<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 17 May 2026 12:47:16 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Tls”</title>
    <link>https://www.bsdnow.tv/tags/tls</link>
    <pubDate>Thu, 24 Jun 2021 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>408: FreeBSD DevSummit 2021</title>
  <link>https://www.bsdnow.tv/408</link>
  <guid isPermaLink="false">62094053-3e0f-4996-ac35-7d3f3a62572d</guid>
  <pubDate>Thu, 24 Jun 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/62094053-3e0f-4996-ac35-7d3f3a62572d.mp3" length="37936488" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Report from virtual FreeBSD DevSummit 2021, another promising release by FreeBSD Based helloSystem, GearBSD, OpenBGPD release, Let’s Encrypt on OpenBSD, FreeBSD 13 on the Panasonic Let’s Note, and more
</itunes:subtitle>
  <itunes:duration>57:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Report from virtual FreeBSD DevSummit 2021, another promising release by FreeBSD Based helloSystem, GearBSD, OpenBGPD release, Let’s Encrypt on OpenBSD, FreeBSD 13 on the Panasonic Let’s Note, and more&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/freebsd-developer-summit-2021/" target="_blank" rel="nofollow noopener"&gt;2021 FreeBSD Developer Summit&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.debugpoint.com/2021/06/hellosystem-0-5-0-release/" target="_blank" rel="nofollow noopener"&gt;helloSystem – FreeBSD Based OS Brings another Promising Release 0.5.0&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://dataswamp.org/%7Esolene/2021-06-01-gearbsd.html" target="_blank" rel="nofollow noopener"&gt;GearBSD: a project to help automating your OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://bsdsec.net/articles/openbgpd-7-0-released" target="_blank" rel="nofollow noopener"&gt;OpenBGPD 7.0 released&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/OpenBSDNiceLetsEncrypt" target="_blank" rel="nofollow noopener"&gt;Simple use of Let's Encrypt on OpenBSD is pleasantly straightforward (as of 6.8)&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://rubenerd.com/freebsd-13-on-the-panasonic-cf-rz6/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 13 on the Panasonic Let’s Note CF-RZ6&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;pre&gt;&lt;code&gt;• [Paul - ZFS Questions](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Paul%20-%20ZFS%20Questions)
• [Rafael - relic](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Rafael%20-%20relic)
• [matthew - sendfile and ktls](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/matthew%20-%20sendfile%20and%20ktls)
&lt;/code&gt;&lt;/pre&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, devsummit, report, helloSystem, GearBSD, openBGPD, let’s encrypt, encryption, ssl, tls, panasonic, let’s note</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Report from virtual FreeBSD DevSummit 2021, another promising release by FreeBSD Based helloSystem, GearBSD, OpenBGPD release, Let’s Encrypt on OpenBSD, FreeBSD 13 on the Panasonic Let’s Note, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/freebsd-developer-summit-2021/" rel="nofollow">2021 FreeBSD Developer Summit</a></h3>

<hr>

<h3><a href="https://www.debugpoint.com/2021/06/hellosystem-0-5-0-release/" rel="nofollow">helloSystem – FreeBSD Based OS Brings another Promising Release 0.5.0</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2021-06-01-gearbsd.html" rel="nofollow">GearBSD: a project to help automating your OpenBSD</a></h3>

<hr>

<h3><a href="https://bsdsec.net/articles/openbgpd-7-0-released" rel="nofollow">OpenBGPD 7.0 released</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/OpenBSDNiceLetsEncrypt" rel="nofollow">Simple use of Let&#39;s Encrypt on OpenBSD is pleasantly straightforward (as of 6.8)</a></h3>

<hr>

<h3><a href="https://rubenerd.com/freebsd-13-on-the-panasonic-cf-rz6/" rel="nofollow">FreeBSD 13 on the Panasonic Let’s Note CF-RZ6</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<pre><code>• [Paul - ZFS Questions](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Paul%20-%20ZFS%20Questions)
• [Rafael - relic](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Rafael%20-%20relic)
• [matthew - sendfile and ktls](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/matthew%20-%20sendfile%20and%20ktls)
</code></pre>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Report from virtual FreeBSD DevSummit 2021, another promising release by FreeBSD Based helloSystem, GearBSD, OpenBGPD release, Let’s Encrypt on OpenBSD, FreeBSD 13 on the Panasonic Let’s Note, and more</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://klarasystems.com/articles/freebsd-developer-summit-2021/" rel="nofollow">2021 FreeBSD Developer Summit</a></h3>

<hr>

<h3><a href="https://www.debugpoint.com/2021/06/hellosystem-0-5-0-release/" rel="nofollow">helloSystem – FreeBSD Based OS Brings another Promising Release 0.5.0</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://dataswamp.org/%7Esolene/2021-06-01-gearbsd.html" rel="nofollow">GearBSD: a project to help automating your OpenBSD</a></h3>

<hr>

<h3><a href="https://bsdsec.net/articles/openbgpd-7-0-released" rel="nofollow">OpenBGPD 7.0 released</a></h3>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/OpenBSDNiceLetsEncrypt" rel="nofollow">Simple use of Let&#39;s Encrypt on OpenBSD is pleasantly straightforward (as of 6.8)</a></h3>

<hr>

<h3><a href="https://rubenerd.com/freebsd-13-on-the-panasonic-cf-rz6/" rel="nofollow">FreeBSD 13 on the Panasonic Let’s Note CF-RZ6</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<pre><code>• [Paul - ZFS Questions](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Paul%20-%20ZFS%20Questions)
• [Rafael - relic](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/Rafael%20-%20relic)
• [matthew - sendfile and ktls](https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/408/feedback/matthew%20-%20sendfile%20and%20ktls)
</code></pre>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>390: Commercial Unix Killer</title>
  <link>https://www.bsdnow.tv/390</link>
  <guid isPermaLink="false">a77e0ca4-6c57-4cd9-ad09-1fbf8292e5d8</guid>
  <pubDate>Thu, 18 Feb 2021 03:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a77e0ca4-6c57-4cd9-ad09-1fbf8292e5d8.mp3" length="55003992" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Did Linux kill Commercial Unix, three node GlusterFS setup on FreeBSD, OpenBSD on the Lenovo ThinkPad X1 Nano (1st Gen), NetBSD on EdgeRouter Lite, TLS Mastery first draft done</itunes:subtitle>
  <itunes:duration>55:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Did Linux kill Commercial Unix, three node GlusterFS setup on FreeBSD, OpenBSD on the Lenovo ThinkPad X1 Nano (1st Gen), NetBSD on EdgeRouter Lite, TLS Mastery first draft done&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.howtogeek.com/440147/did-linux-kill-commercial-unix/" target="_blank" rel="nofollow noopener"&gt;Did Linux Kill Commercial Unix?&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Sales of commercial Unix have fallen off a cliff. There has to be something behind this dramatic decline. Has Linux killed its ancestor by becoming a perfectly viable replacement, like an operating system version of Invasion of the Body Snatchers?&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://klarasystems.com/articles/simple-and-secure-vpn-in-freebsd/" target="_blank" rel="nofollow noopener"&gt;Wireguard: Simple and Secure VPN in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A great article by Tom Jones about setting up Wireguard on FreeBSD
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.unibia.com/unibianet/freebsd/setup-three-node-replicated-glusterfs-cluster-freebsd" target="_blank" rel="nofollow noopener"&gt;Setup a Three Node Replicated GlusterFS Cluster on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; GlusterFS (GFS) is the open source equivalent to Microsoft's Distributed Filesystem (DFS). It's a service that replicates the contents of a filesystem in real time from one server to another. Clients connect to any server and changes made to a file will replicate automatically. It's similar to something like rsync or syncthing, but much more automatic and transparent. A FreeBSD port has been available since v3.4, and (as of this post) is currently at version 8.0 with 9.0 being released soon.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://jcs.org/2021/01/27/x1nano" target="_blank" rel="nofollow noopener"&gt;OpenBSD on the Lenovo ThinkPad X1 Nano (1st Gen)&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Lenovo has finally made a smaller version of its X1 Carbon, something I’ve been looking forward to for years.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.cambus.net/netbsd-on-the-edgerouter-lite/" target="_blank" rel="nofollow noopener"&gt;NetBSD on the EdgeRouter Lite&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; NetBSD-current now has pre-built octeon bootable images (which will appear in NetBSD 10.0) for the evbmips port, so I decided to finally give it a try. I've been happily running OpenBSD/octeon on my EdgeRouter Lite for a few years now, and have previously published some notes including more detail about the CPU.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://mwl.io/archives/9938" target="_blank" rel="nofollow noopener"&gt;“TLS Mastery” first draft done!&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://forums.freebsd.org/threads/freebsd-desktop-for-pinebook-pro.78269/" target="_blank" rel="nofollow noopener"&gt;A Thread on a FreeBSD Desktop for PineBook Pro&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://eventyay.com/e/fa96ae2c" target="_blank" rel="nofollow noopener"&gt;FOSSASIA Conference - March 2021(Virtual)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.netgate.com/blog/wireguard-for-pfsense-software.html" target="_blank" rel="nofollow noopener"&gt;WireGuard for pfSense Software&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2021/02/07/msg000849.html" target="_blank" rel="nofollow noopener"&gt;NetBSD logo to going Moon&lt;/a&gt;
***
###Tarsnap&lt;/li&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
### Producer's Note
&amp;gt; Hey everybody, it’s JT here.  After our AMA episode where I mentioned I was looking for older BSD Retail Copies, I was contacted by Andrew who hooked me up with a bunch of OpenBSD disks from the 4.x era.  So shout out to him, and since that worked so well, I figured I'd give it another shot and ask that if anyone has any old Unixes that will run on an 8088, 8086, or 286 and you're willing to send me copies of the disks. I've recently dug out an old 286 system and I’d love to get a Unix OS on it.  I know of Minix, Xenix and Microport, but I haven’t been able to find many versions of them.  I've found Microport 1.3.3, and SCO Xenix... but that's about it.  Let me know if you happen to have any other versions, or know where I can get them.&lt;br&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/390/feedback/Christian%20-%20ZFS%20replication%20and%20verification" target="_blank" rel="nofollow noopener"&gt;Christian - ZFS replication and verification&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/390/feedback/Iain%20-%20progress" target="_blank" rel="nofollow noopener"&gt;Iain - progress&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/390/feedback/Paul%20-%20APU2%20device" target="_blank" rel="nofollow noopener"&gt;Paul - APU2 device&lt;/a&gt;
***&lt;/li&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, Linux, commercial unix, glusterfs, cluster, setup, Lenovo, Thinkpad, x1 nano, edgerouter, lite, tls, book</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Did Linux kill Commercial Unix, three node GlusterFS setup on FreeBSD, OpenBSD on the Lenovo ThinkPad X1 Nano (1st Gen), NetBSD on EdgeRouter Lite, TLS Mastery first draft done</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.howtogeek.com/440147/did-linux-kill-commercial-unix/" rel="nofollow">Did Linux Kill Commercial Unix?</a></h3>

<blockquote>
<p>Sales of commercial Unix have fallen off a cliff. There has to be something behind this dramatic decline. Has Linux killed its ancestor by becoming a perfectly viable replacement, like an operating system version of Invasion of the Body Snatchers?</p>

<hr>

<h3><a href="https://klarasystems.com/articles/simple-and-secure-vpn-in-freebsd/" rel="nofollow">Wireguard: Simple and Secure VPN in FreeBSD</a></h3>

<ul>
<li>A great article by Tom Jones about setting up Wireguard on FreeBSD
***</li>
</ul>
</blockquote>

<h3><a href="http://www.unibia.com/unibianet/freebsd/setup-three-node-replicated-glusterfs-cluster-freebsd" rel="nofollow">Setup a Three Node Replicated GlusterFS Cluster on FreeBSD</a></h3>

<blockquote>
<p>GlusterFS (GFS) is the open source equivalent to Microsoft&#39;s Distributed Filesystem (DFS). It&#39;s a service that replicates the contents of a filesystem in real time from one server to another. Clients connect to any server and changes made to a file will replicate automatically. It&#39;s similar to something like rsync or syncthing, but much more automatic and transparent. A FreeBSD port has been available since v3.4, and (as of this post) is currently at version 8.0 with 9.0 being released soon.</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://jcs.org/2021/01/27/x1nano" rel="nofollow">OpenBSD on the Lenovo ThinkPad X1 Nano (1st Gen)</a></h3>

<p>Lenovo has finally made a smaller version of its X1 Carbon, something I’ve been looking forward to for years.</p>

<hr>

<h3><a href="https://www.cambus.net/netbsd-on-the-edgerouter-lite/" rel="nofollow">NetBSD on the EdgeRouter Lite</a></h3>

<p>NetBSD-current now has pre-built octeon bootable images (which will appear in NetBSD 10.0) for the evbmips port, so I decided to finally give it a try. I&#39;ve been happily running OpenBSD/octeon on my EdgeRouter Lite for a few years now, and have previously published some notes including more detail about the CPU.</p>

<hr>

<h3><a href="https://mwl.io/archives/9938" rel="nofollow">“TLS Mastery” first draft done!</a></h3>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://forums.freebsd.org/threads/freebsd-desktop-for-pinebook-pro.78269/" rel="nofollow">A Thread on a FreeBSD Desktop for PineBook Pro</a></li>
<li><a href="https://eventyay.com/e/fa96ae2c" rel="nofollow">FOSSASIA Conference - March 2021(Virtual)</a></li>
<li><a href="https://www.netgate.com/blog/wireguard-for-pfsense-software.html" rel="nofollow">WireGuard for pfSense Software</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-advocacy/2021/02/07/msg000849.html" rel="nofollow">NetBSD logo to going Moon</a>
***
###Tarsnap</li>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
### Producer&#39;s Note
&gt; Hey everybody, it’s JT here.  After our AMA episode where I mentioned I was looking for older BSD Retail Copies, I was contacted by Andrew who hooked me up with a bunch of OpenBSD disks from the 4.x era.  So shout out to him, and since that worked so well, I figured I&#39;d give it another shot and ask that if anyone has any old Unixes that will run on an 8088, 8086, or 286 and you&#39;re willing to send me copies of the disks. I&#39;ve recently dug out an old 286 system and I’d love to get a Unix OS on it.  I know of Minix, Xenix and Microport, but I haven’t been able to find many versions of them.  I&#39;ve found Microport 1.3.3, and SCO Xenix... but that&#39;s about it.  Let me know if you happen to have any other versions, or know where I can get them.<br></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/390/feedback/Christian%20-%20ZFS%20replication%20and%20verification" rel="nofollow">Christian - ZFS replication and verification</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/390/feedback/Iain%20-%20progress" rel="nofollow">Iain - progress</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/390/feedback/Paul%20-%20APU2%20device" rel="nofollow">Paul - APU2 device</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Did Linux kill Commercial Unix, three node GlusterFS setup on FreeBSD, OpenBSD on the Lenovo ThinkPad X1 Nano (1st Gen), NetBSD on EdgeRouter Lite, TLS Mastery first draft done</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.howtogeek.com/440147/did-linux-kill-commercial-unix/" rel="nofollow">Did Linux Kill Commercial Unix?</a></h3>

<blockquote>
<p>Sales of commercial Unix have fallen off a cliff. There has to be something behind this dramatic decline. Has Linux killed its ancestor by becoming a perfectly viable replacement, like an operating system version of Invasion of the Body Snatchers?</p>

<hr>

<h3><a href="https://klarasystems.com/articles/simple-and-secure-vpn-in-freebsd/" rel="nofollow">Wireguard: Simple and Secure VPN in FreeBSD</a></h3>

<ul>
<li>A great article by Tom Jones about setting up Wireguard on FreeBSD
***</li>
</ul>
</blockquote>

<h3><a href="http://www.unibia.com/unibianet/freebsd/setup-three-node-replicated-glusterfs-cluster-freebsd" rel="nofollow">Setup a Three Node Replicated GlusterFS Cluster on FreeBSD</a></h3>

<blockquote>
<p>GlusterFS (GFS) is the open source equivalent to Microsoft&#39;s Distributed Filesystem (DFS). It&#39;s a service that replicates the contents of a filesystem in real time from one server to another. Clients connect to any server and changes made to a file will replicate automatically. It&#39;s similar to something like rsync or syncthing, but much more automatic and transparent. A FreeBSD port has been available since v3.4, and (as of this post) is currently at version 8.0 with 9.0 being released soon.</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://jcs.org/2021/01/27/x1nano" rel="nofollow">OpenBSD on the Lenovo ThinkPad X1 Nano (1st Gen)</a></h3>

<p>Lenovo has finally made a smaller version of its X1 Carbon, something I’ve been looking forward to for years.</p>

<hr>

<h3><a href="https://www.cambus.net/netbsd-on-the-edgerouter-lite/" rel="nofollow">NetBSD on the EdgeRouter Lite</a></h3>

<p>NetBSD-current now has pre-built octeon bootable images (which will appear in NetBSD 10.0) for the evbmips port, so I decided to finally give it a try. I&#39;ve been happily running OpenBSD/octeon on my EdgeRouter Lite for a few years now, and have previously published some notes including more detail about the CPU.</p>

<hr>

<h3><a href="https://mwl.io/archives/9938" rel="nofollow">“TLS Mastery” first draft done!</a></h3>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://forums.freebsd.org/threads/freebsd-desktop-for-pinebook-pro.78269/" rel="nofollow">A Thread on a FreeBSD Desktop for PineBook Pro</a></li>
<li><a href="https://eventyay.com/e/fa96ae2c" rel="nofollow">FOSSASIA Conference - March 2021(Virtual)</a></li>
<li><a href="https://www.netgate.com/blog/wireguard-for-pfsense-software.html" rel="nofollow">WireGuard for pfSense Software</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-advocacy/2021/02/07/msg000849.html" rel="nofollow">NetBSD logo to going Moon</a>
***
###Tarsnap</li>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
### Producer&#39;s Note
&gt; Hey everybody, it’s JT here.  After our AMA episode where I mentioned I was looking for older BSD Retail Copies, I was contacted by Andrew who hooked me up with a bunch of OpenBSD disks from the 4.x era.  So shout out to him, and since that worked so well, I figured I&#39;d give it another shot and ask that if anyone has any old Unixes that will run on an 8088, 8086, or 286 and you&#39;re willing to send me copies of the disks. I&#39;ve recently dug out an old 286 system and I’d love to get a Unix OS on it.  I know of Minix, Xenix and Microport, but I haven’t been able to find many versions of them.  I&#39;ve found Microport 1.3.3, and SCO Xenix... but that&#39;s about it.  Let me know if you happen to have any other versions, or know where I can get them.<br></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/390/feedback/Christian%20-%20ZFS%20replication%20and%20verification" rel="nofollow">Christian - ZFS replication and verification</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/390/feedback/Iain%20-%20progress" rel="nofollow">Iain - progress</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/390/feedback/Paul%20-%20APU2%20device" rel="nofollow">Paul - APU2 device</a>
***</li>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>378: Networknomicon</title>
  <link>https://www.bsdnow.tv/378</link>
  <guid isPermaLink="false">5d96e357-c800-4037-bc9d-3251ca0b1cd0</guid>
  <pubDate>Thu, 26 Nov 2020 06:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5d96e357-c800-4037-bc9d-3251ca0b1cd0.mp3" length="55682424" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Interview with Michael W. Lucas: SNMP and TLS book, cashflow for creators, book sale and more. </itunes:subtitle>
  <itunes:duration>56:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Interview with Michael W. Lucas: SNMP and TLS book, cashflow for creators, book sale and more. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;Interview with Michael W. Lucas&lt;/h3&gt;

&lt;p&gt;&amp;gt; &lt;a href="https://mwl.io/nonfiction/networking#snmp" target="_blank" rel="nofollow noopener"&gt;SNMP Book&lt;/a&gt;&lt;br&gt;
&amp;gt; &lt;a href="https://mwl.io/nonfiction/networking#networknomicon" target="_blank" rel="nofollow noopener"&gt;The Networknomicon&lt;/a&gt;&lt;br&gt;
&amp;gt; &lt;a href="https://www.tiltedwindmillpress.com/product-category/sponsor/" target="_blank" rel="nofollow noopener"&gt;Sponsor the TLS Book&lt;/a&gt;&lt;br&gt;
&amp;gt; &lt;a href="https://mwl.io/nonfiction/biz-craft" target="_blank" rel="nofollow noopener"&gt;Cashflow for creators&lt;/a&gt;&lt;br&gt;
&amp;gt; &lt;a href="https://mwl.io/blog/9313" target="_blank" rel="nofollow noopener"&gt;Book sale&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Special Guest: Michael W Lucas.&lt;/p&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, michael W. Lucas, books, tls, snmp, cashflow, creators, sale, book sale </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Interview with Michael W. Lucas: SNMP and TLS book, cashflow for creators, book sale and more. </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3>Interview with Michael W. Lucas</h3>

<blockquote>
<p><a href="https://mwl.io/nonfiction/networking#snmp" rel="nofollow">SNMP Book</a><br>
<a href="https://mwl.io/nonfiction/networking#networknomicon" rel="nofollow">The Networknomicon</a><br>
<a href="https://www.tiltedwindmillpress.com/product-category/sponsor/" rel="nofollow">Sponsor the TLS Book</a><br>
<a href="https://mwl.io/nonfiction/biz-craft" rel="nofollow">Cashflow for creators</a><br>
<a href="https://mwl.io/blog/9313" rel="nofollow">Book sale</a></p>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>
</blockquote>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul><p>Special Guest: Michael W Lucas.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Interview with Michael W. Lucas: SNMP and TLS book, cashflow for creators, book sale and more. </p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3>Interview with Michael W. Lucas</h3>

<blockquote>
<p><a href="https://mwl.io/nonfiction/networking#snmp" rel="nofollow">SNMP Book</a><br>
<a href="https://mwl.io/nonfiction/networking#networknomicon" rel="nofollow">The Networknomicon</a><br>
<a href="https://www.tiltedwindmillpress.com/product-category/sponsor/" rel="nofollow">Sponsor the TLS Book</a><br>
<a href="https://mwl.io/nonfiction/biz-craft" rel="nofollow">Cashflow for creators</a><br>
<a href="https://mwl.io/blog/9313" rel="nofollow">Book sale</a></p>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>
</blockquote>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul><p>Special Guest: Michael W Lucas.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>348: BSD Community Collections</title>
  <link>https://www.bsdnow.tv/348</link>
  <guid isPermaLink="false">ed288ede-fe94-433f-85a4-6eebb8cb2478</guid>
  <pubDate>Thu, 30 Apr 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ed288ede-fe94-433f-85a4-6eebb8cb2478.mp3" length="43398814" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.</itunes:subtitle>
  <itunes:duration>1:00:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.furybsd.org/furybsd-2020-q2-images-are-available-for-xfce-and-kde/" target="_blank" rel="nofollow noopener"&gt;FuryBSD 2020Q2 Images Available for XFCE and KDE&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; The Q2 2020 images are not a visible leap forward but a functional leap forward.  Most effort was spent creating a better out of box experience for automatic Ethernet configuration, working WiFi, webcam, and improved hypervisor support. &lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://unixsheikh.com/articles/technical-reasons-to-choose-freebsd-over-linux.html" target="_blank" rel="nofollow noopener"&gt;Technical reasons to choose FreeBSD over GNU/Linux&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Since I wrote my article "Why you should migrate everything from Linux to BSD" I have been wanting to write something about the technical reasons to choose FreeBSD over GNU/Linux and while I cannot possibly cover every single reason, I can write about some of the things that I consider worth noting.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;+ &lt;a href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/" target="_blank" rel="nofollow noopener"&gt;Not actually Linux distro review deux: GhostBSD&lt;/a&gt;
&lt;/h3&gt;

&lt;p&gt;&amp;gt; When I began work on the FreeBSD 12.1-RELEASE review last week, it didn't take long to figure out that the desktop portion wasn't going very smoothly.&lt;/p&gt;

&lt;p&gt;&amp;gt; I think it's important for BSD-curious users to know of easier, gentler alternatives, so I did a little looking around and settled on GhostBSD for a follow-up review.&lt;/p&gt;

&lt;p&gt;&amp;gt; GhostBSD is based on TrueOS, which itself derives from FreeBSD Stable. It was originally a Canadian distro, but—like most successful distributions—it has transcended its country of origin and can now be considered worldwide. Significant GhostBSD development takes place now in Canada, Italy, Germany, and the United States.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://mwl.io/archives/6265" target="_blank" rel="nofollow noopener"&gt;“TLS Mastery” sponsorships open&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; My next book will be TLS Mastery, all about Transport Layer Encryption, Let’s Encrypt, OCSP, and so on.&lt;/p&gt;

&lt;p&gt;&amp;gt; This should be a shorter book, more like my DNSSEC or Tarsnap titles, or the first edition of Sudo Mastery. I would like a break from writing doorstops like the SNMP and jails books.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;JT (our producer) shared his Open Source Retail Box Collection on twitter this past weekend and there was a nice response from a few in the BSD Community showing their collections:&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;JT's post: &lt;a href="https://twitter.com/q5sys/status/1251194823589138432" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/q5sys/status/1251194823589138432&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;High Resolution Image to see the bottom shelf better: &lt;a href="https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg" target="_blank" rel="nofollow noopener"&gt;https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Closeup of the BSD Section: &lt;a href="https://twitter.com/q5sys/status/1251294290782928897" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/q5sys/status/1251294290782928897&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Others jumped in with their collections:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Deb Goodkin's collection: &lt;a href="https://twitter.com/dgoodkin/status/1251294016139743232" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/dgoodkin/status/1251294016139743232&lt;/a&gt; &amp;amp; &lt;a href="https://twitter.com/dgoodkin/status/1251298125672660992" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/dgoodkin/status/1251298125672660992&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FreeBSD Frau's FreeBSD Collection: &lt;a href="https://twitter.com/freebsdfrau/status/1251290430475350018" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/freebsdfrau/status/1251290430475350018&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jason Tubnor's OpenBSD Collection: &lt;a href="https://twitter.com/Tubsta/status/1251265902214918144" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/Tubsta/status/1251265902214918144&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Do you have a nice collection, take a picture and send it in!&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://bsdb0y.github.io/blog/deep-dive-into-the-OpenBSD-malloc-and-friends-internals-part-1.html" target="_blank" rel="nofollow noopener"&gt;Tale of OpenBSD secure memory allocator internals - malloc(3)&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Hi there,&lt;/p&gt;

&lt;p&gt;&amp;gt; It's been a very long time I haven't written anything after my last OpenBSD blogs, that is, &lt;/p&gt;

&lt;p&gt;&amp;gt; OpenBSD Kernel Internals — Creation of process from user-space to kernel space.&lt;/p&gt;

&lt;p&gt;&amp;gt; OpenBSD: Introduction to &lt;code&gt;execpromises&lt;/code&gt; in the pledge(2)&lt;/p&gt;

&lt;p&gt;&amp;gt; pledge(2): OpenBSD's defensive approach to OS Security&lt;/p&gt;

&lt;p&gt;&amp;gt; So, again I started reading OpenBSD source codes with debugger after reducing my sleep timings and managing to get some time after professional life. This time I have picked one of my favourite item from my wishlist to learn and share, that is, OpenBSD malloc(3), secure allocator&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.ixsystems.com/community/threads/how-i-learned-to-stop-worrying-and-love-ssds.82617/" target="_blank" rel="nofollow noopener"&gt;How I learned to stop worrying and love SSDs&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; my home FreeNAS runs two pools for data. One RAIDZ2 with four spinning disk drives and one mirror with two SSDs. Toying with InfluxDB and Grafana in the last couple of days I found that I seem to have a constant write load of 1 Megabyte (!) per second on the SSDs. What the ...?&lt;/p&gt;

&lt;p&gt;&amp;gt; So I run three VMs on the SSDs in total. One with Windows 10, two with Ubuntu running Confluence, A wiki essentially, with files for attachments and MySQL as the backend database. Clearly the writes had to stop when the wikis were not used at all, just sitting idle, right?&lt;/p&gt;

&lt;p&gt;&amp;gt; Well even with a full query log and quite some experience in the operation of web applications I could not figure out what Confluence is doing (productively, no doubt) but trust me, it writes a couple of hundred kbytes to the database each second just sitting idle.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://chown.me/blog/infrastructure-2019.html" target="_blank" rel="nofollow noopener"&gt;My infrastructure as of 2019&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I've wanted to write about my infrastructure for a while, but I kept thinking, "I'll wait until after I've done $next_thing_on_my_todo." Of course this cycle never ends, so I decided to write about its state at the end of 2019. Maybe I'll write an update on it in a couple of moons; who knows?&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;For something different than our usual Beastie Bits… we bring you…&lt;/h2&gt;

&lt;h2&gt;We're all quarantined so lets install BSD on things!  Install BSD on something this week, write it up and let us know about it, and maybe we'll feature you!&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://e17i.github.io/articles-netbsd-install/" target="_blank" rel="nofollow noopener"&gt;Installation of NetBSD on a Mac Mini&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://icyphox.sh/blog/openbsd-hp-envy/" target="_blank" rel="nofollow noopener"&gt;OpenBSD on the HP Envy 13&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.rs-online.com/designspark/install-netbsd-on-a-vintage-computer" target="_blank" rel="nofollow noopener"&gt;Install NetBSD on a Vintage Computer&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/allanjude/status/1251895348836143104" target="_blank" rel="nofollow noopener"&gt;BSDCan Home Lab Panel recording session: May 5th at 18:00 UTC&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://wiki.freebsd.org/OfficeHours" target="_blank" rel="nofollow noopener"&gt;Allan started a series of FreeBSD Office Hours&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;BSDNow is going Independent&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;After being part of Jupiter Broadcasting since we started back in 2013, BSDNow is moving to become independent. We extend a very large thank you to Jupiter Broadcasting and Linux Academy for hosting us for so many years, and allowing us to bring you over 100 episodes without advertisements.
What does this mean for you, the listener? Not much will change, just make sure your subscription is via the RSS feed at BSDNow.tv rather than one of the Jupiter Broadcasting feeds. We will update you with more news as things settle out.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Todd - &lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/348/feedback/Todd%20-%20LinusTechTips'%20claims%20on%20ZFS.md" target="_blank" rel="nofollow noopener"&gt;LinusTechTips Claims about ZFS&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, furybsd, kde, xfce, GhostBSD, Ars Technica, TLS, tls mastery, tls mastery book, book sponsorship, collections, secure memory allocator, internals, memory allocator, memory allocator internals, ssd, solid state drive</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.furybsd.org/furybsd-2020-q2-images-are-available-for-xfce-and-kde/" rel="nofollow">FuryBSD 2020Q2 Images Available for XFCE and KDE</a></h3>

<blockquote>
<p>The Q2 2020 images are not a visible leap forward but a functional leap forward.  Most effort was spent creating a better out of box experience for automatic Ethernet configuration, working WiFi, webcam, and improved hypervisor support. </p>
</blockquote>

<hr>

<h3><a href="https://unixsheikh.com/articles/technical-reasons-to-choose-freebsd-over-linux.html" rel="nofollow">Technical reasons to choose FreeBSD over GNU/Linux</a></h3>

<blockquote>
<p>Since I wrote my article &quot;Why you should migrate everything from Linux to BSD&quot; I have been wanting to write something about the technical reasons to choose FreeBSD over GNU/Linux and while I cannot possibly cover every single reason, I can write about some of the things that I consider worth noting.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3>+ <a href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/" rel="nofollow">Not actually Linux distro review deux: GhostBSD</a></h3>

<blockquote>
<p>When I began work on the FreeBSD 12.1-RELEASE review last week, it didn&#39;t take long to figure out that the desktop portion wasn&#39;t going very smoothly.</p>

<p>I think it&#39;s important for BSD-curious users to know of easier, gentler alternatives, so I did a little looking around and settled on GhostBSD for a follow-up review.</p>

<p>GhostBSD is based on TrueOS, which itself derives from FreeBSD Stable. It was originally a Canadian distro, but—like most successful distributions—it has transcended its country of origin and can now be considered worldwide. Significant GhostBSD development takes place now in Canada, Italy, Germany, and the United States.</p>
</blockquote>

<hr>

<h3><a href="https://mwl.io/archives/6265" rel="nofollow">“TLS Mastery” sponsorships open</a></h3>

<blockquote>
<p>My next book will be TLS Mastery, all about Transport Layer Encryption, Let’s Encrypt, OCSP, and so on.</p>

<p>This should be a shorter book, more like my DNSSEC or Tarsnap titles, or the first edition of Sudo Mastery. I would like a break from writing doorstops like the SNMP and jails books.</p>
</blockquote>

<hr>

<h3>JT (our producer) shared his Open Source Retail Box Collection on twitter this past weekend and there was a nice response from a few in the BSD Community showing their collections:</h3>

<ul>
<li><p>JT&#39;s post: <a href="https://twitter.com/q5sys/status/1251194823589138432" rel="nofollow">https://twitter.com/q5sys/status/1251194823589138432</a></p>

<ul>
<li>High Resolution Image to see the bottom shelf better: <a href="https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg" rel="nofollow">https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg</a></li>
<li>Closeup of the BSD Section: <a href="https://twitter.com/q5sys/status/1251294290782928897" rel="nofollow">https://twitter.com/q5sys/status/1251294290782928897</a></li>
</ul></li>
<li><p>Others jumped in with their collections:</p>

<ul>
<li>Deb Goodkin&#39;s collection: <a href="https://twitter.com/dgoodkin/status/1251294016139743232" rel="nofollow">https://twitter.com/dgoodkin/status/1251294016139743232</a> &amp; <a href="https://twitter.com/dgoodkin/status/1251298125672660992" rel="nofollow">https://twitter.com/dgoodkin/status/1251298125672660992</a></li>
<li>FreeBSD Frau&#39;s FreeBSD Collection: <a href="https://twitter.com/freebsdfrau/status/1251290430475350018" rel="nofollow">https://twitter.com/freebsdfrau/status/1251290430475350018</a></li>
<li>Jason Tubnor&#39;s OpenBSD Collection: <a href="https://twitter.com/Tubsta/status/1251265902214918144" rel="nofollow">https://twitter.com/Tubsta/status/1251265902214918144</a></li>
</ul></li>
</ul>

<p>Do you have a nice collection, take a picture and send it in!</p>

<hr>

<h3><a href="https://bsdb0y.github.io/blog/deep-dive-into-the-OpenBSD-malloc-and-friends-internals-part-1.html" rel="nofollow">Tale of OpenBSD secure memory allocator internals - malloc(3)</a></h3>

<blockquote>
<p>Hi there,</p>

<p>It&#39;s been a very long time I haven&#39;t written anything after my last OpenBSD blogs, that is, </p>

<p>OpenBSD Kernel Internals — Creation of process from user-space to kernel space.</p>

<p>OpenBSD: Introduction to <code>execpromises</code> in the pledge(2)</p>

<p>pledge(2): OpenBSD&#39;s defensive approach to OS Security</p>

<p>So, again I started reading OpenBSD source codes with debugger after reducing my sleep timings and managing to get some time after professional life. This time I have picked one of my favourite item from my wishlist to learn and share, that is, OpenBSD malloc(3), secure allocator</p>
</blockquote>

<hr>

<h3><a href="https://www.ixsystems.com/community/threads/how-i-learned-to-stop-worrying-and-love-ssds.82617/" rel="nofollow">How I learned to stop worrying and love SSDs</a></h3>

<blockquote>
<p>my home FreeNAS runs two pools for data. One RAIDZ2 with four spinning disk drives and one mirror with two SSDs. Toying with InfluxDB and Grafana in the last couple of days I found that I seem to have a constant write load of 1 Megabyte (!) per second on the SSDs. What the ...?</p>

<p>So I run three VMs on the SSDs in total. One with Windows 10, two with Ubuntu running Confluence, A wiki essentially, with files for attachments and MySQL as the backend database. Clearly the writes had to stop when the wikis were not used at all, just sitting idle, right?</p>

<p>Well even with a full query log and quite some experience in the operation of web applications I could not figure out what Confluence is doing (productively, no doubt) but trust me, it writes a couple of hundred kbytes to the database each second just sitting idle.</p>
</blockquote>

<hr>

<h3><a href="https://chown.me/blog/infrastructure-2019.html" rel="nofollow">My infrastructure as of 2019</a></h3>

<blockquote>
<p>I&#39;ve wanted to write about my infrastructure for a while, but I kept thinking, &quot;I&#39;ll wait until after I&#39;ve done $next_thing_on_my_todo.&quot; Of course this cycle never ends, so I decided to write about its state at the end of 2019. Maybe I&#39;ll write an update on it in a couple of moons; who knows?</p>
</blockquote>

<hr>

<h2>For something different than our usual Beastie Bits… we bring you…</h2>

<h2>We&#39;re all quarantined so lets install BSD on things!  Install BSD on something this week, write it up and let us know about it, and maybe we&#39;ll feature you!</h2>

<ul>
<li><p><a href="https://e17i.github.io/articles-netbsd-install/" rel="nofollow">Installation of NetBSD on a Mac Mini</a></p></li>
<li><p><a href="https://icyphox.sh/blog/openbsd-hp-envy/" rel="nofollow">OpenBSD on the HP Envy 13</a></p></li>
<li><p><a href="https://www.rs-online.com/designspark/install-netbsd-on-a-vintage-computer" rel="nofollow">Install NetBSD on a Vintage Computer</a></p></li>
<li><p><a href="https://twitter.com/allanjude/status/1251895348836143104" rel="nofollow">BSDCan Home Lab Panel recording session: May 5th at 18:00 UTC</a></p></li>
<li><p><a href="https://wiki.freebsd.org/OfficeHours" rel="nofollow">Allan started a series of FreeBSD Office Hours</a></p></li>
</ul>

<hr>

<h2>BSDNow is going Independent</h2>

<ul>
<li>After being part of Jupiter Broadcasting since we started back in 2013, BSDNow is moving to become independent. We extend a very large thank you to Jupiter Broadcasting and Linux Academy for hosting us for so many years, and allowing us to bring you over 100 episodes without advertisements.
What does this mean for you, the listener? Not much will change, just make sure your subscription is via the RSS feed at BSDNow.tv rather than one of the Jupiter Broadcasting feeds. We will update you with more news as things settle out.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Todd - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/348/feedback/Todd%20-%20LinusTechTips&#x27;%20claims%20on%20ZFS.md" rel="nofollow">LinusTechTips Claims about ZFS</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>FuryBSD 2020Q2 Images Available, Technical reasons to choose FreeBSD over GNU/Linux, Ars technica reviews GhostBSD, “TLS Mastery” sponsorships open, BSD community show their various collections, a tale of OpenBSD secure memory allocator internals, learn to stop worrying and love SSDs, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.furybsd.org/furybsd-2020-q2-images-are-available-for-xfce-and-kde/" rel="nofollow">FuryBSD 2020Q2 Images Available for XFCE and KDE</a></h3>

<blockquote>
<p>The Q2 2020 images are not a visible leap forward but a functional leap forward.  Most effort was spent creating a better out of box experience for automatic Ethernet configuration, working WiFi, webcam, and improved hypervisor support. </p>
</blockquote>

<hr>

<h3><a href="https://unixsheikh.com/articles/technical-reasons-to-choose-freebsd-over-linux.html" rel="nofollow">Technical reasons to choose FreeBSD over GNU/Linux</a></h3>

<blockquote>
<p>Since I wrote my article &quot;Why you should migrate everything from Linux to BSD&quot; I have been wanting to write something about the technical reasons to choose FreeBSD over GNU/Linux and while I cannot possibly cover every single reason, I can write about some of the things that I consider worth noting.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3>+ <a href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/" rel="nofollow">Not actually Linux distro review deux: GhostBSD</a></h3>

<blockquote>
<p>When I began work on the FreeBSD 12.1-RELEASE review last week, it didn&#39;t take long to figure out that the desktop portion wasn&#39;t going very smoothly.</p>

<p>I think it&#39;s important for BSD-curious users to know of easier, gentler alternatives, so I did a little looking around and settled on GhostBSD for a follow-up review.</p>

<p>GhostBSD is based on TrueOS, which itself derives from FreeBSD Stable. It was originally a Canadian distro, but—like most successful distributions—it has transcended its country of origin and can now be considered worldwide. Significant GhostBSD development takes place now in Canada, Italy, Germany, and the United States.</p>
</blockquote>

<hr>

<h3><a href="https://mwl.io/archives/6265" rel="nofollow">“TLS Mastery” sponsorships open</a></h3>

<blockquote>
<p>My next book will be TLS Mastery, all about Transport Layer Encryption, Let’s Encrypt, OCSP, and so on.</p>

<p>This should be a shorter book, more like my DNSSEC or Tarsnap titles, or the first edition of Sudo Mastery. I would like a break from writing doorstops like the SNMP and jails books.</p>
</blockquote>

<hr>

<h3>JT (our producer) shared his Open Source Retail Box Collection on twitter this past weekend and there was a nice response from a few in the BSD Community showing their collections:</h3>

<ul>
<li><p>JT&#39;s post: <a href="https://twitter.com/q5sys/status/1251194823589138432" rel="nofollow">https://twitter.com/q5sys/status/1251194823589138432</a></p>

<ul>
<li>High Resolution Image to see the bottom shelf better: <a href="https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg" rel="nofollow">https://photos.smugmug.com/photos/i-9QTs2RR/0/f1742096/O/i-9QTs2RR.jpg</a></li>
<li>Closeup of the BSD Section: <a href="https://twitter.com/q5sys/status/1251294290782928897" rel="nofollow">https://twitter.com/q5sys/status/1251294290782928897</a></li>
</ul></li>
<li><p>Others jumped in with their collections:</p>

<ul>
<li>Deb Goodkin&#39;s collection: <a href="https://twitter.com/dgoodkin/status/1251294016139743232" rel="nofollow">https://twitter.com/dgoodkin/status/1251294016139743232</a> &amp; <a href="https://twitter.com/dgoodkin/status/1251298125672660992" rel="nofollow">https://twitter.com/dgoodkin/status/1251298125672660992</a></li>
<li>FreeBSD Frau&#39;s FreeBSD Collection: <a href="https://twitter.com/freebsdfrau/status/1251290430475350018" rel="nofollow">https://twitter.com/freebsdfrau/status/1251290430475350018</a></li>
<li>Jason Tubnor&#39;s OpenBSD Collection: <a href="https://twitter.com/Tubsta/status/1251265902214918144" rel="nofollow">https://twitter.com/Tubsta/status/1251265902214918144</a></li>
</ul></li>
</ul>

<p>Do you have a nice collection, take a picture and send it in!</p>

<hr>

<h3><a href="https://bsdb0y.github.io/blog/deep-dive-into-the-OpenBSD-malloc-and-friends-internals-part-1.html" rel="nofollow">Tale of OpenBSD secure memory allocator internals - malloc(3)</a></h3>

<blockquote>
<p>Hi there,</p>

<p>It&#39;s been a very long time I haven&#39;t written anything after my last OpenBSD blogs, that is, </p>

<p>OpenBSD Kernel Internals — Creation of process from user-space to kernel space.</p>

<p>OpenBSD: Introduction to <code>execpromises</code> in the pledge(2)</p>

<p>pledge(2): OpenBSD&#39;s defensive approach to OS Security</p>

<p>So, again I started reading OpenBSD source codes with debugger after reducing my sleep timings and managing to get some time after professional life. This time I have picked one of my favourite item from my wishlist to learn and share, that is, OpenBSD malloc(3), secure allocator</p>
</blockquote>

<hr>

<h3><a href="https://www.ixsystems.com/community/threads/how-i-learned-to-stop-worrying-and-love-ssds.82617/" rel="nofollow">How I learned to stop worrying and love SSDs</a></h3>

<blockquote>
<p>my home FreeNAS runs two pools for data. One RAIDZ2 with four spinning disk drives and one mirror with two SSDs. Toying with InfluxDB and Grafana in the last couple of days I found that I seem to have a constant write load of 1 Megabyte (!) per second on the SSDs. What the ...?</p>

<p>So I run three VMs on the SSDs in total. One with Windows 10, two with Ubuntu running Confluence, A wiki essentially, with files for attachments and MySQL as the backend database. Clearly the writes had to stop when the wikis were not used at all, just sitting idle, right?</p>

<p>Well even with a full query log and quite some experience in the operation of web applications I could not figure out what Confluence is doing (productively, no doubt) but trust me, it writes a couple of hundred kbytes to the database each second just sitting idle.</p>
</blockquote>

<hr>

<h3><a href="https://chown.me/blog/infrastructure-2019.html" rel="nofollow">My infrastructure as of 2019</a></h3>

<blockquote>
<p>I&#39;ve wanted to write about my infrastructure for a while, but I kept thinking, &quot;I&#39;ll wait until after I&#39;ve done $next_thing_on_my_todo.&quot; Of course this cycle never ends, so I decided to write about its state at the end of 2019. Maybe I&#39;ll write an update on it in a couple of moons; who knows?</p>
</blockquote>

<hr>

<h2>For something different than our usual Beastie Bits… we bring you…</h2>

<h2>We&#39;re all quarantined so lets install BSD on things!  Install BSD on something this week, write it up and let us know about it, and maybe we&#39;ll feature you!</h2>

<ul>
<li><p><a href="https://e17i.github.io/articles-netbsd-install/" rel="nofollow">Installation of NetBSD on a Mac Mini</a></p></li>
<li><p><a href="https://icyphox.sh/blog/openbsd-hp-envy/" rel="nofollow">OpenBSD on the HP Envy 13</a></p></li>
<li><p><a href="https://www.rs-online.com/designspark/install-netbsd-on-a-vintage-computer" rel="nofollow">Install NetBSD on a Vintage Computer</a></p></li>
<li><p><a href="https://twitter.com/allanjude/status/1251895348836143104" rel="nofollow">BSDCan Home Lab Panel recording session: May 5th at 18:00 UTC</a></p></li>
<li><p><a href="https://wiki.freebsd.org/OfficeHours" rel="nofollow">Allan started a series of FreeBSD Office Hours</a></p></li>
</ul>

<hr>

<h2>BSDNow is going Independent</h2>

<ul>
<li>After being part of Jupiter Broadcasting since we started back in 2013, BSDNow is moving to become independent. We extend a very large thank you to Jupiter Broadcasting and Linux Academy for hosting us for so many years, and allowing us to bring you over 100 episodes without advertisements.
What does this mean for you, the listener? Not much will change, just make sure your subscription is via the RSS feed at BSDNow.tv rather than one of the Jupiter Broadcasting feeds. We will update you with more news as things settle out.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Todd - <a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/348/feedback/Todd%20-%20LinusTechTips&#x27;%20claims%20on%20ZFS.md" rel="nofollow">LinusTechTips Claims about ZFS</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0348.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>313: In-Kernel TLS</title>
  <link>https://www.bsdnow.tv/313</link>
  <guid isPermaLink="false">15bbd7ef-a3c7-4996-9751-d37aa7b5a255</guid>
  <pubDate>Thu, 29 Aug 2019 00:30:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/15bbd7ef-a3c7-4996-9751-d37aa7b5a255.mp3" length="39745015" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>OpenBSD on 7th gen Thinkpad X1 Carbon, how to install FreeBSD on a MacBook, Kernel portion of in-kernel TLS (KTLS), Boot Environments on DragonflyBSD, Project Trident Updates, vBSDcon schedule, and more.</itunes:subtitle>
  <itunes:duration>55:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;OpenBSD on 7th gen Thinkpad X1 Carbon, how to install FreeBSD on a MacBook, Kernel portion of in-kernel TLS (KTLS), Boot Environments on DragonflyBSD, Project Trident Updates, vBSDcon schedule, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://jcs.org/2019/08/14/x1c7" target="_blank" rel="nofollow noopener"&gt;OpenBSD on the Thinkpad X1 Carbon 7th Gen&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Another year, another ThinkPad X1 Carbon, this time with a Dolby Atmos sound system and a smaller battery.&lt;br&gt;
&amp;gt; The seventh generation X1 Carbon isn't much different than the fifth and sixth generations. I opted for the non-vPro Core i5-8265U, 16Gb of RAM, a 512Gb NVMe SSD, and a matte non-touch WQHD display at ~300 nits. A brighter 500-nit 4k display is available, though early reports indicated it severely impacts battery life.&lt;br&gt;
&amp;gt; Gone are the microSD card slot on the back and 1mm of overall thickness (from 15.95mm to 14.95mm), but also 6Whr of battery (down to 51Whr) and a little bit of travel in the keyboard and TrackPoint buttons. I still very much like the feel of both of them, so kudos to Lenovo for not going too far down the Apple route of sacrificing performance and usability just for a thinner profile.&lt;br&gt;
&amp;gt; On my fifth generation X1 Carbon, I used a vinyl plotter to cut out stickers to cover the webcam, "X1 Carbon" branding from the bottom of the display, the power button LED, and the "ThinkPad" branding from the lower part of the keyboard deck.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See link for the rest of the article&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://lexploit.com/freebsdmacbook1-1-2-1/" target="_blank" rel="nofollow noopener"&gt;How To Install FreeBSD On A MacBook 1,1 or 2,1&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt; FreeBSD Setup For MacBook 1,1 and 2,1&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; FreeBSD with some additional setup can be installed on a MacBook 1,1 or 2,1. This article covers how to do so with FreeBSD 10-12.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Installing&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; FreeBSD can be installed as the only OS on your MacBook if desired. What you should have is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A Mac OS X 10.4.6-10.7.5 installer. Unofficial versions modified for these MacBooks such as 10.8 also work.&lt;/li&gt;
&lt;li&gt;A blank CD or DVD to burn the FreeBSD image to. Discs simply work best with these older MacBooks.&lt;/li&gt;
&lt;li&gt;An ISO file of FreeBSD for x86. The AMD64 ISO does not boot due to the 32 bit EFI of these MacBooks.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Burn the ISO file to the blank CD or DVD. Once done, make sure it's in your MacBook and then power off the MacBook. Turn it on, and hold down the c key until the FreeBSD disc boots.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See link for the rest of the guide&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=351522" target="_blank" rel="nofollow noopener"&gt;Patch for review: Kernel portion of in-kernel TLS (KTLS)&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; One of the projects I have been working on for the past several months in conjunction with several other folks is upstreaming work from Netflix to handle some aspects of Transport Layer Security (TLS) in the kernel. In particular, this lets a web server use sendfile() to send static content on HTTPS connections.  There is a lot more detail in the review itself, so I will spare pasting a big wall of text here.  However, I have posted the patch to add the kernel-side of KTLS for review at the URL below.  KTLS also requires other patches to OpenSSL and nginx, but this review is only for the kernel bits.  Patches and reviews for the other bits will follow later.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://reviews.freebsd.org/D21277" target="_blank" rel="nofollow noopener"&gt;https://reviews.freebsd.org/D21277&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://github.com/newnix/dfbeadm" target="_blank" rel="nofollow noopener"&gt;DragonFly Boot Enviroments&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; This is a tool inspired by the beadm utility for FreeBSD/Illumos systems that creates and manages ZFS boot environments. This utility in contrast is written from the ground up in C, this should provide better performance, integration, and extensibility than the POSIX sh and awk script it was inspired by. During the time this project has been worked on, beadm has been superseded by bectl on FreeBSD. After hammering out some of the outstanding internal logic issues, I might look at providing a similar interface to the command as bectl.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See link for the rest of the details&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;Project Trident Updates&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://project-trident.org/post/2019-08-15_19.08_available/" target="_blank" rel="nofollow noopener"&gt;19.08 Available&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; This is a general package update to the CURRENT release repository based upon TrueOS 19.08.&lt;br&gt;
&amp;gt; Legacy boot ISO functional again&lt;br&gt;
&amp;gt; This update includes the FreeBSD fixes for the “vesa” graphics driver for legacy-boot systems. The system can once again be installed on legacy-boot systems.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;PACKAGE CHANGES FROM 19.07-U1&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;New Packages: 154&lt;/li&gt;
&lt;li&gt;Deleted Packages: 394&lt;/li&gt;
&lt;li&gt;Updated Packages: 4926&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://project-trident.org/post/2019-08-22_stable12-u3_available/" target="_blank" rel="nofollow noopener"&gt;12-U3 Available&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; This is the third general package update to the STABLE release repository based upon TrueOS 12-Stable.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;PACKAGE CHANGES FROM STABLE 12-U2

&lt;ul&gt;
&lt;li&gt;New Packages: 105&lt;/li&gt;
&lt;li&gt;Deleted Packages: 386&lt;/li&gt;
&lt;li&gt;Updated Packages: 1046&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.vbsdcon.com/schedule/" target="_blank" rel="nofollow noopener"&gt;vBSDcon&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;vBSDcon 2019 will return to the Hyatt Regency in Reston, VA on September 5-7 2019.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.nycbug.org/index?action=view&amp;amp;id=10671" target="_blank" rel="nofollow noopener"&gt;The next NYCBUG meeting will be Sept 4 @ 18:45&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Tom - &lt;a href="http://dpaste.com/1AXXK7G#wrap" target="_blank" rel="nofollow noopener"&gt;Questions&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Michael - &lt;a href="http://dpaste.com/0PNEDYT#wrap" target="_blank" rel="nofollow noopener"&gt;dfbeadm&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Bostjan - &lt;a href="http://dpaste.com/1N7T7BR#wrap" target="_blank" rel="nofollow noopener"&gt;Questions&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0313.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, thinkpad, x1 carbon, macbook, install, installation, tls, kernel tls, ktls, boot environment, project trident, vbsdcon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>OpenBSD on 7th gen Thinkpad X1 Carbon, how to install FreeBSD on a MacBook, Kernel portion of in-kernel TLS (KTLS), Boot Environments on DragonflyBSD, Project Trident Updates, vBSDcon schedule, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://jcs.org/2019/08/14/x1c7" rel="nofollow">OpenBSD on the Thinkpad X1 Carbon 7th Gen</a></h3>

<blockquote>
<p>Another year, another ThinkPad X1 Carbon, this time with a Dolby Atmos sound system and a smaller battery.<br>
The seventh generation X1 Carbon isn&#39;t much different than the fifth and sixth generations. I opted for the non-vPro Core i5-8265U, 16Gb of RAM, a 512Gb NVMe SSD, and a matte non-touch WQHD display at ~300 nits. A brighter 500-nit 4k display is available, though early reports indicated it severely impacts battery life.<br>
Gone are the microSD card slot on the back and 1mm of overall thickness (from 15.95mm to 14.95mm), but also 6Whr of battery (down to 51Whr) and a little bit of travel in the keyboard and TrackPoint buttons. I still very much like the feel of both of them, so kudos to Lenovo for not going too far down the Apple route of sacrificing performance and usability just for a thinner profile.<br>
On my fifth generation X1 Carbon, I used a vinyl plotter to cut out stickers to cover the webcam, &quot;X1 Carbon&quot; branding from the bottom of the display, the power button LED, and the &quot;ThinkPad&quot; branding from the lower part of the keyboard deck.</p>
</blockquote>

<ul>
<li>See link for the rest of the article</li>
</ul>

<hr>

<h3><a href="http://lexploit.com/freebsdmacbook1-1-2-1/" rel="nofollow">How To Install FreeBSD On A MacBook 1,1 or 2,1</a></h3>

<ul>
<li> FreeBSD Setup For MacBook 1,1 and 2,1</li>
</ul>

<blockquote>
<p>FreeBSD with some additional setup can be installed on a MacBook 1,1 or 2,1. This article covers how to do so with FreeBSD 10-12.</p>
</blockquote>

<ul>
<li>Installing</li>
</ul>

<blockquote>
<p>FreeBSD can be installed as the only OS on your MacBook if desired. What you should have is:</p>
</blockquote>

<ul>
<li>A Mac OS X 10.4.6-10.7.5 installer. Unofficial versions modified for these MacBooks such as 10.8 also work.</li>
<li>A blank CD or DVD to burn the FreeBSD image to. Discs simply work best with these older MacBooks.</li>
<li>An ISO file of FreeBSD for x86. The AMD64 ISO does not boot due to the 32 bit EFI of these MacBooks.</li>
<li><p>Burn the ISO file to the blank CD or DVD. Once done, make sure it&#39;s in your MacBook and then power off the MacBook. Turn it on, and hold down the c key until the FreeBSD disc boots.</p>

<ul>
<li>See link for the rest of the guide</li>
</ul></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=351522" rel="nofollow">Patch for review: Kernel portion of in-kernel TLS (KTLS)</a></h3>

<blockquote>
<p>One of the projects I have been working on for the past several months in conjunction with several other folks is upstreaming work from Netflix to handle some aspects of Transport Layer Security (TLS) in the kernel. In particular, this lets a web server use sendfile() to send static content on HTTPS connections.  There is a lot more detail in the review itself, so I will spare pasting a big wall of text here.  However, I have posted the patch to add the kernel-side of KTLS for review at the URL below.  KTLS also requires other patches to OpenSSL and nginx, but this review is only for the kernel bits.  Patches and reviews for the other bits will follow later.</p>
</blockquote>

<ul>
<li><a href="https://reviews.freebsd.org/D21277" rel="nofollow">https://reviews.freebsd.org/D21277</a></li>
</ul>

<hr>

<h3><a href="https://github.com/newnix/dfbeadm" rel="nofollow">DragonFly Boot Enviroments</a></h3>

<blockquote>
<p>This is a tool inspired by the beadm utility for FreeBSD/Illumos systems that creates and manages ZFS boot environments. This utility in contrast is written from the ground up in C, this should provide better performance, integration, and extensibility than the POSIX sh and awk script it was inspired by. During the time this project has been worked on, beadm has been superseded by bectl on FreeBSD. After hammering out some of the outstanding internal logic issues, I might look at providing a similar interface to the command as bectl.</p>
</blockquote>

<ul>
<li>See link for the rest of the details</li>
</ul>

<hr>

<h3>Project Trident Updates</h3>

<ul>
<li><a href="https://project-trident.org/post/2019-08-15_19.08_available/" rel="nofollow">19.08 Available</a></li>
</ul>

<blockquote>
<p>This is a general package update to the CURRENT release repository based upon TrueOS 19.08.<br>
Legacy boot ISO functional again<br>
This update includes the FreeBSD fixes for the “vesa” graphics driver for legacy-boot systems. The system can once again be installed on legacy-boot systems.</p>
</blockquote>

<ul>
<li><p>PACKAGE CHANGES FROM 19.07-U1</p>

<ul>
<li>New Packages: 154</li>
<li>Deleted Packages: 394</li>
<li>Updated Packages: 4926</li>
</ul></li>
<li><p><a href="https://project-trident.org/post/2019-08-22_stable12-u3_available/" rel="nofollow">12-U3 Available</a></p></li>
</ul>

<blockquote>
<p>This is the third general package update to the STABLE release repository based upon TrueOS 12-Stable.</p>
</blockquote>

<ul>
<li>PACKAGE CHANGES FROM STABLE 12-U2

<ul>
<li>New Packages: 105</li>
<li>Deleted Packages: 386</li>
<li>Updated Packages: 1046</li>
</ul></li>
</ul>

<hr>

<h3><a href="https://www.vbsdcon.com/schedule/" rel="nofollow">vBSDcon</a></h3>

<ul>
<li>vBSDcon 2019 will return to the Hyatt Regency in Reston, VA on September 5-7 2019.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.nycbug.org/index?action=view&id=10671" rel="nofollow">The next NYCBUG meeting will be Sept 4 @ 18:45</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Tom - <a href="http://dpaste.com/1AXXK7G#wrap" rel="nofollow">Questions</a></li>
<li>Michael - <a href="http://dpaste.com/0PNEDYT#wrap" rel="nofollow">dfbeadm</a></li>
<li>Bostjan - <a href="http://dpaste.com/1N7T7BR#wrap" rel="nofollow">Questions</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0313.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>OpenBSD on 7th gen Thinkpad X1 Carbon, how to install FreeBSD on a MacBook, Kernel portion of in-kernel TLS (KTLS), Boot Environments on DragonflyBSD, Project Trident Updates, vBSDcon schedule, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://jcs.org/2019/08/14/x1c7" rel="nofollow">OpenBSD on the Thinkpad X1 Carbon 7th Gen</a></h3>

<blockquote>
<p>Another year, another ThinkPad X1 Carbon, this time with a Dolby Atmos sound system and a smaller battery.<br>
The seventh generation X1 Carbon isn&#39;t much different than the fifth and sixth generations. I opted for the non-vPro Core i5-8265U, 16Gb of RAM, a 512Gb NVMe SSD, and a matte non-touch WQHD display at ~300 nits. A brighter 500-nit 4k display is available, though early reports indicated it severely impacts battery life.<br>
Gone are the microSD card slot on the back and 1mm of overall thickness (from 15.95mm to 14.95mm), but also 6Whr of battery (down to 51Whr) and a little bit of travel in the keyboard and TrackPoint buttons. I still very much like the feel of both of them, so kudos to Lenovo for not going too far down the Apple route of sacrificing performance and usability just for a thinner profile.<br>
On my fifth generation X1 Carbon, I used a vinyl plotter to cut out stickers to cover the webcam, &quot;X1 Carbon&quot; branding from the bottom of the display, the power button LED, and the &quot;ThinkPad&quot; branding from the lower part of the keyboard deck.</p>
</blockquote>

<ul>
<li>See link for the rest of the article</li>
</ul>

<hr>

<h3><a href="http://lexploit.com/freebsdmacbook1-1-2-1/" rel="nofollow">How To Install FreeBSD On A MacBook 1,1 or 2,1</a></h3>

<ul>
<li> FreeBSD Setup For MacBook 1,1 and 2,1</li>
</ul>

<blockquote>
<p>FreeBSD with some additional setup can be installed on a MacBook 1,1 or 2,1. This article covers how to do so with FreeBSD 10-12.</p>
</blockquote>

<ul>
<li>Installing</li>
</ul>

<blockquote>
<p>FreeBSD can be installed as the only OS on your MacBook if desired. What you should have is:</p>
</blockquote>

<ul>
<li>A Mac OS X 10.4.6-10.7.5 installer. Unofficial versions modified for these MacBooks such as 10.8 also work.</li>
<li>A blank CD or DVD to burn the FreeBSD image to. Discs simply work best with these older MacBooks.</li>
<li>An ISO file of FreeBSD for x86. The AMD64 ISO does not boot due to the 32 bit EFI of these MacBooks.</li>
<li><p>Burn the ISO file to the blank CD or DVD. Once done, make sure it&#39;s in your MacBook and then power off the MacBook. Turn it on, and hold down the c key until the FreeBSD disc boots.</p>

<ul>
<li>See link for the rest of the guide</li>
</ul></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=351522" rel="nofollow">Patch for review: Kernel portion of in-kernel TLS (KTLS)</a></h3>

<blockquote>
<p>One of the projects I have been working on for the past several months in conjunction with several other folks is upstreaming work from Netflix to handle some aspects of Transport Layer Security (TLS) in the kernel. In particular, this lets a web server use sendfile() to send static content on HTTPS connections.  There is a lot more detail in the review itself, so I will spare pasting a big wall of text here.  However, I have posted the patch to add the kernel-side of KTLS for review at the URL below.  KTLS also requires other patches to OpenSSL and nginx, but this review is only for the kernel bits.  Patches and reviews for the other bits will follow later.</p>
</blockquote>

<ul>
<li><a href="https://reviews.freebsd.org/D21277" rel="nofollow">https://reviews.freebsd.org/D21277</a></li>
</ul>

<hr>

<h3><a href="https://github.com/newnix/dfbeadm" rel="nofollow">DragonFly Boot Enviroments</a></h3>

<blockquote>
<p>This is a tool inspired by the beadm utility for FreeBSD/Illumos systems that creates and manages ZFS boot environments. This utility in contrast is written from the ground up in C, this should provide better performance, integration, and extensibility than the POSIX sh and awk script it was inspired by. During the time this project has been worked on, beadm has been superseded by bectl on FreeBSD. After hammering out some of the outstanding internal logic issues, I might look at providing a similar interface to the command as bectl.</p>
</blockquote>

<ul>
<li>See link for the rest of the details</li>
</ul>

<hr>

<h3>Project Trident Updates</h3>

<ul>
<li><a href="https://project-trident.org/post/2019-08-15_19.08_available/" rel="nofollow">19.08 Available</a></li>
</ul>

<blockquote>
<p>This is a general package update to the CURRENT release repository based upon TrueOS 19.08.<br>
Legacy boot ISO functional again<br>
This update includes the FreeBSD fixes for the “vesa” graphics driver for legacy-boot systems. The system can once again be installed on legacy-boot systems.</p>
</blockquote>

<ul>
<li><p>PACKAGE CHANGES FROM 19.07-U1</p>

<ul>
<li>New Packages: 154</li>
<li>Deleted Packages: 394</li>
<li>Updated Packages: 4926</li>
</ul></li>
<li><p><a href="https://project-trident.org/post/2019-08-22_stable12-u3_available/" rel="nofollow">12-U3 Available</a></p></li>
</ul>

<blockquote>
<p>This is the third general package update to the STABLE release repository based upon TrueOS 12-Stable.</p>
</blockquote>

<ul>
<li>PACKAGE CHANGES FROM STABLE 12-U2

<ul>
<li>New Packages: 105</li>
<li>Deleted Packages: 386</li>
<li>Updated Packages: 1046</li>
</ul></li>
</ul>

<hr>

<h3><a href="https://www.vbsdcon.com/schedule/" rel="nofollow">vBSDcon</a></h3>

<ul>
<li>vBSDcon 2019 will return to the Hyatt Regency in Reston, VA on September 5-7 2019.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.nycbug.org/index?action=view&id=10671" rel="nofollow">The next NYCBUG meeting will be Sept 4 @ 18:45</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Tom - <a href="http://dpaste.com/1AXXK7G#wrap" rel="nofollow">Questions</a></li>
<li>Michael - <a href="http://dpaste.com/0PNEDYT#wrap" rel="nofollow">dfbeadm</a></li>
<li>Bostjan - <a href="http://dpaste.com/1N7T7BR#wrap" rel="nofollow">Questions</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0313.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>86: Business as Usual</title>
  <link>https://www.bsdnow.tv/86</link>
  <guid isPermaLink="false">299268e7-d000-4377-8a05-1d0b89b36c5c</guid>
  <pubDate>Wed, 22 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/299268e7-d000-4377-8a05-1d0b89b36c5c.mp3" length="75048916" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we'll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:44:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this time on the show, we'll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we'll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" target="_blank" rel="nofollow noopener"&gt;Optimizing TLS for high bandwidth applications&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Netflix has released a report on some of their recent activities, pushing lots of traffic through TLS on FreeBSD&lt;/li&gt;
&lt;li&gt;TLS has traditionally had too much overhead for the levels of bandwidth they're using, so this pdf outlines some of their strategy in optimizing it&lt;/li&gt;
&lt;li&gt;The sendfile() syscall (which nginx uses) isn't available when data is encrypted in userland&lt;/li&gt;
&lt;li&gt;To get around this, Netflix is proposing to add TLS support to the FreeBSD &lt;strong&gt;kernel&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Having encrypted movie streams would be pretty neat
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142944822223482&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Crypto in unexpected places&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD is somewhat known for its integrated cryptography, right down to strong randomness in every place you could imagine (process IDs, TCP initial sequence numbers, etc)&lt;/li&gt;
&lt;li&gt;One place you might not expect crypto to be used (or even needed) is in the "ping" utility, right? Well, think again &lt;/li&gt;
&lt;li&gt;David Gwynne recently &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142944754923359&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;committed&lt;/a&gt; a change that adds &lt;a href="https://en.wikipedia.org/wiki/Message_authentication_code" target="_blank" rel="nofollow noopener"&gt;MAC&lt;/a&gt; to the ping timestamp payload&lt;/li&gt;
&lt;li&gt;By default, it'll be filled with a ChaCha stream instead of an unvarying payload, and David says "this lets us have some confidence that the timestamp hasn't been damaged or tampered with in transit"&lt;/li&gt;
&lt;li&gt;Not only is this a security feature, but it should also help detect dodgy or malfunctioning network equipment going forward&lt;/li&gt;
&lt;li&gt;Maybe we can look forward to a cryptographically secure "echo" command next...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/BroadwellBoxes/" target="_blank" rel="nofollow noopener"&gt;Broadwell in DragonFly&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The DragonFlyBSD guys have started a new page on their wiki to discuss Broadwell hardware and its current status&lt;/li&gt;
&lt;li&gt;Matt Dillon, the project lead, recently bought some hardware with this chipset, and lays out what works and what doesn't work&lt;/li&gt;
&lt;li&gt;The two main show-stoppers right now are the graphics and wireless, but they have someone who's already making progress with the GPU support&lt;/li&gt;
&lt;li&gt;Wireless support will likely have to wait until FreeBSD gets it, then they'll port it back over&lt;/li&gt;
&lt;li&gt;None of the BSDs currently have full Broadwell support, so stay tuned for further updates
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.brianmoses.net/2015/04/diy-nas-software-roundup.html" target="_blank" rel="nofollow noopener"&gt;DIY NAS software roundup&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this blog post, the author compares a few different software solutions for a network attached storage device&lt;/li&gt;
&lt;li&gt;He puts FreeNAS, one of our favorites, up against a number of opponents - both BSD and Linux-based&lt;/li&gt;
&lt;li&gt;NAS4Free gets an honorable mention as well, particularly for its lower hardware requirements and sleek interface&lt;/li&gt;
&lt;li&gt;If you've been thinking about putting together a NAS, but aren't quite comfortable enough to set it up by yourself yet, this article should give you a good view of the current big names&lt;/li&gt;
&lt;li&gt;Some competition is always good, gotta keep those guys on their toes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Antoine Jacoutot - &lt;a href="mailto:ajacoutot@openbsd.org" target="_blank" rel="nofollow noopener"&gt;ajacoutot@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/ajacoutot" target="_blank" rel="nofollow noopener"&gt;@ajacoutot&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenBSD at &lt;a href="http://www.mtier.org/about-us/" target="_blank" rel="nofollow noopener"&gt;M:Tier&lt;/a&gt;, business adoption of BSD, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tubsta.com/2015/04/openbsd-on-digital-ocean/" target="_blank" rel="nofollow noopener"&gt;OpenBSD on DigitalOcean&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;When DigitalOcean rolled out initial support for FreeBSD, it was a great step in the right direction - we hoped that all the other BSDs would soon follow&lt;/li&gt;
&lt;li&gt;This is not yet the case, but a blog article here has details on how you can install OpenBSD (and likely the others too) on your VPS&lt;/li&gt;
&lt;li&gt;Using a -current snapshot and some swapfile trickery, it's possible to image an OpenBSD ramdisk installer onto an unmounted portion of the virtual disk&lt;/li&gt;
&lt;li&gt;After doing so, you just boot from their web UI-based console and can perform a standard installation &lt;/li&gt;
&lt;li&gt;You will have to pay special attention to some details of the disk layout, but this article takes you through the entire process step by step
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=281494" target="_blank" rel="nofollow noopener"&gt;Initial ARM64 support lands in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The ARM64 architecture, sometimes called &lt;a href="https://wiki.freebsd.org/arm64" target="_blank" rel="nofollow noopener"&gt;ARMv8 or AArch64&lt;/a&gt;, is a new generation of CPUs that will mostly be in embedded devices&lt;/li&gt;
&lt;li&gt;FreeBSD has just gotten support for this platform in the -CURRENT branch&lt;/li&gt;
&lt;li&gt;Previously, it was only the beginnings of the kernel and enough bits to boot in QEMU - now &lt;a href="https://lists.freebsd.org/pipermail/freebsd-testing/2015-April/000918.html" target="_blank" rel="nofollow noopener"&gt;a full build&lt;/a&gt; is possible&lt;/li&gt;
&lt;li&gt;Work should now start happening in the main source code tree, and hopefully they'll have full support in a branch soon
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://shill.seas.harvard.edu/" target="_blank" rel="nofollow noopener"&gt;Scripting with least privilege&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new scripting language with a focus on privilege separation and running with only what's absolutely needed has been popular in the headlines lately&lt;/li&gt;
&lt;li&gt;Shell scripts are used everywhere today: startup scripts, orchestration scripts for mass deployment, configuring and compiling software, etc.&lt;/li&gt;
&lt;li&gt;Shill aims to answer the questions "how do we limit the authority of scripts" and "how do we determine what authority is necessary" by including a declarative security policy that's checked and enforced by the language runtime&lt;/li&gt;
&lt;li&gt;If used on FreeBSD, Shill will use Capsicum for sandboxing&lt;/li&gt;
&lt;li&gt;You can find some more of the technical information in their &lt;a href="http://shill.seas.harvard.edu/shill-osdi-2014.pdf" target="_blank" rel="nofollow noopener"&gt;documentation pdf&lt;/a&gt; or watch their &lt;a href="https://2459d6dc103cb5933875-c0245c5c937c5dedcca3f1764ecc9b2f.ssl.cf2.rackcdn.com/osdi14/moore.mp4" target="_blank" rel="nofollow noopener"&gt;USENIX presentation&lt;/a&gt; video&lt;/li&gt;
&lt;li&gt;Hacker News also &lt;a href="https://news.ycombinator.com/item?id=9328277" target="_blank" rel="nofollow noopener"&gt;had some discussion&lt;/a&gt; on the topic
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.greduan.com/2015-04-19-mstobfi.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD first impressions&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A brand new BSD user has started documenting his experience through a series of blog posts&lt;/li&gt;
&lt;li&gt;Formerly a Linux guy, he's tried out FreeBSD and OpenBSD so far, and is currently working on an OpenBSD desktop&lt;/li&gt;
&lt;li&gt;The first post goes into why he chose BSD at all, why he's switching away from Linux, how the initial transition has been, what you'll need to relearn and what he's got planned going forward&lt;/li&gt;
&lt;li&gt;He's only been using OpenBSD for a few days as of the time this was written - we don't usually get to hear from people this early in on their BSD journey, so it offers a unique perspective
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/04/pc-bsd-and-4k-oh-my/" target="_blank" rel="nofollow noopener"&gt;PCBSD and 4K oh my!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Yesterday, Kris got ahold of some 4K monitor hardware to test PC-BSD out&lt;/li&gt;
&lt;li&gt;The short of it - It works great!&lt;/li&gt;
&lt;li&gt;Minor tweaks being made to some of the PC-BSD defaults to better accommodate 4K out of box&lt;/li&gt;
&lt;li&gt;This particular model monitor ships with DisplayPort set to 1.1 mode only, switching it to 1.2 mode enables 60Hz properly
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21kFuvAFs" target="_blank" rel="nofollow noopener"&gt;Darin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2nf4o9p4E" target="_blank" rel="nofollow noopener"&gt;Mitch writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Discussion&lt;/h2&gt;

&lt;h3&gt;Comparison of BSD release cycles&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/introduction.html#idp55486416" target="_blank" rel="nofollow noopener"&gt;FreeBSD&lt;/a&gt;, &lt;a href="http://www.openbsd.org/faq/faq5.html#Flavors" target="_blank" rel="nofollow noopener"&gt;OpenBSD&lt;/a&gt;, &lt;a href="https://www.netbsd.org/releases/release-map.html" target="_blank" rel="nofollow noopener"&gt;NetBSD&lt;/a&gt; and &lt;a href="https://www.dragonflybsd.org/releases/" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, mtier, m:tier, business, it, consulting, binpatch-ng, openup, stable, packages, enterprise, support, freenas, tls, netflix, broadwell, nas4free</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we&#39;ll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" rel="nofollow">Optimizing TLS for high bandwidth applications</a></h3>

<ul>
<li>Netflix has released a report on some of their recent activities, pushing lots of traffic through TLS on FreeBSD</li>
<li>TLS has traditionally had too much overhead for the levels of bandwidth they&#39;re using, so this pdf outlines some of their strategy in optimizing it</li>
<li>The sendfile() syscall (which nginx uses) isn&#39;t available when data is encrypted in userland</li>
<li>To get around this, Netflix is proposing to add TLS support to the FreeBSD <strong>kernel</strong></li>
<li>Having encrypted movie streams would be pretty neat
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142944822223482&w=2" rel="nofollow">Crypto in unexpected places</a></h3>

<ul>
<li>OpenBSD is somewhat known for its integrated cryptography, right down to strong randomness in every place you could imagine (process IDs, TCP initial sequence numbers, etc)</li>
<li>One place you might not expect crypto to be used (or even needed) is in the &quot;ping&quot; utility, right? Well, think again </li>
<li>David Gwynne recently <a href="https://www.marc.info/?l=openbsd-cvs&m=142944754923359&w=2" rel="nofollow">committed</a> a change that adds <a href="https://en.wikipedia.org/wiki/Message_authentication_code" rel="nofollow">MAC</a> to the ping timestamp payload</li>
<li>By default, it&#39;ll be filled with a ChaCha stream instead of an unvarying payload, and David says &quot;this lets us have some confidence that the timestamp hasn&#39;t been damaged or tampered with in transit&quot;</li>
<li>Not only is this a security feature, but it should also help detect dodgy or malfunctioning network equipment going forward</li>
<li>Maybe we can look forward to a cryptographically secure &quot;echo&quot; command next...
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/BroadwellBoxes/" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>The DragonFlyBSD guys have started a new page on their wiki to discuss Broadwell hardware and its current status</li>
<li>Matt Dillon, the project lead, recently bought some hardware with this chipset, and lays out what works and what doesn&#39;t work</li>
<li>The two main show-stoppers right now are the graphics and wireless, but they have someone who&#39;s already making progress with the GPU support</li>
<li>Wireless support will likely have to wait until FreeBSD gets it, then they&#39;ll port it back over</li>
<li>None of the BSDs currently have full Broadwell support, so stay tuned for further updates
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2015/04/diy-nas-software-roundup.html" rel="nofollow">DIY NAS software roundup</a></h3>

<ul>
<li>In this blog post, the author compares a few different software solutions for a network attached storage device</li>
<li>He puts FreeNAS, one of our favorites, up against a number of opponents - both BSD and Linux-based</li>
<li>NAS4Free gets an honorable mention as well, particularly for its lower hardware requirements and sleek interface</li>
<li>If you&#39;ve been thinking about putting together a NAS, but aren&#39;t quite comfortable enough to set it up by yourself yet, this article should give you a good view of the current big names</li>
<li>Some competition is always good, gotta keep those guys on their toes
***</li>
</ul>

<h2>Interview - Antoine Jacoutot - <a href="mailto:ajacoutot@openbsd.org" rel="nofollow">ajacoutot@openbsd.org</a> / <a href="https://twitter.com/ajacoutot" rel="nofollow">@ajacoutot</a></h2>

<p>OpenBSD at <a href="http://www.mtier.org/about-us/" rel="nofollow">M:Tier</a>, business adoption of BSD, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tubsta.com/2015/04/openbsd-on-digital-ocean/" rel="nofollow">OpenBSD on DigitalOcean</a></h3>

<ul>
<li>When DigitalOcean rolled out initial support for FreeBSD, it was a great step in the right direction - we hoped that all the other BSDs would soon follow</li>
<li>This is not yet the case, but a blog article here has details on how you can install OpenBSD (and likely the others too) on your VPS</li>
<li>Using a -current snapshot and some swapfile trickery, it&#39;s possible to image an OpenBSD ramdisk installer onto an unmounted portion of the virtual disk</li>
<li>After doing so, you just boot from their web UI-based console and can perform a standard installation </li>
<li>You will have to pay special attention to some details of the disk layout, but this article takes you through the entire process step by step
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=281494" rel="nofollow">Initial ARM64 support lands in FreeBSD</a></h3>

<ul>
<li>The ARM64 architecture, sometimes called <a href="https://wiki.freebsd.org/arm64" rel="nofollow">ARMv8 or AArch64</a>, is a new generation of CPUs that will mostly be in embedded devices</li>
<li>FreeBSD has just gotten support for this platform in the -CURRENT branch</li>
<li>Previously, it was only the beginnings of the kernel and enough bits to boot in QEMU - now <a href="https://lists.freebsd.org/pipermail/freebsd-testing/2015-April/000918.html" rel="nofollow">a full build</a> is possible</li>
<li>Work should now start happening in the main source code tree, and hopefully they&#39;ll have full support in a branch soon
***</li>
</ul>

<h3><a href="http://shill.seas.harvard.edu/" rel="nofollow">Scripting with least privilege</a></h3>

<ul>
<li>A new scripting language with a focus on privilege separation and running with only what&#39;s absolutely needed has been popular in the headlines lately</li>
<li>Shell scripts are used everywhere today: startup scripts, orchestration scripts for mass deployment, configuring and compiling software, etc.</li>
<li>Shill aims to answer the questions &quot;how do we limit the authority of scripts&quot; and &quot;how do we determine what authority is necessary&quot; by including a declarative security policy that&#39;s checked and enforced by the language runtime</li>
<li>If used on FreeBSD, Shill will use Capsicum for sandboxing</li>
<li>You can find some more of the technical information in their <a href="http://shill.seas.harvard.edu/shill-osdi-2014.pdf" rel="nofollow">documentation pdf</a> or watch their <a href="https://2459d6dc103cb5933875-c0245c5c937c5dedcca3f1764ecc9b2f.ssl.cf2.rackcdn.com/osdi14/moore.mp4" rel="nofollow">USENIX presentation</a> video</li>
<li>Hacker News also <a href="https://news.ycombinator.com/item?id=9328277" rel="nofollow">had some discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://blog.greduan.com/2015-04-19-mstobfi.html" rel="nofollow">OpenBSD first impressions</a></h3>

<ul>
<li>A brand new BSD user has started documenting his experience through a series of blog posts</li>
<li>Formerly a Linux guy, he&#39;s tried out FreeBSD and OpenBSD so far, and is currently working on an OpenBSD desktop</li>
<li>The first post goes into why he chose BSD at all, why he&#39;s switching away from Linux, how the initial transition has been, what you&#39;ll need to relearn and what he&#39;s got planned going forward</li>
<li>He&#39;s only been using OpenBSD for a few days as of the time this was written - we don&#39;t usually get to hear from people this early in on their BSD journey, so it offers a unique perspective
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/04/pc-bsd-and-4k-oh-my/" rel="nofollow">PCBSD and 4K oh my!</a></h3>

<ul>
<li>Yesterday, Kris got ahold of some 4K monitor hardware to test PC-BSD out</li>
<li>The short of it - It works great!</li>
<li>Minor tweaks being made to some of the PC-BSD defaults to better accommodate 4K out of box</li>
<li>This particular model monitor ships with DisplayPort set to 1.1 mode only, switching it to 1.2 mode enables 60Hz properly
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21kFuvAFs" rel="nofollow">Darin writes in</a></li>
<li><a href="http://slexy.org/view/s2nf4o9p4E" rel="nofollow">Mitch writes in</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of BSD release cycles</h3>

<ul>
<li><a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/introduction.html#idp55486416" rel="nofollow">FreeBSD</a>, <a href="http://www.openbsd.org/faq/faq5.html#Flavors" rel="nofollow">OpenBSD</a>, <a href="https://www.netbsd.org/releases/release-map.html" rel="nofollow">NetBSD</a> and <a href="https://www.dragonflybsd.org/releases/" rel="nofollow">DragonFlyBSD</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we&#39;ll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" rel="nofollow">Optimizing TLS for high bandwidth applications</a></h3>

<ul>
<li>Netflix has released a report on some of their recent activities, pushing lots of traffic through TLS on FreeBSD</li>
<li>TLS has traditionally had too much overhead for the levels of bandwidth they&#39;re using, so this pdf outlines some of their strategy in optimizing it</li>
<li>The sendfile() syscall (which nginx uses) isn&#39;t available when data is encrypted in userland</li>
<li>To get around this, Netflix is proposing to add TLS support to the FreeBSD <strong>kernel</strong></li>
<li>Having encrypted movie streams would be pretty neat
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142944822223482&w=2" rel="nofollow">Crypto in unexpected places</a></h3>

<ul>
<li>OpenBSD is somewhat known for its integrated cryptography, right down to strong randomness in every place you could imagine (process IDs, TCP initial sequence numbers, etc)</li>
<li>One place you might not expect crypto to be used (or even needed) is in the &quot;ping&quot; utility, right? Well, think again </li>
<li>David Gwynne recently <a href="https://www.marc.info/?l=openbsd-cvs&m=142944754923359&w=2" rel="nofollow">committed</a> a change that adds <a href="https://en.wikipedia.org/wiki/Message_authentication_code" rel="nofollow">MAC</a> to the ping timestamp payload</li>
<li>By default, it&#39;ll be filled with a ChaCha stream instead of an unvarying payload, and David says &quot;this lets us have some confidence that the timestamp hasn&#39;t been damaged or tampered with in transit&quot;</li>
<li>Not only is this a security feature, but it should also help detect dodgy or malfunctioning network equipment going forward</li>
<li>Maybe we can look forward to a cryptographically secure &quot;echo&quot; command next...
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/BroadwellBoxes/" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>The DragonFlyBSD guys have started a new page on their wiki to discuss Broadwell hardware and its current status</li>
<li>Matt Dillon, the project lead, recently bought some hardware with this chipset, and lays out what works and what doesn&#39;t work</li>
<li>The two main show-stoppers right now are the graphics and wireless, but they have someone who&#39;s already making progress with the GPU support</li>
<li>Wireless support will likely have to wait until FreeBSD gets it, then they&#39;ll port it back over</li>
<li>None of the BSDs currently have full Broadwell support, so stay tuned for further updates
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2015/04/diy-nas-software-roundup.html" rel="nofollow">DIY NAS software roundup</a></h3>

<ul>
<li>In this blog post, the author compares a few different software solutions for a network attached storage device</li>
<li>He puts FreeNAS, one of our favorites, up against a number of opponents - both BSD and Linux-based</li>
<li>NAS4Free gets an honorable mention as well, particularly for its lower hardware requirements and sleek interface</li>
<li>If you&#39;ve been thinking about putting together a NAS, but aren&#39;t quite comfortable enough to set it up by yourself yet, this article should give you a good view of the current big names</li>
<li>Some competition is always good, gotta keep those guys on their toes
***</li>
</ul>

<h2>Interview - Antoine Jacoutot - <a href="mailto:ajacoutot@openbsd.org" rel="nofollow">ajacoutot@openbsd.org</a> / <a href="https://twitter.com/ajacoutot" rel="nofollow">@ajacoutot</a></h2>

<p>OpenBSD at <a href="http://www.mtier.org/about-us/" rel="nofollow">M:Tier</a>, business adoption of BSD, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tubsta.com/2015/04/openbsd-on-digital-ocean/" rel="nofollow">OpenBSD on DigitalOcean</a></h3>

<ul>
<li>When DigitalOcean rolled out initial support for FreeBSD, it was a great step in the right direction - we hoped that all the other BSDs would soon follow</li>
<li>This is not yet the case, but a blog article here has details on how you can install OpenBSD (and likely the others too) on your VPS</li>
<li>Using a -current snapshot and some swapfile trickery, it&#39;s possible to image an OpenBSD ramdisk installer onto an unmounted portion of the virtual disk</li>
<li>After doing so, you just boot from their web UI-based console and can perform a standard installation </li>
<li>You will have to pay special attention to some details of the disk layout, but this article takes you through the entire process step by step
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=281494" rel="nofollow">Initial ARM64 support lands in FreeBSD</a></h3>

<ul>
<li>The ARM64 architecture, sometimes called <a href="https://wiki.freebsd.org/arm64" rel="nofollow">ARMv8 or AArch64</a>, is a new generation of CPUs that will mostly be in embedded devices</li>
<li>FreeBSD has just gotten support for this platform in the -CURRENT branch</li>
<li>Previously, it was only the beginnings of the kernel and enough bits to boot in QEMU - now <a href="https://lists.freebsd.org/pipermail/freebsd-testing/2015-April/000918.html" rel="nofollow">a full build</a> is possible</li>
<li>Work should now start happening in the main source code tree, and hopefully they&#39;ll have full support in a branch soon
***</li>
</ul>

<h3><a href="http://shill.seas.harvard.edu/" rel="nofollow">Scripting with least privilege</a></h3>

<ul>
<li>A new scripting language with a focus on privilege separation and running with only what&#39;s absolutely needed has been popular in the headlines lately</li>
<li>Shell scripts are used everywhere today: startup scripts, orchestration scripts for mass deployment, configuring and compiling software, etc.</li>
<li>Shill aims to answer the questions &quot;how do we limit the authority of scripts&quot; and &quot;how do we determine what authority is necessary&quot; by including a declarative security policy that&#39;s checked and enforced by the language runtime</li>
<li>If used on FreeBSD, Shill will use Capsicum for sandboxing</li>
<li>You can find some more of the technical information in their <a href="http://shill.seas.harvard.edu/shill-osdi-2014.pdf" rel="nofollow">documentation pdf</a> or watch their <a href="https://2459d6dc103cb5933875-c0245c5c937c5dedcca3f1764ecc9b2f.ssl.cf2.rackcdn.com/osdi14/moore.mp4" rel="nofollow">USENIX presentation</a> video</li>
<li>Hacker News also <a href="https://news.ycombinator.com/item?id=9328277" rel="nofollow">had some discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://blog.greduan.com/2015-04-19-mstobfi.html" rel="nofollow">OpenBSD first impressions</a></h3>

<ul>
<li>A brand new BSD user has started documenting his experience through a series of blog posts</li>
<li>Formerly a Linux guy, he&#39;s tried out FreeBSD and OpenBSD so far, and is currently working on an OpenBSD desktop</li>
<li>The first post goes into why he chose BSD at all, why he&#39;s switching away from Linux, how the initial transition has been, what you&#39;ll need to relearn and what he&#39;s got planned going forward</li>
<li>He&#39;s only been using OpenBSD for a few days as of the time this was written - we don&#39;t usually get to hear from people this early in on their BSD journey, so it offers a unique perspective
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/04/pc-bsd-and-4k-oh-my/" rel="nofollow">PCBSD and 4K oh my!</a></h3>

<ul>
<li>Yesterday, Kris got ahold of some 4K monitor hardware to test PC-BSD out</li>
<li>The short of it - It works great!</li>
<li>Minor tweaks being made to some of the PC-BSD defaults to better accommodate 4K out of box</li>
<li>This particular model monitor ships with DisplayPort set to 1.1 mode only, switching it to 1.2 mode enables 60Hz properly
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21kFuvAFs" rel="nofollow">Darin writes in</a></li>
<li><a href="http://slexy.org/view/s2nf4o9p4E" rel="nofollow">Mitch writes in</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of BSD release cycles</h3>

<ul>
<li><a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/introduction.html#idp55486416" rel="nofollow">FreeBSD</a>, <a href="http://www.openbsd.org/faq/faq5.html#Flavors" rel="nofollow">OpenBSD</a>, <a href="https://www.netbsd.org/releases/release-map.html" rel="nofollow">NetBSD</a> and <a href="https://www.dragonflybsd.org/releases/" rel="nofollow">DragonFlyBSD</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>82: SSL in the Wild</title>
  <link>https://www.bsdnow.tv/82</link>
  <guid isPermaLink="false">530c2987-381d-4c49-bfb9-b78872dd2e03</guid>
  <pubDate>Wed, 25 Mar 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/530c2987-381d-4c49-bfb9-b78872dd2e03.mp3" length="63405364" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He's been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:28:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He's been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://2015.eurobsdcon.org/call-for-papers/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2015 call for papers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The call for papers has been announced for the next &lt;a href="http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon&lt;/a&gt;, which is set to be held in Sweden this year&lt;/li&gt;
&lt;li&gt;According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April&lt;/li&gt;
&lt;li&gt;If giving a full talk isn't your thing, there's also a call for tutorials - if you're comfortable teaching other people about something BSD-related, this could be a great thing too&lt;/li&gt;
&lt;li&gt;You're not limited to one proposal - several speakers gave multiple in 2014 - so don't hesitate if you've got more than one thing you'd like to talk about&lt;/li&gt;
&lt;li&gt;We'd like to see a more balanced conference schedule than BSDCan's having this year, but that requires effort on both sides - if you're doing &lt;em&gt;anything&lt;/em&gt; cool with &lt;em&gt;any&lt;/em&gt; BSD, we'd encourage you submit a proposal (or two)&lt;/li&gt;
&lt;li&gt;Check the announcement for all the specific details and requirements&lt;/li&gt;
&lt;li&gt;If your talk gets accepted, the conference even pays for your travel expenses
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/making-security-sausage" target="_blank" rel="nofollow noopener"&gt;Making security sausage&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD&lt;/li&gt;
&lt;li&gt;"Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!"&lt;/li&gt;
&lt;li&gt;The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review&lt;/li&gt;
&lt;li&gt;It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug&lt;/li&gt;
&lt;li&gt;Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions&lt;/li&gt;
&lt;li&gt;The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them&lt;/li&gt;
&lt;li&gt;Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute&lt;/li&gt;
&lt;li&gt;It was because of this that FreeBSD actually had to release &lt;a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html" target="_blank" rel="nofollow noopener"&gt;a security update to their security update&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;He concludes with "My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note 'oh, and some security too' creates downstream mayhem."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks" target="_blank" rel="nofollow noopener"&gt;Running FreeBSD on the server, a sysadmin speaks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;More BSD content is appearing on mainstream technology sites, and, &lt;strong&gt;more importantly&lt;/strong&gt;, BSD Now is being mentioned&lt;/li&gt;
&lt;li&gt;ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)&lt;/li&gt;
&lt;li&gt;They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor&lt;/li&gt;
&lt;li&gt;It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers&lt;/li&gt;
&lt;li&gt;If you've been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid" target="_blank" rel="nofollow noopener"&gt;NetBSD ported to Hardkernel ODROID-C1&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the &lt;a href="http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433" target="_blank" rel="nofollow noopener"&gt;Hardkernel ODROID-C1&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35&lt;/li&gt;
&lt;li&gt;There's a special kernel config file for this board's hardware, available in both -current and the upcoming 7.0&lt;/li&gt;
&lt;li&gt;More info can be found on &lt;a href="https://wiki.netbsd.org/ports/evbarm/odroid-c1/" target="_blank" rel="nofollow noopener"&gt;their wiki page&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;After this was written, basic framebuffer console support was &lt;a href="http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html" target="_blank" rel="nofollow noopener"&gt;also committed&lt;/a&gt;, allowing a developer to &lt;a href="https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large" target="_blank" rel="nofollow noopener"&gt;run XFCE&lt;/a&gt; on the device
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Bernard Spil - &lt;a href="mailto:brnrd@freebsd.org" target="_blank" rel="nofollow noopener"&gt;brnrd@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/sp1l" target="_blank" rel="nofollow noopener"&gt;@sp1l&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;LibreSSL adoption &lt;a href="https://wiki.freebsd.org/LibreSSL" target="_blank" rel="nofollow noopener"&gt;in FreeBSD ports&lt;/a&gt; and the wider software ecosystem&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.echothrust.com/blogs/monitoring-pf-logs-gource" target="_blank" rel="nofollow noopener"&gt;Monitoring pf logs with Gource&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're &lt;a href="http://www.bsdnow.tv/tutorials/pf" target="_blank" rel="nofollow noopener"&gt;using pf&lt;/a&gt; on any of the BSDs, maybe you've gotten bored of grepping logs and want to do something more fancy&lt;/li&gt;
&lt;li&gt;This article will show you how to get set up with Gource for a cinematic-like experience&lt;/li&gt;
&lt;li&gt;If you've never heard of Gource, it's "an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories"&lt;/li&gt;
&lt;li&gt;When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic&lt;/li&gt;
&lt;li&gt;One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend's phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=381573" target="_blank" rel="nofollow noopener"&gt;pkgng 1.5.0 alpha1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1&lt;/li&gt;
&lt;li&gt;This update introduces support for provides/requires, something that we've been wanting for a long time&lt;/li&gt;
&lt;li&gt;It will also now print which package is the reason for direct dependency change&lt;/li&gt;
&lt;li&gt;Another interesting addition is the "pkg -r" switch, allowing cross installation of packages&lt;/li&gt;
&lt;li&gt;Remember this isn't the stable version, so maybe don't upgrade to it just yet on any production systems&lt;/li&gt;
&lt;li&gt;DragonFly will also likely pick up this update once it's marked stable
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://devio.us/%7Ebcallah/rcos2015.pdf" target="_blank" rel="nofollow noopener"&gt;Welcome to OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned last week that our listener Brian was giving a talk in the Troy, New York area&lt;/li&gt;
&lt;li&gt;The slides from that talk are now online, and they've been generating quite a bit of &lt;a href="https://news.ycombinator.com/item?id=9240533" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt; &lt;a href="https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/" target="_blank" rel="nofollow noopener"&gt;online&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;It's simply titled "Welcome to OpenBSD" and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)&lt;/li&gt;
&lt;li&gt;Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved&lt;/li&gt;
&lt;li&gt;As you may know, NetBSD has almost 60 &lt;a href="https://www.netbsd.org/ports/" target="_blank" rel="nofollow noopener"&gt;supported platforms&lt;/a&gt; and their slogan is "&lt;em&gt;of course&lt;/em&gt; it runs NetBSD" - Brian says, with &lt;a href="http://www.openbsd.org/plat.html" target="_blank" rel="nofollow noopener"&gt;17 platforms&lt;/a&gt; over 13 CPU architectures, "it &lt;em&gt;probably&lt;/em&gt; runs OpenBSD"&lt;/li&gt;
&lt;li&gt;No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet&lt;/li&gt;
&lt;li&gt;Try to guess which font he used...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 252&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;And somehow Brian has snuck himself into &lt;em&gt;another&lt;/em&gt; news item this week&lt;/li&gt;
&lt;li&gt;He makes an appearance in the latest episode of &lt;a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" target="_blank" rel="nofollow noopener"&gt;BSD Talk&lt;/a&gt;, where he chats with Will about running a BSD-based shell provider&lt;/li&gt;
&lt;li&gt;If that sounds familiar, it's probably because &lt;a href="http://www.bsdnow.tv/episodes/2014_06_18-devious_methods" target="_blank" rel="nofollow noopener"&gt;we did the same thing&lt;/a&gt;, albeit with a different member of their team&lt;/li&gt;
&lt;li&gt;In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people&lt;/li&gt;
&lt;li&gt;They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2O81pixhq" target="_blank" rel="nofollow noopener"&gt;Christian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2dhr2WfVc" target="_blank" rel="nofollow noopener"&gt;Stefan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Kisq2EqT" target="_blank" rel="nofollow noopener"&gt;Possnfiffer writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Xr0e5YAJ" target="_blank" rel="nofollow noopener"&gt;Ruudsch writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2Xz7BNoJE" target="_blank" rel="nofollow noopener"&gt;Shane writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html" target="_blank" rel="nofollow noopener"&gt;Accidental support&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142686812913221&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Larry's tears&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html" target="_blank" rel="nofollow noopener"&gt;The boy who sailed with BSD&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgng, poudriere, eurobsdcon, 2015, mg, emacs, libressl, openssl, ports, tls, heartbleed, freak attack, pkgng, hardkernel, gource</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He&#39;s been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://2015.eurobsdcon.org/call-for-papers/" rel="nofollow">EuroBSDCon 2015 call for papers</a></h3>

<ul>
<li>The call for papers has been announced for the next <a href="http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur" rel="nofollow">EuroBSDCon</a>, which is set to be held in Sweden this year</li>
<li>According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April</li>
<li>If giving a full talk isn&#39;t your thing, there&#39;s also a call for tutorials - if you&#39;re comfortable teaching other people about something BSD-related, this could be a great thing too</li>
<li>You&#39;re not limited to one proposal - several speakers gave multiple in 2014 - so don&#39;t hesitate if you&#39;ve got more than one thing you&#39;d like to talk about</li>
<li>We&#39;d like to see a more balanced conference schedule than BSDCan&#39;s having this year, but that requires effort on both sides - if you&#39;re doing <em>anything</em> cool with <em>any</em> BSD, we&#39;d encourage you submit a proposal (or two)</li>
<li>Check the announcement for all the specific details and requirements</li>
<li>If your talk gets accepted, the conference even pays for your travel expenses
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/making-security-sausage" rel="nofollow">Making security sausage</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD</li>
<li>&quot;Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!&quot;</li>
<li>The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review</li>
<li>It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug</li>
<li>Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions</li>
<li>The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them</li>
<li>Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute</li>
<li>It was because of this that FreeBSD actually had to release <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html" rel="nofollow">a security update to their security update</a></li>
<li>He concludes with &quot;My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note &#39;oh, and some security too&#39; creates downstream mayhem.&quot;
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks" rel="nofollow">Running FreeBSD on the server, a sysadmin speaks</a></h3>

<ul>
<li>More BSD content is appearing on mainstream technology sites, and, <strong>more importantly</strong>, BSD Now is being mentioned</li>
<li>ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)</li>
<li>They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor</li>
<li>It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers</li>
<li>If you&#39;ve been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid" rel="nofollow">NetBSD ported to Hardkernel ODROID-C1</a></h3>

<ul>
<li>In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the <a href="http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433" rel="nofollow">Hardkernel ODROID-C1</a></li>
<li>This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35</li>
<li>There&#39;s a special kernel config file for this board&#39;s hardware, available in both -current and the upcoming 7.0</li>
<li>More info can be found on <a href="https://wiki.netbsd.org/ports/evbarm/odroid-c1/" rel="nofollow">their wiki page</a></li>
<li>After this was written, basic framebuffer console support was <a href="http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html" rel="nofollow">also committed</a>, allowing a developer to <a href="https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large" rel="nofollow">run XFCE</a> on the device
***</li>
</ul>

<h2>Interview - Bernard Spil - <a href="mailto:brnrd@freebsd.org" rel="nofollow">brnrd@freebsd.org</a> / <a href="https://twitter.com/sp1l" rel="nofollow">@sp1l</a></h2>

<p>LibreSSL adoption <a href="https://wiki.freebsd.org/LibreSSL" rel="nofollow">in FreeBSD ports</a> and the wider software ecosystem</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/monitoring-pf-logs-gource" rel="nofollow">Monitoring pf logs with Gource</a></h3>

<ul>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">using pf</a> on any of the BSDs, maybe you&#39;ve gotten bored of grepping logs and want to do something more fancy</li>
<li>This article will show you how to get set up with Gource for a cinematic-like experience</li>
<li>If you&#39;ve never heard of Gource, it&#39;s &quot;an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories&quot;</li>
<li>When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic</li>
<li>One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend&#39;s phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=381573" rel="nofollow">pkgng 1.5.0 alpha1 released</a></h3>

<ul>
<li>The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1</li>
<li>This update introduces support for provides/requires, something that we&#39;ve been wanting for a long time</li>
<li>It will also now print which package is the reason for direct dependency change</li>
<li>Another interesting addition is the &quot;pkg -r&quot; switch, allowing cross installation of packages</li>
<li>Remember this isn&#39;t the stable version, so maybe don&#39;t upgrade to it just yet on any production systems</li>
<li>DragonFly will also likely pick up this update once it&#39;s marked stable
***</li>
</ul>

<h3><a href="http://devio.us/%7Ebcallah/rcos2015.pdf" rel="nofollow">Welcome to OpenBSD</a></h3>

<ul>
<li>We mentioned last week that our listener Brian was giving a talk in the Troy, New York area</li>
<li>The slides from that talk are now online, and they&#39;ve been generating quite a bit of <a href="https://news.ycombinator.com/item?id=9240533" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/" rel="nofollow">online</a></li>
<li>It&#39;s simply titled &quot;Welcome to OpenBSD&quot; and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)</li>
<li>Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved</li>
<li>As you may know, NetBSD has almost 60 <a href="https://www.netbsd.org/ports/" rel="nofollow">supported platforms</a> and their slogan is &quot;<em>of course</em> it runs NetBSD&quot; - Brian says, with <a href="http://www.openbsd.org/plat.html" rel="nofollow">17 platforms</a> over 13 CPU architectures, &quot;it <em>probably</em> runs OpenBSD&quot;</li>
<li>No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet</li>
<li>Try to guess which font he used...
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html" rel="nofollow">BSDTalk episode 252</a></h3>

<ul>
<li>And somehow Brian has snuck himself into <em>another</em> news item this week</li>
<li>He makes an appearance in the latest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSD Talk</a>, where he chats with Will about running a BSD-based shell provider</li>
<li>If that sounds familiar, it&#39;s probably because <a href="http://www.bsdnow.tv/episodes/2014_06_18-devious_methods" rel="nofollow">we did the same thing</a>, albeit with a different member of their team</li>
<li>In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people</li>
<li>They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2O81pixhq" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s2dhr2WfVc" rel="nofollow">Stefan writes in</a></li>
<li><a href="http://slexy.org/view/s2Kisq2EqT" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s2Xr0e5YAJ" rel="nofollow">Ruudsch writes in</a></li>
<li><a href="http://slexy.org/view/s2Xz7BNoJE" rel="nofollow">Shane writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html" rel="nofollow">Accidental support</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142686812913221&w=2" rel="nofollow">Larry&#39;s tears</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html" rel="nofollow">The boy who sailed with BSD</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He&#39;s been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://2015.eurobsdcon.org/call-for-papers/" rel="nofollow">EuroBSDCon 2015 call for papers</a></h3>

<ul>
<li>The call for papers has been announced for the next <a href="http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur" rel="nofollow">EuroBSDCon</a>, which is set to be held in Sweden this year</li>
<li>According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April</li>
<li>If giving a full talk isn&#39;t your thing, there&#39;s also a call for tutorials - if you&#39;re comfortable teaching other people about something BSD-related, this could be a great thing too</li>
<li>You&#39;re not limited to one proposal - several speakers gave multiple in 2014 - so don&#39;t hesitate if you&#39;ve got more than one thing you&#39;d like to talk about</li>
<li>We&#39;d like to see a more balanced conference schedule than BSDCan&#39;s having this year, but that requires effort on both sides - if you&#39;re doing <em>anything</em> cool with <em>any</em> BSD, we&#39;d encourage you submit a proposal (or two)</li>
<li>Check the announcement for all the specific details and requirements</li>
<li>If your talk gets accepted, the conference even pays for your travel expenses
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/making-security-sausage" rel="nofollow">Making security sausage</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD</li>
<li>&quot;Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!&quot;</li>
<li>The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review</li>
<li>It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug</li>
<li>Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions</li>
<li>The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them</li>
<li>Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute</li>
<li>It was because of this that FreeBSD actually had to release <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html" rel="nofollow">a security update to their security update</a></li>
<li>He concludes with &quot;My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note &#39;oh, and some security too&#39; creates downstream mayhem.&quot;
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks" rel="nofollow">Running FreeBSD on the server, a sysadmin speaks</a></h3>

<ul>
<li>More BSD content is appearing on mainstream technology sites, and, <strong>more importantly</strong>, BSD Now is being mentioned</li>
<li>ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)</li>
<li>They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor</li>
<li>It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers</li>
<li>If you&#39;ve been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid" rel="nofollow">NetBSD ported to Hardkernel ODROID-C1</a></h3>

<ul>
<li>In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the <a href="http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433" rel="nofollow">Hardkernel ODROID-C1</a></li>
<li>This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35</li>
<li>There&#39;s a special kernel config file for this board&#39;s hardware, available in both -current and the upcoming 7.0</li>
<li>More info can be found on <a href="https://wiki.netbsd.org/ports/evbarm/odroid-c1/" rel="nofollow">their wiki page</a></li>
<li>After this was written, basic framebuffer console support was <a href="http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html" rel="nofollow">also committed</a>, allowing a developer to <a href="https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large" rel="nofollow">run XFCE</a> on the device
***</li>
</ul>

<h2>Interview - Bernard Spil - <a href="mailto:brnrd@freebsd.org" rel="nofollow">brnrd@freebsd.org</a> / <a href="https://twitter.com/sp1l" rel="nofollow">@sp1l</a></h2>

<p>LibreSSL adoption <a href="https://wiki.freebsd.org/LibreSSL" rel="nofollow">in FreeBSD ports</a> and the wider software ecosystem</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/monitoring-pf-logs-gource" rel="nofollow">Monitoring pf logs with Gource</a></h3>

<ul>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">using pf</a> on any of the BSDs, maybe you&#39;ve gotten bored of grepping logs and want to do something more fancy</li>
<li>This article will show you how to get set up with Gource for a cinematic-like experience</li>
<li>If you&#39;ve never heard of Gource, it&#39;s &quot;an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories&quot;</li>
<li>When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic</li>
<li>One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend&#39;s phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=381573" rel="nofollow">pkgng 1.5.0 alpha1 released</a></h3>

<ul>
<li>The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1</li>
<li>This update introduces support for provides/requires, something that we&#39;ve been wanting for a long time</li>
<li>It will also now print which package is the reason for direct dependency change</li>
<li>Another interesting addition is the &quot;pkg -r&quot; switch, allowing cross installation of packages</li>
<li>Remember this isn&#39;t the stable version, so maybe don&#39;t upgrade to it just yet on any production systems</li>
<li>DragonFly will also likely pick up this update once it&#39;s marked stable
***</li>
</ul>

<h3><a href="http://devio.us/%7Ebcallah/rcos2015.pdf" rel="nofollow">Welcome to OpenBSD</a></h3>

<ul>
<li>We mentioned last week that our listener Brian was giving a talk in the Troy, New York area</li>
<li>The slides from that talk are now online, and they&#39;ve been generating quite a bit of <a href="https://news.ycombinator.com/item?id=9240533" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/" rel="nofollow">online</a></li>
<li>It&#39;s simply titled &quot;Welcome to OpenBSD&quot; and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)</li>
<li>Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved</li>
<li>As you may know, NetBSD has almost 60 <a href="https://www.netbsd.org/ports/" rel="nofollow">supported platforms</a> and their slogan is &quot;<em>of course</em> it runs NetBSD&quot; - Brian says, with <a href="http://www.openbsd.org/plat.html" rel="nofollow">17 platforms</a> over 13 CPU architectures, &quot;it <em>probably</em> runs OpenBSD&quot;</li>
<li>No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet</li>
<li>Try to guess which font he used...
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html" rel="nofollow">BSDTalk episode 252</a></h3>

<ul>
<li>And somehow Brian has snuck himself into <em>another</em> news item this week</li>
<li>He makes an appearance in the latest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSD Talk</a>, where he chats with Will about running a BSD-based shell provider</li>
<li>If that sounds familiar, it&#39;s probably because <a href="http://www.bsdnow.tv/episodes/2014_06_18-devious_methods" rel="nofollow">we did the same thing</a>, albeit with a different member of their team</li>
<li>In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people</li>
<li>They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2O81pixhq" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s2dhr2WfVc" rel="nofollow">Stefan writes in</a></li>
<li><a href="http://slexy.org/view/s2Kisq2EqT" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s2Xr0e5YAJ" rel="nofollow">Ruudsch writes in</a></li>
<li><a href="http://slexy.org/view/s2Xz7BNoJE" rel="nofollow">Shane writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html" rel="nofollow">Accidental support</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142686812913221&w=2" rel="nofollow">Larry&#39;s tears</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html" rel="nofollow">The boy who sailed with BSD</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>51: Engineering Nginx</title>
  <link>https://www.bsdnow.tv/51</link>
  <guid isPermaLink="false">4502bfee-e803-4a0d-bdcc-fd4420b30bb1</guid>
  <pubDate>Wed, 20 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4502bfee-e803-4a0d-bdcc-fd4420b30bb1.mp3" length="62975956" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up on the show, we'll be showing you how to set up a secure, SSL-only webserver. There's also an interview with Eric Le Blan about community participation and FreeBSD's role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:27:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up on the show, we'll be showing you how to set up a secure, SSL-only webserver. There's also an interview with Eric Le Blan about community participation and FreeBSD's role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" target="_blank" rel="nofollow noopener"&gt;Password gropers take spamtrap bait&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" target="_blank" rel="nofollow noopener"&gt;Peter Hansteen&lt;/a&gt;, who keeps his eyes glued to his log files, has a new blog post&lt;/li&gt;
&lt;li&gt;He seems to have discovered another new weird phenomenon in his pop3 logs&lt;/li&gt;
&lt;li&gt;"yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia"&lt;/li&gt;
&lt;li&gt;Someone tried to log in to his service with an address that was known to be invalid&lt;/li&gt;
&lt;li&gt;The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" target="_blank" rel="nofollow noopener"&gt;Inside the Atheros wifi chipset&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd - sometimes known in the FreeBSD community as "the wireless guy" - gave a talk at the Defcon Wireless Village 2014&lt;/li&gt;
&lt;li&gt;He covers a lot of topics on wifi, specifically on Atheros chips and why they're so popular for open source development&lt;/li&gt;
&lt;li&gt;There's a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards&lt;/li&gt;
&lt;li&gt;Very technical talk; some parts might go over your head if you're not a driver developer&lt;/li&gt;
&lt;li&gt;The raw video file is also available &lt;a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" target="_blank" rel="nofollow noopener"&gt;to download&lt;/a&gt; on archive.org&lt;/li&gt;
&lt;li&gt;Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" target="_blank" rel="nofollow noopener"&gt;Trip report and hackathon mini-roundup&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted&lt;/li&gt;
&lt;li&gt;Mark Linimon mentions some of the future plans for FreeBSD's release engineering and ports&lt;/li&gt;
&lt;li&gt;Bapt &lt;a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" target="_blank" rel="nofollow noopener"&gt;also has a BSDCan report&lt;/a&gt; detailing his work on ports and packages&lt;/li&gt;
&lt;li&gt;Antoine Jacoutot &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140812064946" target="_blank" rel="nofollow noopener"&gt;writes about&lt;/a&gt; his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout&lt;/li&gt;
&lt;li&gt;Peter Hessler, a latecomer to the hackathon, &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140806125308" target="_blank" rel="nofollow noopener"&gt;details his experience&lt;/a&gt; too, hacking on the installer and built-in upgrade function&lt;/li&gt;
&lt;li&gt;Christian Weisgerber &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140803122705" target="_blank" rel="nofollow noopener"&gt;talks about&lt;/a&gt; starting some initial improvements of OpenBSD's ports infrastructure
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" target="_blank" rel="nofollow noopener"&gt;DragonFly BSD 3.8.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Although it was already branched, the release media is now available for DragonFly 3.8.2&lt;/li&gt;
&lt;li&gt;This is a minor update, mostly to fix the recent OpenSSL vulnerabilities&lt;/li&gt;
&lt;li&gt;It also includes some various other small fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Eric Le Blan - &lt;a href="mailto:info@xinuos.com" target="_blank" rel="nofollow noopener"&gt;info@xinuos.com&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Xinuos' recent FreeBSD integration, BSD in the commercial server space&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/nginx" target="_blank" rel="nofollow noopener"&gt;Building a hardened, feature-rich webserver&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" target="_blank" rel="nofollow noopener"&gt;Defend your network and privacy, FreeBSD version&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back in &lt;a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" target="_blank" rel="nofollow noopener"&gt;episode 39&lt;/a&gt;, we covered a blog post about creating an OpenBSD gateway - partly based on &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;our tutorial&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This is a follow-up post, by the same author, about doing a similar thing with FreeBSD&lt;/li&gt;
&lt;li&gt;He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs&lt;/li&gt;
&lt;li&gt;The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" target="_blank" rel="nofollow noopener"&gt;Don't encrypt all the things&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another couple of interesting blog posts from &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; about encryption&lt;/li&gt;
&lt;li&gt;It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good&lt;/li&gt;
&lt;li&gt;After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie&lt;/li&gt;
&lt;li&gt;He also talks a bit about some PGP weaknesses and a possible future replacement&lt;/li&gt;
&lt;li&gt;He also has another, similar post entitled "&lt;a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" target="_blank" rel="nofollow noopener"&gt;in defense of opportunistic encryption&lt;/a&gt;"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=270096" target="_blank" rel="nofollow noopener"&gt;New automounter lands in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The work on the new automounter has just landed in 11-CURRENT&lt;/li&gt;
&lt;li&gt;With help from the FreeBSD Foundation, we'll have a new "autofs" kernel option&lt;/li&gt;
&lt;li&gt;Check the SVN viewer online to read over the man pages if you're not running -CURRENT&lt;/li&gt;
&lt;li&gt;You can also read a bit about it in the &lt;a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" target="_blank" rel="nofollow noopener"&gt;recent newsletter&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.7 CFT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It's been a little while since the last OpenSSH release, but 6.7 is almost ready&lt;/li&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;Damien Miller&lt;/a&gt; issued a call for testing for the upcoming version, which includes a fair amount of new features&lt;/li&gt;
&lt;li&gt;It includes some old code removal, some new features and some internal reworkings - we'll cover the full list in detail when it's released&lt;/li&gt;
&lt;li&gt;This version also officially supports being built with LibreSSL now&lt;/li&gt;
&lt;li&gt;Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20yIP7VXa" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2DeeUjAn6" target="_blank" rel="nofollow noopener"&gt;Lachlan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216imwEb0" target="_blank" rel="nofollow noopener"&gt;Francis writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2oc8vavWe" target="_blank" rel="nofollow noopener"&gt;Frank writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20wL61sSr" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, xinuos, cloud computing, hosting solution, nginx, webserver, httpd, spamd, atheros, wifi, aircrack-ng, kismet, defcon, wireless, bsdcan, hackathon, autofs, automounter, https, tls, ssl, openssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up on the show, we&#39;ll be showing you how to set up a secure, SSL-only webserver. There&#39;s also an interview with Eric Le Blan about community participation and FreeBSD&#39;s role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" rel="nofollow">Password gropers take spamtrap bait</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a>, who keeps his eyes glued to his log files, has a new blog post</li>
<li>He seems to have discovered another new weird phenomenon in his pop3 logs</li>
<li>&quot;yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia&quot;</li>
<li>Someone tried to log in to his service with an address that was known to be invalid</li>
<li>The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" rel="nofollow">Inside the Atheros wifi chipset</a></h3>

<ul>
<li>Adrian Chadd - sometimes known in the FreeBSD community as &quot;the wireless guy&quot; - gave a talk at the Defcon Wireless Village 2014</li>
<li>He covers a lot of topics on wifi, specifically on Atheros chips and why they&#39;re so popular for open source development</li>
<li>There&#39;s a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards</li>
<li>Very technical talk; some parts might go over your head if you&#39;re not a driver developer</li>
<li>The raw video file is also available <a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" rel="nofollow">to download</a> on archive.org</li>
<li>Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" rel="nofollow">Trip report and hackathon mini-roundup</a></h3>

<ul>
<li>A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted</li>
<li>Mark Linimon mentions some of the future plans for FreeBSD&#39;s release engineering and ports</li>
<li>Bapt <a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" rel="nofollow">also has a BSDCan report</a> detailing his work on ports and packages</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20140812064946" rel="nofollow">writes about</a> his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout</li>
<li>Peter Hessler, a latecomer to the hackathon, <a href="http://undeadly.org/cgi?action=article&sid=20140806125308" rel="nofollow">details his experience</a> too, hacking on the installer and built-in upgrade function</li>
<li>Christian Weisgerber <a href="http://undeadly.org/cgi?action=article&sid=20140803122705" rel="nofollow">talks about</a> starting some initial improvements of OpenBSD&#39;s ports infrastructure
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" rel="nofollow">DragonFly BSD 3.8.2 released</a></h3>

<ul>
<li>Although it was already branched, the release media is now available for DragonFly 3.8.2</li>
<li>This is a minor update, mostly to fix the recent OpenSSL vulnerabilities</li>
<li>It also includes some various other small fixes
***</li>
</ul>

<h2>Interview - Eric Le Blan - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a></h2>

<p>Xinuos&#39; recent FreeBSD integration, BSD in the commercial server space</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nginx" rel="nofollow">Building a hardened, feature-rich webserver</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy, FreeBSD version</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">episode 39</a>, we covered a blog post about creating an OpenBSD gateway - partly based on <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a></li>
<li>This is a follow-up post, by the same author, about doing a similar thing with FreeBSD</li>
<li>He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs</li>
<li>The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" rel="nofollow">Don&#39;t encrypt all the things</a></h3>

<ul>
<li>Another couple of interesting blog posts from <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> about encryption</li>
<li>It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good</li>
<li>After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie</li>
<li>He also talks a bit about some PGP weaknesses and a possible future replacement</li>
<li>He also has another, similar post entitled &quot;<a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" rel="nofollow">in defense of opportunistic encryption</a>&quot;
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=270096" rel="nofollow">New automounter lands in FreeBSD</a></h3>

<ul>
<li>The work on the new automounter has just landed in 11-CURRENT</li>
<li>With help from the FreeBSD Foundation, we&#39;ll have a new &quot;autofs&quot; kernel option</li>
<li>Check the SVN viewer online to read over the man pages if you&#39;re not running -CURRENT</li>
<li>You can also read a bit about it in the <a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" rel="nofollow">recent newsletter</a>
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" rel="nofollow">OpenSSH 6.7 CFT</a></h3>

<ul>
<li>It&#39;s been a little while since the last OpenSSH release, but 6.7 is almost ready</li>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> issued a call for testing for the upcoming version, which includes a fair amount of new features</li>
<li>It includes some old code removal, some new features and some internal reworkings - we&#39;ll cover the full list in detail when it&#39;s released</li>
<li>This version also officially supports being built with LibreSSL now</li>
<li>Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20yIP7VXa" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DeeUjAn6" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s216imwEb0" rel="nofollow">Francis writes in</a></li>
<li><a href="http://slexy.org/view/s2oc8vavWe" rel="nofollow">Frank writes in</a></li>
<li><a href="http://slexy.org/view/s20wL61sSr" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up on the show, we&#39;ll be showing you how to set up a secure, SSL-only webserver. There&#39;s also an interview with Eric Le Blan about community participation and FreeBSD&#39;s role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" rel="nofollow">Password gropers take spamtrap bait</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a>, who keeps his eyes glued to his log files, has a new blog post</li>
<li>He seems to have discovered another new weird phenomenon in his pop3 logs</li>
<li>&quot;yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia&quot;</li>
<li>Someone tried to log in to his service with an address that was known to be invalid</li>
<li>The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" rel="nofollow">Inside the Atheros wifi chipset</a></h3>

<ul>
<li>Adrian Chadd - sometimes known in the FreeBSD community as &quot;the wireless guy&quot; - gave a talk at the Defcon Wireless Village 2014</li>
<li>He covers a lot of topics on wifi, specifically on Atheros chips and why they&#39;re so popular for open source development</li>
<li>There&#39;s a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards</li>
<li>Very technical talk; some parts might go over your head if you&#39;re not a driver developer</li>
<li>The raw video file is also available <a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" rel="nofollow">to download</a> on archive.org</li>
<li>Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" rel="nofollow">Trip report and hackathon mini-roundup</a></h3>

<ul>
<li>A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted</li>
<li>Mark Linimon mentions some of the future plans for FreeBSD&#39;s release engineering and ports</li>
<li>Bapt <a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" rel="nofollow">also has a BSDCan report</a> detailing his work on ports and packages</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20140812064946" rel="nofollow">writes about</a> his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout</li>
<li>Peter Hessler, a latecomer to the hackathon, <a href="http://undeadly.org/cgi?action=article&sid=20140806125308" rel="nofollow">details his experience</a> too, hacking on the installer and built-in upgrade function</li>
<li>Christian Weisgerber <a href="http://undeadly.org/cgi?action=article&sid=20140803122705" rel="nofollow">talks about</a> starting some initial improvements of OpenBSD&#39;s ports infrastructure
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" rel="nofollow">DragonFly BSD 3.8.2 released</a></h3>

<ul>
<li>Although it was already branched, the release media is now available for DragonFly 3.8.2</li>
<li>This is a minor update, mostly to fix the recent OpenSSL vulnerabilities</li>
<li>It also includes some various other small fixes
***</li>
</ul>

<h2>Interview - Eric Le Blan - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a></h2>

<p>Xinuos&#39; recent FreeBSD integration, BSD in the commercial server space</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nginx" rel="nofollow">Building a hardened, feature-rich webserver</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy, FreeBSD version</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">episode 39</a>, we covered a blog post about creating an OpenBSD gateway - partly based on <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a></li>
<li>This is a follow-up post, by the same author, about doing a similar thing with FreeBSD</li>
<li>He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs</li>
<li>The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" rel="nofollow">Don&#39;t encrypt all the things</a></h3>

<ul>
<li>Another couple of interesting blog posts from <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> about encryption</li>
<li>It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good</li>
<li>After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie</li>
<li>He also talks a bit about some PGP weaknesses and a possible future replacement</li>
<li>He also has another, similar post entitled &quot;<a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" rel="nofollow">in defense of opportunistic encryption</a>&quot;
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=270096" rel="nofollow">New automounter lands in FreeBSD</a></h3>

<ul>
<li>The work on the new automounter has just landed in 11-CURRENT</li>
<li>With help from the FreeBSD Foundation, we&#39;ll have a new &quot;autofs&quot; kernel option</li>
<li>Check the SVN viewer online to read over the man pages if you&#39;re not running -CURRENT</li>
<li>You can also read a bit about it in the <a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" rel="nofollow">recent newsletter</a>
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" rel="nofollow">OpenSSH 6.7 CFT</a></h3>

<ul>
<li>It&#39;s been a little while since the last OpenSSH release, but 6.7 is almost ready</li>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> issued a call for testing for the upcoming version, which includes a fair amount of new features</li>
<li>It includes some old code removal, some new features and some internal reworkings - we&#39;ll cover the full list in detail when it&#39;s released</li>
<li>This version also officially supports being built with LibreSSL now</li>
<li>Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20yIP7VXa" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DeeUjAn6" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s216imwEb0" rel="nofollow">Francis writes in</a></li>
<li><a href="http://slexy.org/view/s2oc8vavWe" rel="nofollow">Frank writes in</a></li>
<li><a href="http://slexy.org/view/s20wL61sSr" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>50: VPN, My Dear Watson</title>
  <link>https://www.bsdnow.tv/50</link>
  <guid isPermaLink="false">b0306dc5-ee87-4a03-aeea-9a89b915ff5e</guid>
  <pubDate>Wed, 13 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b0306dc5-ee87-4a03-aeea-9a89b915ff5e.mp3" length="62998996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:27:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" target="_blank" rel="nofollow noopener"&gt;MeetBSD 2014 is approaching&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California&lt;/li&gt;
&lt;li&gt;MeetBSD has an "unconference" format, which means there will be both planned talks and community events&lt;/li&gt;
&lt;li&gt;All the extra details will be on &lt;a href="https://www.meetbsd.com/" target="_blank" rel="nofollow noopener"&gt;their site&lt;/a&gt; soon&lt;/li&gt;
&lt;li&gt;It also has hotels and various other bits of useful information - hopefully with more info on the talks to come&lt;/li&gt;
&lt;li&gt;Of course, EuroBSDCon is coming up before then
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" target="_blank" rel="nofollow noopener"&gt;First experiences with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog post that leads off with "tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven't tried before"&lt;/li&gt;
&lt;li&gt;The author read the famous "&lt;a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" target="_blank" rel="nofollow noopener"&gt;BSD for Linux users&lt;/a&gt;" series (that most of us have surely seen) and decided to give BSD a try&lt;/li&gt;
&lt;li&gt;He details his different OS and distro history, concluding with how he "eventually became annoyed at the poor quality of Linux userland software"&lt;/li&gt;
&lt;li&gt;From there, it talks about how he used the OpenBSD USB image and got a fully-working system&lt;/li&gt;
&lt;li&gt;He especially liked the simplicity of OpenBSD's "hostname.if" system for network configuration&lt;/li&gt;
&lt;li&gt;Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" target="_blank" rel="nofollow noopener"&gt;NetBSD rump kernels on bare metal (and Kansai OSC report)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;When you're developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right&lt;/li&gt;
&lt;li&gt;However, NetBSD's rump kernels - a very unique concept - make this process a lot easier&lt;/li&gt;
&lt;li&gt;This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week&lt;/li&gt;
&lt;li&gt;Also have a look back at &lt;a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" target="_blank" rel="nofollow noopener"&gt;episode 8&lt;/a&gt; for our interview about rump kernels and what exactly they do&lt;/li&gt;
&lt;li&gt;While on the topic of NetBSD, there were also a couple of &lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" target="_blank" rel="nofollow noopener"&gt;very detailed reports&lt;/a&gt; (with lots of pictures!) of the various NetBSD-themed booths at the 2014 &lt;a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" target="_blank" rel="nofollow noopener"&gt;Kansai Open Source Conference&lt;/a&gt; that we wanted to highlight
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.openssl.org/news/secadv_20140806.txt" target="_blank" rel="nofollow noopener"&gt;OpenSSL and LibreSSL updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)&lt;/li&gt;
&lt;li&gt;Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=140752295222929&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;LibreSSL released a new version&lt;/a&gt; to address most of the vulnerabilities, but wasn't affected by some of them&lt;/li&gt;
&lt;li&gt;Whichever version of whatever SSL you use, make sure it's patched for these issues&lt;/li&gt;
&lt;li&gt;DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Robert Watson - &lt;a href="mailto:rwatson@freebsd.org" target="_blank" rel="nofollow noopener"&gt;rwatson@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD architecture, security research techniques, exploit mitigation&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/openvpn" target="_blank" rel="nofollow noopener"&gt;Protecting traffic with a BSD-based VPN&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" target="_blank" rel="nofollow noopener"&gt;A FreeBSD-based CGit server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you use git (like a certain host of this show) then you've probably considered setting up your own server&lt;/li&gt;
&lt;li&gt;This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend&lt;/li&gt;
&lt;li&gt;It even shows you how to set up multiple repos with key-based user separation and other cool things&lt;/li&gt;
&lt;li&gt;The author of the post is also a listener of the show, thanks for sending it in!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" target="_blank" rel="nofollow noopener"&gt;Backup devices for small businesses&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this article, different methods of data storage and backup are compared&lt;/li&gt;
&lt;li&gt;After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer&lt;/li&gt;
&lt;li&gt;He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers&lt;/li&gt;
&lt;li&gt;It also goes over some of the hardware specifics in the FreeNAS Mini
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" target="_blank" rel="nofollow noopener"&gt;A new Xenocara interview&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As a follow up to last week's OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara&lt;/li&gt;
&lt;li&gt;If you're not familiar with Xenocara, it's OpenBSD's version of Xorg with some custom patches&lt;/li&gt;
&lt;li&gt;In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing&lt;/li&gt;
&lt;li&gt;Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it's natural for him to do a lot of the maintainership work there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" target="_blank" rel="nofollow noopener"&gt;Building a high performance FreeBSD samba server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what's the best solution?&lt;/li&gt;
&lt;li&gt;FreeBSD, ZFS and Samba obviously!&lt;/li&gt;
&lt;li&gt;The master image and related files clock in at over 20GB, and will be accessed at the same time by &lt;em&gt;all&lt;/em&gt; of those clients&lt;/li&gt;
&lt;li&gt;This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)&lt;/li&gt;
&lt;li&gt;It doesn't even require the newest or best hardware with the right changes, pretty cool
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" target="_blank" rel="nofollow noopener"&gt;An interesting Reddit thread&lt;/a&gt; (&lt;a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" target="_blank" rel="nofollow noopener"&gt;or two&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21t7L5bqO" target="_blank" rel="nofollow noopener"&gt;PB writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20MFywDqZ" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Td6nq11J" target="_blank" rel="nofollow noopener"&gt;Steve writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s215MlpJYV" target="_blank" rel="nofollow noopener"&gt;Lachlan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2N4JKkoKt" target="_blank" rel="nofollow noopener"&gt;Justin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, vpn, vps, openvpn, tunnel, ssh, security, exploit mitigation, zfs, lzo, tls, xenocara, x11, xorg, freenas, freenas mini, ixsystems, network attached storage, nas, meetbsd, rump kernels, libressl, openssl, kansai</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>49: The PC-BSD Tour</title>
  <link>https://www.bsdnow.tv/49</link>
  <guid isPermaLink="false">ccc19842-ae62-43a9-8f82-44f3f281de42</guid>
  <pubDate>Wed, 06 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ccc19842-ae62-43a9-8f82-44f3f281de42.mp3" length="59661652" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we've got something special for you! We'll be giving you an in-depth look at all of the graphical PC-BSD utilities. That's right, BSD doesn't have to be commandline-only anymore! There's also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:22:51</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week on the show, we've got something special for you! We'll be giving you an in-depth look at all of the graphical PC-BSD utilities. That's right, BSD doesn't have to be commandline-only anymore! There's also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2014jul-newsletter" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation semi-annual newsletter&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation published their semi-annual newsletter, complete with a letter from the president of the foundation&lt;/li&gt;
&lt;li&gt;"In fact after reading [the president's] letter, I was motivated to come up with my own elevator pitch instead of the usual FreeBSD is like Linux, only better!"&lt;/li&gt;
&lt;li&gt;It talks about the &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;FreeBSD journal&lt;/a&gt; as being one of the most exciting things they've launched this year, conferences they funded and various bits of sponsored code that went into -CURRENT&lt;/li&gt;
&lt;li&gt;The full list of funded projects is included, also with details in the financial reports&lt;/li&gt;
&lt;li&gt;There are also a number of conference wrap-ups: NYCBSDCon, BSDCan, AsiaBSDCon and details about the upcoming EuroBSDCon &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, intel nuc, nuc, gui, ssl, tls, libressl, openssl, foundation, bafug, talk, presentation, recording, bhyve, libvirt, rss, netmap, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got something special for you! We&#39;ll be giving you an in-depth look at all of the graphical PC-BSD utilities. That&#39;s right, BSD doesn&#39;t have to be commandline-only anymore! There&#39;s also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014jul-newsletter" rel="nofollow">FreeBSD foundation semi-annual newsletter</a></h3>

<ul>
<li>The FreeBSD foundation published their semi-annual newsletter, complete with a letter from the president of the foundation</li>
<li>&quot;In fact after reading [the president&#39;s] letter, I was motivated to come up with my own elevator pitch instead of the usual FreeBSD is like Linux, only better!&quot;</li>
<li>It talks about the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD journal</a> as being one of the most exciting things they&#39;ve launched this year, conferences they funded and various bits of sponsored code that went into -CURRENT</li>
<li>The full list of funded projects is included, also with details in the financial reports</li>
<li>There are also a number of conference wrap-ups: NYCBSDCon, BSDCan, AsiaBSDCon and details about the upcoming EuroBSDCon</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got something special for you! We&#39;ll be giving you an in-depth look at all of the graphical PC-BSD utilities. That&#39;s right, BSD doesn&#39;t have to be commandline-only anymore! There&#39;s also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014jul-newsletter" rel="nofollow">FreeBSD foundation semi-annual newsletter</a></h3>

<ul>
<li>The FreeBSD foundation published their semi-annual newsletter, complete with a letter from the president of the foundation</li>
<li>&quot;In fact after reading [the president&#39;s] letter, I was motivated to come up with my own elevator pitch instead of the usual FreeBSD is like Linux, only better!&quot;</li>
<li>It talks about the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD journal</a> as being one of the most exciting things they&#39;ve launched this year, conferences they funded and various bits of sponsored code that went into -CURRENT</li>
<li>The full list of funded projects is included, also with details in the financial reports</li>
<li>There are also a number of conference wrap-ups: NYCBSDCon, BSDCan, AsiaBSDCon and details about the upcoming EuroBSDCon</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>44: Base ISO 100</title>
  <link>https://www.bsdnow.tv/44</link>
  <guid isPermaLink="false">cbf5ab1d-2355-4c2c-ade8-0e66250b204e</guid>
  <pubDate>Wed, 02 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf5ab1d-2355-4c2c-ade8-0e66250b204e.mp3" length="75659476" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1377" target="_blank" rel="nofollow noopener"&gt;pfSense 2.1.4 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The &lt;a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" target="_blank" rel="nofollow noopener"&gt;pfSense team&lt;/a&gt; has released 2.1.4, shortly after 2.1.3 - it's mainly a security release&lt;/li&gt;
&lt;li&gt;Included within are eight security fixes, most of which are pfSense-specific&lt;/li&gt;
&lt;li&gt;OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)&lt;/li&gt;
&lt;li&gt;It also includes a large number of various other bug fixes&lt;/li&gt;
&lt;li&gt;Update all your routers!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" target="_blank" rel="nofollow noopener"&gt;DragonflyBSD's pf gets SMP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While we're on the topic of pf...&lt;/li&gt;
&lt;li&gt;Dragonfly patches their old[er than even FreeBSD's] pf to support multithreading in many areas&lt;/li&gt;
&lt;li&gt;Stemming from &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" target="_blank" rel="nofollow noopener"&gt;a user's complaint&lt;/a&gt;, Matthew Dillon did his own work on pf to make it SMP-aware&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" target="_blank" rel="nofollow noopener"&gt;Altering your configuration&lt;/a&gt;'s ruleset can also help speed things up, he found&lt;/li&gt;
&lt;li&gt;When will OpenBSD, the source of pf, finally do the same?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ianix.com/pub/chacha-deployment.html" target="_blank" rel="nofollow noopener"&gt;ChaCha usage and deployment&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A while back, &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;we talked to djm&lt;/a&gt; about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5&lt;/li&gt;
&lt;li&gt;This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20&lt;/li&gt;
&lt;li&gt;OpenSSH offers it as a stream cipher now, OpenBSD uses it for it's random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it&lt;/li&gt;
&lt;li&gt;Both Google's fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not&lt;/li&gt;
&lt;li&gt;Unfortunately, this article has one mistake: FreeBSD &lt;a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" target="_blank" rel="nofollow noopener"&gt;does not use it&lt;/a&gt; - they &lt;em&gt;still&lt;/em&gt; use the broken RC4 algorithm
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" target="_blank" rel="nofollow noopener"&gt;BSDMag June 2014 issue&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The monthly online BSD magazine releases their newest issue&lt;/li&gt;
&lt;li&gt;This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, "saving time and headaches using the robot framework for testing," an interview and an article about the increasing number of security vulnerabilities&lt;/li&gt;
&lt;li&gt;The free pdf file is available for download as always
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Craig Rodrigues - &lt;a href="mailto:rodrigc@freebsd.org" target="_blank" rel="nofollow noopener"&gt;rodrigc@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD's &lt;a href="https://wiki.freebsd.org/Jenkins" target="_blank" rel="nofollow noopener"&gt;continuous&lt;/a&gt; &lt;a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" target="_blank" rel="nofollow noopener"&gt;testing&lt;/a&gt; &lt;a href="https://jenkins.freebsd.org/jenkins/" target="_blank" rel="nofollow noopener"&gt;infrastructure&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/stable-iso" target="_blank" rel="nofollow noopener"&gt;Creating pre-patched OpenBSD ISOs&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" target="_blank" rel="nofollow noopener"&gt;Preauthenticated decryption considered harmful&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Responding to &lt;a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" target="_blank" rel="nofollow noopener"&gt;a post&lt;/a&gt; from Adam Langley, &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; talks a little more about how signify and pkg_add handle signatures&lt;/li&gt;
&lt;li&gt;In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns&lt;/li&gt;
&lt;li&gt;With signify, now everything is fully downloaded and verified before tar is even invoked&lt;/li&gt;
&lt;li&gt;The pkg_add utility works a little bit differently, but it's also been improved in this area - details in the post&lt;/li&gt;
&lt;li&gt;Be sure to also read the original post from Adam, lots of good information
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 9.3-RC2 is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As the -RELEASE inches closer, release candidate 2 is out and ready for testing&lt;/li&gt;
&lt;li&gt;Since the last one, it's got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things&lt;/li&gt;
&lt;li&gt;The updated bsdconfig will use pkgng style packages now too&lt;/li&gt;
&lt;li&gt;A lesser known fact: there are also premade virtual machine images you can use too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://saveosx.org/pkgsrcCon/" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon 2014 wrap-up&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In what may be the first real pkgsrcCon article we've ever had!&lt;/li&gt;
&lt;li&gt;Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event&lt;/li&gt;
&lt;li&gt;Unfortunately no recordings to be found...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" target="_blank" rel="nofollow noopener"&gt;PostgreSQL FreeBSD performance and scalability&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales&lt;/li&gt;
&lt;li&gt;On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings&lt;/li&gt;
&lt;li&gt;Lots of technical details if you're interested in getting the best performance out of your hardware&lt;/li&gt;
&lt;li&gt;It also includes specific kernel options he used and the rest of the configuration&lt;/li&gt;
&lt;li&gt;If you don't want to open the pdf file, you can &lt;a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" target="_blank" rel="nofollow noopener"&gt;use this link&lt;/a&gt; too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s24pFjUPe4" target="_blank" rel="nofollow noopener"&gt;James writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21OogIgTu" target="_blank" rel="nofollow noopener"&gt;Klemen writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21rLcemNN" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s203Qsx6CZ" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2eBj0FfSL" target="_blank" rel="nofollow noopener"&gt;Adam writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, iso, patch, stable, cd, dvd, cdr, pre-applied, applied, horrible puns, jenkins, testing, kyua, ixsystems, tarsnap, pfsense, freenas, tarsnap, ixsystems, pfsense, freenas, bsdmag, magazine, ssl, tls, hardening, hardened, security, pf, smp, multithreading, firewall, scalability, postgresql, mysql, sql, database, performance, openssl, libressl, boringssl, google, chacha, chacha20, salsa20, encryption, pkgsrc, pkgsrccon, signify, pkg_add, authenticated encryption, decryption, gcm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>33: Certified Package Delivery</title>
  <link>https://www.bsdnow.tv/33</link>
  <guid isPermaLink="false">f0c15113-8ade-464b-a89f-3398734256dc</guid>
  <pubDate>Wed, 16 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f0c15113-8ade-464b-a89f-3398734256dc.mp3" length="57837748" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2014/schedule/" target="_blank" rel="nofollow noopener"&gt;BSDCan schedule, speakers and talks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's BSDCan will kick off on May 14th in Ottawa&lt;/li&gt;
&lt;li&gt;The &lt;a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" target="_blank" rel="nofollow noopener"&gt;list of speakers&lt;/a&gt; is also out&lt;/li&gt;
&lt;li&gt;And finally &lt;a href="https://www.bsdcan.org/2014/schedule/events.en.html" target="_blank" rel="nofollow noopener"&gt;the talks&lt;/a&gt; everyone's looking forward to&lt;/li&gt;
&lt;li&gt;Lots of great tutorials and talks, spanning a wide range of topics of interest&lt;/li&gt;
&lt;li&gt;Be sure to come by so you can and meet Allan and Kris in person &lt;a href="https://twitter.com/bsdcan/status/454990067552247808" target="_blank" rel="nofollow noopener"&gt;and get BSDCan shirts&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=4bPduH6O7lI" target="_blank" rel="nofollow noopener"&gt;NYCBSDCon talks uploaded&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon&lt;/li&gt;
&lt;li&gt;Jeff Rizzo's talk, "Releasing NetBSD: So Many Targets, So Little Time"&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" target="_blank" rel="nofollow noopener"&gt;Dru Lavigne's talk&lt;/a&gt;, "ZFS Management Tools in FreeNAS and PC-BSD"&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=FL5U4wr86L4" target="_blank" rel="nofollow noopener"&gt;Scott Long's talk&lt;/a&gt;, "Serving one third of the Internet via FreeBSD"&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=buo5JlMnGPI" target="_blank" rel="nofollow noopener"&gt;Michael W. Lucas' talk&lt;/a&gt;, "BSD Breaking Barriers"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal, issue 2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The bi-monthly FreeBSD journal's second issue is out&lt;/li&gt;
&lt;li&gt;Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates&lt;/li&gt;
&lt;li&gt;In less than two months, they've already gotten over 1000 subscribers! It's available on Google Play, iTunes, Amazon, etc&lt;/li&gt;
&lt;li&gt;"We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD"&lt;/li&gt;
&lt;li&gt;Check &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;our interview with GNN&lt;/a&gt; for more information about the journal
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsd.slashdot.org/story/200567" target="_blank" rel="nofollow noopener"&gt;OpenSSL, more like OpenSS-Hell&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy&lt;/li&gt;
&lt;li&gt;There's been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so&lt;/li&gt;
&lt;li&gt;We finally have &lt;a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" target="_blank" rel="nofollow noopener"&gt;a timeline of events&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Reactions from &lt;a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" target="_blank" rel="nofollow noopener"&gt;ISC&lt;/a&gt;, &lt;a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" target="_blank" rel="nofollow noopener"&gt;PCBSD&lt;/a&gt;, &lt;a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;, the &lt;a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" target="_blank" rel="nofollow noopener"&gt;Tor&lt;/a&gt; &lt;a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" target="_blank" rel="nofollow noopener"&gt;project&lt;/a&gt;, &lt;a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD&lt;/a&gt;, &lt;a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" target="_blank" rel="nofollow noopener"&gt;NetBSD&lt;/a&gt;, &lt;a href="http://seclists.org/oss-sec/2014/q2/index.html" target="_blank" rel="nofollow noopener"&gt;oss-sec&lt;/a&gt;, &lt;a href="https://queue.acm.org/detail.cfm?id=2602816" target="_blank" rel="nofollow noopener"&gt;PHK&lt;/a&gt;, &lt;a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" target="_blank" rel="nofollow noopener"&gt;Varnish&lt;/a&gt; and &lt;a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" target="_blank" rel="nofollow noopener"&gt;Akamai&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" target="_blank" rel="nofollow noopener"&gt;pfSense&lt;/a&gt; released &lt;a href="https://blog.pfsense.org/?p=1253" target="_blank" rel="nofollow noopener"&gt;a new version to fix it&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OpenBSD &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139715336230455&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;disabled heartbeat entirely&lt;/a&gt; and is very &lt;a href="https://news.ycombinator.com/item?id=7568921" target="_blank" rel="nofollow noopener"&gt;unforgiving of the IETF&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; has two &lt;a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" target="_blank" rel="nofollow noopener"&gt;good&lt;/a&gt; &lt;a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" target="_blank" rel="nofollow noopener"&gt;write-ups&lt;/a&gt; about the issue and how horrible the OpenSSL codebase is&lt;/li&gt;
&lt;li&gt;A nice quote from one of the OpenBSD lists: "Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL's bug tracker is only used to park bugs, not fix them"&lt;/li&gt;
&lt;li&gt;Sounds like &lt;a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" target="_blank" rel="nofollow noopener"&gt;someone else&lt;/a&gt; was having fun with the bug for a while too&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;There's also another OpenSSL bug&lt;/strong&gt; that &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139732441810737&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD patched&lt;/a&gt; - it allows an attacker to &lt;strong&gt;inject data from one connection into another&lt;/strong&gt; &lt;/li&gt;
&lt;li&gt;OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we're &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140415093252" target="_blank" rel="nofollow noopener"&gt;seeing a fork&lt;/a&gt; in real time
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jim Brown - &lt;a href="mailto:info@bsdcertification.org" target="_blank" rel="nofollow noopener"&gt;info@bsdcertification.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The &lt;a href="http://bsdcertification.org/" target="_blank" rel="nofollow noopener"&gt;BSD Certification&lt;/a&gt; exams&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/dpb" target="_blank" rel="nofollow noopener"&gt;Building OpenBSD binary packages in bulk&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/aperezdc/signify" target="_blank" rel="nofollow noopener"&gt;Portable signify&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back in &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;episode 23&lt;/a&gt; we talked with Ted Unangst about the new "signify" tool in OpenBSD&lt;/li&gt;
&lt;li&gt;Now there's a (completely unofficial) portable version of it on github&lt;/li&gt;
&lt;li&gt;If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it&lt;/li&gt;
&lt;li&gt;Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" target="_blank" rel="nofollow noopener"&gt;Foundation goals and updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenBSD foundation has reached their 2014 goal of $150,000&lt;/li&gt;
&lt;li&gt;You can check &lt;a href="http://www.openbsdfoundation.org/activities.html" target="_blank" rel="nofollow noopener"&gt;their activities and goals&lt;/a&gt; to see where the money is going&lt;/li&gt;
&lt;li&gt;Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data&lt;/li&gt;
&lt;li&gt;The FreeBSD foundation has kicked off their &lt;a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" target="_blank" rel="nofollow noopener"&gt;spring fundraising&lt;/a&gt; campaign&lt;/li&gt;
&lt;li&gt;There's also a list of their activities and goals available to read through&lt;/li&gt;
&lt;li&gt;Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New PBI runtime that fixes stability issues and decreases load times&lt;/li&gt;
&lt;li&gt;"Update Center" is getting a lot of development and improvements&lt;/li&gt;
&lt;li&gt;Lots of misc. bug fixes and updates
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" target="_blank" rel="nofollow noopener"&gt;There's a reddit thread&lt;/a&gt; we wanted to highlight - a user wants to show his friend BSD and why it's great&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20Tso9a6v" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21DfdV9yt" target="_blank" rel="nofollow noopener"&gt;Sha'ul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2di8XRt73" target="_blank" rel="nofollow noopener"&gt;iGibbs writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20m2g8UgV" target="_blank" rel="nofollow noopener"&gt;Matt writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dpb, distributed ports builder, marc espie, poudriere, package builds, jim brown, bsdcertification, bsd certification, exam, test, openssl, heartbleed, exploit, ssl, tls, heartbeat, openssh, theo de raadt, hole, 0day, zero day, bsdcan, nycbsdcon, presentations, talks, conference, recording, netflix, tarsnap, mitigation, ixsystems, foundation, journal, cve</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
