.51</li>
<li>It&#39;s now based on FreeBSD 10-STABLE instead of 10.0-RELEASE</li>
<li>Includes lots of bugfixes and small updates, as well as some patches from pfSense and elsewhere</li>
<li>Check the sourceforge page for the complete list of changes</li>
<li>Bad news... the minimum disk size requirement has increased to 512MB... getting pretty bloated
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21X4hl28g" rel="nofollow">Fongaboo writes in</a></li>
<li><a href="http://slexy.org/view/s20DELplMw" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2tmazORRN" rel="nofollow">Kristian writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.soldierx.com/news/Position-Independent-Executable-Support-Added-FreeBSD" rel="nofollow">PIE and ASLR in FreeBSD update</a></h3>

<ul>
<li>A status update for Shawn Webb&#39;s ASLR and PIE work for FreeBSD</li>
<li>One major part of the code, position-independent executable support, has finally been merged into the -CURRENT tree</li>
<li>&quot;FreeBSD has supported loading PIEs for a while now, but the applications in base weren&#39;t compiled as PIEs. Given that ASLR is useless without PIE, getting base compiled with PIE support is a mandatory first step in proper ASLR support&quot;</li>
<li>If you&#39;re running -CURRENT, just add &quot;WITH_PIE=1&quot; to your /etc/src.conf and /etc/make.conf</li>
<li>The next step is working on the ASLR coding style and getting more developers to look through it</li>
<li>Shawn will also be at EuroBSDCon (in September) giving an updated version of his BSDCan talk about ASLR
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1347" rel="nofollow">Misc. pfSense news</a></h3>

<ul>
<li>Couple of pfSense news items this week, including some hardware news</li>
<li>Someone&#39;s gotta test the pfSense hardware devices before they&#39;re sold, which involves powering them all on at least once</li>
<li>To make that process faster, they&#39;re building a controllable power board (and include some cool pics)</li>
<li>There will be more info on that device a bit later on</li>
<li>On Friday, June 27th, there will be <a href="https://blog.pfsense.org/?p=1367" rel="nofollow">another video session</a> (for paying customers only...) about virtualized firewalls</li>
<li>pfSense <a href="https://blog.pfsense.org/?p=1332" rel="nofollow">University</a>, a new paid training course, was also announced</li>
<li>A single two-day class costs $2000, ouch
***</li>
</ul>

<h3><a href="http://blog.delphix.com/matt/2014/06/06/zfs-stripe-width/" rel="nofollow">ZFS stripe width</a></h3>

<ul>
<li>A new blog post from <a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matt Ahrens</a> about ZFS stripe width</li>
<li>&quot;The popularity of OpenZFS has spawned a great community of users, sysadmins, architects and developers, contributing a wealth of advice, tips and tricks, and rules of thumb on how to configure ZFS. In general, this is a great aspect of the ZFS community, but I’d like to take the opportunity to address one piece of misinformed advice&quot;</li>
<li>Matt goes through different situations where you would set up your zpool differently, each with their own advantages and disadvantages</li>
<li>He covers best performance on random IOPS, best reliability, and best space efficiency use cases</li>
<li>It includes a lot of detail on each one, including graphs, and addresses some misconceptions about different RAID-Z levels&#39; overhead factor
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/078959.html" rel="nofollow">FreeBSD 9.3-BETA3 released</a></h3>

<ul>
<li>The third BETA in the 9.3 release cycle is out, we&#39;re slowly getting closer to the release</li>
<li>This is expected to be the final BETA, next will come the RCs</li>
<li>There have mostly just been small bug fixes since BETA2, but OpenSSL was also updated and the arc4random code was updated to match what&#39;s in -CURRENT (but still isn&#39;t using ChaCha20)</li>
<li>The FreeBSD foundation has <a href="http://freebsdfoundation.blogspot.com/2014/06/freebsd-93-beta3-now-available.html" rel="nofollow">a blog post</a> about it too</li>
<li>There&#39;s <a href="https://www.freebsd.org/relnotes/9-STABLE/relnotes/article.html" rel="nofollow">a list of changes</a> between 9.2 and 9.3 as well, but we&#39;ll be sure to cover it when the -RELEASE hits
***</li>
</ul>

<h2>Interview - Bryce Chidester - <a href="mailto:brycec@devio.us" rel="nofollow">brycec@devio.us</a> / <a href="https://twitter.com/brycied00d" rel="nofollow">@brycied00d</a></h2>

<p>Running a BSD shell provider</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-chaining" rel="nofollow">Chaining SSH connections</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.linuxquestions.org/questions/*bsd-17/my-freebsd-adventure-continued-4175508055/" rel="nofollow">My FreeBSD adventure</a></h3>

<ul>
<li>A Slackware user from the &quot;linux questions&quot; forum decides to try out BSD, and documents his initial impressions and findings</li>
<li>After <a href="https://www.linuxquestions.org/questions/*bsd-17/pc-bsd-10-0-is-now-available-4175493047/page2.html#post5142465" rel="nofollow">ruling out</a> PCBSD due to the demanding hardware requirements and NetBSD due to &quot;politics&quot; (whatever that means, his words) he decides to start off with FreeBSD 10, but also mentions trying OpenBSD later on</li>
<li>In his forum post, he covers the documentation (and how easy it makes it for a switcher), dual booting, packages vs ports, network configuration and some other little things</li>
<li>So far, he seems to really enjoy BSD and thinks that it makes a lot of sense compared to Linux</li>
<li>Might be an interesting, ongoing series we can follow up on later
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-li-wen-hsu.html" rel="nofollow">Even more BSDCan trip reports</a></h3>

<ul>
<li>BSDCan may be over until next year, but trip reports are still pouring in</li>
<li>This time we have a summary from Li-Wen Hsu, who was paid for by the FreeBSD foundation</li>
<li>He&#39;s part of the &quot;Jenkins CI for FreeBSD&quot; group and went to BSDCan mostly for that</li>
<li>Nice long post about all of his experiences at the event, definitely worth a read</li>
<li>He even talks about... the food
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2096" rel="nofollow">FreeBSD disk partitioning</a></h3>

<ul>
<li>For his latest book series on FreeBSD&#39;s GEOM system, MWL asked the hackers mailing list for some clarification</li>
<li>This erupted into a very <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-June/045246.html" rel="nofollow">long discussion</a> about fdisk vs gnop vs gpart</li>
<li>So you don&#39;t have to read the 500 mailing list posts, he&#39;s summarized the findings in a blog post</li>
<li>It covers MBR vs GPT, disk sector sizes and how to handle all of them with which tools
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.51" rel="nofollow">BSD Router Project version 1.51</a></h3>

<ul>
<li>A new version of the BSD Router Project has been released, 1.51</li>
<li>It&#39;s now based on FreeBSD 10-STABLE instead of 10.0-RELEASE</li>
<li>Includes lots of bugfixes and small updates, as well as some patches from pfSense and elsewhere</li>
<li>Check the sourceforge page for the complete list of changes</li>
<li>Bad news... the minimum disk size requirement has increased to 512MB... getting pretty bloated
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21X4hl28g" rel="nofollow">Fongaboo writes in</a></li>
<li><a href="http://slexy.org/view/s20DELplMw" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2tmazORRN" rel="nofollow">Kristian writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>39: The Friendly Sandbox</title>
  <link>https://www.bsdnow.tv/39</link>
  <guid isPermaLink="false">4ae1b0f5-7c6f-486f-bdcf-c71ec415269c</guid>
  <pubDate>Wed, 28 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4ae1b0f5-7c6f-486f-bdcf-c71ec415269c.mp3" length="45004756" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show we'll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:02:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show we'll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2014/schedule/" target="_blank" rel="nofollow noopener"&gt;BSDCan 2014 talks and reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links&lt;/li&gt;
&lt;li&gt;Karl Lehenbauer's &lt;a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" target="_blank" rel="nofollow noopener"&gt;keynote&lt;/a&gt; (he's on next week's episode)&lt;/li&gt;
&lt;li&gt;Mariusz Zaborski and Pawel Jakub Dawidek,
&lt;a href="https://www.youtube.com/watch?v=0la06FHbdvg" target="_blank" rel="nofollow noopener"&gt;Capsicum and Casper&lt;/a&gt; (relevant to today's interview)&lt;/li&gt;
&lt;li&gt;Luigi Rizzo,
&lt;a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" target="_blank" rel="nofollow noopener"&gt;In-kernel OpenvSwitch on FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Dwayne Hart, &lt;a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" target="_blank" rel="nofollow noopener"&gt;Migrating from Linux to FreeBSD for Backend Data Storage&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Warner Losh, &lt;a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" target="_blank" rel="nofollow noopener"&gt;NAND Flash and FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Simon Gerraty, &lt;a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" target="_blank" rel="nofollow noopener"&gt;FreeBSD bmake and Meta Mode&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Bob Beck, &lt;a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" target="_blank" rel="nofollow noopener"&gt;LibreSSL - The First 30 Days&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Henning Brauer, &lt;a href="https://www.youtube.com/watch?v=cP8AW111IKg" target="_blank" rel="nofollow noopener"&gt;OpenBGPD Turns 10 Years Old&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Arun Thomas, &lt;a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" target="_blank" rel="nofollow noopener"&gt;BSD ARM Kernel Internals&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Peter Hessler, &lt;a href="https://www.youtube.com/watch?v=i8UAVswpagA" target="_blank" rel="nofollow noopener"&gt;Using BGP for Realtime Spam Lists&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Pedro Giffuni, &lt;a href="https://www.youtube.com/watch?v=HMeTxViulgo" target="_blank" rel="nofollow noopener"&gt;Features and Status of FreeBSD's Ext2 Implementation
&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Matt Ahrens, &lt;a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" target="_blank" rel="nofollow noopener"&gt;OpenZFS Upcoming Features and Performance Enhancements&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Daichi Goto, &lt;a href="https://www.youtube.com/watch?v=MsRu0xIawaA" target="_blank" rel="nofollow noopener"&gt;Shellscripts and Commands&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Benno Rice, &lt;a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" target="_blank" rel="nofollow noopener"&gt;Keeping Current&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Sean Bruno, &lt;a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" target="_blank" rel="nofollow noopener"&gt;MIPS Router Hacking&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;John-Mark Gurney, &lt;a href="https://www.youtube.com/watch?v=2qicD0tv_tI" target="_blank" rel="nofollow noopener"&gt;Optimizing GELI Performance&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Patrick Kelsey, &lt;a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" target="_blank" rel="nofollow noopener"&gt;Userspace Networking with libuinet&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Massimiliano Stucchi, &lt;a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" target="_blank" rel="nofollow noopener"&gt;IPv6 Transitioning Mechanisms&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Roger Pau Monné, &lt;a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" target="_blank" rel="nofollow noopener"&gt;Taking the Red Pill&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Shawn Webb, &lt;a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" target="_blank" rel="nofollow noopener"&gt;Introducing ASLR in FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;There's also a &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140519164127" target="_blank" rel="nofollow noopener"&gt;trip report&lt;/a&gt; from Peter Hessler and &lt;a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" target="_blank" rel="nofollow noopener"&gt;one from Julio Merino&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that's a recurring trend)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" target="_blank" rel="nofollow noopener"&gt;Defend your network and privacy with a VPN and OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back&lt;/li&gt;
&lt;li&gt;This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities&lt;/li&gt;
&lt;li&gt;There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used&lt;/li&gt;
&lt;li&gt;You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)&lt;/li&gt;
&lt;li&gt;It also includes a few general privacy tips, recommended browser extensions, etc&lt;/li&gt;
&lt;li&gt;The intro to the article is especially great, so give the whole thing a read&lt;/li&gt;
&lt;li&gt;He mentions our &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;OpenBSD router guide&lt;/a&gt; and other tutorials being a big help for this setup, so hello if you're watching!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pascalj.com/article/you-should-try-freebsd/" target="_blank" rel="nofollow noopener"&gt;You should try FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this blog post, the author talks a bit about how some Linux people aren't familiar with the BSDs and how we can take steps to change that&lt;/li&gt;
&lt;li&gt;He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two&lt;/li&gt;
&lt;li&gt;Possibly the most useful part is how to address the question "my server already works, why bother switching?"&lt;/li&gt;
&lt;li&gt;"Stackoverflow’s answers assume I have apt-get installed"&lt;/li&gt;
&lt;li&gt;It includes mention of the great documentation, stability, ports, improved security and much more&lt;/li&gt;
&lt;li&gt;A takeaway quote for would-be Linux switchers: "I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" target="_blank" rel="nofollow noopener"&gt;OpenBSD and the little Mauritian contributor&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This is a story about a guy from &lt;a href="https://en.wikipedia.org/wiki/Mauritius" target="_blank" rel="nofollow noopener"&gt;Mauritius&lt;/a&gt; named Logan, one of OpenBSD's newest developers&lt;/li&gt;
&lt;li&gt;Back in 2010, he started sending in patched for OpenBSD's "mg" editor, among other small things, and eventually added file transfer resume support for SFTP&lt;/li&gt;
&lt;li&gt;The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon&lt;/li&gt;
&lt;li&gt;It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem&lt;/li&gt;
&lt;li&gt;Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jon Anderson - &lt;a href="mailto:jonathan@freebsd.org" target="_blank" rel="nofollow noopener"&gt;jonathan@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Capsicum and Casperd&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/dnscrypt" target="_blank" rel="nofollow noopener"&gt;Encrypting DNS lookups&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://i.imgur.com/f0qg6Ss.jpg" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal, May 2014 issue&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The newest issue of the &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal&lt;/a&gt; is out, following the bi-monthly release cycle&lt;/li&gt;
&lt;li&gt;This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling&lt;/li&gt;
&lt;li&gt;Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" target="_blank" rel="nofollow noopener"&gt;LibreSSL porting update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Since the last LibreSSL post we covered, a couple unofficial "portable" versions have died off&lt;/li&gt;
&lt;li&gt;Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!&lt;/li&gt;
&lt;li&gt;This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example&lt;/li&gt;
&lt;li&gt;Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" target="_blank" rel="nofollow noopener"&gt;BSDMag May 2014 issue is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The usual monthly release from BSDMag, covering a variety of subjects&lt;/li&gt;
&lt;li&gt;This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things&lt;/li&gt;
&lt;li&gt;It's a free PDF, go grab it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 241&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new episode of &lt;a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" target="_blank" rel="nofollow noopener"&gt;BSDTalk&lt;/a&gt; is out, this time with Bob Beck&lt;/li&gt;
&lt;li&gt;He talks about the OpenBSD foundation's recent activities, his own work in the project, some stories about the hardware in Theo's basement and a lot more&lt;/li&gt;
&lt;li&gt;The interview itself isn't about LibreSSL at all, but they do touch on it a bit too&lt;/li&gt;
&lt;li&gt;Really interesting stuff, covers a lot of different topics in a short amount of time
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;We got a number of replies about last week's VPN question, so thanks to everyone who sent in an email about it - the &lt;a href="https://www.freshports.org/security/vpnc/" target="_blank" rel="nofollow noopener"&gt;vpnc&lt;/a&gt; package seems to be what we were looking for&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20MK7bTyc" target="_blank" rel="nofollow noopener"&gt;Tim writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2OWREQdUA" target="_blank" rel="nofollow noopener"&gt;AJ writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s202obAqbT" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Kye2jAc" target="_blank" rel="nofollow noopener"&gt;Thomas writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2zqFVqwxN" target="_blank" rel="nofollow noopener"&gt;Martin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, casper, casperd, the friendly ghost, capsicum, sandbox, application, jails, isolation, isolated, chroot, virtual machine, exploit, vpn, security, ssh, tunnel, encryption, bsdcan, presentation, talk, video, recordings, dnscrypt, opendns, dnscurve, lookups, dns, dnssec, gateway, vpn, vps, journal, bsdmag, bsdtalk, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show we&#39;ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports</a></h3>

<ul>
<li>The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links</li>
<li>Karl Lehenbauer&#39;s <a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" rel="nofollow">keynote</a> (he&#39;s on next week&#39;s episode)</li>
<li>Mariusz Zaborski and Pawel Jakub Dawidek,
<a href="https://www.youtube.com/watch?v=0la06FHbdvg" rel="nofollow">Capsicum and Casper</a> (relevant to today&#39;s interview)</li>
<li>Luigi Rizzo,
<a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" rel="nofollow">In-kernel OpenvSwitch on FreeBSD</a></li>
<li>Dwayne Hart, <a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" rel="nofollow">Migrating from Linux to FreeBSD for Backend Data Storage</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" rel="nofollow">NAND Flash and FreeBSD</a></li>
<li>Simon Gerraty, <a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" rel="nofollow">FreeBSD bmake and Meta Mode</a></li>
<li>Bob Beck, <a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" rel="nofollow">LibreSSL - The First 30 Days</a></li>
<li>Henning Brauer, <a href="https://www.youtube.com/watch?v=cP8AW111IKg" rel="nofollow">OpenBGPD Turns 10 Years Old</a></li>
<li>Arun Thomas, <a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" rel="nofollow">BSD ARM Kernel Internals</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=i8UAVswpagA" rel="nofollow">Using BGP for Realtime Spam Lists</a></li>
<li>Pedro Giffuni, <a href="https://www.youtube.com/watch?v=HMeTxViulgo" rel="nofollow">Features and Status of FreeBSD&#39;s Ext2 Implementation
</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" rel="nofollow">OpenZFS Upcoming Features and Performance Enhancements</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=MsRu0xIawaA" rel="nofollow">Shellscripts and Commands</a></li>
<li>Benno Rice, <a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" rel="nofollow">Keeping Current</a></li>
<li>Sean Bruno, <a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" rel="nofollow">MIPS Router Hacking</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=2qicD0tv_tI" rel="nofollow">Optimizing GELI Performance</a></li>
<li>Patrick Kelsey, <a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" rel="nofollow">Userspace Networking with libuinet</a></li>
<li>Massimiliano Stucchi, <a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" rel="nofollow">IPv6 Transitioning Mechanisms</a></li>
<li>Roger Pau Monné, <a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" rel="nofollow">Taking the Red Pill</a></li>
<li>Shawn Webb, <a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" rel="nofollow">Introducing ASLR in FreeBSD</a></li>
<li>There&#39;s also a <a href="http://undeadly.org/cgi?action=article&sid=20140519164127" rel="nofollow">trip report</a> from Peter Hessler and <a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" rel="nofollow">one from Julio Merino</a></li>
<li>The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that&#39;s a recurring trend)
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy with a VPN and OpenBSD</a></h3>

<ul>
<li>After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back</li>
<li>This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities</li>
<li>There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used</li>
<li>You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)</li>
<li>It also includes a few general privacy tips, recommended browser extensions, etc</li>
<li>The intro to the article is especially great, so give the whole thing a read</li>
<li>He mentions our <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD router guide</a> and other tutorials being a big help for this setup, so hello if you&#39;re watching!
***</li>
</ul>

<h3><a href="http://blog.pascalj.com/article/you-should-try-freebsd/" rel="nofollow">You should try FreeBSD</a></h3>

<ul>
<li>In this blog post, the author talks a bit about how some Linux people aren&#39;t familiar with the BSDs and how we can take steps to change that</li>
<li>He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two</li>
<li>Possibly the most useful part is how to address the question &quot;my server already works, why bother switching?&quot;</li>
<li>&quot;Stackoverflow’s answers assume I have apt-get installed&quot;</li>
<li>It includes mention of the great documentation, stability, ports, improved security and much more</li>
<li>A takeaway quote for would-be Linux switchers: &quot;I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before&quot;
***</li>
</ul>

<h3><a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" rel="nofollow">OpenBSD and the little Mauritian contributor</a></h3>

<ul>
<li>This is a story about a guy from <a href="https://en.wikipedia.org/wiki/Mauritius" rel="nofollow">Mauritius</a> named Logan, one of OpenBSD&#39;s newest developers</li>
<li>Back in 2010, he started sending in patched for OpenBSD&#39;s &quot;mg&quot; editor, among other small things, and eventually added file transfer resume support for SFTP</li>
<li>The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon</li>
<li>It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem</li>
<li>Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***</li>
</ul>

<h2>Interview - Jon Anderson - <a href="mailto:jonathan@freebsd.org" rel="nofollow">jonathan@freebsd.org</a></h2>

<p>Capsicum and Casperd</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnscrypt" rel="nofollow">Encrypting DNS lookups</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://i.imgur.com/f0qg6Ss.jpg" rel="nofollow">FreeBSD Journal, May 2014 issue</a></h3>

<ul>
<li>The newest issue of the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a> is out, following the bi-monthly release cycle</li>
<li>This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling</li>
<li>Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" rel="nofollow">LibreSSL porting update</a></h3>

<ul>
<li>Since the last LibreSSL post we covered, a couple unofficial &quot;portable&quot; versions have died off</li>
<li>Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!</li>
<li>This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example</li>
<li>Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" rel="nofollow">BSDMag May 2014 issue is out</a></h3>

<ul>
<li>The usual monthly release from BSDMag, covering a variety of subjects</li>
<li>This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things</li>
<li>It&#39;s a free PDF, go grab it
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" rel="nofollow">BSDTalk episode 241</a></h3>

<ul>
<li>A new episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, this time with Bob Beck</li>
<li>He talks about the OpenBSD foundation&#39;s recent activities, his own work in the project, some stories about the hardware in Theo&#39;s basement and a lot more</li>
<li>The interview itself isn&#39;t about LibreSSL at all, but they do touch on it a bit too</li>
<li>Really interesting stuff, covers a lot of different topics in a short amount of time
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>We got a number of replies about last week&#39;s VPN question, so thanks to everyone who sent in an email about it - the <a href="https://www.freshports.org/security/vpnc/" rel="nofollow">vpnc</a> package seems to be what we were looking for</li>
<li><a href="http://slexy.org/view/s20MK7bTyc" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s2OWREQdUA" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s202obAqbT" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21Kye2jAc" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s2zqFVqwxN" rel="nofollow">Martin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show we&#39;ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports</a></h3>

<ul>
<li>The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links</li>
<li>Karl Lehenbauer&#39;s <a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" rel="nofollow">keynote</a> (he&#39;s on next week&#39;s episode)</li>
<li>Mariusz Zaborski and Pawel Jakub Dawidek,
<a href="https://www.youtube.com/watch?v=0la06FHbdvg" rel="nofollow">Capsicum and Casper</a> (relevant to today&#39;s interview)</li>
<li>Luigi Rizzo,
<a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" rel="nofollow">In-kernel OpenvSwitch on FreeBSD</a></li>
<li>Dwayne Hart, <a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" rel="nofollow">Migrating from Linux to FreeBSD for Backend Data Storage</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" rel="nofollow">NAND Flash and FreeBSD</a></li>
<li>Simon Gerraty, <a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" rel="nofollow">FreeBSD bmake and Meta Mode</a></li>
<li>Bob Beck, <a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" rel="nofollow">LibreSSL - The First 30 Days</a></li>
<li>Henning Brauer, <a href="https://www.youtube.com/watch?v=cP8AW111IKg" rel="nofollow">OpenBGPD Turns 10 Years Old</a></li>
<li>Arun Thomas, <a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" rel="nofollow">BSD ARM Kernel Internals</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=i8UAVswpagA" rel="nofollow">Using BGP for Realtime Spam Lists</a></li>
<li>Pedro Giffuni, <a href="https://www.youtube.com/watch?v=HMeTxViulgo" rel="nofollow">Features and Status of FreeBSD&#39;s Ext2 Implementation
</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" rel="nofollow">OpenZFS Upcoming Features and Performance Enhancements</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=MsRu0xIawaA" rel="nofollow">Shellscripts and Commands</a></li>
<li>Benno Rice, <a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" rel="nofollow">Keeping Current</a></li>
<li>Sean Bruno, <a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" rel="nofollow">MIPS Router Hacking</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=2qicD0tv_tI" rel="nofollow">Optimizing GELI Performance</a></li>
<li>Patrick Kelsey, <a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" rel="nofollow">Userspace Networking with libuinet</a></li>
<li>Massimiliano Stucchi, <a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" rel="nofollow">IPv6 Transitioning Mechanisms</a></li>
<li>Roger Pau Monné, <a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" rel="nofollow">Taking the Red Pill</a></li>
<li>Shawn Webb, <a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" rel="nofollow">Introducing ASLR in FreeBSD</a></li>
<li>There&#39;s also a <a href="http://undeadly.org/cgi?action=article&sid=20140519164127" rel="nofollow">trip report</a> from Peter Hessler and <a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" rel="nofollow">one from Julio Merino</a></li>
<li>The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that&#39;s a recurring trend)
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy with a VPN and OpenBSD</a></h3>

<ul>
<li>After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back</li>
<li>This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities</li>
<li>There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used</li>
<li>You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)</li>
<li>It also includes a few general privacy tips, recommended browser extensions, etc</li>
<li>The intro to the article is especially great, so give the whole thing a read</li>
<li>He mentions our <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD router guide</a> and other tutorials being a big help for this setup, so hello if you&#39;re watching!
***</li>
</ul>

<h3><a href="http://blog.pascalj.com/article/you-should-try-freebsd/" rel="nofollow">You should try FreeBSD</a></h3>

<ul>
<li>In this blog post, the author talks a bit about how some Linux people aren&#39;t familiar with the BSDs and how we can take steps to change that</li>
<li>He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two</li>
<li>Possibly the most useful part is how to address the question &quot;my server already works, why bother switching?&quot;</li>
<li>&quot;Stackoverflow’s answers assume I have apt-get installed&quot;</li>
<li>It includes mention of the great documentation, stability, ports, improved security and much more</li>
<li>A takeaway quote for would-be Linux switchers: &quot;I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before&quot;
***</li>
</ul>

<h3><a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" rel="nofollow">OpenBSD and the little Mauritian contributor</a></h3>

<ul>
<li>This is a story about a guy from <a href="https://en.wikipedia.org/wiki/Mauritius" rel="nofollow">Mauritius</a> named Logan, one of OpenBSD&#39;s newest developers</li>
<li>Back in 2010, he started sending in patched for OpenBSD&#39;s &quot;mg&quot; editor, among other small things, and eventually added file transfer resume support for SFTP</li>
<li>The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon</li>
<li>It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem</li>
<li>Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***</li>
</ul>

<h2>Interview - Jon Anderson - <a href="mailto:jonathan@freebsd.org" rel="nofollow">jonathan@freebsd.org</a></h2>

<p>Capsicum and Casperd</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnscrypt" rel="nofollow">Encrypting DNS lookups</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://i.imgur.com/f0qg6Ss.jpg" rel="nofollow">FreeBSD Journal, May 2014 issue</a></h3>

<ul>
<li>The newest issue of the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a> is out, following the bi-monthly release cycle</li>
<li>This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling</li>
<li>Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" rel="nofollow">LibreSSL porting update</a></h3>

<ul>
<li>Since the last LibreSSL post we covered, a couple unofficial &quot;portable&quot; versions have died off</li>
<li>Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!</li>
<li>This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example</li>
<li>Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" rel="nofollow">BSDMag May 2014 issue is out</a></h3>

<ul>
<li>The usual monthly release from BSDMag, covering a variety of subjects</li>
<li>This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things</li>
<li>It&#39;s a free PDF, go grab it
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" rel="nofollow">BSDTalk episode 241</a></h3>

<ul>
<li>A new episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, this time with Bob Beck</li>
<li>He talks about the OpenBSD foundation&#39;s recent activities, his own work in the project, some stories about the hardware in Theo&#39;s basement and a lot more</li>
<li>The interview itself isn&#39;t about LibreSSL at all, but they do touch on it a bit too</li>
<li>Really interesting stuff, covers a lot of different topics in a short amount of time
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>We got a number of replies about last week&#39;s VPN question, so thanks to everyone who sent in an email about it - the <a href="https://www.freshports.org/security/vpnc/" rel="nofollow">vpnc</a> package seems to be what we were looking for</li>
<li><a href="http://slexy.org/view/s20MK7bTyc" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s2OWREQdUA" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s202obAqbT" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21Kye2jAc" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s2zqFVqwxN" rel="nofollow">Martin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>38: A BUG's Life</title>
  <link>https://www.bsdnow.tv/38</link>
  <guid isPermaLink="false">01510b66-38e5-40ac-a282-9bff71cb55d9</guid>
  <pubDate>Wed, 21 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/01510b66-38e5-40ac-a282-9bff71cb55d9.mp3" length="63768244" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:28:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2053" target="_blank" rel="nofollow noopener"&gt;FreeBSD 11 goals and discussion&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Something that actually happened at BSDCan this year...&lt;/li&gt;
&lt;li&gt;During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE&lt;/li&gt;
&lt;li&gt;Some of MWL's notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support&lt;/li&gt;
&lt;li&gt;A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more&lt;/li&gt;
&lt;li&gt;There's also some notes from the &lt;a href="http://blather.michaelwlucas.com/archives/2060" target="_blank" rel="nofollow noopener"&gt;devsummit virtualization session&lt;/a&gt;, mostly talking about bhyve&lt;/li&gt;
&lt;li&gt;Lastly, he also provides some notes about &lt;a href="http://blather.michaelwlucas.com/archives/2065" target="_blank" rel="nofollow noopener"&gt;ports and packages&lt;/a&gt; and where they're going
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" target="_blank" rel="nofollow noopener"&gt;An SSH honeypot with OpenBSD and Kippo&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Everyone loves messing with script kiddies, right?&lt;/li&gt;
&lt;li&gt;This blog post introduces &lt;a href="https://code.google.com/p/kippo/" target="_blank" rel="nofollow noopener"&gt;Kippo&lt;/a&gt;, an SSH honeypot tool, and how to use it in combination with OpenBSD&lt;/li&gt;
&lt;li&gt;It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely&lt;/li&gt;
&lt;li&gt;You can use this to get new 0day exploits or find weaknesses in your systems&lt;/li&gt;
&lt;li&gt;OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.netbsd.org/foundation/reports/financial/2013.html" target="_blank" rel="nofollow noopener"&gt;NetBSD foundation financial report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The NetBSD foundation has posted their 2013 financial report&lt;/li&gt;
&lt;li&gt;It's a very "no nonsense" page, pretty much only the hard numbers&lt;/li&gt;
&lt;li&gt;In 2013, they got $26,000 of income in donations&lt;/li&gt;
&lt;li&gt;The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else&lt;/li&gt;
&lt;li&gt;Be sure to donate to whichever BSDs you like and use!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Building a fully-encrypted NAS with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you're doing&lt;/li&gt;
&lt;li&gt;This article takes a look at the OpenBSD side and &lt;a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" target="_blank" rel="nofollow noopener"&gt;explains how&lt;/a&gt; to build a NAS with security in mind&lt;/li&gt;
&lt;li&gt;The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected&lt;/li&gt;
&lt;li&gt;The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people's needs too&lt;/li&gt;
&lt;li&gt;There's also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Brian Callahan &amp;amp; Aaron Bieber - &lt;a href="mailto:admin@lists.nycbug.org" target="_blank" rel="nofollow noopener"&gt;admin@lists.nycbug.org&lt;/a&gt; &amp;amp; &lt;a href="mailto:admin@cobug.org" target="_blank" rel="nofollow noopener"&gt;admin@cobug.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Forming a local BSD Users Group&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/pkgsrc" target="_blank" rel="nofollow noopener"&gt;The basics of pkgsrc&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" target="_blank" rel="nofollow noopener"&gt;FreeBSD periodic mails vs. monitoring&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've ever been an admin for a lot of FreeBSD boxes, you've probably noticed that you get a lot of email&lt;/li&gt;
&lt;li&gt;This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them&lt;/li&gt;
&lt;li&gt;From bad SSH logins to Zabbix alerts, it all adds up quickly&lt;/li&gt;
&lt;li&gt;It highlights the periodic.conf file and FreeBSD's periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.skogsrud.net/?p=44" target="_blank" rel="nofollow noopener"&gt;Doing cool stuff with OpenBSD routing domains&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A blog post from our viewer and regular emailer, Kjell-Aleksander!&lt;/li&gt;
&lt;li&gt;He manages some internally-routed IP ranges at his work, but didn't want to have equipment for each separate project&lt;/li&gt;
&lt;li&gt;This is where OpenBSD routing domains and pf come in to save the day&lt;/li&gt;
&lt;li&gt;The blog post goes through the process with all the network details you could ever dream of&lt;/li&gt;
&lt;li&gt;He even &lt;a href="http://i.imgur.com/penYQFP.jpg" target="_blank" rel="nofollow noopener"&gt;named his networking equipment... after us&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" target="_blank" rel="nofollow noopener"&gt;LibreSSL, the good and the bad&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We're all probably familiar with OpenBSD's fork of OpenSSL at this point&lt;/li&gt;
&lt;li&gt;However, "for those of you that don't know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk"&lt;/li&gt;
&lt;li&gt;This article talks about some of the cryptographic development challenges involved with maintaining such a massive project&lt;/li&gt;
&lt;li&gt;You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled&lt;/li&gt;
&lt;li&gt;It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lots going on in PCBSD land this week, AppCafe has been redesigned&lt;/li&gt;
&lt;li&gt;The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update&lt;/li&gt;
&lt;li&gt;In the more &lt;a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" target="_blank" rel="nofollow noopener"&gt;recent post&lt;/a&gt;, there's some further explanation of the PBI system and the reason for the transition&lt;/li&gt;
&lt;li&gt;It's got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2UbEhgjce" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21XU0y3JP" target="_blank" rel="nofollow noopener"&gt;Daniel writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2QQtuawFl" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20XrT5Q8U" target="_blank" rel="nofollow noopener"&gt;tsyn writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2ayZ1nsdv" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, bug, bsd user group, users group, community, lug, uug, unix users group, packages, signing, binary, source, compile, ports, nycbug, nycbsdcon, cobug, colorado, new york, conference, presentation, 11.0, ssh, honeypot, script kiddies, kippo, foundation, financial report, encrypted, nas, network attached storage, full disk encryption, periodic, routing domains, pf, the book of pf, third edition, 3rd edition, cron, monitoring, openssl, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>24: The Cluster &amp; The Cloud</title>
  <link>https://www.bsdnow.tv/24</link>
  <guid isPermaLink="false">4472f6f6-5fb3-4ee9-b20c-04e927cf1299</guid>
  <pubDate>Wed, 12 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4472f6f6-5fb3-4ee9-b20c-04e927cf1299.mp3" length="50214172" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:09:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10 as a firewall&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead&lt;/li&gt;
&lt;li&gt;Now, with the release of 10.0, he's apparently changed his mind and switched back over&lt;/li&gt;
&lt;li&gt;It mentions the SMP version of pf, general performance advantages and more modern features&lt;/li&gt;
&lt;li&gt;The author is a regular listener of BSD Now, hi Joe!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" target="_blank" rel="nofollow noopener"&gt;Network Noise Reduction Using Free Tools&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD&lt;/li&gt;
&lt;li&gt;Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD's spamd and other security features to combat spam and malware&lt;/li&gt;
&lt;li&gt;He goes through his experiences with content filtering and disappointment with a certain proprietary vendor&lt;/li&gt;
&lt;li&gt;Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" target="_blank" rel="nofollow noopener"&gt;FreeBSD ASLR patches submitted&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;So far, FreeBSD hasn't had Address Space Layout Randomization&lt;/li&gt;
&lt;li&gt;ASLR is a nice security feature, &lt;a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" target="_blank" rel="nofollow noopener"&gt;see wikipedia&lt;/a&gt; for more information&lt;/li&gt;
&lt;li&gt;With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)&lt;/li&gt;
&lt;li&gt;We might have Shawn on the show to talk about it, but he's also giving a presentation at BSDCan about his work with ASLR
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" target="_blank" rel="nofollow noopener"&gt;Old-style pkg_ tools retired&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;At last the old pkg_add tools are being retired in FreeBSD&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;pkgng&lt;/a&gt; is a huge improvement, and now portmgr@ thinks it's time to cut the cord on the legacy toolset&lt;/li&gt;
&lt;li&gt;Ports aren't going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go&lt;/li&gt;
&lt;li&gt;All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Luke Marsden - &lt;a href="mailto:luke@hybridcluster.com" target="_blank" rel="nofollow noopener"&gt;luke@hybridcluster.com&lt;/a&gt; / &lt;a href="https://twitter.com/lmarsden" target="_blank" rel="nofollow noopener"&gt;@lmarsden&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD at HybridCluster&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/chroot-sftp" target="_blank" rel="nofollow noopener"&gt;Filesharing with chrooted SFTP&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://pellaeon.github.io/bsd-cloudinit/" target="_blank" rel="nofollow noopener"&gt;FreeBSD on OpenStack&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/OpenStack" target="_blank" rel="nofollow noopener"&gt;OpenStack&lt;/a&gt; is a cloud computing project&lt;/li&gt;
&lt;li&gt;It consists of "a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API."&lt;/li&gt;
&lt;li&gt;Until now, there wasn't a good way to run a full BSD instance on OpenStack&lt;/li&gt;
&lt;li&gt;With a project in the vein of &lt;a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" target="_blank" rel="nofollow noopener"&gt;Colin Percival&lt;/a&gt;'s AWS startup scripts, now that's no longer the case! 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://fosdem.org/2014/schedule/track/bsd/" target="_blank" rel="nofollow noopener"&gt;FOSDEM BSD videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's FOSDEM had seven BSD presentations&lt;/li&gt;
&lt;li&gt;The videos are &lt;a href="https://video.fosdem.org/2014/" target="_blank" rel="nofollow noopener"&gt;slowly being uploaded&lt;/a&gt; for your viewing pleasure&lt;/li&gt;
&lt;li&gt;Not all of the BSD ones are up yet, but by the time you're watching this they might be!&lt;/li&gt;
&lt;li&gt;Check &lt;a href="https://video.fosdem.org/2014/AW1121/Saturday/" target="_blank" rel="nofollow noopener"&gt;this directory&lt;/a&gt; for most of 'em&lt;/li&gt;
&lt;li&gt;The BSD dev room was full, lots of interest in what's going on from the other communities
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD challenge finally returns!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Due to prodding from a certain guy of a certain podcast, the "FreeBSD Challenge" series has finally resumed&lt;/li&gt;
&lt;li&gt;Our friend from the Linux foundation picks up with &lt;a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" target="_blank" rel="nofollow noopener"&gt;day 11&lt;/a&gt; and &lt;a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" target="_blank" rel="nofollow noopener"&gt;day 12&lt;/a&gt; on his switching from Linux journey&lt;/li&gt;
&lt;li&gt;This time he outlines the upgrade process of going from 9 to 10, using freebsd-update&lt;/li&gt;
&lt;li&gt;There's also some notes about different options for upgrading ports and some extra tips
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while&lt;/li&gt;
&lt;li&gt;During their "fine tuning phase" users are encouraged to submit any and all bugs via the trac system&lt;/li&gt;
&lt;li&gt;Warden got some fixes and the package manager got some updates as well&lt;/li&gt;
&lt;li&gt;Huge size reduction in PBI format
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21nbJKYmb" target="_blank" rel="nofollow noopener"&gt;Derrick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2yhziVsBP" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20PuccWbo" target="_blank" rel="nofollow noopener"&gt;Patrick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s22PL0SbUO" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20dkbjuOK" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, cluster, cloud, cloud computing, hybridcluster, jails, scaling, virtualization, zfs, big data, provisioning, webhosting, instances, web hosting, chroot, sftp, filesharing, file sharing, shell, linux, switching to bsd, linux user, smp, pkg_add, pkg, pkgng, binary packages, openstack, open stack, httperf, performance, http, vpn, nycbsdcon, nycbug, nyc, conference, convention, talks, presentation, keynote, ssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>23: Time Signatures</title>
  <link>https://www.bsdnow.tv/23</link>
  <guid isPermaLink="false">d9e9eb7a-e7aa-4029-8881-05cc5f75e8b6</guid>
  <pubDate>Wed, 05 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d9e9eb7a-e7aa-4029-8881-05cc5f75e8b6.mp3" length="54539109" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this week's episode, we'll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we've got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:15:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;On this week's episode, we'll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we've got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation's 2013 fundraising results&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation finally counted all the money they made in 2013&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;$768,562 from 1659 donors&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Nice little blog post from the team with a giant beastie picture&lt;/li&gt;
&lt;li&gt;"We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon."&lt;/li&gt;
&lt;li&gt;A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.5 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned the CFT last week, and it's &lt;a href="https://news.ycombinator.com/item?id=7154925" target="_blank" rel="nofollow noopener"&gt;finally here&lt;/a&gt;!&lt;/li&gt;
&lt;li&gt;New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein's Curve25519 (now the default when both clients support it)&lt;/li&gt;
&lt;li&gt;Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA&lt;/li&gt;
&lt;li&gt;Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes &lt;a href="http://slexy.org/view/s2rI13v8F4" target="_blank" rel="nofollow noopener"&gt;can't even attempt to login&lt;/a&gt; lol~&lt;/li&gt;
&lt;li&gt;New bcrypt private key type, 500,000,000 times harder to brute force&lt;/li&gt;
&lt;li&gt;Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one&lt;/li&gt;
&lt;li&gt;Portable version &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=261320" target="_blank" rel="nofollow noopener"&gt;already in&lt;/a&gt; FreeBSD -CURRENT, &lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;sortby=date&amp;amp;revision=342618" target="_blank" rel="nofollow noopener"&gt;and ports&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Lots more bugfixes and features, see the full release note or &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;our interview&lt;/a&gt; with Damien&lt;/li&gt;
&lt;li&gt;Work has already started on 6.6, which &lt;a href="https://twitter.com/msfriedl/status/427902493176377344" target="_blank" rel="nofollow noopener"&gt;can be used without OpenSSL&lt;/a&gt;!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/1942" target="_blank" rel="nofollow noopener"&gt;Crazed Ferrets in a Berkeley Shower&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In 2000, &lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;MWL&lt;/a&gt; wrote an essay for linux.com about why he uses the BSD license: "It’s actually stood up fairly well to the test of time, but it’s fourteen years old now."&lt;/li&gt;
&lt;li&gt;This is basically an updated version about why he uses the BSD license, in response to recent &lt;a href="http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html" target="_blank" rel="nofollow noopener"&gt;comments from Richard Stallman&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL&lt;/li&gt;
&lt;li&gt;Check out the full post if you're one of those people that gets into license arguments&lt;/li&gt;
&lt;li&gt;The takeaway is "BSD is about making the world a better place. For everyone."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black" target="_blank" rel="nofollow noopener"&gt;OpenBSD on BeagleBone Black&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi&lt;/li&gt;
&lt;li&gt;A blog post about installing OpenBSD on a BBB from.. our guest for today!&lt;/li&gt;
&lt;li&gt;He describes it as "everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black"&lt;/li&gt;
&lt;li&gt;It goes through the whole process, details different storage options and some workarounds&lt;/li&gt;
&lt;li&gt;Could be a really fun weekend project if you're interested in small or embedded devices
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ted Unangst - &lt;a href="mailto:tedu@openbsd.org" target="_blank" rel="nofollow noopener"&gt;tedu@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/tedunangst" target="_blank" rel="nofollow noopener"&gt;@tedunangst&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenBSD's &lt;a href="http://www.tedunangst.com/flak/post/signify" target="_blank" rel="nofollow noopener"&gt;signify&lt;/a&gt; infrastructure, ZFS on OpenBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener"&gt;Running an NTP server&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://smyck.net/2014/02/01/getting-started-with-freebsd/" target="_blank" rel="nofollow noopener"&gt;Getting started with FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new video and blog series about starting out with FreeBSD&lt;/li&gt;
&lt;li&gt;The author has been a fan since the 90s and has installed it on every server he's worked with&lt;/li&gt;
&lt;li&gt;He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users&lt;/li&gt;
&lt;li&gt;The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140204080515" target="_blank" rel="nofollow noopener"&gt;More OpenBSD hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience&lt;/li&gt;
&lt;li&gt;He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work&lt;/li&gt;
&lt;li&gt;This summary goes into detail about all the stuff he got done there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=261266" target="_blank" rel="nofollow noopener"&gt;X11 in a jail&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!&lt;/li&gt;
&lt;li&gt;A new tunable option will let jails access /dev/kmem and similar device nodes&lt;/li&gt;
&lt;li&gt;Along with a change to DRM, this allows full X11 in a jail&lt;/li&gt;
&lt;li&gt;Be sure to check out our &lt;a href="http://www.bsdnow.tv/tutorials" target="_blank" rel="nofollow noopener"&gt;jail tutorial and jailed VNC tutorial&lt;/a&gt; for ideas
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;10.0 "Joule Edition" &lt;a href="http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/" target="_blank" rel="nofollow noopener"&gt;finally released&lt;/a&gt;!&lt;/li&gt;
&lt;li&gt;AMD graphics are now officially supported&lt;/li&gt;
&lt;li&gt;GNOME3, MATE and Cinnamon desktops are available&lt;/li&gt;
&lt;li&gt;Grub updates and fixes&lt;/li&gt;
&lt;li&gt;PCBSD also &lt;a href="http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html" target="_blank" rel="nofollow noopener"&gt;got a mention in eweek&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21VnbKZsH" target="_blank" rel="nofollow noopener"&gt;Justin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2nD7RF6bo" target="_blank" rel="nofollow noopener"&gt;Daniel writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2jwRrj7UV" target="_blank" rel="nofollow noopener"&gt;Martin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s201koMD2c" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt; - &lt;a href="http://people.freebsd.org/%7Egjb/RPI/" target="_blank" rel="nofollow noopener"&gt;unofficial FreeBSD RPI Images&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2AntZmtRU" target="_blank" rel="nofollow noopener"&gt;James writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20bGjMsIQ" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, security, gpg, gnupg, signed, packages, iso, set, patches, ted unangst, verify, verification, digital signature, ed25519, chacha20, license, debate, gnu, gpl, general public license, copyleft, copyfree, free software, open source, rms, richard stallman, clang, llvm, cddl, linux, gplv2, gplv3, ntp, ntpd, openntpd, isc, network time protocol, server, ssh, openssh, 6.5, foundation, donations, gcm, aes, aes-gcm, hmac, arm, armv7, beaglebone, black, serial, tty, zol, leaseweb, zfsonlinux, ecc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we&#39;ve got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html" rel="nofollow">FreeBSD foundation&#39;s 2013 fundraising results</a></h3>

<ul>
<li>The FreeBSD foundation finally counted all the money they made in 2013</li>
<li><strong>$768,562 from 1659 donors</strong></li>
<li>Nice little blog post from the team with a giant beastie picture</li>
<li>&quot;We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon.&quot;</li>
<li>A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html" rel="nofollow">OpenSSH 6.5 released</a></h3>

<ul>
<li>We mentioned the CFT last week, and it&#39;s <a href="https://news.ycombinator.com/item?id=7154925" rel="nofollow">finally here</a>!</li>
<li>New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein&#39;s Curve25519 (now the default when both clients support it)</li>
<li>Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA</li>
<li>Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes <a href="http://slexy.org/view/s2rI13v8F4" rel="nofollow">can&#39;t even attempt to login</a> lol~</li>
<li>New bcrypt private key type, 500,000,000 times harder to brute force</li>
<li>Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one</li>
<li>Portable version <a href="https://svnweb.freebsd.org/base?view=revision&revision=261320" rel="nofollow">already in</a> FreeBSD -CURRENT, <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=342618" rel="nofollow">and ports</a></li>
<li>Lots more bugfixes and features, see the full release note or <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">our interview</a> with Damien</li>
<li>Work has already started on 6.6, which <a href="https://twitter.com/msfriedl/status/427902493176377344" rel="nofollow">can be used without OpenSSL</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1942" rel="nofollow">Crazed Ferrets in a Berkeley Shower</a></h3>

<ul>
<li>In 2000, <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> wrote an essay for linux.com about why he uses the BSD license: &quot;It’s actually stood up fairly well to the test of time, but it’s fourteen years old now.&quot;</li>
<li>This is basically an updated version about why he uses the BSD license, in response to recent <a href="http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html" rel="nofollow">comments from Richard Stallman</a></li>
<li>Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL</li>
<li>Check out the full post if you&#39;re one of those people that gets into license arguments</li>
<li>The takeaway is &quot;BSD is about making the world a better place. For everyone.&quot;
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black" rel="nofollow">OpenBSD on BeagleBone Black</a></h3>

<ul>
<li>Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi</li>
<li>A blog post about installing OpenBSD on a BBB from.. our guest for today!</li>
<li>He describes it as &quot;everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black&quot;</li>
<li>It goes through the whole process, details different storage options and some workarounds</li>
<li>Could be a really fun weekend project if you&#39;re interested in small or embedded devices
***</li>
</ul>

<h2>Interview - Ted Unangst - <a href="mailto:tedu@openbsd.org" rel="nofollow">tedu@openbsd.org</a> / <a href="https://twitter.com/tedunangst" rel="nofollow">@tedunangst</a></h2>

<p>OpenBSD&#39;s <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">signify</a> infrastructure, ZFS on OpenBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">Running an NTP server</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://smyck.net/2014/02/01/getting-started-with-freebsd/" rel="nofollow">Getting started with FreeBSD</a></h3>

<ul>
<li>A new video and blog series about starting out with FreeBSD</li>
<li>The author has been a fan since the 90s and has installed it on every server he&#39;s worked with</li>
<li>He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users</li>
<li>The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140204080515" rel="nofollow">More OpenBSD hackathon reports</a></h3>

<ul>
<li>As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience</li>
<li>He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work</li>
<li>This summary goes into detail about all the stuff he got done there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=261266" rel="nofollow">X11 in a jail</a></h3>

<ul>
<li>We&#39;ve gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!</li>
<li>A new tunable option will let jails access /dev/kmem and similar device nodes</li>
<li>Along with a change to DRM, this allows full X11 in a jail</li>
<li>Be sure to check out our <a href="http://www.bsdnow.tv/tutorials" rel="nofollow">jail tutorial and jailed VNC tutorial</a> for ideas
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 &quot;Joule Edition&quot; <a href="http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/" rel="nofollow">finally released</a>!</li>
<li>AMD graphics are now officially supported</li>
<li>GNOME3, MATE and Cinnamon desktops are available</li>
<li>Grub updates and fixes</li>
<li>PCBSD also <a href="http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html" rel="nofollow">got a mention in eweek</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21VnbKZsH" rel="nofollow">Justin writes in</a></li>
<li><a href="http://slexy.org/view/s2nD7RF6bo" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2jwRrj7UV" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s201koMD2c" rel="nofollow">Alex writes in</a> - <a href="http://people.freebsd.org/%7Egjb/RPI/" rel="nofollow">unofficial FreeBSD RPI Images</a></li>
<li><a href="http://slexy.org/view/s2AntZmtRU" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20bGjMsIQ" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we&#39;ve got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html" rel="nofollow">FreeBSD foundation&#39;s 2013 fundraising results</a></h3>

<ul>
<li>The FreeBSD foundation finally counted all the money they made in 2013</li>
<li><strong>$768,562 from 1659 donors</strong></li>
<li>Nice little blog post from the team with a giant beastie picture</li>
<li>&quot;We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon.&quot;</li>
<li>A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html" rel="nofollow">OpenSSH 6.5 released</a></h3>

<ul>
<li>We mentioned the CFT last week, and it&#39;s <a href="https://news.ycombinator.com/item?id=7154925" rel="nofollow">finally here</a>!</li>
<li>New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein&#39;s Curve25519 (now the default when both clients support it)</li>
<li>Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA</li>
<li>Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes <a href="http://slexy.org/view/s2rI13v8F4" rel="nofollow">can&#39;t even attempt to login</a> lol~</li>
<li>New bcrypt private key type, 500,000,000 times harder to brute force</li>
<li>Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one</li>
<li>Portable version <a href="https://svnweb.freebsd.org/base?view=revision&revision=261320" rel="nofollow">already in</a> FreeBSD -CURRENT, <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=342618" rel="nofollow">and ports</a></li>
<li>Lots more bugfixes and features, see the full release note or <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">our interview</a> with Damien</li>
<li>Work has already started on 6.6, which <a href="https://twitter.com/msfriedl/status/427902493176377344" rel="nofollow">can be used without OpenSSL</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1942" rel="nofollow">Crazed Ferrets in a Berkeley Shower</a></h3>

<ul>
<li>In 2000, <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> wrote an essay for linux.com about why he uses the BSD license: &quot;It’s actually stood up fairly well to the test of time, but it’s fourteen years old now.&quot;</li>
<li>This is basically an updated version about why he uses the BSD license, in response to recent <a href="http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html" rel="nofollow">comments from Richard Stallman</a></li>
<li>Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL</li>
<li>Check out the full post if you&#39;re one of those people that gets into license arguments</li>
<li>The takeaway is &quot;BSD is about making the world a better place. For everyone.&quot;
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black" rel="nofollow">OpenBSD on BeagleBone Black</a></h3>

<ul>
<li>Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi</li>
<li>A blog post about installing OpenBSD on a BBB from.. our guest for today!</li>
<li>He describes it as &quot;everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black&quot;</li>
<li>It goes through the whole process, details different storage options and some workarounds</li>
<li>Could be a really fun weekend project if you&#39;re interested in small or embedded devices
***</li>
</ul>

<h2>Interview - Ted Unangst - <a href="mailto:tedu@openbsd.org" rel="nofollow">tedu@openbsd.org</a> / <a href="https://twitter.com/tedunangst" rel="nofollow">@tedunangst</a></h2>

<p>OpenBSD&#39;s <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">signify</a> infrastructure, ZFS on OpenBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">Running an NTP server</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://smyck.net/2014/02/01/getting-started-with-freebsd/" rel="nofollow">Getting started with FreeBSD</a></h3>

<ul>
<li>A new video and blog series about starting out with FreeBSD</li>
<li>The author has been a fan since the 90s and has installed it on every server he&#39;s worked with</li>
<li>He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users</li>
<li>The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140204080515" rel="nofollow">More OpenBSD hackathon reports</a></h3>

<ul>
<li>As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience</li>
<li>He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work</li>
<li>This summary goes into detail about all the stuff he got done there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=261266" rel="nofollow">X11 in a jail</a></h3>

<ul>
<li>We&#39;ve gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!</li>
<li>A new tunable option will let jails access /dev/kmem and similar device nodes</li>
<li>Along with a change to DRM, this allows full X11 in a jail</li>
<li>Be sure to check out our <a href="http://www.bsdnow.tv/tutorials" rel="nofollow">jail tutorial and jailed VNC tutorial</a> for ideas
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 &quot;Joule Edition&quot; <a href="http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/" rel="nofollow">finally released</a>!</li>
<li>AMD graphics are now officially supported</li>
<li>GNOME3, MATE and Cinnamon desktops are available</li>
<li>Grub updates and fixes</li>
<li>PCBSD also <a href="http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html" rel="nofollow">got a mention in eweek</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21VnbKZsH" rel="nofollow">Justin writes in</a></li>
<li><a href="http://slexy.org/view/s2nD7RF6bo" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2jwRrj7UV" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s201koMD2c" rel="nofollow">Alex writes in</a> - <a href="http://people.freebsd.org/%7Egjb/RPI/" rel="nofollow">unofficial FreeBSD RPI Images</a></li>
<li><a href="http://slexy.org/view/s2AntZmtRU" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20bGjMsIQ" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>16: Cryptocrystalline</title>
  <link>https://www.bsdnow.tv/16</link>
  <guid isPermaLink="false">d9af27cf-c4ff-4572-b119-cbfd0e4167c8</guid>
  <pubDate>Wed, 18 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d9af27cf-c4ff-4572-b119-cbfd0e4167c8.mp3" length="79454910" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you're into data security, today's the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:50:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you're into data security, today's the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" target="_blank" rel="nofollow noopener"&gt;Secure communications with OpenBSD and OpenVPN&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Starting off today's theme of encryption...&lt;/li&gt;
&lt;li&gt;A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic&lt;/li&gt;
&lt;li&gt;Part 1 covers installing OpenBSD with full disk encryption (which we'll be doing later on in the show)&lt;/li&gt;
&lt;li&gt;Part 2 covers the initial setup of OpenVPN certificates and keys&lt;/li&gt;
&lt;li&gt;Parts 3 and 4 are the OpenVPN server and client configuration&lt;/li&gt;
&lt;li&gt;Part 5 is some updates and closing remarks
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation Newsletter&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The December 2013 semi-annual newsletter was sent out from the foundation&lt;/li&gt;
&lt;li&gt;In the newsletter you will find the president's letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored&lt;/li&gt;
&lt;li&gt;The president's letter alone is worth the read, really amazing&lt;/li&gt;
&lt;li&gt;Really long, with lots of details and stories from the conferences and projects
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://evertiq.com/design/33394" target="_blank" rel="nofollow noopener"&gt;Use of NetBSD with Marvell Kirkwood Processors&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer&lt;/li&gt;
&lt;li&gt;The IP-Plug is a "multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger)."&lt;/li&gt;
&lt;li&gt;Really cool little NetBSD ARM project with lots of graphs, pictures and details
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" target="_blank" rel="nofollow noopener"&gt;Experimenting with zero-copy network IO&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD&lt;/li&gt;
&lt;li&gt;Discusses the different OS' implementations and options&lt;/li&gt;
&lt;li&gt;He's able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn't stopping there&lt;/li&gt;
&lt;li&gt;Tons of details, check the full post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Damien Miller - &lt;a href="mailto:djm@openbsd.org" target="_blank" rel="nofollow noopener"&gt;djm@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/damienmiller" target="_blank" rel="nofollow noopener"&gt;@damienmiller&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Cryptography in OpenBSD and OpenSSH&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;Full disk encryption in FreeBSD &amp;amp; OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" target="_blank" rel="nofollow noopener"&gt;OpenZFS office hours&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy &lt;a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" target="_blank" rel="nofollow noopener"&gt;George Wilson&lt;/a&gt; sat down to take some ZFS questions from the community&lt;/li&gt;
&lt;li&gt;You can see more info about it &lt;a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" target="_blank" rel="nofollow noopener"&gt;License summaries in pkgng&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A discussion between &lt;a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" target="_blank" rel="nofollow noopener"&gt;Justin Sherill&lt;/a&gt; and some NYCBUG guys about license frameworks in pkgng&lt;/li&gt;
&lt;li&gt;Similar to pkgsrc's "ACCEPTABLE_LICENSES" setting, pkgng could let the user decide which software licenses he wants to allow&lt;/li&gt;
&lt;li&gt;Maybe we could get a "pkg licenses" command to display the license of all installed packages&lt;/li&gt;
&lt;li&gt;Ok bapt, do it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD challenge continues&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Checking in with our buddy from the Linux foundation...&lt;/li&gt;
&lt;li&gt;The switching from Linux to FreeBSD blog series continues for his month-long trial&lt;/li&gt;
&lt;li&gt;Follow up from last week: "As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding."&lt;/li&gt;
&lt;li&gt;Since we last mentioned it, he's decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=336615" target="_blank" rel="nofollow noopener"&gt;Ports gets a stable branch&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For the first time ever, FreeBSD's ports tree will have a maintained "stable" branch&lt;/li&gt;
&lt;li&gt;This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes&lt;/li&gt;
&lt;li&gt;All commits to this branch require approval of portmgr, looks like it'll start in 2014Q1
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2iRV1tOzB" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gAR5lgf" target="_blank" rel="nofollow noopener"&gt;Spencer writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s203iOnFh1" target="_blank" rel="nofollow noopener"&gt;Campbell writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2yUqj3vKW" target="_blank" rel="nofollow noopener"&gt;Sha'ul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2egcTPBXH" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, arm, openssh, sftp, security, damien miller, djm, mindrot, encryption, crypto, chacha20, poly1305, aes, hmac, mac, sha256, cipher, rc4, base64, encode, decode, ed25519, bcrypt, md5, hash, salt, openzfs, office hours, openvpn, vps, vpn, ssl, tun, tap, foundation, newsletter, freebsd journal, ixsystems, ecc, rsa, dsa, ecdsa, tunnel, keys, password, passphrase, full disk encryption, fde, installation, encrypted install, unencrypted</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you&#39;re into data security, today&#39;s the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" rel="nofollow">Secure communications with OpenBSD and OpenVPN</a></h3>

<ul>
<li>Starting off today&#39;s theme of encryption...</li>
<li>A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic</li>
<li>Part 1 covers installing OpenBSD with full disk encryption (which we&#39;ll be doing later on in the show)</li>
<li>Part 2 covers the initial setup of OpenVPN certificates and keys</li>
<li>Parts 3 and 4 are the OpenVPN server and client configuration</li>
<li>Part 5 is some updates and closing remarks
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" rel="nofollow">FreeBSD Foundation Newsletter</a></h3>

<ul>
<li>The December 2013 semi-annual newsletter was sent out from the foundation</li>
<li>In the newsletter you will find the president&#39;s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored</li>
<li>The president&#39;s letter alone is worth the read, really amazing</li>
<li>Really long, with lots of details and stories from the conferences and projects
***</li>
</ul>

<h3><a href="http://evertiq.com/design/33394" rel="nofollow">Use of NetBSD with Marvell Kirkwood Processors</a></h3>

<ul>
<li>Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer</li>
<li>The IP-Plug is a &quot;multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).&quot;</li>
<li>Really cool little NetBSD ARM project with lots of graphs, pictures and details
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" rel="nofollow">Experimenting with zero-copy network IO</a></h3>

<ul>
<li>Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD</li>
<li>Discusses the different OS&#39; implementations and options</li>
<li>He&#39;s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn&#39;t stopping there</li>
<li>Tons of details, check the full post
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>Cryptography in OpenBSD and OpenSSH</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">Full disk encryption in FreeBSD &amp; OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a> sat down to take some ZFS questions from the community</li>
<li>You can see more info about it <a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" rel="nofollow">License summaries in pkgng</a></h3>

<ul>
<li>A discussion between <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherill</a> and some NYCBUG guys about license frameworks in pkgng</li>
<li>Similar to pkgsrc&#39;s &quot;ACCEPTABLE_LICENSES&quot; setting, pkgng could let the user decide which software licenses he wants to allow</li>
<li>Maybe we could get a &quot;pkg licenses&quot; command to display the license of all installed packages</li>
<li>Ok bapt, do it
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge continues</a></h3>

<ul>
<li>Checking in with our buddy from the Linux foundation...</li>
<li>The switching from Linux to FreeBSD blog series continues for his month-long trial</li>
<li>Follow up from last week: &quot;As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding.&quot;</li>
<li>Since we last mentioned it, he&#39;s decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=336615" rel="nofollow">Ports gets a stable branch</a></h3>

<ul>
<li>For the first time ever, FreeBSD&#39;s ports tree will have a maintained &quot;stable&quot; branch</li>
<li>This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes</li>
<li>All commits to this branch require approval of portmgr, looks like it&#39;ll start in 2014Q1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iRV1tOzB" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21gAR5lgf" rel="nofollow">Spencer writes in</a></li>
<li><a href="http://slexy.org/view/s203iOnFh1" rel="nofollow">Campbell writes in</a></li>
<li><a href="http://slexy.org/view/s2yUqj3vKW" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2egcTPBXH" rel="nofollow">Clint writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you&#39;re into data security, today&#39;s the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" rel="nofollow">Secure communications with OpenBSD and OpenVPN</a></h3>

<ul>
<li>Starting off today&#39;s theme of encryption...</li>
<li>A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic</li>
<li>Part 1 covers installing OpenBSD with full disk encryption (which we&#39;ll be doing later on in the show)</li>
<li>Part 2 covers the initial setup of OpenVPN certificates and keys</li>
<li>Parts 3 and 4 are the OpenVPN server and client configuration</li>
<li>Part 5 is some updates and closing remarks
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" rel="nofollow">FreeBSD Foundation Newsletter</a></h3>

<ul>
<li>The December 2013 semi-annual newsletter was sent out from the foundation</li>
<li>In the newsletter you will find the president&#39;s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored</li>
<li>The president&#39;s letter alone is worth the read, really amazing</li>
<li>Really long, with lots of details and stories from the conferences and projects
***</li>
</ul>

<h3><a href="http://evertiq.com/design/33394" rel="nofollow">Use of NetBSD with Marvell Kirkwood Processors</a></h3>

<ul>
<li>Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer</li>
<li>The IP-Plug is a &quot;multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).&quot;</li>
<li>Really cool little NetBSD ARM project with lots of graphs, pictures and details
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" rel="nofollow">Experimenting with zero-copy network IO</a></h3>

<ul>
<li>Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD</li>
<li>Discusses the different OS&#39; implementations and options</li>
<li>He&#39;s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn&#39;t stopping there</li>
<li>Tons of details, check the full post
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>Cryptography in OpenBSD and OpenSSH</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">Full disk encryption in FreeBSD &amp; OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a> sat down to take some ZFS questions from the community</li>
<li>You can see more info about it <a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" rel="nofollow">License summaries in pkgng</a></h3>

<ul>
<li>A discussion between <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherill</a> and some NYCBUG guys about license frameworks in pkgng</li>
<li>Similar to pkgsrc&#39;s &quot;ACCEPTABLE_LICENSES&quot; setting, pkgng could let the user decide which software licenses he wants to allow</li>
<li>Maybe we could get a &quot;pkg licenses&quot; command to display the license of all installed packages</li>
<li>Ok bapt, do it
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge continues</a></h3>

<ul>
<li>Checking in with our buddy from the Linux foundation...</li>
<li>The switching from Linux to FreeBSD blog series continues for his month-long trial</li>
<li>Follow up from last week: &quot;As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding.&quot;</li>
<li>Since we last mentioned it, he&#39;s decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=336615" rel="nofollow">Ports gets a stable branch</a></h3>

<ul>
<li>For the first time ever, FreeBSD&#39;s ports tree will have a maintained &quot;stable&quot; branch</li>
<li>This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes</li>
<li>All commits to this branch require approval of portmgr, looks like it&#39;ll start in 2014Q1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iRV1tOzB" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21gAR5lgf" rel="nofollow">Spencer writes in</a></li>
<li><a href="http://slexy.org/view/s203iOnFh1" rel="nofollow">Campbell writes in</a></li>
<li><a href="http://slexy.org/view/s2yUqj3vKW" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2egcTPBXH" rel="nofollow">Clint writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>14: Zettabytes for Days</title>
  <link>https://www.bsdnow.tv/14</link>
  <guid isPermaLink="false">8a946478-3ac7-4087-a433-ad139e4d7aa9</guid>
  <pubDate>Wed, 04 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8a946478-3ac7-4087-a433-ad139e4d7aa9.mp3" length="56736843" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week is the long-awaited episode you've been asking for! We'll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project's recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week is the long-awaited episode you've been asking for! We'll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project's recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=334937" target="_blank" rel="nofollow noopener"&gt;pkgng 1.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;bapt and bdrewery from the portmgr team released pkgng 1.2 final&lt;/li&gt;
&lt;li&gt;New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new "pkg config" command, repo improvements, vuXML is now default, new fingerprint features and much more&lt;/li&gt;
&lt;li&gt;Really simple to upgrade, check our &lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;pkgng tutorial&lt;/a&gt; if you want some easy instructions&lt;/li&gt;
&lt;li&gt;It's also made its way &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" target="_blank" rel="nofollow noopener"&gt;into Dragonfly&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;See the show notes for the full list of new features and fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" target="_blank" rel="nofollow noopener"&gt;ChaCha20 and Poly1305 in OpenSSH&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305&lt;/li&gt;
&lt;li&gt;Long blog post explaining what these are and why we need them&lt;/li&gt;
&lt;li&gt;This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC&lt;/li&gt;
&lt;li&gt;RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn't show the packet length in cleartext&lt;/li&gt;
&lt;li&gt;Great explanation of the differences between EtM, MtE and EaM and their advantages&lt;/li&gt;
&lt;li&gt;"Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" target="_blank" rel="nofollow noopener"&gt;Is it time to dump Linux and move to BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;ITworld did an article about switching from Linux to BSD&lt;/li&gt;
&lt;li&gt;The author's interest was sparked from a review he was reading that said "I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0"&lt;/li&gt;
&lt;li&gt;The whole article can be summed up with "yes" - ok, next story!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/user/deirdres/videos" target="_blank" rel="nofollow noopener"&gt;OpenZFS devsummit videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenZFS &lt;a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" target="_blank" rel="nofollow noopener"&gt;developer summit&lt;/a&gt; discussion and presentation videos are up&lt;/li&gt;
&lt;li&gt;People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced&lt;/li&gt;
&lt;li&gt;Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation&lt;/li&gt;
&lt;li&gt;Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production&lt;/li&gt;
&lt;li&gt;TONS of video, about 6 hours' worth&lt;/li&gt;
&lt;li&gt;This leads us into our interview, which is...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - George Wilson - &lt;a href="mailto:wilzun@gmail.com" target="_blank" rel="nofollow noopener"&gt;wilzun@gmail.com&lt;/a&gt; / &lt;a href="https://twitter.com/zfsdude" target="_blank" rel="nofollow noopener"&gt;@zfsdude&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenZFS&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/zfs" target="_blank" rel="nofollow noopener"&gt;A crash course on ZFS&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20131126113154" target="_blank" rel="nofollow noopener"&gt;ruBSD 2013 information&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia&lt;/li&gt;
&lt;li&gt;Speakers include three OpenBSD developers, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" target="_blank" rel="nofollow noopener"&gt;Theo de Raadt&lt;/a&gt;, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" target="_blank" rel="nofollow noopener"&gt;Henning Brauer&lt;/a&gt; and Mike Belopuhov&lt;/li&gt;
&lt;li&gt;Their talks are titled "The bane of backwards compatibility," "OpenBSD's pf: Design, Implementation and Future" and "OpenBSD: Where crypto is going?"&lt;/li&gt;
&lt;li&gt;No word on if there will be video recordings, but we'll let you know if that changes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" target="_blank" rel="nofollow noopener"&gt;DragonFly roadmap, post 3.6&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;John Marino posted a possible roadmap for DragonFly, now that they're past the 3.6 release&lt;/li&gt;
&lt;li&gt;He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)&lt;/li&gt;
&lt;li&gt;Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still&lt;/li&gt;
&lt;li&gt;Bring in fixes and new stuff from FreeBSD 10
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" target="_blank" rel="nofollow noopener"&gt;BSDCan 2014 CFP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSDCan 2014 will be held on May 16-17 in Ottawa, Canada&lt;/li&gt;
&lt;li&gt;They're now accepting proposals for talks&lt;/li&gt;
&lt;li&gt;If you are doing something interesting with a BSD operating system, please submit a proposal&lt;/li&gt;
&lt;li&gt;We'll be getting lots of interviews there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=258838" target="_blank" rel="nofollow noopener"&gt;casperd added to -CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;"It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted."&lt;/li&gt;
&lt;li&gt;Lists some sysctls that can be controlled
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=258704" target="_blank" rel="nofollow noopener"&gt;ZFS corruption bug fixed in -CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JDWKjs7l" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20BLqxTWD" target="_blank" rel="nofollow noopener"&gt;SW writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2939tUOf5" target="_blank" rel="nofollow noopener"&gt;Jason writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21qKY6qIb" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20LWlmhoK" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, openzfs, devsummit, george wilson, zpool, raidz, raidz2, raidz3, mirror, delphix, linux, switch, zol, zfsonlinux, illumos, solaris, opensolaris, itworld, pkgng, pkg, 1.2, openssh, ssh, chacha20, cipher, encryption, mac, poly1305, rc4, security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week is the long-awaited episode you&#39;ve been asking for! We&#39;ll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project&#39;s recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=334937" rel="nofollow">pkgng 1.2 released</a></h3>

<ul>
<li>bapt and bdrewery from the portmgr team released pkgng 1.2 final</li>
<li>New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new &quot;pkg config&quot; command, repo improvements, vuXML is now default, new fingerprint features and much more</li>
<li>Really simple to upgrade, check our <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng tutorial</a> if you want some easy instructions</li>
<li>It&#39;s also made its way <a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" rel="nofollow">into Dragonfly</a></li>
<li>See the show notes for the full list of new features and fixes
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" rel="nofollow">ChaCha20 and Poly1305 in OpenSSH</a></h3>

<ul>
<li>Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305</li>
<li>Long blog post explaining what these are and why we need them</li>
<li>This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC</li>
<li>RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn&#39;t show the packet length in cleartext</li>
<li>Great explanation of the differences between EtM, MtE and EaM and their advantages</li>
<li>&quot;Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly.&quot;
***</li>
</ul>

<h3><a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" rel="nofollow">Is it time to dump Linux and move to BSD</a></h3>

<ul>
<li>ITworld did an article about switching from Linux to BSD</li>
<li>The author&#39;s interest was sparked from a review he was reading that said &quot;I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0&quot;</li>
<li>The whole article can be summed up with &quot;yes&quot; - ok, next story!
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/deirdres/videos" rel="nofollow">OpenZFS devsummit videos</a></h3>

<ul>
<li>The OpenZFS <a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" rel="nofollow">developer summit</a> discussion and presentation videos are up</li>
<li>People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced</li>
<li>Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation</li>
<li>Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production</li>
<li>TONS of video, about 6 hours&#39; worth</li>
<li>This leads us into our interview, which is...
***</li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<p>OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">A crash course on ZFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131126113154" rel="nofollow">ruBSD 2013 information</a></h3>

<ul>
<li>The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia</li>
<li>Speakers include three OpenBSD developers, <a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" rel="nofollow">Theo de Raadt</a>, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> and Mike Belopuhov</li>
<li>Their talks are titled &quot;The bane of backwards compatibility,&quot; &quot;OpenBSD&#39;s pf: Design, Implementation and Future&quot; and &quot;OpenBSD: Where crypto is going?&quot;</li>
<li>No word on if there will be video recordings, but we&#39;ll let you know if that changes
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" rel="nofollow">DragonFly roadmap, post 3.6</a></h3>

<ul>
<li>John Marino posted a possible roadmap for DragonFly, now that they&#39;re past the 3.6 release</li>
<li>He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)</li>
<li>Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still</li>
<li>Bring in fixes and new stuff from FreeBSD 10
***</li>
</ul>

<h3><a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" rel="nofollow">BSDCan 2014 CFP</a></h3>

<ul>
<li>BSDCan 2014 will be held on May 16-17 in Ottawa, Canada</li>
<li>They&#39;re now accepting proposals for talks</li>
<li>If you are doing something interesting with a BSD operating system, please submit a proposal</li>
<li>We&#39;ll be getting lots of interviews there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258838" rel="nofollow">casperd added to -CURRENT</a></h3>

<ul>
<li>&quot;It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted.&quot;</li>
<li>Lists some sysctls that can be controlled
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258704" rel="nofollow">ZFS corruption bug fixed in -CURRENT</a></h3>

<ul>
<li>Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JDWKjs7l" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20BLqxTWD" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s2939tUOf5" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s21qKY6qIb" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20LWlmhoK" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week is the long-awaited episode you&#39;ve been asking for! We&#39;ll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project&#39;s recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=334937" rel="nofollow">pkgng 1.2 released</a></h3>

<ul>
<li>bapt and bdrewery from the portmgr team released pkgng 1.2 final</li>
<li>New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new &quot;pkg config&quot; command, repo improvements, vuXML is now default, new fingerprint features and much more</li>
<li>Really simple to upgrade, check our <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng tutorial</a> if you want some easy instructions</li>
<li>It&#39;s also made its way <a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" rel="nofollow">into Dragonfly</a></li>
<li>See the show notes for the full list of new features and fixes
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" rel="nofollow">ChaCha20 and Poly1305 in OpenSSH</a></h3>

<ul>
<li>Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305</li>
<li>Long blog post explaining what these are and why we need them</li>
<li>This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC</li>
<li>RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn&#39;t show the packet length in cleartext</li>
<li>Great explanation of the differences between EtM, MtE and EaM and their advantages</li>
<li>&quot;Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly.&quot;
***</li>
</ul>

<h3><a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" rel="nofollow">Is it time to dump Linux and move to BSD</a></h3>

<ul>
<li>ITworld did an article about switching from Linux to BSD</li>
<li>The author&#39;s interest was sparked from a review he was reading that said &quot;I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0&quot;</li>
<li>The whole article can be summed up with &quot;yes&quot; - ok, next story!
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/deirdres/videos" rel="nofollow">OpenZFS devsummit videos</a></h3>

<ul>
<li>The OpenZFS <a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" rel="nofollow">developer summit</a> discussion and presentation videos are up</li>
<li>People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced</li>
<li>Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation</li>
<li>Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production</li>
<li>TONS of video, about 6 hours&#39; worth</li>
<li>This leads us into our interview, which is...
***</li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<p>OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">A crash course on ZFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131126113154" rel="nofollow">ruBSD 2013 information</a></h3>

<ul>
<li>The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia</li>
<li>Speakers include three OpenBSD developers, <a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" rel="nofollow">Theo de Raadt</a>, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> and Mike Belopuhov</li>
<li>Their talks are titled &quot;The bane of backwards compatibility,&quot; &quot;OpenBSD&#39;s pf: Design, Implementation and Future&quot; and &quot;OpenBSD: Where crypto is going?&quot;</li>
<li>No word on if there will be video recordings, but we&#39;ll let you know if that changes
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" rel="nofollow">DragonFly roadmap, post 3.6</a></h3>

<ul>
<li>John Marino posted a possible roadmap for DragonFly, now that they&#39;re past the 3.6 release</li>
<li>He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)</li>
<li>Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still</li>
<li>Bring in fixes and new stuff from FreeBSD 10
***</li>
</ul>

<h3><a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" rel="nofollow">BSDCan 2014 CFP</a></h3>

<ul>
<li>BSDCan 2014 will be held on May 16-17 in Ottawa, Canada</li>
<li>They&#39;re now accepting proposals for talks</li>
<li>If you are doing something interesting with a BSD operating system, please submit a proposal</li>
<li>We&#39;ll be getting lots of interviews there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258838" rel="nofollow">casperd added to -CURRENT</a></h3>

<ul>
<li>&quot;It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted.&quot;</li>
<li>Lists some sysctls that can be controlled
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258704" rel="nofollow">ZFS corruption bug fixed in -CURRENT</a></h3>

<ul>
<li>Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JDWKjs7l" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20BLqxTWD" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s2939tUOf5" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s21qKY6qIb" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20LWlmhoK" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>12: Collecting SSHells</title>
  <link>https://www.bsdnow.tv/12</link>
  <guid isPermaLink="false">8552d8d2-0590-4641-9780-81ca0dc91bd1</guid>
  <pubDate>Wed, 20 Nov 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8552d8d2-0590-4641-9780-81ca0dc91bd1.mp3" length="49103236" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we'll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD's future plans and much more. After that, if you've ever wondered what all this SSH stuff is about, today's tutorial has got you covered. We'll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:08:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we'll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD's future plans and much more. After that, if you've ever wondered what all this SSH stuff is about, today's tutorial has got you covered. We'll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-colin-percival.html" target="_blank" rel="nofollow noopener"&gt;Faces of FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation is publishing articles on different FreeBSD developers&lt;/li&gt;
&lt;li&gt;This one is about Colin Percival (cperciva@), the ex-security officer&lt;/li&gt;
&lt;li&gt;Tells the story of how he first found BSD, what he contributed back, how he eventually became the security officer&lt;/li&gt;
&lt;li&gt;Running series with more to come
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.freebsdnews.net/2013/11/14/eurobsdcon-2013-devsummit-video-recordings/" target="_blank" rel="nofollow noopener"&gt;Lots of BSD presentation videos uploaded&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;EuroBSDCon 2013 dev summit videos, AsiaBSDCon 2013 videos, MWL's presentation video&lt;/li&gt;
&lt;li&gt;Most of us never get to see the dev summit talks since they're only for developers&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/user/bsdconferences" target="_blank" rel="nofollow noopener"&gt;AsiaBSDCon 2013 videos also up&lt;/a&gt; finally&lt;/li&gt;
&lt;li&gt;List of AsiaBSDCon presentation topics &lt;a href="http://2013.asiabsdcon.org/papers/index.html" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Our buddy Michael W Lucas gave an &lt;a href="http://blather.michaelwlucas.com/archives/1879" target="_blank" rel="nofollow noopener"&gt;"OpenBSD for Linux users" talk&lt;/a&gt; at a Michigan Unix Users Group.&lt;/li&gt;
&lt;li&gt;He says "Among other things, I compare OpenBSD to Richard Stallman and physically assault an audience member. We also talk long long time, memory randomization, PF, BSD license versus GPL, Microsoft and other OpenBSD stuff"&lt;/li&gt;
&lt;li&gt;Really informative presentation, pretty long, answers some common questions at the end
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/call_for_presentations_bsd_devroom" target="_blank" rel="nofollow noopener"&gt;Call for Presentations: FOSDEM 2014 and NYCBSDCon 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FOSDEM 2014 will take place on 1–2 February, 2014, in Brussels, Belgium&lt;/li&gt;
&lt;li&gt;Just like in the last years, there will be both a BSD booth and a developer's room&lt;/li&gt;
&lt;li&gt;The topics of the devroom include all BSD operating systems. Every talk is welcome, from internal hacker discussion to real-world examples and presentations about new and shiny features.&lt;/li&gt;
&lt;li&gt;If you are in the area or want to go, check the show notes for details&lt;/li&gt;
&lt;li&gt;NYCBSDCon &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20131119053455" target="_blank" rel="nofollow noopener"&gt;is also accepting papers&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;It'll be in New York City at the beginning of February 2014&lt;/li&gt;
&lt;li&gt;If anyone wants to give a talk at one of these conferences, go ahead and send in your stuff!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2013-November/001511.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation's year-end fundraising campaign&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has been supporting the FreeBSD project and community for over 13 years&lt;/li&gt;
&lt;li&gt;As of today they have raised about half a million dollars, but still have a while to go&lt;/li&gt;
&lt;li&gt;Donations go towards new features, paying for the server infrastructure, conferences, supporting the community, hiring full-time staff members and promoting FreeBSD at events&lt;/li&gt;
&lt;li&gt;They are preparing the debut of a new online magazine, the FreeBSD Journal&lt;/li&gt;
&lt;li&gt;Typically big companies make their huge donations in December, like a couple of anonymous donors that gave around $250,000 each last year&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.freebsdfoundation.org/donate/" target="_blank" rel="nofollow noopener"&gt;Make your donation today&lt;/a&gt; over at freebsdfoundation.org, every little bit helps&lt;/li&gt;
&lt;li&gt;Everyone involved with BSD Now made a donation last year and will do so again this year
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Amitai Schlair - &lt;a href="mailto:schmonz@netbsd.org" target="_blank" rel="nofollow noopener"&gt;schmonz@netbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/schmonz" target="_blank" rel="nofollow noopener"&gt;@schmonz&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The NetBSD Foundation, pkgsrc, future plans&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/ssh-tmux" target="_blank" rel="nofollow noopener"&gt;Combining SSH and tmux&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.&lt;/strong&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.theregister.co.uk/2013/11/16/sony_playstation_4_kernel" target="_blank" rel="nofollow noopener"&gt;PS4 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Sony's Playstation 4 is finally released&lt;/li&gt;
&lt;li&gt;As previously thought, its OS is heavily based on FreeBSD and uses the kernel among other things&lt;/li&gt;
&lt;li&gt;Link in the show notes contains the &lt;a href="http://www.scei.co.jp/ps4-license/" target="_blank" rel="nofollow noopener"&gt;full list of BSD software they're using&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Always good to see BSD being so widespread
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1853-hast-on-freebsd-how-to-make-storage-highly-availble-by-using-hast" target="_blank" rel="nofollow noopener"&gt;BSD Mag November issue&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Free monthly BSD magazine publishes another issue&lt;/li&gt;
&lt;li&gt;This time their topics include: Configuring a Highly Available Service on FreeBSD, IT Inventory &amp;amp; Asset Management Automation, more FreeBSD Programming Primer, PfSense and Snort and a few others&lt;/li&gt;
&lt;li&gt;PDF linked in the show notes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/pkgsrc-users/2013/11/09/msg018881.html" target="_blank" rel="nofollow noopener"&gt;pbulk builds made easy&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;NetBSD's &lt;a href="https://www.netbsd.org/docs/pkgsrc/bulk.html" target="_blank" rel="nofollow noopener"&gt;pbulk tool&lt;/a&gt; is similar to &lt;a href="http://www.bsdnow.tv/tutorials/poudriere" target="_blank" rel="nofollow noopener"&gt;poudriere&lt;/a&gt;, but for pkgsrc&lt;/li&gt;
&lt;li&gt;While working on updating the documentation, a developer cleaned up quite a lot of code&lt;/li&gt;
&lt;li&gt;He wrote a script that automates pbulk deployment and setup&lt;/li&gt;
&lt;li&gt;The whole setup of a dedicated machine has been reduced to just three commands
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-111513/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Over 200 PBIs have been populated in to the PC-BSD 10 Stable Appcafe&lt;/li&gt;
&lt;li&gt;Many PC-BSD programs received some necessary bug fixes and updates&lt;/li&gt;
&lt;li&gt;Some include network detection in the package and update managers, nvidia graphic detection, security updates for PCDM
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21oh3vP7t" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21zfqcWMP" target="_blank" rel="nofollow noopener"&gt;Kjell-Aleksander writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2ZmW77Odb" target="_blank" rel="nofollow noopener"&gt;Jordan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2BZq7xiyo" target="_blank" rel="nofollow noopener"&gt;Christian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21xrk0M4k" target="_blank" rel="nofollow noopener"&gt;entransic writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, openssh, gnu, screen, tmux, presentation, talk, foundation, fundraiser, donations, michael w lucas, linux, amitai schlair, schmonz, pkgsrc, tetris, devsummit, dev, developer, summit, eurobsdcon, eurobsdcon2013, 2013, sony, ps4, launch, playstation, playstation4, orbis os, orbisos, asiabsdcon, pbulk</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;ll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD&#39;s future plans and much more. After that, if you&#39;ve ever wondered what all this SSH stuff is about, today&#39;s tutorial has got you covered. We&#39;ll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-colin-percival.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>The FreeBSD foundation is publishing articles on different FreeBSD developers</li>
<li>This one is about Colin Percival (cperciva@), the ex-security officer</li>
<li>Tells the story of how he first found BSD, what he contributed back, how he eventually became the security officer</li>
<li>Running series with more to come
***</li>
</ul>

<h3><a href="http://www.freebsdnews.net/2013/11/14/eurobsdcon-2013-devsummit-video-recordings/" rel="nofollow">Lots of BSD presentation videos uploaded</a></h3>

<ul>
<li>EuroBSDCon 2013 dev summit videos, AsiaBSDCon 2013 videos, MWL&#39;s presentation video</li>
<li>Most of us never get to see the dev summit talks since they&#39;re only for developers</li>
<li><a href="https://www.youtube.com/user/bsdconferences" rel="nofollow">AsiaBSDCon 2013 videos also up</a> finally</li>
<li>List of AsiaBSDCon presentation topics <a href="http://2013.asiabsdcon.org/papers/index.html" rel="nofollow">here</a></li>
<li>Our buddy Michael W Lucas gave an <a href="http://blather.michaelwlucas.com/archives/1879" rel="nofollow">&quot;OpenBSD for Linux users&quot; talk</a> at a Michigan Unix Users Group.</li>
<li>He says &quot;Among other things, I compare OpenBSD to Richard Stallman and physically assault an audience member. We also talk long long time, memory randomization, PF, BSD license versus GPL, Microsoft and other OpenBSD stuff&quot;</li>
<li>Really informative presentation, pretty long, answers some common questions at the end
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/call_for_presentations_bsd_devroom" rel="nofollow">Call for Presentations: FOSDEM 2014 and NYCBSDCon 2014</a></h3>

<ul>
<li>FOSDEM 2014 will take place on 1–2 February, 2014, in Brussels, Belgium</li>
<li>Just like in the last years, there will be both a BSD booth and a developer&#39;s room</li>
<li>The topics of the devroom include all BSD operating systems. Every talk is welcome, from internal hacker discussion to real-world examples and presentations about new and shiny features.</li>
<li>If you are in the area or want to go, check the show notes for details</li>
<li>NYCBSDCon <a href="http://undeadly.org/cgi?action=article&sid=20131119053455" rel="nofollow">is also accepting papers</a>.</li>
<li>It&#39;ll be in New York City at the beginning of February 2014</li>
<li>If anyone wants to give a talk at one of these conferences, go ahead and send in your stuff!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2013-November/001511.html" rel="nofollow">FreeBSD foundation&#39;s year-end fundraising campaign</a></h3>

<ul>
<li>The FreeBSD foundation has been supporting the FreeBSD project and community for over 13 years</li>
<li>As of today they have raised about half a million dollars, but still have a while to go</li>
<li>Donations go towards new features, paying for the server infrastructure, conferences, supporting the community, hiring full-time staff members and promoting FreeBSD at events</li>
<li>They are preparing the debut of a new online magazine, the FreeBSD Journal</li>
<li>Typically big companies make their huge donations in December, like a couple of anonymous donors that gave around $250,000 each last year</li>
<li><a href="http://www.freebsdfoundation.org/donate/" rel="nofollow">Make your donation today</a> over at freebsdfoundation.org, every little bit helps</li>
<li>Everyone involved with BSD Now made a donation last year and will do so again this year
***</li>
</ul>

<h2>Interview - Amitai Schlair - <a href="mailto:schmonz@netbsd.org" rel="nofollow">schmonz@netbsd.org</a> / <a href="https://twitter.com/schmonz" rel="nofollow">@schmonz</a></h2>

<p>The NetBSD Foundation, pkgsrc, future plans</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">Combining SSH and tmux</a></h3>

<ul>
<li><strong>Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.</strong>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.theregister.co.uk/2013/11/16/sony_playstation_4_kernel" rel="nofollow">PS4 released</a></h3>

<ul>
<li>Sony&#39;s Playstation 4 is finally released</li>
<li>As previously thought, its OS is heavily based on FreeBSD and uses the kernel among other things</li>
<li>Link in the show notes contains the <a href="http://www.scei.co.jp/ps4-license/" rel="nofollow">full list of BSD software they&#39;re using</a></li>
<li>Always good to see BSD being so widespread
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1853-hast-on-freebsd-how-to-make-storage-highly-availble-by-using-hast" rel="nofollow">BSD Mag November issue</a></h3>

<ul>
<li>Free monthly BSD magazine publishes another issue</li>
<li>This time their topics include: Configuring a Highly Available Service on FreeBSD, IT Inventory &amp; Asset Management Automation, more FreeBSD Programming Primer, PfSense and Snort and a few others</li>
<li>PDF linked in the show notes
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/11/09/msg018881.html" rel="nofollow">pbulk builds made easy</a></h3>

<ul>
<li>NetBSD&#39;s <a href="https://www.netbsd.org/docs/pkgsrc/bulk.html" rel="nofollow">pbulk tool</a> is similar to <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, but for pkgsrc</li>
<li>While working on updating the documentation, a developer cleaned up quite a lot of code</li>
<li>He wrote a script that automates pbulk deployment and setup</li>
<li>The whole setup of a dedicated machine has been reduced to just three commands
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-111513/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Over 200 PBIs have been populated in to the PC-BSD 10 Stable Appcafe</li>
<li>Many PC-BSD programs received some necessary bug fixes and updates</li>
<li>Some include network detection in the package and update managers, nvidia graphic detection, security updates for PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21oh3vP7t" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21zfqcWMP" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2ZmW77Odb" rel="nofollow">Jordan writes in</a></li>
<li><a href="http://slexy.org/view/s2BZq7xiyo" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21xrk0M4k" rel="nofollow">entransic writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;ll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD&#39;s future plans and much more. After that, if you&#39;ve ever wondered what all this SSH stuff is about, today&#39;s tutorial has got you covered. We&#39;ll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-colin-percival.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>The FreeBSD foundation is publishing articles on different FreeBSD developers</li>
<li>This one is about Colin Percival (cperciva@), the ex-security officer</li>
<li>Tells the story of how he first found BSD, what he contributed back, how he eventually became the security officer</li>
<li>Running series with more to come
***</li>
</ul>

<h3><a href="http://www.freebsdnews.net/2013/11/14/eurobsdcon-2013-devsummit-video-recordings/" rel="nofollow">Lots of BSD presentation videos uploaded</a></h3>

<ul>
<li>EuroBSDCon 2013 dev summit videos, AsiaBSDCon 2013 videos, MWL&#39;s presentation video</li>
<li>Most of us never get to see the dev summit talks since they&#39;re only for developers</li>
<li><a href="https://www.youtube.com/user/bsdconferences" rel="nofollow">AsiaBSDCon 2013 videos also up</a> finally</li>
<li>List of AsiaBSDCon presentation topics <a href="http://2013.asiabsdcon.org/papers/index.html" rel="nofollow">here</a></li>
<li>Our buddy Michael W Lucas gave an <a href="http://blather.michaelwlucas.com/archives/1879" rel="nofollow">&quot;OpenBSD for Linux users&quot; talk</a> at a Michigan Unix Users Group.</li>
<li>He says &quot;Among other things, I compare OpenBSD to Richard Stallman and physically assault an audience member. We also talk long long time, memory randomization, PF, BSD license versus GPL, Microsoft and other OpenBSD stuff&quot;</li>
<li>Really informative presentation, pretty long, answers some common questions at the end
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/call_for_presentations_bsd_devroom" rel="nofollow">Call for Presentations: FOSDEM 2014 and NYCBSDCon 2014</a></h3>

<ul>
<li>FOSDEM 2014 will take place on 1–2 February, 2014, in Brussels, Belgium</li>
<li>Just like in the last years, there will be both a BSD booth and a developer&#39;s room</li>
<li>The topics of the devroom include all BSD operating systems. Every talk is welcome, from internal hacker discussion to real-world examples and presentations about new and shiny features.</li>
<li>If you are in the area or want to go, check the show notes for details</li>
<li>NYCBSDCon <a href="http://undeadly.org/cgi?action=article&sid=20131119053455" rel="nofollow">is also accepting papers</a>.</li>
<li>It&#39;ll be in New York City at the beginning of February 2014</li>
<li>If anyone wants to give a talk at one of these conferences, go ahead and send in your stuff!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2013-November/001511.html" rel="nofollow">FreeBSD foundation&#39;s year-end fundraising campaign</a></h3>

<ul>
<li>The FreeBSD foundation has been supporting the FreeBSD project and community for over 13 years</li>
<li>As of today they have raised about half a million dollars, but still have a while to go</li>
<li>Donations go towards new features, paying for the server infrastructure, conferences, supporting the community, hiring full-time staff members and promoting FreeBSD at events</li>
<li>They are preparing the debut of a new online magazine, the FreeBSD Journal</li>
<li>Typically big companies make their huge donations in December, like a couple of anonymous donors that gave around $250,000 each last year</li>
<li><a href="http://www.freebsdfoundation.org/donate/" rel="nofollow">Make your donation today</a> over at freebsdfoundation.org, every little bit helps</li>
<li>Everyone involved with BSD Now made a donation last year and will do so again this year
***</li>
</ul>

<h2>Interview - Amitai Schlair - <a href="mailto:schmonz@netbsd.org" rel="nofollow">schmonz@netbsd.org</a> / <a href="https://twitter.com/schmonz" rel="nofollow">@schmonz</a></h2>

<p>The NetBSD Foundation, pkgsrc, future plans</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">Combining SSH and tmux</a></h3>

<ul>
<li><strong>Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.</strong>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.theregister.co.uk/2013/11/16/sony_playstation_4_kernel" rel="nofollow">PS4 released</a></h3>

<ul>
<li>Sony&#39;s Playstation 4 is finally released</li>
<li>As previously thought, its OS is heavily based on FreeBSD and uses the kernel among other things</li>
<li>Link in the show notes contains the <a href="http://www.scei.co.jp/ps4-license/" rel="nofollow">full list of BSD software they&#39;re using</a></li>
<li>Always good to see BSD being so widespread
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1853-hast-on-freebsd-how-to-make-storage-highly-availble-by-using-hast" rel="nofollow">BSD Mag November issue</a></h3>

<ul>
<li>Free monthly BSD magazine publishes another issue</li>
<li>This time their topics include: Configuring a Highly Available Service on FreeBSD, IT Inventory &amp; Asset Management Automation, more FreeBSD Programming Primer, PfSense and Snort and a few others</li>
<li>PDF linked in the show notes
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/11/09/msg018881.html" rel="nofollow">pbulk builds made easy</a></h3>

<ul>
<li>NetBSD&#39;s <a href="https://www.netbsd.org/docs/pkgsrc/bulk.html" rel="nofollow">pbulk tool</a> is similar to <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, but for pkgsrc</li>
<li>While working on updating the documentation, a developer cleaned up quite a lot of code</li>
<li>He wrote a script that automates pbulk deployment and setup</li>
<li>The whole setup of a dedicated machine has been reduced to just three commands
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-111513/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Over 200 PBIs have been populated in to the PC-BSD 10 Stable Appcafe</li>
<li>Many PC-BSD programs received some necessary bug fixes and updates</li>
<li>Some include network detection in the package and update managers, nvidia graphic detection, security updates for PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21oh3vP7t" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21zfqcWMP" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2ZmW77Odb" rel="nofollow">Jordan writes in</a></li>
<li><a href="http://slexy.org/view/s2BZq7xiyo" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21xrk0M4k" rel="nofollow">entransic writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
