<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 09 May 2026 13:55:31 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Telnet”</title>
    <link>https://www.bsdnow.tv/tags/telnet</link>
    <pubDate>Thu, 09 May 2024 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>558: Worlds of telnet</title>
  <link>https://www.bsdnow.tv/558</link>
  <guid isPermaLink="false">813adc0b-a4ca-4810-9cac-ef64a1dafccd</guid>
  <pubDate>Thu, 09 May 2024 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/813adc0b-a4ca-4810-9cac-ef64a1dafccd.mp3" length="87563520" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>NetBSD 9.4, FreeBSD SSDF Attestation to Support Cybersecurity Compliance, The Lost Worlds of Telnet, alter file ownership and permissions with a feedback information, parallel raw IP input, OpenBSD routers on AliExpress mini PCs, FreeBSD for Devs.  Plus a special interview with the organizers of BSDCAN 2024.</itunes:subtitle>
  <itunes:duration>1:31:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;NetBSD 9.4, FreeBSD SSDF Attestation to Support Cybersecurity Compliance, The Lost Worlds of Telnet, alter file ownership and permissions with a feedback information, parallel raw IP input, OpenBSD routers on AliExpress mini PCs, FreeBSD for Devs.  Plus a special interview with the organizers of BSDCAN 2024.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt; and the &lt;a href="https://www.patreon.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSDNow Patreon&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.4.html" target="_blank" rel="nofollow noopener"&gt;NetBSD 9.4&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://freebsdfoundation.org/blog/freebsd-foundation-delivers-v1-of-freebsd-ssdf-attestation-to-support-cybersecurity-compliance/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation Delivers V1 of FreeBSD SSDF Attestation to Support Cybersecurity Compliance&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://thenewstack.io/the-lost-worlds-of-telnet/" target="_blank" rel="nofollow noopener"&gt;The Lost Worlds of Telnet&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://sleeplessbeastie.eu/2024/04/18/how-to-alter-file-ownership-and-permissions-with-a-feedback-information/" target="_blank" rel="nofollow noopener"&gt;How to alter file ownership and permissions with a feedback information&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://www.undeadly.org/cgi?action=article;sid=20240418050520" target="_blank" rel="nofollow noopener"&gt;Coming soon to a -current system near you: parallel raw IP input&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://www.srcbeat.com/2024/02/aliexpress-openbsd-router/" target="_blank" rel="nofollow noopener"&gt;OpenBSD routers on AliExpress mini PCs&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://dev.to/scovl/freebsd-for-devs-3n0k" target="_blank" rel="nofollow noopener"&gt;FreeBSD for Devs&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tarsnap&lt;/h2&gt;

&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/556/feedback/Daniel%20-%20jail%20issue.md" target="_blank" rel="nofollow noopener"&gt;Daniel - jail issue&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/556/feedback/Rick%20-%20ZFS.md" target="_blank" rel="nofollow noopener"&gt;Rick - ZFS&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Join us and other BSD Fans in our &lt;a href="https://t.me/bsdnow" target="_blank" rel="nofollow noopener"&gt;BSD Now Telegram channel&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, netbsd 9.4, ssdf, Attestation, Cybersecurity compliance, telnet, file ownership, permissions, feedback information, parallel raw IP input, routers, AliExpress, mini PCs, developers, bsdcan</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>NetBSD 9.4, FreeBSD SSDF Attestation to Support Cybersecurity Compliance, The Lost Worlds of Telnet, alter file ownership and permissions with a feedback information, parallel raw IP input, OpenBSD routers on AliExpress mini PCs, FreeBSD for Devs.  Plus a special interview with the organizers of BSDCAN 2024.</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.4.html" rel="nofollow">NetBSD 9.4</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/freebsd-foundation-delivers-v1-of-freebsd-ssdf-attestation-to-support-cybersecurity-compliance/" rel="nofollow">FreeBSD Foundation Delivers V1 of FreeBSD SSDF Attestation to Support Cybersecurity Compliance</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://thenewstack.io/the-lost-worlds-of-telnet/" rel="nofollow">The Lost Worlds of Telnet</a></p>

<hr>

<p><a href="https://sleeplessbeastie.eu/2024/04/18/how-to-alter-file-ownership-and-permissions-with-a-feedback-information/" rel="nofollow">How to alter file ownership and permissions with a feedback information</a></p>

<hr>

<p><a href="https://www.undeadly.org/cgi?action=article;sid=20240418050520" rel="nofollow">Coming soon to a -current system near you: parallel raw IP input</a></p>

<hr>

<p><a href="https://www.srcbeat.com/2024/02/aliexpress-openbsd-router/" rel="nofollow">OpenBSD routers on AliExpress mini PCs</a></p>

<hr>

<p><a href="https://dev.to/scovl/freebsd-for-devs-3n0k" rel="nofollow">FreeBSD for Devs</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/556/feedback/Daniel%20-%20jail%20issue.md" rel="nofollow">Daniel - jail issue</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/556/feedback/Rick%20-%20ZFS.md" rel="nofollow">Rick - ZFS</a></p></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>NetBSD 9.4, FreeBSD SSDF Attestation to Support Cybersecurity Compliance, The Lost Worlds of Telnet, alter file ownership and permissions with a feedback information, parallel raw IP input, OpenBSD routers on AliExpress mini PCs, FreeBSD for Devs.  Plus a special interview with the organizers of BSDCAN 2024.</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://www.netbsd.org/releases/formal-9/NetBSD-9.4.html" rel="nofollow">NetBSD 9.4</a></p>

<hr>

<p><a href="https://freebsdfoundation.org/blog/freebsd-foundation-delivers-v1-of-freebsd-ssdf-attestation-to-support-cybersecurity-compliance/" rel="nofollow">FreeBSD Foundation Delivers V1 of FreeBSD SSDF Attestation to Support Cybersecurity Compliance</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://thenewstack.io/the-lost-worlds-of-telnet/" rel="nofollow">The Lost Worlds of Telnet</a></p>

<hr>

<p><a href="https://sleeplessbeastie.eu/2024/04/18/how-to-alter-file-ownership-and-permissions-with-a-feedback-information/" rel="nofollow">How to alter file ownership and permissions with a feedback information</a></p>

<hr>

<p><a href="https://www.undeadly.org/cgi?action=article;sid=20240418050520" rel="nofollow">Coming soon to a -current system near you: parallel raw IP input</a></p>

<hr>

<p><a href="https://www.srcbeat.com/2024/02/aliexpress-openbsd-router/" rel="nofollow">OpenBSD routers on AliExpress mini PCs</a></p>

<hr>

<p><a href="https://dev.to/scovl/freebsd-for-devs-3n0k" rel="nofollow">FreeBSD for Devs</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/556/feedback/Daniel%20-%20jail%20issue.md" rel="nofollow">Daniel - jail issue</a></p></li>
<li><p><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/556/feedback/Rick%20-%20ZFS.md" rel="nofollow">Rick - ZFS</a></p></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 309: Get Your Telnet Fix</title>
  <link>https://www.bsdnow.tv/309</link>
  <guid isPermaLink="false">630a645e-fe37-4a56-a2fd-8c51abb5dfe5</guid>
  <pubDate>Wed, 31 Jul 2019 23:45:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/630a645e-fe37-4a56-a2fd-8c51abb5dfe5.mp3" length="34856460" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>
DragonFlyBSD Project colo upgrade, future trends, resuming ZFS send, realtime bandwidth terminal graph visualization, fixing telnet fixes, a chapter from the FBI’s history with OpenBSD, an OpenSSH vulnerability, and more.</itunes:subtitle>
  <itunes:duration>48:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;DragonFlyBSD Project Update - colo upgrade, future trends, resuming ZFS send, realtime bandwidth terminal graph visualization, fixing telnet fixes, a chapter from the FBI’s history with OpenBSD and an OpenSSH vuln, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2019-July/358226.html" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD Project Update - colo upgrade, future trends&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; For the last week I've been testing out a replacement for Monster, our 48-core opteron server.  The project will be removing Monster from the colo in a week or two and replacing it with three machines which together will use half the power that Monster did alone.&lt;/p&gt;

&lt;p&gt;&amp;gt; The goal is to clear out a little power budget in the colo and to really beef-up our package-building capabilities to reduce the turn-around time needed to test ports syncs and updates to the binary package system.&lt;/p&gt;

&lt;p&gt;&amp;gt; Currently we use two blades to do most of the building, plus monster sometimes.  The blades take almost a week (120 hours+) to do a full synth run and monster takes around 27.5 hours.  But we need to do three bulk builds more or less at the same time... one for the release branch, one for the development branch, and one for staging updates.  It just takes too long and its been gnawing at me for a little while.&lt;/p&gt;

&lt;p&gt;&amp;gt; Well, Zen 2 to the rescue!  These new CPUs can take ECC, there's actually an IPMI mobo available, and they are fast as hell and cheap for what we get. &lt;/p&gt;

&lt;p&gt;&amp;gt; The new machines will be two 3900X based servers, plus a dual-xeon system that I already had at home.   The 3900X's can each do a full synth run in 24.5 hours and the Xeon can do it in around 31 hours.  Monster will be retired.  And the crazy thing about this?  Monster burns 1000W going full bore.  Each of the 3900X servers burns 160W and the Xeon burns 200W.  In otherwords, we are replacing 1000W with only 520W and getting roughly 6x the performance efficiency in the upgrade.  This tell you just how much more power-efficient machines have become in the last 9 years or so. &amp;gt; This upgrade will allow us to do full builds for both release and dev in roughly one day instead of seven days, and do it without interfering with staging work that might be happening at the same time.&lt;/p&gt;

&lt;p&gt;&amp;gt; Future trends - DragonFlyBSD has reached a bit of a cross-roads.  With most of the SMP work now essentially complete across the entire system the main project focus is now on supplying reliable binary ports for release and developer branches, DRM  (GPU) support and other UI elements to keep DragonFlyBSD relevant on workstations, and continuing Filesystem work on HAMMER2 to get multi-device and clustering going.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.oshogbo.vexillium.org/blog/66/" target="_blank" rel="nofollow noopener"&gt;Resuming ZFS send&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; One of the amazing functionalities of ZFS is the possibility of sending a whole dataset from one place to another. This mechanism is amazing to create backups of your ZFS based machines. Although, there were some issues with this functionality for a long time when a user sent a big chunk of data. What if you would do that over the network and your connection has disappeared? What if your machine was rebooted as you are sending a snapshot?&lt;/p&gt;

&lt;p&gt;&amp;gt; For a very long time, you didn't have any options - you had to send a snapshot from the beginning. Now, this limitation was already bad enough. However, another downside of this approach was that all the data which you already send was thrown away. Therefore, ZFS had to go over all this data and remove them from the dataset. Imagine the terabytes of data which you sent via the network was thrown away because as you were sending the last few bytes, the network went off.&lt;/p&gt;

&lt;p&gt;&amp;gt; In this short post, I don't want to go over the whole ZFS snapshot infrastructure (if you think that such a post would be useful, please leave a comment). Now, to get back to the point, this infrastructure is used to clone the datasets. Some time ago a new feature called “Resuming ZFS send” was introduced. That means that if there was some problem with transmitting the dataset from one point to another you could resume it or throw them away. But the point is, that yes, you finally have a choice.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/%7Esolene/2019-07-19-ttyplot-netstat-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Realtime bandwidth terminal graph visualization&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; If for some reasons you want to visualize your bandwidth traffic on an interface (in or out) in a terminal with a nice graph, here is a small script to do so, involving ttyplot, a nice software making graphics in a terminal.&lt;/p&gt;

&lt;p&gt;&amp;gt; The following will works on OpenBSD. You can install ttyplot by pkg_add ttyplot as root, ttyplot package appeared since OpenBSD 6.5.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://flak.tedunangst.com/post/fixing-telnet-fixes" target="_blank" rel="nofollow noopener"&gt;fixing telnet fixes&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; There’s a FreeBSD commit to telnet. fix a couple of snprintf() buffer overflows. It’s received a bit of attention for various reasons, telnet in 2019?, etc. I thought I’d take a look. Here’s a few random observations.&lt;/p&gt;

&lt;p&gt;&amp;gt; 1. The first line is indented with spaces while the others use tabs.&lt;/p&gt;

&lt;p&gt;&amp;gt; 2. The correct type for string length is size_t not unsigned int.&lt;/p&gt;

&lt;p&gt;&amp;gt; 3. sizeof(char) is always one. There’s no need to multiply by it.&lt;/p&gt;

&lt;p&gt;&amp;gt; 4. If you do need to multiply by a size, this is an unsafe pattern.  Use calloc or something similar. (OpenBSD provides reallocarray to avoid zeroing cost of calloc.)&lt;/p&gt;

&lt;p&gt;&amp;gt; 5. Return value of malloc doesn’t need to be cast. In fact, should not be, lest you disguise a warning.&lt;/p&gt;

&lt;p&gt;&amp;gt; 6. Return value of malloc is not checked for NULL.&lt;/p&gt;

&lt;p&gt;&amp;gt; 7. No reason to cast cp to char * when passing to snprintf. It already is that type. And if it weren’t, what are you doing?&lt;/p&gt;

&lt;p&gt;&amp;gt; 8. The whole operation could be simplified by using asprintf.&lt;/p&gt;

&lt;p&gt;&amp;gt; 9. Although unlikely (probably impossible here, but more generally), adding the two source lengths together can overflow, resulting in truncation with an unchecked snprintf call. asprintf avoids this failure case.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://twitter.com/RooneyMcNibNug/status/1152327783055601664" target="_blank" rel="nofollow noopener"&gt;A Chapter from the FBI’s History with OpenBSD and an OpenSSH Vuln&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Earlier this year I FOIAed the FBI for details on allegations of backdoor installed in the IPSEC stack in 2010, originally discussed by OpenBSD devs (&lt;a href="https://marc.info/?l=openbsd-tech&amp;amp;m=129236621626462" target="_blank" rel="nofollow noopener"&gt;https://marc.info/?l=openbsd-tech&amp;amp;amp;m=129236621626462&lt;/a&gt; …) Today, I got an interesting but unexpected responsive record: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.muckrock.com/foi/united-states-of-america-10/foia-fbi-openbsd-70084/" target="_blank" rel="nofollow noopener"&gt;Freedom of Information Act: FBI: OpenBSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/RooneyMcNibNug/FOIA/blob/master/Responsive%20Docs/OpenBSD/FBI_OpenBSD_response_OCRd.pdf" target="_blank" rel="nofollow noopener"&gt;GitHub Repo&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://mwl.io/archives/4378" target="_blank" rel="nofollow noopener"&gt;“Sudo Mastery, 2nd Edition” open for tech review&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsdnews.com/2019/07/12/freebsd-journal-freebsd-for-makers/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal: FreeBSD for Makers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2019/07/19/msg000808.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD and NetBSD machines at Open Source Conference 2019 Nagoya&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=zuj9pRNR2oM" target="_blank" rel="nofollow noopener"&gt;FreeBSD 12.0: WINE Gaming&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.netbsd.org/gallery/presentations/wiz/pkgsrccon2019/index.html#/" target="_blank" rel="nofollow noopener"&gt;Introduction to the Structure and Interpretation of TNF (The NetBSD Foundation)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.vbsdcon.com/" target="_blank" rel="nofollow noopener"&gt;vBSDcon speakers announced&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Pat - &lt;a href="http://dpaste.com/21Y1PRM" target="_blank" rel="nofollow noopener"&gt;NYCBug Aug 7th&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Tyler - &lt;a href="http://dpaste.com/3JEVVEF#wrap" target="_blank" rel="nofollow noopener"&gt;SSH keys vs password&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Lars - &lt;a href="http://dpaste.com/0RAFMXZ" target="_blank" rel="nofollow noopener"&gt;Tor-Talk&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0309.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, zfs, send, terminal, bandwidth, graph, realtime, telnet</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>DragonFlyBSD Project Update - colo upgrade, future trends, resuming ZFS send, realtime bandwidth terminal graph visualization, fixing telnet fixes, a chapter from the FBI’s history with OpenBSD and an OpenSSH vuln, and more.</p>

<h2>Headlines</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2019-July/358226.html" rel="nofollow">DragonFlyBSD Project Update - colo upgrade, future trends</a></h3>

<blockquote>
<p>For the last week I&#39;ve been testing out a replacement for Monster, our 48-core opteron server.  The project will be removing Monster from the colo in a week or two and replacing it with three machines which together will use half the power that Monster did alone.</p>

<p>The goal is to clear out a little power budget in the colo and to really beef-up our package-building capabilities to reduce the turn-around time needed to test ports syncs and updates to the binary package system.</p>

<p>Currently we use two blades to do most of the building, plus monster sometimes.  The blades take almost a week (120 hours+) to do a full synth run and monster takes around 27.5 hours.  But we need to do three bulk builds more or less at the same time... one for the release branch, one for the development branch, and one for staging updates.  It just takes too long and its been gnawing at me for a little while.</p>

<p>Well, Zen 2 to the rescue!  These new CPUs can take ECC, there&#39;s actually an IPMI mobo available, and they are fast as hell and cheap for what we get. </p>

<p>The new machines will be two 3900X based servers, plus a dual-xeon system that I already had at home.   The 3900X&#39;s can each do a full synth run in 24.5 hours and the Xeon can do it in around 31 hours.  Monster will be retired.  And the crazy thing about this?  Monster burns 1000W going full bore.  Each of the 3900X servers burns 160W and the Xeon burns 200W.  In otherwords, we are replacing 1000W with only 520W and getting roughly 6x the performance efficiency in the upgrade.  This tell you just how much more power-efficient machines have become in the last 9 years or so. &gt; This upgrade will allow us to do full builds for both release and dev in roughly one day instead of seven days, and do it without interfering with staging work that might be happening at the same time.</p>

<p>Future trends - DragonFlyBSD has reached a bit of a cross-roads.  With most of the SMP work now essentially complete across the entire system the main project focus is now on supplying reliable binary ports for release and developer branches, DRM  (GPU) support and other UI elements to keep DragonFlyBSD relevant on workstations, and continuing Filesystem work on HAMMER2 to get multi-device and clustering going.</p>
</blockquote>

<hr>

<h3><a href="https://www.oshogbo.vexillium.org/blog/66/" rel="nofollow">Resuming ZFS send</a></h3>

<blockquote>
<p>One of the amazing functionalities of ZFS is the possibility of sending a whole dataset from one place to another. This mechanism is amazing to create backups of your ZFS based machines. Although, there were some issues with this functionality for a long time when a user sent a big chunk of data. What if you would do that over the network and your connection has disappeared? What if your machine was rebooted as you are sending a snapshot?</p>

<p>For a very long time, you didn&#39;t have any options - you had to send a snapshot from the beginning. Now, this limitation was already bad enough. However, another downside of this approach was that all the data which you already send was thrown away. Therefore, ZFS had to go over all this data and remove them from the dataset. Imagine the terabytes of data which you sent via the network was thrown away because as you were sending the last few bytes, the network went off.</p>

<p>In this short post, I don&#39;t want to go over the whole ZFS snapshot infrastructure (if you think that such a post would be useful, please leave a comment). Now, to get back to the point, this infrastructure is used to clone the datasets. Some time ago a new feature called “Resuming ZFS send” was introduced. That means that if there was some problem with transmitting the dataset from one point to another you could resume it or throw them away. But the point is, that yes, you finally have a choice.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2019-07-19-ttyplot-netstat-openbsd.html" rel="nofollow">Realtime bandwidth terminal graph visualization</a></h3>

<blockquote>
<p>If for some reasons you want to visualize your bandwidth traffic on an interface (in or out) in a terminal with a nice graph, here is a small script to do so, involving ttyplot, a nice software making graphics in a terminal.</p>

<p>The following will works on OpenBSD. You can install ttyplot by pkg_add ttyplot as root, ttyplot package appeared since OpenBSD 6.5.</p>
</blockquote>

<hr>

<h3><a href="https://flak.tedunangst.com/post/fixing-telnet-fixes" rel="nofollow">fixing telnet fixes</a></h3>

<blockquote>
<p>There’s a FreeBSD commit to telnet. fix a couple of snprintf() buffer overflows. It’s received a bit of attention for various reasons, telnet in 2019?, etc. I thought I’d take a look. Here’s a few random observations.</p>

<ol>
<li><p>The first line is indented with spaces while the others use tabs.</p></li>
<li><p>The correct type for string length is size_t not unsigned int.</p></li>
<li><p>sizeof(char) is always one. There’s no need to multiply by it.</p></li>
<li><p>If you do need to multiply by a size, this is an unsafe pattern.  Use calloc or something similar. (OpenBSD provides reallocarray to avoid zeroing cost of calloc.)</p></li>
<li><p>Return value of malloc doesn’t need to be cast. In fact, should not be, lest you disguise a warning.</p></li>
<li><p>Return value of malloc is not checked for NULL.</p></li>
<li><p>No reason to cast cp to char * when passing to snprintf. It already is that type. And if it weren’t, what are you doing?</p></li>
<li><p>The whole operation could be simplified by using asprintf.</p></li>
<li><p>Although unlikely (probably impossible here, but more generally), adding the two source lengths together can overflow, resulting in truncation with an unchecked snprintf call. asprintf avoids this failure case.</p></li>
</ol>
</blockquote>

<hr>

<h3><a href="https://twitter.com/RooneyMcNibNug/status/1152327783055601664" rel="nofollow">A Chapter from the FBI’s History with OpenBSD and an OpenSSH Vuln</a></h3>

<blockquote>
<p>Earlier this year I FOIAed the FBI for details on allegations of backdoor installed in the IPSEC stack in 2010, originally discussed by OpenBSD devs (<a href="https://marc.info/?l=openbsd-tech&m=129236621626462" rel="nofollow">https://marc.info/?l=openbsd-tech&amp;m=129236621626462</a> …) Today, I got an interesting but unexpected responsive record: </p>
</blockquote>

<ul>
<li><a href="https://www.muckrock.com/foi/united-states-of-america-10/foia-fbi-openbsd-70084/" rel="nofollow">Freedom of Information Act: FBI: OpenBSD</a> </li>
<li><a href="https://github.com/RooneyMcNibNug/FOIA/blob/master/Responsive%20Docs/OpenBSD/FBI_OpenBSD_response_OCRd.pdf" rel="nofollow">GitHub Repo</a></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://mwl.io/archives/4378" rel="nofollow">“Sudo Mastery, 2nd Edition” open for tech review</a></li>
<li><a href="https://www.freebsdnews.com/2019/07/12/freebsd-journal-freebsd-for-makers/" rel="nofollow">FreeBSD Journal: FreeBSD for Makers</a></li>
<li><a href="http://mail-index.netbsd.org/netbsd-advocacy/2019/07/19/msg000808.html" rel="nofollow">OpenBSD and NetBSD machines at Open Source Conference 2019 Nagoya</a></li>
<li><a href="https://www.youtube.com/watch?v=zuj9pRNR2oM" rel="nofollow">FreeBSD 12.0: WINE Gaming</a></li>
<li><a href="https://www.netbsd.org/gallery/presentations/wiz/pkgsrccon2019/index.html#/" rel="nofollow">Introduction to the Structure and Interpretation of TNF (The NetBSD Foundation)</a></li>
<li><a href="https://www.vbsdcon.com/" rel="nofollow">vBSDcon speakers announced</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Pat - <a href="http://dpaste.com/21Y1PRM" rel="nofollow">NYCBug Aug 7th</a></li>
<li>Tyler - <a href="http://dpaste.com/3JEVVEF#wrap" rel="nofollow">SSH keys vs password</a></li>
<li>Lars - <a href="http://dpaste.com/0RAFMXZ" rel="nofollow">Tor-Talk</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0309.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>DragonFlyBSD Project Update - colo upgrade, future trends, resuming ZFS send, realtime bandwidth terminal graph visualization, fixing telnet fixes, a chapter from the FBI’s history with OpenBSD and an OpenSSH vuln, and more.</p>

<h2>Headlines</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2019-July/358226.html" rel="nofollow">DragonFlyBSD Project Update - colo upgrade, future trends</a></h3>

<blockquote>
<p>For the last week I&#39;ve been testing out a replacement for Monster, our 48-core opteron server.  The project will be removing Monster from the colo in a week or two and replacing it with three machines which together will use half the power that Monster did alone.</p>

<p>The goal is to clear out a little power budget in the colo and to really beef-up our package-building capabilities to reduce the turn-around time needed to test ports syncs and updates to the binary package system.</p>

<p>Currently we use two blades to do most of the building, plus monster sometimes.  The blades take almost a week (120 hours+) to do a full synth run and monster takes around 27.5 hours.  But we need to do three bulk builds more or less at the same time... one for the release branch, one for the development branch, and one for staging updates.  It just takes too long and its been gnawing at me for a little while.</p>

<p>Well, Zen 2 to the rescue!  These new CPUs can take ECC, there&#39;s actually an IPMI mobo available, and they are fast as hell and cheap for what we get. </p>

<p>The new machines will be two 3900X based servers, plus a dual-xeon system that I already had at home.   The 3900X&#39;s can each do a full synth run in 24.5 hours and the Xeon can do it in around 31 hours.  Monster will be retired.  And the crazy thing about this?  Monster burns 1000W going full bore.  Each of the 3900X servers burns 160W and the Xeon burns 200W.  In otherwords, we are replacing 1000W with only 520W and getting roughly 6x the performance efficiency in the upgrade.  This tell you just how much more power-efficient machines have become in the last 9 years or so. &gt; This upgrade will allow us to do full builds for both release and dev in roughly one day instead of seven days, and do it without interfering with staging work that might be happening at the same time.</p>

<p>Future trends - DragonFlyBSD has reached a bit of a cross-roads.  With most of the SMP work now essentially complete across the entire system the main project focus is now on supplying reliable binary ports for release and developer branches, DRM  (GPU) support and other UI elements to keep DragonFlyBSD relevant on workstations, and continuing Filesystem work on HAMMER2 to get multi-device and clustering going.</p>
</blockquote>

<hr>

<h3><a href="https://www.oshogbo.vexillium.org/blog/66/" rel="nofollow">Resuming ZFS send</a></h3>

<blockquote>
<p>One of the amazing functionalities of ZFS is the possibility of sending a whole dataset from one place to another. This mechanism is amazing to create backups of your ZFS based machines. Although, there were some issues with this functionality for a long time when a user sent a big chunk of data. What if you would do that over the network and your connection has disappeared? What if your machine was rebooted as you are sending a snapshot?</p>

<p>For a very long time, you didn&#39;t have any options - you had to send a snapshot from the beginning. Now, this limitation was already bad enough. However, another downside of this approach was that all the data which you already send was thrown away. Therefore, ZFS had to go over all this data and remove them from the dataset. Imagine the terabytes of data which you sent via the network was thrown away because as you were sending the last few bytes, the network went off.</p>

<p>In this short post, I don&#39;t want to go over the whole ZFS snapshot infrastructure (if you think that such a post would be useful, please leave a comment). Now, to get back to the point, this infrastructure is used to clone the datasets. Some time ago a new feature called “Resuming ZFS send” was introduced. That means that if there was some problem with transmitting the dataset from one point to another you could resume it or throw them away. But the point is, that yes, you finally have a choice.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2019-07-19-ttyplot-netstat-openbsd.html" rel="nofollow">Realtime bandwidth terminal graph visualization</a></h3>

<blockquote>
<p>If for some reasons you want to visualize your bandwidth traffic on an interface (in or out) in a terminal with a nice graph, here is a small script to do so, involving ttyplot, a nice software making graphics in a terminal.</p>

<p>The following will works on OpenBSD. You can install ttyplot by pkg_add ttyplot as root, ttyplot package appeared since OpenBSD 6.5.</p>
</blockquote>

<hr>

<h3><a href="https://flak.tedunangst.com/post/fixing-telnet-fixes" rel="nofollow">fixing telnet fixes</a></h3>

<blockquote>
<p>There’s a FreeBSD commit to telnet. fix a couple of snprintf() buffer overflows. It’s received a bit of attention for various reasons, telnet in 2019?, etc. I thought I’d take a look. Here’s a few random observations.</p>

<ol>
<li><p>The first line is indented with spaces while the others use tabs.</p></li>
<li><p>The correct type for string length is size_t not unsigned int.</p></li>
<li><p>sizeof(char) is always one. There’s no need to multiply by it.</p></li>
<li><p>If you do need to multiply by a size, this is an unsafe pattern.  Use calloc or something similar. (OpenBSD provides reallocarray to avoid zeroing cost of calloc.)</p></li>
<li><p>Return value of malloc doesn’t need to be cast. In fact, should not be, lest you disguise a warning.</p></li>
<li><p>Return value of malloc is not checked for NULL.</p></li>
<li><p>No reason to cast cp to char * when passing to snprintf. It already is that type. And if it weren’t, what are you doing?</p></li>
<li><p>The whole operation could be simplified by using asprintf.</p></li>
<li><p>Although unlikely (probably impossible here, but more generally), adding the two source lengths together can overflow, resulting in truncation with an unchecked snprintf call. asprintf avoids this failure case.</p></li>
</ol>
</blockquote>

<hr>

<h3><a href="https://twitter.com/RooneyMcNibNug/status/1152327783055601664" rel="nofollow">A Chapter from the FBI’s History with OpenBSD and an OpenSSH Vuln</a></h3>

<blockquote>
<p>Earlier this year I FOIAed the FBI for details on allegations of backdoor installed in the IPSEC stack in 2010, originally discussed by OpenBSD devs (<a href="https://marc.info/?l=openbsd-tech&m=129236621626462" rel="nofollow">https://marc.info/?l=openbsd-tech&amp;m=129236621626462</a> …) Today, I got an interesting but unexpected responsive record: </p>
</blockquote>

<ul>
<li><a href="https://www.muckrock.com/foi/united-states-of-america-10/foia-fbi-openbsd-70084/" rel="nofollow">Freedom of Information Act: FBI: OpenBSD</a> </li>
<li><a href="https://github.com/RooneyMcNibNug/FOIA/blob/master/Responsive%20Docs/OpenBSD/FBI_OpenBSD_response_OCRd.pdf" rel="nofollow">GitHub Repo</a></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://mwl.io/archives/4378" rel="nofollow">“Sudo Mastery, 2nd Edition” open for tech review</a></li>
<li><a href="https://www.freebsdnews.com/2019/07/12/freebsd-journal-freebsd-for-makers/" rel="nofollow">FreeBSD Journal: FreeBSD for Makers</a></li>
<li><a href="http://mail-index.netbsd.org/netbsd-advocacy/2019/07/19/msg000808.html" rel="nofollow">OpenBSD and NetBSD machines at Open Source Conference 2019 Nagoya</a></li>
<li><a href="https://www.youtube.com/watch?v=zuj9pRNR2oM" rel="nofollow">FreeBSD 12.0: WINE Gaming</a></li>
<li><a href="https://www.netbsd.org/gallery/presentations/wiz/pkgsrccon2019/index.html#/" rel="nofollow">Introduction to the Structure and Interpretation of TNF (The NetBSD Foundation)</a></li>
<li><a href="https://www.vbsdcon.com/" rel="nofollow">vBSDcon speakers announced</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Pat - <a href="http://dpaste.com/21Y1PRM" rel="nofollow">NYCBug Aug 7th</a></li>
<li>Tyler - <a href="http://dpaste.com/3JEVVEF#wrap" rel="nofollow">SSH keys vs password</a></li>
<li>Lars - <a href="http://dpaste.com/0RAFMXZ" rel="nofollow">Tor-Talk</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0309.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
