<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Mon, 04 May 2026 11:22:20 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Sudo”</title>
    <link>https://www.bsdnow.tv/tags/sudo</link>
    <pubDate>Thu, 11 Jul 2024 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>567: To the Core</title>
  <link>https://www.bsdnow.tv/567</link>
  <guid isPermaLink="false">d7de607e-7822-486f-8649-0053e89207a6</guid>
  <pubDate>Thu, 11 Jul 2024 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d7de607e-7822-486f-8649-0053e89207a6.mp3" length="60410304" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more</itunes:subtitle>
  <itunes:duration>41:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://whynothugo.nl/journal/2024/06/13/ssh-as-a-sudo-replacement/" target="_blank" rel="nofollow noopener"&gt;SSH as a sudo replacement&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://lists.freebsd.org/archives/freebsd-announce/2024-June/000136.html" target="_blank" rel="nofollow noopener"&gt;Core.13 is Now In Office&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.tumfatig.net/2024/running-gotosocial-on-netbsd/" target="_blank" rel="nofollow noopener"&gt;Running GoToSocial on NetBSD&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://briancallahan.net/blog/20240609.html" target="_blank" rel="nofollow noopener"&gt;A DMD package for OpenIndiana&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://neirac.srht.site/posts/omnios-add-swap.html" target="_blank" rel="nofollow noopener"&gt;Adding more swap space to Omnios&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20240620105457" target="_blank" rel="nofollow noopener"&gt;OpenBSD added initial support for Qualcomm Snapdragon Elite X after 1 day&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tarsnap&lt;/h2&gt;

&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/567/feedback/Isa%20-%20Pinebook%20Question.md" target="_blank" rel="nofollow noopener"&gt;Isa - Pinebook Question.md&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Join us and other BSD Fans in our &lt;a href="https://t.me/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSD Now Telegram channel&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, sudo, replacement, ssh, core.13, gotosocial, DMD, openindiana, omnios, qualcomm, snapdragon elite X</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://whynothugo.nl/journal/2024/06/13/ssh-as-a-sudo-replacement/" rel="nofollow">SSH as a sudo replacement</a></p>

<hr>

<p><a href="https://lists.freebsd.org/archives/freebsd-announce/2024-June/000136.html" rel="nofollow">Core.13 is Now In Office</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/running-gotosocial-on-netbsd/" rel="nofollow">Running GoToSocial on NetBSD</a></p>

<hr>

<p><a href="https://briancallahan.net/blog/20240609.html" rel="nofollow">A DMD package for OpenIndiana</a></p>

<hr>

<p><a href="https://neirac.srht.site/posts/omnios-add-swap.html" rel="nofollow">Adding more swap space to Omnios</a></p>

<hr>

<p><a href="https://undeadly.org/cgi?action=article;sid=20240620105457" rel="nofollow">OpenBSD added initial support for Qualcomm Snapdragon Elite X after 1 day</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/567/feedback/Isa%20-%20Pinebook%20Question.md" rel="nofollow">Isa - Pinebook Question.md</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>SSH as a sudo replacement, Core.13 is Now In Office, Running GoToSocial on NetBSD, A DMD package for OpenIndiana, Adding more swap space to Omnios, OpenBSD adds initial support for Qualcomm Snapdragon Elite X after 1 day, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://whynothugo.nl/journal/2024/06/13/ssh-as-a-sudo-replacement/" rel="nofollow">SSH as a sudo replacement</a></p>

<hr>

<p><a href="https://lists.freebsd.org/archives/freebsd-announce/2024-June/000136.html" rel="nofollow">Core.13 is Now In Office</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.tumfatig.net/2024/running-gotosocial-on-netbsd/" rel="nofollow">Running GoToSocial on NetBSD</a></p>

<hr>

<p><a href="https://briancallahan.net/blog/20240609.html" rel="nofollow">A DMD package for OpenIndiana</a></p>

<hr>

<p><a href="https://neirac.srht.site/posts/omnios-add-swap.html" rel="nofollow">Adding more swap space to Omnios</a></p>

<hr>

<p><a href="https://undeadly.org/cgi?action=article;sid=20240620105457" rel="nofollow">OpenBSD added initial support for Qualcomm Snapdragon Elite X after 1 day</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/567/feedback/Isa%20-%20Pinebook%20Question.md" rel="nofollow">Isa - Pinebook Question.md</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>514: Infecting Public Keys</title>
  <link>https://www.bsdnow.tv/514</link>
  <guid isPermaLink="false">1ad867e2-c191-48e0-88e0-8c42831d40c7</guid>
  <pubDate>Thu, 06 Jul 2023 06:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/1ad867e2-c191-48e0-88e0-8c42831d40c7.mp3" length="46575744" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenZFS, Your Data and the Challenge of Ransomware, I Didn’t Learn Unix By Reading All The Manpages, I try to answer "how to become a systems engineer", Writing shell scripts in Nushell, Sudo and signal propagation, infecting SSH Public Keys with backdoors, OpenBSD Thinkpad, and more</itunes:subtitle>
  <itunes:duration>48:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;OpenZFS, Your Data and the Challenge of Ransomware, I Didn’t Learn Unix By Reading All The Manpages, I try to answer "how to become a systems engineer", Writing shell scripts in Nushell, Sudo and signal propagation, infecting SSH Public Keys with backdoors, OpenBSD Thinkpad, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/openzfs-openzfs-your-data-and-the-challenge-of-ransomware/" target="_blank" rel="nofollow noopener"&gt;OpenZFS, Your Data and the Challenge of Ransomware&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.owlfolio.org/research/i-didnt-learn-unix-by-reading-all-the-manpages/" target="_blank" rel="nofollow noopener"&gt;I Didn’t Learn Unix By Reading All The Manpages&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://rachelbythebay.com/w/2023/05/30/eng/" target="_blank" rel="nofollow noopener"&gt;Feedback: I try to answer "how to become a systems engineer"&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://jpospisil.com/2023/05/25/writing-shell-scripts-in-nushell" target="_blank" rel="nofollow noopener"&gt;Writing shell scripts in Nushell&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://dxuuu.xyz/sudo.html" target="_blank" rel="nofollow noopener"&gt;Sudo and signal propagation&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://blog.thc.org/infecting-ssh-public-keys-with-backdoors" target="_blank" rel="nofollow noopener"&gt;Infecting SSH Public Keys with backdoors&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://douglasrumbaugh.com/post/openbsd-thinkpad-good/" target="_blank" rel="nofollow noopener"&gt;OpenBSD Thinkpad&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, cli, unix, os, berkeley, software, distribution, development, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, ransomware, snapshot, rollback, man pages, systems engineer, nushell, shell script, signal propagation, sudo, public key, backdoor, thinkpad</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenZFS, Your Data and the Challenge of Ransomware, I Didn’t Learn Unix By Reading All The Manpages, I try to answer &quot;how to become a systems engineer&quot;, Writing shell scripts in Nushell, Sudo and signal propagation, infecting SSH Public Keys with backdoors, OpenBSD Thinkpad, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/openzfs-openzfs-your-data-and-the-challenge-of-ransomware/" rel="nofollow">OpenZFS, Your Data and the Challenge of Ransomware</a></h3>

<hr>

<h3><a href="https://www.owlfolio.org/research/i-didnt-learn-unix-by-reading-all-the-manpages/" rel="nofollow">I Didn’t Learn Unix By Reading All The Manpages</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://rachelbythebay.com/w/2023/05/30/eng/" rel="nofollow">Feedback: I try to answer &quot;how to become a systems engineer&quot;</a></h3>

<hr>

<h3><a href="https://jpospisil.com/2023/05/25/writing-shell-scripts-in-nushell" rel="nofollow">Writing shell scripts in Nushell</a></h3>

<hr>

<h3><a href="https://dxuuu.xyz/sudo.html" rel="nofollow">Sudo and signal propagation</a></h3>

<hr>

<h3><a href="https://blog.thc.org/infecting-ssh-public-keys-with-backdoors" rel="nofollow">Infecting SSH Public Keys with backdoors</a></h3>

<hr>

<h3><a href="https://douglasrumbaugh.com/post/openbsd-thinkpad-good/" rel="nofollow">OpenBSD Thinkpad</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenZFS, Your Data and the Challenge of Ransomware, I Didn’t Learn Unix By Reading All The Manpages, I try to answer &quot;how to become a systems engineer&quot;, Writing shell scripts in Nushell, Sudo and signal propagation, infecting SSH Public Keys with backdoors, OpenBSD Thinkpad, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/openzfs-openzfs-your-data-and-the-challenge-of-ransomware/" rel="nofollow">OpenZFS, Your Data and the Challenge of Ransomware</a></h3>

<hr>

<h3><a href="https://www.owlfolio.org/research/i-didnt-learn-unix-by-reading-all-the-manpages/" rel="nofollow">I Didn’t Learn Unix By Reading All The Manpages</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://rachelbythebay.com/w/2023/05/30/eng/" rel="nofollow">Feedback: I try to answer &quot;how to become a systems engineer&quot;</a></h3>

<hr>

<h3><a href="https://jpospisil.com/2023/05/25/writing-shell-scripts-in-nushell" rel="nofollow">Writing shell scripts in Nushell</a></h3>

<hr>

<h3><a href="https://dxuuu.xyz/sudo.html" rel="nofollow">Sudo and signal propagation</a></h3>

<hr>

<h3><a href="https://blog.thc.org/infecting-ssh-public-keys-with-backdoors" rel="nofollow">Infecting SSH Public Keys with backdoors</a></h3>

<hr>

<h3><a href="https://douglasrumbaugh.com/post/openbsd-thinkpad-good/" rel="nofollow">OpenBSD Thinkpad</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li><p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>478: Debunking sudo myths </title>
  <link>https://www.bsdnow.tv/478</link>
  <guid isPermaLink="false">1cacdcc7-e6f6-4193-b76d-f99ab20f08fc</guid>
  <pubDate>Thu, 27 Oct 2022 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/1cacdcc7-e6f6-4193-b76d-f99ab20f08fc.mp3" length="66564288" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Open Source in Enterprise Environments, Your Comprehensive Guide to rc(8): FreeBSD Services and Automation, How Rob Pike got hired by Dennis Richie, what FreeBSD machines rubenerd uses, new debugbreak command, 7 sudo myths debunked</itunes:subtitle>
  <itunes:duration>46:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Open Source in Enterprise Environments, Your Comprehensive Guide to rc(8): FreeBSD Services and Automation, How Rob Pike got hired by Dennis Richie, what FreeBSD machines rubenerd uses, new debugbreak command, 7 sudo myths debunked&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://bsdly.blogspot.com/2022/09/open-source-in-enterprise-environments.html" target="_blank" rel="nofollow noopener"&gt;Open Source in Enterprise Environments - Where Are We Now and What Is Our Way Forward?&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/rc8-freebsd-services-and-automation/" target="_blank" rel="nofollow noopener"&gt;Your Comprehensive Guide to rc(8): FreeBSD Services and Automation&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://minnie.tuhs.org/pipermail/tuhs/2022-September/026506.html" target="_blank" rel="nofollow noopener"&gt;How Rob Pike got hired by Dennis Richie&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://rubenerd.com/cartron-asks-what-freebsd-machines-i-use/" target="_blank" rel="nofollow noopener"&gt;Cartron asks what FreeBSD machines I use&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://nullprogram.com/blog/2022/07/31/" target="_blank" rel="nofollow noopener"&gt;My new debugbreak command&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://opensource.com/article/22/8/debunk-sudo-myths" target="_blank" rel="nofollow noopener"&gt;7 sudo myths debunked&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/478/feedback/Andy%20-%20sharing%20and%20acls.md" target="_blank" rel="nofollow noopener"&gt;Andy - sharing and acls&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/478/feedback/Reptilicus%20Rex%20-%20boot%20environments.md" target="_blank" rel="nofollow noopener"&gt;Reptilicus Rex - boot environments&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/478/feedback/i3luefire%20-%20byhve%20issue.md" target="_blank" rel="nofollow noopener"&gt;i3luefire - byhve issue&lt;/a&gt;
***&lt;/li&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, filesystem, ports, packages, jails, interview, rob pike, dennis richie, machines, debugbreak, command, sudo, myth, buster, debunk </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Open Source in Enterprise Environments, Your Comprehensive Guide to rc(8): FreeBSD Services and Automation, How Rob Pike got hired by Dennis Richie, what FreeBSD machines rubenerd uses, new debugbreak command, 7 sudo myths debunked</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://bsdly.blogspot.com/2022/09/open-source-in-enterprise-environments.html" rel="nofollow">Open Source in Enterprise Environments - Where Are We Now and What Is Our Way Forward?</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/rc8-freebsd-services-and-automation/" rel="nofollow">Your Comprehensive Guide to rc(8): FreeBSD Services and Automation</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://minnie.tuhs.org/pipermail/tuhs/2022-September/026506.html" rel="nofollow">How Rob Pike got hired by Dennis Richie</a></h3>

<hr>

<h3><a href="https://rubenerd.com/cartron-asks-what-freebsd-machines-i-use/" rel="nofollow">Cartron asks what FreeBSD machines I use</a></h3>

<hr>

<h3><a href="https://nullprogram.com/blog/2022/07/31/" rel="nofollow">My new debugbreak command</a></h3>

<hr>

<h3><a href="https://opensource.com/article/22/8/debunk-sudo-myths" rel="nofollow">7 sudo myths debunked</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/478/feedback/Andy%20-%20sharing%20and%20acls.md" rel="nofollow">Andy - sharing and acls</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/478/feedback/Reptilicus%20Rex%20-%20boot%20environments.md" rel="nofollow">Reptilicus Rex - boot environments</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/478/feedback/i3luefire%20-%20byhve%20issue.md" rel="nofollow">i3luefire - byhve issue</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Open Source in Enterprise Environments, Your Comprehensive Guide to rc(8): FreeBSD Services and Automation, How Rob Pike got hired by Dennis Richie, what FreeBSD machines rubenerd uses, new debugbreak command, 7 sudo myths debunked</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<h3><a href="https://bsdly.blogspot.com/2022/09/open-source-in-enterprise-environments.html" rel="nofollow">Open Source in Enterprise Environments - Where Are We Now and What Is Our Way Forward?</a></h3>

<hr>

<h3><a href="https://klarasystems.com/articles/rc8-freebsd-services-and-automation/" rel="nofollow">Your Comprehensive Guide to rc(8): FreeBSD Services and Automation</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://minnie.tuhs.org/pipermail/tuhs/2022-September/026506.html" rel="nofollow">How Rob Pike got hired by Dennis Richie</a></h3>

<hr>

<h3><a href="https://rubenerd.com/cartron-asks-what-freebsd-machines-i-use/" rel="nofollow">Cartron asks what FreeBSD machines I use</a></h3>

<hr>

<h3><a href="https://nullprogram.com/blog/2022/07/31/" rel="nofollow">My new debugbreak command</a></h3>

<hr>

<h3><a href="https://opensource.com/article/22/8/debunk-sudo-myths" rel="nofollow">7 sudo myths debunked</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/478/feedback/Andy%20-%20sharing%20and%20acls.md" rel="nofollow">Andy - sharing and acls</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/478/feedback/Reptilicus%20Rex%20-%20boot%20environments.md" rel="nofollow">Reptilicus Rex - boot environments</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/478/feedback/i3luefire%20-%20byhve%20issue.md" rel="nofollow">i3luefire - byhve issue</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>329: Lucas’ Arts</title>
  <link>https://www.bsdnow.tv/329</link>
  <guid isPermaLink="false">ca9f1431-2af7-48ad-98d6-e68c253ec75b</guid>
  <pubDate>Thu, 19 Dec 2019 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ca9f1431-2af7-48ad-98d6-e68c253ec75b.mp3" length="36780535" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>In this episode, we interview Michael W. Lucas about his latest book projects, including the upcoming SNMP Mastery book.</itunes:subtitle>
  <itunes:duration>51:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;In this episode, we interview Michael W. Lucas about his latest book projects, including the upcoming SNMP Mastery book.&lt;/p&gt;

&lt;h3&gt;Interview - Michael Lucas&lt;/h3&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;p&gt;&lt;br&gt;
  &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0329.mp4"&gt;&lt;br&gt;
  Your browser does not support the HTML5 video tag.&lt;br&gt;
&lt;/source&gt; Special Guest: Michael W Lucas.&lt;/p&gt;
</description>
  <itunes:keywords> freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, Michael W. Lucas, Lucas, books, writing, self-publishing, publishing,  Sudo, sudo mastery, snmp, snmp mastery, bsdcan, fiction, non-fiction</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, we interview Michael W. Lucas about his latest book projects, including the upcoming SNMP Mastery book.</p>

<h3>Interview - Michael Lucas</h3>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
  <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0329.mp4">
  Your browser does not support the HTML5 video tag.
</video><p>Special Guest: Michael W Lucas.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, we interview Michael W. Lucas about his latest book projects, including the upcoming SNMP Mastery book.</p>

<h3>Interview - Michael Lucas</h3>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
  <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0329.mp4">
  Your browser does not support the HTML5 video tag.
</video><p>Special Guest: Michael W Lucas.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>293: Booking Jails</title>
  <link>https://www.bsdnow.tv/293</link>
  <guid isPermaLink="false">ca87df46-31a6-4c71-883e-e34d10e4fd2d</guid>
  <pubDate>Thu, 11 Apr 2019 12:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ca87df46-31a6-4c71-883e-e34d10e4fd2d.mp3" length="46528143" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we have a special episode with a Michael W. Lucas interview about his latest jail book that’s been released. We’re talking all things jails, writing, book sponsoring, the upcoming BSDCan 2019 conference, and more.</itunes:subtitle>
  <itunes:duration>1:16:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we have a special episode with a Michael W. Lucas interview about his latest jail book that’s been released. We’re talking all things jails, writing, book sponsoring, the upcoming BSDCan 2019 conference, and more.&lt;/p&gt;

&lt;p&gt;###Interview - Michael W. Lucas  - &lt;a href="mailto:mwl@mwl.io" target="_blank" rel="nofollow noopener"&gt;mwl@mwl.io&lt;/a&gt; / &lt;a href="https://twitter.com/mwlauthor" target="_blank" rel="nofollow noopener"&gt;@mwlauthor&lt;/a&gt;&lt;br&gt;
FreeBSD Mastery: Jails&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;BR: Welcome back to the show and congratulations on your latest book. How many books did you have to write before you could start on FreeBSD Mastery: Jails?&lt;/li&gt;
&lt;li&gt;AJ: How much research did you have to do about jails?&lt;/li&gt;
&lt;li&gt;BR: The book talks about something called ‘incomplete’ jails. What do you mean by that?&lt;/li&gt;
&lt;li&gt;AJ: There are a lot of jail management frameworks out there. Why did you chose to write about iocage in the book?&lt;/li&gt;
&lt;li&gt;BR: How many jails do you run yourself?&lt;/li&gt;
&lt;li&gt;AJ: Can you tell us a bit about how you handle book sponsorship these days?&lt;/li&gt;
&lt;li&gt;BR: What other books (fiction and non-fiction) are you currently working on?&lt;/li&gt;
&lt;li&gt;AJ: Which talks are you looking forward to attend at the upcoming BSDCan conference?&lt;/li&gt;
&lt;li&gt;BR: How is the BSD user group going?&lt;/li&gt;
&lt;li&gt;AJ: Anything else you’d like to mention before we release you from our interview jail cell?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0293.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt;
 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, jails, iocage, ezjail, books, sudo, bsdcan, gelato, writing, sponsoring, user group</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we have a special episode with a Michael W. Lucas interview about his latest jail book that’s been released. We’re talking all things jails, writing, book sponsoring, the upcoming BSDCan 2019 conference, and more.</p>

<p>###Interview - Michael W. Lucas  - <a href="mailto:mwl@mwl.io">mwl@mwl.io</a> / <a href="https://twitter.com/mwlauthor">@mwlauthor</a><br>
FreeBSD Mastery: Jails</p>

<ul>
<li>BR: Welcome back to the show and congratulations on your latest book. How many books did you have to write before you could start on FreeBSD Mastery: Jails?</li>
<li>AJ: How much research did you have to do about jails?</li>
<li>BR: The book talks about something called ‘incomplete’ jails. What do you mean by that?</li>
<li>AJ: There are a lot of jail management frameworks out there. Why did you chose to write about iocage in the book?</li>
<li>BR: How many jails do you run yourself?</li>
<li>AJ: Can you tell us a bit about how you handle book sponsorship these days?</li>
<li>BR: What other books (fiction and non-fiction) are you currently working on?</li>
<li>AJ: Which talks are you looking forward to attend at the upcoming BSDCan conference?</li>
<li>BR: How is the BSD user group going?</li>
<li>AJ: Anything else you’d like to mention before we release you from our interview jail cell?</li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0293.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we have a special episode with a Michael W. Lucas interview about his latest jail book that’s been released. We’re talking all things jails, writing, book sponsoring, the upcoming BSDCan 2019 conference, and more.</p>

<p>###Interview - Michael W. Lucas  - <a href="mailto:mwl@mwl.io">mwl@mwl.io</a> / <a href="https://twitter.com/mwlauthor">@mwlauthor</a><br>
FreeBSD Mastery: Jails</p>

<ul>
<li>BR: Welcome back to the show and congratulations on your latest book. How many books did you have to write before you could start on FreeBSD Mastery: Jails?</li>
<li>AJ: How much research did you have to do about jails?</li>
<li>BR: The book talks about something called ‘incomplete’ jails. What do you mean by that?</li>
<li>AJ: There are a lot of jail management frameworks out there. Why did you chose to write about iocage in the book?</li>
<li>BR: How many jails do you run yourself?</li>
<li>AJ: Can you tell us a bit about how you handle book sponsorship these days?</li>
<li>BR: What other books (fiction and non-fiction) are you currently working on?</li>
<li>AJ: Which talks are you looking forward to attend at the upcoming BSDCan conference?</li>
<li>BR: How is the BSD user group going?</li>
<li>AJ: Anything else you’d like to mention before we release you from our interview jail cell?</li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>

<p><hr></p>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0293.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>99: BSD Gnow</title>
  <link>https://www.bsdnow.tv/99</link>
  <guid isPermaLink="false">c234f2ea-9f17-4c25-bd28-db41586b32de</guid>
  <pubDate>Wed, 22 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c234f2ea-9f17-4c25-bd28-db41586b32de.mp3" length="57071380" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we'll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we'll hear about how the recent porting efforts have been since.</itunes:subtitle>
  <itunes:duration>1:19:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we'll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we'll hear about how the recent porting efforts have been since.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143725996614627&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD presents tame&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Theo de Raadt sent out an email detailing OpenBSD's new "tame" subsystem, written by Nicholas Marriott and himself, for restricting what processes can and can't do&lt;/li&gt;
&lt;li&gt;When using tame, programs will switch to a "restricted-service operating mode," limiting them to only the things they actually need to do&lt;/li&gt;
&lt;li&gt;As for the background: "Generally there are two models of operation. The first model requires a major rewrite of application software for effective use (ie. capsicum). The other model in common use lacks granularity, and allows or denies an operation throughout the entire lifetime of a process. As a result, they lack differentiation between program 'initialization' versus 'main servicing loop.' systrace had the same problem. My observation is that programs need a large variety of calls during initialization, but few in their main loops."&lt;/li&gt;
&lt;li&gt;Some initial categories of operation include: computation, memory management, read-write operations on file descriptors, opening of files and, of course, networking&lt;/li&gt;
&lt;li&gt;Restrictions can also be stacked further into the lifespan of the process, but removed abilities can never be regained (obviously)&lt;/li&gt;
&lt;li&gt;Anything that tries to access resources outside of its in-place limits gets terminated with a SIGKILL or, optionally, a SIGABRT (which can produce useful core dumps for investigation)&lt;/li&gt;
&lt;li&gt;Also included are 29 examples of userland programs that get additional protection with very minimal changes to the source - only 2 or 3 lines needing changed in the case of binaries like cat, ps, dmesg, etc.&lt;/li&gt;
&lt;li&gt;This is an initial work-in-progress version of tame, so there may be more improvements or &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143740834710502&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;further&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143741052411159&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;control&lt;/a&gt; options added before it hits a release (very specific access policies can &lt;a href="https://forums.grsecurity.net/viewtopic.php?f=7&amp;amp;t=2522" target="_blank" rel="nofollow noopener"&gt;sometimes backfire&lt;/a&gt;, however)&lt;/li&gt;
&lt;li&gt;The man page, also included in the mail, provides some specifics about how to integrate tame properly into your code (which, by design, was made very easy to do - making it simple means third party programs are more likely to &lt;em&gt;actually use it&lt;/em&gt;)&lt;/li&gt;
&lt;li&gt;Kernel bits are &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143727335416513&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;in the tree now&lt;/a&gt;, with userland changes starting to trickle in too&lt;/li&gt;
&lt;li&gt;Combined with a &lt;a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" target="_blank" rel="nofollow noopener"&gt;myriad of memory protections&lt;/a&gt;, tight privilege separation and (above &lt;a href="https://en.wikipedia.org/wiki/OpenBSD_security_features" target="_blank" rel="nofollow noopener"&gt;all else&lt;/a&gt;) good coding practices, tame should further harden the OpenBSD security fortress&lt;/li&gt;
&lt;li&gt;Further &lt;a href="https://news.ycombinator.com/item?id=9928221" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt; &lt;a href="https://www.reddit.com/r/programming/comments/3dsr0t" target="_blank" rel="nofollow noopener"&gt;can&lt;/a&gt; &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150719000800&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;be&lt;/a&gt; &lt;a href="https://news.ycombinator.com/item?id=9909429" target="_blank" rel="nofollow noopener"&gt;found&lt;/a&gt; &lt;a href="https://www.reddit.com/r/linux/comments/3ds66o" target="_blank" rel="nofollow noopener"&gt;in&lt;/a&gt; &lt;a href="https://lobste.rs/s/tbbtfs" target="_blank" rel="nofollow noopener"&gt;the&lt;/a&gt; &lt;a href="https://www.reddit.com/r/openbsd/comments/3ds64c" target="_blank" rel="nofollow noopener"&gt;usual&lt;/a&gt; &lt;a href="https://www.reddit.com/r/BSD/comments/3ds681" target="_blank" rel="nofollow noopener"&gt;places&lt;/a&gt; you'd expect
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/Docker" target="_blank" rel="nofollow noopener"&gt;Using Docker on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With the experimental Docker port landing in FreeBSD a few weeks ago, some initial docs are starting to show up&lt;/li&gt;
&lt;li&gt;This docker is "the real thing," and isn’t using a virtual machine as the backend - as such, it has some limitations&lt;/li&gt;
&lt;li&gt;The FreeBSD wiki has a page detailing how it works in general, as well as more info about those limitations&lt;/li&gt;
&lt;li&gt;When running Linux containers, it will only work as well as the Linux ABI compat layer for your version of FreeBSD (11.0, or -CURRENT when we're recording this, is where all the action is for 64bit support)&lt;/li&gt;
&lt;li&gt;For users on 10.X, there's also a FreeBSD container available, which allows you to use Docker as a fancy jail manager (it uses the jail subsystem internally)&lt;/li&gt;
&lt;li&gt;Give it a try, let us know how you find it to be compared to other solutions
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/doas" target="_blank" rel="nofollow noopener"&gt;OpenBSD imports doas, removes sudo&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has included the ubiquitous "sudo" utility for many years now, and the current maintainer of sudo (Todd C. Miller) is also a long-time OpenBSD dev&lt;/li&gt;
&lt;li&gt;The version included in the base system was much smaller than the latest current version used elsewhere, but was based on older code&lt;/li&gt;
&lt;li&gt;Some internal discussion lead to the decision that sudo should probably be moved to ports now, where it can be updated easily and offer all the extra features that were missing in base (LDAP and whatnot)&lt;/li&gt;
&lt;li&gt;Ted Unangst conjured up with a rewritten utility to replace it in the base system, dubbed "do as," with the aim of being more simple and compact&lt;/li&gt;
&lt;li&gt;There were concerns that sudo was too big and too complicated, and a quick 'n' dirty check reveals that doas is around 350 lines of code, while sudo is around 10,000 - which would you rather have as a setuid root binary?&lt;/li&gt;
&lt;li&gt;After the initial import, a number of developers began reviewing and improving various bits here and there&lt;/li&gt;
&lt;li&gt;You can &lt;a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/doas/" target="_blank" rel="nofollow noopener"&gt;check out the code&lt;/a&gt; now if you're interested&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man1/doas.1" target="_blank" rel="nofollow noopener"&gt;Command usage&lt;/a&gt; and &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/doas.conf.5" target="_blank" rel="nofollow noopener"&gt;config syntax&lt;/a&gt; seem pretty straightforward&lt;/li&gt;
&lt;li&gt;More &lt;a href="https://news.ycombinator.com/item?id=9914693" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt; on HN
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/freebsd/comments/3d80vt/what_would_you_like_to_see_in_freebsd/" target="_blank" rel="nofollow noopener"&gt;What would you like to see in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd started a reddit thread about areas in which FreeBSD could be improved, asking the community what they'd like to see&lt;/li&gt;
&lt;li&gt;There are over &lt;strong&gt;200&lt;/strong&gt; comments that span a wide range of topics, so we'll just cover a few of the more popular requests - check the very long thread if you're interested in more&lt;/li&gt;
&lt;li&gt;The top comment says things don't "just work," citing failover link aggregation of LACP laggs, PPPoE issues, disorganized jail configuration options, unclear CARP configuration and userland dtrace being unstable&lt;/li&gt;
&lt;li&gt;Another common one was that there are &lt;em&gt;three&lt;/em&gt; firewalls in the base system, with ipfilter and pf being kinda dead now - should they be removed, and more focus put into ipfw?&lt;/li&gt;
&lt;li&gt;Video drivers also came up frequently, with users hoping for better OpenGL support and support for newer graphics cards from Intel and AMD - similar comments were made about wireless chipsets as well&lt;/li&gt;
&lt;li&gt;Some other replies included more clarity with pkgng output, paying more attention to security issues, updating PF to match the one in OpenBSD, improved laptop support, a graphical installer, LibreSSL in base, more focus on embedded MIPS devices, binary packages with different config options, steam support and lots more&lt;/li&gt;
&lt;li&gt;At least one user suggested better "marketing" for FreeBSD, with more advocacy and (hopefully) more business adoption&lt;/li&gt;
&lt;li&gt;That one really applies to all the BSDs, and regular users (that's you listening to this) can help make it happen for whichever ones you use &lt;em&gt;right now&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Maybe Adrian can singlehandedly do all the work and make all the users happy
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ryan Lortie &amp;amp; Baptiste Daroussin&lt;/h2&gt;

&lt;p&gt;Porting the latest GNOME code to FreeBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://stable.rcesoftware.com/resflash/" target="_blank" rel="nofollow noopener"&gt;Introducing resflash&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you haven't heard of resflash before, it's "a tool for building OpenBSD images for embedded and cloud environments in a programmatic, reproducible way"&lt;/li&gt;
&lt;li&gt;One of the major benefits to images like this is the read-only filesystem, so there's no possibility of filesystem corruption if power is lost&lt;/li&gt;
&lt;li&gt;There's an optional read-write partition as well, used for any persistent changes you want to make&lt;/li&gt;
&lt;li&gt;You can check out the source code &lt;a href="https://github.com/bconway/resflash" target="_blank" rel="nofollow noopener"&gt;on Github&lt;/a&gt; or read the main site for more info
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://pid1.com/posts/post10.html" target="_blank" rel="nofollow noopener"&gt;Jails with iocage&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There are a growing number of FreeBSD jail management utilities: ezjail, cbsd, warden and a few others&lt;/li&gt;
&lt;li&gt;After looking at all the different choices, the author of this blog post eventually settled on &lt;a href="https://github.com/iocage/iocage" target="_blank" rel="nofollow noopener"&gt;iocage&lt;/a&gt; for the job&lt;/li&gt;
&lt;li&gt;The post walks you through the basic configuration and usage of iocage for creating managing jails&lt;/li&gt;
&lt;li&gt;If you've been unhappy with ezjail or some of the others, iocage might be worth giving a try instead (it also has really good ZFS integration)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207892.html" target="_blank" rel="nofollow noopener"&gt;DragonFly GPU improvements&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFlyBSD continues to up their graphics game, this time with Intel's ValleyView series of CPUs&lt;/li&gt;
&lt;li&gt;These GPUs are primarily used in the newer Atom CPUs and offer much better performance than the older ones&lt;/li&gt;
&lt;li&gt;A git branch was created to hold the fixes for now while the last remaining bugs get fixed&lt;/li&gt;
&lt;li&gt;Fully-accelerated Broadwell support and an update to newer DRM code are also available in the git branch, and will be merged to the main tree after some testing
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/branchless-development" target="_blank" rel="nofollow noopener"&gt;Branchless development&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ted Unangst has a new blog post up, talking about software branches and the effects of having (or not having) them&lt;/li&gt;
&lt;li&gt;He covers integrating and merging code, and the versioning problems that can happen with multiple people contributing at once&lt;/li&gt;
&lt;li&gt;"For an open source project, branching is counter intuitively antisocial. For instance, I usually tell people I’m running OpenBSD, but that’s kind of a lie. I’m actually running teduBSD, which is like OpenBSD but has some changes to make it even better. Of course, you can’t have teduBSD because I’m selfish. I’m also lazy, and only inclined to make my changes work for me, not everyone else."&lt;/li&gt;
&lt;li&gt;The solution, according to him, is bringing all the code the developers are using closer together&lt;/li&gt;
&lt;li&gt;One big benefit is that WIP code gets tested much faster (and bugs get fixed early on)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21yQtBCCK" target="_blank" rel="nofollow noopener"&gt;Matthew writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21oFA80kY" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JYvTlJlm" target="_blank" rel="nofollow noopener"&gt;Anonymous writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21LXvk53z" target="_blank" rel="nofollow noopener"&gt;Bill writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, gnome, gnome shell, gnome3, puns i will regret forever, doas, sudo, resflash, flashrd, nanobsd, tame, capsicum, iocage, ezjail, docker</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;ll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we&#39;ll hear about how the recent porting efforts have been since.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">OpenBSD presents tame</a></h3>

<ul>
<li>Theo de Raadt sent out an email detailing OpenBSD&#39;s new &quot;tame&quot; subsystem, written by Nicholas Marriott and himself, for restricting what processes can and can&#39;t do</li>
<li>When using tame, programs will switch to a &quot;restricted-service operating mode,&quot; limiting them to only the things they actually need to do</li>
<li>As for the background: &quot;Generally there are two models of operation. The first model requires a major rewrite of application software for effective use (ie. capsicum). The other model in common use lacks granularity, and allows or denies an operation throughout the entire lifetime of a process. As a result, they lack differentiation between program &#39;initialization&#39; versus &#39;main servicing loop.&#39; systrace had the same problem. My observation is that programs need a large variety of calls during initialization, but few in their main loops.&quot;</li>
<li>Some initial categories of operation include: computation, memory management, read-write operations on file descriptors, opening of files and, of course, networking</li>
<li>Restrictions can also be stacked further into the lifespan of the process, but removed abilities can never be regained (obviously)</li>
<li>Anything that tries to access resources outside of its in-place limits gets terminated with a SIGKILL or, optionally, a SIGABRT (which can produce useful core dumps for investigation)</li>
<li>Also included are 29 examples of userland programs that get additional protection with very minimal changes to the source - only 2 or 3 lines needing changed in the case of binaries like cat, ps, dmesg, etc.</li>
<li>This is an initial work-in-progress version of tame, so there may be more improvements or <a href="https://www.marc.info/?l=openbsd-tech&m=143740834710502&w=2" rel="nofollow">further</a> <a href="https://www.marc.info/?l=openbsd-tech&m=143741052411159&w=2" rel="nofollow">control</a> options added before it hits a release (very specific access policies can <a href="https://forums.grsecurity.net/viewtopic.php?f=7&t=2522" rel="nofollow">sometimes backfire</a>, however)</li>
<li>The man page, also included in the mail, provides some specifics about how to integrate tame properly into your code (which, by design, was made very easy to do - making it simple means third party programs are more likely to <em>actually use it</em>)</li>
<li>Kernel bits are <a href="https://www.marc.info/?l=openbsd-cvs&m=143727335416513&w=2" rel="nofollow">in the tree now</a>, with userland changes starting to trickle in too</li>
<li>Combined with a <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">myriad of memory protections</a>, tight privilege separation and (above <a href="https://en.wikipedia.org/wiki/OpenBSD_security_features" rel="nofollow">all else</a>) good coding practices, tame should further harden the OpenBSD security fortress</li>
<li>Further <a href="https://news.ycombinator.com/item?id=9928221" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/programming/comments/3dsr0t" rel="nofollow">can</a> <a href="http://undeadly.org/cgi?action=article&sid=20150719000800&mode=flat" rel="nofollow">be</a> <a href="https://news.ycombinator.com/item?id=9909429" rel="nofollow">found</a> <a href="https://www.reddit.com/r/linux/comments/3ds66o" rel="nofollow">in</a> <a href="https://lobste.rs/s/tbbtfs" rel="nofollow">the</a> <a href="https://www.reddit.com/r/openbsd/comments/3ds64c" rel="nofollow">usual</a> <a href="https://www.reddit.com/r/BSD/comments/3ds681" rel="nofollow">places</a> you&#39;d expect
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/Docker" rel="nofollow">Using Docker on FreeBSD</a></h3>

<ul>
<li>With the experimental Docker port landing in FreeBSD a few weeks ago, some initial docs are starting to show up</li>
<li>This docker is &quot;the real thing,&quot; and isn’t using a virtual machine as the backend - as such, it has some limitations</li>
<li>The FreeBSD wiki has a page detailing how it works in general, as well as more info about those limitations</li>
<li>When running Linux containers, it will only work as well as the Linux ABI compat layer for your version of FreeBSD (11.0, or -CURRENT when we&#39;re recording this, is where all the action is for 64bit support)</li>
<li>For users on 10.X, there&#39;s also a FreeBSD container available, which allows you to use Docker as a fancy jail manager (it uses the jail subsystem internally)</li>
<li>Give it a try, let us know how you find it to be compared to other solutions
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/doas" rel="nofollow">OpenBSD imports doas, removes sudo</a></h3>

<ul>
<li>OpenBSD has included the ubiquitous &quot;sudo&quot; utility for many years now, and the current maintainer of sudo (Todd C. Miller) is also a long-time OpenBSD dev</li>
<li>The version included in the base system was much smaller than the latest current version used elsewhere, but was based on older code</li>
<li>Some internal discussion lead to the decision that sudo should probably be moved to ports now, where it can be updated easily and offer all the extra features that were missing in base (LDAP and whatnot)</li>
<li>Ted Unangst conjured up with a rewritten utility to replace it in the base system, dubbed &quot;do as,&quot; with the aim of being more simple and compact</li>
<li>There were concerns that sudo was too big and too complicated, and a quick &#39;n&#39; dirty check reveals that doas is around 350 lines of code, while sudo is around 10,000 - which would you rather have as a setuid root binary?</li>
<li>After the initial import, a number of developers began reviewing and improving various bits here and there</li>
<li>You can <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/doas/" rel="nofollow">check out the code</a> now if you&#39;re interested</li>
<li><a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man1/doas.1" rel="nofollow">Command usage</a> and <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/doas.conf.5" rel="nofollow">config syntax</a> seem pretty straightforward</li>
<li>More <a href="https://news.ycombinator.com/item?id=9914693" rel="nofollow">discussion</a> on HN
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/3d80vt/what_would_you_like_to_see_in_freebsd/" rel="nofollow">What would you like to see in FreeBSD</a></h3>

<ul>
<li>Adrian Chadd started a reddit thread about areas in which FreeBSD could be improved, asking the community what they&#39;d like to see</li>
<li>There are over <strong>200</strong> comments that span a wide range of topics, so we&#39;ll just cover a few of the more popular requests - check the very long thread if you&#39;re interested in more</li>
<li>The top comment says things don&#39;t &quot;just work,&quot; citing failover link aggregation of LACP laggs, PPPoE issues, disorganized jail configuration options, unclear CARP configuration and userland dtrace being unstable</li>
<li>Another common one was that there are <em>three</em> firewalls in the base system, with ipfilter and pf being kinda dead now - should they be removed, and more focus put into ipfw?</li>
<li>Video drivers also came up frequently, with users hoping for better OpenGL support and support for newer graphics cards from Intel and AMD - similar comments were made about wireless chipsets as well</li>
<li>Some other replies included more clarity with pkgng output, paying more attention to security issues, updating PF to match the one in OpenBSD, improved laptop support, a graphical installer, LibreSSL in base, more focus on embedded MIPS devices, binary packages with different config options, steam support and lots more</li>
<li>At least one user suggested better &quot;marketing&quot; for FreeBSD, with more advocacy and (hopefully) more business adoption</li>
<li>That one really applies to all the BSDs, and regular users (that&#39;s you listening to this) can help make it happen for whichever ones you use <em>right now</em></li>
<li>Maybe Adrian can singlehandedly do all the work and make all the users happy
***</li>
</ul>

<h2>Interview - Ryan Lortie &amp; Baptiste Daroussin</h2>

<p>Porting the latest GNOME code to FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://stable.rcesoftware.com/resflash/" rel="nofollow">Introducing resflash</a></h3>

<ul>
<li>If you haven&#39;t heard of resflash before, it&#39;s &quot;a tool for building OpenBSD images for embedded and cloud environments in a programmatic, reproducible way&quot;</li>
<li>One of the major benefits to images like this is the read-only filesystem, so there&#39;s no possibility of filesystem corruption if power is lost</li>
<li>There&#39;s an optional read-write partition as well, used for any persistent changes you want to make</li>
<li>You can check out the source code <a href="https://github.com/bconway/resflash" rel="nofollow">on Github</a> or read the main site for more info
***</li>
</ul>

<h3><a href="http://pid1.com/posts/post10.html" rel="nofollow">Jails with iocage</a></h3>

<ul>
<li>There are a growing number of FreeBSD jail management utilities: ezjail, cbsd, warden and a few others</li>
<li>After looking at all the different choices, the author of this blog post eventually settled on <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a> for the job</li>
<li>The post walks you through the basic configuration and usage of iocage for creating managing jails</li>
<li>If you&#39;ve been unhappy with ezjail or some of the others, iocage might be worth giving a try instead (it also has really good ZFS integration)
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207892.html" rel="nofollow">DragonFly GPU improvements</a></h3>

<ul>
<li>DragonFlyBSD continues to up their graphics game, this time with Intel&#39;s ValleyView series of CPUs</li>
<li>These GPUs are primarily used in the newer Atom CPUs and offer much better performance than the older ones</li>
<li>A git branch was created to hold the fixes for now while the last remaining bugs get fixed</li>
<li>Fully-accelerated Broadwell support and an update to newer DRM code are also available in the git branch, and will be merged to the main tree after some testing
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/branchless-development" rel="nofollow">Branchless development</a></h3>

<ul>
<li>Ted Unangst has a new blog post up, talking about software branches and the effects of having (or not having) them</li>
<li>He covers integrating and merging code, and the versioning problems that can happen with multiple people contributing at once</li>
<li>&quot;For an open source project, branching is counter intuitively antisocial. For instance, I usually tell people I’m running OpenBSD, but that’s kind of a lie. I’m actually running teduBSD, which is like OpenBSD but has some changes to make it even better. Of course, you can’t have teduBSD because I’m selfish. I’m also lazy, and only inclined to make my changes work for me, not everyone else.&quot;</li>
<li>The solution, according to him, is bringing all the code the developers are using closer together</li>
<li>One big benefit is that WIP code gets tested much faster (and bugs get fixed early on)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21yQtBCCK" rel="nofollow">Matthew writes in</a></li>
<li><a href="http://slexy.org/view/s21oFA80kY" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2JYvTlJlm" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s21LXvk53z" rel="nofollow">Bill writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;ll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we&#39;ll hear about how the recent porting efforts have been since.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">OpenBSD presents tame</a></h3>

<ul>
<li>Theo de Raadt sent out an email detailing OpenBSD&#39;s new &quot;tame&quot; subsystem, written by Nicholas Marriott and himself, for restricting what processes can and can&#39;t do</li>
<li>When using tame, programs will switch to a &quot;restricted-service operating mode,&quot; limiting them to only the things they actually need to do</li>
<li>As for the background: &quot;Generally there are two models of operation. The first model requires a major rewrite of application software for effective use (ie. capsicum). The other model in common use lacks granularity, and allows or denies an operation throughout the entire lifetime of a process. As a result, they lack differentiation between program &#39;initialization&#39; versus &#39;main servicing loop.&#39; systrace had the same problem. My observation is that programs need a large variety of calls during initialization, but few in their main loops.&quot;</li>
<li>Some initial categories of operation include: computation, memory management, read-write operations on file descriptors, opening of files and, of course, networking</li>
<li>Restrictions can also be stacked further into the lifespan of the process, but removed abilities can never be regained (obviously)</li>
<li>Anything that tries to access resources outside of its in-place limits gets terminated with a SIGKILL or, optionally, a SIGABRT (which can produce useful core dumps for investigation)</li>
<li>Also included are 29 examples of userland programs that get additional protection with very minimal changes to the source - only 2 or 3 lines needing changed in the case of binaries like cat, ps, dmesg, etc.</li>
<li>This is an initial work-in-progress version of tame, so there may be more improvements or <a href="https://www.marc.info/?l=openbsd-tech&m=143740834710502&w=2" rel="nofollow">further</a> <a href="https://www.marc.info/?l=openbsd-tech&m=143741052411159&w=2" rel="nofollow">control</a> options added before it hits a release (very specific access policies can <a href="https://forums.grsecurity.net/viewtopic.php?f=7&t=2522" rel="nofollow">sometimes backfire</a>, however)</li>
<li>The man page, also included in the mail, provides some specifics about how to integrate tame properly into your code (which, by design, was made very easy to do - making it simple means third party programs are more likely to <em>actually use it</em>)</li>
<li>Kernel bits are <a href="https://www.marc.info/?l=openbsd-cvs&m=143727335416513&w=2" rel="nofollow">in the tree now</a>, with userland changes starting to trickle in too</li>
<li>Combined with a <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">myriad of memory protections</a>, tight privilege separation and (above <a href="https://en.wikipedia.org/wiki/OpenBSD_security_features" rel="nofollow">all else</a>) good coding practices, tame should further harden the OpenBSD security fortress</li>
<li>Further <a href="https://news.ycombinator.com/item?id=9928221" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/programming/comments/3dsr0t" rel="nofollow">can</a> <a href="http://undeadly.org/cgi?action=article&sid=20150719000800&mode=flat" rel="nofollow">be</a> <a href="https://news.ycombinator.com/item?id=9909429" rel="nofollow">found</a> <a href="https://www.reddit.com/r/linux/comments/3ds66o" rel="nofollow">in</a> <a href="https://lobste.rs/s/tbbtfs" rel="nofollow">the</a> <a href="https://www.reddit.com/r/openbsd/comments/3ds64c" rel="nofollow">usual</a> <a href="https://www.reddit.com/r/BSD/comments/3ds681" rel="nofollow">places</a> you&#39;d expect
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/Docker" rel="nofollow">Using Docker on FreeBSD</a></h3>

<ul>
<li>With the experimental Docker port landing in FreeBSD a few weeks ago, some initial docs are starting to show up</li>
<li>This docker is &quot;the real thing,&quot; and isn’t using a virtual machine as the backend - as such, it has some limitations</li>
<li>The FreeBSD wiki has a page detailing how it works in general, as well as more info about those limitations</li>
<li>When running Linux containers, it will only work as well as the Linux ABI compat layer for your version of FreeBSD (11.0, or -CURRENT when we&#39;re recording this, is where all the action is for 64bit support)</li>
<li>For users on 10.X, there&#39;s also a FreeBSD container available, which allows you to use Docker as a fancy jail manager (it uses the jail subsystem internally)</li>
<li>Give it a try, let us know how you find it to be compared to other solutions
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/doas" rel="nofollow">OpenBSD imports doas, removes sudo</a></h3>

<ul>
<li>OpenBSD has included the ubiquitous &quot;sudo&quot; utility for many years now, and the current maintainer of sudo (Todd C. Miller) is also a long-time OpenBSD dev</li>
<li>The version included in the base system was much smaller than the latest current version used elsewhere, but was based on older code</li>
<li>Some internal discussion lead to the decision that sudo should probably be moved to ports now, where it can be updated easily and offer all the extra features that were missing in base (LDAP and whatnot)</li>
<li>Ted Unangst conjured up with a rewritten utility to replace it in the base system, dubbed &quot;do as,&quot; with the aim of being more simple and compact</li>
<li>There were concerns that sudo was too big and too complicated, and a quick &#39;n&#39; dirty check reveals that doas is around 350 lines of code, while sudo is around 10,000 - which would you rather have as a setuid root binary?</li>
<li>After the initial import, a number of developers began reviewing and improving various bits here and there</li>
<li>You can <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/doas/" rel="nofollow">check out the code</a> now if you&#39;re interested</li>
<li><a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man1/doas.1" rel="nofollow">Command usage</a> and <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/doas.conf.5" rel="nofollow">config syntax</a> seem pretty straightforward</li>
<li>More <a href="https://news.ycombinator.com/item?id=9914693" rel="nofollow">discussion</a> on HN
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/3d80vt/what_would_you_like_to_see_in_freebsd/" rel="nofollow">What would you like to see in FreeBSD</a></h3>

<ul>
<li>Adrian Chadd started a reddit thread about areas in which FreeBSD could be improved, asking the community what they&#39;d like to see</li>
<li>There are over <strong>200</strong> comments that span a wide range of topics, so we&#39;ll just cover a few of the more popular requests - check the very long thread if you&#39;re interested in more</li>
<li>The top comment says things don&#39;t &quot;just work,&quot; citing failover link aggregation of LACP laggs, PPPoE issues, disorganized jail configuration options, unclear CARP configuration and userland dtrace being unstable</li>
<li>Another common one was that there are <em>three</em> firewalls in the base system, with ipfilter and pf being kinda dead now - should they be removed, and more focus put into ipfw?</li>
<li>Video drivers also came up frequently, with users hoping for better OpenGL support and support for newer graphics cards from Intel and AMD - similar comments were made about wireless chipsets as well</li>
<li>Some other replies included more clarity with pkgng output, paying more attention to security issues, updating PF to match the one in OpenBSD, improved laptop support, a graphical installer, LibreSSL in base, more focus on embedded MIPS devices, binary packages with different config options, steam support and lots more</li>
<li>At least one user suggested better &quot;marketing&quot; for FreeBSD, with more advocacy and (hopefully) more business adoption</li>
<li>That one really applies to all the BSDs, and regular users (that&#39;s you listening to this) can help make it happen for whichever ones you use <em>right now</em></li>
<li>Maybe Adrian can singlehandedly do all the work and make all the users happy
***</li>
</ul>

<h2>Interview - Ryan Lortie &amp; Baptiste Daroussin</h2>

<p>Porting the latest GNOME code to FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://stable.rcesoftware.com/resflash/" rel="nofollow">Introducing resflash</a></h3>

<ul>
<li>If you haven&#39;t heard of resflash before, it&#39;s &quot;a tool for building OpenBSD images for embedded and cloud environments in a programmatic, reproducible way&quot;</li>
<li>One of the major benefits to images like this is the read-only filesystem, so there&#39;s no possibility of filesystem corruption if power is lost</li>
<li>There&#39;s an optional read-write partition as well, used for any persistent changes you want to make</li>
<li>You can check out the source code <a href="https://github.com/bconway/resflash" rel="nofollow">on Github</a> or read the main site for more info
***</li>
</ul>

<h3><a href="http://pid1.com/posts/post10.html" rel="nofollow">Jails with iocage</a></h3>

<ul>
<li>There are a growing number of FreeBSD jail management utilities: ezjail, cbsd, warden and a few others</li>
<li>After looking at all the different choices, the author of this blog post eventually settled on <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a> for the job</li>
<li>The post walks you through the basic configuration and usage of iocage for creating managing jails</li>
<li>If you&#39;ve been unhappy with ezjail or some of the others, iocage might be worth giving a try instead (it also has really good ZFS integration)
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207892.html" rel="nofollow">DragonFly GPU improvements</a></h3>

<ul>
<li>DragonFlyBSD continues to up their graphics game, this time with Intel&#39;s ValleyView series of CPUs</li>
<li>These GPUs are primarily used in the newer Atom CPUs and offer much better performance than the older ones</li>
<li>A git branch was created to hold the fixes for now while the last remaining bugs get fixed</li>
<li>Fully-accelerated Broadwell support and an update to newer DRM code are also available in the git branch, and will be merged to the main tree after some testing
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/branchless-development" rel="nofollow">Branchless development</a></h3>

<ul>
<li>Ted Unangst has a new blog post up, talking about software branches and the effects of having (or not having) them</li>
<li>He covers integrating and merging code, and the versioning problems that can happen with multiple people contributing at once</li>
<li>&quot;For an open source project, branching is counter intuitively antisocial. For instance, I usually tell people I’m running OpenBSD, but that’s kind of a lie. I’m actually running teduBSD, which is like OpenBSD but has some changes to make it even better. Of course, you can’t have teduBSD because I’m selfish. I’m also lazy, and only inclined to make my changes work for me, not everyone else.&quot;</li>
<li>The solution, according to him, is bringing all the code the developers are using closer together</li>
<li>One big benefit is that WIP code gets tested much faster (and bugs get fixed early on)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21yQtBCCK" rel="nofollow">Matthew writes in</a></li>
<li><a href="http://slexy.org/view/s21oFA80kY" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2JYvTlJlm" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s21LXvk53z" rel="nofollow">Bill writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
