<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 14 Apr 2026 03:31:49 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Systemd”</title>
    <link>https://www.bsdnow.tv/tags/systemd</link>
    <pubDate>Thu, 27 Jun 2024 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>565: Secure by default</title>
  <link>https://www.bsdnow.tv/565</link>
  <guid isPermaLink="false">0e1b5cea-6e44-44e4-ac3a-f6f0fe49814c</guid>
  <pubDate>Thu, 27 Jun 2024 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0e1b5cea-6e44-44e4-ac3a-f6f0fe49814c.mp3" length="74142504" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>NetBSD 10 on a Pinebook Pro, OpenBSD extreme privacy setup, Version 256 of systemd boasts '42% less Unix philosophy', Posix.1 2024 is out, Blocking Access From or to Specific Countries Using FreeBSD and Pf, and more.
Date: 2024.06.17</itunes:subtitle>
  <itunes:duration>51:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>NetBSD 10 on a Pinebook Pro, OpenBSD extreme privacy setup, Version 256 of systemd boasts '42% less Unix philosophy', Posix.1 2024 is out, Blocking Access From or to Specific Countries Using FreeBSD and Pf, and more.
Date: 2024.06.17
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
NetBSD 10 on a Pinebook Pro (https://www.idatum.net/netbsd-10-on-a-pinebook-pro-laptop.html)
OpenBSD extreme privacy setup (https://dataswamp.org/~solene/2024-06-08-openbsd-privacy-setup.html)
News Roundup
Version 256 of systemd boasts '42% less Unix philosophy' (https://www.theregister.com/2024/06/13/version_256_systemd/)
Posix.1 2024 is out (https://ieeexplore.ieee.org/document/10555529)
Blocking Access From or to Specific Countries Using FreeBSD and Pf (https://it-notes.dragas.net/2024/06/16/freebsd-blocking-country-access/)
Beastie Bits
BSD User Group Düsseldorf Juli 2024 (https://www.meetup.com/de-DE/bsd-user-group-dusseldorf-bsd-nrw/events/301557512/)
Another cool UNIX workstation, that was never released (https://www.reddit.com/r/unix/comments/1dd60re/another_cool_unix_workstation_that_was_never/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, pinebook pro, extreme privacy setup, penalize undesirable behavior, systemd, less Unix philosophy, posix, blocking access, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>NetBSD 10 on a Pinebook Pro, OpenBSD extreme privacy setup, Version 256 of systemd boasts &#39;42% less Unix philosophy&#39;, Posix.1 2024 is out, Blocking Access From or to Specific Countries Using FreeBSD and Pf, and more.<br>
Date: 2024.06.17</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.idatum.net/netbsd-10-on-a-pinebook-pro-laptop.html" rel="nofollow">NetBSD 10 on a Pinebook Pro</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2024-06-08-openbsd-privacy-setup.html" rel="nofollow">OpenBSD extreme privacy setup</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.theregister.com/2024/06/13/version_256_systemd/" rel="nofollow">Version 256 of systemd boasts &#39;42% less Unix philosophy&#39;</a></p>

<hr>

<p><a href="https://ieeexplore.ieee.org/document/10555529" rel="nofollow">Posix.1 2024 is out</a></p>

<hr>

<p><a href="https://it-notes.dragas.net/2024/06/16/freebsd-blocking-country-access/" rel="nofollow">Blocking Access From or to Specific Countries Using FreeBSD and Pf</a></p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.meetup.com/de-DE/bsd-user-group-dusseldorf-bsd-nrw/events/301557512/" rel="nofollow">BSD User Group Düsseldorf Juli 2024</a></li>
<li><a href="https://www.reddit.com/r/unix/comments/1dd60re/another_cool_unix_workstation_that_was_never/" rel="nofollow">Another cool UNIX workstation, that was never released</a></li>
</ul>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>NetBSD 10 on a Pinebook Pro, OpenBSD extreme privacy setup, Version 256 of systemd boasts &#39;42% less Unix philosophy&#39;, Posix.1 2024 is out, Blocking Access From or to Specific Countries Using FreeBSD and Pf, and more.<br>
Date: 2024.06.17</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.idatum.net/netbsd-10-on-a-pinebook-pro-laptop.html" rel="nofollow">NetBSD 10 on a Pinebook Pro</a></p>

<hr>

<p><a href="https://dataswamp.org/%7Esolene/2024-06-08-openbsd-privacy-setup.html" rel="nofollow">OpenBSD extreme privacy setup</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.theregister.com/2024/06/13/version_256_systemd/" rel="nofollow">Version 256 of systemd boasts &#39;42% less Unix philosophy&#39;</a></p>

<hr>

<p><a href="https://ieeexplore.ieee.org/document/10555529" rel="nofollow">Posix.1 2024 is out</a></p>

<hr>

<p><a href="https://it-notes.dragas.net/2024/06/16/freebsd-blocking-country-access/" rel="nofollow">Blocking Access From or to Specific Countries Using FreeBSD and Pf</a></p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.meetup.com/de-DE/bsd-user-group-dusseldorf-bsd-nrw/events/301557512/" rel="nofollow">BSD User Group Düsseldorf Juli 2024</a></li>
<li><a href="https://www.reddit.com/r/unix/comments/1dd60re/another_cool_unix_workstation_that_was_never/" rel="nofollow">Another cool UNIX workstation, that was never released</a></li>
</ul>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>397: Fresh BSD 2021</title>
  <link>https://www.bsdnow.tv/397</link>
  <guid isPermaLink="false">c901a741-a25b-4d92-9ce4-03b5f2e18d2f</guid>
  <pubDate>Thu, 08 Apr 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c901a741-a25b-4d92-9ce4-03b5f2e18d2f.mp3" length="34526808" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Customizing the FreeBSD Kernel, OpenBSD/loongson on the Lemote Fuloong, how ZFS on Linux brings up pools and filesystems at boot under systemd, LLDB: FreeBSD Legacy Process Plugin Removed, FreshBSD 2021, gmid, Danschmid’s Poudriere Guide in english, and more</itunes:subtitle>
  <itunes:duration>56:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Customizing the FreeBSD Kernel, OpenBSD/loongson on the Lemote Fuloong, how ZFS on Linux brings up pools and filesystems at boot under systemd, LLDB: FreeBSD Legacy Process Plugin Removed, FreshBSD 2021, gmid, Danschmid’s Poudriere Guide in english, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
Customizing the FreeBSD Kernel (https://klarasystems.com/articles/customizing-the-freebsd-kernel/)
Learn more about customizing the build of the FreeBSD kernel and its loadable modules
OpenBSD/loongson on the Lemote Fuloong (https://www.cambus.net/openbsd-loongson-on-the-lemote-fuloong/)
In my article about running OpenBSD/loongson on the Lemote Yeeloong back in 2016, I mentioned looking for a Fuloong. All hope seemed lost until the Summer of 2017, when a fellow OpenBSD developer was contacted by a generous user (Thanks again, Lars!) offering to donate two Lemote Fuloong machines, and I was lucky enough to get one of those units.
News Roundup
How ZFS on Linux brings up pools and filesystems at boot under systemd (https://utcc.utoronto.ca/~cks/space/blog/linux/ZFSBringUpOnBoot)
On Solaris and Illumos, how ZFS pools and filesystems were brought up at boot was always a partial mystery to me (and it seemed to involve the kernel knowing a lot about /etc/zfs/zpool.cache). On Linux, additional software RAID arrays are brought up mostly through udev rules, which has its own complications. For a long time I had the general impression that ZFS on Linux also worked through udev rules to recognize vdev components, much like software RAID. However, this turns out to not be the case and the modern ZFS on Linux boot process is quite straightforward on systemd systems.
LLDB: FreeBSD Legacy Process Plugin Removed (https://www.moritz.systems/blog/freebsd-legacy-process-plugin-removed/)
During the past month we’ve successfully removed the legacy FreeBSD plugin and continued improving the new one. We have prepared an implementation of hardware breakpoint and watchpoint support for FreeBSD/AArch64, and iterated over all tests that currently fail on that platform. Therefore, we have concluded the second milestone.
FreshBSD 2021 (https://freshbsd.org/news/2021/02/28)
6 weeks ago I created a branch for a significant rework of FreshBSD. Nearly 300 commits later, and just a week shy of our 15th anniversary, the result is what you’re looking at now. I hope you like it.
gmid (https://github.com/omar-polo/gmid/) is a gemini (https://gemini.circumlunar.space/) server  for unixes.
Danschmid’s Poudriere Guide now in english (https://danschmid.de/en/blog/poudriere-guide)
The ports system is one of FreeBSD's greatest advantages for users who want flexibility and control over their software. It enables administrators to easily create and manage source-based installations using a system that is robust and predictable.
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
 Special Guest: Tom Jones.
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, customizing, kernel, loongson, lemote, fuloong, boot, systemd, lldb, legacy, process, plugin, freshbsd, gmid, poudriere, guide</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Customizing the FreeBSD Kernel, OpenBSD/loongson on the Lemote Fuloong, how ZFS on Linux brings up pools and filesystems at boot under systemd, LLDB: FreeBSD Legacy Process Plugin Removed, FreshBSD 2021, gmid, Danschmid’s Poudriere Guide in english, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/customizing-the-freebsd-kernel/" rel="nofollow">Customizing the FreeBSD Kernel</a></h3>

<blockquote>
<p>Learn more about customizing the build of the FreeBSD kernel and its loadable modules</p>

<hr>

<h3><a href="https://www.cambus.net/openbsd-loongson-on-the-lemote-fuloong/" rel="nofollow">OpenBSD/loongson on the Lemote Fuloong</a></h3>

<p>In my article about running OpenBSD/loongson on the Lemote Yeeloong back in 2016, I mentioned looking for a Fuloong. All hope seemed lost until the Summer of 2017, when a fellow OpenBSD developer was contacted by a generous user (Thanks again, Lars!) offering to donate two Lemote Fuloong machines, and I was lucky enough to get one of those units.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/linux/ZFSBringUpOnBoot" rel="nofollow">How ZFS on Linux brings up pools and filesystems at boot under systemd</a></h3>

<blockquote>
<p>On Solaris and Illumos, how ZFS pools and filesystems were brought up at boot was always a partial mystery to me (and it seemed to involve the kernel knowing a lot about /etc/zfs/zpool.cache). On Linux, additional software RAID arrays are brought up mostly through udev rules, which has its own complications. For a long time I had the general impression that ZFS on Linux also worked through udev rules to recognize vdev components, much like software RAID. However, this turns out to not be the case and the modern ZFS on Linux boot process is quite straightforward on systemd systems.</p>

<hr>

<h3><a href="https://www.moritz.systems/blog/freebsd-legacy-process-plugin-removed/" rel="nofollow">LLDB: FreeBSD Legacy Process Plugin Removed</a></h3>

<p>During the past month we’ve successfully removed the legacy FreeBSD plugin and continued improving the new one. We have prepared an implementation of hardware breakpoint and watchpoint support for FreeBSD/AArch64, and iterated over all tests that currently fail on that platform. Therefore, we have concluded the second milestone.</p>

<hr>

<h3><a href="https://freshbsd.org/news/2021/02/28" rel="nofollow">FreshBSD 2021</a></h3>

<p>6 weeks ago I created a branch for a significant rework of FreshBSD. Nearly 300 commits later, and just a week shy of our 15th anniversary, the result is what you’re looking at now. I hope you like it.</p>

<hr>

<h3><a href="https://github.com/omar-polo/gmid/" rel="nofollow">gmid</a> is a <a href="https://gemini.circumlunar.space/" rel="nofollow">gemini</a> server  for unixes.</h3>

<hr>

<h3><a href="https://danschmid.de/en/blog/poudriere-guide" rel="nofollow">Danschmid’s Poudriere Guide now in english</a></h3>

<p>The ports system is one of FreeBSD&#39;s greatest advantages for users who want flexibility and control over their software. It enables administrators to easily create and manage source-based installations using a system that is robust and predictable.</p>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>
</blockquote>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul><p>Special Guest: Tom Jones.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Customizing the FreeBSD Kernel, OpenBSD/loongson on the Lemote Fuloong, how ZFS on Linux brings up pools and filesystems at boot under systemd, LLDB: FreeBSD Legacy Process Plugin Removed, FreshBSD 2021, gmid, Danschmid’s Poudriere Guide in english, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/customizing-the-freebsd-kernel/" rel="nofollow">Customizing the FreeBSD Kernel</a></h3>

<blockquote>
<p>Learn more about customizing the build of the FreeBSD kernel and its loadable modules</p>

<hr>

<h3><a href="https://www.cambus.net/openbsd-loongson-on-the-lemote-fuloong/" rel="nofollow">OpenBSD/loongson on the Lemote Fuloong</a></h3>

<p>In my article about running OpenBSD/loongson on the Lemote Yeeloong back in 2016, I mentioned looking for a Fuloong. All hope seemed lost until the Summer of 2017, when a fellow OpenBSD developer was contacted by a generous user (Thanks again, Lars!) offering to donate two Lemote Fuloong machines, and I was lucky enough to get one of those units.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/linux/ZFSBringUpOnBoot" rel="nofollow">How ZFS on Linux brings up pools and filesystems at boot under systemd</a></h3>

<blockquote>
<p>On Solaris and Illumos, how ZFS pools and filesystems were brought up at boot was always a partial mystery to me (and it seemed to involve the kernel knowing a lot about /etc/zfs/zpool.cache). On Linux, additional software RAID arrays are brought up mostly through udev rules, which has its own complications. For a long time I had the general impression that ZFS on Linux also worked through udev rules to recognize vdev components, much like software RAID. However, this turns out to not be the case and the modern ZFS on Linux boot process is quite straightforward on systemd systems.</p>

<hr>

<h3><a href="https://www.moritz.systems/blog/freebsd-legacy-process-plugin-removed/" rel="nofollow">LLDB: FreeBSD Legacy Process Plugin Removed</a></h3>

<p>During the past month we’ve successfully removed the legacy FreeBSD plugin and continued improving the new one. We have prepared an implementation of hardware breakpoint and watchpoint support for FreeBSD/AArch64, and iterated over all tests that currently fail on that platform. Therefore, we have concluded the second milestone.</p>

<hr>

<h3><a href="https://freshbsd.org/news/2021/02/28" rel="nofollow">FreshBSD 2021</a></h3>

<p>6 weeks ago I created a branch for a significant rework of FreshBSD. Nearly 300 commits later, and just a week shy of our 15th anniversary, the result is what you’re looking at now. I hope you like it.</p>

<hr>

<h3><a href="https://github.com/omar-polo/gmid/" rel="nofollow">gmid</a> is a <a href="https://gemini.circumlunar.space/" rel="nofollow">gemini</a> server  for unixes.</h3>

<hr>

<h3><a href="https://danschmid.de/en/blog/poudriere-guide" rel="nofollow">Danschmid’s Poudriere Guide now in english</a></h3>

<p>The ports system is one of FreeBSD&#39;s greatest advantages for users who want flexibility and control over their software. It enables administrators to easily create and manage source-based installations using a system that is robust and predictable.</p>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>
</blockquote>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul><p>Special Guest: Tom Jones.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>71: System Disaster</title>
  <link>https://www.bsdnow.tv/71</link>
  <guid isPermaLink="false">b9b0efcb-197e-4dfc-a239-5ae487a72e51</guid>
  <pubDate>Wed, 07 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b9b0efcb-197e-4dfc-a239-5ae487a72e51.mp3" length="48002836" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:06:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Introducing OPNsense, a pfSense fork (http://opnsense.org/)
OPNsense is a new BSD-based firewall project that was recently started (http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html), forked from the pfSense codebase
Even though it's just been announced, they already have a formal release based on FreeBSD 10 (pfSense's latest stable release is based on 8.3)
The core team (http://opnsense.org/about/about-opnsense/#opnsense-core-team) includes a well-known DragonFlyBSD developer
You can check out their code on Github (https://github.com/opnsense) now, or download an image and try it out - let us know (mailto:feedback@bsdnow.tv) if you do and what you think about it
They also have a nice wiki and some instructions on getting started (http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration) for new users
We plan on having them on the show next week to learn a bit more about how the project got started and why you might want to use it - stay tuned
***
Code rot and why I chose OpenBSD (http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html)
Here we have a blog post about rotting codebases - a core banking system in this example
The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project
He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born
Instead of just bikeshedding like the rest of the internet, OpenBSD "silently started putting the beast into shape" as he puts it
The article continues on to mention OpenBSD's code review process, and how it catches any bugs so we don't have more heartbleeds
"In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That's so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily."
It's a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says "In summary, I'm learning more than ever - computing is fun again"
Look for the phrase "Getting Started" in the blog post for a nice little gem
***
ZFS vs HAMMER FS (https://forums.freebsd.org/threads/zfs-vs-hammer.49789/)
One of the topics we've seen come up from time to time is how FreeBSD's ZFS (http://www.bsdnow.tv/tutorials/zfs) and DragonFly's HAMMER FS (http://www.bsdnow.tv/tutorials/hammer) compare to each other
They both have a lot of features that traditional filesystems lack
A forum thread was opened for discussion about them both and what they're typically used for
It compares resource requirements, ideal hardware and pros/cons of each
Hopefully someone will do another new comparison when HAMMER 2 is finished
This is not to be confused with the other "hammer" filesystem (https://www.youtube.com/watch?v=HBXlVl5Ll6k)
***
Portable OpenNTPD revived (https://www.mail-archive.com/tech@openbsd.org/msg21886.html)
With ISC's NTPd having so many security vulnerabilities recently, people need an alternative NTP daemon (http://www.bsdnow.tv/tutorials/ntpd)
OpenBSD has developed OpenNTPD (http://openntpd.org/) since 2004, but the portable version for other operating systems hasn't been actively maintained in a few years
The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version
Brent Cook, who we've had on the show before (http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl) to talk about LibreSSL, decided it was time to fix this
While looking through the code, he also found some fixes (http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist) for the native version as well
You can grab it from Github (https://github.com/openntpd-portable/openntpd-portable) now, or just wait for the updated release (https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html) to hit the repos of your OS of choice
***
Interview - Ian Sutton - ian@kremlin.cc (mailto:ian@kremlin.cc)
BSD replacements (https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary) for systemd dependencies (http://undeadly.org/cgi?action=article&amp;amp;sid=20140915064856)
News Roundup
pkgng adds OS X support (https://github.com/freebsd/pkg/pull/1113)
FreeBSD's next-gen package manager (http://www.bsdnow.tv/tutorials/pkgng) has just added support for Mac OS X
Why would you want that? Well.. we don't really know, but it's cool
The author of the patch may have some insight (https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964) about what his goal is though
This could open up the door for a cross-platform pkgng solution, similar to NetBSD's pkgsrc
There's also the possibility of pkgng being used as a packaging format for MacPorts in the future
While we're on the topic of pkgng, you can also watch bapt (http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries)'s latest presentation about it from ruBSD 2014 - "four years of pkg (http://is.gd/4AvUwt)"
***
Secure secure shell (https://stribika.github.io/2015/01/04/secure-secure-shell.html)
Almost everyone watching BSD Now probably uses OpenSSH (http://www.bsdnow.tv/tutorials/ssh-tmux) and has set up a server at one point or another
This guide provides a list of best practices beyond the typical "disable root login and use keys" advice you'll often hear
It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use
There are also good explanations for all the choices, based both on history and probability
Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled
We've also got a handy chart (http://ssh-comparison.quendi.de/comparison.html) to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***
Dissecting OpenBSD's divert(4) (http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/)
PF has a cool feature that not a lot of people seem to know about: divert
It lets you send packets to userspace, allowing you to inspect them a lot easier
This blog post, the first in a series, details all the cool things you can do with divert and how to use it
A very common example is with intrusion detection systems like Snort
***
Screen recording on FreeBSD (https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic)
This is a neat article about a topic we don't cover very often: making video content on BSD
In the post, you'll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg
There are also notes about getting a USB microphone working, so you can do commentary on whatever you're showing
It also includes lots of details and helpful screenshots throughout the process
You should make cool screencasts and send them to us
***
Feedback/Questions
Camio writes in (http://slexy.org/view/s21Zx0ktmb)
ezpzy writes in (http://slexy.org/view/s2vVR5Orhh)
Emett writes in (http://slexy.org/view/s21Ahb5Lxa)
Ben writes in (http://slexy.org/view/s20oJmveN6)
Laszlo writes in (http://slexy.org/view/s2cTayMxPk)
***
Mailing List Gold
Protocol X97 (https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html)
My thoughts echoed (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141159429123859&amp;amp;w=2)
Vulnerability sample (http://www.openwall.com/lists/oss-security/2015/01/04/10)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, systemd, launchd, systembsd, gsoc, google summer of code, ntp, openntpd, opnsense, pfsense, hammer, zfs, gpl, license, macports</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don&#39;t worry, systemd is not being ported to BSD! We&#39;re still safe! We&#39;ve also got all the week&#39;s news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" rel="nofollow">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" rel="nofollow">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it&#39;s just been announced, they already have a formal release based on FreeBSD 10 (pfSense&#39;s latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" rel="nofollow">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" rel="nofollow">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" rel="nofollow">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" rel="nofollow">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" rel="nofollow">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD &quot;silently started putting the beast into shape&quot; as he puts it</li>
<li>The article continues on to mention OpenBSD&#39;s code review process, and how it catches any bugs so we don&#39;t have more heartbleeds</li>
<li>&quot;In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That&#39;s so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily.&quot;</li>
<li>It&#39;s a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says &quot;In summary, I&#39;m learning more than ever - computing is fun again&quot;</li>
<li>Look for the phrase &quot;Getting Started&quot; in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" rel="nofollow">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we&#39;ve seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">FreeBSD&#39;s ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">DragonFly&#39;s HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they&#39;re typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" rel="nofollow">other &quot;hammer&quot; filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" rel="nofollow">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC&#39;s NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP daemon</a></li>
<li>OpenBSD has developed <a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn&#39;t been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" rel="nofollow">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" rel="nofollow">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" rel="nofollow">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" rel="nofollow">ian@kremlin.cc</a></h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" rel="nofollow">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" rel="nofollow">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD&#39;s next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don&#39;t really know, but it&#39;s cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" rel="nofollow">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD&#39;s pkgsrc</li>
<li>There&#39;s also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we&#39;re on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a>&#39;s latest presentation about it from ruBSD 2014 - &quot;<a href="http://is.gd/4AvUwt" rel="nofollow">four years of pkg</a>&quot;
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical &quot;disable root login and use keys&quot; advice you&#39;ll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We&#39;ve also got <a href="http://ssh-comparison.quendi.de/comparison.html" rel="nofollow">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" rel="nofollow">Dissecting OpenBSD&#39;s divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" rel="nofollow">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don&#39;t cover very often: making video content on BSD</li>
<li>In the post, you&#39;ll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you&#39;re showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" rel="nofollow">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" rel="nofollow">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2cTayMxPk" rel="nofollow">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" rel="nofollow">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141159429123859&w=2" rel="nofollow">My thoughts echoed</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" rel="nofollow">Vulnerability sample</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don&#39;t worry, systemd is not being ported to BSD! We&#39;re still safe! We&#39;ve also got all the week&#39;s news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" rel="nofollow">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" rel="nofollow">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it&#39;s just been announced, they already have a formal release based on FreeBSD 10 (pfSense&#39;s latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" rel="nofollow">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" rel="nofollow">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" rel="nofollow">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" rel="nofollow">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" rel="nofollow">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD &quot;silently started putting the beast into shape&quot; as he puts it</li>
<li>The article continues on to mention OpenBSD&#39;s code review process, and how it catches any bugs so we don&#39;t have more heartbleeds</li>
<li>&quot;In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That&#39;s so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily.&quot;</li>
<li>It&#39;s a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says &quot;In summary, I&#39;m learning more than ever - computing is fun again&quot;</li>
<li>Look for the phrase &quot;Getting Started&quot; in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" rel="nofollow">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we&#39;ve seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">FreeBSD&#39;s ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">DragonFly&#39;s HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they&#39;re typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" rel="nofollow">other &quot;hammer&quot; filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" rel="nofollow">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC&#39;s NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP daemon</a></li>
<li>OpenBSD has developed <a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn&#39;t been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" rel="nofollow">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" rel="nofollow">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" rel="nofollow">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" rel="nofollow">ian@kremlin.cc</a></h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" rel="nofollow">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" rel="nofollow">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD&#39;s next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don&#39;t really know, but it&#39;s cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" rel="nofollow">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD&#39;s pkgsrc</li>
<li>There&#39;s also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we&#39;re on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a>&#39;s latest presentation about it from ruBSD 2014 - &quot;<a href="http://is.gd/4AvUwt" rel="nofollow">four years of pkg</a>&quot;
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical &quot;disable root login and use keys&quot; advice you&#39;ll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We&#39;ve also got <a href="http://ssh-comparison.quendi.de/comparison.html" rel="nofollow">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" rel="nofollow">Dissecting OpenBSD&#39;s divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" rel="nofollow">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don&#39;t cover very often: making video content on BSD</li>
<li>In the post, you&#39;ll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you&#39;re showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" rel="nofollow">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" rel="nofollow">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2cTayMxPk" rel="nofollow">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" rel="nofollow">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141159429123859&w=2" rel="nofollow">My thoughts echoed</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" rel="nofollow">Vulnerability sample</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>67: Must Be Rigged</title>
  <link>https://www.bsdnow.tv/67</link>
  <guid isPermaLink="false">5e135afe-0a75-46d6-b995-ae5d3ca228ba</guid>
  <pubDate>Wed, 10 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5e135afe-0a75-46d6-b995-ae5d3ca228ba.mp3" length="58310356" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we've got an interview with Patrick Wildt, one of the developers of Bitrig. We'll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We've also got all the week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week on the show, we've got an interview with Patrick Wildt, one of the developers of Bitrig. We'll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We've also got all the week's news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Bitrig 1.0 released (http://article.gmane.org/gmane.os.bitrig.devel/6)
If you haven't heard of it, Bitrig (https://www.bitrig.org/) is a fork of OpenBSD that started a couple years ago
According to their FAQ (https://github.com/bitrig/bitrig/wiki/Faq), some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support
They've finally announced their first official release, 1.0
This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version
It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background
One of the developers answered some questions (https://news.ycombinator.com/item?id=8701936) about it on Hacker News too
***
Is it time to try BSD? (http://www.technewsworld.com/story/81424.html)
Here we get a little peek into the Linux world - more and more people are considering switching
On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD
People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side
This article explores some pros and cons of switching, and features opinions of various users
***
Poudriere 3.1 released (https://github.com/freebsd/poudriere/wiki/release_notes_31)
One of the first things we ever covered on the show was poudriere (http://www.bsdnow.tv/tutorials/poudriere), a tool with a funny name that's used to build binary packages from FreeBSD ports
It's come a long way since then, and bdrewery (http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry) and bapt (http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries) have just announced a new major version
This new release features a redesigned web interface to check on the status of your packages
There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier
It also introduces a useful new "pkgclean" subcommand to clean out your repository of packages that aren't needed anymore, and poudriere keeps it cleaner by default as well now
Check the full release notes for all the additions and bug fixes
***
Firewalling with OpenBSD's pf and pfsync (https://www.youtube.com/watch?v=mN5E2EYJnrw)
A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync
He uses pf to manage 60 internal networks with a single firewall
The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated
It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more
The second half of the presentation focuses on pfsync and carp for failover and redundancy
With two BSD boxes running pfsync, you can actually patch your kernel and still stay connected to IRC
***
Interview - Patrick Wildt - patrick@bitrig.org (mailto:patrick@bitrig.org) / @bitrig (https://twitter.com/bitrig)
The initial release of Bitrig
News Roundup
Infrastructural enhancements at NYI (http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html)
The FreeBSD foundation put up a new blog post detailing some hardware improvements they've recently done
Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things
There've been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there
This blog post goes into detail about how those servers are used and details some of the network topology
***
The long tail of MD5 (http://www.tedunangst.com/flak/post/the-long-tail-of-MD5)
Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD's tree with something more modern
In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace
Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect
Some other places (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141763065223567&amp;amp;w=4) require a bit more care… 
***
DragonFly cheat sheet (http://www.dragonflybsd.org/varialus/)
If you've been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier
A user-created "cheat sheet" on the website lists some common answers to beginner questions
The page features a walkthrough of the installer, some shell tips and workarounds for various issues
At the end, it also has some things that new users can get involved with to help out
***
Experiences with an OpenBSD laptop (http://alxjsn.com/unix/openbsd-laptop/)
A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that
The author got interested in OpenBSD mostly because of the security focus and the fact that it's not Linux
In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad
He even gives us a mention as a good place to learn more about BSD, thanks!
***
PC-BSD Updates (http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html)
A call for testing of a new update system has gone out
Conversion to Qt5 for utils has taken place
***
Feedback/Questions
Chris writes in (http://slexy.org/view/s2ihSmjpLu)
AJ writes in (http://slexy.org/view/s20JXhXS6o)
Dan writes in (http://slexy.org/view/s21hfeWB2K)
Jeff writes in (http://slexy.org/view/s2k6SmuDGB)
***
Mailing List Gold
Over 440% faster (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141775233603723&amp;amp;w=2)
The (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html) PF (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html) conundrum (https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html) (edit: Allan misspoke about PF performance during this segment, apologies.)
Violating (https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141807513728073&amp;amp;w=4) bad standards (https://www.marc.info/?l=openbsd-tech&amp;amp;m=141807224826859&amp;amp;w=2)
apt-get rid of systemd (https://www.marc.info/?l=openbsd-misc&amp;amp;m=141798194330985&amp;amp;w=2)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bitrig, fork, clang, llvm, virtualization, poudriere, srand, random, md5, sha512, rand, srand, systemd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got an interview with Patrick Wildt, one of the developers of Bitrig. We&#39;ll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We&#39;ve also got all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://article.gmane.org/gmane.os.bitrig.devel/6" rel="nofollow">Bitrig 1.0 released</a></h3>

<ul>
<li>If you haven&#39;t heard of it, <a href="https://www.bitrig.org/" rel="nofollow">Bitrig</a> is a fork of OpenBSD that started a couple years ago</li>
<li>According to <a href="https://github.com/bitrig/bitrig/wiki/Faq" rel="nofollow">their FAQ</a>, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support</li>
<li>They&#39;ve finally announced their first official release, 1.0</li>
<li>This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version</li>
<li>It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background</li>
<li>One of the developers <a href="https://news.ycombinator.com/item?id=8701936" rel="nofollow">answered some questions</a> about it on Hacker News too
***</li>
</ul>

<h3><a href="http://www.technewsworld.com/story/81424.html" rel="nofollow">Is it time to try BSD?</a></h3>

<ul>
<li>Here we get a little peek into the Linux world - more and more people are considering switching</li>
<li>On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD</li>
<li>People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side</li>
<li>This article explores some pros and cons of switching, and features opinions of various users
***</li>
</ul>

<h3><a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" rel="nofollow">Poudriere 3.1 released</a></h3>

<ul>
<li>One of the first things we ever covered on the show was <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, a tool with a funny name that&#39;s used to build binary packages from FreeBSD ports</li>
<li>It&#39;s come a long way since then, and <a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" rel="nofollow">bdrewery</a> and <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a> have just announced a new major version</li>
<li>This new release features a redesigned web interface to check on the status of your packages</li>
<li>There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier</li>
<li>It also introduces a useful new &quot;pkgclean&quot; subcommand to clean out your repository of packages that aren&#39;t needed anymore, and poudriere keeps it cleaner by default as well now</li>
<li>Check the full release notes for all the additions and bug fixes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" rel="nofollow">Firewalling with OpenBSD&#39;s pf and pfsync</a></h3>

<ul>
<li>A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync</li>
<li>He uses pf to manage 60 internal networks with a single firewall</li>
<li>The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated</li>
<li>It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more</li>
<li>The second half of the presentation focuses on pfsync and carp for failover and redundancy</li>
<li>With two BSD boxes running pfsync, you can actually <em>patch your kernel and still stay connected to IRC</em>
***</li>
</ul>

<h2>Interview - Patrick Wildt - <a href="mailto:patrick@bitrig.org" rel="nofollow">patrick@bitrig.org</a> / <a href="https://twitter.com/bitrig" rel="nofollow">@bitrig</a></h2>

<p>The initial release of Bitrig</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" rel="nofollow">Infrastructural enhancements at NYI</a></h3>

<ul>
<li>The FreeBSD foundation put up a new blog post detailing some hardware improvements they&#39;ve recently done</li>
<li>Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things</li>
<li>There&#39;ve been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there</li>
<li>This blog post goes into detail about how those servers are used and details some of the network topology
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" rel="nofollow">The long tail of MD5</a></h3>

<ul>
<li>Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD&#39;s tree with something more modern</li>
<li>In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace</li>
<li>Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141763065223567&w=4" rel="nofollow">Some other places</a> require a bit more care… 
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/varialus/" rel="nofollow">DragonFly cheat sheet</a></h3>

<ul>
<li>If you&#39;ve been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier</li>
<li>A user-created &quot;cheat sheet&quot; on the website lists some common answers to beginner questions</li>
<li>The page features a walkthrough of the installer, some shell tips and workarounds for various issues</li>
<li>At the end, it also has some things that new users can get involved with to help out
***</li>
</ul>

<h3><a href="http://alxjsn.com/unix/openbsd-laptop/" rel="nofollow">Experiences with an OpenBSD laptop</a></h3>

<ul>
<li>A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that</li>
<li>The author got interested in OpenBSD mostly because of the security focus and the fact that it&#39;s <em>not</em> Linux</li>
<li>In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad</li>
<li>He even gives us a mention as a good place to learn more about BSD, thanks!
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" rel="nofollow">PC-BSD Updates</a></h3>

<ul>
<li>A call for testing of a new update system has gone out</li>
<li>Conversion to Qt5 for utils has taken place
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ihSmjpLu" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20JXhXS6o" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s21hfeWB2K" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s2k6SmuDGB" rel="nofollow">Jeff writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141775233603723&w=2" rel="nofollow">Over 440% faster</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" rel="nofollow">PF</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" rel="nofollow">conundrum</a> (<strong>edit:</strong> Allan misspoke about PF performance during this segment, apologies.)</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141807513728073&w=4" rel="nofollow">Violating</a> <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">bad standards</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=141798194330985&w=2" rel="nofollow">apt-get rid of systemd</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got an interview with Patrick Wildt, one of the developers of Bitrig. We&#39;ll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We&#39;ve also got all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://article.gmane.org/gmane.os.bitrig.devel/6" rel="nofollow">Bitrig 1.0 released</a></h3>

<ul>
<li>If you haven&#39;t heard of it, <a href="https://www.bitrig.org/" rel="nofollow">Bitrig</a> is a fork of OpenBSD that started a couple years ago</li>
<li>According to <a href="https://github.com/bitrig/bitrig/wiki/Faq" rel="nofollow">their FAQ</a>, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support</li>
<li>They&#39;ve finally announced their first official release, 1.0</li>
<li>This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version</li>
<li>It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background</li>
<li>One of the developers <a href="https://news.ycombinator.com/item?id=8701936" rel="nofollow">answered some questions</a> about it on Hacker News too
***</li>
</ul>

<h3><a href="http://www.technewsworld.com/story/81424.html" rel="nofollow">Is it time to try BSD?</a></h3>

<ul>
<li>Here we get a little peek into the Linux world - more and more people are considering switching</li>
<li>On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD</li>
<li>People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side</li>
<li>This article explores some pros and cons of switching, and features opinions of various users
***</li>
</ul>

<h3><a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" rel="nofollow">Poudriere 3.1 released</a></h3>

<ul>
<li>One of the first things we ever covered on the show was <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, a tool with a funny name that&#39;s used to build binary packages from FreeBSD ports</li>
<li>It&#39;s come a long way since then, and <a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" rel="nofollow">bdrewery</a> and <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a> have just announced a new major version</li>
<li>This new release features a redesigned web interface to check on the status of your packages</li>
<li>There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier</li>
<li>It also introduces a useful new &quot;pkgclean&quot; subcommand to clean out your repository of packages that aren&#39;t needed anymore, and poudriere keeps it cleaner by default as well now</li>
<li>Check the full release notes for all the additions and bug fixes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" rel="nofollow">Firewalling with OpenBSD&#39;s pf and pfsync</a></h3>

<ul>
<li>A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync</li>
<li>He uses pf to manage 60 internal networks with a single firewall</li>
<li>The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated</li>
<li>It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more</li>
<li>The second half of the presentation focuses on pfsync and carp for failover and redundancy</li>
<li>With two BSD boxes running pfsync, you can actually <em>patch your kernel and still stay connected to IRC</em>
***</li>
</ul>

<h2>Interview - Patrick Wildt - <a href="mailto:patrick@bitrig.org" rel="nofollow">patrick@bitrig.org</a> / <a href="https://twitter.com/bitrig" rel="nofollow">@bitrig</a></h2>

<p>The initial release of Bitrig</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" rel="nofollow">Infrastructural enhancements at NYI</a></h3>

<ul>
<li>The FreeBSD foundation put up a new blog post detailing some hardware improvements they&#39;ve recently done</li>
<li>Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things</li>
<li>There&#39;ve been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there</li>
<li>This blog post goes into detail about how those servers are used and details some of the network topology
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" rel="nofollow">The long tail of MD5</a></h3>

<ul>
<li>Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD&#39;s tree with something more modern</li>
<li>In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace</li>
<li>Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141763065223567&w=4" rel="nofollow">Some other places</a> require a bit more care… 
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/varialus/" rel="nofollow">DragonFly cheat sheet</a></h3>

<ul>
<li>If you&#39;ve been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier</li>
<li>A user-created &quot;cheat sheet&quot; on the website lists some common answers to beginner questions</li>
<li>The page features a walkthrough of the installer, some shell tips and workarounds for various issues</li>
<li>At the end, it also has some things that new users can get involved with to help out
***</li>
</ul>

<h3><a href="http://alxjsn.com/unix/openbsd-laptop/" rel="nofollow">Experiences with an OpenBSD laptop</a></h3>

<ul>
<li>A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that</li>
<li>The author got interested in OpenBSD mostly because of the security focus and the fact that it&#39;s <em>not</em> Linux</li>
<li>In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad</li>
<li>He even gives us a mention as a good place to learn more about BSD, thanks!
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" rel="nofollow">PC-BSD Updates</a></h3>

<ul>
<li>A call for testing of a new update system has gone out</li>
<li>Conversion to Qt5 for utils has taken place
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ihSmjpLu" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20JXhXS6o" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s21hfeWB2K" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s2k6SmuDGB" rel="nofollow">Jeff writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141775233603723&w=2" rel="nofollow">Over 440% faster</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" rel="nofollow">PF</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" rel="nofollow">conundrum</a> (<strong>edit:</strong> Allan misspoke about PF performance during this segment, apologies.)</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141807513728073&w=4" rel="nofollow">Violating</a> <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">bad standards</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=141798194330985&w=2" rel="nofollow">apt-get rid of systemd</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>55: The Promised WLAN</title>
  <link>https://www.bsdnow.tv/55</link>
  <guid isPermaLink="false">138f743e-c056-4292-9d04-7a7022b34944</guid>
  <pubDate>Wed, 17 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/138f743e-c056-4292-9d04-7a7022b34944.mp3" length="57124948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we've got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:19:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we've got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD 10.1-BETA1 is out (http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/)
The first maintenance update in the 10.x series of FreeBSD is on its way
Since we can't see a changelog yet, the 10-STABLE release notes (https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html) offer a glimpse at some of the new features and fixes that will be included in 10.1
The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11
Initial UEFI support, multithreaded softupdates for UFS and many more things were added
You can check the release schedule (https://www.freebsd.org/releases/10.1R/schedule.html) for the planned release dates
Details for the various forms of release media can be found in the announcement (https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html)
***
Remote headless OpenBSD installation (https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/)
A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes
Sometimes you'll get lucky and they'll offer FreeBSD, but it's much harder to find ones that natively support other BSDs
This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely
It required a few specific steps you'll want to take note of, but is extremely useful for those pesky hosting providers
***
Building a firewall appliance with pfSense (http://www.get-virtual.net/2014/09/16/build-firewall-appliance/)
In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate ALIX2C3 APU (http://pcengines.ch/alix2c3.htm)
After the author's modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board
The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)
There's a lot of great pictures of the hardware and detailed screenshots, definitely worth a look
***
Receive Side Scaling - UDP testing (http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html)
Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress
He's using some quad core boxes with 10 gigabit ethernet for the tests
The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do
He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)
And speaking of Adrian Chadd...
***
Interview - Adrian Chadd - adrian@freebsd.org (mailto:adrian@freebsd.org) / @erikarn (https://twitter.com/erikarn)
BSD on laptops, wifi, drivers, various topics
News Roundup
Sendmail removed from OpenBSD (http://undeadly.org/cgi?action=article&amp;amp;sid=20140916084251)
Mail server admins around the world are rejoicing (https://news.ycombinator.com/item?id=8324475), because sendmail is finally gone (http://marc.info/?l=openbsd-cvs&amp;amp;m=141081997917153&amp;amp;w=2) from OpenBSD
With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded
If you've ever compared a "sendmail.cf" file to an "smtpd.conf" file... the different is as clear as night and day
5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it
If you still need it for some reason, sendmail will live in ports from now on
Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly's mail transfer agent in base (instead of an entire mail server)
***
pfSense backups with pfmb (https://github.com/zinkwazi/pfmb)
We've mentioned the need for a tool to back up pfSense configs a number of times on the show
This script, hosted on github, does pretty much exactly that
It can connect to one (or more!) pfSense installations and back up the configuration
You can roll back or replace failed hardware very easily with its restore function
Everything is done over SSH, so it should be pretty secure
***
The Design and Implementation of the FreeBSD Operating System (http://www.amazon.com/dp/0321968972/)
We mentioned when the pre orders were up, but now "The Design and Implementation of the FreeBSD Operating System, 2nd edition" seems to be shipping out
If you're interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy
We've even had all (http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache) three (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) authors (http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson) on the show before!
***
OpenBSD's systemd replacement updates (http://undeadly.org/cgi?action=article&amp;amp;sid=20140915064856)
We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention
One of the developers writes in to Undeadly, detailing what's going on and what the overall status is
He also clears up any confusion about "porting systemd to BSD" (that's not what's going on) or his code ever ending up in base (it won't)
The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***
Feedback/Questions
Brad writes in (http://slexy.org/view/s20jrx0nIf)
Ben writes in (http://slexy.org/view/s21hFUJ2ju)
Mathieu writes in (http://slexy.org/view/s21RgSzOv4)
Steve writes in (http://slexy.org/view/s2P1mzalPh)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, bsd, interview, adrian chadd, wireless, wifi, aircrack-ng, kismet, packet injection, monitor mode, libressl, openssl, qemu, zfs, jails, headless, remote, pfsense, systemd, netgate, apu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we&#39;ve got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/" rel="nofollow">FreeBSD 10.1-BETA1 is out</a></h3>

<ul>
<li>The first maintenance update in the 10.x series of FreeBSD is on its way</li>
<li>Since we can&#39;t see a changelog yet, the 10-STABLE <a href="https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html" rel="nofollow">release notes</a> offer a glimpse at some of the new features and fixes that will be included in 10.1</li>
<li>The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11</li>
<li>Initial UEFI support, multithreaded softupdates for UFS and many more things were added</li>
<li>You can check the <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">release schedule</a> for the planned release dates</li>
<li>Details for the various forms of release media can be found in <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html" rel="nofollow">the announcement</a>
***</li>
</ul>

<h3><a href="https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/" rel="nofollow">Remote headless OpenBSD installation</a></h3>

<ul>
<li>A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes</li>
<li>Sometimes you&#39;ll get lucky and they&#39;ll offer FreeBSD, but it&#39;s much harder to find ones that natively support other BSDs</li>
<li>This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely</li>
<li>It required a few specific steps you&#39;ll want to take note of, but is <strong>extremely useful</strong> for those pesky hosting providers
***</li>
</ul>

<h3><a href="http://www.get-virtual.net/2014/09/16/build-firewall-appliance/" rel="nofollow">Building a firewall appliance with pfSense</a></h3>

<ul>
<li>In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate <a href="http://pcengines.ch/alix2c3.htm" rel="nofollow">ALIX2C3 APU</a></li>
<li>After the author&#39;s modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board</li>
<li>The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)</li>
<li>There&#39;s a lot of <em>great</em> pictures of the hardware and detailed screenshots, definitely worth a look
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html" rel="nofollow">Receive Side Scaling - UDP testing</a></h3>

<ul>
<li>Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress</li>
<li>He&#39;s using some quad core boxes with 10 gigabit ethernet for the tests</li>
<li>The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do</li>
<li>He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)</li>
<li>And speaking of Adrian Chadd...
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>BSD on laptops, wifi, drivers, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140916084251" rel="nofollow">Sendmail removed from OpenBSD</a></h3>

<ul>
<li>Mail server admins around the world <a href="https://news.ycombinator.com/item?id=8324475" rel="nofollow">are rejoicing</a>, because sendmail is <a href="http://marc.info/?l=openbsd-cvs&m=141081997917153&w=2" rel="nofollow">finally gone</a> from OpenBSD</li>
<li>With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded</li>
<li>If you&#39;ve ever compared a &quot;sendmail.cf&quot; file to an &quot;smtpd.conf&quot; file... the different is as clear as night and day</li>
<li>5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it</li>
<li>If you still need it for some reason, sendmail will live in ports from now on</li>
<li>Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly&#39;s mail transfer agent in base (instead of an entire mail server)
***</li>
</ul>

<h3><a href="https://github.com/zinkwazi/pfmb" rel="nofollow">pfSense backups with pfmb</a></h3>

<ul>
<li>We&#39;ve mentioned the need for a tool to back up pfSense configs a number of times on the show</li>
<li>This script, hosted on github, does pretty much exactly that</li>
<li>It can connect to one (or more!) pfSense installations and back up the configuration</li>
<li>You can roll back or replace failed hardware very easily with its restore function</li>
<li>Everything is done over SSH, so it should be pretty secure
***</li>
</ul>

<h3><a href="http://www.amazon.com/dp/0321968972/" rel="nofollow">The Design and Implementation of the FreeBSD Operating System</a></h3>

<ul>
<li>We mentioned when the pre orders were up, but now &quot;The Design and Implementation of the FreeBSD Operating System, 2nd edition&quot; seems to be shipping out</li>
<li>If you&#39;re interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy</li>
<li>We&#39;ve even had <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">all</a> <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">three</a> <a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">authors</a> on the show before!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">OpenBSD&#39;s systemd replacement updates</a></h3>

<ul>
<li>We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention</li>
<li>One of the developers writes in to Undeadly, detailing what&#39;s going on and what the overall status is</li>
<li>He also clears up any confusion about &quot;porting systemd to BSD&quot; <strong>(that&#39;s not what&#39;s going on)</strong> or his code ever ending up in base <strong>(it won&#39;t)</strong></li>
<li>The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20jrx0nIf" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21hFUJ2ju" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21RgSzOv4" rel="nofollow">Mathieu writes in</a></li>
<li><a href="http://slexy.org/view/s2P1mzalPh" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we&#39;ve got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/" rel="nofollow">FreeBSD 10.1-BETA1 is out</a></h3>

<ul>
<li>The first maintenance update in the 10.x series of FreeBSD is on its way</li>
<li>Since we can&#39;t see a changelog yet, the 10-STABLE <a href="https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html" rel="nofollow">release notes</a> offer a glimpse at some of the new features and fixes that will be included in 10.1</li>
<li>The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11</li>
<li>Initial UEFI support, multithreaded softupdates for UFS and many more things were added</li>
<li>You can check the <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">release schedule</a> for the planned release dates</li>
<li>Details for the various forms of release media can be found in <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html" rel="nofollow">the announcement</a>
***</li>
</ul>

<h3><a href="https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/" rel="nofollow">Remote headless OpenBSD installation</a></h3>

<ul>
<li>A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes</li>
<li>Sometimes you&#39;ll get lucky and they&#39;ll offer FreeBSD, but it&#39;s much harder to find ones that natively support other BSDs</li>
<li>This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely</li>
<li>It required a few specific steps you&#39;ll want to take note of, but is <strong>extremely useful</strong> for those pesky hosting providers
***</li>
</ul>

<h3><a href="http://www.get-virtual.net/2014/09/16/build-firewall-appliance/" rel="nofollow">Building a firewall appliance with pfSense</a></h3>

<ul>
<li>In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate <a href="http://pcengines.ch/alix2c3.htm" rel="nofollow">ALIX2C3 APU</a></li>
<li>After the author&#39;s modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board</li>
<li>The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)</li>
<li>There&#39;s a lot of <em>great</em> pictures of the hardware and detailed screenshots, definitely worth a look
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html" rel="nofollow">Receive Side Scaling - UDP testing</a></h3>

<ul>
<li>Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress</li>
<li>He&#39;s using some quad core boxes with 10 gigabit ethernet for the tests</li>
<li>The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do</li>
<li>He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)</li>
<li>And speaking of Adrian Chadd...
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>BSD on laptops, wifi, drivers, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140916084251" rel="nofollow">Sendmail removed from OpenBSD</a></h3>

<ul>
<li>Mail server admins around the world <a href="https://news.ycombinator.com/item?id=8324475" rel="nofollow">are rejoicing</a>, because sendmail is <a href="http://marc.info/?l=openbsd-cvs&m=141081997917153&w=2" rel="nofollow">finally gone</a> from OpenBSD</li>
<li>With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded</li>
<li>If you&#39;ve ever compared a &quot;sendmail.cf&quot; file to an &quot;smtpd.conf&quot; file... the different is as clear as night and day</li>
<li>5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it</li>
<li>If you still need it for some reason, sendmail will live in ports from now on</li>
<li>Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly&#39;s mail transfer agent in base (instead of an entire mail server)
***</li>
</ul>

<h3><a href="https://github.com/zinkwazi/pfmb" rel="nofollow">pfSense backups with pfmb</a></h3>

<ul>
<li>We&#39;ve mentioned the need for a tool to back up pfSense configs a number of times on the show</li>
<li>This script, hosted on github, does pretty much exactly that</li>
<li>It can connect to one (or more!) pfSense installations and back up the configuration</li>
<li>You can roll back or replace failed hardware very easily with its restore function</li>
<li>Everything is done over SSH, so it should be pretty secure
***</li>
</ul>

<h3><a href="http://www.amazon.com/dp/0321968972/" rel="nofollow">The Design and Implementation of the FreeBSD Operating System</a></h3>

<ul>
<li>We mentioned when the pre orders were up, but now &quot;The Design and Implementation of the FreeBSD Operating System, 2nd edition&quot; seems to be shipping out</li>
<li>If you&#39;re interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy</li>
<li>We&#39;ve even had <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">all</a> <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">three</a> <a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">authors</a> on the show before!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">OpenBSD&#39;s systemd replacement updates</a></h3>

<ul>
<li>We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention</li>
<li>One of the developers writes in to Undeadly, detailing what&#39;s going on and what the overall status is</li>
<li>He also clears up any confusion about &quot;porting systemd to BSD&quot; <strong>(that&#39;s not what&#39;s going on)</strong> or his code ever ending up in base <strong>(it won&#39;t)</strong></li>
<li>The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20jrx0nIf" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21hFUJ2ju" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21RgSzOv4" rel="nofollow">Mathieu writes in</a></li>
<li><a href="http://slexy.org/view/s2P1mzalPh" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>54: Luminary Environment</title>
  <link>https://www.bsdnow.tv/54</link>
  <guid isPermaLink="false">c6ff3386-0834-4798-809e-dd4917c5bc7b</guid>
  <pubDate>Wed, 10 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c6ff3386-0834-4798-809e-dd4917c5bc7b.mp3" length="56630740" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, it's all about Lumina. We'll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There's also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show, it's all about Lumina. We'll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There's also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
Portscout ported to OpenBSD (http://blog.jasper.la/portscout-for-openbsd/)
Portscout is a popular utility used in the FreeBSD ports infrastructure
It lets port maintainers know when there's a new version of the upstream software available by automatically checking the distfile mirror
Now OpenBSD porters can enjoy the same convenience, as it's been ported over
You can view the status online (http://portscout.jasper.la/) to see how it works and who maintains what (http://portscout.jasper.la/index-total.html)
The developer who ported it is working to get all the current features working on OpenBSD, and added a few new features as well
He decided to fork and rename it (https://jasperla.github.io/portroach/) a few days later
***
Sysadmins and systemd refugees flocking to BSD (https://www.reddit.com/r/freebsd/comments/2fgb90/you_have_your_windows_in_my_linux_or_why_many/)
With all the drama in Linux land about the rapid changes to their init system, a lot of people are looking at BSD alternatives
This "you got your Windows in my Linux (http://www.infoworld.com/d/data-center/you-have-your-windows-in-my-linux-249483)" article (and accompanying comments) give a nice glimpse into the minds of some of those switchers
Both server administrators and regular everyday users are switching away from Linux, as more and more distros give them no choice but to use systemd
Fortunately, the BSD communities are usually very welcoming of switchers - it's pretty nice on this side!
***
OpenBSD's versioning schemes (http://www.tedunangst.com/flak/post/OpenBSD-version-numbers)
Ted Unangst explains the various versioning systems within OpenBSD, from the base to libraries to other included software
In contrast to FreeBSD's release cycle, OpenBSD isn't as concerned with breaking backwards compatibility (but only if it's needed to make progress)
This allows them to innovate and introduce new features a lot more easily, and get those features in a stable release that everyone uses
He also details the difference between branches, their errata system and lack of "patch levels" for security
Some other things in OpenBSD don't have version numbers at all, like tmux
"Every release adds some new features, fixes some old bugs, probably adds a new bug or two, and, if I have anything to say about it, removes some old features."
***
VAXstation 4000 Model 90 booting NetBSD (https://www.youtube.com/watch?v=zLsgFPaMPyg)
We found a video of NetBSD booting on a 22 year old VAX workstation, circa 1992
This system has a monstrous 71 MHz CPU and 128MB of ECC RAM
It continues in part two (https://www.youtube.com/watch?v=YKzDXKmn66U), where we learn that it would've cost around $25,000 when it was released!
The uploader talks about his experiences getting NetBSD on it, what does and doesn't work, etc
It's interesting to see that such old hardware isn't necessarily obsolete just because newer things have come out since then (but maybe don't try to build world on it...)
***
Interview - Ken Moore - ken@pcbsd.org (mailto:ken@pcbsd.org)
The Lumina desktop environment
Special segment
Lumina walkthrough
News Roundup
Suricata for IDS on pfSense (http://pfsensesetup.com/suricata-intrusion-detection-system-part-one)
While most people are familiar with Snort as an intrusion detection system, Suricata is another choice
This guide goes through the steps of installing and configuring it on a public-facing pfSense box
Part two (http://pfsensesetup.com/suricata-intrusion-detection-system-part-two/) details some of the configuration steps
One other cool thing about Suricata - it's compatible with Snort rules, so you can use the same updates
There's also another recent post (http://www.allamericancomputerrepair.com/Blog/Post/29/Install-Snort-on-FreeBSD) about snort as well, if that's more your style
If you run pfSense (or any BSD) as an edge router for a lot of users, this might be worth looking into
***
OpenBSD's systemd API emulation project (http://bsd.slashdot.org/story/14/09/08/0250207/gsoc-project-works-to-emulate-systemd-for-openbsd)
This story was pretty popular in the mainstream news this week
For the Google Summer of Code, a student is writing emulation wrappers for some of systemd's functions (https://twitter.com/blakkheim/status/509092821773848577)
There was consideration from some Linux users to port over the finished emulation back to Linux, so they wouldn't have to run the full systemd
One particularly interesting Slashdot comment snippet (http://bsd.slashdot.org/comments.pl?sid=5663319&amp;amp;cid=47851361): "We are currently migrating a large number (much larger than planned after initial results) of systems from RHEL to BSD - a decision taken due to general unhappiness with RHEL6, but SystemD pushed us towards BSD rather than another Linux distro - and in some cases are seeing throughput gains of greater than 10% on what should be equivalent Linux and BSD server builds. The re-learning curve wasn't as steep as we expected, general system stability seems to be better too, and BSD's security reputation goes without saying."
It will NOT be in the base system - only in ports, and only installed as a dependency for things like newer GNOME (http://blogs.gnome.org/ovitters/2014/09/07/systemd-in-gnome-3-14-and-beyond/) that require such APIs
In the long run, BSD will still be safe from systemd's reign of terror, but will hopefully still be compatible with some third party packages like GNOME that insist on using it
***
GhostBSD 4 previewed (http://www.linuxbsdos.com/2014/05/19/preview-of-ghostbsd-4-0/)
The GhostBSD project is moving along, slowly getting closer to the 4 release
This article shows some of the progress made, and includes lots of screenshots and interesting graphical frontends
If you're not too familiar with GhostBSD, we interviewed the lead developer (http://www.bsdnow.tv/episodes/2014_03_12-ghost_of_partition) a little while back
***
NetBSD on the Banana Pi (http://rizzoandself.blogspot.com/2014/09/netbsd-on-banana-pi.html)
The Banana Pi is a tasty alternative to the Raspberry Pi, with similar hardware specs
In this blog post, a NetBSD developer details his experiences in getting NetBSD to run on it
After studying how the prebuilt Linux image booted, he made some notes and started hacking
Ethernet, one of the few things not working, is being looked into and he's hoping to get it fully supported for the upcoming NetBSD 7.0
They're only about $65 as of the time we're recording this, so it might be a fun project to try
***
Feedback/Questions
Antonio writes in (http://slexy.org/view/s28iKdBEbm)
Garegin writes in (http://slexy.org/view/s21Wfnv87h)
Erno writes in (http://slexy.org/view/s2Fzryxhdz)
Brandon writes in (http://slexy.org/view/s2ILcqdFfF)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, lumina, desktop environment, window manager, graphical user interface, tiling, floating, gnome3, kde5, kde4, qt5, banana pi, raspberry pi, portscout, vax, vaxstation, linux vs bsd, systemd, portroach, ids, suricata</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, it&#39;s all about Lumina. We&#39;ll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There&#39;s also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.jasper.la/portscout-for-openbsd/" rel="nofollow">Portscout ported to OpenBSD</a></h3>

<ul>
<li>Portscout is a popular utility used in the FreeBSD ports infrastructure</li>
<li>It lets port maintainers know when there&#39;s a new version of the upstream software available by automatically checking the distfile mirror</li>
<li>Now OpenBSD porters can enjoy the same convenience, as it&#39;s been ported over</li>
<li>You can view the status <a href="http://portscout.jasper.la/" rel="nofollow">online</a> to see how it works and <a href="http://portscout.jasper.la/index-total.html" rel="nofollow">who maintains what</a></li>
<li>The developer who ported it is working to get all the current features working on OpenBSD, and added a few new features as well</li>
<li>He decided to <a href="https://jasperla.github.io/portroach/" rel="nofollow">fork and rename it</a> a few days later
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2fgb90/you_have_your_windows_in_my_linux_or_why_many/" rel="nofollow">Sysadmins and systemd refugees flocking to BSD</a></h3>

<ul>
<li>With all the drama in Linux land about the rapid changes to their init system, a lot of people are looking at BSD alternatives</li>
<li>This &quot;<a href="http://www.infoworld.com/d/data-center/you-have-your-windows-in-my-linux-249483" rel="nofollow">you got your Windows in my Linux</a>&quot; article (and accompanying comments) give a nice glimpse into the minds of some of those switchers</li>
<li>Both server administrators and regular everyday users are switching away from Linux, as more and more distros give them no choice but to use systemd</li>
<li>Fortunately, the BSD communities are usually very welcoming of switchers - it&#39;s pretty nice on this side!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-version-numbers" rel="nofollow">OpenBSD&#39;s versioning schemes</a></h3>

<ul>
<li>Ted Unangst explains the various versioning systems within OpenBSD, from the base to libraries to other included software</li>
<li>In contrast to FreeBSD&#39;s release cycle, OpenBSD isn&#39;t as concerned with breaking backwards compatibility (but only if it&#39;s needed to make progress)</li>
<li>This allows them to innovate and introduce new features a lot more easily, and get those features in a stable release that everyone uses</li>
<li>He also details the difference between branches, their errata system and lack of &quot;patch levels&quot; for security</li>
<li>Some other things in OpenBSD don&#39;t have version numbers at all, like tmux</li>
<li>&quot;Every release adds some new features, fixes some old bugs, probably adds a new bug or two, and, if I have anything to say about it, removes some old features.&quot;
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=zLsgFPaMPyg" rel="nofollow">VAXstation 4000 Model 90 booting NetBSD</a></h3>

<ul>
<li>We found a video of NetBSD booting on a 22 year old VAX workstation, circa 1992</li>
<li>This system has a monstrous 71 MHz CPU and 128MB of ECC RAM</li>
<li>It <a href="https://www.youtube.com/watch?v=YKzDXKmn66U" rel="nofollow">continues in part two</a>, where we learn that it would&#39;ve cost around $25,000 when it was released!</li>
<li>The uploader talks about his experiences getting NetBSD on it, what does and doesn&#39;t work, etc</li>
<li>It&#39;s interesting to see that such old hardware isn&#39;t necessarily obsolete just because newer things have come out since then (but maybe don&#39;t try to build world on it...)
***</li>
</ul>

<h2>Interview - Ken Moore - <a href="mailto:ken@pcbsd.org" rel="nofollow">ken@pcbsd.org</a></h2>

<p>The Lumina desktop environment</p>

<hr>

<h2>Special segment</h2>

<h3>Lumina walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-one" rel="nofollow">Suricata for IDS on pfSense</a></h3>

<ul>
<li>While most people are familiar with Snort as an intrusion detection system, Suricata is another choice</li>
<li>This guide goes through the steps of installing and configuring it on a public-facing pfSense box</li>
<li><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-two/" rel="nofollow">Part two</a> details some of the configuration steps</li>
<li>One other cool thing about Suricata - it&#39;s compatible with Snort rules, so you can use the same updates</li>
<li>There&#39;s also <a href="http://www.allamericancomputerrepair.com/Blog/Post/29/Install-Snort-on-FreeBSD" rel="nofollow">another recent post</a> about snort as well, if that&#39;s more your style</li>
<li>If you run pfSense (or any BSD) as an edge router for a lot of users, this might be worth looking into
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/14/09/08/0250207/gsoc-project-works-to-emulate-systemd-for-openbsd" rel="nofollow">OpenBSD&#39;s systemd API emulation project</a></h3>

<ul>
<li>This story was pretty popular in the mainstream news this week</li>
<li>For the Google Summer of Code, a student is writing emulation wrappers for some of <a href="https://twitter.com/blakkheim/status/509092821773848577" rel="nofollow">systemd&#39;s functions</a></li>
<li>There was consideration from some Linux users to port over the finished emulation back to Linux, so they wouldn&#39;t have to run the full systemd</li>
<li>One particularly interesting Slashdot comment <a href="http://bsd.slashdot.org/comments.pl?sid=5663319&cid=47851361" rel="nofollow">snippet</a>: &quot;We are currently migrating a large number (much larger than planned after initial results) of systems from RHEL to BSD - a decision taken due to general unhappiness with RHEL6, but SystemD pushed us towards BSD rather than another Linux distro - and in some cases are seeing throughput gains of greater than 10% on what should be equivalent Linux and BSD server builds. The re-learning curve wasn&#39;t as steep as we expected, general system stability seems to be better too, and BSD&#39;s security reputation goes without saying.&quot;</li>
<li>It will NOT be in the base system - only in ports, and only installed as a dependency for things like <a href="http://blogs.gnome.org/ovitters/2014/09/07/systemd-in-gnome-3-14-and-beyond/" rel="nofollow">newer GNOME</a> that require such APIs</li>
<li>In the long run, BSD will still be safe from systemd&#39;s reign of terror, but will hopefully still be compatible with some third party packages like GNOME that insist on using it
***</li>
</ul>

<h3><a href="http://www.linuxbsdos.com/2014/05/19/preview-of-ghostbsd-4-0/" rel="nofollow">GhostBSD 4 previewed</a></h3>

<ul>
<li>The GhostBSD project is moving along, slowly getting closer to the 4 release</li>
<li>This article shows some of the progress made, and includes lots of screenshots and interesting graphical frontends</li>
<li>If you&#39;re not too familiar with GhostBSD, we <a href="http://www.bsdnow.tv/episodes/2014_03_12-ghost_of_partition" rel="nofollow">interviewed the lead developer</a> a little while back
***</li>
</ul>

<h3><a href="http://rizzoandself.blogspot.com/2014/09/netbsd-on-banana-pi.html" rel="nofollow">NetBSD on the Banana Pi</a></h3>

<ul>
<li>The Banana Pi is a tasty alternative to the Raspberry Pi, with similar hardware specs</li>
<li>In this blog post, a NetBSD developer details his experiences in getting NetBSD to run on it</li>
<li>After studying how the prebuilt Linux image booted, he made some notes and started hacking</li>
<li>Ethernet, one of the few things not working, is being looked into and he&#39;s hoping to get it fully supported for the upcoming NetBSD 7.0</li>
<li>They&#39;re only about $65 as of the time we&#39;re recording this, so it might be a fun project to try
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s28iKdBEbm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21Wfnv87h" rel="nofollow">Garegin writes in</a></li>
<li><a href="http://slexy.org/view/s2Fzryxhdz" rel="nofollow">Erno writes in</a></li>
<li><a href="http://slexy.org/view/s2ILcqdFfF" rel="nofollow">Brandon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, it&#39;s all about Lumina. We&#39;ll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There&#39;s also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.jasper.la/portscout-for-openbsd/" rel="nofollow">Portscout ported to OpenBSD</a></h3>

<ul>
<li>Portscout is a popular utility used in the FreeBSD ports infrastructure</li>
<li>It lets port maintainers know when there&#39;s a new version of the upstream software available by automatically checking the distfile mirror</li>
<li>Now OpenBSD porters can enjoy the same convenience, as it&#39;s been ported over</li>
<li>You can view the status <a href="http://portscout.jasper.la/" rel="nofollow">online</a> to see how it works and <a href="http://portscout.jasper.la/index-total.html" rel="nofollow">who maintains what</a></li>
<li>The developer who ported it is working to get all the current features working on OpenBSD, and added a few new features as well</li>
<li>He decided to <a href="https://jasperla.github.io/portroach/" rel="nofollow">fork and rename it</a> a few days later
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2fgb90/you_have_your_windows_in_my_linux_or_why_many/" rel="nofollow">Sysadmins and systemd refugees flocking to BSD</a></h3>

<ul>
<li>With all the drama in Linux land about the rapid changes to their init system, a lot of people are looking at BSD alternatives</li>
<li>This &quot;<a href="http://www.infoworld.com/d/data-center/you-have-your-windows-in-my-linux-249483" rel="nofollow">you got your Windows in my Linux</a>&quot; article (and accompanying comments) give a nice glimpse into the minds of some of those switchers</li>
<li>Both server administrators and regular everyday users are switching away from Linux, as more and more distros give them no choice but to use systemd</li>
<li>Fortunately, the BSD communities are usually very welcoming of switchers - it&#39;s pretty nice on this side!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-version-numbers" rel="nofollow">OpenBSD&#39;s versioning schemes</a></h3>

<ul>
<li>Ted Unangst explains the various versioning systems within OpenBSD, from the base to libraries to other included software</li>
<li>In contrast to FreeBSD&#39;s release cycle, OpenBSD isn&#39;t as concerned with breaking backwards compatibility (but only if it&#39;s needed to make progress)</li>
<li>This allows them to innovate and introduce new features a lot more easily, and get those features in a stable release that everyone uses</li>
<li>He also details the difference between branches, their errata system and lack of &quot;patch levels&quot; for security</li>
<li>Some other things in OpenBSD don&#39;t have version numbers at all, like tmux</li>
<li>&quot;Every release adds some new features, fixes some old bugs, probably adds a new bug or two, and, if I have anything to say about it, removes some old features.&quot;
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=zLsgFPaMPyg" rel="nofollow">VAXstation 4000 Model 90 booting NetBSD</a></h3>

<ul>
<li>We found a video of NetBSD booting on a 22 year old VAX workstation, circa 1992</li>
<li>This system has a monstrous 71 MHz CPU and 128MB of ECC RAM</li>
<li>It <a href="https://www.youtube.com/watch?v=YKzDXKmn66U" rel="nofollow">continues in part two</a>, where we learn that it would&#39;ve cost around $25,000 when it was released!</li>
<li>The uploader talks about his experiences getting NetBSD on it, what does and doesn&#39;t work, etc</li>
<li>It&#39;s interesting to see that such old hardware isn&#39;t necessarily obsolete just because newer things have come out since then (but maybe don&#39;t try to build world on it...)
***</li>
</ul>

<h2>Interview - Ken Moore - <a href="mailto:ken@pcbsd.org" rel="nofollow">ken@pcbsd.org</a></h2>

<p>The Lumina desktop environment</p>

<hr>

<h2>Special segment</h2>

<h3>Lumina walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-one" rel="nofollow">Suricata for IDS on pfSense</a></h3>

<ul>
<li>While most people are familiar with Snort as an intrusion detection system, Suricata is another choice</li>
<li>This guide goes through the steps of installing and configuring it on a public-facing pfSense box</li>
<li><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-two/" rel="nofollow">Part two</a> details some of the configuration steps</li>
<li>One other cool thing about Suricata - it&#39;s compatible with Snort rules, so you can use the same updates</li>
<li>There&#39;s also <a href="http://www.allamericancomputerrepair.com/Blog/Post/29/Install-Snort-on-FreeBSD" rel="nofollow">another recent post</a> about snort as well, if that&#39;s more your style</li>
<li>If you run pfSense (or any BSD) as an edge router for a lot of users, this might be worth looking into
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/14/09/08/0250207/gsoc-project-works-to-emulate-systemd-for-openbsd" rel="nofollow">OpenBSD&#39;s systemd API emulation project</a></h3>

<ul>
<li>This story was pretty popular in the mainstream news this week</li>
<li>For the Google Summer of Code, a student is writing emulation wrappers for some of <a href="https://twitter.com/blakkheim/status/509092821773848577" rel="nofollow">systemd&#39;s functions</a></li>
<li>There was consideration from some Linux users to port over the finished emulation back to Linux, so they wouldn&#39;t have to run the full systemd</li>
<li>One particularly interesting Slashdot comment <a href="http://bsd.slashdot.org/comments.pl?sid=5663319&cid=47851361" rel="nofollow">snippet</a>: &quot;We are currently migrating a large number (much larger than planned after initial results) of systems from RHEL to BSD - a decision taken due to general unhappiness with RHEL6, but SystemD pushed us towards BSD rather than another Linux distro - and in some cases are seeing throughput gains of greater than 10% on what should be equivalent Linux and BSD server builds. The re-learning curve wasn&#39;t as steep as we expected, general system stability seems to be better too, and BSD&#39;s security reputation goes without saying.&quot;</li>
<li>It will NOT be in the base system - only in ports, and only installed as a dependency for things like <a href="http://blogs.gnome.org/ovitters/2014/09/07/systemd-in-gnome-3-14-and-beyond/" rel="nofollow">newer GNOME</a> that require such APIs</li>
<li>In the long run, BSD will still be safe from systemd&#39;s reign of terror, but will hopefully still be compatible with some third party packages like GNOME that insist on using it
***</li>
</ul>

<h3><a href="http://www.linuxbsdos.com/2014/05/19/preview-of-ghostbsd-4-0/" rel="nofollow">GhostBSD 4 previewed</a></h3>

<ul>
<li>The GhostBSD project is moving along, slowly getting closer to the 4 release</li>
<li>This article shows some of the progress made, and includes lots of screenshots and interesting graphical frontends</li>
<li>If you&#39;re not too familiar with GhostBSD, we <a href="http://www.bsdnow.tv/episodes/2014_03_12-ghost_of_partition" rel="nofollow">interviewed the lead developer</a> a little while back
***</li>
</ul>

<h3><a href="http://rizzoandself.blogspot.com/2014/09/netbsd-on-banana-pi.html" rel="nofollow">NetBSD on the Banana Pi</a></h3>

<ul>
<li>The Banana Pi is a tasty alternative to the Raspberry Pi, with similar hardware specs</li>
<li>In this blog post, a NetBSD developer details his experiences in getting NetBSD to run on it</li>
<li>After studying how the prebuilt Linux image booted, he made some notes and started hacking</li>
<li>Ethernet, one of the few things not working, is being looked into and he&#39;s hoping to get it fully supported for the upcoming NetBSD 7.0</li>
<li>They&#39;re only about $65 as of the time we&#39;re recording this, so it might be a fun project to try
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s28iKdBEbm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21Wfnv87h" rel="nofollow">Garegin writes in</a></li>
<li><a href="http://slexy.org/view/s2Fzryxhdz" rel="nofollow">Erno writes in</a></li>
<li><a href="http://slexy.org/view/s2ILcqdFfF" rel="nofollow">Brandon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
