<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 19 Apr 2026 10:44:13 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Ufs”</title>
    <link>https://www.bsdnow.tv/tags/ufs</link>
    <pubDate>Thu, 27 Mar 2025 09:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>604: Future looks back</title>
  <link>https://www.bsdnow.tv/604</link>
  <guid isPermaLink="false">a942703c-56b7-4c72-a047-bb79bc5d23ff</guid>
  <pubDate>Thu, 27 Mar 2025 09:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a942703c-56b7-4c72-a047-bb79bc5d23ff.mp3" length="47195136" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>The Future Looking Back At Us: Joanne McNeil on Cyberpunk, Why ZFS reports less available space, We are destroying software, FreeBSD 13.5 Overcomes UFS Y2038 Problem To Push It Out To Year 2106, 1972 UNIX V2 "Beta" Resurrected, Some thoughts on why 'inetd activation' didn't catch on, If you believe in “Artificial Intelligence”, take five minutes to ask it about stuff you know well, and more</itunes:subtitle>
  <itunes:duration>49:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>The Future Looking Back At Us: Joanne McNeil on Cyberpunk, Why ZFS reports less available space, We are destroying software, FreeBSD 13.5 Overcomes UFS Y2038 Problem To Push It Out To Year 2106, 1972 UNIX V2 "Beta" Resurrected, Some thoughts on why 'inetd activation' didn't catch on, If you believe in “Artificial Intelligence”, take five minutes to ask it about stuff you know well, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
The Future Looking Back At Us: Joanne McNeil on Cyberpunk (https://filmmakermagazine.com/127295-joanne-mcneil-cyberpunk/)
Why ZFS reports less available space space accounting explained/ (https://klarasystems.com/articles/why-zfs-reports-less-available-space-space-accounting-explained/?utm_source=BSD%20Now&amp;amp;utm_medium=Podcast)
We are destroying software (https://antirez.com/news/145)
News Roundup
FreeBSD 13.5 Overcomes UFS Y2038 Problem To Push It Out To Year 2106 (https://www.phoronix.com/news/FreeBSD-13.5-Beta-2)
TUHS: 1972 UNIX V2 "Beta" Resurrected (https://www.tuhs.org/pipermail/tuhs/2025-February/031420.html)
Some thoughts on why 'inetd activation' didn't catch on (https://utcc.utoronto.ca/~cks/space/blog/sysadmin/InetdActivationWhyNot)
If you believe in “Artificial Intelligence”, take five minutes to ask it about stuff you know well (https://svpow.com/2025/02/14/if-you-believe-in-artificial-intelligence-take-five-minutes-to-ask-it-about-stuff-you-know-well/)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Nelson - gcc puzzlement (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/604/feedback/Nelson%20-%20gcc%20puzzlement.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, future, cyberpunk, disk space, storage space, pool space, destroying software, UFS, Y2038, year 2106, 172 UNIX beta, resurrection, inetd activation, ai, Artificial Intelligence</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The Future Looking Back At Us: Joanne McNeil on Cyberpunk, Why ZFS reports less available space, We are destroying software, FreeBSD 13.5 Overcomes UFS Y2038 Problem To Push It Out To Year 2106, 1972 UNIX V2 &quot;Beta&quot; Resurrected, Some thoughts on why &#39;inetd activation&#39; didn&#39;t catch on, If you believe in “Artificial Intelligence”, take five minutes to ask it about stuff you know well, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://filmmakermagazine.com/127295-joanne-mcneil-cyberpunk/" rel="nofollow">The Future Looking Back At Us: Joanne McNeil on Cyberpunk</a></p>

<hr>

<p><a href="https://klarasystems.com/articles/why-zfs-reports-less-available-space-space-accounting-explained/?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">Why ZFS reports less available space space accounting explained/</a></p>

<hr>

<p><a href="https://antirez.com/news/145" rel="nofollow">We are destroying software</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.phoronix.com/news/FreeBSD-13.5-Beta-2" rel="nofollow">FreeBSD 13.5 Overcomes UFS Y2038 Problem To Push It Out To Year 2106</a></p>

<hr>

<p><a href="https://www.tuhs.org/pipermail/tuhs/2025-February/031420.html" rel="nofollow">TUHS: 1972 UNIX V2 &quot;Beta&quot; Resurrected</a></p>

<hr>

<p><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/sysadmin/InetdActivationWhyNot" rel="nofollow">Some thoughts on why &#39;inetd activation&#39; didn&#39;t catch on</a></p>

<hr>

<p><a href="https://svpow.com/2025/02/14/if-you-believe-in-artificial-intelligence-take-five-minutes-to-ask-it-about-stuff-you-know-well/" rel="nofollow">If you believe in “Artificial Intelligence”, take five minutes to ask it about stuff you know well</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/604/feedback/Nelson%20-%20gcc%20puzzlement.md" rel="nofollow">Nelson - gcc puzzlement</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The Future Looking Back At Us: Joanne McNeil on Cyberpunk, Why ZFS reports less available space, We are destroying software, FreeBSD 13.5 Overcomes UFS Y2038 Problem To Push It Out To Year 2106, 1972 UNIX V2 &quot;Beta&quot; Resurrected, Some thoughts on why &#39;inetd activation&#39; didn&#39;t catch on, If you believe in “Artificial Intelligence”, take five minutes to ask it about stuff you know well, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://filmmakermagazine.com/127295-joanne-mcneil-cyberpunk/" rel="nofollow">The Future Looking Back At Us: Joanne McNeil on Cyberpunk</a></p>

<hr>

<p><a href="https://klarasystems.com/articles/why-zfs-reports-less-available-space-space-accounting-explained/?utm_source=BSD%20Now&utm_medium=Podcast" rel="nofollow">Why ZFS reports less available space space accounting explained/</a></p>

<hr>

<p><a href="https://antirez.com/news/145" rel="nofollow">We are destroying software</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://www.phoronix.com/news/FreeBSD-13.5-Beta-2" rel="nofollow">FreeBSD 13.5 Overcomes UFS Y2038 Problem To Push It Out To Year 2106</a></p>

<hr>

<p><a href="https://www.tuhs.org/pipermail/tuhs/2025-February/031420.html" rel="nofollow">TUHS: 1972 UNIX V2 &quot;Beta&quot; Resurrected</a></p>

<hr>

<p><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/sysadmin/InetdActivationWhyNot" rel="nofollow">Some thoughts on why &#39;inetd activation&#39; didn&#39;t catch on</a></p>

<hr>

<p><a href="https://svpow.com/2025/02/14/if-you-believe-in-artificial-intelligence-take-five-minutes-to-ask-it-about-stuff-you-know-well/" rel="nofollow">If you believe in “Artificial Intelligence”, take five minutes to ask it about stuff you know well</a></p>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/604/feedback/Nelson%20-%20gcc%20puzzlement.md" rel="nofollow">Nelson - gcc puzzlement</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>566: Open Source Excellence</title>
  <link>https://www.bsdnow.tv/566</link>
  <guid isPermaLink="false">6d99d221-b4fa-4373-b5df-1a36548bfd9e</guid>
  <pubDate>Thu, 04 Jul 2024 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6d99d221-b4fa-4373-b5df-1a36548bfd9e.mp3" length="80745408" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>A Journey Through 31 Years of Open Source Excellence, Proxmox vs FreeBSD: Which Virtualization Host Performs Better?, Upstreaming FreeBSD Code to the Linux Vector Packet Processor Project, FreeBSD Tips and Tricks: Creating Snapshots With UFS, My Concern With Rust, or a Case for the BSD's, and more</itunes:subtitle>
  <itunes:duration>56:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>A Journey Through 31 Years of Open Source Excellence, Proxmox vs FreeBSD: Which Virtualization Host Performs Better?, Upstreaming FreeBSD Code to the Linux Vector Packet Processor Project, FreeBSD Tips and Tricks: Creating Snapshots With UFS, My Concern With Rust, or a Case for the BSD's, and more
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow)
Headlines
Celebrating FreeBSD Day: A Journey Through 31 Years of Open Source Excellence (https://hamradio.my/2024/06/celebrating-freebsd-day-a-journey-through-31-years-of-open-source-excellence/)
Proxmox vs FreeBSD: Which Virtualization Host Performs Better? (https://it-notes.dragas.net/2024/06/10/proxmox-vs-freebsd-which-virtualization-host-performs-better/)
News Roundup
Upstreaming FreeBSD Code to the Linux Vector Packet Processor Project (https://thenewstack.io/upstreaming-the-linux-vector-packet-processor-vpp-to-freebsd/)
FreeBSD Tips and Tricks: Creating Snapshots With UFS (https://it-notes.dragas.net/2024/06/04/freebsd-tips-and-tricks-creating-snapshots-with-ufs/)
My Concern With Rust, or a Case for the BSD's (https://superserverhero.com/reports/my-concern-with-rust)
Beastie Bits
Install FreeBSD 14.1 and KDE Plasma 6 in QEMU VM tutorial - June 2024 - 2da0c933 (https://www.youtube.com/watch?v=mmjYuDjWXto&amp;amp;t=1s)
Let's Try BSD, Part 1 of 7: Introduction (https://lowendbox.com/blog/lets-try-bsd-part-1-of-7-introduction-freebsd-openbsd-netbsd-dragonflybsd/)
OpenBSD, the computer appliance maker's secret weapon (https://hiandrewquinn.github.io/til-site/posts/openbsd-the-computer-appliance-maker-s-secret-weapon/)
FreeBSD Day: Interview with Deb Goodkin (https://youtu.be/xuYBsRAMvA8)
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
Johnny - Thanks (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/566/feedback/johnny%20-%20thanks.md)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, hardenedbsd, tutorial, howto, guide, bsd, operating system, os, open source, foss, shell, cli, unix, tools, utility, berkeley, software, distribution, development, code, programming, release, zfs, zpool, dataset, filesystem, storage, ports, packages, jails, interview, Celebrating, freebsd day, open source Excellence, proxmox, Virtualization, upstream, linux vector packet processor, tips and tricks, ufs, snapshots, rust, concern, case for the BSDs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A Journey Through 31 Years of Open Source Excellence, Proxmox vs FreeBSD: Which Virtualization Host Performs Better?, Upstreaming FreeBSD Code to the Linux Vector Packet Processor Project, FreeBSD Tips and Tricks: Creating Snapshots With UFS, My Concern With Rust, or a Case for the BSD&#39;s, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://hamradio.my/2024/06/celebrating-freebsd-day-a-journey-through-31-years-of-open-source-excellence/" rel="nofollow">Celebrating FreeBSD Day: A Journey Through 31 Years of Open Source Excellence</a></p>

<hr>

<p><a href="https://it-notes.dragas.net/2024/06/10/proxmox-vs-freebsd-which-virtualization-host-performs-better/" rel="nofollow">Proxmox vs FreeBSD: Which Virtualization Host Performs Better?</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://thenewstack.io/upstreaming-the-linux-vector-packet-processor-vpp-to-freebsd/" rel="nofollow">Upstreaming FreeBSD Code to the Linux Vector Packet Processor Project</a></p>

<hr>

<p><a href="https://it-notes.dragas.net/2024/06/04/freebsd-tips-and-tricks-creating-snapshots-with-ufs/" rel="nofollow">FreeBSD Tips and Tricks: Creating Snapshots With UFS</a></p>

<hr>

<p><a href="https://superserverhero.com/reports/my-concern-with-rust" rel="nofollow">My Concern With Rust, or a Case for the BSD&#39;s</a></p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.youtube.com/watch?v=mmjYuDjWXto&t=1s" rel="nofollow">Install FreeBSD 14.1 and KDE Plasma 6 in QEMU VM tutorial - June 2024 - 2da0c933</a></p></li>
<li><p><a href="https://lowendbox.com/blog/lets-try-bsd-part-1-of-7-introduction-freebsd-openbsd-netbsd-dragonflybsd/" rel="nofollow">Let&#39;s Try BSD, Part 1 of 7: Introduction</a></p></li>
<li><p><a href="https://hiandrewquinn.github.io/til-site/posts/openbsd-the-computer-appliance-maker-s-secret-weapon/" rel="nofollow">OpenBSD, the computer appliance maker&#39;s secret weapon</a></p></li>
<li><p><a href="https://youtu.be/xuYBsRAMvA8" rel="nofollow">FreeBSD Day: Interview with Deb Goodkin</a></p></li>
</ul>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/566/feedback/johnny%20-%20thanks.md" rel="nofollow">Johnny - Thanks</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A Journey Through 31 Years of Open Source Excellence, Proxmox vs FreeBSD: Which Virtualization Host Performs Better?, Upstreaming FreeBSD Code to the Linux Vector Packet Processor Project, FreeBSD Tips and Tricks: Creating Snapshots With UFS, My Concern With Rust, or a Case for the BSD&#39;s, and more</p>

<p><strong><em>NOTES</em></strong></p>

<p>This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a> and the <a href="https://www.patreon.com/bsdnow" rel="nofollow">BSDNow Patreon</a></p>

<h2>Headlines</h2>

<p><a href="https://hamradio.my/2024/06/celebrating-freebsd-day-a-journey-through-31-years-of-open-source-excellence/" rel="nofollow">Celebrating FreeBSD Day: A Journey Through 31 Years of Open Source Excellence</a></p>

<hr>

<p><a href="https://it-notes.dragas.net/2024/06/10/proxmox-vs-freebsd-which-virtualization-host-performs-better/" rel="nofollow">Proxmox vs FreeBSD: Which Virtualization Host Performs Better?</a></p>

<hr>

<h2>News Roundup</h2>

<p><a href="https://thenewstack.io/upstreaming-the-linux-vector-packet-processor-vpp-to-freebsd/" rel="nofollow">Upstreaming FreeBSD Code to the Linux Vector Packet Processor Project</a></p>

<hr>

<p><a href="https://it-notes.dragas.net/2024/06/04/freebsd-tips-and-tricks-creating-snapshots-with-ufs/" rel="nofollow">FreeBSD Tips and Tricks: Creating Snapshots With UFS</a></p>

<hr>

<p><a href="https://superserverhero.com/reports/my-concern-with-rust" rel="nofollow">My Concern With Rust, or a Case for the BSD&#39;s</a></p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.youtube.com/watch?v=mmjYuDjWXto&t=1s" rel="nofollow">Install FreeBSD 14.1 and KDE Plasma 6 in QEMU VM tutorial - June 2024 - 2da0c933</a></p></li>
<li><p><a href="https://lowendbox.com/blog/lets-try-bsd-part-1-of-7-introduction-freebsd-openbsd-netbsd-dragonflybsd/" rel="nofollow">Let&#39;s Try BSD, Part 1 of 7: Introduction</a></p></li>
<li><p><a href="https://hiandrewquinn.github.io/til-site/posts/openbsd-the-computer-appliance-maker-s-secret-weapon/" rel="nofollow">OpenBSD, the computer appliance maker&#39;s secret weapon</a></p></li>
<li><p><a href="https://youtu.be/xuYBsRAMvA8" rel="nofollow">FreeBSD Day: Interview with Deb Goodkin</a></p></li>
</ul>

<hr>

<h2>Tarsnap</h2>

<p>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/566/feedback/johnny%20-%20thanks.md" rel="nofollow">Johnny - Thanks</a></li>
</ul>

<hr>

<ul>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
<li><p>Join us and other BSD Fans in our <a href="https://t.me/bsdnow" rel="nofollow">BSD Now Telegram channel</a></p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>380: Early ZFS-mas</title>
  <link>https://www.bsdnow.tv/380</link>
  <guid isPermaLink="false">ee24cdc7-bb47-400d-8be0-968efefa4e15</guid>
  <pubDate>Thu, 10 Dec 2020 06:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ee24cdc7-bb47-400d-8be0-968efefa4e15.mp3" length="43761336" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We read FreeBSD’s 3rd quarter status report, OpenZFS 2.0, adding check-hash checks in UFS filesystem, OpenSSL 3.0 /dev/crypto issues on FreeBSD, and more.</itunes:subtitle>
  <itunes:duration>43:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>We read FreeBSD’s 3rd quarter status report, OpenZFS 2.0, adding check-hash checks in UFS filesystem, OpenSSL 3.0 /dev/crypto issues on FreeBSD, and more.
NOTES
This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow)
Headlines
3rd Quarter FreeBSD Report (https://www.freebsd.org/news/status/report-2020-07-2020-09.html)
The call for submissions for the 4th Quarter is out (https://lists.freebsd.org/pipermail/freebsd-quarterly-calls/2020/000007.html)
OpenZFS 2.0 (https://arstechnica.com/gadgets/2020/12/openzfs-2-0-release-unifies-linux-bsd-and-adds-tons-of-new-features/)
This Monday, ZFS on Linux lead developer Brian Behlendorf published the OpenZFS 2.0.0 release to GitHub. Along with quite a lot of new features, the announcement brings an end to the former distinction between "ZFS on Linux" and ZFS elsewhere (for example, on FreeBSD). This move has been a long time coming—the FreeBSD community laid out its side of the roadmap two years ago—but this is the release that makes it official.
News Roundup
Revision 367034 (https://svnweb.freebsd.org/changeset/base/367034)
Various new check-hash checks have been added to the UFS filesystem
over various major releases. Superblock check hashes were added for
the 12 release and cylinder-group and inode check hashes will appear
in the 13 release.
OpenSSL 3.0 /dev/crypto issues on FreeBSD (https://rubenerd.com/openssl-3-written-to-break-on-freebsd/)
So, just learned that the OpenSSL devs decided to break /dev/crypto on FreeBSD.
OS108-9.1 XFCE amd64 released (https://forums.os108.org/d/32-os108-91-xfce-amd64-released)
OS108 is a fast, open and Secure Desktop Operating System built on top of NetBSD.
&amp;gt; Installing OS108 to your hard drive is done by using the sysinst utility, the process is basically the same as installing NetBSD itself.  Please refer to the NetBSD guide for installation details, http://www.netbsd.org/docs/guide/en/part-install.html
Installation Video (https://youtu.be/cgAeY21gXR4)
***
Beastie Bits
OpenBGPD 6.8p1 portable: released Nov 5th, 2020 (http://www.openbgpd.org/ftp.html)
IRC Awk Bot (http://kflu.github.io/2020/08/15/2020-08-15-awk-irc-bot/)
Docker on FreeBSD using bhyve and sshfs (https://www.youtube.com/watch?v=ZVkJZJEdZNY)
The UNIX Command Language (1976) (https://github.com/susam/tucl)
***
Tarsnap
This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.
Feedback/Questions
santi - openrc (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/santi%20-%20openrc.md)
trond - python2 and mailman (https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/trond%20-%20python2%20and%20mailmane%20and%20sshfs)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, status, report, third quarter 2020, openzfs 2.0, check hash, ufs, openssl, os108-9.1, xfce</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We read FreeBSD’s 3rd quarter status report, OpenZFS 2.0, adding check-hash checks in UFS filesystem, OpenSSL 3.0 /dev/crypto issues on FreeBSD, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2020-07-2020-09.html" rel="nofollow">3rd Quarter FreeBSD Report</a></h3>

<blockquote>
<p><a href="https://lists.freebsd.org/pipermail/freebsd-quarterly-calls/2020/000007.html" rel="nofollow">The call for submissions for the 4th Quarter is out</a></p>

<hr>
</blockquote>

<h3><a href="https://arstechnica.com/gadgets/2020/12/openzfs-2-0-release-unifies-linux-bsd-and-adds-tons-of-new-features/" rel="nofollow">OpenZFS 2.0</a></h3>

<blockquote>
<p>This Monday, ZFS on Linux lead developer Brian Behlendorf published the OpenZFS 2.0.0 release to GitHub. Along with quite a lot of new features, the announcement brings an end to the former distinction between &quot;ZFS on Linux&quot; and ZFS elsewhere (for example, on FreeBSD). This move has been a long time coming—the FreeBSD community laid out its side of the roadmap two years ago—but this is the release that makes it official.</p>

<hr>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/changeset/base/367034" rel="nofollow">Revision 367034</a></h3>

<blockquote>
<p>Various new check-hash checks have been added to the UFS filesystem<br>
over various major releases. Superblock check hashes were added for<br>
the 12 release and cylinder-group and inode check hashes will appear<br>
in the 13 release.</p>

<hr>

<h3><a href="https://rubenerd.com/openssl-3-written-to-break-on-freebsd/" rel="nofollow">OpenSSL 3.0 /dev/crypto issues on FreeBSD</a></h3>

<p>So, just learned that the OpenSSL devs decided to break /dev/crypto on FreeBSD.</p>

<hr>
</blockquote>

<h3><a href="https://forums.os108.org/d/32-os108-91-xfce-amd64-released" rel="nofollow">OS108-9.1 XFCE amd64 released</a></h3>

<ul>
<li>OS108 is a fast, open and Secure Desktop Operating System built on top of NetBSD.
&gt; Installing OS108 to your hard drive is done by using the sysinst utility, the process is basically the same as installing NetBSD itself.  Please refer to the NetBSD guide for installation details, <a href="http://www.netbsd.org/docs/guide/en/part-install.html" rel="nofollow">http://www.netbsd.org/docs/guide/en/part-install.html</a></li>
<li><a href="https://youtu.be/cgAeY21gXR4" rel="nofollow">Installation Video</a>
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://www.openbgpd.org/ftp.html" rel="nofollow">OpenBGPD 6.8p1 portable: released Nov 5th, 2020</a></li>
<li><a href="http://kflu.github.io/2020/08/15/2020-08-15-awk-irc-bot/" rel="nofollow">IRC Awk Bot</a></li>
<li><a href="https://www.youtube.com/watch?v=ZVkJZJEdZNY" rel="nofollow">Docker on FreeBSD using bhyve and sshfs</a></li>
<li><a href="https://github.com/susam/tucl" rel="nofollow">The UNIX Command Language (1976)</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/santi%20-%20openrc.md" rel="nofollow">santi - openrc</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/trond%20-%20python2%20and%20mailmane%20and%20sshfs" rel="nofollow">trond - python2 and mailman</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We read FreeBSD’s 3rd quarter status report, OpenZFS 2.0, adding check-hash checks in UFS filesystem, OpenSSL 3.0 /dev/crypto issues on FreeBSD, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2020-07-2020-09.html" rel="nofollow">3rd Quarter FreeBSD Report</a></h3>

<blockquote>
<p><a href="https://lists.freebsd.org/pipermail/freebsd-quarterly-calls/2020/000007.html" rel="nofollow">The call for submissions for the 4th Quarter is out</a></p>

<hr>
</blockquote>

<h3><a href="https://arstechnica.com/gadgets/2020/12/openzfs-2-0-release-unifies-linux-bsd-and-adds-tons-of-new-features/" rel="nofollow">OpenZFS 2.0</a></h3>

<blockquote>
<p>This Monday, ZFS on Linux lead developer Brian Behlendorf published the OpenZFS 2.0.0 release to GitHub. Along with quite a lot of new features, the announcement brings an end to the former distinction between &quot;ZFS on Linux&quot; and ZFS elsewhere (for example, on FreeBSD). This move has been a long time coming—the FreeBSD community laid out its side of the roadmap two years ago—but this is the release that makes it official.</p>

<hr>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/changeset/base/367034" rel="nofollow">Revision 367034</a></h3>

<blockquote>
<p>Various new check-hash checks have been added to the UFS filesystem<br>
over various major releases. Superblock check hashes were added for<br>
the 12 release and cylinder-group and inode check hashes will appear<br>
in the 13 release.</p>

<hr>

<h3><a href="https://rubenerd.com/openssl-3-written-to-break-on-freebsd/" rel="nofollow">OpenSSL 3.0 /dev/crypto issues on FreeBSD</a></h3>

<p>So, just learned that the OpenSSL devs decided to break /dev/crypto on FreeBSD.</p>

<hr>
</blockquote>

<h3><a href="https://forums.os108.org/d/32-os108-91-xfce-amd64-released" rel="nofollow">OS108-9.1 XFCE amd64 released</a></h3>

<ul>
<li>OS108 is a fast, open and Secure Desktop Operating System built on top of NetBSD.
&gt; Installing OS108 to your hard drive is done by using the sysinst utility, the process is basically the same as installing NetBSD itself.  Please refer to the NetBSD guide for installation details, <a href="http://www.netbsd.org/docs/guide/en/part-install.html" rel="nofollow">http://www.netbsd.org/docs/guide/en/part-install.html</a></li>
<li><a href="https://youtu.be/cgAeY21gXR4" rel="nofollow">Installation Video</a>
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://www.openbgpd.org/ftp.html" rel="nofollow">OpenBGPD 6.8p1 portable: released Nov 5th, 2020</a></li>
<li><a href="http://kflu.github.io/2020/08/15/2020-08-15-awk-irc-bot/" rel="nofollow">IRC Awk Bot</a></li>
<li><a href="https://www.youtube.com/watch?v=ZVkJZJEdZNY" rel="nofollow">Docker on FreeBSD using bhyve and sshfs</a></li>
<li><a href="https://github.com/susam/tucl" rel="nofollow">The UNIX Command Language (1976)</a>
***</li>
</ul>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/santi%20-%20openrc.md" rel="nofollow">santi - openrc</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/380/feedback/trond%20-%20python2%20and%20mailmane%20and%20sshfs" rel="nofollow">trond - python2 and mailman</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>302: Contention Reduction</title>
  <link>https://www.bsdnow.tv/302</link>
  <guid isPermaLink="false">42938801-0d4a-4cf9-a297-c1eeddac85dc</guid>
  <pubDate>Wed, 12 Jun 2019 23:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/42938801-0d4a-4cf9-a297-c1eeddac85dc.mp3" length="50043425" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>DragonFlyBSD's kernel optimizations pay off, differences between OpenBSD and Linux, NetBSD 2019 Google Summer of Code project list, Reducing that contention, fnaify 1.3 released, vmctl(8): CLI syntax changes, and things that Linux distributions should not do when packaging.</itunes:subtitle>
  <itunes:duration>1:09:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>DragonFlyBSD's kernel optimizations pay off, differences between OpenBSD and Linux, NetBSD 2019 Google Summer of Code project list, Reducing that contention, fnaify 1.3 released, vmctl(8): CLI syntax changes, and things that Linux distributions should not do when packaging.
Headlines
DragonFlyBSD's Kernel Optimizations Are Paying Off (https://www.phoronix.com/scan.php?page=article&amp;amp;item=dragonfly-55-threadripper&amp;amp;num=1)
DragonFlyBSD lead developer Matthew Dillon has been working on a big VM rework in the name of performance and other kernel improvements recently. Here is a look at how those DragonFlyBSD 5.5-DEVELOPMENT improvements are paying off compared to DragonFlyBSD 5.4 as well as FreeBSD 12 and five Linux distribution releases. With Dillon using an AMD Ryzen Threadripper system, we used that too for this round of BSD vs. Linux performance benchmarks.
The work by Dillon on the VM overhaul and other changes (including more HAMMER2 file-system work) will ultimately culminate with the DragonFlyBSD 5.6 release (well, unless he opts for DragonFlyBSD 6.0 or so). These are benchmarks of the latest DragonFlyBSD 5.5-DEVELOPMENT daily ISO as of this week benchmarked across DragonFlyBSD 5.4.3 stable, FreeBSD 12.0, Ubuntu 19.04, Red Hat Enterprise Linux 8.0, Debian 9.9, Debian Buster, and CentOS 7 1810 as a wide variety of reference points both from newer and older Linux distributions. (As for no Clear Linux reference point for a speedy reference point, it currently has a regression with AMD + Samsung NVMe SSD support on some hardware, including this box, prohibiting the drive from coming up due to a presumed power management issue that is still being resolved.)
With Matthew Dillon doing much of his development on an AMD Ryzen Threadripper system after he last year proclaimed the greatness of these AMD HEDT CPUs, for this round of testing I also used a Ryzen Threadripper 2990WX with 32 cores / 64 threads. Tests of other AMD/Intel hardware with DragonFlyBSD will come as the next stable release is near and all of the kernel work has settled down. For now it's mostly entertaining our own curiosity how well these DragonFlyBSD optimizations are paying off and how it's increasing the competition against FreeBSD 12 and Linux distributions.
What are the differences between OpenBSD and Linux? (https://cfenollosa.com/blog/what-are-the-differences-between-openbsd-and-linux.html)
Maybe you have been reading recently about the release of OpenBSD 6.5 and wonder, "What are the differences between Linux and OpenBSD?"
I've also been there at some point in the past and these are my conclusions.
They also apply, to some extent, to other BSDs. However, an important disclaimer applies to this article.
This list is aimed at people who are used to Linux and are curious about OpenBSD. It is written to highlight the most important changes from their perspective, not the absolute most important changes from a technical standpoint.
Please bear with me.
A terminal is a terminal is a terminal
Practical differences
Security and system administration
Why philosophical differences matter
So what do I choose?
How to try OpenBSD
***
News Roundup
NetBSD 2019 Google Summer of Code (http://blog.netbsd.org/tnf/entry/announcing_google_summer_of_code1)
We are very happy to announce The NetBSD Foundation Google Summer of Code 2019 projects:
Akul Abhilash Pillai - Adapting TriforceAFL for NetBSD kernel fuzzing
Manikishan Ghantasala - Add KNF (NetBSD style) clang-format configuration
Siddharth Muralee - Enhancing Syzkaller support for NetBSD
Surya P - Implementation of COMPATLINUX and COMPATNETBSD32 DRM ioctls support for NetBSD kernel
Jason High - Incorporation of Argon2 Password Hashing Algorithm into NetBSD
Saurav Prakash - Porting NetBSD to HummingBoard Pulse
Naveen Narayanan - Porting WINE to amd64 architecture on NetBSD
The communiting bonding period - where students get in touch with mentors and community - started yesterday. The coding period will start from May 27 until August 19.
Please welcome all our students and a big good luck to students and mentors! A big thank to Google and The NetBSD Foundation organization mentors and administrators! Looking forward to a great Google Summer of Code!
Reducing that contention (http://www.grenadille.net/post/2019/05/09/Reducing-that-contention)
The opening keynote at EuroBSDCon 2016 predicted the future 10 years of BSDs. Amongst all the funny previsions, gnn@FreeBSD said that by 2026 OpenBSD will have its first implementation of SMP. Almost 3 years after this talk, that sounds like a plausible forecast... Why? Where are we? What can we do? Let's dive into the issue!
State of affairs
Most of OpenBSD's kernel still runs under a single lock, ze KERNEL_LOCK(). That includes most of the syscalls, most of the interrupt handlers and most of the fault handlers. Most of them, not all of them. Meaning we have collected &amp;amp; fixed bugs while setting up infrastructures and examples. Now this lock remains the principal responsible for the spin % you can observe in top(1) and systat(1).
I believe that we opted for a difficult hike when we decided to start removing this lock from the bottom. As a result many SCSI &amp;amp; Network interrupt handlers as well as all Audio &amp;amp; USB ones can be executed without big lock. On the other hand very few syscalls are already or almost ready to be unlocked, as we incorrectly say. This explains why basic primitives like tsleep(9), csignal() and selwakeup() are only receiving attention now that the top of the Network Stack is running (mostly) without big lock.
Next steps
In the past years, most of our efforts have been invested into the Network Stack. As I already mentioned it should be ready to be parallelized. However think we should now concentrate on removing the KERNEL_LOCK(), even if the code paths aren't performance critical. 
See the Article for the rest of the post
fnaify 1.3 released - more games are "fnaify &amp;amp; run" now (https://www.reddit.com/r/openbsd_gaming/comments/btste9/fnaify_13_released_more_games_are_fnaify_run_now/)
This release finally addresses some of the problems that prevent simple running of several games.
This happens for example when an old FNA.dll library comes with the games that doesn't match the API of our native libraries like SDL2, OpenAL, or MojoShader anymore. Some of those cases can be fixed by simply dropping in a newer FNA.dll. fnaify now asks if FNA 17.12 should be automatically added if a known incompatible FNA version is found. You simply answer yes or no. 
Another blocker happens when the game expects to check the SteamAPI - either from a running Steam process, or a bundled steam_api library. OpenBSD 6.5-current now has steamworks-nosteam in ports, a stub library for Steamworks.NET that prevents games from crashing simply because an API function isn't found. The repo is here. fnaify now finds this library in /usr/local/share/steamstubs and uses it instead of the bundled (full) Steamworks.NET.dll.
This may help with any games that use this layer to interact with the SteamAPI, mostly those that can only be obtained via Steam. 
vmctl(8): command line syntax changed (https://www.openbsd.org/faq/current.html#r20190529)
The order of the arguments in the create, start, and stop commands of vmctl(8) has been changed to match a commonly expected style. Manual usage or scripting with vmctl must be adjusted to use the new syntax. 
For example, the old syntax looked like this:
# vmctl create disk.qcow2 -s 50G
The new syntax specifies the command options before the argument:
# vmctl create -s 50G disk.qcow2
Something that Linux distributions should not do when packaging things (https://utcc.utoronto.ca/~cks/space/blog/linux/PackageNameClashProblem)
Right now I am a bit unhappy at Fedora for a specific packaging situation, so let me tell you a little story of what I, as a system administrator, would really like distributions to not do.
For reasons beyond the scope of this blog entry, I run a Prometheus and Grafana setup on both my home and office Fedora Linux machines (among other things, it gives me a place to test out various things involving them). When I set this up, I used the official upstream versions of both, because I needed to match what we are running (or would soon be).
Recently, Fedora decided to package Grafana themselves (as a RPM), and they called this RPM package 'grafana'. Since the two different packages are different versions of the same thing as far as package management tools are concerned, Fedora basically took over the 'grafana' package name from Grafana. This caused my systems to offer to upgrade me from the Grafana.com 'grafana-6.1.5-1' package to the Fedora 'grafana-6.1.6-1.fc29' one, which I actually did after taking reasonable steps to make sure that the Fedora version of 6.1.6 was compatible with the file layouts and so on from the Grafana version of 6.1.5.
Why is this a problem? It's simple. If you're going to take over a package name from the upstream, you should keep up with the upstream releases. If you take over a package name and don't keep up to date or keep up to date only sporadically, you cause all sorts of heartburn for system administrators who use the package. The least annoying future of this situation is that Fedora has abandoned Grafana at 6.1.6 and I am going to 'upgrade' it with the upstream 6.2.1, which will hopefully be a transparent replacement and not blow up in my face. The most annoying future is that Fedora and Grafana keep ping-ponging versions back and forth, which will make 'dnf upgrade' into a minefield (because it will frequently try to give me a 'grafana' upgrade that I don't want and that would be dangerous to accept). And of course this situation turns Fedora version upgrades into their own minefield, since now I risk an upgrade to Fedora 30 actually reverting the 'grafana' package version on me.
Beastie Bits
[talk] ZFS v UFS on APU2 msata SSD with FreeBSD (http://lists.nycbug.org:8080/pipermail/talk/2019-May/017885.html)
NetBSD 8.1 is out (http://www.netbsd.org/releases/formal-8/NetBSD-8.1.html)
lazyboi – the laziest possible way to send raw HTTP POST data (https://github.com/ctsrc/lazyboi)
A Keyboard layout that changes by markov frequency (https://github.com/shapr/markovkeyboard)
Open Source Game Clones (https://osgameclones.com/)
EuroBSDcon program &amp;amp; registration open (https://eurobsdcon.org)
***
Feedback/Questions
John - A segment idea (http://dpaste.com/3YTBQTX#wrap)
Johnny - Audio only format please don't (http://dpaste.com/3WD0A25#wrap)
Alex - Thanks and some Linux Snaps vs PBI feedback (http://dpaste.com/1RQF4QM#wrap)
Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv)
***

    
    Your browser does not support the HTML5 video tag.
 
</description>
  <content:encoded>
    <![CDATA[<p>DragonFlyBSD&#39;s kernel optimizations pay off, differences between OpenBSD and Linux, NetBSD 2019 Google Summer of Code project list, Reducing that contention, fnaify 1.3 released, vmctl(8): CLI syntax changes, and things that Linux distributions should not do when packaging.</p>

<h2>Headlines</h2>

<h3><a href="https://www.phoronix.com/scan.php?page=article&item=dragonfly-55-threadripper&num=1" rel="nofollow">DragonFlyBSD&#39;s Kernel Optimizations Are Paying Off</a></h3>

<blockquote>
<p>DragonFlyBSD lead developer Matthew Dillon has been working on a big VM rework in the name of performance and other kernel improvements recently. Here is a look at how those DragonFlyBSD 5.5-DEVELOPMENT improvements are paying off compared to DragonFlyBSD 5.4 as well as FreeBSD 12 and five Linux distribution releases. With Dillon using an AMD Ryzen Threadripper system, we used that too for this round of BSD vs. Linux performance benchmarks.<br>
The work by Dillon on the VM overhaul and other changes (including more HAMMER2 file-system work) will ultimately culminate with the DragonFlyBSD 5.6 release (well, unless he opts for DragonFlyBSD 6.0 or so). These are benchmarks of the latest DragonFlyBSD 5.5-DEVELOPMENT daily ISO as of this week benchmarked across DragonFlyBSD 5.4.3 stable, FreeBSD 12.0, Ubuntu 19.04, Red Hat Enterprise Linux 8.0, Debian 9.9, Debian Buster, and CentOS 7 1810 as a wide variety of reference points both from newer and older Linux distributions. (As for no Clear Linux reference point for a speedy reference point, it currently has a regression with AMD + Samsung NVMe SSD support on some hardware, including this box, prohibiting the drive from coming up due to a presumed power management issue that is still being resolved.)<br>
With Matthew Dillon doing much of his development on an AMD Ryzen Threadripper system after he last year proclaimed the greatness of these AMD HEDT CPUs, for this round of testing I also used a Ryzen Threadripper 2990WX with 32 cores / 64 threads. Tests of other AMD/Intel hardware with DragonFlyBSD will come as the next stable release is near and all of the kernel work has settled down. For now it&#39;s mostly entertaining our own curiosity how well these DragonFlyBSD optimizations are paying off and how it&#39;s increasing the competition against FreeBSD 12 and Linux distributions.</p>

<hr>
</blockquote>

<h3><a href="https://cfenollosa.com/blog/what-are-the-differences-between-openbsd-and-linux.html" rel="nofollow">What are the differences between OpenBSD and Linux?</a></h3>

<blockquote>
<p>Maybe you have been reading recently about the release of OpenBSD 6.5 and wonder, &quot;What are the differences between Linux and OpenBSD?&quot;<br>
I&#39;ve also been there at some point in the past and these are my conclusions.<br>
They also apply, to some extent, to other BSDs. However, an important disclaimer applies to this article.<br>
This list is aimed at people who are used to Linux and are curious about OpenBSD. It is written to highlight the most important changes from their perspective, not the absolute most important changes from a technical standpoint.<br>
Please bear with me.</p>
</blockquote>

<ul>
<li>A terminal is a terminal is a terminal</li>
<li>Practical differences</li>
<li>Security and system administration</li>
<li>Why philosophical differences matter</li>
<li>So what do I choose?</li>
<li>How to try OpenBSD
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://blog.netbsd.org/tnf/entry/announcing_google_summer_of_code1" rel="nofollow">NetBSD 2019 Google Summer of Code</a></h3>

<blockquote>
<p>We are very happy to announce The NetBSD Foundation Google Summer of Code 2019 projects:</p>
</blockquote>

<ul>
<li>Akul Abhilash Pillai - Adapting TriforceAFL for NetBSD kernel fuzzing</li>
<li>Manikishan Ghantasala - Add KNF (NetBSD style) clang-format configuration</li>
<li>Siddharth Muralee - Enhancing Syzkaller support for NetBSD</li>
<li>Surya P - Implementation of COMPAT_LINUX and COMPAT_NETBSD32 DRM ioctls support for NetBSD kernel</li>
<li>Jason High - Incorporation of Argon2 Password Hashing Algorithm into NetBSD</li>
<li>Saurav Prakash - Porting NetBSD to HummingBoard Pulse</li>
<li>Naveen Narayanan - Porting WINE to amd64 architecture on NetBSD</li>
</ul>

<blockquote>
<p>The communiting bonding period - where students get in touch with mentors and community - started yesterday. The coding period will start from May 27 until August 19.<br>
Please welcome all our students and a big good luck to students and mentors! A big thank to Google and The NetBSD Foundation organization mentors and administrators! Looking forward to a great Google Summer of Code!</p>
</blockquote>

<hr>

<h3><a href="http://www.grenadille.net/post/2019/05/09/Reducing-that-contention" rel="nofollow">Reducing that contention</a></h3>

<blockquote>
<p>The opening keynote at EuroBSDCon 2016 predicted the future 10 years of BSDs. Amongst all the funny previsions, gnn@FreeBSD said that by 2026 OpenBSD will have its first implementation of SMP. Almost 3 years after this talk, that sounds like a plausible forecast... Why? Where are we? What can we do? Let&#39;s dive into the issue!</p>
</blockquote>

<ul>
<li>State of affairs</li>
</ul>

<blockquote>
<p>Most of OpenBSD&#39;s kernel still runs under a single lock, ze KERNEL_LOCK(). That includes most of the syscalls, most of the interrupt handlers and most of the fault handlers. Most of them, not all of them. Meaning we have collected &amp; fixed bugs while setting up infrastructures and examples. Now this lock remains the principal responsible for the spin % you can observe in top(1) and systat(1).<br>
I believe that we opted for a difficult hike when we decided to start removing this lock from the bottom. As a result many SCSI &amp; Network interrupt handlers as well as all Audio &amp; USB ones can be executed without big lock. On the other hand very few syscalls are already or almost ready to be unlocked, as we incorrectly say. This explains why basic primitives like tsleep(9), csignal() and selwakeup() are only receiving attention now that the top of the Network Stack is running (mostly) without big lock.</p>
</blockquote>

<ul>
<li>Next steps</li>
</ul>

<blockquote>
<p>In the past years, most of our efforts have been invested into the Network Stack. As I already mentioned it should be ready to be parallelized. However think we should now concentrate on removing the KERNEL_LOCK(), even if the code paths aren&#39;t performance critical. </p>
</blockquote>

<ul>
<li>See the Article for the rest of the post</li>
</ul>

<hr>

<h3><a href="https://www.reddit.com/r/openbsd_gaming/comments/btste9/fnaify_13_released_more_games_are_fnaify_run_now/" rel="nofollow">fnaify 1.3 released - more games are &quot;fnaify &amp; run&quot; now</a></h3>

<blockquote>
<p>This release finally addresses some of the problems that prevent simple running of several games.<br>
This happens for example when an old FNA.dll library comes with the games that doesn&#39;t match the API of our native libraries like SDL2, OpenAL, or MojoShader anymore. Some of those cases can be fixed by simply dropping in a newer FNA.dll. fnaify now asks if FNA 17.12 should be automatically added if a known incompatible FNA version is found. You simply answer yes or no. </p>

<p>Another blocker happens when the game expects to check the SteamAPI - either from a running Steam process, or a bundled steam_api library. OpenBSD 6.5-current now has steamworks-nosteam in ports, a stub library for Steamworks.NET that prevents games from crashing simply because an API function isn&#39;t found. The repo is here. fnaify now finds this library in /usr/local/share/steamstubs and uses it instead of the bundled (full) Steamworks.NET.dll.<br>
This may help with any games that use this layer to interact with the SteamAPI, mostly those that can only be obtained via Steam. </p>
</blockquote>

<h3><a href="https://www.openbsd.org/faq/current.html#r20190529" rel="nofollow">vmctl(8): command line syntax changed</a></h3>

<blockquote>
<p>The order of the arguments in the create, start, and stop commands of vmctl(8) has been changed to match a commonly expected style. Manual usage or scripting with vmctl must be adjusted to use the new syntax. <br>
For example, the old syntax looked like this:</p>
</blockquote>

<p><code># vmctl create disk.qcow2 -s 50G</code></p>

<blockquote>
<p>The new syntax specifies the command options before the argument:</p>
</blockquote>

<p><code># vmctl create -s 50G disk.qcow2</code></p>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/linux/PackageNameClashProblem" rel="nofollow">Something that Linux distributions should not do when packaging things</a></h3>

<blockquote>
<p>Right now I am a bit unhappy at Fedora for a specific packaging situation, so let me tell you a little story of what I, as a system administrator, would really like distributions to not do.<br>
For reasons beyond the scope of this blog entry, I run a Prometheus and Grafana setup on both my home and office Fedora Linux machines (among other things, it gives me a place to test out various things involving them). When I set this up, I used the official upstream versions of both, because I needed to match what we are running (or would soon be).<br>
Recently, Fedora decided to package Grafana themselves (as a RPM), and they called this RPM package &#39;grafana&#39;. Since the two different packages are different versions of the same thing as far as package management tools are concerned, Fedora basically took over the &#39;grafana&#39; package name from Grafana. This caused my systems to offer to upgrade me from the Grafana.com &#39;grafana-6.1.5-1&#39; package to the Fedora &#39;grafana-6.1.6-1.fc29&#39; one, which I actually did after taking reasonable steps to make sure that the Fedora version of 6.1.6 was compatible with the file layouts and so on from the Grafana version of 6.1.5.<br>
Why is this a problem? It&#39;s simple. If you&#39;re going to take over a package name from the upstream, you should keep up with the upstream releases. If you take over a package name and don&#39;t keep up to date or keep up to date only sporadically, you cause all sorts of heartburn for system administrators who use the package. The least annoying future of this situation is that Fedora has abandoned Grafana at 6.1.6 and I am going to &#39;upgrade&#39; it with the upstream 6.2.1, which will hopefully be a transparent replacement and not blow up in my face. The most annoying future is that Fedora and Grafana keep ping-ponging versions back and forth, which will make &#39;dnf upgrade&#39; into a minefield (because it will frequently try to give me a &#39;grafana&#39; upgrade that I don&#39;t want and that would be dangerous to accept). And of course this situation turns Fedora version upgrades into their own minefield, since now I risk an upgrade to Fedora 30 actually reverting the &#39;grafana&#39; package version on me.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://lists.nycbug.org:8080/pipermail/talk/2019-May/017885.html" rel="nofollow">[talk] ZFS v UFS on APU2 msata SSD with FreeBSD</a></li>
<li><a href="http://www.netbsd.org/releases/formal-8/NetBSD-8.1.html" rel="nofollow">NetBSD 8.1 is out</a></li>
<li><a href="https://github.com/ctsrc/lazyboi" rel="nofollow">lazyboi – the laziest possible way to send raw HTTP POST data</a></li>
<li><a href="https://github.com/shapr/markovkeyboard" rel="nofollow">A Keyboard layout that changes by markov frequency</a></li>
<li><a href="https://osgameclones.com/" rel="nofollow">Open Source Game Clones</a></li>
<li><a href="https://eurobsdcon.org" rel="nofollow">EuroBSDcon program &amp; registration open</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>John - <a href="http://dpaste.com/3YTBQTX#wrap" rel="nofollow">A segment idea</a></li>
<li>Johnny - <a href="http://dpaste.com/3WD0A25#wrap" rel="nofollow">Audio only format please don&#39;t</a></li>
<li>Alex - <a href="http://dpaste.com/1RQF4QM#wrap" rel="nofollow">Thanks and some Linux Snaps vs PBI feedback</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0302.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>DragonFlyBSD&#39;s kernel optimizations pay off, differences between OpenBSD and Linux, NetBSD 2019 Google Summer of Code project list, Reducing that contention, fnaify 1.3 released, vmctl(8): CLI syntax changes, and things that Linux distributions should not do when packaging.</p>

<h2>Headlines</h2>

<h3><a href="https://www.phoronix.com/scan.php?page=article&item=dragonfly-55-threadripper&num=1" rel="nofollow">DragonFlyBSD&#39;s Kernel Optimizations Are Paying Off</a></h3>

<blockquote>
<p>DragonFlyBSD lead developer Matthew Dillon has been working on a big VM rework in the name of performance and other kernel improvements recently. Here is a look at how those DragonFlyBSD 5.5-DEVELOPMENT improvements are paying off compared to DragonFlyBSD 5.4 as well as FreeBSD 12 and five Linux distribution releases. With Dillon using an AMD Ryzen Threadripper system, we used that too for this round of BSD vs. Linux performance benchmarks.<br>
The work by Dillon on the VM overhaul and other changes (including more HAMMER2 file-system work) will ultimately culminate with the DragonFlyBSD 5.6 release (well, unless he opts for DragonFlyBSD 6.0 or so). These are benchmarks of the latest DragonFlyBSD 5.5-DEVELOPMENT daily ISO as of this week benchmarked across DragonFlyBSD 5.4.3 stable, FreeBSD 12.0, Ubuntu 19.04, Red Hat Enterprise Linux 8.0, Debian 9.9, Debian Buster, and CentOS 7 1810 as a wide variety of reference points both from newer and older Linux distributions. (As for no Clear Linux reference point for a speedy reference point, it currently has a regression with AMD + Samsung NVMe SSD support on some hardware, including this box, prohibiting the drive from coming up due to a presumed power management issue that is still being resolved.)<br>
With Matthew Dillon doing much of his development on an AMD Ryzen Threadripper system after he last year proclaimed the greatness of these AMD HEDT CPUs, for this round of testing I also used a Ryzen Threadripper 2990WX with 32 cores / 64 threads. Tests of other AMD/Intel hardware with DragonFlyBSD will come as the next stable release is near and all of the kernel work has settled down. For now it&#39;s mostly entertaining our own curiosity how well these DragonFlyBSD optimizations are paying off and how it&#39;s increasing the competition against FreeBSD 12 and Linux distributions.</p>

<hr>
</blockquote>

<h3><a href="https://cfenollosa.com/blog/what-are-the-differences-between-openbsd-and-linux.html" rel="nofollow">What are the differences between OpenBSD and Linux?</a></h3>

<blockquote>
<p>Maybe you have been reading recently about the release of OpenBSD 6.5 and wonder, &quot;What are the differences between Linux and OpenBSD?&quot;<br>
I&#39;ve also been there at some point in the past and these are my conclusions.<br>
They also apply, to some extent, to other BSDs. However, an important disclaimer applies to this article.<br>
This list is aimed at people who are used to Linux and are curious about OpenBSD. It is written to highlight the most important changes from their perspective, not the absolute most important changes from a technical standpoint.<br>
Please bear with me.</p>
</blockquote>

<ul>
<li>A terminal is a terminal is a terminal</li>
<li>Practical differences</li>
<li>Security and system administration</li>
<li>Why philosophical differences matter</li>
<li>So what do I choose?</li>
<li>How to try OpenBSD
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://blog.netbsd.org/tnf/entry/announcing_google_summer_of_code1" rel="nofollow">NetBSD 2019 Google Summer of Code</a></h3>

<blockquote>
<p>We are very happy to announce The NetBSD Foundation Google Summer of Code 2019 projects:</p>
</blockquote>

<ul>
<li>Akul Abhilash Pillai - Adapting TriforceAFL for NetBSD kernel fuzzing</li>
<li>Manikishan Ghantasala - Add KNF (NetBSD style) clang-format configuration</li>
<li>Siddharth Muralee - Enhancing Syzkaller support for NetBSD</li>
<li>Surya P - Implementation of COMPAT_LINUX and COMPAT_NETBSD32 DRM ioctls support for NetBSD kernel</li>
<li>Jason High - Incorporation of Argon2 Password Hashing Algorithm into NetBSD</li>
<li>Saurav Prakash - Porting NetBSD to HummingBoard Pulse</li>
<li>Naveen Narayanan - Porting WINE to amd64 architecture on NetBSD</li>
</ul>

<blockquote>
<p>The communiting bonding period - where students get in touch with mentors and community - started yesterday. The coding period will start from May 27 until August 19.<br>
Please welcome all our students and a big good luck to students and mentors! A big thank to Google and The NetBSD Foundation organization mentors and administrators! Looking forward to a great Google Summer of Code!</p>
</blockquote>

<hr>

<h3><a href="http://www.grenadille.net/post/2019/05/09/Reducing-that-contention" rel="nofollow">Reducing that contention</a></h3>

<blockquote>
<p>The opening keynote at EuroBSDCon 2016 predicted the future 10 years of BSDs. Amongst all the funny previsions, gnn@FreeBSD said that by 2026 OpenBSD will have its first implementation of SMP. Almost 3 years after this talk, that sounds like a plausible forecast... Why? Where are we? What can we do? Let&#39;s dive into the issue!</p>
</blockquote>

<ul>
<li>State of affairs</li>
</ul>

<blockquote>
<p>Most of OpenBSD&#39;s kernel still runs under a single lock, ze KERNEL_LOCK(). That includes most of the syscalls, most of the interrupt handlers and most of the fault handlers. Most of them, not all of them. Meaning we have collected &amp; fixed bugs while setting up infrastructures and examples. Now this lock remains the principal responsible for the spin % you can observe in top(1) and systat(1).<br>
I believe that we opted for a difficult hike when we decided to start removing this lock from the bottom. As a result many SCSI &amp; Network interrupt handlers as well as all Audio &amp; USB ones can be executed without big lock. On the other hand very few syscalls are already or almost ready to be unlocked, as we incorrectly say. This explains why basic primitives like tsleep(9), csignal() and selwakeup() are only receiving attention now that the top of the Network Stack is running (mostly) without big lock.</p>
</blockquote>

<ul>
<li>Next steps</li>
</ul>

<blockquote>
<p>In the past years, most of our efforts have been invested into the Network Stack. As I already mentioned it should be ready to be parallelized. However think we should now concentrate on removing the KERNEL_LOCK(), even if the code paths aren&#39;t performance critical. </p>
</blockquote>

<ul>
<li>See the Article for the rest of the post</li>
</ul>

<hr>

<h3><a href="https://www.reddit.com/r/openbsd_gaming/comments/btste9/fnaify_13_released_more_games_are_fnaify_run_now/" rel="nofollow">fnaify 1.3 released - more games are &quot;fnaify &amp; run&quot; now</a></h3>

<blockquote>
<p>This release finally addresses some of the problems that prevent simple running of several games.<br>
This happens for example when an old FNA.dll library comes with the games that doesn&#39;t match the API of our native libraries like SDL2, OpenAL, or MojoShader anymore. Some of those cases can be fixed by simply dropping in a newer FNA.dll. fnaify now asks if FNA 17.12 should be automatically added if a known incompatible FNA version is found. You simply answer yes or no. </p>

<p>Another blocker happens when the game expects to check the SteamAPI - either from a running Steam process, or a bundled steam_api library. OpenBSD 6.5-current now has steamworks-nosteam in ports, a stub library for Steamworks.NET that prevents games from crashing simply because an API function isn&#39;t found. The repo is here. fnaify now finds this library in /usr/local/share/steamstubs and uses it instead of the bundled (full) Steamworks.NET.dll.<br>
This may help with any games that use this layer to interact with the SteamAPI, mostly those that can only be obtained via Steam. </p>
</blockquote>

<h3><a href="https://www.openbsd.org/faq/current.html#r20190529" rel="nofollow">vmctl(8): command line syntax changed</a></h3>

<blockquote>
<p>The order of the arguments in the create, start, and stop commands of vmctl(8) has been changed to match a commonly expected style. Manual usage or scripting with vmctl must be adjusted to use the new syntax. <br>
For example, the old syntax looked like this:</p>
</blockquote>

<p><code># vmctl create disk.qcow2 -s 50G</code></p>

<blockquote>
<p>The new syntax specifies the command options before the argument:</p>
</blockquote>

<p><code># vmctl create -s 50G disk.qcow2</code></p>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/linux/PackageNameClashProblem" rel="nofollow">Something that Linux distributions should not do when packaging things</a></h3>

<blockquote>
<p>Right now I am a bit unhappy at Fedora for a specific packaging situation, so let me tell you a little story of what I, as a system administrator, would really like distributions to not do.<br>
For reasons beyond the scope of this blog entry, I run a Prometheus and Grafana setup on both my home and office Fedora Linux machines (among other things, it gives me a place to test out various things involving them). When I set this up, I used the official upstream versions of both, because I needed to match what we are running (or would soon be).<br>
Recently, Fedora decided to package Grafana themselves (as a RPM), and they called this RPM package &#39;grafana&#39;. Since the two different packages are different versions of the same thing as far as package management tools are concerned, Fedora basically took over the &#39;grafana&#39; package name from Grafana. This caused my systems to offer to upgrade me from the Grafana.com &#39;grafana-6.1.5-1&#39; package to the Fedora &#39;grafana-6.1.6-1.fc29&#39; one, which I actually did after taking reasonable steps to make sure that the Fedora version of 6.1.6 was compatible with the file layouts and so on from the Grafana version of 6.1.5.<br>
Why is this a problem? It&#39;s simple. If you&#39;re going to take over a package name from the upstream, you should keep up with the upstream releases. If you take over a package name and don&#39;t keep up to date or keep up to date only sporadically, you cause all sorts of heartburn for system administrators who use the package. The least annoying future of this situation is that Fedora has abandoned Grafana at 6.1.6 and I am going to &#39;upgrade&#39; it with the upstream 6.2.1, which will hopefully be a transparent replacement and not blow up in my face. The most annoying future is that Fedora and Grafana keep ping-ponging versions back and forth, which will make &#39;dnf upgrade&#39; into a minefield (because it will frequently try to give me a &#39;grafana&#39; upgrade that I don&#39;t want and that would be dangerous to accept). And of course this situation turns Fedora version upgrades into their own minefield, since now I risk an upgrade to Fedora 30 actually reverting the &#39;grafana&#39; package version on me.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://lists.nycbug.org:8080/pipermail/talk/2019-May/017885.html" rel="nofollow">[talk] ZFS v UFS on APU2 msata SSD with FreeBSD</a></li>
<li><a href="http://www.netbsd.org/releases/formal-8/NetBSD-8.1.html" rel="nofollow">NetBSD 8.1 is out</a></li>
<li><a href="https://github.com/ctsrc/lazyboi" rel="nofollow">lazyboi – the laziest possible way to send raw HTTP POST data</a></li>
<li><a href="https://github.com/shapr/markovkeyboard" rel="nofollow">A Keyboard layout that changes by markov frequency</a></li>
<li><a href="https://osgameclones.com/" rel="nofollow">Open Source Game Clones</a></li>
<li><a href="https://eurobsdcon.org" rel="nofollow">EuroBSDcon program &amp; registration open</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>John - <a href="http://dpaste.com/3YTBQTX#wrap" rel="nofollow">A segment idea</a></li>
<li>Johnny - <a href="http://dpaste.com/3WD0A25#wrap" rel="nofollow">Audio only format please don&#39;t</a></li>
<li>Alex - <a href="http://dpaste.com/1RQF4QM#wrap" rel="nofollow">Thanks and some Linux Snaps vs PBI feedback</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0302.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>68: Just the Essentials</title>
  <link>https://www.bsdnow.tv/68</link>
  <guid isPermaLink="false">d06324f4-7dc5-4b8f-9618-666fe480b68d</guid>
  <pubDate>Wed, 17 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d06324f4-7dc5-4b8f-9618-666fe480b68d.mp3" length="62609620" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Michael Lucas about his newest BSD book, "FreeBSD Mastery: Storage Essentials." It's got lots of great information about the disk subsystems, GEOM, filesystems, you name it. We've also got the usual round of news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up this week, we'll be talking with Michael Lucas about his newest BSD book, "FreeBSD Mastery: Storage Essentials." It's got lots of great information about the disk subsystems, GEOM, filesystems, you name it. We've also got the usual round of news and answers to your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
More BSD conference videos (https://www.youtube.com/channel/UCLy8AikPZfWEmzWxUec69PA/videos)
We mentioned it a few times, but the "New Directions in Operating Systems" conference was held in November in the UK
The presentations videos are now online, with a few BSD-related talks of interest
Antti Kantee (http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction), Rump kernels and why / how we got here (https://www.youtube.com/watch?v=GoB73cVyScI)
Franco Fichtner, An introduction to userland networking (https://www.youtube.com/watch?v=WiMNuGTRgbA)
Robert Watson (http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson), New ideas about old OS security (https://www.youtube.com/watch?v=60elN996rtg)
Lots of other interesting, but non-BSD-related, talks were also presented, so check the full list (https://www.youtube.com/playlist?list=PLmRrx948XMnEUlzKOCYn3AzT8OAInP_5M) if you're interested in operating systems in general
The 2014 AsiaBSDCon videos are also slowly being uploaded (better late than never)
Kirk McKusick (http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache), An Overview of Security in the FreeBSD Kernel (https://www.youtube.com/watch?v=E04LxKiu79I)
Matthew Ahrens (http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods), OpenZFS ensures the continued excellence of ZFS (https://www.youtube.com/watch?v=8T9Rh-46jhI)
Eric Allman, Bambi Meets Godzilla: They Elope - Open Source Meets the Commercial World (https://www.youtube.com/watch?v=o2dmreSy76Q)
Scott Long (http://www.bsdnow.tv/episodes/2013_12_25-the_gift_of_giving), Modifying the FreeBSD kernel Netflix streaming servers (https://www.youtube.com/watch?v=4sZZN8Szh14)
Dru Lavigne (http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust), ZFS for the Masses (https://www.youtube.com/watch?v=z5apZFFvx4k)
Kris Moore, Snapshots, Replication, and Boot Environments (https://www.youtube.com/watch?v=w-0PlAVSg5U)
David Chisnall (http://www.bsdnow.tv/episodes/2014_05_07-lets_get_raid), The Future of LLVM in the FreeBSD Toolchain (https://www.youtube.com/watch?v=NLqDAclXMMU)
Luba Tang, Bold, fast optimizing linker for BSD (https://www.youtube.com/watch?v=fWgbBUPMsVw)
John Hixson (http://www.bsdnow.tv/episodes/2014_04_23-its_gonna_get_nasty), Introduction to FreeNAS development (https://www.youtube.com/watch?v=iwF82aep-l8)
Zbigniew Bodek, Transparent Superpages for FreeBSD on ARM (https://www.youtube.com/watch?v=2KLXcyLZ_RE)
Michael Dexter, Visualizing Unix: Graphing bhyve, ZFS and PF with Graphite (https://www.youtube.com/watch?v=rjNg1eQ7uAk)
Peter Grehan (http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind), Nested Paging in Bhyve (https://www.youtube.com/watch?v=wptkUxJSNMY)
Martin Matuška, Deploying FreeBSD systems with Foreman and mfsBSD (https://www.youtube.com/watch?v=nb8jB5x0OX4)
James Brown (http://www.bsdnow.tv/episodes/2014_04_16-certified_package_delivery), Analysys of BSD Associate Exam Results (https://www.youtube.com/watch?v=6eKMLuzsTbY)
Mindaugas Rasiukevicius, NPF - progress and perspective (https://www.youtube.com/watch?v=cgBh0iC9WhM)
Luigi Rizzo, Netmap as a core networking technology (https://www.youtube.com/watch?v=nW8iHgOL9y4)
Michael W. Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop), Sudo: You're Doing it Wrong (https://www.youtube.com/watch?v=o0purspHg-o) (not from a BSD conference, but still good)
They should make for some great material to watch during the holidays
***
OpenBSD vs FreeBSD security features (http://networkfilter.blogspot.com/2014/12/security-openbsd-vs-freebsd.html)
From the author of both the OpenBSD and FreeBSD secure gateway articles we've featured in the past comes a new entry about security
The article goes through a list of all the security features enabled (and disabled) by default in both FreeBSD and OpenBSD
It covers a wide range of topics, including: memory protection, randomization, encryption, privilege separation, Capsicum, securelevels, MAC, Jails and chroots, network stack hardening, firewall features and much more
This is definitely one of the most in-depth and complete articles we've seen in a while - the author seems to have done his homework
If you're looking to secure any sort of BSD box, this post has some very detailed explanations of different exploit mitigation techniques - be sure to read the whole thing
There are also some good comments (http://daemonforums.org/showthread.php?s=16fd0771d929aff294b252924b414f2c&amp;amp;t=8823) on DaemonForums and lobste.rs (https://lobste.rs/s/e3s9xr/security_openbsd_vs_freebsd) that you may want to read 
***
The password? You changed it, right? (http://bsdly.blogspot.com/2014/12/the-password-you-changed-it-right.html)
Peter Hansteen (http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall) has a new blog post up, detailing some weird SSH bruteforcing he's seen recently
He apparently reads his auth logs when he gets bored at an airport
This new bruteforcing attempt seems to be targetting D-Link devices, as evidenced by the three usernames the bots try to use
More than 700 IPs have tried to get into Peter's BSD boxes using these names in combination with weak passwords
Lots more details, including the lists of passwords and IPs, can be found in the full article
If you're using a BSD router (http://www.bsdnow.tv/tutorials/openbsd-router), things like this can be easily prevented with PF or fail2ban (and you probably don't have a "d-link" user anyway)
***
Get started with FreeBSD, an intro for Linux users (http://www.infoworld.com/article/2858288/unix/intro-to-freebsd-for-linux-users.html)
Another new BSD article on a mainstream technology news site - seems we're getting popular
This article is written for Linux users who may be considering switching over to BSD and wondering what it's all about
It details installing FreeBSD 9.3 and getting a basic system setup, while touching on ports and packages, and explaining some terminology along the way
"Among the legions of Linux users and admins, there seems to be a sort of passive curiosity about FreeBSD and other BSDs. Like commuters on a packed train, they gaze out at a less crowded, vaguely mysterious train heading in a slightly different direction and wonder what traveling on that train might be like"
**
Interview - Michael W. Lucas - mwlucas@michaelwlucas.com (mailto:mwlucas@michaelwlucas.com) / @mwlauthor (https://twitter.com/mwlauthor)
FreeBSD Mastery: Storage Essentials (https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials)
News Roundup
OpenSMTPD status update (https://poolp.org/0xa86e/Some-OpenSMTPD-overview,-part-3)
The OpenSMTPD guys (http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx), particularly Gilles, have posted an update on what they've been up to lately
As of 5.6, it's become the default MTA in OpenBSD, and sendmail will be totally gone in 5.7
Email is a much more tricky protocol than you might imagine, and the post goes through some of the weirdness and problems they've had to deal with
There's also another post (https://poolp.org/0xa871/The-state-of-filters) that goes into detail on their upcoming filtering API - a feature many have requested
The API is still being developed, but you can test it out now if you know what you're doing - full details in the article
OpenSMTPD also has portable versions in FreeBSD ports and NetBSD pkgsrc, so check it out
***
OpenCrypto changes in FreeBSD (https://lists.freebsd.org/pipermail/svn-src-head/2014-December/065806.html)
A little while back, we talked to John-Mark Gurney (http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind) about updating FreeBSD's OpenCrypto framework, specifically for IPSEC
Some of that work has just landed in the -CURRENT branch, and the commit has a bit of details
The ICM and GCM modes of AES were added, and both include support for AESNI
There's a new port - "nist-kat" - that can be used to test the new modes of operation
Some things were fixed in the process as well, including an issue that would leak timing info and result in the ability to forge messages
Code was also borrowed from both OpenBSD and NetBSD to make this possible
***
First thoughts on OpenBSD's httpd (http://www.protoc.org/blog/2014/11/23/first-thoughts-on-the-new-openbsd-httpd-server/)
Here we have a blog post from a user of OpenBSD's new homegrown web server that made its debut in 5.6
The author loves that it has proper privilege separation, a very simple config syntax and that it always runs in a chroot
He also mentions dynamic content hosting with FastCGI, and provides an example of how to set it up
Be sure to check our interview with Reyk (http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time) about the new httpd if you're curious on how it got started
Also, if you're running the version that came with 5.6, there's a huge patch (http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/009_httpd.patch.sig) you can apply to get a lot of the features and fixes from -current without waiting for 5.7
***
Steam on PCBSD (https://www.youtube.com/watch?v=B04EuZ9hpAI)
One of the most common questions people who want to use BSD as a desktop ask us is "can I run games?" or "can I use steam?"
Steam through the Linux emulation layer (in FreeBSD) may be possible soon, but it's already possible to use it with WINE
This video shows how to get Steam set up on PCBSD using the Windows version
There are also some instructions in the video description to look over
A second video (https://www.youtube.com/watch?v=BJ88B8aWdk0) details getting streaming set up
***
Feedback/Questions
Charlie writes in (http://slexy.org/view/s2JgqXcw4i)
Sean writes in (http://slexy.org/view/s2WormjMCs)
Predrag writes in (http://slexy.org/view/s20UmdFrbj)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, freebsd mastery, storage essentials, ufs, zfs, disks, book, review, michael lucas, asiabsdcon, operatingsystems.io, opensmtpd, steam</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Michael Lucas about his newest BSD book, &quot;FreeBSD Mastery: Storage Essentials.&quot; It&#39;s got lots of great information about the disk subsystems, GEOM, filesystems, you name it. We&#39;ve also got the usual round of news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCLy8AikPZfWEmzWxUec69PA/videos" rel="nofollow">More BSD conference videos</a></h3>

<ul>
<li>We mentioned it a few times, but the &quot;New Directions in Operating Systems&quot; conference was held in November in the UK</li>
<li>The presentations videos are now online, with a few BSD-related talks of interest</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, <a href="https://www.youtube.com/watch?v=GoB73cVyScI" rel="nofollow">Rump kernels and why / how we got here</a></li>
<li>Franco Fichtner, <a href="https://www.youtube.com/watch?v=WiMNuGTRgbA" rel="nofollow">An introduction to userland networking</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">Robert Watson</a>, <a href="https://www.youtube.com/watch?v=60elN996rtg" rel="nofollow">New ideas about old OS security</a></li>
<li>Lots of other interesting, but non-BSD-related, talks were also presented, so check the <a href="https://www.youtube.com/playlist?list=PLmRrx948XMnEUlzKOCYn3AzT8OAInP_5M" rel="nofollow">full list</a> if you&#39;re interested in operating systems in general</li>
<li>The 2014 AsiaBSDCon videos are also slowly being uploaded (better late than never)</li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://www.youtube.com/watch?v=E04LxKiu79I" rel="nofollow">An Overview of Security in the FreeBSD Kernel</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matthew Ahrens</a>, <a href="https://www.youtube.com/watch?v=8T9Rh-46jhI" rel="nofollow">OpenZFS ensures the continued excellence of ZFS</a></li>
<li>Eric Allman, <a href="https://www.youtube.com/watch?v=o2dmreSy76Q" rel="nofollow">Bambi Meets Godzilla: They Elope - Open Source Meets the Commercial World</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_25-the_gift_of_giving" rel="nofollow">Scott Long</a>, <a href="https://www.youtube.com/watch?v=4sZZN8Szh14" rel="nofollow">Modifying the FreeBSD kernel Netflix streaming servers</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" rel="nofollow">Dru Lavigne</a>, <a href="https://www.youtube.com/watch?v=z5apZFFvx4k" rel="nofollow">ZFS for the Masses</a></li>
<li>Kris Moore, <a href="https://www.youtube.com/watch?v=w-0PlAVSg5U" rel="nofollow">Snapshots, Replication, and Boot Environments</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_07-lets_get_raid" rel="nofollow">David Chisnall</a>, <a href="https://www.youtube.com/watch?v=NLqDAclXMMU" rel="nofollow">The Future of LLVM in the FreeBSD Toolchain</a></li>
<li>Luba Tang, <a href="https://www.youtube.com/watch?v=fWgbBUPMsVw" rel="nofollow">Bold, fast optimizing linker for BSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_23-its_gonna_get_nasty" rel="nofollow">John Hixson</a>, <a href="https://www.youtube.com/watch?v=iwF82aep-l8" rel="nofollow">Introduction to FreeNAS development</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=2KLXcyLZ_RE" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>Michael Dexter, <a href="https://www.youtube.com/watch?v=rjNg1eQ7uAk" rel="nofollow">Visualizing Unix: Graphing bhyve, ZFS and PF with Graphite</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" rel="nofollow">Peter Grehan</a>, <a href="https://www.youtube.com/watch?v=wptkUxJSNMY" rel="nofollow">Nested Paging in Bhyve</a></li>
<li>Martin Matuška, <a href="https://www.youtube.com/watch?v=nb8jB5x0OX4" rel="nofollow">Deploying FreeBSD systems with Foreman and mfsBSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_16-certified_package_delivery" rel="nofollow">James Brown</a>, <a href="https://www.youtube.com/watch?v=6eKMLuzsTbY" rel="nofollow">Analysys of BSD Associate Exam Results</a></li>
<li>Mindaugas Rasiukevicius, <a href="https://www.youtube.com/watch?v=cgBh0iC9WhM" rel="nofollow">NPF - progress and perspective</a></li>
<li>Luigi Rizzo, <a href="https://www.youtube.com/watch?v=nW8iHgOL9y4" rel="nofollow">Netmap as a core networking technology</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W. Lucas</a>, <a href="https://www.youtube.com/watch?v=o0purspHg-o" rel="nofollow">Sudo: You&#39;re Doing it Wrong</a> (not from a BSD conference, but still good)</li>
<li>They should make for some great material to watch during the holidays
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/12/security-openbsd-vs-freebsd.html" rel="nofollow">OpenBSD vs FreeBSD security features</a></h3>

<ul>
<li>From the author of both the OpenBSD and FreeBSD secure gateway articles we&#39;ve featured in the past comes a new entry about security</li>
<li>The article goes through a list of all the security features enabled (and disabled) by default in both FreeBSD and OpenBSD</li>
<li>It covers a wide range of topics, including: memory protection, randomization, encryption, privilege separation, Capsicum, securelevels, MAC, Jails and chroots, network stack hardening, firewall features and <strong>much more</strong></li>
<li>This is definitely one of the most in-depth and complete articles we&#39;ve seen in a while - the author seems to have done his homework</li>
<li>If you&#39;re looking to secure any sort of BSD box, this post has some very detailed explanations of different exploit mitigation techniques - be sure to read the whole thing</li>
<li>There are also <a href="http://daemonforums.org/showthread.php?s=16fd0771d929aff294b252924b414f2c&t=8823" rel="nofollow">some good comments</a> on DaemonForums <a href="https://lobste.rs/s/e3s9xr/security_openbsd_vs_freebsd" rel="nofollow">and lobste.rs</a> that you may want to read 
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/12/the-password-you-changed-it-right.html" rel="nofollow">The password? You changed it, right?</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a> has a new blog post up, detailing some weird SSH bruteforcing he&#39;s seen recently</li>
<li>He apparently reads his auth logs when he gets bored at an airport</li>
<li>This new bruteforcing attempt seems to be targetting D-Link devices, as evidenced by the three usernames the bots try to use</li>
<li>More than 700 IPs have tried to get into Peter&#39;s BSD boxes using these names in combination with weak passwords</li>
<li>Lots more details, including the lists of passwords and IPs, can be found in the full article</li>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">using a BSD router</a>, things like this can be easily prevented with PF or fail2ban (and you probably don&#39;t have a &quot;d-link&quot; user anyway)
***</li>
</ul>

<h3><a href="http://www.infoworld.com/article/2858288/unix/intro-to-freebsd-for-linux-users.html" rel="nofollow">Get started with FreeBSD, an intro for Linux users</a></h3>

<ul>
<li>Another new BSD article on a mainstream technology news site - seems we&#39;re getting popular</li>
<li>This article is written for Linux users who may be considering switching over to BSD and wondering what it&#39;s all about</li>
<li>It details installing FreeBSD 9.3 and getting a basic system setup, while touching on ports and packages, and explaining some terminology along the way</li>
<li>&quot;Among the legions of Linux users and admins, there seems to be a sort of passive curiosity about FreeBSD and other <em>BSDs. Like commuters on a packed train, they gaze out at a less crowded, vaguely mysterious train heading in a slightly different direction and wonder what traveling on that train might be like&quot;
*</em>*</li>
</ul>

<h2>Interview - Michael W. Lucas - <a href="mailto:mwlucas@michaelwlucas.com" rel="nofollow">mwlucas@michaelwlucas.com</a> / <a href="https://twitter.com/mwlauthor" rel="nofollow">@mwlauthor</a></h2>

<p><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery: Storage Essentials</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://poolp.org/0xa86e/Some-OpenSMTPD-overview,-part-3" rel="nofollow">OpenSMTPD status update</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">OpenSMTPD guys</a>, particularly Gilles, have posted an update on what they&#39;ve been up to lately</li>
<li>As of 5.6, it&#39;s become the default MTA in OpenBSD, and sendmail will be totally gone in 5.7</li>
<li>Email is a much more tricky protocol than you might imagine, and the post goes through some of the weirdness and problems they&#39;ve had to deal with</li>
<li>There&#39;s also <a href="https://poolp.org/0xa871/The-state-of-filters" rel="nofollow">another post</a> that goes into detail on their upcoming filtering API - a feature <strong>many</strong> have requested</li>
<li>The API is still being developed, but you can test it out now if you know what you&#39;re doing - full details in the article</li>
<li>OpenSMTPD also has portable versions in FreeBSD ports and NetBSD pkgsrc, so check it out
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/svn-src-head/2014-December/065806.html" rel="nofollow">OpenCrypto changes in FreeBSD</a></h3>

<ul>
<li>A little while back, <a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" rel="nofollow">we talked to John-Mark Gurney</a> about updating FreeBSD&#39;s OpenCrypto framework, specifically for IPSEC</li>
<li>Some of that work has just landed in the -CURRENT branch, and the commit has a bit of details</li>
<li>The ICM and GCM modes of AES were added, and both include support for AESNI</li>
<li>There&#39;s a new port - &quot;nist-kat&quot; - that can be used to test the new modes of operation</li>
<li>Some things were fixed in the process as well, including an issue that would leak timing info and result in the ability to forge messages</li>
<li>Code was also borrowed from both OpenBSD and NetBSD to make this possible
***</li>
</ul>

<h3><a href="http://www.protoc.org/blog/2014/11/23/first-thoughts-on-the-new-openbsd-httpd-server/" rel="nofollow">First thoughts on OpenBSD&#39;s httpd</a></h3>

<ul>
<li>Here we have a blog post from a user of OpenBSD&#39;s new homegrown web server that made its debut in 5.6</li>
<li>The author loves that it has proper privilege separation, a very simple config syntax and that it always runs in a chroot</li>
<li>He also mentions dynamic content hosting with FastCGI, and provides an example of how to set it up</li>
<li>Be sure to check <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">our interview with Reyk</a> about the new httpd if you&#39;re curious on how it got started</li>
<li>Also, if you&#39;re running the version that came with 5.6, there&#39;s <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/009_httpd.patch.sig" rel="nofollow">a huge patch</a> you can apply to get a lot of the features and fixes from -current without waiting for 5.7
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=B04EuZ9hpAI" rel="nofollow">Steam on PCBSD</a></h3>

<ul>
<li>One of the most common questions people who want to use BSD as a desktop ask us is &quot;can I run games?&quot; or &quot;can I use steam?&quot;</li>
<li>Steam through the Linux emulation layer (in FreeBSD) may be possible soon, but it&#39;s already possible to use it with WINE</li>
<li>This video shows how to get Steam set up on PCBSD using the Windows version</li>
<li>There are also some instructions in the video description to look over</li>
<li>A <a href="https://www.youtube.com/watch?v=BJ88B8aWdk0" rel="nofollow">second video</a> details getting streaming set up
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JgqXcw4i" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s2WormjMCs" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20UmdFrbj" rel="nofollow">Predrag writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Michael Lucas about his newest BSD book, &quot;FreeBSD Mastery: Storage Essentials.&quot; It&#39;s got lots of great information about the disk subsystems, GEOM, filesystems, you name it. We&#39;ve also got the usual round of news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCLy8AikPZfWEmzWxUec69PA/videos" rel="nofollow">More BSD conference videos</a></h3>

<ul>
<li>We mentioned it a few times, but the &quot;New Directions in Operating Systems&quot; conference was held in November in the UK</li>
<li>The presentations videos are now online, with a few BSD-related talks of interest</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, <a href="https://www.youtube.com/watch?v=GoB73cVyScI" rel="nofollow">Rump kernels and why / how we got here</a></li>
<li>Franco Fichtner, <a href="https://www.youtube.com/watch?v=WiMNuGTRgbA" rel="nofollow">An introduction to userland networking</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">Robert Watson</a>, <a href="https://www.youtube.com/watch?v=60elN996rtg" rel="nofollow">New ideas about old OS security</a></li>
<li>Lots of other interesting, but non-BSD-related, talks were also presented, so check the <a href="https://www.youtube.com/playlist?list=PLmRrx948XMnEUlzKOCYn3AzT8OAInP_5M" rel="nofollow">full list</a> if you&#39;re interested in operating systems in general</li>
<li>The 2014 AsiaBSDCon videos are also slowly being uploaded (better late than never)</li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://www.youtube.com/watch?v=E04LxKiu79I" rel="nofollow">An Overview of Security in the FreeBSD Kernel</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matthew Ahrens</a>, <a href="https://www.youtube.com/watch?v=8T9Rh-46jhI" rel="nofollow">OpenZFS ensures the continued excellence of ZFS</a></li>
<li>Eric Allman, <a href="https://www.youtube.com/watch?v=o2dmreSy76Q" rel="nofollow">Bambi Meets Godzilla: They Elope - Open Source Meets the Commercial World</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_25-the_gift_of_giving" rel="nofollow">Scott Long</a>, <a href="https://www.youtube.com/watch?v=4sZZN8Szh14" rel="nofollow">Modifying the FreeBSD kernel Netflix streaming servers</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" rel="nofollow">Dru Lavigne</a>, <a href="https://www.youtube.com/watch?v=z5apZFFvx4k" rel="nofollow">ZFS for the Masses</a></li>
<li>Kris Moore, <a href="https://www.youtube.com/watch?v=w-0PlAVSg5U" rel="nofollow">Snapshots, Replication, and Boot Environments</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_07-lets_get_raid" rel="nofollow">David Chisnall</a>, <a href="https://www.youtube.com/watch?v=NLqDAclXMMU" rel="nofollow">The Future of LLVM in the FreeBSD Toolchain</a></li>
<li>Luba Tang, <a href="https://www.youtube.com/watch?v=fWgbBUPMsVw" rel="nofollow">Bold, fast optimizing linker for BSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_23-its_gonna_get_nasty" rel="nofollow">John Hixson</a>, <a href="https://www.youtube.com/watch?v=iwF82aep-l8" rel="nofollow">Introduction to FreeNAS development</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=2KLXcyLZ_RE" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>Michael Dexter, <a href="https://www.youtube.com/watch?v=rjNg1eQ7uAk" rel="nofollow">Visualizing Unix: Graphing bhyve, ZFS and PF with Graphite</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" rel="nofollow">Peter Grehan</a>, <a href="https://www.youtube.com/watch?v=wptkUxJSNMY" rel="nofollow">Nested Paging in Bhyve</a></li>
<li>Martin Matuška, <a href="https://www.youtube.com/watch?v=nb8jB5x0OX4" rel="nofollow">Deploying FreeBSD systems with Foreman and mfsBSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_16-certified_package_delivery" rel="nofollow">James Brown</a>, <a href="https://www.youtube.com/watch?v=6eKMLuzsTbY" rel="nofollow">Analysys of BSD Associate Exam Results</a></li>
<li>Mindaugas Rasiukevicius, <a href="https://www.youtube.com/watch?v=cgBh0iC9WhM" rel="nofollow">NPF - progress and perspective</a></li>
<li>Luigi Rizzo, <a href="https://www.youtube.com/watch?v=nW8iHgOL9y4" rel="nofollow">Netmap as a core networking technology</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W. Lucas</a>, <a href="https://www.youtube.com/watch?v=o0purspHg-o" rel="nofollow">Sudo: You&#39;re Doing it Wrong</a> (not from a BSD conference, but still good)</li>
<li>They should make for some great material to watch during the holidays
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/12/security-openbsd-vs-freebsd.html" rel="nofollow">OpenBSD vs FreeBSD security features</a></h3>

<ul>
<li>From the author of both the OpenBSD and FreeBSD secure gateway articles we&#39;ve featured in the past comes a new entry about security</li>
<li>The article goes through a list of all the security features enabled (and disabled) by default in both FreeBSD and OpenBSD</li>
<li>It covers a wide range of topics, including: memory protection, randomization, encryption, privilege separation, Capsicum, securelevels, MAC, Jails and chroots, network stack hardening, firewall features and <strong>much more</strong></li>
<li>This is definitely one of the most in-depth and complete articles we&#39;ve seen in a while - the author seems to have done his homework</li>
<li>If you&#39;re looking to secure any sort of BSD box, this post has some very detailed explanations of different exploit mitigation techniques - be sure to read the whole thing</li>
<li>There are also <a href="http://daemonforums.org/showthread.php?s=16fd0771d929aff294b252924b414f2c&t=8823" rel="nofollow">some good comments</a> on DaemonForums <a href="https://lobste.rs/s/e3s9xr/security_openbsd_vs_freebsd" rel="nofollow">and lobste.rs</a> that you may want to read 
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/12/the-password-you-changed-it-right.html" rel="nofollow">The password? You changed it, right?</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a> has a new blog post up, detailing some weird SSH bruteforcing he&#39;s seen recently</li>
<li>He apparently reads his auth logs when he gets bored at an airport</li>
<li>This new bruteforcing attempt seems to be targetting D-Link devices, as evidenced by the three usernames the bots try to use</li>
<li>More than 700 IPs have tried to get into Peter&#39;s BSD boxes using these names in combination with weak passwords</li>
<li>Lots more details, including the lists of passwords and IPs, can be found in the full article</li>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">using a BSD router</a>, things like this can be easily prevented with PF or fail2ban (and you probably don&#39;t have a &quot;d-link&quot; user anyway)
***</li>
</ul>

<h3><a href="http://www.infoworld.com/article/2858288/unix/intro-to-freebsd-for-linux-users.html" rel="nofollow">Get started with FreeBSD, an intro for Linux users</a></h3>

<ul>
<li>Another new BSD article on a mainstream technology news site - seems we&#39;re getting popular</li>
<li>This article is written for Linux users who may be considering switching over to BSD and wondering what it&#39;s all about</li>
<li>It details installing FreeBSD 9.3 and getting a basic system setup, while touching on ports and packages, and explaining some terminology along the way</li>
<li>&quot;Among the legions of Linux users and admins, there seems to be a sort of passive curiosity about FreeBSD and other <em>BSDs. Like commuters on a packed train, they gaze out at a less crowded, vaguely mysterious train heading in a slightly different direction and wonder what traveling on that train might be like&quot;
*</em>*</li>
</ul>

<h2>Interview - Michael W. Lucas - <a href="mailto:mwlucas@michaelwlucas.com" rel="nofollow">mwlucas@michaelwlucas.com</a> / <a href="https://twitter.com/mwlauthor" rel="nofollow">@mwlauthor</a></h2>

<p><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery: Storage Essentials</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://poolp.org/0xa86e/Some-OpenSMTPD-overview,-part-3" rel="nofollow">OpenSMTPD status update</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">OpenSMTPD guys</a>, particularly Gilles, have posted an update on what they&#39;ve been up to lately</li>
<li>As of 5.6, it&#39;s become the default MTA in OpenBSD, and sendmail will be totally gone in 5.7</li>
<li>Email is a much more tricky protocol than you might imagine, and the post goes through some of the weirdness and problems they&#39;ve had to deal with</li>
<li>There&#39;s also <a href="https://poolp.org/0xa871/The-state-of-filters" rel="nofollow">another post</a> that goes into detail on their upcoming filtering API - a feature <strong>many</strong> have requested</li>
<li>The API is still being developed, but you can test it out now if you know what you&#39;re doing - full details in the article</li>
<li>OpenSMTPD also has portable versions in FreeBSD ports and NetBSD pkgsrc, so check it out
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/svn-src-head/2014-December/065806.html" rel="nofollow">OpenCrypto changes in FreeBSD</a></h3>

<ul>
<li>A little while back, <a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" rel="nofollow">we talked to John-Mark Gurney</a> about updating FreeBSD&#39;s OpenCrypto framework, specifically for IPSEC</li>
<li>Some of that work has just landed in the -CURRENT branch, and the commit has a bit of details</li>
<li>The ICM and GCM modes of AES were added, and both include support for AESNI</li>
<li>There&#39;s a new port - &quot;nist-kat&quot; - that can be used to test the new modes of operation</li>
<li>Some things were fixed in the process as well, including an issue that would leak timing info and result in the ability to forge messages</li>
<li>Code was also borrowed from both OpenBSD and NetBSD to make this possible
***</li>
</ul>

<h3><a href="http://www.protoc.org/blog/2014/11/23/first-thoughts-on-the-new-openbsd-httpd-server/" rel="nofollow">First thoughts on OpenBSD&#39;s httpd</a></h3>

<ul>
<li>Here we have a blog post from a user of OpenBSD&#39;s new homegrown web server that made its debut in 5.6</li>
<li>The author loves that it has proper privilege separation, a very simple config syntax and that it always runs in a chroot</li>
<li>He also mentions dynamic content hosting with FastCGI, and provides an example of how to set it up</li>
<li>Be sure to check <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">our interview with Reyk</a> about the new httpd if you&#39;re curious on how it got started</li>
<li>Also, if you&#39;re running the version that came with 5.6, there&#39;s <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/009_httpd.patch.sig" rel="nofollow">a huge patch</a> you can apply to get a lot of the features and fixes from -current without waiting for 5.7
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=B04EuZ9hpAI" rel="nofollow">Steam on PCBSD</a></h3>

<ul>
<li>One of the most common questions people who want to use BSD as a desktop ask us is &quot;can I run games?&quot; or &quot;can I use steam?&quot;</li>
<li>Steam through the Linux emulation layer (in FreeBSD) may be possible soon, but it&#39;s already possible to use it with WINE</li>
<li>This video shows how to get Steam set up on PCBSD using the Windows version</li>
<li>There are also some instructions in the video description to look over</li>
<li>A <a href="https://www.youtube.com/watch?v=BJ88B8aWdk0" rel="nofollow">second video</a> details getting streaming set up
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JgqXcw4i" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s2WormjMCs" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20UmdFrbj" rel="nofollow">Predrag writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>48: Liberating SSL</title>
  <link>https://www.bsdnow.tv/48</link>
  <guid isPermaLink="false">e0c8ab6b-dd19-4778-8dc2-4b02bd2ae809</guid>
  <pubDate>Wed, 30 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0c8ab6b-dd19-4778-8dc2-4b02bd2ae809.mp3" length="43106548" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up in this week's episode, we'll be talking with one of OpenBSD's newest developers - Brent Cook - about the portable version of LibreSSL and how it's developed. We've also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>59:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>Coming up in this week's episode, we'll be talking with one of OpenBSD's newest developers - Brent Cook - about the portable version of LibreSSL and how it's developed. We've also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
FreeBSD quarterly status report (https://www.freebsd.org/news/status/report-2014-04-2014-06.html)
FreeBSD has gotten quite a lot done this quarter
Changes in the way release branches are supported - major releases will get at least five years over their lifespan
A new automounter is in the works, hoping to replace amd (which has some issues)
The CAM target layer and RPC stack have gotten some major optimization and speed boosts
Work on ZFSGuru continues, with a large status report specifically for that
The report also mentioned some new committers, both source and ports
It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we've already mentioned on the show
"Foundation-sponsored work resulted in 226 commits to FreeBSD over the April to June period"
***
A new OpenBSD HTTPD is born (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724094043)
Work has begun on a new HTTP daemon in the OpenBSD base system
A lot of people are asking (http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/) "why?" since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?
Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn't trying to be a full-featured replacement)
It's partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter
This has the added benefit of the usual, easy-to-understand syntax and privilege separation 
There's a very brief man page (http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8) online already
It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs
Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***
pkgng 1.3 announced (https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html)
The newest version of FreeBSD's second generation package management system (http://www.bsdnow.tv/tutorials/pkgng) has been released, with lots of new features
It has a new "real" solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)
Lots of the code has been sandboxed for extra security
You'll probably notice some new changes to the UI too, making things more user friendly
A few days later 1.3.1 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;sortby=date&amp;amp;revision=362996) was released to fix a few small bugs, then 1.3.2 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=363108) shortly thereafter and 1.3.3 (https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=363363) yesterday
***
FreeBSD after-install security tasks (http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be)
A number of people have written in to ask us "how do I secure my BSD box after I install it?"
With this blog post, hopefully most of their questions will finally be answered in detail
It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things
Not only does it just list things to do, but the post also does a good job of explaining why you should do them
Maybe we'll see some more posts in this series in the future
***
Interview - Brent Cook - bcook@openbsd.org (mailto:bcook@openbsd.org) / @busterbcook (https://twitter.com/busterbcook)
LibreSSL's portable version and development
News Roundup
FreeBSD Mastery - Storage Essentials (https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials)
MWL (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop)'s new book about the FreeBSD storage subsystems now has an early draft available
Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes
Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance
You'll get access to the completed (e)book when it's done if you buy the early draft
The suggested price is $8
***
Why BSD and not Linux? (http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/)
Yet another thread comes up asking why you should choose BSD over Linux or vice-versa
Lots of good responses from users of the various BSDs
Directly ripping a quote: "Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is "GCC free". DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity."
And "Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS."
Some other users share their switching experiences - worth a read
***
More g2k14 hackathon reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724161550)
Following up from last week's huge list (http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv) of hackathon reports, we have a few more
Landry Breuil (http://undeadly.org/cgi?action=article&amp;amp;sid=20140724161550) spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream
Andrew Fresh (http://undeadly.org/cgi?action=article&amp;amp;sid=20140728122850) enjoyed his first hackathon, pushing OpenBSD's perl patches upstream and got tricked into rewriting the adduser utility in perl
Ted Unangst (http://undeadly.org/cgi?action=article&amp;amp;sid=20140729070721) did his usual "teduing" (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth
Luckily we didn't have to cover 20 new ones this time!
***
BSDTalk episode 243 (http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html)
The newest episode of BSDTalk (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) is out, featuring an interview with Ingo Schwarze of the OpenBSD team
The main topic of discussion is mandoc, which some users might not be familiar with
mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it's not built by default)
We'll catch up to you soon, Will!
***
Feedback/Questions
Thomas writes in (http://slexy.org/view/s2xLRQytAZ)
Stephen writes in (http://slexy.org/view/s21AYng20n)
Sha'ul writes in (http://slexy.org/view/s2DwLRdQDS)
Florian writes in (http://slexy.org/view/s2E05L31BC)
Bob Beck writes in (http://slexy.org/view/s21Nmg3Jrk) - and note the "Caution" section that was added to libressl.org (http://www.libressl.org/)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssl, libressl, portable, openssh, security, linux, arc4random, intrinsic functions, rng, prng, status report, pkgng, openhttpd, relayd, httpd, web server, zfsguru, zfs, freebsd mastery, book, storage, ufs, geom, disks, presentation, talk, comparison, mandoc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up in this week&#39;s episode, we&#39;ll be talking with one of OpenBSD&#39;s newest developers - Brent Cook - about the portable version of LibreSSL and how it&#39;s developed. We&#39;ve also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has gotten quite a lot done this quarter</li>
<li>Changes in the way release branches are supported - major releases will get at least five years over their lifespan</li>
<li>A new automounter is in the works, hoping to replace amd (which has some issues)</li>
<li>The CAM target layer and RPC stack have gotten some major optimization and speed boosts</li>
<li>Work on ZFSGuru continues, with a large status report specifically for that</li>
<li>The report also mentioned some new committers, both source and ports</li>
<li>It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we&#39;ve already mentioned on the show</li>
<li>&quot;Foundation-sponsored work resulted in <strong>226 commits</strong> to FreeBSD over the April to June period&quot;
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724094043" rel="nofollow">A new OpenBSD HTTPD is born</a></h3>

<ul>
<li>Work has begun on a new HTTP daemon in the OpenBSD base system</li>
<li>A lot of people are <a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" rel="nofollow">asking</a> &quot;why?&quot; since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?</li>
<li>Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn&#39;t trying to be a full-featured replacement)</li>
<li>It&#39;s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter</li>
<li>This has the added benefit of the usual, easy-to-understand syntax and privilege separation </li>
<li>There&#39;s a very brief <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" rel="nofollow">man page</a> online already</li>
<li>It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs</li>
<li>Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" rel="nofollow">pkgng 1.3 announced</a></h3>

<ul>
<li>The newest version of FreeBSD&#39;s second generation <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package management system</a> has been released, with lots of new features</li>
<li>It has a new &quot;real&quot; solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)</li>
<li>Lots of the code has been sandboxed for extra security</li>
<li>You&#39;ll probably notice some new changes to the UI too, making things more user friendly</li>
<li>A few days later <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=362996" rel="nofollow">1.3.1</a> was released to fix a few small bugs, then <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363108" rel="nofollow">1.3.2</a> shortly thereafter and <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363363" rel="nofollow">1.3.3</a> yesterday
***</li>
</ul>

<h3><a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" rel="nofollow">FreeBSD after-install security tasks</a></h3>

<ul>
<li>A number of people have written in to ask us &quot;how do I secure my BSD box after I install it?&quot;</li>
<li>With this blog post, hopefully most of their questions will finally be answered in detail</li>
<li>It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things</li>
<li>Not only does it just list things to do, but the post also does a good job of explaining why you should do them</li>
<li>Maybe we&#39;ll see some more posts in this series in the future
***</li>
</ul>

<h2>Interview - Brent Cook - <a href="mailto:bcook@openbsd.org" rel="nofollow">bcook@openbsd.org</a> / <a href="https://twitter.com/busterbcook" rel="nofollow">@busterbcook</a></h2>

<p>LibreSSL&#39;s portable version and development</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery - Storage Essentials</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a>&#39;s new book about the FreeBSD storage subsystems now has an early draft available</li>
<li>Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes</li>
<li>Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance</li>
<li>You&#39;ll get access to the completed (e)book when it&#39;s done if you buy the early draft</li>
<li>The suggested price is $8
***</li>
</ul>

<h3><a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" rel="nofollow">Why BSD and not Linux?</a></h3>

<ul>
<li>Yet another thread comes up asking why you should choose BSD over Linux or vice-versa</li>
<li>Lots of good responses from users of the various BSDs</li>
<li>Directly ripping a quote: &quot;Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is &quot;GCC free&quot;. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.&quot;</li>
<li>And &quot;Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.&quot;</li>
<li>Some other users share their switching experiences - worth a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">More g2k14 hackathon reports</a></h3>

<ul>
<li>Following up from last week&#39;s <a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">huge list</a> of hackathon reports, we have a few more</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">Landry Breuil</a> spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140728122850" rel="nofollow">Andrew Fresh</a> enjoyed his first hackathon, pushing OpenBSD&#39;s perl patches upstream and got tricked into rewriting the adduser utility in perl</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140729070721" rel="nofollow">Ted Unangst</a> did his usual &quot;teduing&quot; (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth</li>
<li>Luckily we didn&#39;t have to cover 20 new ones this time!
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" rel="nofollow">BSDTalk episode 243</a></h3>

<ul>
<li>The newest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, featuring an interview with Ingo Schwarze of the OpenBSD team</li>
<li>The main topic of discussion is mandoc, which some users might not be familiar with</li>
<li>mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it&#39;s not built by default)</li>
<li>We&#39;ll catch up to you soon, Will!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xLRQytAZ" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21AYng20n" rel="nofollow">Stephen writes in</a></li>
<li><a href="http://slexy.org/view/s2DwLRdQDS" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2E05L31BC" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s21Nmg3Jrk" rel="nofollow">Bob Beck writes in</a> - and note the &quot;Caution&quot; section that was added to <a href="http://www.libressl.org/" rel="nofollow">libressl.org</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up in this week&#39;s episode, we&#39;ll be talking with one of OpenBSD&#39;s newest developers - Brent Cook - about the portable version of LibreSSL and how it&#39;s developed. We&#39;ve also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has gotten quite a lot done this quarter</li>
<li>Changes in the way release branches are supported - major releases will get at least five years over their lifespan</li>
<li>A new automounter is in the works, hoping to replace amd (which has some issues)</li>
<li>The CAM target layer and RPC stack have gotten some major optimization and speed boosts</li>
<li>Work on ZFSGuru continues, with a large status report specifically for that</li>
<li>The report also mentioned some new committers, both source and ports</li>
<li>It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we&#39;ve already mentioned on the show</li>
<li>&quot;Foundation-sponsored work resulted in <strong>226 commits</strong> to FreeBSD over the April to June period&quot;
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724094043" rel="nofollow">A new OpenBSD HTTPD is born</a></h3>

<ul>
<li>Work has begun on a new HTTP daemon in the OpenBSD base system</li>
<li>A lot of people are <a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" rel="nofollow">asking</a> &quot;why?&quot; since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?</li>
<li>Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn&#39;t trying to be a full-featured replacement)</li>
<li>It&#39;s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter</li>
<li>This has the added benefit of the usual, easy-to-understand syntax and privilege separation </li>
<li>There&#39;s a very brief <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" rel="nofollow">man page</a> online already</li>
<li>It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs</li>
<li>Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" rel="nofollow">pkgng 1.3 announced</a></h3>

<ul>
<li>The newest version of FreeBSD&#39;s second generation <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package management system</a> has been released, with lots of new features</li>
<li>It has a new &quot;real&quot; solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)</li>
<li>Lots of the code has been sandboxed for extra security</li>
<li>You&#39;ll probably notice some new changes to the UI too, making things more user friendly</li>
<li>A few days later <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=362996" rel="nofollow">1.3.1</a> was released to fix a few small bugs, then <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363108" rel="nofollow">1.3.2</a> shortly thereafter and <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363363" rel="nofollow">1.3.3</a> yesterday
***</li>
</ul>

<h3><a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" rel="nofollow">FreeBSD after-install security tasks</a></h3>

<ul>
<li>A number of people have written in to ask us &quot;how do I secure my BSD box after I install it?&quot;</li>
<li>With this blog post, hopefully most of their questions will finally be answered in detail</li>
<li>It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things</li>
<li>Not only does it just list things to do, but the post also does a good job of explaining why you should do them</li>
<li>Maybe we&#39;ll see some more posts in this series in the future
***</li>
</ul>

<h2>Interview - Brent Cook - <a href="mailto:bcook@openbsd.org" rel="nofollow">bcook@openbsd.org</a> / <a href="https://twitter.com/busterbcook" rel="nofollow">@busterbcook</a></h2>

<p>LibreSSL&#39;s portable version and development</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery - Storage Essentials</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a>&#39;s new book about the FreeBSD storage subsystems now has an early draft available</li>
<li>Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes</li>
<li>Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance</li>
<li>You&#39;ll get access to the completed (e)book when it&#39;s done if you buy the early draft</li>
<li>The suggested price is $8
***</li>
</ul>

<h3><a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" rel="nofollow">Why BSD and not Linux?</a></h3>

<ul>
<li>Yet another thread comes up asking why you should choose BSD over Linux or vice-versa</li>
<li>Lots of good responses from users of the various BSDs</li>
<li>Directly ripping a quote: &quot;Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is &quot;GCC free&quot;. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.&quot;</li>
<li>And &quot;Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.&quot;</li>
<li>Some other users share their switching experiences - worth a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">More g2k14 hackathon reports</a></h3>

<ul>
<li>Following up from last week&#39;s <a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">huge list</a> of hackathon reports, we have a few more</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">Landry Breuil</a> spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140728122850" rel="nofollow">Andrew Fresh</a> enjoyed his first hackathon, pushing OpenBSD&#39;s perl patches upstream and got tricked into rewriting the adduser utility in perl</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140729070721" rel="nofollow">Ted Unangst</a> did his usual &quot;teduing&quot; (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth</li>
<li>Luckily we didn&#39;t have to cover 20 new ones this time!
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" rel="nofollow">BSDTalk episode 243</a></h3>

<ul>
<li>The newest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, featuring an interview with Ingo Schwarze of the OpenBSD team</li>
<li>The main topic of discussion is mandoc, which some users might not be familiar with</li>
<li>mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it&#39;s not built by default)</li>
<li>We&#39;ll catch up to you soon, Will!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xLRQytAZ" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21AYng20n" rel="nofollow">Stephen writes in</a></li>
<li><a href="http://slexy.org/view/s2DwLRdQDS" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2E05L31BC" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s21Nmg3Jrk" rel="nofollow">Bob Beck writes in</a> - and note the &quot;Caution&quot; section that was added to <a href="http://www.libressl.org/" rel="nofollow">libressl.org</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>40: AirPorts &amp; Packages</title>
  <link>https://www.bsdnow.tv/40</link>
  <guid isPermaLink="false">f9c8a284-4fd9-4c5d-9137-77062c5814b4</guid>
  <pubDate>Wed, 04 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f9c8a284-4fd9-4c5d-9137-77062c5814b4.mp3" length="52844692" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this week's episode, we'll be giving you an introductory guide on OpenBSD's ports and package system. There's also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:13:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>On this week's episode, we'll be giving you an introductory guide on OpenBSD's ports and package system. There's also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
BSDCan 2014 talks and reports, part 2 (https://www.bsdcan.org/2014/schedule/)
More presentations and trip reports are still being uploaded
Ingo Schwarze, New Trends in mandoc (https://www.youtube.com/watch?v=oifYhwTaOuw)
Vsevolod Stakhov, The Architecture of the New Solver in pkg
 (https://www.youtube.com/watch?v=3SOKFz2UUQ4)
Julio Merino, The FreeBSD Test Suite (https://www.youtube.com/watch?v=nf-bFeKaZsY)
Zbigniew Bodek, Transparent Superpages for FreeBSD on ARM (https://www.youtube.com/watch?v=s5iIKEHtbX8)
There's also a trip report from Michael Dexter (http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html) and another (very long and detailed) trip report (http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html) from our friend Warren Block (http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king) that even gives us some linkage, thanks!
***
Beyond security, getting to know OpenBSD's real purpose (https://www.youtube.com/watch?v=JrFfrrY-yOo)
Michael W Lucas (http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop) (who, we learn through this video, has been using BSD since 1986) gave a "webcast" last week, and the audio and slides are finally up
It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics
Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a "pressure cooker for ideas," briefly touches on GPL vs BSDL, their "do it right or don't do it at all" attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans
Here's a direct link to the slides (https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf)
Great presentation if you'd like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***
FreeBSD vs Linux, a comprehensive comparison (http://brioteam.com/linux-versus-freebsd-comprehensive-comparison)
Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux
This one was worth mentioning because it's very thorough in regards to how things are done behind the scenes, not just the usual technical differences
It highlights the concept of a "core team" and their role vs "contributors" and "committers" (similar to a presentation Kirk McKusick did not long ago)
While a lot of things will be the same on both platforms, you might still be asking "which one is right for me?" - this article weighs in with some points for both sides and different use cases
Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don't hate us for linking it
***
Expand FreeNAS with plugins (http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins)
One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework
With these plugins, you can greatly expand the feature set of your NAS via third party programs
This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience
Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more
It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***
Interview - Karl Lehenbauer - karl@flightaware.com (mailto:karl@flightaware.com) / @flightaware (https://twitter.com/flightaware)
FreeBSD at FlightAware, BSD history, various topics
Tutorial
Ports and packages in OpenBSD (http://www.bsdnow.tv/tutorials/ports-obsd)
News Roundup
Code review culture meets FreeBSD (http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html)
In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree
This article describes Phabricator, an open source code review system that we briefly mentioned last week
Instructions for using it are on the wiki (https://wiki.freebsd.org/CodeReview)
While not approved by the core team yet for anything official, it's in a testing phase and developers are encouraged to try it out and get their patches reviewed
Just look at that fancy interface!! (http://phabric.freebsd.org/)
***
Upcoming BSD books (http://blather.michaelwlucas.com/archives/2088)
Sneaky MWL somehow finds his way into both our headlines and the news roundup
He gives us an update on the next BSD books that he's planning to release
The plan is to release three (or so) books based on different aspects of FreeBSD's storage system(s) - GEOM, UFS, ZFS, etc.
This has the advantage of only requiring you to buy the one(s) you're specifically interested in
"When will they be released? When I'm done writing them. How much will they cost? Dunno."
It's not Absolute FreeBSD 3rd edition...
***
CARP failover and high availability on FreeBSD (https://www.youtube.com/watch?v=VjYb9mKB4jU)
If you're running a cluster or a group of servers, you should have some sort of failover in place
But the question comes up, "how do you load balance the load balancers!?"
This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying
Also mentions DNS-based load balancing as another option
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/)
This time in PCBSD land, we're getting ready for the 10.0.2 release (ISOs here) (http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/)
AppCafe got a good number of fixes, and now shows 10 random highlighted applications
EasyPBI added a "bulk" mode to create PBIs of an entire FreeBSD port category
Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***
Feedback/Questions
Paul writes in (http://slexy.org/view/s205iiKiWp)
Matt writes in (http://slexy.org/view/s2060bkTNl)
Kjell writes in (http://slexy.org/view/s2G7eMC6oP)
Paul writes in (http://slexy.org/view/s2REfzMFGK)
Tom writes in (http://slexy.org/view/s21nvJtXY6)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, flightaware, karl lehenbauer, keynote, bsdcan, 2014, webcast, beyond security, libressl, linux, bsd vs linux, freenas, plugins, jails, plex media server, plex, owncloud, tarsnap, ixsystems, code review, kyua, geom, ufs, zfs, books, absolute freebsd, carp, failover, high availability, firewalls, pf, ipfw, load balancing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be giving you an introductory guide on OpenBSD&#39;s ports and package system. There&#39;s also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports, part 2</a></h3>

<ul>
<li>More presentations and trip reports are still being uploaded</li>
<li>Ingo Schwarze, <a href="https://www.youtube.com/watch?v=oifYhwTaOuw" rel="nofollow">New Trends in mandoc</a></li>
<li>Vsevolod Stakhov, <a href="https://www.youtube.com/watch?v=3SOKFz2UUQ4" rel="nofollow">The Architecture of the New Solver in pkg
</a></li>
<li>Julio Merino, <a href="https://www.youtube.com/watch?v=nf-bFeKaZsY" rel="nofollow">The FreeBSD Test Suite</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=s5iIKEHtbX8" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>There&#39;s also a <a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html" rel="nofollow">trip report from Michael Dexter</a> and another (very long and detailed) <a href="http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html" rel="nofollow">trip report</a> from our friend <a href="http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king" rel="nofollow">Warren Block</a> that even gives us some linkage, thanks!
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=JrFfrrY-yOo" rel="nofollow">Beyond security, getting to know OpenBSD&#39;s real purpose</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W Lucas</a> (who, we learn through this video, has been using BSD since 1986) gave a &quot;webcast&quot; last week, and the audio and slides are finally up</li>
<li>It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics</li>
<li>Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a &quot;pressure cooker for ideas,&quot; briefly touches on GPL vs BSDL, their &quot;do it right or don&#39;t do it at all&quot; attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans</li>
<li>Here&#39;s a direct link to <a href="https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf" rel="nofollow">the slides</a></li>
<li>Great presentation if you&#39;d like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***</li>
</ul>

<h3><a href="http://brioteam.com/linux-versus-freebsd-comprehensive-comparison" rel="nofollow">FreeBSD vs Linux, a comprehensive comparison</a></h3>

<ul>
<li>Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux</li>
<li>This one was worth mentioning because it&#39;s very thorough in regards to how things are done behind the scenes, not just the usual technical differences</li>
<li>It highlights the concept of a &quot;core team&quot; and their role vs &quot;contributors&quot; and &quot;committers&quot; (similar to a presentation Kirk McKusick did not long ago)</li>
<li>While a lot of things will be the same on both platforms, you might still be asking &quot;which one is right for me?&quot; - this article weighs in with some points for both sides and different use cases</li>
<li>Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don&#39;t hate us for linking it
***</li>
</ul>

<h3><a href="http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins" rel="nofollow">Expand FreeNAS with plugins</a></h3>

<ul>
<li>One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework</li>
<li>With these plugins, you can greatly expand the feature set of your NAS via third party programs</li>
<li>This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience</li>
<li>Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more</li>
<li>It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***</li>
</ul>

<h2>Interview - Karl Lehenbauer - <a href="mailto:karl@flightaware.com" rel="nofollow">karl@flightaware.com</a> / <a href="https://twitter.com/flightaware" rel="nofollow">@flightaware</a></h2>

<p>FreeBSD at FlightAware, BSD history, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">Ports and packages in OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html" rel="nofollow">Code review culture meets FreeBSD</a></h3>

<ul>
<li>In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree</li>
<li>This article describes Phabricator, an open source code review system that we briefly mentioned last week</li>
<li>Instructions for using it are on <a href="https://wiki.freebsd.org/CodeReview" rel="nofollow">the wiki</a></li>
<li>While not approved by the core team yet for anything official, it&#39;s in a testing phase and developers are encouraged to try it out and get their patches reviewed</li>
<li><a href="http://phabric.freebsd.org/" rel="nofollow">Just look at that fancy interface!!</a>
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2088" rel="nofollow">Upcoming BSD books</a></h3>

<ul>
<li>Sneaky MWL somehow finds his way into both our headlines and the news roundup</li>
<li>He gives us an update on the next BSD books that he&#39;s planning to release</li>
<li>The plan is to release three (or so) books based on different aspects of FreeBSD&#39;s storage system(s) - GEOM, UFS, ZFS, etc.</li>
<li>This has the advantage of only requiring you to buy the one(s) you&#39;re specifically interested in</li>
<li>&quot;When will they be released? When I&#39;m done writing them. How much will they cost? Dunno.&quot;</li>
<li>It&#39;s not Absolute FreeBSD 3rd edition...
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=VjYb9mKB4jU" rel="nofollow">CARP failover and high availability on FreeBSD</a></h3>

<ul>
<li>If you&#39;re running a cluster or a group of servers, you should have some sort of failover in place</li>
<li>But the question comes up, &quot;how do you load balance the load balancers!?&quot;</li>
<li>This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying</li>
<li>Also mentions DNS-based load balancing as another option
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time in PCBSD land, we&#39;re getting ready for the 10.0.2 release <a href="http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/" rel="nofollow">(ISOs here)</a></li>
<li>AppCafe got a good number of fixes, and now shows 10 random highlighted applications</li>
<li>EasyPBI added a &quot;bulk&quot; mode to create PBIs of an entire FreeBSD port category</li>
<li>Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205iiKiWp" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s2060bkTNl" rel="nofollow">Matt writes in</a></li>
<li><a href="http://slexy.org/view/s2G7eMC6oP" rel="nofollow">Kjell writes in</a></li>
<li><a href="http://slexy.org/view/s2REfzMFGK" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s21nvJtXY6" rel="nofollow">Tom writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be giving you an introductory guide on OpenBSD&#39;s ports and package system. There&#39;s also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports, part 2</a></h3>

<ul>
<li>More presentations and trip reports are still being uploaded</li>
<li>Ingo Schwarze, <a href="https://www.youtube.com/watch?v=oifYhwTaOuw" rel="nofollow">New Trends in mandoc</a></li>
<li>Vsevolod Stakhov, <a href="https://www.youtube.com/watch?v=3SOKFz2UUQ4" rel="nofollow">The Architecture of the New Solver in pkg
</a></li>
<li>Julio Merino, <a href="https://www.youtube.com/watch?v=nf-bFeKaZsY" rel="nofollow">The FreeBSD Test Suite</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=s5iIKEHtbX8" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>There&#39;s also a <a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html" rel="nofollow">trip report from Michael Dexter</a> and another (very long and detailed) <a href="http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html" rel="nofollow">trip report</a> from our friend <a href="http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king" rel="nofollow">Warren Block</a> that even gives us some linkage, thanks!
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=JrFfrrY-yOo" rel="nofollow">Beyond security, getting to know OpenBSD&#39;s real purpose</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W Lucas</a> (who, we learn through this video, has been using BSD since 1986) gave a &quot;webcast&quot; last week, and the audio and slides are finally up</li>
<li>It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics</li>
<li>Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a &quot;pressure cooker for ideas,&quot; briefly touches on GPL vs BSDL, their &quot;do it right or don&#39;t do it at all&quot; attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans</li>
<li>Here&#39;s a direct link to <a href="https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf" rel="nofollow">the slides</a></li>
<li>Great presentation if you&#39;d like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***</li>
</ul>

<h3><a href="http://brioteam.com/linux-versus-freebsd-comprehensive-comparison" rel="nofollow">FreeBSD vs Linux, a comprehensive comparison</a></h3>

<ul>
<li>Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux</li>
<li>This one was worth mentioning because it&#39;s very thorough in regards to how things are done behind the scenes, not just the usual technical differences</li>
<li>It highlights the concept of a &quot;core team&quot; and their role vs &quot;contributors&quot; and &quot;committers&quot; (similar to a presentation Kirk McKusick did not long ago)</li>
<li>While a lot of things will be the same on both platforms, you might still be asking &quot;which one is right for me?&quot; - this article weighs in with some points for both sides and different use cases</li>
<li>Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don&#39;t hate us for linking it
***</li>
</ul>

<h3><a href="http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins" rel="nofollow">Expand FreeNAS with plugins</a></h3>

<ul>
<li>One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework</li>
<li>With these plugins, you can greatly expand the feature set of your NAS via third party programs</li>
<li>This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience</li>
<li>Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more</li>
<li>It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***</li>
</ul>

<h2>Interview - Karl Lehenbauer - <a href="mailto:karl@flightaware.com" rel="nofollow">karl@flightaware.com</a> / <a href="https://twitter.com/flightaware" rel="nofollow">@flightaware</a></h2>

<p>FreeBSD at FlightAware, BSD history, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">Ports and packages in OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html" rel="nofollow">Code review culture meets FreeBSD</a></h3>

<ul>
<li>In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree</li>
<li>This article describes Phabricator, an open source code review system that we briefly mentioned last week</li>
<li>Instructions for using it are on <a href="https://wiki.freebsd.org/CodeReview" rel="nofollow">the wiki</a></li>
<li>While not approved by the core team yet for anything official, it&#39;s in a testing phase and developers are encouraged to try it out and get their patches reviewed</li>
<li><a href="http://phabric.freebsd.org/" rel="nofollow">Just look at that fancy interface!!</a>
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2088" rel="nofollow">Upcoming BSD books</a></h3>

<ul>
<li>Sneaky MWL somehow finds his way into both our headlines and the news roundup</li>
<li>He gives us an update on the next BSD books that he&#39;s planning to release</li>
<li>The plan is to release three (or so) books based on different aspects of FreeBSD&#39;s storage system(s) - GEOM, UFS, ZFS, etc.</li>
<li>This has the advantage of only requiring you to buy the one(s) you&#39;re specifically interested in</li>
<li>&quot;When will they be released? When I&#39;m done writing them. How much will they cost? Dunno.&quot;</li>
<li>It&#39;s not Absolute FreeBSD 3rd edition...
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=VjYb9mKB4jU" rel="nofollow">CARP failover and high availability on FreeBSD</a></h3>

<ul>
<li>If you&#39;re running a cluster or a group of servers, you should have some sort of failover in place</li>
<li>But the question comes up, &quot;how do you load balance the load balancers!?&quot;</li>
<li>This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying</li>
<li>Also mentions DNS-based load balancing as another option
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time in PCBSD land, we&#39;re getting ready for the 10.0.2 release <a href="http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/" rel="nofollow">(ISOs here)</a></li>
<li>AppCafe got a good number of fixes, and now shows 10 random highlighted applications</li>
<li>EasyPBI added a &quot;bulk&quot; mode to create PBIs of an entire FreeBSD port category</li>
<li>Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205iiKiWp" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s2060bkTNl" rel="nofollow">Matt writes in</a></li>
<li><a href="http://slexy.org/view/s2G7eMC6oP" rel="nofollow">Kjell writes in</a></li>
<li><a href="http://slexy.org/view/s2REfzMFGK" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s21nvJtXY6" rel="nofollow">Tom writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>36: Let's Get RAID</title>
  <link>https://www.bsdnow.tv/36</link>
  <guid isPermaLink="false">485b12e9-ea67-4bc6-9709-4b0e38a76184</guid>
  <pubDate>Wed, 07 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/485b12e9-ea67-4bc6-9709-4b0e38a76184.mp3" length="65368948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;
Headlines
OpenBSD 5.5 released (http://www.openbsd.org/55.html)
If you ordered (https://https.openbsd.org/cgi-bin/order) a CD set (https://twitter.com/blakkheim/status/461909893813784576) then you've probably had it for a little while already, but OpenBSD has formally announced the public release (http://undeadly.org/cgi?action=article&amp;amp;sid=20140501153339) of 5.5
This is one of the biggest releases to date, with a very long list of changes and improvements
Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more
The full list of changes (http://www.openbsd.org/plus55.html) is HUGE, be sure to read through it all if you're interested in the details
If you're doing an upgrade from 5.4 instead of a fresh install, pay careful attention to the upgrade guide (http://www.openbsd.org/faq/upgrade55.html) as there are some very specific steps for this version
Also be sure to apply the errata patches (http://www.openbsd.org/errata55.html) on your new installations... especially those OpenSSL ones (some of which still aren't fixed (http://marc.info/?l=oss-security&amp;amp;m=139906348230995&amp;amp;w=2) in the other BSDs yet)
On the topic of errata patches, the project is now going to also send them out (signed (http://undeadly.org/cgi?action=article&amp;amp;sid=20140502103355)) via the announce mailing list (http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&amp;amp;passw=&amp;amp;func=lists-long-full&amp;amp;extra=announce), a very welcome change
Congrats to the whole team on this great release - 5.6 is going to be even more awesome with "Libre"SSL and lots of other stuff that's currently in development
***
FreeBSD foundation funding highlights (http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html)
The FreeBSD foundation posts a new update on how they're spending the money that everyone donates
"As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we've done to help FreeBSD become the most innovative, reliable, and high-performance operation system"
During this spring, they want to highlight the new UEFI boot support and newcons (http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html)
There's a lot of details about what exactly UEFI is and why we need it going forward
FreeBSD has also needed some updates to its console to support UTF8 and wide characters
Hopefully this series will continue and we'll get to see what other work is being sponsored
***
OpenSSH without OpenSSL (http://marc.info/?l=openbsd-cvs&amp;amp;m=139879453001957&amp;amp;w=2)
The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional
Since it won't have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security
This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the new combination (http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain) of the Chacha20 stream cipher with Poly1305 for packet integrity
Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs
No support for RSA, DSA or ECDSA public keys - only Ed25519
It also includes a new buffer API (http://marc.info/?l=openbsd-cvs&amp;amp;m=139883582313750&amp;amp;w=2) and a set of wrappers to make it compatible with the existing API
Believe it or not, this was planned before all the heartbleed craziness
Maybe someday soon we'll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***
BSDMag's April 2014 issue is out (http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue)
The free monthly BSD magazine has got a new issue available for download
This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online
Anyone can contribute to the magazine, just send the editors an email about what you want to write
No Linux articles this time around, good
***
Interview - David Chisnall - theraven@freebsd.org (mailto:theraven@freebsd.org)
The LLVM/Clang switch, FreeBSD's core team, various topics
Tutorial
RAID in FreeBSD and OpenBSD (http://www.bsdnow.tv/tutorials/raid)
News Roundup
BSDTalk episode 240 (http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html)
Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time
Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more
GNN also talks a little about the Precision Time Protocol (https://en.wikipedia.org/wiki/Precision_Time_Protocol) and how it's different than NTP
Two people (http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates) we've interviewed (http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk) talking to each other, awesome
If you're interested in NTP, be sure to see our tutorial (http://www.bsdnow.tv/tutorials/ntpd) too
***
m2k14 trip reports (http://undeadly.org/cgi?action=article&amp;amp;sid=20140502092427)
We've got a few more reports from the recent OpenBSD hackathon in Morocco
The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the OpenBSD desktop tutorial (http://www.bsdnow.tv/tutorials/the-desktop-obsd))
"Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do"
He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports' compatibility with LibreSSL
Speaking of LibreSSL, there's an article (http://undeadly.org/cgi?action=article&amp;amp;sid=20140505062023) all would-be portable version writers should probably read and take into consideration
Jasper Adriaanse also writes (http://undeadly.org/cgi?action=article&amp;amp;sid=20140501185019) about what he got done over there
He cleaned up and fixed the puppet port to work better with OpenBSD
***
Why you should use FreeBSD on your cloud VPS (https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/)
Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD
Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows
The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options
The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/)
Big changes coming in the way PCBSD manages software
The PBI system, AppCafe and related tools are all going to use pkgng now
The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree
New rating system coming soon and much more
***
Feedback/Questions
Martin writes in (http://slexy.org/view/s21bk2oPuQ)
John writes in (http://slexy.org/view/s2n9fx1Rpw)
Alex writes in (http://slexy.org/view/s2rBBKLA4u)
Goetz writes in (http://slexy.org/view/s20JY6ZI71)
Jarrad writes in (http://slexy.org/view/s20YV5Ohpa)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, theraven, david chisnall, core, core team, clang, gcc, llvm, raid, stripe, mirror, bioctl, gstripe, zfs, gmirror, graid, ufs, ffs, disks, the worst pun i've done so far, i regret this already, redundancy, raid0, raid1, raid5, raidz, raid-z, filesystem, 5.5, pie, aslr, cd set, demo, tour, opensmtpd, pf, gnome, gnome3, marcusports, ports, router, signify, hackathon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>22: Journaled News-Updates</title>
  <link>https://www.bsdnow.tv/22</link>
  <guid isPermaLink="false">e49b46fd-a367-451d-819a-544b35fc4f89</guid>
  <pubDate>Wed, 29 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e49b46fd-a367-451d-819a-544b35fc4f89.mp3" length="64949427" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it's all about. After that, we've got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>This time on the show, we'll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it's all about. After that, we've got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.
This episode was brought to you by
&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;
Headlines
FreeBSD quarterly status report (https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/077085.html)
Gabor Pali sent out the October-December 2013 status report to get everyone up to date on what's going on
The report contains 37 entries and is very very long... various reports from all the different teams under the FreeBSD umbrella, probably too many to even list in the show notes
Lots of work going on in the ARM world, EC2/Xen and Google Compute Engine are also improving
Secure boot support hopefully coming by mid-year (www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year)
There's quite a bit going on in the FreeBSD world, many projects happening at the same time
***
n2k14 OpenBSD Hackathon Report (http://undeadly.org/cgi?action=article&amp;amp;sid=20140124142027)
Recently, OpenBSD held one of their hackathons (http://www.openbsd.org/hackathons.html) in New Zealand
15 developers gathered there to sit in a room and write code for a few days
Philip Guenther brings back a nice report of the event
If you've been watching the -current CVS logs, you've seen the flood of commits just from this event alone
Fixes with threading, Linux compat, ACPI, and various other things - some will make it into 5.5 and others need more testing
Another report from Theo (http://undeadly.org/cgi?action=article&amp;amp;sid=20140127083112) details his work
Updates to the random subsystem, some work-in-progress pf fixes, suspend/resume fixes and more signing stuff
***
Four new NetBSD releases (https://blog.netbsd.org/tnf/entry/netbsd_6_1_3_netbsd)
NetBSD released versions 6.1.3, 6.0.4, 5.2.2 and 5.1.4
These updates include lots of bug fixes and some security updates, not focused on new features
You can upgrade depending on what branch you're currently on
Confused about the different branches? See this graph. (https://www.netbsd.org/releases/release-map.html#graph1)
***
The future of open source ZFS development  (http://sites.ieee.org/scv-cs/archives/openzfs-future-open-source-zfs-development)
On February 11, 2014, Matt Ahrens will be giving a presentation about ZFS
The talk will be about the future of ZFS and the open source development since Oracle closed the code
It's in San Jose, California - go if you can!
***
Interview - George Neville-Neil - gnn@freebsd.org (mailto:gnn@freebsd.org) / @gvnn3 (https://twitter.com/gvnn3)
The FreeBSD Journal (http://freebsdjournal.com/)
Tutorial
Tracking -STABLE and -CURRENT (OpenBSD) (http://www.bsdnow.tv/tutorials/stable-current-obsd)
News Roundup
pfSense news and 2.1.1 snapshots (https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes)
pfSense has some snapshots available for the upcoming 2.1.1 release
They include FreeBSD security fixes as well as some other updates
There are recordings posted (https://blog.pfsense.org/?p=1198) of some of the previous hangouts
Unfortunately they're only for subscribers, so you'll have to wait until next month when we have Chris on the show to talk about pfSense!
***
FreeBSD on Google Compute Engine (https://groups.google.com/forum/#!msg/gce-discussion/YWoa3Aa_49U/FYAg9oiRlLUJ)
Recently we mentioned some posts about getting OpenBSD to run on GCE, here's the FreeBSD version
Nice big fat warning: "The team has put together a best-effort posting that will get most, if not all, of you up and running. That being said, we need to remind you that FreeBSD is being supported on Google Compute Engine by the community. The instructions are being provided as-is and without warranty."
Their instructions are a little too Linuxy (assuming wget, etc.) for our taste, someone should probably get it updated!
Other than that it's a pretty good set of instructions on how to get up and running
***
Dragonfly ACPI update (http://www.shiningsilence.com/dbsdlog/2014/01/22/13225.html)
Sascha Wildner committed some new ACPI code (http://lists.dragonflybsd.org/pipermail/commits/2014-January/199071.html)
There's also a "heads up" to update your BIOS (http://lists.dragonflybsd.org/pipermail/users/2014-January/090504.html) if you experience problems
Check the mailing list post for all the details
***
PCBSD weekly digest (http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-6/)
10.0-RC4 users need to upgrade all their packages for 10.0-RC5
PBIs needed to be rebuilt.. actually everything did
Help test GNOME 3 so we can get it in the official ports tree
By the way, I think Kris has an announcement - PCBSD 10.0 is out!
***
Feedback/Questions
Tony writes in (http://slexy.org/view/s21ZlfOdTt)
Jeff writes in (http://slexy.org/view/s2BFZ68Na5)
Remy writes in (http://slexy.org/view/s20epArsQI)
Nils writes in (http://slexy.org/view/s213CoNvLt)
Solomon writes in (http://slexy.org/view/s21XWnThNS)
*** 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, freebsd journal, journal, news, stable, current, cvs, anoncvs, branch, update, upgrade, binary, buildworld, make build, release engineering, ufs, ffs, gce, google compute engine, openzfs, zfs, matt ahrens, uefi, efi, secureboot, secure boot, acpi, pfsense, poudriere, hackathon, new zealand, n2k14, george neville-neil, gnn, nycbsdcon, nyc, convention, conference</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it&#39;s all about. After that, we&#39;ve got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/077085.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>Gabor Pali sent out the October-December 2013 status report to get everyone up to date on what&#39;s going on</li>
<li>The report contains 37 entries and is very very long... various reports from all the different teams under the FreeBSD umbrella, probably too many to even list in the show notes</li>
<li>Lots of work going on in the ARM world, EC2/Xen and Google Compute Engine are also improving</li>
<li>Secure boot support hopefully coming [by mid-year](<a href="http://www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year" rel="nofollow">www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year</a>)</li>
<li>There&#39;s quite a bit going on in the FreeBSD world, many projects happening at the same time
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140124142027" rel="nofollow">n2k14 OpenBSD Hackathon Report</a></h3>

<ul>
<li>Recently, OpenBSD held one of <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">their hackathons</a> in New Zealand</li>
<li>15 developers gathered there to sit in a room and write code for a few days</li>
<li>Philip Guenther brings back a nice report of the event</li>
<li>If you&#39;ve been watching the -current CVS logs, you&#39;ve seen the flood of commits just from this event alone</li>
<li>Fixes with threading, Linux compat, ACPI, and various other things - some will make it into 5.5 and others need more testing</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140127083112" rel="nofollow">Another report from Theo</a> details his work</li>
<li>Updates to the random subsystem, some work-in-progress pf fixes, suspend/resume fixes and more signing stuff
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_3_netbsd" rel="nofollow">Four new NetBSD releases</a></h3>

<ul>
<li>NetBSD released versions 6.1.3, 6.0.4, 5.2.2 and 5.1.4</li>
<li>These updates include lots of bug fixes and some security updates, not focused on new features</li>
<li>You can upgrade depending on what branch you&#39;re currently on</li>
<li>Confused about the different branches? <a href="https://www.netbsd.org/releases/release-map.html#graph1" rel="nofollow">See this graph.</a>
***</li>
</ul>

<h3><a href="http://sites.ieee.org/scv-cs/archives/openzfs-future-open-source-zfs-development" rel="nofollow">The future of open source ZFS development </a></h3>

<ul>
<li>On February 11, 2014, Matt Ahrens will be giving a presentation about ZFS</li>
<li>The talk will be about the future of ZFS and the open source development since Oracle closed the code</li>
<li>It&#39;s in San Jose, California - go if you can!
***</li>
</ul>

<h2>Interview - George Neville-Neil - <a href="mailto:gnn@freebsd.org" rel="nofollow">gnn@freebsd.org</a> / <a href="https://twitter.com/gvnn3" rel="nofollow">@gvnn3</a></h2>

<p><a href="http://freebsdjournal.com/" rel="nofollow">The FreeBSD Journal</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-current-obsd" rel="nofollow">Tracking -STABLE and -CURRENT (OpenBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense news and 2.1.1 snapshots</a></h3>

<ul>
<li>pfSense has some snapshots available for the upcoming 2.1.1 release</li>
<li>They include FreeBSD security fixes as well as some other updates</li>
<li>There are <a href="https://blog.pfsense.org/?p=1198" rel="nofollow">recordings posted</a> of some of the previous hangouts</li>
<li>Unfortunately they&#39;re only for subscribers, so you&#39;ll have to wait until next month when we have Chris on the show to talk about pfSense!
***</li>
</ul>

<h3><a href="https://groups.google.com/forum/#!msg/gce-discussion/YWoa3Aa_49U/FYAg9oiRlLUJ" rel="nofollow">FreeBSD on Google Compute Engine</a></h3>

<ul>
<li>Recently we mentioned some posts about getting OpenBSD to run on GCE, here&#39;s the FreeBSD version</li>
<li>Nice big fat warning: &quot;The team has put together a best-effort posting that will get most, if not all, of you up and running. That being said, we need to remind you that FreeBSD is being supported on Google Compute Engine by the community. The instructions are being provided as-is and without warranty.&quot;</li>
<li>Their instructions are a little too Linuxy (assuming wget, etc.) for our taste, someone should probably get it updated!</li>
<li>Other than that it&#39;s a pretty good set of instructions on how to get up and running
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/01/22/13225.html" rel="nofollow">Dragonfly ACPI update</a></h3>

<ul>
<li>Sascha Wildner committed some <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-January/199071.html" rel="nofollow">new ACPI code</a></li>
<li>There&#39;s also a &quot;heads up&quot; to <a href="http://lists.dragonflybsd.org/pipermail/users/2014-January/090504.html" rel="nofollow">update your BIOS</a> if you experience problems</li>
<li>Check the mailing list post for all the details
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-6/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 users need to upgrade all their packages for 10.0-RC5</li>
<li>PBIs needed to be rebuilt.. actually everything did</li>
<li>Help test GNOME 3 so we can get it in the official ports tree</li>
<li>By the way, I think Kris has an announcement - PCBSD 10.0 is out!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21ZlfOdTt" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s2BFZ68Na5" rel="nofollow">Jeff writes in</a></li>
<li><a href="http://slexy.org/view/s20epArsQI" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s213CoNvLt" rel="nofollow">Nils writes in</a></li>
<li><a href="http://slexy.org/view/s21XWnThNS" rel="nofollow">Solomon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it&#39;s all about. After that, we&#39;ve got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/077085.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>Gabor Pali sent out the October-December 2013 status report to get everyone up to date on what&#39;s going on</li>
<li>The report contains 37 entries and is very very long... various reports from all the different teams under the FreeBSD umbrella, probably too many to even list in the show notes</li>
<li>Lots of work going on in the ARM world, EC2/Xen and Google Compute Engine are also improving</li>
<li>Secure boot support hopefully coming [by mid-year](<a href="http://www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year" rel="nofollow">www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year</a>)</li>
<li>There&#39;s quite a bit going on in the FreeBSD world, many projects happening at the same time
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140124142027" rel="nofollow">n2k14 OpenBSD Hackathon Report</a></h3>

<ul>
<li>Recently, OpenBSD held one of <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">their hackathons</a> in New Zealand</li>
<li>15 developers gathered there to sit in a room and write code for a few days</li>
<li>Philip Guenther brings back a nice report of the event</li>
<li>If you&#39;ve been watching the -current CVS logs, you&#39;ve seen the flood of commits just from this event alone</li>
<li>Fixes with threading, Linux compat, ACPI, and various other things - some will make it into 5.5 and others need more testing</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140127083112" rel="nofollow">Another report from Theo</a> details his work</li>
<li>Updates to the random subsystem, some work-in-progress pf fixes, suspend/resume fixes and more signing stuff
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_3_netbsd" rel="nofollow">Four new NetBSD releases</a></h3>

<ul>
<li>NetBSD released versions 6.1.3, 6.0.4, 5.2.2 and 5.1.4</li>
<li>These updates include lots of bug fixes and some security updates, not focused on new features</li>
<li>You can upgrade depending on what branch you&#39;re currently on</li>
<li>Confused about the different branches? <a href="https://www.netbsd.org/releases/release-map.html#graph1" rel="nofollow">See this graph.</a>
***</li>
</ul>

<h3><a href="http://sites.ieee.org/scv-cs/archives/openzfs-future-open-source-zfs-development" rel="nofollow">The future of open source ZFS development </a></h3>

<ul>
<li>On February 11, 2014, Matt Ahrens will be giving a presentation about ZFS</li>
<li>The talk will be about the future of ZFS and the open source development since Oracle closed the code</li>
<li>It&#39;s in San Jose, California - go if you can!
***</li>
</ul>

<h2>Interview - George Neville-Neil - <a href="mailto:gnn@freebsd.org" rel="nofollow">gnn@freebsd.org</a> / <a href="https://twitter.com/gvnn3" rel="nofollow">@gvnn3</a></h2>

<p><a href="http://freebsdjournal.com/" rel="nofollow">The FreeBSD Journal</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-current-obsd" rel="nofollow">Tracking -STABLE and -CURRENT (OpenBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense news and 2.1.1 snapshots</a></h3>

<ul>
<li>pfSense has some snapshots available for the upcoming 2.1.1 release</li>
<li>They include FreeBSD security fixes as well as some other updates</li>
<li>There are <a href="https://blog.pfsense.org/?p=1198" rel="nofollow">recordings posted</a> of some of the previous hangouts</li>
<li>Unfortunately they&#39;re only for subscribers, so you&#39;ll have to wait until next month when we have Chris on the show to talk about pfSense!
***</li>
</ul>

<h3><a href="https://groups.google.com/forum/#!msg/gce-discussion/YWoa3Aa_49U/FYAg9oiRlLUJ" rel="nofollow">FreeBSD on Google Compute Engine</a></h3>

<ul>
<li>Recently we mentioned some posts about getting OpenBSD to run on GCE, here&#39;s the FreeBSD version</li>
<li>Nice big fat warning: &quot;The team has put together a best-effort posting that will get most, if not all, of you up and running. That being said, we need to remind you that FreeBSD is being supported on Google Compute Engine by the community. The instructions are being provided as-is and without warranty.&quot;</li>
<li>Their instructions are a little too Linuxy (assuming wget, etc.) for our taste, someone should probably get it updated!</li>
<li>Other than that it&#39;s a pretty good set of instructions on how to get up and running
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/01/22/13225.html" rel="nofollow">Dragonfly ACPI update</a></h3>

<ul>
<li>Sascha Wildner committed some <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-January/199071.html" rel="nofollow">new ACPI code</a></li>
<li>There&#39;s also a &quot;heads up&quot; to <a href="http://lists.dragonflybsd.org/pipermail/users/2014-January/090504.html" rel="nofollow">update your BIOS</a> if you experience problems</li>
<li>Check the mailing list post for all the details
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-6/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 users need to upgrade all their packages for 10.0-RC5</li>
<li>PBIs needed to be rebuilt.. actually everything did</li>
<li>Help test GNOME 3 so we can get it in the official ports tree</li>
<li>By the way, I think Kris has an announcement - PCBSD 10.0 is out!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21ZlfOdTt" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s2BFZ68Na5" rel="nofollow">Jeff writes in</a></li>
<li><a href="http://slexy.org/view/s20epArsQI" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s213CoNvLt" rel="nofollow">Nils writes in</a></li>
<li><a href="http://slexy.org/view/s21XWnThNS" rel="nofollow">Solomon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
