<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Thu, 07 May 2026 00:28:06 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “X11”</title>
    <link>https://www.bsdnow.tv/tags/x11</link>
    <pubDate>Thu, 09 Sep 2021 03:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>419: Rethinking OS installs</title>
  <link>https://www.bsdnow.tv/419</link>
  <guid isPermaLink="false">4fb1ef2f-3915-403b-9687-47451b3339a9</guid>
  <pubDate>Thu, 09 Sep 2021 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4fb1ef2f-3915-403b-9687-47451b3339a9.mp3" length="33694320" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.</itunes:subtitle>
  <itunes:duration>51:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;NOTES&lt;/em&gt;&lt;/strong&gt;&lt;br&gt;
This episode of BSDNow is brought to you by &lt;a href="https://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://briancallahan.net/blog/20210802.html" target="_blank" rel="nofollow noopener"&gt;Reviewing my first OpenBSD port, and what I'd do differently 10 years later&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://raymii.org/s/articles/NetBSD_on_QEMU_Alpha.html" target="_blank" rel="nofollow noopener"&gt;Install NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://hackaday.com/2021/08/10/freebsd-experiment-rethinks-the-os-install/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Experiment Rethinks the OS Install&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.ghostbsd.org/rc_switch" target="_blank" rel="nofollow noopener"&gt;The switch to FreeBSD rc.d is coming&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://forums.irixnet.org/thread-3043.html" target="_blank" rel="nofollow noopener"&gt;Irix gets LLVM&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Tarsnap&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Miceal%20-%20a%20few%20questions.md" target="_blank" rel="nofollow noopener"&gt;Miceal - a few questions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Nelson%20-%20dummynet.md" target="_blank" rel="nofollow noopener"&gt;Nelson - dummynet&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, operating system, open source, shell, unix, os, berkeley, software, distribution, release, zfs, zpool, dataset, interview, ports, packages, port, review, done differently, learning, retrospect, DEC, alpha cpu, qemu, x11, os install, rethink, ghostbsd, rc.d, irix, llvm </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://briancallahan.net/blog/20210802.html" rel="nofollow">Reviewing my first OpenBSD port, and what I&#39;d do differently 10 years later</a></h3>

<hr>

<h3><a href="https://raymii.org/s/articles/NetBSD_on_QEMU_Alpha.html" rel="nofollow">Install NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://hackaday.com/2021/08/10/freebsd-experiment-rethinks-the-os-install/" rel="nofollow">FreeBSD Experiment Rethinks the OS Install</a></h3>

<hr>

<h3><a href="https://www.ghostbsd.org/rc_switch" rel="nofollow">The switch to FreeBSD rc.d is coming</a></h3>

<hr>

<h3><a href="https://forums.irixnet.org/thread-3043.html" rel="nofollow">Irix gets LLVM</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Miceal%20-%20a%20few%20questions.md" rel="nofollow">Miceal - a few questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Nelson%20-%20dummynet.md" rel="nofollow">Nelson - dummynet</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Reviewing a first OpenBSD port, NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11, FreeBSD Experiment Rethinks the OS Install, GhostBSD switching to FreeBSD rc.d, Irix gets LLVM, and more.</p>

<p><strong><em>NOTES</em></strong><br>
This episode of BSDNow is brought to you by <a href="https://www.tarsnap.com/bsdnow" rel="nofollow">Tarsnap</a></p>

<h2>Headlines</h2>

<h3><a href="https://briancallahan.net/blog/20210802.html" rel="nofollow">Reviewing my first OpenBSD port, and what I&#39;d do differently 10 years later</a></h3>

<hr>

<h3><a href="https://raymii.org/s/articles/NetBSD_on_QEMU_Alpha.html" rel="nofollow">Install NetBSD 9.2 on a DEC Alpha CPU in QEMU with X11</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://hackaday.com/2021/08/10/freebsd-experiment-rethinks-the-os-install/" rel="nofollow">FreeBSD Experiment Rethinks the OS Install</a></h3>

<hr>

<h3><a href="https://www.ghostbsd.org/rc_switch" rel="nofollow">The switch to FreeBSD rc.d is coming</a></h3>

<hr>

<h3><a href="https://forums.irixnet.org/thread-3043.html" rel="nofollow">Irix gets LLVM</a></h3>

<hr>

<h3>Tarsnap</h3>

<ul>
<li>This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups.</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Miceal%20-%20a%20few%20questions.md" rel="nofollow">Miceal - a few questions</a></li>
<li><a href="https://github.com/BSDNow/bsdnow.tv/blob/master/episodes/419/feedback/Nelson%20-%20dummynet.md" rel="nofollow">Nelson - dummynet</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>345: Switchers to BSD</title>
  <link>https://www.bsdnow.tv/345</link>
  <guid isPermaLink="false">c46952e4-8ea3-4506-b4eb-54f2870547ee</guid>
  <pubDate>Thu, 09 Apr 2020 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c46952e4-8ea3-4506-b4eb-54f2870547ee.mp3" length="34426694" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>NetBSD 8.2 is available, NextCloud on OpenBSD, X11 screen locking, NetBSD and RISC OS running parallel, community feedback about switching to BSD, and more.</itunes:subtitle>
  <itunes:duration>47:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;NetBSD 8.2 is available, NextCloud on OpenBSD, X11 screen locking, NetBSD and RISC OS running parallel, community feedback about switching to BSD, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/netbsd_8_2_is_available" target="_blank" rel="nofollow noopener"&gt;NetBSD 8.2 is available!&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; The third release in the NetBSD-8 is now available.&lt;/p&gt;

&lt;p&gt;&amp;gt; This release includes all the security fixes in NetBSD-8 up until this point, and other fixes deemed important for stability.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Some highlights include:

&lt;ul&gt;
&lt;li&gt;x86: fixed regression in booting old CPUs&lt;/li&gt;
&lt;li&gt;x86: Hyper-V Gen.2 VM framebuffer support&lt;/li&gt;
&lt;li&gt;httpd(8): fixed various security issues&lt;/li&gt;
&lt;li&gt;ixg(4): various fixes / improvements&lt;/li&gt;
&lt;li&gt;x86 efiboot: add tftp support, fix issues on machines with many memory segments, improve graphics mode logic to work on more machines.&lt;/li&gt;
&lt;li&gt;Various kernel memory info leaks fixes&lt;/li&gt;
&lt;li&gt;Update expat to 2.2.8&lt;/li&gt;
&lt;li&gt;Fix ryzen USB issues and support xHCI version 3.10.&lt;/li&gt;
&lt;li&gt;Accept root device specification as NAME=label.&lt;/li&gt;
&lt;li&gt;Add multiboot 2 support to x86 bootloaders.&lt;/li&gt;
&lt;li&gt;Fix for CVE-2019-9506: 'Key Negotiation of Bluetooth' attack.&lt;/li&gt;
&lt;li&gt;nouveau: limit the supported devices and fix firmware loading.&lt;/li&gt;
&lt;li&gt;radeon: fix loading of the TAHITI VCE firmware.&lt;/li&gt;
&lt;li&gt;named(8): stop using obsolete dnssec-lookaside.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://h3artbl33d.nl/2020-nextcloud.html" target="_blank" rel="nofollow noopener"&gt;NextCloud on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; NextCloud and OpenBSD are complementary to one another. NextCloud is an awesome, secure and private alternative for proprietary platforms, whereas OpenBSD forms the most secure and solid foundation to serve it on. Setting it up in the best way isn’t hard, especially using this step by step tutorial.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Preface&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Back when this tutorial was initially written, things were different. The OpenBSD port relied on PHP 5.6 and there were no package updates. But the port improved (hats off, Gonzalo!) and package updates were introduced to the -stable branch (hats off, Solene!).&lt;/p&gt;

&lt;p&gt;&amp;gt; A rewrite of this tutorial was long overdue. Right now, it is written for 6.6 -stable and will be updated once 6.7 is released. If you have any questions or desire some help, feel free to reach out.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://leahneukirchen.org/blog/archive/2020/01/x11-screen-locking-a-secure-and-modular-approach.html" target="_blank" rel="nofollow noopener"&gt;X11 screen locking: a secure and modular approach&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; For years I’ve been using XScreenSaver as a default, but I recently learned about xsecurelock and re-evaluated my screen-saving requirements&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.update.uu.se/%7Emicken/ronetbsd.html" target="_blank" rel="nofollow noopener"&gt;NetBSD and RISC OS running parallel&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I have been experimenting with running two systems at the same time on the RK3399 SoC.&lt;br&gt;
&amp;gt; It all begun when I figured out how to switch to the A72 cpu for RISC OS. When the switch was done, the A53 cpu just continued to execute code.&lt;br&gt;
&amp;gt; OK I thought why not give it something to do!&lt;br&gt;
&amp;gt; My first step was to run some small programs.&lt;br&gt;
&amp;gt; It worked!&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Thanks to Tom Jones for the pointer to this article&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;Several weeks ago we covered a story about switching from Linux to BSD.  Benedict and JT asked for community feedback as to their thoughts on the matter.  Allan was out that week, so this will give him an opportunity to chime in with his thoughts as well.&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Jamie - &lt;a href="http://dpaste.com/0CH1YXQ#wrap" target="_blank" rel="nofollow noopener"&gt;Dumping Linux for BSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Matt - &lt;a href="http://dpaste.com/2N68YPJ#wrap" target="_blank" rel="nofollow noopener"&gt;BSD Packaging&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Brad - &lt;a href="http://dpaste.com/2SF9V38#wrap" target="_blank" rel="nofollow noopener"&gt;Linux vs BS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;MJ - &lt;a href="http://dpaste.com/0Z2ZT4V#wrap" target="_blank" rel="nofollow noopener"&gt;Linux vs BSD Feedback&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ben - &lt;a href="http://dpaste.com/0B3M85X" target="_blank" rel="nofollow noopener"&gt;Feedback for JT&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Henrik - &lt;a href="http://dpaste.com/3F36EQE#wrap" target="_blank" rel="nofollow noopener"&gt;Why you should migrate everything to BSD&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2020/04/06/24367.html" target="_blank" rel="nofollow noopener"&gt;ssh-copy-id now included&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://opnsense.org/opnsense-20-1-3-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 20.1.3 released&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bsd-cloud-image.org/" target="_blank" rel="nofollow noopener"&gt;A Collection of prebuilt BSD Cloud Images&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://tmate.io/" target="_blank" rel="nofollow noopener"&gt;Instant terminal sharing&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Ales - &lt;a href="http://dpaste.com/1EBWTK5#wrap" target="_blank" rel="nofollow noopener"&gt;Manually verify signature files for pkg package&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Shody - &lt;a href="http://dpaste.com/340PM9Q#wrap" target="_blank" rel="nofollow noopener"&gt;Yubikey&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Mike - &lt;a href="http://dpaste.com/13W9SF0" target="_blank" rel="nofollow noopener"&gt;Site for hashes from old disks&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;Answer: &lt;a href="https://docs.google.com/spreadsheets/d/19FmLs0jXxLkxAr0zwgdrXQd1qhbwvNHH6NvolvXKWTM/edit?usp=sharing" target="_blank" rel="nofollow noopener"&gt;https://docs.google.com/spreadsheets/d/19FmLs0jXxLkxAr0zwgdrXQd1qhbwvNHH6NvolvXKWTM/edit?usp=sharing&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0345.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, nextcloud, x11, screen locking, risc, risc os, community, feedback</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>NetBSD 8.2 is available, NextCloud on OpenBSD, X11 screen locking, NetBSD and RISC OS running parallel, community feedback about switching to BSD, and more.</p>

<h2>Headlines</h2>

<h3><a href="http://blog.netbsd.org/tnf/entry/netbsd_8_2_is_available" rel="nofollow">NetBSD 8.2 is available!</a></h3>

<blockquote>
<p>The third release in the NetBSD-8 is now available.</p>

<p>This release includes all the security fixes in NetBSD-8 up until this point, and other fixes deemed important for stability.</p>
</blockquote>

<ul>
<li>Some highlights include:

<ul>
<li>x86: fixed regression in booting old CPUs</li>
<li>x86: Hyper-V Gen.2 VM framebuffer support</li>
<li>httpd(8): fixed various security issues</li>
<li>ixg(4): various fixes / improvements</li>
<li>x86 efiboot: add tftp support, fix issues on machines with many memory segments, improve graphics mode logic to work on more machines.</li>
<li>Various kernel memory info leaks fixes</li>
<li>Update expat to 2.2.8</li>
<li>Fix ryzen USB issues and support xHCI version 3.10.</li>
<li>Accept root device specification as NAME=label.</li>
<li>Add multiboot 2 support to x86 bootloaders.</li>
<li>Fix for CVE-2019-9506: &#39;Key Negotiation of Bluetooth&#39; attack.</li>
<li>nouveau: limit the supported devices and fix firmware loading.</li>
<li>radeon: fix loading of the TAHITI VCE firmware.</li>
<li>named(8): stop using obsolete dnssec-lookaside.</li>
</ul></li>
</ul>

<hr>

<h3><a href="https://h3artbl33d.nl/2020-nextcloud.html" rel="nofollow">NextCloud on OpenBSD</a></h3>

<blockquote>
<p>NextCloud and OpenBSD are complementary to one another. NextCloud is an awesome, secure and private alternative for proprietary platforms, whereas OpenBSD forms the most secure and solid foundation to serve it on. Setting it up in the best way isn’t hard, especially using this step by step tutorial.</p>
</blockquote>

<ul>
<li>Preface</li>
</ul>

<blockquote>
<p>Back when this tutorial was initially written, things were different. The OpenBSD port relied on PHP 5.6 and there were no package updates. But the port improved (hats off, Gonzalo!) and package updates were introduced to the -stable branch (hats off, Solene!).</p>

<p>A rewrite of this tutorial was long overdue. Right now, it is written for 6.6 -stable and will be updated once 6.7 is released. If you have any questions or desire some help, feel free to reach out.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://leahneukirchen.org/blog/archive/2020/01/x11-screen-locking-a-secure-and-modular-approach.html" rel="nofollow">X11 screen locking: a secure and modular approach</a></h3>

<blockquote>
<p>For years I’ve been using XScreenSaver as a default, but I recently learned about xsecurelock and re-evaluated my screen-saving requirements</p>
</blockquote>

<hr>

<h3><a href="http://www.update.uu.se/%7Emicken/ronetbsd.html" rel="nofollow">NetBSD and RISC OS running parallel</a></h3>

<blockquote>
<p>I have been experimenting with running two systems at the same time on the RK3399 SoC.<br>
It all begun when I figured out how to switch to the A72 cpu for RISC OS. When the switch was done, the A53 cpu just continued to execute code.<br>
OK I thought why not give it something to do!<br>
My first step was to run some small programs.<br>
It worked!</p>

<ul>
<li>Thanks to Tom Jones for the pointer to this article</li>
</ul>
</blockquote>

<hr>

<h3>Several weeks ago we covered a story about switching from Linux to BSD.  Benedict and JT asked for community feedback as to their thoughts on the matter.  Allan was out that week, so this will give him an opportunity to chime in with his thoughts as well.</h3>

<ul>
<li>Jamie - <a href="http://dpaste.com/0CH1YXQ#wrap" rel="nofollow">Dumping Linux for BSD</a></li>
<li>Matt - <a href="http://dpaste.com/2N68YPJ#wrap" rel="nofollow">BSD Packaging</a></li>
<li>Brad - <a href="http://dpaste.com/2SF9V38#wrap" rel="nofollow">Linux vs BS</a></li>
<li>MJ - <a href="http://dpaste.com/0Z2ZT4V#wrap" rel="nofollow">Linux vs BSD Feedback</a></li>
<li>Ben - <a href="http://dpaste.com/0B3M85X" rel="nofollow">Feedback for JT</a></li>
<li>Henrik - <a href="http://dpaste.com/3F36EQE#wrap" rel="nofollow">Why you should migrate everything to BSD</a></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.dragonflydigest.com/2020/04/06/24367.html" rel="nofollow">ssh-copy-id now included</a></li>
<li><a href="https://opnsense.org/opnsense-20-1-3-released/" rel="nofollow">OPNsense 20.1.3 released</a></li>
<li><a href="https://bsd-cloud-image.org/" rel="nofollow">A Collection of prebuilt BSD Cloud Images</a></li>
<li><a href="https://tmate.io/" rel="nofollow">Instant terminal sharing</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Ales - <a href="http://dpaste.com/1EBWTK5#wrap" rel="nofollow">Manually verify signature files for pkg package</a></li>
<li>Shody - <a href="http://dpaste.com/340PM9Q#wrap" rel="nofollow">Yubikey</a></li>
<li>Mike - <a href="http://dpaste.com/13W9SF0" rel="nofollow">Site for hashes from old disks</a>

<ul>
<li>Answer: <a href="https://docs.google.com/spreadsheets/d/19FmLs0jXxLkxAr0zwgdrXQd1qhbwvNHH6NvolvXKWTM/edit?usp=sharing" rel="nofollow">https://docs.google.com/spreadsheets/d/19FmLs0jXxLkxAr0zwgdrXQd1qhbwvNHH6NvolvXKWTM/edit?usp=sharing</a></li>
</ul></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0345.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>NetBSD 8.2 is available, NextCloud on OpenBSD, X11 screen locking, NetBSD and RISC OS running parallel, community feedback about switching to BSD, and more.</p>

<h2>Headlines</h2>

<h3><a href="http://blog.netbsd.org/tnf/entry/netbsd_8_2_is_available" rel="nofollow">NetBSD 8.2 is available!</a></h3>

<blockquote>
<p>The third release in the NetBSD-8 is now available.</p>

<p>This release includes all the security fixes in NetBSD-8 up until this point, and other fixes deemed important for stability.</p>
</blockquote>

<ul>
<li>Some highlights include:

<ul>
<li>x86: fixed regression in booting old CPUs</li>
<li>x86: Hyper-V Gen.2 VM framebuffer support</li>
<li>httpd(8): fixed various security issues</li>
<li>ixg(4): various fixes / improvements</li>
<li>x86 efiboot: add tftp support, fix issues on machines with many memory segments, improve graphics mode logic to work on more machines.</li>
<li>Various kernel memory info leaks fixes</li>
<li>Update expat to 2.2.8</li>
<li>Fix ryzen USB issues and support xHCI version 3.10.</li>
<li>Accept root device specification as NAME=label.</li>
<li>Add multiboot 2 support to x86 bootloaders.</li>
<li>Fix for CVE-2019-9506: &#39;Key Negotiation of Bluetooth&#39; attack.</li>
<li>nouveau: limit the supported devices and fix firmware loading.</li>
<li>radeon: fix loading of the TAHITI VCE firmware.</li>
<li>named(8): stop using obsolete dnssec-lookaside.</li>
</ul></li>
</ul>

<hr>

<h3><a href="https://h3artbl33d.nl/2020-nextcloud.html" rel="nofollow">NextCloud on OpenBSD</a></h3>

<blockquote>
<p>NextCloud and OpenBSD are complementary to one another. NextCloud is an awesome, secure and private alternative for proprietary platforms, whereas OpenBSD forms the most secure and solid foundation to serve it on. Setting it up in the best way isn’t hard, especially using this step by step tutorial.</p>
</blockquote>

<ul>
<li>Preface</li>
</ul>

<blockquote>
<p>Back when this tutorial was initially written, things were different. The OpenBSD port relied on PHP 5.6 and there were no package updates. But the port improved (hats off, Gonzalo!) and package updates were introduced to the -stable branch (hats off, Solene!).</p>

<p>A rewrite of this tutorial was long overdue. Right now, it is written for 6.6 -stable and will be updated once 6.7 is released. If you have any questions or desire some help, feel free to reach out.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://leahneukirchen.org/blog/archive/2020/01/x11-screen-locking-a-secure-and-modular-approach.html" rel="nofollow">X11 screen locking: a secure and modular approach</a></h3>

<blockquote>
<p>For years I’ve been using XScreenSaver as a default, but I recently learned about xsecurelock and re-evaluated my screen-saving requirements</p>
</blockquote>

<hr>

<h3><a href="http://www.update.uu.se/%7Emicken/ronetbsd.html" rel="nofollow">NetBSD and RISC OS running parallel</a></h3>

<blockquote>
<p>I have been experimenting with running two systems at the same time on the RK3399 SoC.<br>
It all begun when I figured out how to switch to the A72 cpu for RISC OS. When the switch was done, the A53 cpu just continued to execute code.<br>
OK I thought why not give it something to do!<br>
My first step was to run some small programs.<br>
It worked!</p>

<ul>
<li>Thanks to Tom Jones for the pointer to this article</li>
</ul>
</blockquote>

<hr>

<h3>Several weeks ago we covered a story about switching from Linux to BSD.  Benedict and JT asked for community feedback as to their thoughts on the matter.  Allan was out that week, so this will give him an opportunity to chime in with his thoughts as well.</h3>

<ul>
<li>Jamie - <a href="http://dpaste.com/0CH1YXQ#wrap" rel="nofollow">Dumping Linux for BSD</a></li>
<li>Matt - <a href="http://dpaste.com/2N68YPJ#wrap" rel="nofollow">BSD Packaging</a></li>
<li>Brad - <a href="http://dpaste.com/2SF9V38#wrap" rel="nofollow">Linux vs BS</a></li>
<li>MJ - <a href="http://dpaste.com/0Z2ZT4V#wrap" rel="nofollow">Linux vs BSD Feedback</a></li>
<li>Ben - <a href="http://dpaste.com/0B3M85X" rel="nofollow">Feedback for JT</a></li>
<li>Henrik - <a href="http://dpaste.com/3F36EQE#wrap" rel="nofollow">Why you should migrate everything to BSD</a></li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.dragonflydigest.com/2020/04/06/24367.html" rel="nofollow">ssh-copy-id now included</a></li>
<li><a href="https://opnsense.org/opnsense-20-1-3-released/" rel="nofollow">OPNsense 20.1.3 released</a></li>
<li><a href="https://bsd-cloud-image.org/" rel="nofollow">A Collection of prebuilt BSD Cloud Images</a></li>
<li><a href="https://tmate.io/" rel="nofollow">Instant terminal sharing</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Ales - <a href="http://dpaste.com/1EBWTK5#wrap" rel="nofollow">Manually verify signature files for pkg package</a></li>
<li>Shody - <a href="http://dpaste.com/340PM9Q#wrap" rel="nofollow">Yubikey</a></li>
<li>Mike - <a href="http://dpaste.com/13W9SF0" rel="nofollow">Site for hashes from old disks</a>

<ul>
<li>Answer: <a href="https://docs.google.com/spreadsheets/d/19FmLs0jXxLkxAr0zwgdrXQd1qhbwvNHH6NvolvXKWTM/edit?usp=sharing" rel="nofollow">https://docs.google.com/spreadsheets/d/19FmLs0jXxLkxAr0zwgdrXQd1qhbwvNHH6NvolvXKWTM/edit?usp=sharing</a></li>
</ul></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0345.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>324: Emergency Space Mode</title>
  <link>https://www.bsdnow.tv/324</link>
  <guid isPermaLink="false">e82a766b-37c4-4d16-896b-6fcfcfdef480</guid>
  <pubDate>Thu, 14 Nov 2019 07:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e82a766b-37c4-4d16-896b-6fcfcfdef480.mp3" length="33490674" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Migrating drives and zpool between hosts, OpenBSD in 2019, Dragonfly’s new zlib and dhcpcd, Batch renaming images and resolution with awk, a rant on the X11 ICCCM selection system, hammer 2 emergency space mode, and more.</itunes:subtitle>
  <itunes:duration>46:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Migrating drives and zpool between hosts, OpenBSD in 2019, Dragonfly’s new zlib and dhcpcd, Batch renaming images and resolution with awk, a rant on the X11 ICCCM selection system, hammer 2 emergency space mode, and more.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://dan.langille.org/2019/10/26/migrating-drives-and-the-zpool-from-one-host-to-another/" target="_blank" rel="nofollow noopener"&gt;Migrating drives and the zpool from one host to another.&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Today is the day.&lt;/p&gt;

&lt;p&gt;&amp;gt; Today I move a zpool from an R710 into an R720. The goal: all services on that zpool start running on the new host.&lt;/p&gt;

&lt;p&gt;&amp;gt; Fortunately, that zpool is dedicated to jails, more or less. I have done some planning about this, including moving a poudriere on the R710 into a jail.&lt;/p&gt;

&lt;p&gt;&amp;gt; Now it is almost noon on Saturday, I am sitting in the basement (just outside the server room), and I’m typing this up.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;In this post:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD 12.0&lt;/li&gt;
&lt;li&gt;Dell R710 (r710-01)&lt;/li&gt;
&lt;li&gt;Dell R720 (r720-01)&lt;/li&gt;
&lt;li&gt;drive caddies from eBay and now I know the difference between SATA and SATAu&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://docs.oracle.com/cd/E19253-01/819-5461/gbchy/index.html" target="_blank" rel="nofollow noopener"&gt;PLEASE READ THIS first: Migrating ZFS Storage Pools&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://blog.habets.se/2019/10/OpenBSD-in-2019.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD in 2019&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I’ve used OpenBSD on and off since 2.1. More back then than in the last 10 years or so though, so I thought I’d try it again.&lt;/p&gt;

&lt;p&gt;&amp;gt; What triggered this was me finding a silly bug in GNU cpio that has existed with a “FIXME” comment since at least 1994. I checked OpenBSD to see if it had a related bug, but as expected no it was just fine.&lt;/p&gt;

&lt;p&gt;&amp;gt; I don’t quite remember why I stopped using OpenBSD for servers, but I do remember filesystem corruption on “unexpected power disconnections” (even with softdep turned on), which I’ve never really seen on Linux.&lt;/p&gt;

&lt;p&gt;&amp;gt; That and that fewer things “just worked” than with Linux, which matters more when I installed more random things than I do now. I’ve become a lot more minimalist. Probably due to less spare time. Life is better when you don’t run things like PHP (not that OpenBSD doesn’t support PHP, just an example) or your own email server with various antispam tooling, and other things.&lt;/p&gt;

&lt;p&gt;&amp;gt; This is all experience from running OpenBSD on a server. On my next laptop I intend to try running OpenBSD on the dektop, and will see if that more ad-hoc environment works well. E.g. will gnuradio work? Lack of other-OS VM support may be a problem.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Verdict&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Ouch, that’s a long list of bad stuff. Still, I like it. I’ll continue to run it, and will make sure my stuff continues working on OpenBSD.&lt;/p&gt;

&lt;p&gt;&amp;gt; And maybe in a year I’ll have a review of OpenBSD on a laptop.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2019/10/29/23683.html" target="_blank" rel="nofollow noopener"&gt;New zlib, new dhcpcd&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; zlib and dhcpcd are both updated in DragonFly… but my quick perusal of the commits makes it sound like bugfix only; no usage changes needed.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;DHCPCD Commit: &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2019-October/719768.html" target="_blank" rel="nofollow noopener"&gt;http://lists.dragonflybsd.org/pipermail/commits/2019-October/719768.html&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;ZLIB Commit: &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2019-October/719772.html" target="_blank" rel="nofollow noopener"&gt;http://lists.dragonflybsd.org/pipermail/commits/2019-October/719772.html&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://victoria.dev/verbose/batch-renaming-images-including-image-resolution-with-awk/" target="_blank" rel="nofollow noopener"&gt;Batch renaming images, including image resolution, with awk&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; The most recent item on my list of “Geeky things I did that made me feel pretty awesome” is an hour’s adventure that culminated in this code:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;$ file IMG* | awk 'BEGIN{a=0} {print substr($1, 1, length($1)-5),a++"_"substr($8,1, length($8)-1)}' | while read fn fr; do echo $(rename -v "s/$fn/img_$fr/g" *); done
IMG_20170808_172653_425.jpg renamed as img_0_4032x3024.jpg
IMG_20170808_173020_267.jpg renamed as img_1_3024x3506.jpg
IMG_20170808_173130_616.jpg renamed as img_2_3024x3779.jpg
IMG_20170808_173221_425.jpg renamed as img_3_3024x3780.jpg
IMG_20170808_173417_059.jpg renamed as img_4_2956x2980.jpg
IMG_20170808_173450_971.jpg renamed as img_5_3024x3024.jpg
IMG_20170808_173536_034.jpg renamed as img_6_4032x3024.jpg
IMG_20170808_173602_732.jpg renamed as img_7_1617x1617.jpg
IMG_20170808_173645_339.jpg renamed as img_8_3024x3780.jpg
IMG_20170909_170146_585.jpg renamed as img_9_3036x3036.jpg
IMG_20170911_211522_543.jpg renamed as img_10_3036x3036.jpg
IMG_20170913_071608_288.jpg renamed as img_11_2760x2760.jpg
IMG_20170913_073205_522.jpg renamed as img_12_2738x2738.jpg
// ... etc etc
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;&amp;gt; The last item on the aforementioned list is “TODO: come up with a shorter title for this list.”&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.call-with-current-continuation.org/rants/icccm.txt" target="_blank" rel="nofollow noopener"&gt;I hate the X11 ICCCM selection system, and you should too - A Rant&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; d00d, that document is devilspawn. I've recently spent my nights in pain&lt;br&gt;
implementing the selection mechanism. WHY OH WHY OH WHY? why me?  why did I choose to do this? and what sick evil twisted mind wrote this damn spec? I don't know why I'm working with it, I just wanted to make a useful program.&lt;/p&gt;

&lt;p&gt;&amp;gt; I didn't know what I was getting myself in to. Nobody knows until they try it. And once you start, you're unable to stop. You can't stop, if you stop then you haven't completed it to spec. You can't fail on this, it's just a few pages of text, how can that be so hard? So what if they use Atoms for everything. So what if there's no explicit correlation between the target type of a SelectionNotify event and the type of the property it indicates?&lt;/p&gt;

&lt;p&gt;&amp;gt; So what if the distinction is ambiguous? So what if the document is littered with such atrocities? It's not the spec's fault, the spec is authoritative. It's obviously YOUR (the implementor's) fault for misunderstanding it. If you didn't misunderstand it, you wouldn't be here complaining about it would you?&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2019/10/22/23652.html" target="_blank" rel="nofollow noopener"&gt;HAMMER2 emergency space mode&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; As anyone who has been running HAMMER1 or HAMMER2 has noticed, snapshots and copy on write and infinite history can eat a lot of disk space, even if the actual file volume isn’t changing much.  There’s now an ‘emergency mode‘ for HAMMER2, where disk operations can happen even if there isn’t space for the normal history activity.  It’s dangerous, in that the normal protections against data loss if power is cut go away, and snapshots created while in this mode will be mangled.  So definitely don’t leave it on!&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://twitter.com/BastilleBSD/status/1186659762458501120" target="_blank" rel="nofollow noopener"&gt;The BastilleBSD community has started work on over 100 automation templates&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2019/10/23/23654.html" target="_blank" rel="nofollow noopener"&gt;PAM perturbed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://teespring.com/stores/openbsd" target="_blank" rel="nofollow noopener"&gt;OpenBSD T-Shirts now available&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://old.reddit.com/r/freebsd/comments/dlyqtq/fastocloud_opensource_media_service_now_available/" target="_blank" rel="nofollow noopener"&gt;FastoCloud (Opensource Media Service) now available on FreeBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.cs.princeton.edu/%7Ebwk/" target="_blank" rel="nofollow noopener"&gt;Unix: A History and a Memoir by Brian Kernighan now available&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.reddit.com/r/openbsd_gaming/comments/d6xboo/openbsd_moonlight_game_streaming_client_from_a/" target="_blank" rel="nofollow noopener"&gt;OpenBSD Moonlight game streaming client from a Windows + Nvidia PC&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Tim - &lt;a href="http://dpaste.com/38DNSXT#wrap" target="_blank" rel="nofollow noopener"&gt;Release Notes for Lumina 1.5&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://dpaste.com/3QJX8G3#wrap" target="_blank" rel="nofollow noopener"&gt;Answer Here&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Brad - &lt;a href="http://dpaste.com/316MGVX#wrap" target="_blank" rel="nofollow noopener"&gt;vBSDcon Trip Report&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jacob - &lt;a href="http://dpaste.com/131N05J#wrap" target="_blank" rel="nofollow noopener"&gt;Using terminfo on FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0324.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, migrating drive, migrating zpool, zpool, migration, zlib, dhcpcd, awk, batch, renaming, x11, ICCCM, hammer 2, emergency space mode</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Migrating drives and zpool between hosts, OpenBSD in 2019, Dragonfly’s new zlib and dhcpcd, Batch renaming images and resolution with awk, a rant on the X11 ICCCM selection system, hammer 2 emergency space mode, and more.</p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://dan.langille.org/2019/10/26/migrating-drives-and-the-zpool-from-one-host-to-another/" rel="nofollow">Migrating drives and the zpool from one host to another.</a></h3>

<blockquote>
<p>Today is the day.</p>

<p>Today I move a zpool from an R710 into an R720. The goal: all services on that zpool start running on the new host.</p>

<p>Fortunately, that zpool is dedicated to jails, more or less. I have done some planning about this, including moving a poudriere on the R710 into a jail.</p>

<p>Now it is almost noon on Saturday, I am sitting in the basement (just outside the server room), and I’m typing this up.</p>
</blockquote>

<ul>
<li><p>In this post:</p>

<ul>
<li>FreeBSD 12.0</li>
<li>Dell R710 (r710-01)</li>
<li>Dell R720 (r720-01)</li>
<li>drive caddies from eBay and now I know the difference between SATA and SATAu</li>
</ul></li>
<li><p><a href="https://docs.oracle.com/cd/E19253-01/819-5461/gbchy/index.html" rel="nofollow">PLEASE READ THIS first: Migrating ZFS Storage Pools</a></p></li>
</ul>

<hr>

<h3><a href="https://blog.habets.se/2019/10/OpenBSD-in-2019.html" rel="nofollow">OpenBSD in 2019</a></h3>

<blockquote>
<p>I’ve used OpenBSD on and off since 2.1. More back then than in the last 10 years or so though, so I thought I’d try it again.</p>

<p>What triggered this was me finding a silly bug in GNU cpio that has existed with a “FIXME” comment since at least 1994. I checked OpenBSD to see if it had a related bug, but as expected no it was just fine.</p>

<p>I don’t quite remember why I stopped using OpenBSD for servers, but I do remember filesystem corruption on “unexpected power disconnections” (even with softdep turned on), which I’ve never really seen on Linux.</p>

<p>That and that fewer things “just worked” than with Linux, which matters more when I installed more random things than I do now. I’ve become a lot more minimalist. Probably due to less spare time. Life is better when you don’t run things like PHP (not that OpenBSD doesn’t support PHP, just an example) or your own email server with various antispam tooling, and other things.</p>

<p>This is all experience from running OpenBSD on a server. On my next laptop I intend to try running OpenBSD on the dektop, and will see if that more ad-hoc environment works well. E.g. will gnuradio work? Lack of other-OS VM support may be a problem.</p>
</blockquote>

<ul>
<li>Verdict</li>
</ul>

<blockquote>
<p>Ouch, that’s a long list of bad stuff. Still, I like it. I’ll continue to run it, and will make sure my stuff continues working on OpenBSD.</p>

<p>And maybe in a year I’ll have a review of OpenBSD on a laptop.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2019/10/29/23683.html" rel="nofollow">New zlib, new dhcpcd</a></h3>

<blockquote>
<p>zlib and dhcpcd are both updated in DragonFly… but my quick perusal of the commits makes it sound like bugfix only; no usage changes needed.</p>
</blockquote>

<ul>
<li>DHCPCD Commit: <a href="http://lists.dragonflybsd.org/pipermail/commits/2019-October/719768.html" rel="nofollow">http://lists.dragonflybsd.org/pipermail/commits/2019-October/719768.html</a></li>
<li>ZLIB Commit: <a href="http://lists.dragonflybsd.org/pipermail/commits/2019-October/719772.html" rel="nofollow">http://lists.dragonflybsd.org/pipermail/commits/2019-October/719772.html</a></li>
</ul>

<hr>

<h3><a href="https://victoria.dev/verbose/batch-renaming-images-including-image-resolution-with-awk/" rel="nofollow">Batch renaming images, including image resolution, with awk</a></h3>

<blockquote>
<p>The most recent item on my list of “Geeky things I did that made me feel pretty awesome” is an hour’s adventure that culminated in this code:</p>
</blockquote>

<pre><code>$ file IMG* | awk &#39;BEGIN{a=0} {print substr($1, 1, length($1)-5),a++&quot;_&quot;substr($8,1, length($8)-1)}&#39; | while read fn fr; do echo $(rename -v &quot;s/$fn/img_$fr/g&quot; *); done
IMG_20170808_172653_425.jpg renamed as img_0_4032x3024.jpg
IMG_20170808_173020_267.jpg renamed as img_1_3024x3506.jpg
IMG_20170808_173130_616.jpg renamed as img_2_3024x3779.jpg
IMG_20170808_173221_425.jpg renamed as img_3_3024x3780.jpg
IMG_20170808_173417_059.jpg renamed as img_4_2956x2980.jpg
IMG_20170808_173450_971.jpg renamed as img_5_3024x3024.jpg
IMG_20170808_173536_034.jpg renamed as img_6_4032x3024.jpg
IMG_20170808_173602_732.jpg renamed as img_7_1617x1617.jpg
IMG_20170808_173645_339.jpg renamed as img_8_3024x3780.jpg
IMG_20170909_170146_585.jpg renamed as img_9_3036x3036.jpg
IMG_20170911_211522_543.jpg renamed as img_10_3036x3036.jpg
IMG_20170913_071608_288.jpg renamed as img_11_2760x2760.jpg
IMG_20170913_073205_522.jpg renamed as img_12_2738x2738.jpg
// ... etc etc
</code></pre>

<blockquote>
<p>The last item on the aforementioned list is “TODO: come up with a shorter title for this list.”</p>
</blockquote>

<hr>

<h3><a href="http://www.call-with-current-continuation.org/rants/icccm.txt" rel="nofollow">I hate the X11 ICCCM selection system, and you should too - A Rant</a></h3>

<blockquote>
<p>d00d, that document is devilspawn. I&#39;ve recently spent my nights in pain<br>
implementing the selection mechanism. WHY OH WHY OH WHY? why me?  why did I choose to do this? and what sick evil twisted mind wrote this damn spec? I don&#39;t know why I&#39;m working with it, I just wanted to make a useful program.</p>

<p>I didn&#39;t know what I was getting myself in to. Nobody knows until they try it. And once you start, you&#39;re unable to stop. You can&#39;t stop, if you stop then you haven&#39;t completed it to spec. You can&#39;t fail on this, it&#39;s just a few pages of text, how can that be so hard? So what if they use Atoms for everything. So what if there&#39;s no explicit correlation between the target type of a SelectionNotify event and the type of the property it indicates?</p>

<p>So what if the distinction is ambiguous? So what if the document is littered with such atrocities? It&#39;s not the spec&#39;s fault, the spec is authoritative. It&#39;s obviously YOUR (the implementor&#39;s) fault for misunderstanding it. If you didn&#39;t misunderstand it, you wouldn&#39;t be here complaining about it would you?</p>
</blockquote>

<hr>

<h3><a href="https://www.dragonflydigest.com/2019/10/22/23652.html" rel="nofollow">HAMMER2 emergency space mode</a></h3>

<blockquote>
<p>As anyone who has been running HAMMER1 or HAMMER2 has noticed, snapshots and copy on write and infinite history can eat a lot of disk space, even if the actual file volume isn’t changing much.  There’s now an ‘emergency mode‘ for HAMMER2, where disk operations can happen even if there isn’t space for the normal history activity.  It’s dangerous, in that the normal protections against data loss if power is cut go away, and snapshots created while in this mode will be mangled.  So definitely don’t leave it on!</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/BastilleBSD/status/1186659762458501120" rel="nofollow">The BastilleBSD community has started work on over 100 automation templates</a></li>
<li><a href="https://www.dragonflydigest.com/2019/10/23/23654.html" rel="nofollow">PAM perturbed</a></li>
<li><a href="https://teespring.com/stores/openbsd" rel="nofollow">OpenBSD T-Shirts now available</a></li>
<li><a href="https://old.reddit.com/r/freebsd/comments/dlyqtq/fastocloud_opensource_media_service_now_available/" rel="nofollow">FastoCloud (Opensource Media Service) now available on FreeBSD</a></li>
<li><a href="https://www.cs.princeton.edu/%7Ebwk/" rel="nofollow">Unix: A History and a Memoir by Brian Kernighan now available</a></li>
<li><a href="https://www.reddit.com/r/openbsd_gaming/comments/d6xboo/openbsd_moonlight_game_streaming_client_from_a/" rel="nofollow">OpenBSD Moonlight game streaming client from a Windows + Nvidia PC</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Tim - <a href="http://dpaste.com/38DNSXT#wrap" rel="nofollow">Release Notes for Lumina 1.5</a>

<ul>
<li><a href="http://dpaste.com/3QJX8G3#wrap" rel="nofollow">Answer Here</a></li>
</ul></li>
<li>Brad - <a href="http://dpaste.com/316MGVX#wrap" rel="nofollow">vBSDcon Trip Report</a></li>
<li>Jacob - <a href="http://dpaste.com/131N05J#wrap" rel="nofollow">Using terminfo on FreeBSD</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0324.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Migrating drives and zpool between hosts, OpenBSD in 2019, Dragonfly’s new zlib and dhcpcd, Batch renaming images and resolution with awk, a rant on the X11 ICCCM selection system, hammer 2 emergency space mode, and more.</p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://dan.langille.org/2019/10/26/migrating-drives-and-the-zpool-from-one-host-to-another/" rel="nofollow">Migrating drives and the zpool from one host to another.</a></h3>

<blockquote>
<p>Today is the day.</p>

<p>Today I move a zpool from an R710 into an R720. The goal: all services on that zpool start running on the new host.</p>

<p>Fortunately, that zpool is dedicated to jails, more or less. I have done some planning about this, including moving a poudriere on the R710 into a jail.</p>

<p>Now it is almost noon on Saturday, I am sitting in the basement (just outside the server room), and I’m typing this up.</p>
</blockquote>

<ul>
<li><p>In this post:</p>

<ul>
<li>FreeBSD 12.0</li>
<li>Dell R710 (r710-01)</li>
<li>Dell R720 (r720-01)</li>
<li>drive caddies from eBay and now I know the difference between SATA and SATAu</li>
</ul></li>
<li><p><a href="https://docs.oracle.com/cd/E19253-01/819-5461/gbchy/index.html" rel="nofollow">PLEASE READ THIS first: Migrating ZFS Storage Pools</a></p></li>
</ul>

<hr>

<h3><a href="https://blog.habets.se/2019/10/OpenBSD-in-2019.html" rel="nofollow">OpenBSD in 2019</a></h3>

<blockquote>
<p>I’ve used OpenBSD on and off since 2.1. More back then than in the last 10 years or so though, so I thought I’d try it again.</p>

<p>What triggered this was me finding a silly bug in GNU cpio that has existed with a “FIXME” comment since at least 1994. I checked OpenBSD to see if it had a related bug, but as expected no it was just fine.</p>

<p>I don’t quite remember why I stopped using OpenBSD for servers, but I do remember filesystem corruption on “unexpected power disconnections” (even with softdep turned on), which I’ve never really seen on Linux.</p>

<p>That and that fewer things “just worked” than with Linux, which matters more when I installed more random things than I do now. I’ve become a lot more minimalist. Probably due to less spare time. Life is better when you don’t run things like PHP (not that OpenBSD doesn’t support PHP, just an example) or your own email server with various antispam tooling, and other things.</p>

<p>This is all experience from running OpenBSD on a server. On my next laptop I intend to try running OpenBSD on the dektop, and will see if that more ad-hoc environment works well. E.g. will gnuradio work? Lack of other-OS VM support may be a problem.</p>
</blockquote>

<ul>
<li>Verdict</li>
</ul>

<blockquote>
<p>Ouch, that’s a long list of bad stuff. Still, I like it. I’ll continue to run it, and will make sure my stuff continues working on OpenBSD.</p>

<p>And maybe in a year I’ll have a review of OpenBSD on a laptop.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2019/10/29/23683.html" rel="nofollow">New zlib, new dhcpcd</a></h3>

<blockquote>
<p>zlib and dhcpcd are both updated in DragonFly… but my quick perusal of the commits makes it sound like bugfix only; no usage changes needed.</p>
</blockquote>

<ul>
<li>DHCPCD Commit: <a href="http://lists.dragonflybsd.org/pipermail/commits/2019-October/719768.html" rel="nofollow">http://lists.dragonflybsd.org/pipermail/commits/2019-October/719768.html</a></li>
<li>ZLIB Commit: <a href="http://lists.dragonflybsd.org/pipermail/commits/2019-October/719772.html" rel="nofollow">http://lists.dragonflybsd.org/pipermail/commits/2019-October/719772.html</a></li>
</ul>

<hr>

<h3><a href="https://victoria.dev/verbose/batch-renaming-images-including-image-resolution-with-awk/" rel="nofollow">Batch renaming images, including image resolution, with awk</a></h3>

<blockquote>
<p>The most recent item on my list of “Geeky things I did that made me feel pretty awesome” is an hour’s adventure that culminated in this code:</p>
</blockquote>

<pre><code>$ file IMG* | awk &#39;BEGIN{a=0} {print substr($1, 1, length($1)-5),a++&quot;_&quot;substr($8,1, length($8)-1)}&#39; | while read fn fr; do echo $(rename -v &quot;s/$fn/img_$fr/g&quot; *); done
IMG_20170808_172653_425.jpg renamed as img_0_4032x3024.jpg
IMG_20170808_173020_267.jpg renamed as img_1_3024x3506.jpg
IMG_20170808_173130_616.jpg renamed as img_2_3024x3779.jpg
IMG_20170808_173221_425.jpg renamed as img_3_3024x3780.jpg
IMG_20170808_173417_059.jpg renamed as img_4_2956x2980.jpg
IMG_20170808_173450_971.jpg renamed as img_5_3024x3024.jpg
IMG_20170808_173536_034.jpg renamed as img_6_4032x3024.jpg
IMG_20170808_173602_732.jpg renamed as img_7_1617x1617.jpg
IMG_20170808_173645_339.jpg renamed as img_8_3024x3780.jpg
IMG_20170909_170146_585.jpg renamed as img_9_3036x3036.jpg
IMG_20170911_211522_543.jpg renamed as img_10_3036x3036.jpg
IMG_20170913_071608_288.jpg renamed as img_11_2760x2760.jpg
IMG_20170913_073205_522.jpg renamed as img_12_2738x2738.jpg
// ... etc etc
</code></pre>

<blockquote>
<p>The last item on the aforementioned list is “TODO: come up with a shorter title for this list.”</p>
</blockquote>

<hr>

<h3><a href="http://www.call-with-current-continuation.org/rants/icccm.txt" rel="nofollow">I hate the X11 ICCCM selection system, and you should too - A Rant</a></h3>

<blockquote>
<p>d00d, that document is devilspawn. I&#39;ve recently spent my nights in pain<br>
implementing the selection mechanism. WHY OH WHY OH WHY? why me?  why did I choose to do this? and what sick evil twisted mind wrote this damn spec? I don&#39;t know why I&#39;m working with it, I just wanted to make a useful program.</p>

<p>I didn&#39;t know what I was getting myself in to. Nobody knows until they try it. And once you start, you&#39;re unable to stop. You can&#39;t stop, if you stop then you haven&#39;t completed it to spec. You can&#39;t fail on this, it&#39;s just a few pages of text, how can that be so hard? So what if they use Atoms for everything. So what if there&#39;s no explicit correlation between the target type of a SelectionNotify event and the type of the property it indicates?</p>

<p>So what if the distinction is ambiguous? So what if the document is littered with such atrocities? It&#39;s not the spec&#39;s fault, the spec is authoritative. It&#39;s obviously YOUR (the implementor&#39;s) fault for misunderstanding it. If you didn&#39;t misunderstand it, you wouldn&#39;t be here complaining about it would you?</p>
</blockquote>

<hr>

<h3><a href="https://www.dragonflydigest.com/2019/10/22/23652.html" rel="nofollow">HAMMER2 emergency space mode</a></h3>

<blockquote>
<p>As anyone who has been running HAMMER1 or HAMMER2 has noticed, snapshots and copy on write and infinite history can eat a lot of disk space, even if the actual file volume isn’t changing much.  There’s now an ‘emergency mode‘ for HAMMER2, where disk operations can happen even if there isn’t space for the normal history activity.  It’s dangerous, in that the normal protections against data loss if power is cut go away, and snapshots created while in this mode will be mangled.  So definitely don’t leave it on!</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/BastilleBSD/status/1186659762458501120" rel="nofollow">The BastilleBSD community has started work on over 100 automation templates</a></li>
<li><a href="https://www.dragonflydigest.com/2019/10/23/23654.html" rel="nofollow">PAM perturbed</a></li>
<li><a href="https://teespring.com/stores/openbsd" rel="nofollow">OpenBSD T-Shirts now available</a></li>
<li><a href="https://old.reddit.com/r/freebsd/comments/dlyqtq/fastocloud_opensource_media_service_now_available/" rel="nofollow">FastoCloud (Opensource Media Service) now available on FreeBSD</a></li>
<li><a href="https://www.cs.princeton.edu/%7Ebwk/" rel="nofollow">Unix: A History and a Memoir by Brian Kernighan now available</a></li>
<li><a href="https://www.reddit.com/r/openbsd_gaming/comments/d6xboo/openbsd_moonlight_game_streaming_client_from_a/" rel="nofollow">OpenBSD Moonlight game streaming client from a Windows + Nvidia PC</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>Tim - <a href="http://dpaste.com/38DNSXT#wrap" rel="nofollow">Release Notes for Lumina 1.5</a>

<ul>
<li><a href="http://dpaste.com/3QJX8G3#wrap" rel="nofollow">Answer Here</a></li>
</ul></li>
<li>Brad - <a href="http://dpaste.com/316MGVX#wrap" rel="nofollow">vBSDcon Trip Report</a></li>
<li>Jacob - <a href="http://dpaste.com/131N05J#wrap" rel="nofollow">Using terminfo on FreeBSD</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0324.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>318: The TrueNAS Library</title>
  <link>https://www.bsdnow.tv/318</link>
  <guid isPermaLink="false">a53fad97-5df2-4cd3-91a8-e75d5a2f38d7</guid>
  <pubDate>Wed, 02 Oct 2019 23:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a53fad97-5df2-4cd3-91a8-e75d5a2f38d7.mp3" length="33605404" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>DragonFlyBSD vs. FreeBSD vs. Linux benchmark on Ryzen 7, JFK Presidential Library chooses TrueNAS for digital archives, FreeBSD 12.1-beta is available, cool but obscure X11 tools, vBSDcon trip report, Project Trident 12-U7 is available, a couple new Unix artifacts, and more.</itunes:subtitle>
  <itunes:duration>46:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;DragonFlyBSD vs. FreeBSD vs. Linux benchmark on Ryzen 7, JFK Presidential Library chooses TrueNAS for digital archives, FreeBSD 12.1-beta is available, cool but obscure X11 tools, vBSDcon trip report, Project Trident 12-U7 is available, a couple new Unix artifacts, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.phoronix.com/scan.php?page=article&amp;amp;item=bsd-linux-3700x" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD 5.6 vs. FreeBSD 12 vs. Linux - Ryzen 7 3700X&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; For those wondering how well FreeBSD and DragonFlyBSD are handling AMD's new Ryzen 3000 series desktop processors, here are some benchmarks on a Ryzen 7 3700X with MSI MEG X570 GODLIKE where both of these popular BSD operating systems were working out-of-the-box. For some fun mid-week benchmarking, here are those results of FreeBSD 12.0 and DragonFlyBSD 5.6.2 up against openSUSE Tumbleweed and Ubuntu 19.04.&lt;/p&gt;

&lt;p&gt;&amp;gt; Back in July I looked at FreeBSD 12 on the Ryzen 9 3900X but at that time at least DragonFlyBSD had troubles booting on that system. When trying out the Ryzen 7 3700X + MSI GODLIKE X570 motherboard on the latest BIOS, everything "just worked" without any compatibility issues for either of these BSDs.&lt;/p&gt;

&lt;p&gt;&amp;gt; We've been eager to see how well DragonFlyBSD is performing on these new AMD Zen 2 CPUs with DragonFlyBSD lead developer Matthew Dillon having publicly expressed being impressed by the new AMD Ryzen 3000 series CPUs.&lt;/p&gt;

&lt;p&gt;&amp;gt; For comparison to those BSDs, Ubuntu 19.04 and openSUSE Tumbleweed were tested on the same hardware in their out-of-the-box configurations. While Clear Linux is normally the fastest, on this system Clear's power management defaults had caused issues in being unable to detect the Samsung 970 EVO Plus NVMe SSD used for testing and so we left it out this round.&lt;/p&gt;

&lt;p&gt;&amp;gt; All of the hardware was the same throughout testing as were the BIOS settings and running the Ryzen 7 3700X at stock speeds. (Any differences in the reported hardware for the system table just come down to differences in what is exposed by each OS for reporting.) All of the BSD/Linux benchmarks on this eight core / sixteen thread processor were run via the Phoronix Test Suite. In the case of FreeBSD 12.0, we benchmarked both with its default LLVM Clang 6.0 compiler as well as with GCC 9.1 so that it would match the GCC compiler being the default on the other operating systems under test.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.ixsystems.com/blog/jfk-presidential-library-pr/" target="_blank" rel="nofollow noopener"&gt;JFK Presidential Library Chooses iXsystems TrueNAS to Preserve Precious Digital Archives&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt;  iXsystems is honored to have the TrueNAS® M-Series unified storage selected to store, serve, and protect the entire digital archive for the John F. Kennedy Library Foundation. This is in support of the collection at the John F. Kennedy Presidential Library and Museum (JFK Library). Over the next several years, the Foundation hopes to grow the digital collection from hundreds of terabytes today to cover much more of the Archives at the Kennedy Library. Overall there is a total of 25 million documents, audio recordings, photos, and videos once the project is complete.&lt;/p&gt;

&lt;p&gt;&amp;gt; Having first deployed the TrueNAS M50-HA earlier in 2019, the JFK Library has now completed the migration of its existing digital collection and is now in the process of digitizing much of the rest of its vast collection. &lt;/p&gt;

&lt;p&gt;&amp;gt; Not only is the catalog of material vast, it is also diverse, with files being copied to the storage system from a variety of sources in numerous file types. To achieve this ambitious goal, the library required a high-end NAS system capable of sharing with a variety of systems throughout the digitization process.  The digital archive will be served from the TrueNAS M50 and made available to both in-person and online visitors.&lt;/p&gt;

&lt;p&gt;&amp;gt; With precious material and information comes robust demands. The highly-available TrueNAS M-Series has multiple layers of protection to help keep data safe, including data scrubs, checksums, unlimited snapshots, replication, and more. TrueNAS is also inherently scalable with data shares only limited by the number of drives connected to the pool. Perfect for archival storage, the deployed TrueNAS M50 will grow with the library’s content, easily expanding its storage capacity over time as needed. Supporting a variety of protocols, multi-petabyte scalability in a single share, and anytime, uninterrupted capacity expansion, the TrueNAS M-Series ticked all the right boxes. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=8rFjH5-0Fiw" target="_blank" rel="nofollow noopener"&gt;Youtube Video&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.phoronix.com/scan.php?page=news_item&amp;amp;px=FreeBSD-12.1-Beta-Released" target="_blank" rel="nofollow noopener"&gt;FreeBSD 12.1-beta available&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; FreeBSD 12.0 is already approaching one year old while FreeBSD 12.1 is now on the way as the next installment with various bug/security fixes and other alterations to this BSD operating system.&lt;/p&gt;

&lt;p&gt;&amp;gt; FreeBSD 12.1 has many security/bug fixes throughout, no longer enables "-Werror" by default as a compiler flag (Update: This change is just for the GCC 4.2 compiler), has imported BearSSL into the FreeBSD base system as a lightweight TLS/SSL implementation, bzip2recover has been added, and a variety of mostly lower-level changes. More details can be found via the in-progress release notes.&lt;/p&gt;

&lt;p&gt;&amp;gt; For those with time to test this weekend, FreeBSD 12.1 Beta 1 is available for all prominent architectures.&lt;/p&gt;

&lt;p&gt;&amp;gt; The FreeBSD release team is planning for at least another beta or two and around three release candidates. If all goes well, FreeBSD 12.1 will be out in early November.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2019-September/091533.html" target="_blank" rel="nofollow noopener"&gt;Announcement Link&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://cyber.dabamos.de/unix/x11/" target="_blank" rel="nofollow noopener"&gt;Cool, but obscure X11 tools.  More suggestions in the source link&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;ASClock&lt;/li&gt;
&lt;li&gt;Free42&lt;/li&gt;
&lt;li&gt;FSV2&lt;/li&gt;
&lt;li&gt;GLXGears&lt;/li&gt;
&lt;li&gt;GMixer&lt;/li&gt;
&lt;li&gt;GVIM&lt;/li&gt;
&lt;li&gt;Micropolis&lt;/li&gt;
&lt;li&gt;Sunclock&lt;/li&gt;
&lt;li&gt;Ted&lt;/li&gt;
&lt;li&gt;TiEmu&lt;/li&gt;
&lt;li&gt;X026&lt;/li&gt;
&lt;li&gt;X48&lt;/li&gt;
&lt;li&gt;XAbacus&lt;/li&gt;
&lt;li&gt;XAntfarm&lt;/li&gt;
&lt;li&gt;XArchiver&lt;/li&gt;
&lt;li&gt;XASCII&lt;/li&gt;
&lt;li&gt;XBiff&lt;/li&gt;
&lt;li&gt;XBill&lt;/li&gt;
&lt;li&gt;XBoard&lt;/li&gt;
&lt;li&gt;XCalc&lt;/li&gt;
&lt;li&gt;XCalendar&lt;/li&gt;
&lt;li&gt;XCHM&lt;/li&gt;
&lt;li&gt;XChomp&lt;/li&gt;
&lt;li&gt;XClipboard&lt;/li&gt;
&lt;li&gt;XClock&lt;/li&gt;
&lt;li&gt;XClock/Cat Clock&lt;/li&gt;
&lt;li&gt;XColorSel&lt;/li&gt;
&lt;li&gt;XConsole&lt;/li&gt;
&lt;li&gt;XDiary&lt;/li&gt;
&lt;li&gt;XEarth&lt;/li&gt;
&lt;li&gt;XEdit&lt;/li&gt;
&lt;li&gt;Xev&lt;/li&gt;
&lt;li&gt;XEyes&lt;/li&gt;
&lt;li&gt;XFontSel&lt;/li&gt;
&lt;li&gt;XGalaga&lt;/li&gt;
&lt;li&gt;XInvaders 3D&lt;/li&gt;
&lt;li&gt;XKill&lt;/li&gt;
&lt;li&gt;XLennart&lt;/li&gt;
&lt;li&gt;XLoad&lt;/li&gt;
&lt;li&gt;XLock&lt;/li&gt;
&lt;li&gt;XLogo&lt;/li&gt;
&lt;li&gt;XMahjongg&lt;/li&gt;
&lt;li&gt;XMan&lt;/li&gt;
&lt;li&gt;XMessage&lt;/li&gt;
&lt;li&gt;XmGrace&lt;/li&gt;
&lt;li&gt;XMixer&lt;/li&gt;
&lt;li&gt;XmMix&lt;/li&gt;
&lt;li&gt;XMore&lt;/li&gt;
&lt;li&gt;XMosaic&lt;/li&gt;
&lt;li&gt;XMOTD&lt;/li&gt;
&lt;li&gt;XMountains&lt;/li&gt;
&lt;li&gt;XNeko&lt;/li&gt;
&lt;li&gt;XOdometer&lt;/li&gt;
&lt;li&gt;XOSView&lt;/li&gt;
&lt;li&gt;Xplore&lt;/li&gt;
&lt;li&gt;XPostIt&lt;/li&gt;
&lt;li&gt;XRoach&lt;/li&gt;
&lt;li&gt;XScreenSaver&lt;/li&gt;
&lt;li&gt;XSnow&lt;/li&gt;
&lt;li&gt;XSpread&lt;/li&gt;
&lt;li&gt;XTerm&lt;/li&gt;
&lt;li&gt;XTide&lt;/li&gt;
&lt;li&gt;Xv&lt;/li&gt;
&lt;li&gt;Xvkbd&lt;/li&gt;
&lt;li&gt;XWPE&lt;/li&gt;
&lt;li&gt;XZoom&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.ixsystems.com/blog/vbsdcon-2019/" target="_blank" rel="nofollow noopener"&gt;vBSDCon 2019 trip report from iXSystems&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; The fourth biennial vBSDCon was held in Reston, VA on September 5th through 7th and attracted attendees and presenters from not only the Washington, DC area, but also Canada, Germany, Kenya, and beyond. While MeetBSD caters to Silicon Valley BSD enthusiasts on even years, vBSDcon caters to East Coast and DC area enthusiasts on odd years. Verisign was again the key sponsor of vBSDcon 2019 but this year made a conscious effort to entrust the organization of the event to a team of community members led by Dan Langille, who you probably know as the lead BSDCan organizer. The result of this shift was a low key but professional event that fostered great conversation and brainstorming at every turn.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://project-trident.org/post/2019-09-21_stable12-u7_available/" target="_blank" rel="nofollow noopener"&gt;Project Trident 12-U7 now available&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Package Summary

&lt;ul&gt;
&lt;li&gt;New Packages: 130&lt;/li&gt;
&lt;li&gt;Deleted Packages: 72&lt;/li&gt;
&lt;li&gt;Updated Packages: 865&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Stable ISO - &lt;a href="https://pkg.project-trident.org/iso/stable/Trident-x64-TOS-12-U7-20190920.iso" target="_blank" rel="nofollow noopener"&gt;https://pkg.project-trident.org/iso/stable/Trident-x64-TOS-12-U7-20190920.iso&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://minnie.tuhs.org//pipermail/tuhs/2019-September/018685.html" target="_blank" rel="nofollow noopener"&gt;A Couple new Unix Artifacts&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I fear we're drifting a bit here and the S/N ratio is dropping a bit w.r.t the actual history of Unix. Please no more on the relative merits of version control systems or alternative text processing systems.&lt;/p&gt;

&lt;p&gt;&amp;gt; So I'll try to distract you by saying this. I'm sitting on two artifacts that have recently been given to me:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;by two large organisations&lt;/li&gt;
&lt;li&gt;of great significance to Unix history&lt;/li&gt;
&lt;li&gt;who want me to keep "mum" about them&lt;/li&gt;
&lt;li&gt;as they are going to make announcements about them soon*&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; and I am going slowly crazy as I wait for them to be offically released. Now you have a new topic to talk about :-)&lt;/p&gt;

&lt;p&gt;&amp;gt; Cheers, Warren&lt;/p&gt;

&lt;p&gt;* &lt;em&gt;for some definition of "soon"&lt;/em&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2019/09/16/msg000813.html" target="_blank" rel="nofollow noopener"&gt;NetBSD machines at Open Source Conference 2019 Hiroshima&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.hyperbola.info/news/end-of-xorg-support/" target="_blank" rel="nofollow noopener"&gt;Hyperbola a GNU/Linux OS is using OpenBSD's Xenocara&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.talosintelligence.com/careers/freebsd_engineer" target="_blank" rel="nofollow noopener"&gt;Talos is looking for a FreeBSD Engineer&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/dylanaraps/pure-sh-bible" target="_blank" rel="nofollow noopener"&gt;GitHub - dylanaraps/pure-sh-bible: A collection of pure POSIX sh alternatives to external processes.&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.dragonflydigest.com/2019/09/23/23523.html" target="_blank" rel="nofollow noopener"&gt;dsynth: you’re building it&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://lists.sigcis.org/pipermail/members-sigcis.org/2019-September/001606.html" target="_blank" rel="nofollow noopener"&gt;Percy Ludgate, the missing link between Babbage’s machine and everything else&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Bruce - &lt;a href="http://dpaste.com/147HGP3#wrap" target="_blank" rel="nofollow noopener"&gt;Down the expect rabbithole&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Bruce - &lt;a href="http://dpaste.com/37MNVSW#wrap" target="_blank" rel="nofollow noopener"&gt;Expect (update)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;David - &lt;a href="http://dpaste.com/2SE1YSE" target="_blank" rel="nofollow noopener"&gt;Netgraph answer&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Mason - &lt;a href="http://dpaste.com/00KKXJM" target="_blank" rel="nofollow noopener"&gt;Beeps?&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0318.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, ryzen, ryzen 7, ryzen 7 3700X, amd, benchmark, presidential library, digital archives, digital library, presidential archive, truenas, obscure tools, x11, vbsdcon, trip report, project trident, Unix, Unix artifacts</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>DragonFlyBSD vs. FreeBSD vs. Linux benchmark on Ryzen 7, JFK Presidential Library chooses TrueNAS for digital archives, FreeBSD 12.1-beta is available, cool but obscure X11 tools, vBSDcon trip report, Project Trident 12-U7 is available, a couple new Unix artifacts, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.phoronix.com/scan.php?page=article&item=bsd-linux-3700x" rel="nofollow">DragonFlyBSD 5.6 vs. FreeBSD 12 vs. Linux - Ryzen 7 3700X</a></h3>

<blockquote>
<p>For those wondering how well FreeBSD and DragonFlyBSD are handling AMD&#39;s new Ryzen 3000 series desktop processors, here are some benchmarks on a Ryzen 7 3700X with MSI MEG X570 GODLIKE where both of these popular BSD operating systems were working out-of-the-box. For some fun mid-week benchmarking, here are those results of FreeBSD 12.0 and DragonFlyBSD 5.6.2 up against openSUSE Tumbleweed and Ubuntu 19.04.</p>

<p>Back in July I looked at FreeBSD 12 on the Ryzen 9 3900X but at that time at least DragonFlyBSD had troubles booting on that system. When trying out the Ryzen 7 3700X + MSI GODLIKE X570 motherboard on the latest BIOS, everything &quot;just worked&quot; without any compatibility issues for either of these BSDs.</p>

<p>We&#39;ve been eager to see how well DragonFlyBSD is performing on these new AMD Zen 2 CPUs with DragonFlyBSD lead developer Matthew Dillon having publicly expressed being impressed by the new AMD Ryzen 3000 series CPUs.</p>

<p>For comparison to those BSDs, Ubuntu 19.04 and openSUSE Tumbleweed were tested on the same hardware in their out-of-the-box configurations. While Clear Linux is normally the fastest, on this system Clear&#39;s power management defaults had caused issues in being unable to detect the Samsung 970 EVO Plus NVMe SSD used for testing and so we left it out this round.</p>

<p>All of the hardware was the same throughout testing as were the BIOS settings and running the Ryzen 7 3700X at stock speeds. (Any differences in the reported hardware for the system table just come down to differences in what is exposed by each OS for reporting.) All of the BSD/Linux benchmarks on this eight core / sixteen thread processor were run via the Phoronix Test Suite. In the case of FreeBSD 12.0, we benchmarked both with its default LLVM Clang 6.0 compiler as well as with GCC 9.1 so that it would match the GCC compiler being the default on the other operating systems under test.</p>
</blockquote>

<hr>

<h3><a href="https://www.ixsystems.com/blog/jfk-presidential-library-pr/" rel="nofollow">JFK Presidential Library Chooses iXsystems TrueNAS to Preserve Precious Digital Archives</a></h3>

<blockquote>
<p>iXsystems is honored to have the TrueNAS® M-Series unified storage selected to store, serve, and protect the entire digital archive for the John F. Kennedy Library Foundation. This is in support of the collection at the John F. Kennedy Presidential Library and Museum (JFK Library). Over the next several years, the Foundation hopes to grow the digital collection from hundreds of terabytes today to cover much more of the Archives at the Kennedy Library. Overall there is a total of 25 million documents, audio recordings, photos, and videos once the project is complete.</p>

<p>Having first deployed the TrueNAS M50-HA earlier in 2019, the JFK Library has now completed the migration of its existing digital collection and is now in the process of digitizing much of the rest of its vast collection. </p>

<p>Not only is the catalog of material vast, it is also diverse, with files being copied to the storage system from a variety of sources in numerous file types. To achieve this ambitious goal, the library required a high-end NAS system capable of sharing with a variety of systems throughout the digitization process.  The digital archive will be served from the TrueNAS M50 and made available to both in-person and online visitors.</p>

<p>With precious material and information comes robust demands. The highly-available TrueNAS M-Series has multiple layers of protection to help keep data safe, including data scrubs, checksums, unlimited snapshots, replication, and more. TrueNAS is also inherently scalable with data shares only limited by the number of drives connected to the pool. Perfect for archival storage, the deployed TrueNAS M50 will grow with the library’s content, easily expanding its storage capacity over time as needed. Supporting a variety of protocols, multi-petabyte scalability in a single share, and anytime, uninterrupted capacity expansion, the TrueNAS M-Series ticked all the right boxes. </p>
</blockquote>

<ul>
<li><a href="https://www.youtube.com/watch?v=8rFjH5-0Fiw" rel="nofollow">Youtube Video</a></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.phoronix.com/scan.php?page=news_item&px=FreeBSD-12.1-Beta-Released" rel="nofollow">FreeBSD 12.1-beta available</a></h3>

<blockquote>
<p>FreeBSD 12.0 is already approaching one year old while FreeBSD 12.1 is now on the way as the next installment with various bug/security fixes and other alterations to this BSD operating system.</p>

<p>FreeBSD 12.1 has many security/bug fixes throughout, no longer enables &quot;-Werror&quot; by default as a compiler flag (Update: This change is just for the GCC 4.2 compiler), has imported BearSSL into the FreeBSD base system as a lightweight TLS/SSL implementation, bzip2recover has been added, and a variety of mostly lower-level changes. More details can be found via the in-progress release notes.</p>

<p>For those with time to test this weekend, FreeBSD 12.1 Beta 1 is available for all prominent architectures.</p>

<p>The FreeBSD release team is planning for at least another beta or two and around three release candidates. If all goes well, FreeBSD 12.1 will be out in early November.</p>
</blockquote>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2019-September/091533.html" rel="nofollow">Announcement Link</a></li>
</ul>

<hr>

<h3><a href="https://cyber.dabamos.de/unix/x11/" rel="nofollow">Cool, but obscure X11 tools.  More suggestions in the source link</a></h3>

<ul>
<li>ASClock</li>
<li>Free42</li>
<li>FSV2</li>
<li>GLXGears</li>
<li>GMixer</li>
<li>GVIM</li>
<li>Micropolis</li>
<li>Sunclock</li>
<li>Ted</li>
<li>TiEmu</li>
<li>X026</li>
<li>X48</li>
<li>XAbacus</li>
<li>XAntfarm</li>
<li>XArchiver</li>
<li>XASCII</li>
<li>XBiff</li>
<li>XBill</li>
<li>XBoard</li>
<li>XCalc</li>
<li>XCalendar</li>
<li>XCHM</li>
<li>XChomp</li>
<li>XClipboard</li>
<li>XClock</li>
<li>XClock/Cat Clock</li>
<li>XColorSel</li>
<li>XConsole</li>
<li>XDiary</li>
<li>XEarth</li>
<li>XEdit</li>
<li>Xev</li>
<li>XEyes</li>
<li>XFontSel</li>
<li>XGalaga</li>
<li>XInvaders 3D</li>
<li>XKill</li>
<li>XLennart</li>
<li>XLoad</li>
<li>XLock</li>
<li>XLogo</li>
<li>XMahjongg</li>
<li>XMan</li>
<li>XMessage</li>
<li>XmGrace</li>
<li>XMixer</li>
<li>XmMix</li>
<li>XMore</li>
<li>XMosaic</li>
<li>XMOTD</li>
<li>XMountains</li>
<li>XNeko</li>
<li>XOdometer</li>
<li>XOSView</li>
<li>Xplore</li>
<li>XPostIt</li>
<li>XRoach</li>
<li>XScreenSaver</li>
<li>XSnow</li>
<li>XSpread</li>
<li>XTerm</li>
<li>XTide</li>
<li>Xv</li>
<li>Xvkbd</li>
<li>XWPE</li>
<li>XZoom</li>
</ul>

<hr>

<h3><a href="https://www.ixsystems.com/blog/vbsdcon-2019/" rel="nofollow">vBSDCon 2019 trip report from iXSystems</a></h3>

<blockquote>
<p>The fourth biennial vBSDCon was held in Reston, VA on September 5th through 7th and attracted attendees and presenters from not only the Washington, DC area, but also Canada, Germany, Kenya, and beyond. While MeetBSD caters to Silicon Valley BSD enthusiasts on even years, vBSDcon caters to East Coast and DC area enthusiasts on odd years. Verisign was again the key sponsor of vBSDcon 2019 but this year made a conscious effort to entrust the organization of the event to a team of community members led by Dan Langille, who you probably know as the lead BSDCan organizer. The result of this shift was a low key but professional event that fostered great conversation and brainstorming at every turn.</p>
</blockquote>

<hr>

<h3><a href="https://project-trident.org/post/2019-09-21_stable12-u7_available/" rel="nofollow">Project Trident 12-U7 now available</a></h3>

<ul>
<li>Package Summary

<ul>
<li>New Packages: 130</li>
<li>Deleted Packages: 72</li>
<li>Updated Packages: 865</li>
</ul></li>
<li>Stable ISO - <a href="https://pkg.project-trident.org/iso/stable/Trident-x64-TOS-12-U7-20190920.iso" rel="nofollow">https://pkg.project-trident.org/iso/stable/Trident-x64-TOS-12-U7-20190920.iso</a></li>
</ul>

<hr>

<h3><a href="https://minnie.tuhs.org//pipermail/tuhs/2019-September/018685.html" rel="nofollow">A Couple new Unix Artifacts</a></h3>

<blockquote>
<p>I fear we&#39;re drifting a bit here and the S/N ratio is dropping a bit w.r.t the actual history of Unix. Please no more on the relative merits of version control systems or alternative text processing systems.</p>

<p>So I&#39;ll try to distract you by saying this. I&#39;m sitting on two artifacts that have recently been given to me:</p>
</blockquote>

<ul>
<li>by two large organisations</li>
<li>of great significance to Unix history</li>
<li>who want me to keep &quot;mum&quot; about them</li>
<li>as they are going to make announcements about them soon*</li>
</ul>

<blockquote>
<p>and I am going slowly crazy as I wait for them to be offically released. Now you have a new topic to talk about :-)</p>

<p>Cheers, Warren</p>
</blockquote>

<p>* <em>for some definition of &quot;soon&quot;</em></p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/netbsd-advocacy/2019/09/16/msg000813.html" rel="nofollow">NetBSD machines at Open Source Conference 2019 Hiroshima</a></li>
<li><a href="https://www.hyperbola.info/news/end-of-xorg-support/" rel="nofollow">Hyperbola a GNU/Linux OS is using OpenBSD&#39;s Xenocara</a></li>
<li><a href="https://www.talosintelligence.com/careers/freebsd_engineer" rel="nofollow">Talos is looking for a FreeBSD Engineer</a></li>
<li><a href="https://github.com/dylanaraps/pure-sh-bible" rel="nofollow">GitHub - dylanaraps/pure-sh-bible: A collection of pure POSIX sh alternatives to external processes.</a></li>
<li><a href="https://www.dragonflydigest.com/2019/09/23/23523.html" rel="nofollow">dsynth: you’re building it</a></li>
<li><a href="http://lists.sigcis.org/pipermail/members-sigcis.org/2019-September/001606.html" rel="nofollow">Percy Ludgate, the missing link between Babbage’s machine and everything else</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Bruce - <a href="http://dpaste.com/147HGP3#wrap" rel="nofollow">Down the expect rabbithole</a></li>
<li>Bruce - <a href="http://dpaste.com/37MNVSW#wrap" rel="nofollow">Expect (update)</a></li>
<li>David - <a href="http://dpaste.com/2SE1YSE" rel="nofollow">Netgraph answer</a></li>
<li>Mason - <a href="http://dpaste.com/00KKXJM" rel="nofollow">Beeps?</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0318.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>DragonFlyBSD vs. FreeBSD vs. Linux benchmark on Ryzen 7, JFK Presidential Library chooses TrueNAS for digital archives, FreeBSD 12.1-beta is available, cool but obscure X11 tools, vBSDcon trip report, Project Trident 12-U7 is available, a couple new Unix artifacts, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://www.phoronix.com/scan.php?page=article&item=bsd-linux-3700x" rel="nofollow">DragonFlyBSD 5.6 vs. FreeBSD 12 vs. Linux - Ryzen 7 3700X</a></h3>

<blockquote>
<p>For those wondering how well FreeBSD and DragonFlyBSD are handling AMD&#39;s new Ryzen 3000 series desktop processors, here are some benchmarks on a Ryzen 7 3700X with MSI MEG X570 GODLIKE where both of these popular BSD operating systems were working out-of-the-box. For some fun mid-week benchmarking, here are those results of FreeBSD 12.0 and DragonFlyBSD 5.6.2 up against openSUSE Tumbleweed and Ubuntu 19.04.</p>

<p>Back in July I looked at FreeBSD 12 on the Ryzen 9 3900X but at that time at least DragonFlyBSD had troubles booting on that system. When trying out the Ryzen 7 3700X + MSI GODLIKE X570 motherboard on the latest BIOS, everything &quot;just worked&quot; without any compatibility issues for either of these BSDs.</p>

<p>We&#39;ve been eager to see how well DragonFlyBSD is performing on these new AMD Zen 2 CPUs with DragonFlyBSD lead developer Matthew Dillon having publicly expressed being impressed by the new AMD Ryzen 3000 series CPUs.</p>

<p>For comparison to those BSDs, Ubuntu 19.04 and openSUSE Tumbleweed were tested on the same hardware in their out-of-the-box configurations. While Clear Linux is normally the fastest, on this system Clear&#39;s power management defaults had caused issues in being unable to detect the Samsung 970 EVO Plus NVMe SSD used for testing and so we left it out this round.</p>

<p>All of the hardware was the same throughout testing as were the BIOS settings and running the Ryzen 7 3700X at stock speeds. (Any differences in the reported hardware for the system table just come down to differences in what is exposed by each OS for reporting.) All of the BSD/Linux benchmarks on this eight core / sixteen thread processor were run via the Phoronix Test Suite. In the case of FreeBSD 12.0, we benchmarked both with its default LLVM Clang 6.0 compiler as well as with GCC 9.1 so that it would match the GCC compiler being the default on the other operating systems under test.</p>
</blockquote>

<hr>

<h3><a href="https://www.ixsystems.com/blog/jfk-presidential-library-pr/" rel="nofollow">JFK Presidential Library Chooses iXsystems TrueNAS to Preserve Precious Digital Archives</a></h3>

<blockquote>
<p>iXsystems is honored to have the TrueNAS® M-Series unified storage selected to store, serve, and protect the entire digital archive for the John F. Kennedy Library Foundation. This is in support of the collection at the John F. Kennedy Presidential Library and Museum (JFK Library). Over the next several years, the Foundation hopes to grow the digital collection from hundreds of terabytes today to cover much more of the Archives at the Kennedy Library. Overall there is a total of 25 million documents, audio recordings, photos, and videos once the project is complete.</p>

<p>Having first deployed the TrueNAS M50-HA earlier in 2019, the JFK Library has now completed the migration of its existing digital collection and is now in the process of digitizing much of the rest of its vast collection. </p>

<p>Not only is the catalog of material vast, it is also diverse, with files being copied to the storage system from a variety of sources in numerous file types. To achieve this ambitious goal, the library required a high-end NAS system capable of sharing with a variety of systems throughout the digitization process.  The digital archive will be served from the TrueNAS M50 and made available to both in-person and online visitors.</p>

<p>With precious material and information comes robust demands. The highly-available TrueNAS M-Series has multiple layers of protection to help keep data safe, including data scrubs, checksums, unlimited snapshots, replication, and more. TrueNAS is also inherently scalable with data shares only limited by the number of drives connected to the pool. Perfect for archival storage, the deployed TrueNAS M50 will grow with the library’s content, easily expanding its storage capacity over time as needed. Supporting a variety of protocols, multi-petabyte scalability in a single share, and anytime, uninterrupted capacity expansion, the TrueNAS M-Series ticked all the right boxes. </p>
</blockquote>

<ul>
<li><a href="https://www.youtube.com/watch?v=8rFjH5-0Fiw" rel="nofollow">Youtube Video</a></li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.phoronix.com/scan.php?page=news_item&px=FreeBSD-12.1-Beta-Released" rel="nofollow">FreeBSD 12.1-beta available</a></h3>

<blockquote>
<p>FreeBSD 12.0 is already approaching one year old while FreeBSD 12.1 is now on the way as the next installment with various bug/security fixes and other alterations to this BSD operating system.</p>

<p>FreeBSD 12.1 has many security/bug fixes throughout, no longer enables &quot;-Werror&quot; by default as a compiler flag (Update: This change is just for the GCC 4.2 compiler), has imported BearSSL into the FreeBSD base system as a lightweight TLS/SSL implementation, bzip2recover has been added, and a variety of mostly lower-level changes. More details can be found via the in-progress release notes.</p>

<p>For those with time to test this weekend, FreeBSD 12.1 Beta 1 is available for all prominent architectures.</p>

<p>The FreeBSD release team is planning for at least another beta or two and around three release candidates. If all goes well, FreeBSD 12.1 will be out in early November.</p>
</blockquote>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2019-September/091533.html" rel="nofollow">Announcement Link</a></li>
</ul>

<hr>

<h3><a href="https://cyber.dabamos.de/unix/x11/" rel="nofollow">Cool, but obscure X11 tools.  More suggestions in the source link</a></h3>

<ul>
<li>ASClock</li>
<li>Free42</li>
<li>FSV2</li>
<li>GLXGears</li>
<li>GMixer</li>
<li>GVIM</li>
<li>Micropolis</li>
<li>Sunclock</li>
<li>Ted</li>
<li>TiEmu</li>
<li>X026</li>
<li>X48</li>
<li>XAbacus</li>
<li>XAntfarm</li>
<li>XArchiver</li>
<li>XASCII</li>
<li>XBiff</li>
<li>XBill</li>
<li>XBoard</li>
<li>XCalc</li>
<li>XCalendar</li>
<li>XCHM</li>
<li>XChomp</li>
<li>XClipboard</li>
<li>XClock</li>
<li>XClock/Cat Clock</li>
<li>XColorSel</li>
<li>XConsole</li>
<li>XDiary</li>
<li>XEarth</li>
<li>XEdit</li>
<li>Xev</li>
<li>XEyes</li>
<li>XFontSel</li>
<li>XGalaga</li>
<li>XInvaders 3D</li>
<li>XKill</li>
<li>XLennart</li>
<li>XLoad</li>
<li>XLock</li>
<li>XLogo</li>
<li>XMahjongg</li>
<li>XMan</li>
<li>XMessage</li>
<li>XmGrace</li>
<li>XMixer</li>
<li>XmMix</li>
<li>XMore</li>
<li>XMosaic</li>
<li>XMOTD</li>
<li>XMountains</li>
<li>XNeko</li>
<li>XOdometer</li>
<li>XOSView</li>
<li>Xplore</li>
<li>XPostIt</li>
<li>XRoach</li>
<li>XScreenSaver</li>
<li>XSnow</li>
<li>XSpread</li>
<li>XTerm</li>
<li>XTide</li>
<li>Xv</li>
<li>Xvkbd</li>
<li>XWPE</li>
<li>XZoom</li>
</ul>

<hr>

<h3><a href="https://www.ixsystems.com/blog/vbsdcon-2019/" rel="nofollow">vBSDCon 2019 trip report from iXSystems</a></h3>

<blockquote>
<p>The fourth biennial vBSDCon was held in Reston, VA on September 5th through 7th and attracted attendees and presenters from not only the Washington, DC area, but also Canada, Germany, Kenya, and beyond. While MeetBSD caters to Silicon Valley BSD enthusiasts on even years, vBSDcon caters to East Coast and DC area enthusiasts on odd years. Verisign was again the key sponsor of vBSDcon 2019 but this year made a conscious effort to entrust the organization of the event to a team of community members led by Dan Langille, who you probably know as the lead BSDCan organizer. The result of this shift was a low key but professional event that fostered great conversation and brainstorming at every turn.</p>
</blockquote>

<hr>

<h3><a href="https://project-trident.org/post/2019-09-21_stable12-u7_available/" rel="nofollow">Project Trident 12-U7 now available</a></h3>

<ul>
<li>Package Summary

<ul>
<li>New Packages: 130</li>
<li>Deleted Packages: 72</li>
<li>Updated Packages: 865</li>
</ul></li>
<li>Stable ISO - <a href="https://pkg.project-trident.org/iso/stable/Trident-x64-TOS-12-U7-20190920.iso" rel="nofollow">https://pkg.project-trident.org/iso/stable/Trident-x64-TOS-12-U7-20190920.iso</a></li>
</ul>

<hr>

<h3><a href="https://minnie.tuhs.org//pipermail/tuhs/2019-September/018685.html" rel="nofollow">A Couple new Unix Artifacts</a></h3>

<blockquote>
<p>I fear we&#39;re drifting a bit here and the S/N ratio is dropping a bit w.r.t the actual history of Unix. Please no more on the relative merits of version control systems or alternative text processing systems.</p>

<p>So I&#39;ll try to distract you by saying this. I&#39;m sitting on two artifacts that have recently been given to me:</p>
</blockquote>

<ul>
<li>by two large organisations</li>
<li>of great significance to Unix history</li>
<li>who want me to keep &quot;mum&quot; about them</li>
<li>as they are going to make announcements about them soon*</li>
</ul>

<blockquote>
<p>and I am going slowly crazy as I wait for them to be offically released. Now you have a new topic to talk about :-)</p>

<p>Cheers, Warren</p>
</blockquote>

<p>* <em>for some definition of &quot;soon&quot;</em></p>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/netbsd-advocacy/2019/09/16/msg000813.html" rel="nofollow">NetBSD machines at Open Source Conference 2019 Hiroshima</a></li>
<li><a href="https://www.hyperbola.info/news/end-of-xorg-support/" rel="nofollow">Hyperbola a GNU/Linux OS is using OpenBSD&#39;s Xenocara</a></li>
<li><a href="https://www.talosintelligence.com/careers/freebsd_engineer" rel="nofollow">Talos is looking for a FreeBSD Engineer</a></li>
<li><a href="https://github.com/dylanaraps/pure-sh-bible" rel="nofollow">GitHub - dylanaraps/pure-sh-bible: A collection of pure POSIX sh alternatives to external processes.</a></li>
<li><a href="https://www.dragonflydigest.com/2019/09/23/23523.html" rel="nofollow">dsynth: you’re building it</a></li>
<li><a href="http://lists.sigcis.org/pipermail/members-sigcis.org/2019-September/001606.html" rel="nofollow">Percy Ludgate, the missing link between Babbage’s machine and everything else</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Bruce - <a href="http://dpaste.com/147HGP3#wrap" rel="nofollow">Down the expect rabbithole</a></li>
<li>Bruce - <a href="http://dpaste.com/37MNVSW#wrap" rel="nofollow">Expect (update)</a></li>
<li>David - <a href="http://dpaste.com/2SE1YSE" rel="nofollow">Netgraph answer</a></li>
<li>Mason - <a href="http://dpaste.com/00KKXJM" rel="nofollow">Beeps?</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0318.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>305: Changing face of Unix</title>
  <link>https://www.bsdnow.tv/305</link>
  <guid isPermaLink="false">3ad52b9d-03b4-4c00-a16f-cc4be091e6ff</guid>
  <pubDate>Wed, 03 Jul 2019 22:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/3ad52b9d-03b4-4c00-a16f-cc4be091e6ff.mp3" length="40433394" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Website protection with OPNsense, FreeBSD Support Pull Request for ZFS-on-Linux, How much has Unix changed, Porting Wine to amd64 on NetBSD, FreeBSD Enterprise 1 PB Storage, the death watch for X11 has started, and more.</itunes:subtitle>
  <itunes:duration>56:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Website protection with OPNsense, FreeBSD Support Pull Request for ZFS-on-Linux, How much has Unix changed, Porting Wine to amd64 on NetBSD, FreeBSD Enterprise 1 PB Storage, the death watch for X11 has started, and more.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://medium.com/@jccwbb/website-protection-with-opnsense-3586a529d487" target="_blank" rel="nofollow noopener"&gt;Website protection with OPNsense&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;with nginx plugin OPNsense become a strong full featured Web Application Firewall (WAF)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The OPNsense security platform can help you to protect your network and your webservers with the nginx plugin addition.&lt;br&gt;
&amp;gt; In old days, install an open source firewall was a very trick task, but today it can be done with few clicks (or key strokes). In this article I'll not describe the detailed OPNsense installation process, but you can watch this video that was extracted from my OPNsense course available in Udemy. The video is in portuguese language, but with the translation CC Youtube feature you may be able to follow it without problems (if you don't are a portuguese speaker ofcourse) :-)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See the article for the rest of the writeup&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://github.com/zfsonlinux/zfs/pull/8987" target="_blank" rel="nofollow noopener"&gt;FreeBSD Support Pull Request against the ZFS-on-Linux repo&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This pull request integrates the sysutils/openzfs port’s sources into the upstream ZoL repo
&amp;gt; Adding FreeBSD support to ZoL will make it easier to move changes back and forth between FreeBSD and Linux
&amp;gt; Refactor tree to separate out Linux and FreeBSD specific code
&amp;gt; import FreeBSD's SPL
&amp;gt; add ifdefs in common code where it made more sense to do so than duplicate the code in separate files
&amp;gt; Adapted ZFS Test Suite to run on FreeBSD and all tests that pass on ZoL passing on ZoF&lt;/li&gt;
&lt;li&gt;The plan to officially rename the common repo from ZFSonLinux to OpenZFS was announced at the ZFS Leadership Meeting on June 25th&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=TJwykiJmH0M" target="_blank" rel="nofollow noopener"&gt;Video of Leadership Meeting&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.google.com/document/d/1w2jv2XVYFmBVvG1EGf-9A5HBVsjAYoLIFZAnWHhV-BM/edit" target="_blank" rel="nofollow noopener"&gt;Meeting Agenda and Notes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;This will allow improvements made on one OS to be made available more easily (and more quickly) to the other platforms&lt;/li&gt;
&lt;li&gt;For example, mav@’s recent work:&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=349220" target="_blank" rel="nofollow noopener"&gt;Add wakeup_any(), cheaper version of wakeup_one() for taskqueue(9)&lt;/a&gt;
&amp;gt; As result, on 72-core Xeon v4 machine sequential ZFS write to 12 ZVOLs with 16KB block size spend 34% less time in wakeup_any() and descendants then it was spending in wakeup_one(), and total write throughput increased by ~10% with the same as before CPU usage.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://adventofcomputing.libsyn.com/episode-5-notes-how-much-has-unix-changed" target="_blank" rel="nofollow noopener"&gt;Episode 5 Notes - How much has UNIX changed?&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; UNIX-like systems have dominated computing for decades, and with the rise of the internet and mobile devices their reach has become even larger. True, most systems now use more modern OSs like Linux, but how much has the UNIX-like landscape changed since the early days?&lt;br&gt;
&amp;gt; So, my question was this: how close is a modern *NIX userland to some of the earliest UNIX releases? To do this I'm going to compare a few key points of a modern Linux system with the earliest UNIX documentation I can get my hands on. The doc I am going to be covering(&lt;a href="https://www.tuhs.org/Archive/Distributions/Research/Dennis_v1/UNIX_ProgrammersManual_Nov71.pdf" target="_blank" rel="nofollow noopener"&gt;https://www.tuhs.org/Archive/Distributions/Research/Dennis_v1/UNIX_ProgrammersManual_Nov71.pdf&lt;/a&gt;) is from November 1971, predating v1 of the system.&lt;br&gt;
&amp;gt; I think the best place to start this comparison is to look at one of the highest-profile parts of the OS, that being the file system. Under the hood modern EXT file systems are completely different from the early UNIX file systems. However, they are still presented in basically the same way, as a heirerarchicat structure of directories with device files. So paths still look identical, and navigating the file system still functions the same. Often used commands like &lt;code&gt;ls&lt;/code&gt;, &lt;code&gt;cp&lt;/code&gt;, &lt;code&gt;mv&lt;/code&gt;, &lt;code&gt;du&lt;/code&gt;, and &lt;code&gt;df&lt;/code&gt; function the same. So are &lt;code&gt;mount&lt;/code&gt; and &lt;code&gt;umount&lt;/code&gt;. But, there are some key differences. For instance, &lt;code&gt;cd&lt;/code&gt; didn't exist, yet instead &lt;code&gt;chdir&lt;/code&gt; filled its place. Also, &lt;code&gt;chmod&lt;/code&gt; is somewhat different. Instead of the usual 3-digit octal codes for permissions, this older version only uses 2 digits. Really, that difference is due to the underlying file system using a different permission set than modern systems. For the most part, all the file handling is actually pretty close to a Linux system from 2019.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See the article for the rest of the writeup&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/porting_wine_to_amd64_on" target="_blank" rel="nofollow noopener"&gt;Porting Wine to amd64 on NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I have been working on porting Wine to amd64 on NetBSD as a GSoC 2019 project. Wine is a compatibility layer which allows running Microsoft Windows applications on POSIX-complaint operating systems. This report provides an overview of the progress of the project during the first coding period.&lt;br&gt;
&amp;gt; Initially, when I started working on getting Wine-4.4 to build and run on NetBSD i386 the primary issue that I faced was Wine displaying black windows instead of UI, and this applied to any graphical program I tried running with Wine.&lt;br&gt;
&amp;gt; I suspected it , as it is related to graphics, to be an issue with the graphics driver or Xorg. Subsequently, I tried building modular Xorg, and I tried running Wine on it only to realize that Xorg being modular didn't affect it in the least. After having tried a couple of configurations, I realized that trying to hazard out every other probability is going to take an awful lot of time that I didn't have. This motivated me to bisect the repo using git, and find the first version of Wine which failed on NetBSD.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See the article for the rest of the writeup&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://vermaden.wordpress.com/2019/06/19/freebsd-enterprise-1-pb-storage/?utm_source=discoverbsd" target="_blank" rel="nofollow noopener"&gt;FreeBSD Enterprise 1 PB Storage&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Today FreeBSD operating system turns 26 years old. 19 June is an International FreeBSD Day. This is why I got something special today :). How about using FreeBSD as an Enterprise Storage solution on real hardware? This where FreeBSD shines with all its storage features ZFS included.&lt;br&gt;
&amp;gt; Today I will show you how I have built so called Enterprise Storage based on FreeBSD system along with more then 1 PB (Petabyte) of raw capacity.&lt;br&gt;
&amp;gt; This project is different. How much storage space can you squeeze from a single 4U system? It turns out a lot! Definitely more then 1 PB (1024 TB) of raw storage space.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;See the article for the rest of the writeup&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/XDeathwatchStarts" target="_blank" rel="nofollow noopener"&gt;The death watch for the X Window System (aka X11) has probably started&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Once we are done with this we expect X.org to go into hard maintenance mode fairly quickly. The reality is that X.org is basically maintained by us and thus once we stop paying attention to it there is unlikely to be any major new releases coming out and there might even be some bitrot setting in over time. We will keep an eye on it as we will want to ensure X.org stays supportable until the end of the RHEL8 lifecycle at a minimum, but let this be a friendly notice for everyone who rely the work we do maintaining the Linux graphics stack, get onto Wayland, that is where the future is.&lt;br&gt;
&amp;gt; I have no idea how true this is about X.org X server maintenance, either now or in the future, but I definitely think it's a sign that developers have started saying this. If Gnome developers feel that X.org is going to be in hard maintenance mode almost immediately, they're probably pretty likely to also put the Gnome code that deals with X into hard maintenance mode. And public Gnome statements about this (and public action or lack of it) provide implicit support for KDE and any other desktop to move in this direction if they want to (and probably create some pressure to do so). I've known that Wayland was the future for some time, but I would still like it to not arrive any time soon.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=2vQXGomKoxA" target="_blank" rel="nofollow noopener"&gt;Porting NetBSD to Risc-V -- Video&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsd.org/news/newsflash.html#event20190628:01" target="_blank" rel="nofollow noopener"&gt;FreeBSD 11.3RC3 Available&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bunniestudios.com/blog/?p=5590" target="_blank" rel="nofollow noopener"&gt;Open Source Could Be a Casualty of the Trade War&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://sdf.org/sdf32/" target="_blank" rel="nofollow noopener"&gt;Celebrate UNIX50 and SDF32&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20190621104048" target="_blank" rel="nofollow noopener"&gt;doas environmental security&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Matt - &lt;a href="http://dpaste.com/1RP09F0#wrap" target="_blank" rel="nofollow noopener"&gt;BSD or Older Hardware&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;MJRodriguez - &lt;a href="http://dpaste.com/046SPPB#wrap" target="_blank" rel="nofollow noopener"&gt;Some Playstation news&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Moritz - &lt;a href="http://dpaste.com/1H4PJXW" target="_blank" rel="nofollow noopener"&gt;bhyve VT-x passthrough&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;


    &lt;source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0305.mp4" type="video/mp4"&gt;
    Your browser does not support the HTML5 video tag.
&lt;/source&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, opnsense, wine, storage, x11, x windows, risc-v, unix50, sdf32, doas</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Website protection with OPNsense, FreeBSD Support Pull Request for ZFS-on-Linux, How much has Unix changed, Porting Wine to amd64 on NetBSD, FreeBSD Enterprise 1 PB Storage, the death watch for X11 has started, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://medium.com/@jccwbb/website-protection-with-opnsense-3586a529d487" rel="nofollow">Website protection with OPNsense</a></h3>

<ul>
<li>with nginx plugin OPNsense become a strong full featured Web Application Firewall (WAF)</li>
</ul>

<blockquote>
<p>The OPNsense security platform can help you to protect your network and your webservers with the nginx plugin addition.<br>
In old days, install an open source firewall was a very trick task, but today it can be done with few clicks (or key strokes). In this article I&#39;ll not describe the detailed OPNsense installation process, but you can watch this video that was extracted from my OPNsense course available in Udemy. The video is in portuguese language, but with the translation CC Youtube feature you may be able to follow it without problems (if you don&#39;t are a portuguese speaker ofcourse) :-)</p>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>
</blockquote>

<hr>

<h3><a href="https://github.com/zfsonlinux/zfs/pull/8987" rel="nofollow">FreeBSD Support Pull Request against the ZFS-on-Linux repo</a></h3>

<ul>
<li>This pull request integrates the sysutils/openzfs port’s sources into the upstream ZoL repo
&gt; Adding FreeBSD support to ZoL will make it easier to move changes back and forth between FreeBSD and Linux
&gt; Refactor tree to separate out Linux and FreeBSD specific code
&gt; import FreeBSD&#39;s SPL
&gt; add ifdefs in common code where it made more sense to do so than duplicate the code in separate files
&gt; Adapted ZFS Test Suite to run on FreeBSD and all tests that pass on ZoL passing on ZoF</li>
<li>The plan to officially rename the common repo from ZFSonLinux to OpenZFS was announced at the ZFS Leadership Meeting on June 25th</li>
<li><a href="https://www.youtube.com/watch?v=TJwykiJmH0M" rel="nofollow">Video of Leadership Meeting</a></li>
<li><a href="https://docs.google.com/document/d/1w2jv2XVYFmBVvG1EGf-9A5HBVsjAYoLIFZAnWHhV-BM/edit" rel="nofollow">Meeting Agenda and Notes</a></li>
<li>This will allow improvements made on one OS to be made available more easily (and more quickly) to the other platforms</li>
<li>For example, mav@’s recent work:</li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=349220" rel="nofollow">Add wakeup_any(), cheaper version of wakeup_one() for taskqueue(9)</a>
&gt; As result, on 72-core Xeon v4 machine sequential ZFS write to 12 ZVOLs with 16KB block size spend 34% less time in wakeup_any() and descendants then it was spending in wakeup_one(), and total write throughput increased by ~10% with the same as before CPU usage.</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adventofcomputing.libsyn.com/episode-5-notes-how-much-has-unix-changed" rel="nofollow">Episode 5 Notes - How much has UNIX changed?</a></h3>

<blockquote>
<p>UNIX-like systems have dominated computing for decades, and with the rise of the internet and mobile devices their reach has become even larger. True, most systems now use more modern OSs like Linux, but how much has the UNIX-like landscape changed since the early days?<br>
So, my question was this: how close is a modern *NIX userland to some of the earliest UNIX releases? To do this I&#39;m going to compare a few key points of a modern Linux system with the earliest UNIX documentation I can get my hands on. The doc I am going to be covering(<a href="https://www.tuhs.org/Archive/Distributions/Research/Dennis_v1/UNIX_ProgrammersManual_Nov71.pdf" rel="nofollow">https://www.tuhs.org/Archive/Distributions/Research/Dennis_v1/UNIX_ProgrammersManual_Nov71.pdf</a>) is from November 1971, predating v1 of the system.<br>
I think the best place to start this comparison is to look at one of the highest-profile parts of the OS, that being the file system. Under the hood modern EXT file systems are completely different from the early UNIX file systems. However, they are still presented in basically the same way, as a heirerarchicat structure of directories with device files. So paths still look identical, and navigating the file system still functions the same. Often used commands like <code>ls</code>, <code>cp</code>, <code>mv</code>, <code>du</code>, and <code>df</code> function the same. So are <code>mount</code> and <code>umount</code>. But, there are some key differences. For instance, <code>cd</code> didn&#39;t exist, yet instead <code>chdir</code> filled its place. Also, <code>chmod</code> is somewhat different. Instead of the usual 3-digit octal codes for permissions, this older version only uses 2 digits. Really, that difference is due to the underlying file system using a different permission set than modern systems. For the most part, all the file handling is actually pretty close to a Linux system from 2019.</p>
</blockquote>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/porting_wine_to_amd64_on" rel="nofollow">Porting Wine to amd64 on NetBSD</a></h3>

<blockquote>
<p>I have been working on porting Wine to amd64 on NetBSD as a GSoC 2019 project. Wine is a compatibility layer which allows running Microsoft Windows applications on POSIX-complaint operating systems. This report provides an overview of the progress of the project during the first coding period.<br>
Initially, when I started working on getting Wine-4.4 to build and run on NetBSD i386 the primary issue that I faced was Wine displaying black windows instead of UI, and this applied to any graphical program I tried running with Wine.<br>
I suspected it , as it is related to graphics, to be an issue with the graphics driver or Xorg. Subsequently, I tried building modular Xorg, and I tried running Wine on it only to realize that Xorg being modular didn&#39;t affect it in the least. After having tried a couple of configurations, I realized that trying to hazard out every other probability is going to take an awful lot of time that I didn&#39;t have. This motivated me to bisect the repo using git, and find the first version of Wine which failed on NetBSD.</p>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>
</blockquote>

<hr>

<h3><a href="https://vermaden.wordpress.com/2019/06/19/freebsd-enterprise-1-pb-storage/?utm_source=discoverbsd" rel="nofollow">FreeBSD Enterprise 1 PB Storage</a></h3>

<blockquote>
<p>Today FreeBSD operating system turns 26 years old. 19 June is an International FreeBSD Day. This is why I got something special today :). How about using FreeBSD as an Enterprise Storage solution on real hardware? This where FreeBSD shines with all its storage features ZFS included.<br>
Today I will show you how I have built so called Enterprise Storage based on FreeBSD system along with more then 1 PB (Petabyte) of raw capacity.<br>
This project is different. How much storage space can you squeeze from a single 4U system? It turns out a lot! Definitely more then 1 PB (1024 TB) of raw storage space.</p>
</blockquote>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/XDeathwatchStarts" rel="nofollow">The death watch for the X Window System (aka X11) has probably started</a></h3>

<blockquote>
<p>Once we are done with this we expect X.org to go into hard maintenance mode fairly quickly. The reality is that X.org is basically maintained by us and thus once we stop paying attention to it there is unlikely to be any major new releases coming out and there might even be some bitrot setting in over time. We will keep an eye on it as we will want to ensure X.org stays supportable until the end of the RHEL8 lifecycle at a minimum, but let this be a friendly notice for everyone who rely the work we do maintaining the Linux graphics stack, get onto Wayland, that is where the future is.<br>
I have no idea how true this is about X.org X server maintenance, either now or in the future, but I definitely think it&#39;s a sign that developers have started saying this. If Gnome developers feel that X.org is going to be in hard maintenance mode almost immediately, they&#39;re probably pretty likely to also put the Gnome code that deals with X into hard maintenance mode. And public Gnome statements about this (and public action or lack of it) provide implicit support for KDE and any other desktop to move in this direction if they want to (and probably create some pressure to do so). I&#39;ve known that Wayland was the future for some time, but I would still like it to not arrive any time soon.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=2vQXGomKoxA" rel="nofollow">Porting NetBSD to Risc-V -- Video</a></li>
<li><a href="https://www.freebsd.org/news/newsflash.html#event20190628:01" rel="nofollow">FreeBSD 11.3RC3 Available</a></li>
<li><a href="https://www.bunniestudios.com/blog/?p=5590" rel="nofollow">Open Source Could Be a Casualty of the Trade War</a></li>
<li><a href="https://sdf.org/sdf32/" rel="nofollow">Celebrate UNIX50 and SDF32</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20190621104048" rel="nofollow">doas environmental security</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Matt - <a href="http://dpaste.com/1RP09F0#wrap" rel="nofollow">BSD or Older Hardware</a></li>
<li>MJRodriguez - <a href="http://dpaste.com/046SPPB#wrap" rel="nofollow">Some Playstation news</a></li>
<li>Moritz - <a href="http://dpaste.com/1H4PJXW" rel="nofollow">bhyve VT-x passthrough</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0305.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Website protection with OPNsense, FreeBSD Support Pull Request for ZFS-on-Linux, How much has Unix changed, Porting Wine to amd64 on NetBSD, FreeBSD Enterprise 1 PB Storage, the death watch for X11 has started, and more.</p>

<h2>Headlines</h2>

<h3><a href="https://medium.com/@jccwbb/website-protection-with-opnsense-3586a529d487" rel="nofollow">Website protection with OPNsense</a></h3>

<ul>
<li>with nginx plugin OPNsense become a strong full featured Web Application Firewall (WAF)</li>
</ul>

<blockquote>
<p>The OPNsense security platform can help you to protect your network and your webservers with the nginx plugin addition.<br>
In old days, install an open source firewall was a very trick task, but today it can be done with few clicks (or key strokes). In this article I&#39;ll not describe the detailed OPNsense installation process, but you can watch this video that was extracted from my OPNsense course available in Udemy. The video is in portuguese language, but with the translation CC Youtube feature you may be able to follow it without problems (if you don&#39;t are a portuguese speaker ofcourse) :-)</p>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>
</blockquote>

<hr>

<h3><a href="https://github.com/zfsonlinux/zfs/pull/8987" rel="nofollow">FreeBSD Support Pull Request against the ZFS-on-Linux repo</a></h3>

<ul>
<li>This pull request integrates the sysutils/openzfs port’s sources into the upstream ZoL repo
&gt; Adding FreeBSD support to ZoL will make it easier to move changes back and forth between FreeBSD and Linux
&gt; Refactor tree to separate out Linux and FreeBSD specific code
&gt; import FreeBSD&#39;s SPL
&gt; add ifdefs in common code where it made more sense to do so than duplicate the code in separate files
&gt; Adapted ZFS Test Suite to run on FreeBSD and all tests that pass on ZoL passing on ZoF</li>
<li>The plan to officially rename the common repo from ZFSonLinux to OpenZFS was announced at the ZFS Leadership Meeting on June 25th</li>
<li><a href="https://www.youtube.com/watch?v=TJwykiJmH0M" rel="nofollow">Video of Leadership Meeting</a></li>
<li><a href="https://docs.google.com/document/d/1w2jv2XVYFmBVvG1EGf-9A5HBVsjAYoLIFZAnWHhV-BM/edit" rel="nofollow">Meeting Agenda and Notes</a></li>
<li>This will allow improvements made on one OS to be made available more easily (and more quickly) to the other platforms</li>
<li>For example, mav@’s recent work:</li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=349220" rel="nofollow">Add wakeup_any(), cheaper version of wakeup_one() for taskqueue(9)</a>
&gt; As result, on 72-core Xeon v4 machine sequential ZFS write to 12 ZVOLs with 16KB block size spend 34% less time in wakeup_any() and descendants then it was spending in wakeup_one(), and total write throughput increased by ~10% with the same as before CPU usage.</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adventofcomputing.libsyn.com/episode-5-notes-how-much-has-unix-changed" rel="nofollow">Episode 5 Notes - How much has UNIX changed?</a></h3>

<blockquote>
<p>UNIX-like systems have dominated computing for decades, and with the rise of the internet and mobile devices their reach has become even larger. True, most systems now use more modern OSs like Linux, but how much has the UNIX-like landscape changed since the early days?<br>
So, my question was this: how close is a modern *NIX userland to some of the earliest UNIX releases? To do this I&#39;m going to compare a few key points of a modern Linux system with the earliest UNIX documentation I can get my hands on. The doc I am going to be covering(<a href="https://www.tuhs.org/Archive/Distributions/Research/Dennis_v1/UNIX_ProgrammersManual_Nov71.pdf" rel="nofollow">https://www.tuhs.org/Archive/Distributions/Research/Dennis_v1/UNIX_ProgrammersManual_Nov71.pdf</a>) is from November 1971, predating v1 of the system.<br>
I think the best place to start this comparison is to look at one of the highest-profile parts of the OS, that being the file system. Under the hood modern EXT file systems are completely different from the early UNIX file systems. However, they are still presented in basically the same way, as a heirerarchicat structure of directories with device files. So paths still look identical, and navigating the file system still functions the same. Often used commands like <code>ls</code>, <code>cp</code>, <code>mv</code>, <code>du</code>, and <code>df</code> function the same. So are <code>mount</code> and <code>umount</code>. But, there are some key differences. For instance, <code>cd</code> didn&#39;t exist, yet instead <code>chdir</code> filled its place. Also, <code>chmod</code> is somewhat different. Instead of the usual 3-digit octal codes for permissions, this older version only uses 2 digits. Really, that difference is due to the underlying file system using a different permission set than modern systems. For the most part, all the file handling is actually pretty close to a Linux system from 2019.</p>
</blockquote>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>

<hr>

<h3><a href="https://blog.netbsd.org/tnf/entry/porting_wine_to_amd64_on" rel="nofollow">Porting Wine to amd64 on NetBSD</a></h3>

<blockquote>
<p>I have been working on porting Wine to amd64 on NetBSD as a GSoC 2019 project. Wine is a compatibility layer which allows running Microsoft Windows applications on POSIX-complaint operating systems. This report provides an overview of the progress of the project during the first coding period.<br>
Initially, when I started working on getting Wine-4.4 to build and run on NetBSD i386 the primary issue that I faced was Wine displaying black windows instead of UI, and this applied to any graphical program I tried running with Wine.<br>
I suspected it , as it is related to graphics, to be an issue with the graphics driver or Xorg. Subsequently, I tried building modular Xorg, and I tried running Wine on it only to realize that Xorg being modular didn&#39;t affect it in the least. After having tried a couple of configurations, I realized that trying to hazard out every other probability is going to take an awful lot of time that I didn&#39;t have. This motivated me to bisect the repo using git, and find the first version of Wine which failed on NetBSD.</p>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>
</blockquote>

<hr>

<h3><a href="https://vermaden.wordpress.com/2019/06/19/freebsd-enterprise-1-pb-storage/?utm_source=discoverbsd" rel="nofollow">FreeBSD Enterprise 1 PB Storage</a></h3>

<blockquote>
<p>Today FreeBSD operating system turns 26 years old. 19 June is an International FreeBSD Day. This is why I got something special today :). How about using FreeBSD as an Enterprise Storage solution on real hardware? This where FreeBSD shines with all its storage features ZFS included.<br>
Today I will show you how I have built so called Enterprise Storage based on FreeBSD system along with more then 1 PB (Petabyte) of raw capacity.<br>
This project is different. How much storage space can you squeeze from a single 4U system? It turns out a lot! Definitely more then 1 PB (1024 TB) of raw storage space.</p>
</blockquote>

<ul>
<li>See the article for the rest of the writeup</li>
</ul>

<hr>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/XDeathwatchStarts" rel="nofollow">The death watch for the X Window System (aka X11) has probably started</a></h3>

<blockquote>
<p>Once we are done with this we expect X.org to go into hard maintenance mode fairly quickly. The reality is that X.org is basically maintained by us and thus once we stop paying attention to it there is unlikely to be any major new releases coming out and there might even be some bitrot setting in over time. We will keep an eye on it as we will want to ensure X.org stays supportable until the end of the RHEL8 lifecycle at a minimum, but let this be a friendly notice for everyone who rely the work we do maintaining the Linux graphics stack, get onto Wayland, that is where the future is.<br>
I have no idea how true this is about X.org X server maintenance, either now or in the future, but I definitely think it&#39;s a sign that developers have started saying this. If Gnome developers feel that X.org is going to be in hard maintenance mode almost immediately, they&#39;re probably pretty likely to also put the Gnome code that deals with X into hard maintenance mode. And public Gnome statements about this (and public action or lack of it) provide implicit support for KDE and any other desktop to move in this direction if they want to (and probably create some pressure to do so). I&#39;ve known that Wayland was the future for some time, but I would still like it to not arrive any time soon.</p>
</blockquote>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=2vQXGomKoxA" rel="nofollow">Porting NetBSD to Risc-V -- Video</a></li>
<li><a href="https://www.freebsd.org/news/newsflash.html#event20190628:01" rel="nofollow">FreeBSD 11.3RC3 Available</a></li>
<li><a href="https://www.bunniestudios.com/blog/?p=5590" rel="nofollow">Open Source Could Be a Casualty of the Trade War</a></li>
<li><a href="https://sdf.org/sdf32/" rel="nofollow">Celebrate UNIX50 and SDF32</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20190621104048" rel="nofollow">doas environmental security</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li>Matt - <a href="http://dpaste.com/1RP09F0#wrap" rel="nofollow">BSD or Older Hardware</a></li>
<li>MJRodriguez - <a href="http://dpaste.com/046SPPB#wrap" rel="nofollow">Some Playstation news</a></li>
<li>Moritz - <a href="http://dpaste.com/1H4PJXW" rel="nofollow">bhyve VT-x passthrough</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>

<video controls preload="metadata" style=" width:426px;  height:240px;">
    <source src="http://201406.jb-dl.cdn.scaleengine.net/bsdnow/2019/bsd-0305.mp4" type="video/mp4">
    Your browser does not support the HTML5 video tag.
</video>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 261: FreeBSDcon Flashback | BSD Now 261</title>
  <link>https://www.bsdnow.tv/261</link>
  <guid isPermaLink="false">http://feed.jupiter.zone/bsdnow#entry-2488</guid>
  <pubDate>Thu, 30 Aug 2018 03:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9bf2ff39-f045-4c19-8416-f1a6da6d3f84.mp3" length="65719133" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Insight into TrueOS and Trident, stop evildoers with pf-badhost, Flashback to FreeBSDcon ‘99, OpenBSD’s measures against TLBleed, play Morrowind on OpenBSD in 5 steps, DragonflyBSD developers shocked at Threadripper performance, and more.</itunes:subtitle>
  <itunes:duration>1:49:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Insight into TrueOS and Trident, stop evildoers with pf-badhost, Flashback to FreeBSDcon ‘99, OpenBSD’s measures against TLBleed, play Morrowind on OpenBSD in 5 steps, DragonflyBSD developers shocked at Threadripper performance, and more.&lt;/p&gt;

&lt;p&gt;##Headlines&lt;br&gt;
###&lt;a href="https://itsfoss.com/project-trident-interview/" target="_blank" rel="nofollow noopener"&gt;An Insight into the Future of TrueOS BSD and Project Trident&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Last month, TrueOS announced that they would be spinning off their desktop offering. The team behind the new project, named Project Trident, have been working furiously towards their first release. They did take a few minutes to answer some of our question about Project Trident and TrueOS. I would like to thank JT and Ken for taking the time to compile these answers.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: What is Project Trident?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: Project Trident is the continuation of the TrueOS Desktop. Essentially, it is the continuation of the primary “TrueOS software” that people have been using for the past 2 years. The continuing evolution of the entire TrueOS project has reached a stage where it became necessary to reorganize the project. To understand this change, it is important to know the history of the TrueOS project.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;Originally, Kris Moore created PC-BSD. This was a Desktop release of FreeBSD focused on providing a simple and user-friendly graphical experience for FreeBSD. PC-BSD grew and matured over many years. During the evolution of PC-BSD, many users began asking for a server focused version of the software. Kris agreed, and TrueOS was born as a scaled down server version of PC-BSD. In late 2016, more contributors and growth resulted in significant changes to the PC-BSD codebase. Because the new development was so markedly different from the original PC-BSD design, it was decided to rebrand the project.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;TrueOS was chosen as the name for this new direction for PC-BSD as the project had grown beyond providing only a graphical front to FreeBSD and was beginning to make fundamental changes to the FreeBSD operating system. One of these changes was moving PC-BSD from being based on each FreeBSD Release to TrueOS being based on the active and less outdated FreeBSD Current. Other major changes are using OpenRC for service management and being more aggressive about addressing long-standing issues with the FreeBSD release process. TrueOS moved toward a rolling release cycle, twice a year, which tested and merged FreeBSD changes directly from the developer instead of waiting months or even years for the FreeBSD review process to finish. TrueOS also deprecated and removed obsolete technology much more regularly.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;As the TrueOS Project grew, the developers found these changes were needed by other FreeBSD-based projects. These projects began expressing interest in using TrueOS rather than FreeBSD as the base for their project. This demonstrated that TrueOS needed to again evolve into a distribution framework for any BSD project to use. This allows port maintainers and source developers from any BSD project to pool their resources and use the same source repositories while allowing every distribution to still customize, build, and release their own self-contained project. The result is a natural split of the traditional TrueOS team. There were now naturally two teams in the TrueOS project: those working on the build infrastructure and FreeBSD enhancements – the “core” part of the project, and those working on end-user experience and utility – the “desktop” part of the project.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;When the decision was made to formally split the projects, the obvious question that arose was what to call the “Desktop” project. As TrueOS was already positioned to be a BSD distribution platform, the developers agreed the desktop side should pick a new name. There were other considerations too, one notable being that we were concerned that if we continued to call the desktop project “TrueOS Desktop”, it would prevent people from considering TrueOS as the basis for their distribution because of misconceptions that TrueOS was a desktop-focused OS. It also helps to “level the playing field” for other desktop distributions like GhostBSD so that TrueOS is not viewed as having a single “blessed” desktop version.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: What features will TrueOS add to the FreeBSD base?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: TrueOS has already added a number of features to FreeBSD:&lt;br&gt;
OpenRC replaces rc.d for service management&lt;br&gt;
LibreSSL in base&lt;br&gt;
Root NSS certificates out-of-box&lt;br&gt;
Scriptable installations (pc-sysinstall)&lt;br&gt;
The full list of changes can be seen on the TrueOS repository (&lt;a href="https://github.com/trueos/trueos/blob/trueos-master/README.md" target="_blank" rel="nofollow noopener"&gt;https://github.com/trueos/trueos/blob/trueos-master/README.md&lt;/a&gt;). This list does change quite regularly as FreeBSD development itself changes.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: I understand that TrueOS will have a new feature that will make creating a desktop spin of TrueOS very easy. Could you explain that new feature?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: Historically, one of the biggest hurdles for creating a desktop version of FreeBSD is that the build options for packages are tuned for servers rather than desktops. This means a desktop distribution cannot use the pre-built packages from FreeBSD and must build, use, and maintain a custom package repository. Maintaining a fork of the FreeBSD ports tree is no trivial task. TrueOS has created a full distribution framework so now all it takes to create a custom build of FreeBSD is a single JSON manifest file. There is now a single “source of truth” for the source and ports repositories that is maintained by the TrueOS team and regularly tagged with “stable” build markers. All projects can use this framework, which makes updates trivial.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: Do you think that the new focus of TrueOS will lead to the creation of more desktop-centered BSDs?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: That is the hope. Historically, creating a desktop-centered BSD has required a lot of specialized knowledge. Not only do most people not have this knowledge, but many do not even know what they need to learn until they start troubleshooting. TrueOS is trying to drastically simplify this process to enable the wider Open Source community to experiment, contribute, and enjoy BSD-based projects.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: What is going to happen to TrueOS Pico? Will Project Trident have ARM support?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: Project Trident will be dependent on TrueOS for ARM support. The developers have talked about the possibility of supporting ARM64 and RISC-V architectures, but it is not possible at the current time. If more Open Source contributors want to help develop ARM and RISC-V support, the TrueOS project is definitely willing to help test and integrate that code.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: What does this change (splitting Trus OS into Project Trident) mean for the Lumina desktop environment?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: Long-term, almost nothing. Lumina is still the desktop environment for Project Trident and will continue to be developed and enhanced alongside Project Trident just as it was for TrueOS. Short-term, we will be delaying the release of Lumina 2.0 and will release an updated version of the 1.x branch (1.5.0) instead. This is simply due to all the extra overhead to get Project Trident up and running. When things settle down into a rhythm, the development of Lumina will pick up once again.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: Are you planning on including any desktop environments besides Lumina?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: While Lumina is included by default, all of the other popular desktop environments will be available in the package repo exactly as they had been before.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: Any plans to include Steam to increase the userbase?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: Steam is still unavailable natively on FreeBSD, so we do not have any plans to ship it out of the box currently. In the meantime, we highly recommend installing the Windows version of Steam through the PlayOnBSD utility.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: What will happen to the AppCafe?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: The AppCafe is the name of the graphical interface for the “pkg” utility integrated into the SysAdm client created by TrueOS. This hasn’t changed. SysAdm, the graphical client, and by extension AppCafe are still available for all TrueOS-based distributions to use.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: Does Project Trident have any corporate sponsors lined up? If not, would you be open to it or would you prefer that it be community supported?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: iXsystems is the first corporate sponsor of Project Trident and we are always open to other sponsorships as well. We would prefer smaller individual contributions from the community, but we understand that larger project needs or special-purpose goals are much more difficult to achieve without allowing larger corporate sponsorships as well. In either case, Project Trident is always looking out for the best interests of the community and will not allow intrusive or harmful code to enter the project even if a company or individual tries to make that code part of a sponsorship deal.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: BSD always seems to be lagging in terms of support for newer devices. Will TrueOS be able to remedy that with a quicker release cycle?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: Yes! That was a primary reason for TrueOS to start tracking the CURRENT branch of FreeBSD in 2016. This allows for the changes that FreeBSD developers are making, including new hardware support, to be available much sooner than if we followed the FreeBSD release cycle.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;It’s FOSS: Do you have any idea when Project Trident will have its first release?&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Project Trident: Right now we are targeting a late August release date. This is because Project Trident is “kicking the wheels” on the new TrueOS distribution system. We want to ensure everything is working smoothly before we release. Going forward, we plan on having regular package updates every week or two for the end-user packages and a new release of Trident with an updated OS version every 6 months. This will follow the TrueOS release schedule with a small time offset.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://www.geoghegan.ca/pfbadhost.html" target="_blank" rel="nofollow noopener"&gt;pf-badhost: Stop the evil doers in their tracks!&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;pf-badhost is a simple, easy to use badhost blocker that uses the power of the pf firewall to block many of the internet’s biggest irritants. Annoyances such as ssh bruteforcers are largely eliminated. Shodan scans and bots looking for webservers to abuse are stopped dead in their tracks. When used to filter outbound traffic, pf-badhost blocks many seedy, spooky malware containing and/or compromised webhosts.&lt;br&gt;
Filtering performance is exceptional, as the badhost list is stored in a pf table. To quote the OpenBSD FAQ page regarding tables: “the lookup time on a table holding 50,000 addresses is only slightly more than for one holding 50 addresses.”&lt;br&gt;
pf-badhost is simple and powerful. The blocklists are pulled from quality, trusted sources. The ‘Firehol’, ‘Emerging Threats’ and ‘Binary Defense’ block lists are used as they are popular, regularly updated lists of the internet’s most egregious offenders. The &lt;a href="http://pf-badhost.sh" target="_blank" rel="nofollow noopener"&gt;pf-badhost.sh&lt;/a&gt; script can easily be expanded to use additional or alternate blocklists.&lt;br&gt;
pf-badhost works best when used in conjunction with unbound-adblock for the ultimate badhost blocking.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Notes:&lt;/li&gt;
&lt;li&gt;If you are trying to run pf-badhost on a LAN or are using NAT, you will want to add a rule to your pf.conf appearing BEFORE the pf-badhost rules allowing traffic to and from your local subnet so that you can still access your gateway and any DNS servers.&lt;/li&gt;
&lt;li&gt;Conversely, adding a line to &lt;a href="http://pf-badhost.sh" target="_blank" rel="nofollow noopener"&gt;pf-badhost.sh&lt;/a&gt; that removes your subnet range from the &amp;lt;pfbadhost&amp;gt; table should also work. Just make sure you choose a subnet range / CIDR block that is actually in the list. 192.168.0.0/16, 172.16.0.0/12 and 10.0.0.0/8 are the most common home/office subnet ranges.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;DigitalOcean&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://do.co/bsdnow" target="_blank" rel="nofollow noopener"&gt;https://do.co/bsdnow&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;###&lt;a href="http://edition.cnn.com/TECH/computing/9911/01/freebsd.con99.idg/" target="_blank" rel="nofollow noopener"&gt;FLASHBACK: FreeBSDCon’99: Fans of Linux’s lesser-known sibling gather for the first time&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;FreeBSD, a port of BSD Unix to Intel, has been around almost as long as Linux has – but without the media hype. Its developer and user community recently got a chance to get together for the first time, and they did it in the city where BSD – the Berkeley Software Distribution – was born some 25 years ago.&lt;br&gt;
October 17, 1999 marked a milestone in the history of FreeBSD – the first FreeBSD conference was held in the city where it all began, Berkeley, CA. Over 300 developers, users, and interested parties attended from around the globe.&lt;br&gt;
This was easily 50 percent more people than the conference organizers had expected. This first conference was meant to be a gathering mostly for developers and FreeBSD advocates. The turnout was surprisingly (and gratifyingly) large.&lt;br&gt;
In fact, attendance exceeded expectations so much that, for instance, Kirk McKusick had to add a second, identical tutorial on FreeBSD internals, because it was impossible for everyone to attend the first!&lt;br&gt;
But for a first-ever conference, I was impressed by how smoothly everything seemed to go. Sessions started on time, and the sessions I attended were well-run; nothing seemed to be too cold, dark, loud, late, or off-center.&lt;br&gt;
Of course, the best part about a conference such as this one is the opportunity to meet with other people who share similar interests. Lunches and breaks were a good time to meet people, as was the Tuesday night beer bash.&lt;br&gt;
The Wednesday night reception was of a type unusual for the technical conferences I usually attend – a three-hour Hornblower dinner cruise on San Francisco Bay. Not only did we all enjoy excellent food and company, but we all got to go up on deck and watch the lights of San Francisco and Berkeley as we drifted by. Although it’s nice when a conference attracts thousands of attendees, there are some things that can only be done with smaller groups of people; this was one of them.&lt;br&gt;
In short, this was a tiny conference, but a well-run one.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Sessions&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Although it was a relatively small conference, the number and quality of the sessions belied the size. Each of the three days of the conference featured a different keynote speaker. In addition to Jordan Hubbard, Jeremy Allison spoke on “Samba Futures” on day two, and Brian Behlendorf gave a talk on “FreeBSD and Apache: A Perfect Combo” to start off the third day.&lt;br&gt;
The conference sessions themselves were divided into six tracks: advocacy, business, development, networking, security, and panels. The panels track featured three different panels, made up of three different slices of the community: the FreeBSD core team, a press panel, and a prominent user panel with representatives from such prominent commercial users as Yahoo! and USWest.&lt;br&gt;
I was especially interested in Apple Computer’s talk in the development track. Wilfredo Sanchez, technical lead for open source projects at Apple (no, that’s not an oxymoron!) spoke about Apple’s Darwin project, the company’s operating system road map, and the role of BSD (and, specifically, FreeBSD) in Apple’s plans.&lt;br&gt;
Apple and Unix have had a long and uneasy history, from the Lisa through the A/UX project to today. Personally, I’m very optimistic about the chances for the Darwin project to succeed. Apple’s core OS kernel team has chosen FreeBSD as its reference platform. I’m looking forward to what this partnership will bring to both sides.&lt;br&gt;
Other development track sessions included in-depth tutorials on writing device drivers, basics of the Vinum Volume Manager, Fibre Channel, development models (the open repository model), and the FreeBSD Documentation Project (FDP). If you’re interested in contributing to the FreeBSD project, the FDP is a good place to start.&lt;br&gt;
Advocacy sessions included “How One Person Can Make a Difference” (a timeless topic that would find a home at any technical conference!) and “Starting and Managing A User Group” (trials and tribulations as well as rewards).&lt;br&gt;
The business track featured speakers from three commercial users of FreeBSD: Cybernet, USWest, and Applix. Applix presented its port of Applixware Office for FreeBSD and explained how Applix has taken the core services of Applixware into open source.&lt;br&gt;
Commercial applications and open source were once a rare combination; we can only hope the trend away from that state of affairs will continue.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;Commercial use of FreeBSD&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;The use of FreeBSD in embedded applications is increasing as well – and it is increasing at the same rate that hardware power is. These days, even inexpensive systems are able to run a BSD kernel.&lt;br&gt;
The BSD license and the solid TCP/IP stack prove significant enticements to this market as well. (Unlike the GNU Public License, the BSD license does not require that vendors make derivative works open source.)&lt;br&gt;
Companies such as USWest and Verio use FreeBSD for a wide variety of different Internet services.&lt;br&gt;
Yahoo! and Hotmail are examples of companies that use FreeBSD extensively for more specific purposes. Yahoo!, for example, has many hundreds of FreeBSD boxes, and Hotmail has almost 2000 FreeBSD machines at its data center in the San Francisco Bay area.&lt;br&gt;
Hotmail is owned by Microsoft, so the fact that it runs FreeBSD is a secret. Don’t tell anyone…&lt;br&gt;
When asked to comment on the increasing commercial interest in BSD, Hubbard said that FreeBSD is learning the Red Hat lesson. “Walnut Creek and others with business interests in FreeBSD have learned a few things from the Red Hat IPO,” he said, “and nobody is just sitting around now, content with business as usual. It’s clearly business as unusual in the open source world today.”&lt;br&gt;
Hubbard had also singled out some of BSD’s commercial partners, such as Whistle Communications, for praise in his opening day keynote. These partners play a key role in moving the project forward, he said, by contributing various enhancements and major new systems, such as Netgraph, as well as by contributing paid employee time spent on FreeBSD.&lt;br&gt;
Even short FreeBSD-related contacts can yield good results, Hubbard said. An example of this is the new jail() security code introduced in FreeBSD 3.x and 4.0, which was contributed by R &amp;amp; D Associates. A number of ISPs are also now donating the hardware and bandwidth that allows the project to provide more resource mirrors and experimental development sites.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;See you next year&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;And speaking of corporate sponsors, thanks go to Walnut Creek for sponsoring the conference, and to Yahoo! for covering all the expenses involved in bringing the entire FreeBSD core team to Berkeley.&lt;br&gt;
As a fan of FreeBSD, I’m happy to see that the project has finally produced a conference. It was time: many of the 16 core team members had been working together on a regular basis for nearly seven years without actually meeting face to face.&lt;br&gt;
It’s been an interesting year for open source projects. I’m looking forward to the next year – and the next BSD conference – to be even better.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##News Roundup&lt;br&gt;
###&lt;a href="https://marc.info/?l=openbsd-tech&amp;amp;m=153504937925732&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD Recommends: Disable SMT/Hyperthreading in all Intel BIOSes&lt;/a&gt;&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;Two recently disclosed hardware bugs affected Intel cpus:

     - TLBleed

     - T1TF (the name "Foreshadow" refers to 1 of 3 aspects of this
             bug, more aspects are surely on the way)

Solving these bugs requires new cpu microcode, a coding workaround,
*AND* the disabling of SMT / Hyperthreading.

SMT is fundamentally broken because it shares resources between the two
cpu instances and those shared resources lack security differentiators.
Some of these side channel attacks aren't trivial, but we can expect
most of them to eventually work and leak kernel or cross-VM memory in
common usage circumstances, even such as javascript directly in a
browser.

There will be more hardware bugs and artifacts disclosed.  Due to the
way SMT interacts with speculative execution on Intel cpus, I expect SMT
to exacerbate most of the future problems.

A few months back, I urged people to disable hyperthreading on all
Intel cpus.  I need to repeat that:

    DISABLE HYPERTHREADING ON ALL YOUR INTEL MACHINES IN THE BIOS.

Also, update your BIOS firmware, if you can.

OpenBSD -current (and therefore 6.4) will not use hyperthreading if it
is enabled, and will update the cpu microcode if possible.

But what about 6.2 and 6.3?

The situation is very complex, continually evolving, and is taking too
much manpower away from other tasks.  Furthermore, Intel isn't telling
us what is coming next, and are doing a terrible job by not publically
documenting what operating systems must do to resolve the problems.  We
are having to do research by reading other operating systems.  There is
no time left to backport the changes -- we will not be issuing a
complete set of errata and syspatches against 6.2 and 6.3 because it is
turning into a distraction.

Rather than working on every required patch for 6.2/6.3, we will
re-focus manpower and make sure 6.4 contains the best solutions
possible.

So please try take responsibility for your own machines: Disable SMT in
the BIOS menu, and upgrade your BIOS if you can.

I'm going to spend my money at a more trustworthy vendor in the future.
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://medium.com/@enzuru/get-morrowind-running-on-openbsd-in-5-simple-steps-b65e20f3f0c" target="_blank" rel="nofollow noopener"&gt;Get Morrowind running on OpenBSD in 5 simple steps&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This article contains brief instructions on how to get one of the greatest Western RPGs of all time, The Elder Scrolls III: Morrowind, running on OpenBSD using the OpenMW open source engine recreation. These instructions were tested on a ThinkPad X1 Carbon Gen 3. The information was adapted from this OpenMW forum thread: &lt;a href="https://forum.openmw.org/viewtopic.php?t=3510" target="_blank" rel="nofollow noopener"&gt;https://forum.openmw.org/viewtopic.php?t=3510&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;ol&gt;
&lt;li&gt;Purchase and download the DRM-free version from GOG (also considered the best version due to the high quality PDF guide that it comes with): &lt;a href="https://www.gog.com/game/the_elder_scrolls_iii_morrowind_goty_edition" target="_blank" rel="nofollow noopener"&gt;https://www.gog.com/game/the_elder_scrolls_iii_morrowind_goty_edition&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;ol&gt;
&lt;li&gt;Install the required packages built from the ports tree as root. openmw is the recreated game engine, and innoextract is how we will get the game data files out of the win32 executable.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;pkg_add openmw innoextract&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;ol&gt;
&lt;li&gt;Move the file from GOG setup_tes_morrowind_goty_2.0.0.7.exe into its own directory morrowind/ due to innoextract’s default behaviour of extracting into the current directory. Then type:&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;innoextract setup_tes_morrowind_goty_2.0.0.7.exe&lt;/code&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;ol&gt;
&lt;li&gt;Type openmw-wizard and follow the straightforward instructions. Note that you have a pre-existing installation, and select the morrowind/app/Data Files folder that innoextract extracted.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;ol&gt;
&lt;li&gt;Type in openmw-launcher, toggle the settings to your preferences, and then hit play!&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;iXsystems&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://twitter.com/allanjude/status/1034647571124367360" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/allanjude/status/1034647571124367360&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;###&lt;a href="https://euroquis.nl/bobulate/?p=1937" target="_blank" rel="nofollow noopener"&gt;My First Clang Bug&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Part of the role of being a packager is compiling lots (and lots) of packages. That means compiling lots of code from interesting places and in a variety of styles. In my opinion, being a good packager also means providing feedback to upstream when things are bad. That means filing upstream bugs when possible, and upstreaming patches.&lt;br&gt;
One of the “exciting” moments in packaging is when tools change. So each and every major CMake update is an exercise in recompiling 2400 or more packages and adjusting bits and pieces. When a software project was last released in 2013, adjusting it to modern tools can become quite a chore (e.g. Squid Report Generator). CMake is excellent for maintaining backwards compatibility, generally accommodating old software with new policies. The most recent 3.12 release candidate had three issues filed from the FreeBSD side, all from fallout with older software.  I consider the hours put into good bug reports, part of being a good citizen of the Free Software world.&lt;br&gt;
My most interesting bug this week, though, came from one line of code somewhere in Kleopatra: Q_UNUSED(gpgagent_data);&lt;br&gt;
That one line triggered a really peculiar link error in KDE’s FreeBSD CI system. Yup … telling the compiler something is unused made it fall over. Commenting out that line got rid of the link error, but introduced a warning about an unused function. Working with KDE-PIM’s Volker Krause, we whittled the problem down to a six-line example program — two lines if you don’t care much for coding style. I’m glad, at that point, that I could throw it over the hedge to the LLVM team with some explanatory text. Watching the process on their side reminds me ever-so-strongly of how things work in KDE (or FreeBSD for that matter): Bugzilla, Phabricator, and git combine to be an effective workflow for developers (perhaps less so for end-users).&lt;br&gt;
Today I got a note saying that the issue had been resolved. So brief a time for a bug. Live fast. Get squashed young.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;###&lt;a href="https://www.phoronix.com/scan.php?page=news_item&amp;amp;px=Threadripper-2990WX-DragonFly" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD Now Runs On The Threadripper 2990WX, Developer Shocked At Performance&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Last week I carried out some tests of BSD vs. Linux on the new 32-core / 64-thread Threadripper 2990WX. I tested FreeBSD 11, FreeBSD 12, and TrueOS – those benchmarks will be published in the next few days. I tried DragonFlyBSD, but at the time it wouldn’t boot with this AMD HEDT processor. But now the latest DragonFlyBSD development kernel can handle the 2990WX and the lead DragonFly developer calls this new processor “a real beast” and is stunned by its performance potential.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;When I tried last week, the DragonFlyBSD 5.2.2 stable release nor DragonFlyBSD 5.3 daily snapshot would boot on the 2990WX. But it turns out Matthew Dillon, the lead developer of DragonFlyBSD, picked up a rig and has it running now. So in time for the next 5.4 stable release or those using the daily snapshots can have this 32-core / 64-thread Zen+ CPU running on this operating system long ago forked from FreeBSD.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;In announcing his success in bringing up the 2990WX under DragonFlyBSD, which required a few minor changes, he shared his performance thoughts and hopes for the rig. “The cpu is a real beast, packing 32 cores and 64 threads. It blows away our dual-core Xeon to the tune of being +50% faster in concurrent compile tests, and it also blows away our older 4-socket Opteron (which we call ‘Monster’) by about the same margin. It’s an impressive CPU. For now the new beast is going to be used to help us improve I/O performance through the filesystem, further SMP work (but DFly scales pretty well to 64 threads already), and perhaps some driver to work to support the 10gbe on the mobo.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;Dillon shared some results on the system as well. " The Threadripper 2990WX is a beast. It is at &lt;em&gt;least&lt;/em&gt; 50% faster than both the quad socket opteron and the dual socket Xeon system I tested against. The primary limitation for the 2990WX is likely its 4 channels of DDR4 memory, and like all Zen and Zen+ CPUs, memory performance matters more than CPU frequency (and costs almost no power to pump up the performance). That said, it still blow away a dual-socket Xeon with 3x the number of memory channels. That is impressive!"&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;The well known BSD developer also added, “This puts the 2990WX at par efficiency vs a dual-socket Xeon system, and better than the dual-socket Xeon with slower memory and a power cap. This is VERY impressive. I should note that the 2990WX is more specialized with its asymetric NUMA architecture and 32 cores. I think the sweet spot in terms of CPU pricing and efficiency is likely going to be with the 2950X (16-cores/32-threads). It is clear that the 2990WX (32-cores/64-threads) will max out 4-channel memory bandwidth for many workloads, making it a more specialized part. But still awesome…This thing is an incredible beast, I’m glad I got it.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;blockquote&gt;
&lt;p&gt;While I have the FreeBSD vs. Linux benchmarks from a few days ago, it looks like now on my ever growing TODO list will be re-trying out the newest DragonFlyBSD daily snapshot for seeing how the performance compares in the mix. Stay tuned for the numbers that should be in the next day or two.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;##Beastie Bits&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20180810075449" target="_blank" rel="nofollow noopener"&gt;X11 on really small devices&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://undeadly.org/cgi?action=article;sid=20180810131231" target="_blank" rel="nofollow noopener"&gt;mandoc-1.14.4 released&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.netgate.com/blog/pfSense-book-available-to-everyone.html" target="_blank" rel="nofollow noopener"&gt;The pfSense Book is now available to everyone&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://mwl.io/archives/3619" target="_blank" rel="nofollow noopener"&gt;MWL: Burn it down! Burn it all down!&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://github.com/begriffs/obsd" target="_blank" rel="nofollow noopener"&gt;Configuring OpenBSD: System and user config files for a more pleasant laptop&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-18:08.tcp.asc" target="_blank" rel="nofollow noopener"&gt;FreeBSD Security Advisory: Resource exhaustion in TCP reassembly&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://discoverbsd.com/p/92d80d1497" target="_blank" rel="nofollow noopener"&gt;OpenBSD Foundation gets first 2018 Iridium donation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=337653" target="_blank" rel="nofollow noopener"&gt;New ZFS commit solves issue a few users reported in the feedback segment&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/TridentProject/status/1034620476553867264" target="_blank" rel="nofollow noopener"&gt;Project Trident should have a beta release by the end of next week&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.meetup.com/BSD-Users-Stockholm/events/253447019/" target="_blank" rel="nofollow noopener"&gt;Reminder about Stockholm BUG: September 5, 17:30-22:00&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bsd-pl.org/en" target="_blank" rel="nofollow noopener"&gt;BSD-PL User Group: September 13, 18:30-21:00&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;p&gt;&lt;strong&gt;Tarsnap&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;##Feedback/Questions&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Malcom - &lt;a href="http://dpaste.com/15VVVCP" target="_blank" rel="nofollow noopener"&gt;Having different routes per interface&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Bostjan - &lt;a href="http://dpaste.com/1Q14C6H#wrap" target="_blank" rel="nofollow noopener"&gt;ZFS and integrity of data&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Michael - &lt;a href="http://dpaste.com/2JD17BP#wrap" target="_blank" rel="nofollow noopener"&gt;Suggestion for Monitoring&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Barry - &lt;a href="http://dpaste.com/2GJ3RMG#wrap" target="_blank" rel="nofollow noopener"&gt;Feedback&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, trueos, trident, hardenedbsd, tutorial, howto, guide, bsd, interview, Hyperthreading, TLBleed, T1TF, Foreshadow, pf-badhost, Threadripper, X11</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Insight into TrueOS and Trident, stop evildoers with pf-badhost, Flashback to FreeBSDcon ‘99, OpenBSD’s measures against TLBleed, play Morrowind on OpenBSD in 5 steps, DragonflyBSD developers shocked at Threadripper performance, and more.</p>

<p>##Headlines<br>
###<a href="https://itsfoss.com/project-trident-interview/">An Insight into the Future of TrueOS BSD and Project Trident</a></p>

<blockquote>
<p>Last month, TrueOS announced that they would be spinning off their desktop offering. The team behind the new project, named Project Trident, have been working furiously towards their first release. They did take a few minutes to answer some of our question about Project Trident and TrueOS. I would like to thank JT and Ken for taking the time to compile these answers.</p>
</blockquote>

<ul>
<li>It’s FOSS: What is Project Trident?</li>
</ul>

<blockquote>
<p>Project Trident: Project Trident is the continuation of the TrueOS Desktop. Essentially, it is the continuation of the primary “TrueOS software” that people have been using for the past 2 years. The continuing evolution of the entire TrueOS project has reached a stage where it became necessary to reorganize the project. To understand this change, it is important to know the history of the TrueOS project.</p>
</blockquote>

<blockquote>
<p>Originally, Kris Moore created PC-BSD. This was a Desktop release of FreeBSD focused on providing a simple and user-friendly graphical experience for FreeBSD. PC-BSD grew and matured over many years. During the evolution of PC-BSD, many users began asking for a server focused version of the software. Kris agreed, and TrueOS was born as a scaled down server version of PC-BSD. In late 2016, more contributors and growth resulted in significant changes to the PC-BSD codebase. Because the new development was so markedly different from the original PC-BSD design, it was decided to rebrand the project.</p>
</blockquote>

<blockquote>
<p>TrueOS was chosen as the name for this new direction for PC-BSD as the project had grown beyond providing only a graphical front to FreeBSD and was beginning to make fundamental changes to the FreeBSD operating system. One of these changes was moving PC-BSD from being based on each FreeBSD Release to TrueOS being based on the active and less outdated FreeBSD Current. Other major changes are using OpenRC for service management and being more aggressive about addressing long-standing issues with the FreeBSD release process. TrueOS moved toward a rolling release cycle, twice a year, which tested and merged FreeBSD changes directly from the developer instead of waiting months or even years for the FreeBSD review process to finish. TrueOS also deprecated and removed obsolete technology much more regularly.</p>
</blockquote>

<blockquote>
<p>As the TrueOS Project grew, the developers found these changes were needed by other FreeBSD-based projects. These projects began expressing interest in using TrueOS rather than FreeBSD as the base for their project. This demonstrated that TrueOS needed to again evolve into a distribution framework for any BSD project to use. This allows port maintainers and source developers from any BSD project to pool their resources and use the same source repositories while allowing every distribution to still customize, build, and release their own self-contained project. The result is a natural split of the traditional TrueOS team. There were now naturally two teams in the TrueOS project: those working on the build infrastructure and FreeBSD enhancements – the “core” part of the project, and those working on end-user experience and utility – the “desktop” part of the project.</p>
</blockquote>

<blockquote>
<p>When the decision was made to formally split the projects, the obvious question that arose was what to call the “Desktop” project. As TrueOS was already positioned to be a BSD distribution platform, the developers agreed the desktop side should pick a new name. There were other considerations too, one notable being that we were concerned that if we continued to call the desktop project “TrueOS Desktop”, it would prevent people from considering TrueOS as the basis for their distribution because of misconceptions that TrueOS was a desktop-focused OS. It also helps to “level the playing field” for other desktop distributions like GhostBSD so that TrueOS is not viewed as having a single “blessed” desktop version.</p>
</blockquote>

<ul>
<li>It’s FOSS: What features will TrueOS add to the FreeBSD base?</li>
</ul>

<blockquote>
<p>Project Trident: TrueOS has already added a number of features to FreeBSD:<br>
OpenRC replaces rc.d for service management<br>
LibreSSL in base<br>
Root NSS certificates out-of-box<br>
Scriptable installations (pc-sysinstall)<br>
The full list of changes can be seen on the TrueOS repository (<a href="https://github.com/trueos/trueos/blob/trueos-master/README.md">https://github.com/trueos/trueos/blob/trueos-master/README.md</a>). This list does change quite regularly as FreeBSD development itself changes.</p>
</blockquote>

<ul>
<li>It’s FOSS: I understand that TrueOS will have a new feature that will make creating a desktop spin of TrueOS very easy. Could you explain that new feature?</li>
</ul>

<blockquote>
<p>Project Trident: Historically, one of the biggest hurdles for creating a desktop version of FreeBSD is that the build options for packages are tuned for servers rather than desktops. This means a desktop distribution cannot use the pre-built packages from FreeBSD and must build, use, and maintain a custom package repository. Maintaining a fork of the FreeBSD ports tree is no trivial task. TrueOS has created a full distribution framework so now all it takes to create a custom build of FreeBSD is a single JSON manifest file. There is now a single “source of truth” for the source and ports repositories that is maintained by the TrueOS team and regularly tagged with “stable” build markers. All projects can use this framework, which makes updates trivial.</p>
</blockquote>

<ul>
<li>It’s FOSS: Do you think that the new focus of TrueOS will lead to the creation of more desktop-centered BSDs?</li>
</ul>

<blockquote>
<p>Project Trident: That is the hope. Historically, creating a desktop-centered BSD has required a lot of specialized knowledge. Not only do most people not have this knowledge, but many do not even know what they need to learn until they start troubleshooting. TrueOS is trying to drastically simplify this process to enable the wider Open Source community to experiment, contribute, and enjoy BSD-based projects.</p>
</blockquote>

<ul>
<li>It’s FOSS: What is going to happen to TrueOS Pico? Will Project Trident have ARM support?</li>
</ul>

<blockquote>
<p>Project Trident: Project Trident will be dependent on TrueOS for ARM support. The developers have talked about the possibility of supporting ARM64 and RISC-V architectures, but it is not possible at the current time. If more Open Source contributors want to help develop ARM and RISC-V support, the TrueOS project is definitely willing to help test and integrate that code.</p>
</blockquote>

<ul>
<li>It’s FOSS: What does this change (splitting Trus OS into Project Trident) mean for the Lumina desktop environment?</li>
</ul>

<blockquote>
<p>Project Trident: Long-term, almost nothing. Lumina is still the desktop environment for Project Trident and will continue to be developed and enhanced alongside Project Trident just as it was for TrueOS. Short-term, we will be delaying the release of Lumina 2.0 and will release an updated version of the 1.x branch (1.5.0) instead. This is simply due to all the extra overhead to get Project Trident up and running. When things settle down into a rhythm, the development of Lumina will pick up once again.</p>
</blockquote>

<ul>
<li>It’s FOSS: Are you planning on including any desktop environments besides Lumina?</li>
</ul>

<blockquote>
<p>Project Trident: While Lumina is included by default, all of the other popular desktop environments will be available in the package repo exactly as they had been before.</p>
</blockquote>

<ul>
<li>It’s FOSS: Any plans to include Steam to increase the userbase?</li>
</ul>

<blockquote>
<p>Project Trident: Steam is still unavailable natively on FreeBSD, so we do not have any plans to ship it out of the box currently. In the meantime, we highly recommend installing the Windows version of Steam through the PlayOnBSD utility.</p>
</blockquote>

<ul>
<li>It’s FOSS: What will happen to the AppCafe?</li>
</ul>

<blockquote>
<p>Project Trident: The AppCafe is the name of the graphical interface for the “pkg” utility integrated into the SysAdm client created by TrueOS. This hasn’t changed. SysAdm, the graphical client, and by extension AppCafe are still available for all TrueOS-based distributions to use.</p>
</blockquote>

<ul>
<li>It’s FOSS: Does Project Trident have any corporate sponsors lined up? If not, would you be open to it or would you prefer that it be community supported?</li>
</ul>

<blockquote>
<p>Project Trident: iXsystems is the first corporate sponsor of Project Trident and we are always open to other sponsorships as well. We would prefer smaller individual contributions from the community, but we understand that larger project needs or special-purpose goals are much more difficult to achieve without allowing larger corporate sponsorships as well. In either case, Project Trident is always looking out for the best interests of the community and will not allow intrusive or harmful code to enter the project even if a company or individual tries to make that code part of a sponsorship deal.</p>
</blockquote>

<ul>
<li>It’s FOSS: BSD always seems to be lagging in terms of support for newer devices. Will TrueOS be able to remedy that with a quicker release cycle?</li>
</ul>

<blockquote>
<p>Project Trident: Yes! That was a primary reason for TrueOS to start tracking the CURRENT branch of FreeBSD in 2016. This allows for the changes that FreeBSD developers are making, including new hardware support, to be available much sooner than if we followed the FreeBSD release cycle.</p>
</blockquote>

<ul>
<li>It’s FOSS: Do you have any idea when Project Trident will have its first release?</li>
</ul>

<blockquote>
<p>Project Trident: Right now we are targeting a late August release date. This is because Project Trident is “kicking the wheels” on the new TrueOS distribution system. We want to ensure everything is working smoothly before we release. Going forward, we plan on having regular package updates every week or two for the end-user packages and a new release of Trident with an updated OS version every 6 months. This will follow the TrueOS release schedule with a small time offset.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://www.geoghegan.ca/pfbadhost.html">pf-badhost: Stop the evil doers in their tracks!</a></p>

<blockquote>
<p>pf-badhost is a simple, easy to use badhost blocker that uses the power of the pf firewall to block many of the internet’s biggest irritants. Annoyances such as ssh bruteforcers are largely eliminated. Shodan scans and bots looking for webservers to abuse are stopped dead in their tracks. When used to filter outbound traffic, pf-badhost blocks many seedy, spooky malware containing and/or compromised webhosts.<br>
Filtering performance is exceptional, as the badhost list is stored in a pf table. To quote the OpenBSD FAQ page regarding tables: “the lookup time on a table holding 50,000 addresses is only slightly more than for one holding 50 addresses.”<br>
pf-badhost is simple and powerful. The blocklists are pulled from quality, trusted sources. The ‘Firehol’, ‘Emerging Threats’ and ‘Binary Defense’ block lists are used as they are popular, regularly updated lists of the internet’s most egregious offenders. The <a href="http://pf-badhost.sh">pf-badhost.sh</a> script can easily be expanded to use additional or alternate blocklists.<br>
pf-badhost works best when used in conjunction with unbound-adblock for the ultimate badhost blocking.</p>
</blockquote>

<ul>
<li>Notes:</li>
<li>If you are trying to run pf-badhost on a LAN or are using NAT, you will want to add a rule to your pf.conf appearing BEFORE the pf-badhost rules allowing traffic to and from your local subnet so that you can still access your gateway and any DNS servers.</li>
<li>Conversely, adding a line to <a href="http://pf-badhost.sh">pf-badhost.sh</a> that removes your subnet range from the &lt;pfbadhost&gt; table should also work. Just make sure you choose a subnet range / CIDR block that is actually in the list. 192.168.0.0/16, 172.16.0.0/12 and 10.0.0.0/8 are the most common home/office subnet ranges.</li>
</ul>

<p><hr></p>

<p><strong>DigitalOcean</strong><br>
<a href="https://do.co/bsdnow">https://do.co/bsdnow</a></p>

<p>###<a href="http://edition.cnn.com/TECH/computing/9911/01/freebsd.con99.idg/">FLASHBACK: FreeBSDCon’99: Fans of Linux’s lesser-known sibling gather for the first time</a></p>

<blockquote>
<p>FreeBSD, a port of BSD Unix to Intel, has been around almost as long as Linux has – but without the media hype. Its developer and user community recently got a chance to get together for the first time, and they did it in the city where BSD – the Berkeley Software Distribution – was born some 25 years ago.<br>
October 17, 1999 marked a milestone in the history of FreeBSD – the first FreeBSD conference was held in the city where it all began, Berkeley, CA. Over 300 developers, users, and interested parties attended from around the globe.<br>
This was easily 50 percent more people than the conference organizers had expected. This first conference was meant to be a gathering mostly for developers and FreeBSD advocates. The turnout was surprisingly (and gratifyingly) large.<br>
In fact, attendance exceeded expectations so much that, for instance, Kirk McKusick had to add a second, identical tutorial on FreeBSD internals, because it was impossible for everyone to attend the first!<br>
But for a first-ever conference, I was impressed by how smoothly everything seemed to go. Sessions started on time, and the sessions I attended were well-run; nothing seemed to be too cold, dark, loud, late, or off-center.<br>
Of course, the best part about a conference such as this one is the opportunity to meet with other people who share similar interests. Lunches and breaks were a good time to meet people, as was the Tuesday night beer bash.<br>
The Wednesday night reception was of a type unusual for the technical conferences I usually attend – a three-hour Hornblower dinner cruise on San Francisco Bay. Not only did we all enjoy excellent food and company, but we all got to go up on deck and watch the lights of San Francisco and Berkeley as we drifted by. Although it’s nice when a conference attracts thousands of attendees, there are some things that can only be done with smaller groups of people; this was one of them.<br>
In short, this was a tiny conference, but a well-run one.</p>
</blockquote>

<ul>
<li>Sessions</li>
</ul>

<blockquote>
<p>Although it was a relatively small conference, the number and quality of the sessions belied the size. Each of the three days of the conference featured a different keynote speaker. In addition to Jordan Hubbard, Jeremy Allison spoke on “Samba Futures” on day two, and Brian Behlendorf gave a talk on “FreeBSD and Apache: A Perfect Combo” to start off the third day.<br>
The conference sessions themselves were divided into six tracks: advocacy, business, development, networking, security, and panels. The panels track featured three different panels, made up of three different slices of the community: the FreeBSD core team, a press panel, and a prominent user panel with representatives from such prominent commercial users as Yahoo! and USWest.<br>
I was especially interested in Apple Computer’s talk in the development track. Wilfredo Sanchez, technical lead for open source projects at Apple (no, that’s not an oxymoron!) spoke about Apple’s Darwin project, the company’s operating system road map, and the role of BSD (and, specifically, FreeBSD) in Apple’s plans.<br>
Apple and Unix have had a long and uneasy history, from the Lisa through the A/UX project to today. Personally, I’m very optimistic about the chances for the Darwin project to succeed. Apple’s core OS kernel team has chosen FreeBSD as its reference platform. I’m looking forward to what this partnership will bring to both sides.<br>
Other development track sessions included in-depth tutorials on writing device drivers, basics of the Vinum Volume Manager, Fibre Channel, development models (the open repository model), and the FreeBSD Documentation Project (FDP). If you’re interested in contributing to the FreeBSD project, the FDP is a good place to start.<br>
Advocacy sessions included “How One Person Can Make a Difference” (a timeless topic that would find a home at any technical conference!) and “Starting and Managing A User Group” (trials and tribulations as well as rewards).<br>
The business track featured speakers from three commercial users of FreeBSD: Cybernet, USWest, and Applix. Applix presented its port of Applixware Office for FreeBSD and explained how Applix has taken the core services of Applixware into open source.<br>
Commercial applications and open source were once a rare combination; we can only hope the trend away from that state of affairs will continue.</p>
</blockquote>

<ul>
<li>Commercial use of FreeBSD</li>
</ul>

<blockquote>
<p>The use of FreeBSD in embedded applications is increasing as well – and it is increasing at the same rate that hardware power is. These days, even inexpensive systems are able to run a BSD kernel.<br>
The BSD license and the solid TCP/IP stack prove significant enticements to this market as well. (Unlike the GNU Public License, the BSD license does not require that vendors make derivative works open source.)<br>
Companies such as USWest and Verio use FreeBSD for a wide variety of different Internet services.<br>
Yahoo! and Hotmail are examples of companies that use FreeBSD extensively for more specific purposes. Yahoo!, for example, has many hundreds of FreeBSD boxes, and Hotmail has almost 2000 FreeBSD machines at its data center in the San Francisco Bay area.<br>
Hotmail is owned by Microsoft, so the fact that it runs FreeBSD is a secret. Don’t tell anyone…<br>
When asked to comment on the increasing commercial interest in BSD, Hubbard said that FreeBSD is learning the Red Hat lesson. “Walnut Creek and others with business interests in FreeBSD have learned a few things from the Red Hat IPO,” he said, “and nobody is just sitting around now, content with business as usual. It’s clearly business as unusual in the open source world today.”<br>
Hubbard had also singled out some of BSD’s commercial partners, such as Whistle Communications, for praise in his opening day keynote. These partners play a key role in moving the project forward, he said, by contributing various enhancements and major new systems, such as Netgraph, as well as by contributing paid employee time spent on FreeBSD.<br>
Even short FreeBSD-related contacts can yield good results, Hubbard said. An example of this is the new jail() security code introduced in FreeBSD 3.x and 4.0, which was contributed by R &amp; D Associates. A number of ISPs are also now donating the hardware and bandwidth that allows the project to provide more resource mirrors and experimental development sites.</p>
</blockquote>

<ul>
<li>See you next year</li>
</ul>

<blockquote>
<p>And speaking of corporate sponsors, thanks go to Walnut Creek for sponsoring the conference, and to Yahoo! for covering all the expenses involved in bringing the entire FreeBSD core team to Berkeley.<br>
As a fan of FreeBSD, I’m happy to see that the project has finally produced a conference. It was time: many of the 16 core team members had been working together on a regular basis for nearly seven years without actually meeting face to face.<br>
It’s been an interesting year for open source projects. I’m looking forward to the next year – and the next BSD conference – to be even better.</p>
</blockquote>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://marc.info/?l=openbsd-tech&amp;m=153504937925732&amp;w=2">OpenBSD Recommends: Disable SMT/Hyperthreading in all Intel BIOSes</a></p>

<pre><code>Two recently disclosed hardware bugs affected Intel cpus:

     - TLBleed

     - T1TF (the name &quot;Foreshadow&quot; refers to 1 of 3 aspects of this
             bug, more aspects are surely on the way)

Solving these bugs requires new cpu microcode, a coding workaround,
*AND* the disabling of SMT / Hyperthreading.

SMT is fundamentally broken because it shares resources between the two
cpu instances and those shared resources lack security differentiators.
Some of these side channel attacks aren't trivial, but we can expect
most of them to eventually work and leak kernel or cross-VM memory in
common usage circumstances, even such as javascript directly in a
browser.

There will be more hardware bugs and artifacts disclosed.  Due to the
way SMT interacts with speculative execution on Intel cpus, I expect SMT
to exacerbate most of the future problems.

A few months back, I urged people to disable hyperthreading on all
Intel cpus.  I need to repeat that:

    DISABLE HYPERTHREADING ON ALL YOUR INTEL MACHINES IN THE BIOS.

Also, update your BIOS firmware, if you can.

OpenBSD -current (and therefore 6.4) will not use hyperthreading if it
is enabled, and will update the cpu microcode if possible.

But what about 6.2 and 6.3?

The situation is very complex, continually evolving, and is taking too
much manpower away from other tasks.  Furthermore, Intel isn't telling
us what is coming next, and are doing a terrible job by not publically
documenting what operating systems must do to resolve the problems.  We
are having to do research by reading other operating systems.  There is
no time left to backport the changes -- we will not be issuing a
complete set of errata and syspatches against 6.2 and 6.3 because it is
turning into a distraction.

Rather than working on every required patch for 6.2/6.3, we will
re-focus manpower and make sure 6.4 contains the best solutions
possible.

So please try take responsibility for your own machines: Disable SMT in
the BIOS menu, and upgrade your BIOS if you can.

I'm going to spend my money at a more trustworthy vendor in the future.
</code></pre>

<p><hr></p>

<p>###<a href="https://medium.com/@enzuru/get-morrowind-running-on-openbsd-in-5-simple-steps-b65e20f3f0c">Get Morrowind running on OpenBSD in 5 simple steps</a></p>

<blockquote>
<p>This article contains brief instructions on how to get one of the greatest Western RPGs of all time, The Elder Scrolls III: Morrowind, running on OpenBSD using the OpenMW open source engine recreation. These instructions were tested on a ThinkPad X1 Carbon Gen 3. The information was adapted from this OpenMW forum thread: <a href="https://forum.openmw.org/viewtopic.php?t=3510">https://forum.openmw.org/viewtopic.php?t=3510</a></p>
</blockquote>

<ul>
<li>
<ol>
<li>Purchase and download the DRM-free version from GOG (also considered the best version due to the high quality PDF guide that it comes with): <a href="https://www.gog.com/game/the_elder_scrolls_iii_morrowind_goty_edition">https://www.gog.com/game/the_elder_scrolls_iii_morrowind_goty_edition</a></li>
</ol>
</li>
<li>
<ol start="2">
<li>Install the required packages built from the ports tree as root. openmw is the recreated game engine, and innoextract is how we will get the game data files out of the win32 executable.</li>
</ol>
</li>
</ul>

<p><code>pkg_add openmw innoextract</code></p>

<ul>
<li>
<ol start="3">
<li>Move the file from GOG setup_tes_morrowind_goty_2.0.0.7.exe into its own directory morrowind/ due to innoextract’s default behaviour of extracting into the current directory. Then type:</li>
</ol>
</li>
</ul>

<p><code>innoextract setup_tes_morrowind_goty_2.0.0.7.exe</code></p>

<ul>
<li>
<ol start="4">
<li>Type openmw-wizard and follow the straightforward instructions. Note that you have a pre-existing installation, and select the morrowind/app/Data Files folder that innoextract extracted.</li>
</ol>
</li>
<li>
<ol start="5">
<li>Type in openmw-launcher, toggle the settings to your preferences, and then hit play!</li>
</ol>
</li>
</ul>

<p><hr></p>

<p><strong>iXsystems</strong><br>
<a href="https://twitter.com/allanjude/status/1034647571124367360">https://twitter.com/allanjude/status/1034647571124367360</a></p>

<p>###<a href="https://euroquis.nl/bobulate/?p=1937">My First Clang Bug</a></p>

<blockquote>
<p>Part of the role of being a packager is compiling lots (and lots) of packages. That means compiling lots of code from interesting places and in a variety of styles. In my opinion, being a good packager also means providing feedback to upstream when things are bad. That means filing upstream bugs when possible, and upstreaming patches.<br>
One of the “exciting” moments in packaging is when tools change. So each and every major CMake update is an exercise in recompiling 2400 or more packages and adjusting bits and pieces. When a software project was last released in 2013, adjusting it to modern tools can become quite a chore (e.g. Squid Report Generator). CMake is excellent for maintaining backwards compatibility, generally accommodating old software with new policies. The most recent 3.12 release candidate had three issues filed from the FreeBSD side, all from fallout with older software.  I consider the hours put into good bug reports, part of being a good citizen of the Free Software world.<br>
My most interesting bug this week, though, came from one line of code somewhere in Kleopatra: Q_UNUSED(gpgagent_data);<br>
That one line triggered a really peculiar link error in KDE’s FreeBSD CI system. Yup … telling the compiler something is unused made it fall over. Commenting out that line got rid of the link error, but introduced a warning about an unused function. Working with KDE-PIM’s Volker Krause, we whittled the problem down to a six-line example program — two lines if you don’t care much for coding style. I’m glad, at that point, that I could throw it over the hedge to the LLVM team with some explanatory text. Watching the process on their side reminds me ever-so-strongly of how things work in KDE (or FreeBSD for that matter): Bugzilla, Phabricator, and git combine to be an effective workflow for developers (perhaps less so for end-users).<br>
Today I got a note saying that the issue had been resolved. So brief a time for a bug. Live fast. Get squashed young.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Threadripper-2990WX-DragonFly">DragonFlyBSD Now Runs On The Threadripper 2990WX, Developer Shocked At Performance</a></p>

<blockquote>
<p>Last week I carried out some tests of BSD vs. Linux on the new 32-core / 64-thread Threadripper 2990WX. I tested FreeBSD 11, FreeBSD 12, and TrueOS – those benchmarks will be published in the next few days. I tried DragonFlyBSD, but at the time it wouldn’t boot with this AMD HEDT processor. But now the latest DragonFlyBSD development kernel can handle the 2990WX and the lead DragonFly developer calls this new processor “a real beast” and is stunned by its performance potential.</p>
</blockquote>

<blockquote>
<p>When I tried last week, the DragonFlyBSD 5.2.2 stable release nor DragonFlyBSD 5.3 daily snapshot would boot on the 2990WX. But it turns out Matthew Dillon, the lead developer of DragonFlyBSD, picked up a rig and has it running now. So in time for the next 5.4 stable release or those using the daily snapshots can have this 32-core / 64-thread Zen+ CPU running on this operating system long ago forked from FreeBSD.</p>
</blockquote>

<blockquote>
<p>In announcing his success in bringing up the 2990WX under DragonFlyBSD, which required a few minor changes, he shared his performance thoughts and hopes for the rig. “The cpu is a real beast, packing 32 cores and 64 threads. It blows away our dual-core Xeon to the tune of being +50% faster in concurrent compile tests, and it also blows away our older 4-socket Opteron (which we call ‘Monster’) by about the same margin. It’s an impressive CPU. For now the new beast is going to be used to help us improve I/O performance through the filesystem, further SMP work (but DFly scales pretty well to 64 threads already), and perhaps some driver to work to support the 10gbe on the mobo.”</p>
</blockquote>

<blockquote>
<p>Dillon shared some results on the system as well. &quot; The Threadripper 2990WX is a beast. It is at <em>least</em> 50% faster than both the quad socket opteron and the dual socket Xeon system I tested against. The primary limitation for the 2990WX is likely its 4 channels of DDR4 memory, and like all Zen and Zen+ CPUs, memory performance matters more than CPU frequency (and costs almost no power to pump up the performance). That said, it still blow away a dual-socket Xeon with 3x the number of memory channels. That is impressive!&quot;</p>
</blockquote>

<blockquote>
<p>The well known BSD developer also added, “This puts the 2990WX at par efficiency vs a dual-socket Xeon system, and better than the dual-socket Xeon with slower memory and a power cap. This is VERY impressive. I should note that the 2990WX is more specialized with its asymetric NUMA architecture and 32 cores. I think the sweet spot in terms of CPU pricing and efficiency is likely going to be with the 2950X (16-cores/32-threads). It is clear that the 2990WX (32-cores/64-threads) will max out 4-channel memory bandwidth for many workloads, making it a more specialized part. But still awesome…This thing is an incredible beast, I’m glad I got it.”</p>
</blockquote>

<blockquote>
<p>While I have the FreeBSD vs. Linux benchmarks from a few days ago, it looks like now on my ever growing TODO list will be re-trying out the newest DragonFlyBSD daily snapshot for seeing how the performance compares in the mix. Stay tuned for the numbers that should be in the next day or two.</p>
</blockquote>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://undeadly.org/cgi?action=article;sid=20180810075449">X11 on really small devices</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20180810131231">mandoc-1.14.4 released</a></li>
<li><a href="https://www.netgate.com/blog/pfSense-book-available-to-everyone.html">The pfSense Book is now available to everyone</a></li>
<li><a href="https://mwl.io/archives/3619">MWL: Burn it down! Burn it all down!</a></li>
<li><a href="https://github.com/begriffs/obsd">Configuring OpenBSD: System and user config files for a more pleasant laptop</a></li>
<li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-18:08.tcp.asc">FreeBSD Security Advisory: Resource exhaustion in TCP reassembly</a></li>
<li><a href="https://discoverbsd.com/p/92d80d1497">OpenBSD Foundation gets first 2018 Iridium donation</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=337653">New ZFS commit solves issue a few users reported in the feedback segment</a></li>
<li><a href="https://twitter.com/TridentProject/status/1034620476553867264">Project Trident should have a beta release by the end of next week</a></li>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/253447019/">Reminder about Stockholm BUG: September 5, 17:30-22:00</a></li>
<li><a href="https://bsd-pl.org/en">BSD-PL User Group: September 13, 18:30-21:00</a></li>
</ul>

<p><hr></p>

<p><strong>Tarsnap</strong></p>

<p>##Feedback/Questions</p>

<ul>
<li>Malcom - <a href="http://dpaste.com/15VVVCP">Having different routes per interface</a></li>
<li>Bostjan - <a href="http://dpaste.com/1Q14C6H#wrap">ZFS and integrity of data</a></li>
<li>Michael - <a href="http://dpaste.com/2JD17BP#wrap">Suggestion for Monitoring</a></li>
<li>Barry - <a href="http://dpaste.com/2GJ3RMG#wrap">Feedback</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Insight into TrueOS and Trident, stop evildoers with pf-badhost, Flashback to FreeBSDcon ‘99, OpenBSD’s measures against TLBleed, play Morrowind on OpenBSD in 5 steps, DragonflyBSD developers shocked at Threadripper performance, and more.</p>

<p>##Headlines<br>
###<a href="https://itsfoss.com/project-trident-interview/">An Insight into the Future of TrueOS BSD and Project Trident</a></p>

<blockquote>
<p>Last month, TrueOS announced that they would be spinning off their desktop offering. The team behind the new project, named Project Trident, have been working furiously towards their first release. They did take a few minutes to answer some of our question about Project Trident and TrueOS. I would like to thank JT and Ken for taking the time to compile these answers.</p>
</blockquote>

<ul>
<li>It’s FOSS: What is Project Trident?</li>
</ul>

<blockquote>
<p>Project Trident: Project Trident is the continuation of the TrueOS Desktop. Essentially, it is the continuation of the primary “TrueOS software” that people have been using for the past 2 years. The continuing evolution of the entire TrueOS project has reached a stage where it became necessary to reorganize the project. To understand this change, it is important to know the history of the TrueOS project.</p>
</blockquote>

<blockquote>
<p>Originally, Kris Moore created PC-BSD. This was a Desktop release of FreeBSD focused on providing a simple and user-friendly graphical experience for FreeBSD. PC-BSD grew and matured over many years. During the evolution of PC-BSD, many users began asking for a server focused version of the software. Kris agreed, and TrueOS was born as a scaled down server version of PC-BSD. In late 2016, more contributors and growth resulted in significant changes to the PC-BSD codebase. Because the new development was so markedly different from the original PC-BSD design, it was decided to rebrand the project.</p>
</blockquote>

<blockquote>
<p>TrueOS was chosen as the name for this new direction for PC-BSD as the project had grown beyond providing only a graphical front to FreeBSD and was beginning to make fundamental changes to the FreeBSD operating system. One of these changes was moving PC-BSD from being based on each FreeBSD Release to TrueOS being based on the active and less outdated FreeBSD Current. Other major changes are using OpenRC for service management and being more aggressive about addressing long-standing issues with the FreeBSD release process. TrueOS moved toward a rolling release cycle, twice a year, which tested and merged FreeBSD changes directly from the developer instead of waiting months or even years for the FreeBSD review process to finish. TrueOS also deprecated and removed obsolete technology much more regularly.</p>
</blockquote>

<blockquote>
<p>As the TrueOS Project grew, the developers found these changes were needed by other FreeBSD-based projects. These projects began expressing interest in using TrueOS rather than FreeBSD as the base for their project. This demonstrated that TrueOS needed to again evolve into a distribution framework for any BSD project to use. This allows port maintainers and source developers from any BSD project to pool their resources and use the same source repositories while allowing every distribution to still customize, build, and release their own self-contained project. The result is a natural split of the traditional TrueOS team. There were now naturally two teams in the TrueOS project: those working on the build infrastructure and FreeBSD enhancements – the “core” part of the project, and those working on end-user experience and utility – the “desktop” part of the project.</p>
</blockquote>

<blockquote>
<p>When the decision was made to formally split the projects, the obvious question that arose was what to call the “Desktop” project. As TrueOS was already positioned to be a BSD distribution platform, the developers agreed the desktop side should pick a new name. There were other considerations too, one notable being that we were concerned that if we continued to call the desktop project “TrueOS Desktop”, it would prevent people from considering TrueOS as the basis for their distribution because of misconceptions that TrueOS was a desktop-focused OS. It also helps to “level the playing field” for other desktop distributions like GhostBSD so that TrueOS is not viewed as having a single “blessed” desktop version.</p>
</blockquote>

<ul>
<li>It’s FOSS: What features will TrueOS add to the FreeBSD base?</li>
</ul>

<blockquote>
<p>Project Trident: TrueOS has already added a number of features to FreeBSD:<br>
OpenRC replaces rc.d for service management<br>
LibreSSL in base<br>
Root NSS certificates out-of-box<br>
Scriptable installations (pc-sysinstall)<br>
The full list of changes can be seen on the TrueOS repository (<a href="https://github.com/trueos/trueos/blob/trueos-master/README.md">https://github.com/trueos/trueos/blob/trueos-master/README.md</a>). This list does change quite regularly as FreeBSD development itself changes.</p>
</blockquote>

<ul>
<li>It’s FOSS: I understand that TrueOS will have a new feature that will make creating a desktop spin of TrueOS very easy. Could you explain that new feature?</li>
</ul>

<blockquote>
<p>Project Trident: Historically, one of the biggest hurdles for creating a desktop version of FreeBSD is that the build options for packages are tuned for servers rather than desktops. This means a desktop distribution cannot use the pre-built packages from FreeBSD and must build, use, and maintain a custom package repository. Maintaining a fork of the FreeBSD ports tree is no trivial task. TrueOS has created a full distribution framework so now all it takes to create a custom build of FreeBSD is a single JSON manifest file. There is now a single “source of truth” for the source and ports repositories that is maintained by the TrueOS team and regularly tagged with “stable” build markers. All projects can use this framework, which makes updates trivial.</p>
</blockquote>

<ul>
<li>It’s FOSS: Do you think that the new focus of TrueOS will lead to the creation of more desktop-centered BSDs?</li>
</ul>

<blockquote>
<p>Project Trident: That is the hope. Historically, creating a desktop-centered BSD has required a lot of specialized knowledge. Not only do most people not have this knowledge, but many do not even know what they need to learn until they start troubleshooting. TrueOS is trying to drastically simplify this process to enable the wider Open Source community to experiment, contribute, and enjoy BSD-based projects.</p>
</blockquote>

<ul>
<li>It’s FOSS: What is going to happen to TrueOS Pico? Will Project Trident have ARM support?</li>
</ul>

<blockquote>
<p>Project Trident: Project Trident will be dependent on TrueOS for ARM support. The developers have talked about the possibility of supporting ARM64 and RISC-V architectures, but it is not possible at the current time. If more Open Source contributors want to help develop ARM and RISC-V support, the TrueOS project is definitely willing to help test and integrate that code.</p>
</blockquote>

<ul>
<li>It’s FOSS: What does this change (splitting Trus OS into Project Trident) mean for the Lumina desktop environment?</li>
</ul>

<blockquote>
<p>Project Trident: Long-term, almost nothing. Lumina is still the desktop environment for Project Trident and will continue to be developed and enhanced alongside Project Trident just as it was for TrueOS. Short-term, we will be delaying the release of Lumina 2.0 and will release an updated version of the 1.x branch (1.5.0) instead. This is simply due to all the extra overhead to get Project Trident up and running. When things settle down into a rhythm, the development of Lumina will pick up once again.</p>
</blockquote>

<ul>
<li>It’s FOSS: Are you planning on including any desktop environments besides Lumina?</li>
</ul>

<blockquote>
<p>Project Trident: While Lumina is included by default, all of the other popular desktop environments will be available in the package repo exactly as they had been before.</p>
</blockquote>

<ul>
<li>It’s FOSS: Any plans to include Steam to increase the userbase?</li>
</ul>

<blockquote>
<p>Project Trident: Steam is still unavailable natively on FreeBSD, so we do not have any plans to ship it out of the box currently. In the meantime, we highly recommend installing the Windows version of Steam through the PlayOnBSD utility.</p>
</blockquote>

<ul>
<li>It’s FOSS: What will happen to the AppCafe?</li>
</ul>

<blockquote>
<p>Project Trident: The AppCafe is the name of the graphical interface for the “pkg” utility integrated into the SysAdm client created by TrueOS. This hasn’t changed. SysAdm, the graphical client, and by extension AppCafe are still available for all TrueOS-based distributions to use.</p>
</blockquote>

<ul>
<li>It’s FOSS: Does Project Trident have any corporate sponsors lined up? If not, would you be open to it or would you prefer that it be community supported?</li>
</ul>

<blockquote>
<p>Project Trident: iXsystems is the first corporate sponsor of Project Trident and we are always open to other sponsorships as well. We would prefer smaller individual contributions from the community, but we understand that larger project needs or special-purpose goals are much more difficult to achieve without allowing larger corporate sponsorships as well. In either case, Project Trident is always looking out for the best interests of the community and will not allow intrusive or harmful code to enter the project even if a company or individual tries to make that code part of a sponsorship deal.</p>
</blockquote>

<ul>
<li>It’s FOSS: BSD always seems to be lagging in terms of support for newer devices. Will TrueOS be able to remedy that with a quicker release cycle?</li>
</ul>

<blockquote>
<p>Project Trident: Yes! That was a primary reason for TrueOS to start tracking the CURRENT branch of FreeBSD in 2016. This allows for the changes that FreeBSD developers are making, including new hardware support, to be available much sooner than if we followed the FreeBSD release cycle.</p>
</blockquote>

<ul>
<li>It’s FOSS: Do you have any idea when Project Trident will have its first release?</li>
</ul>

<blockquote>
<p>Project Trident: Right now we are targeting a late August release date. This is because Project Trident is “kicking the wheels” on the new TrueOS distribution system. We want to ensure everything is working smoothly before we release. Going forward, we plan on having regular package updates every week or two for the end-user packages and a new release of Trident with an updated OS version every 6 months. This will follow the TrueOS release schedule with a small time offset.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://www.geoghegan.ca/pfbadhost.html">pf-badhost: Stop the evil doers in their tracks!</a></p>

<blockquote>
<p>pf-badhost is a simple, easy to use badhost blocker that uses the power of the pf firewall to block many of the internet’s biggest irritants. Annoyances such as ssh bruteforcers are largely eliminated. Shodan scans and bots looking for webservers to abuse are stopped dead in their tracks. When used to filter outbound traffic, pf-badhost blocks many seedy, spooky malware containing and/or compromised webhosts.<br>
Filtering performance is exceptional, as the badhost list is stored in a pf table. To quote the OpenBSD FAQ page regarding tables: “the lookup time on a table holding 50,000 addresses is only slightly more than for one holding 50 addresses.”<br>
pf-badhost is simple and powerful. The blocklists are pulled from quality, trusted sources. The ‘Firehol’, ‘Emerging Threats’ and ‘Binary Defense’ block lists are used as they are popular, regularly updated lists of the internet’s most egregious offenders. The <a href="http://pf-badhost.sh">pf-badhost.sh</a> script can easily be expanded to use additional or alternate blocklists.<br>
pf-badhost works best when used in conjunction with unbound-adblock for the ultimate badhost blocking.</p>
</blockquote>

<ul>
<li>Notes:</li>
<li>If you are trying to run pf-badhost on a LAN or are using NAT, you will want to add a rule to your pf.conf appearing BEFORE the pf-badhost rules allowing traffic to and from your local subnet so that you can still access your gateway and any DNS servers.</li>
<li>Conversely, adding a line to <a href="http://pf-badhost.sh">pf-badhost.sh</a> that removes your subnet range from the &lt;pfbadhost&gt; table should also work. Just make sure you choose a subnet range / CIDR block that is actually in the list. 192.168.0.0/16, 172.16.0.0/12 and 10.0.0.0/8 are the most common home/office subnet ranges.</li>
</ul>

<p><hr></p>

<p><strong>DigitalOcean</strong><br>
<a href="https://do.co/bsdnow">https://do.co/bsdnow</a></p>

<p>###<a href="http://edition.cnn.com/TECH/computing/9911/01/freebsd.con99.idg/">FLASHBACK: FreeBSDCon’99: Fans of Linux’s lesser-known sibling gather for the first time</a></p>

<blockquote>
<p>FreeBSD, a port of BSD Unix to Intel, has been around almost as long as Linux has – but without the media hype. Its developer and user community recently got a chance to get together for the first time, and they did it in the city where BSD – the Berkeley Software Distribution – was born some 25 years ago.<br>
October 17, 1999 marked a milestone in the history of FreeBSD – the first FreeBSD conference was held in the city where it all began, Berkeley, CA. Over 300 developers, users, and interested parties attended from around the globe.<br>
This was easily 50 percent more people than the conference organizers had expected. This first conference was meant to be a gathering mostly for developers and FreeBSD advocates. The turnout was surprisingly (and gratifyingly) large.<br>
In fact, attendance exceeded expectations so much that, for instance, Kirk McKusick had to add a second, identical tutorial on FreeBSD internals, because it was impossible for everyone to attend the first!<br>
But for a first-ever conference, I was impressed by how smoothly everything seemed to go. Sessions started on time, and the sessions I attended were well-run; nothing seemed to be too cold, dark, loud, late, or off-center.<br>
Of course, the best part about a conference such as this one is the opportunity to meet with other people who share similar interests. Lunches and breaks were a good time to meet people, as was the Tuesday night beer bash.<br>
The Wednesday night reception was of a type unusual for the technical conferences I usually attend – a three-hour Hornblower dinner cruise on San Francisco Bay. Not only did we all enjoy excellent food and company, but we all got to go up on deck and watch the lights of San Francisco and Berkeley as we drifted by. Although it’s nice when a conference attracts thousands of attendees, there are some things that can only be done with smaller groups of people; this was one of them.<br>
In short, this was a tiny conference, but a well-run one.</p>
</blockquote>

<ul>
<li>Sessions</li>
</ul>

<blockquote>
<p>Although it was a relatively small conference, the number and quality of the sessions belied the size. Each of the three days of the conference featured a different keynote speaker. In addition to Jordan Hubbard, Jeremy Allison spoke on “Samba Futures” on day two, and Brian Behlendorf gave a talk on “FreeBSD and Apache: A Perfect Combo” to start off the third day.<br>
The conference sessions themselves were divided into six tracks: advocacy, business, development, networking, security, and panels. The panels track featured three different panels, made up of three different slices of the community: the FreeBSD core team, a press panel, and a prominent user panel with representatives from such prominent commercial users as Yahoo! and USWest.<br>
I was especially interested in Apple Computer’s talk in the development track. Wilfredo Sanchez, technical lead for open source projects at Apple (no, that’s not an oxymoron!) spoke about Apple’s Darwin project, the company’s operating system road map, and the role of BSD (and, specifically, FreeBSD) in Apple’s plans.<br>
Apple and Unix have had a long and uneasy history, from the Lisa through the A/UX project to today. Personally, I’m very optimistic about the chances for the Darwin project to succeed. Apple’s core OS kernel team has chosen FreeBSD as its reference platform. I’m looking forward to what this partnership will bring to both sides.<br>
Other development track sessions included in-depth tutorials on writing device drivers, basics of the Vinum Volume Manager, Fibre Channel, development models (the open repository model), and the FreeBSD Documentation Project (FDP). If you’re interested in contributing to the FreeBSD project, the FDP is a good place to start.<br>
Advocacy sessions included “How One Person Can Make a Difference” (a timeless topic that would find a home at any technical conference!) and “Starting and Managing A User Group” (trials and tribulations as well as rewards).<br>
The business track featured speakers from three commercial users of FreeBSD: Cybernet, USWest, and Applix. Applix presented its port of Applixware Office for FreeBSD and explained how Applix has taken the core services of Applixware into open source.<br>
Commercial applications and open source were once a rare combination; we can only hope the trend away from that state of affairs will continue.</p>
</blockquote>

<ul>
<li>Commercial use of FreeBSD</li>
</ul>

<blockquote>
<p>The use of FreeBSD in embedded applications is increasing as well – and it is increasing at the same rate that hardware power is. These days, even inexpensive systems are able to run a BSD kernel.<br>
The BSD license and the solid TCP/IP stack prove significant enticements to this market as well. (Unlike the GNU Public License, the BSD license does not require that vendors make derivative works open source.)<br>
Companies such as USWest and Verio use FreeBSD for a wide variety of different Internet services.<br>
Yahoo! and Hotmail are examples of companies that use FreeBSD extensively for more specific purposes. Yahoo!, for example, has many hundreds of FreeBSD boxes, and Hotmail has almost 2000 FreeBSD machines at its data center in the San Francisco Bay area.<br>
Hotmail is owned by Microsoft, so the fact that it runs FreeBSD is a secret. Don’t tell anyone…<br>
When asked to comment on the increasing commercial interest in BSD, Hubbard said that FreeBSD is learning the Red Hat lesson. “Walnut Creek and others with business interests in FreeBSD have learned a few things from the Red Hat IPO,” he said, “and nobody is just sitting around now, content with business as usual. It’s clearly business as unusual in the open source world today.”<br>
Hubbard had also singled out some of BSD’s commercial partners, such as Whistle Communications, for praise in his opening day keynote. These partners play a key role in moving the project forward, he said, by contributing various enhancements and major new systems, such as Netgraph, as well as by contributing paid employee time spent on FreeBSD.<br>
Even short FreeBSD-related contacts can yield good results, Hubbard said. An example of this is the new jail() security code introduced in FreeBSD 3.x and 4.0, which was contributed by R &amp; D Associates. A number of ISPs are also now donating the hardware and bandwidth that allows the project to provide more resource mirrors and experimental development sites.</p>
</blockquote>

<ul>
<li>See you next year</li>
</ul>

<blockquote>
<p>And speaking of corporate sponsors, thanks go to Walnut Creek for sponsoring the conference, and to Yahoo! for covering all the expenses involved in bringing the entire FreeBSD core team to Berkeley.<br>
As a fan of FreeBSD, I’m happy to see that the project has finally produced a conference. It was time: many of the 16 core team members had been working together on a regular basis for nearly seven years without actually meeting face to face.<br>
It’s been an interesting year for open source projects. I’m looking forward to the next year – and the next BSD conference – to be even better.</p>
</blockquote>

<p><hr></p>

<p>##News Roundup<br>
###<a href="https://marc.info/?l=openbsd-tech&amp;m=153504937925732&amp;w=2">OpenBSD Recommends: Disable SMT/Hyperthreading in all Intel BIOSes</a></p>

<pre><code>Two recently disclosed hardware bugs affected Intel cpus:

     - TLBleed

     - T1TF (the name &quot;Foreshadow&quot; refers to 1 of 3 aspects of this
             bug, more aspects are surely on the way)

Solving these bugs requires new cpu microcode, a coding workaround,
*AND* the disabling of SMT / Hyperthreading.

SMT is fundamentally broken because it shares resources between the two
cpu instances and those shared resources lack security differentiators.
Some of these side channel attacks aren't trivial, but we can expect
most of them to eventually work and leak kernel or cross-VM memory in
common usage circumstances, even such as javascript directly in a
browser.

There will be more hardware bugs and artifacts disclosed.  Due to the
way SMT interacts with speculative execution on Intel cpus, I expect SMT
to exacerbate most of the future problems.

A few months back, I urged people to disable hyperthreading on all
Intel cpus.  I need to repeat that:

    DISABLE HYPERTHREADING ON ALL YOUR INTEL MACHINES IN THE BIOS.

Also, update your BIOS firmware, if you can.

OpenBSD -current (and therefore 6.4) will not use hyperthreading if it
is enabled, and will update the cpu microcode if possible.

But what about 6.2 and 6.3?

The situation is very complex, continually evolving, and is taking too
much manpower away from other tasks.  Furthermore, Intel isn't telling
us what is coming next, and are doing a terrible job by not publically
documenting what operating systems must do to resolve the problems.  We
are having to do research by reading other operating systems.  There is
no time left to backport the changes -- we will not be issuing a
complete set of errata and syspatches against 6.2 and 6.3 because it is
turning into a distraction.

Rather than working on every required patch for 6.2/6.3, we will
re-focus manpower and make sure 6.4 contains the best solutions
possible.

So please try take responsibility for your own machines: Disable SMT in
the BIOS menu, and upgrade your BIOS if you can.

I'm going to spend my money at a more trustworthy vendor in the future.
</code></pre>

<p><hr></p>

<p>###<a href="https://medium.com/@enzuru/get-morrowind-running-on-openbsd-in-5-simple-steps-b65e20f3f0c">Get Morrowind running on OpenBSD in 5 simple steps</a></p>

<blockquote>
<p>This article contains brief instructions on how to get one of the greatest Western RPGs of all time, The Elder Scrolls III: Morrowind, running on OpenBSD using the OpenMW open source engine recreation. These instructions were tested on a ThinkPad X1 Carbon Gen 3. The information was adapted from this OpenMW forum thread: <a href="https://forum.openmw.org/viewtopic.php?t=3510">https://forum.openmw.org/viewtopic.php?t=3510</a></p>
</blockquote>

<ul>
<li>
<ol>
<li>Purchase and download the DRM-free version from GOG (also considered the best version due to the high quality PDF guide that it comes with): <a href="https://www.gog.com/game/the_elder_scrolls_iii_morrowind_goty_edition">https://www.gog.com/game/the_elder_scrolls_iii_morrowind_goty_edition</a></li>
</ol>
</li>
<li>
<ol start="2">
<li>Install the required packages built from the ports tree as root. openmw is the recreated game engine, and innoextract is how we will get the game data files out of the win32 executable.</li>
</ol>
</li>
</ul>

<p><code>pkg_add openmw innoextract</code></p>

<ul>
<li>
<ol start="3">
<li>Move the file from GOG setup_tes_morrowind_goty_2.0.0.7.exe into its own directory morrowind/ due to innoextract’s default behaviour of extracting into the current directory. Then type:</li>
</ol>
</li>
</ul>

<p><code>innoextract setup_tes_morrowind_goty_2.0.0.7.exe</code></p>

<ul>
<li>
<ol start="4">
<li>Type openmw-wizard and follow the straightforward instructions. Note that you have a pre-existing installation, and select the morrowind/app/Data Files folder that innoextract extracted.</li>
</ol>
</li>
<li>
<ol start="5">
<li>Type in openmw-launcher, toggle the settings to your preferences, and then hit play!</li>
</ol>
</li>
</ul>

<p><hr></p>

<p><strong>iXsystems</strong><br>
<a href="https://twitter.com/allanjude/status/1034647571124367360">https://twitter.com/allanjude/status/1034647571124367360</a></p>

<p>###<a href="https://euroquis.nl/bobulate/?p=1937">My First Clang Bug</a></p>

<blockquote>
<p>Part of the role of being a packager is compiling lots (and lots) of packages. That means compiling lots of code from interesting places and in a variety of styles. In my opinion, being a good packager also means providing feedback to upstream when things are bad. That means filing upstream bugs when possible, and upstreaming patches.<br>
One of the “exciting” moments in packaging is when tools change. So each and every major CMake update is an exercise in recompiling 2400 or more packages and adjusting bits and pieces. When a software project was last released in 2013, adjusting it to modern tools can become quite a chore (e.g. Squid Report Generator). CMake is excellent for maintaining backwards compatibility, generally accommodating old software with new policies. The most recent 3.12 release candidate had three issues filed from the FreeBSD side, all from fallout with older software.  I consider the hours put into good bug reports, part of being a good citizen of the Free Software world.<br>
My most interesting bug this week, though, came from one line of code somewhere in Kleopatra: Q_UNUSED(gpgagent_data);<br>
That one line triggered a really peculiar link error in KDE’s FreeBSD CI system. Yup … telling the compiler something is unused made it fall over. Commenting out that line got rid of the link error, but introduced a warning about an unused function. Working with KDE-PIM’s Volker Krause, we whittled the problem down to a six-line example program — two lines if you don’t care much for coding style. I’m glad, at that point, that I could throw it over the hedge to the LLVM team with some explanatory text. Watching the process on their side reminds me ever-so-strongly of how things work in KDE (or FreeBSD for that matter): Bugzilla, Phabricator, and git combine to be an effective workflow for developers (perhaps less so for end-users).<br>
Today I got a note saying that the issue had been resolved. So brief a time for a bug. Live fast. Get squashed young.</p>
</blockquote>

<p><hr></p>

<p>###<a href="https://www.phoronix.com/scan.php?page=news_item&amp;px=Threadripper-2990WX-DragonFly">DragonFlyBSD Now Runs On The Threadripper 2990WX, Developer Shocked At Performance</a></p>

<blockquote>
<p>Last week I carried out some tests of BSD vs. Linux on the new 32-core / 64-thread Threadripper 2990WX. I tested FreeBSD 11, FreeBSD 12, and TrueOS – those benchmarks will be published in the next few days. I tried DragonFlyBSD, but at the time it wouldn’t boot with this AMD HEDT processor. But now the latest DragonFlyBSD development kernel can handle the 2990WX and the lead DragonFly developer calls this new processor “a real beast” and is stunned by its performance potential.</p>
</blockquote>

<blockquote>
<p>When I tried last week, the DragonFlyBSD 5.2.2 stable release nor DragonFlyBSD 5.3 daily snapshot would boot on the 2990WX. But it turns out Matthew Dillon, the lead developer of DragonFlyBSD, picked up a rig and has it running now. So in time for the next 5.4 stable release or those using the daily snapshots can have this 32-core / 64-thread Zen+ CPU running on this operating system long ago forked from FreeBSD.</p>
</blockquote>

<blockquote>
<p>In announcing his success in bringing up the 2990WX under DragonFlyBSD, which required a few minor changes, he shared his performance thoughts and hopes for the rig. “The cpu is a real beast, packing 32 cores and 64 threads. It blows away our dual-core Xeon to the tune of being +50% faster in concurrent compile tests, and it also blows away our older 4-socket Opteron (which we call ‘Monster’) by about the same margin. It’s an impressive CPU. For now the new beast is going to be used to help us improve I/O performance through the filesystem, further SMP work (but DFly scales pretty well to 64 threads already), and perhaps some driver to work to support the 10gbe on the mobo.”</p>
</blockquote>

<blockquote>
<p>Dillon shared some results on the system as well. &quot; The Threadripper 2990WX is a beast. It is at <em>least</em> 50% faster than both the quad socket opteron and the dual socket Xeon system I tested against. The primary limitation for the 2990WX is likely its 4 channels of DDR4 memory, and like all Zen and Zen+ CPUs, memory performance matters more than CPU frequency (and costs almost no power to pump up the performance). That said, it still blow away a dual-socket Xeon with 3x the number of memory channels. That is impressive!&quot;</p>
</blockquote>

<blockquote>
<p>The well known BSD developer also added, “This puts the 2990WX at par efficiency vs a dual-socket Xeon system, and better than the dual-socket Xeon with slower memory and a power cap. This is VERY impressive. I should note that the 2990WX is more specialized with its asymetric NUMA architecture and 32 cores. I think the sweet spot in terms of CPU pricing and efficiency is likely going to be with the 2950X (16-cores/32-threads). It is clear that the 2990WX (32-cores/64-threads) will max out 4-channel memory bandwidth for many workloads, making it a more specialized part. But still awesome…This thing is an incredible beast, I’m glad I got it.”</p>
</blockquote>

<blockquote>
<p>While I have the FreeBSD vs. Linux benchmarks from a few days ago, it looks like now on my ever growing TODO list will be re-trying out the newest DragonFlyBSD daily snapshot for seeing how the performance compares in the mix. Stay tuned for the numbers that should be in the next day or two.</p>
</blockquote>

<p><hr></p>

<p>##Beastie Bits</p>

<ul>
<li><a href="https://undeadly.org/cgi?action=article;sid=20180810075449">X11 on really small devices</a></li>
<li><a href="https://undeadly.org/cgi?action=article;sid=20180810131231">mandoc-1.14.4 released</a></li>
<li><a href="https://www.netgate.com/blog/pfSense-book-available-to-everyone.html">The pfSense Book is now available to everyone</a></li>
<li><a href="https://mwl.io/archives/3619">MWL: Burn it down! Burn it all down!</a></li>
<li><a href="https://github.com/begriffs/obsd">Configuring OpenBSD: System and user config files for a more pleasant laptop</a></li>
<li><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-18:08.tcp.asc">FreeBSD Security Advisory: Resource exhaustion in TCP reassembly</a></li>
<li><a href="https://discoverbsd.com/p/92d80d1497">OpenBSD Foundation gets first 2018 Iridium donation</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&amp;revision=337653">New ZFS commit solves issue a few users reported in the feedback segment</a></li>
<li><a href="https://twitter.com/TridentProject/status/1034620476553867264">Project Trident should have a beta release by the end of next week</a></li>
<li><a href="https://www.meetup.com/BSD-Users-Stockholm/events/253447019/">Reminder about Stockholm BUG: September 5, 17:30-22:00</a></li>
<li><a href="https://bsd-pl.org/en">BSD-PL User Group: September 13, 18:30-21:00</a></li>
</ul>

<p><hr></p>

<p><strong>Tarsnap</strong></p>

<p>##Feedback/Questions</p>

<ul>
<li>Malcom - <a href="http://dpaste.com/15VVVCP">Having different routes per interface</a></li>
<li>Bostjan - <a href="http://dpaste.com/1Q14C6H#wrap">ZFS and integrity of data</a></li>
<li>Michael - <a href="http://dpaste.com/2JD17BP#wrap">Suggestion for Monitoring</a></li>
<li>Barry - <a href="http://dpaste.com/2GJ3RMG#wrap">Feedback</a></li>
</ul>

<p><hr></p>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv">feedback@bsdnow.tv</a></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>50: VPN, My Dear Watson</title>
  <link>https://www.bsdnow.tv/50</link>
  <guid isPermaLink="false">b0306dc5-ee87-4a03-aeea-9a89b915ff5e</guid>
  <pubDate>Wed, 13 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b0306dc5-ee87-4a03-aeea-9a89b915ff5e.mp3" length="62998996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:27:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" target="_blank" rel="nofollow noopener"&gt;MeetBSD 2014 is approaching&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California&lt;/li&gt;
&lt;li&gt;MeetBSD has an "unconference" format, which means there will be both planned talks and community events&lt;/li&gt;
&lt;li&gt;All the extra details will be on &lt;a href="https://www.meetbsd.com/" target="_blank" rel="nofollow noopener"&gt;their site&lt;/a&gt; soon&lt;/li&gt;
&lt;li&gt;It also has hotels and various other bits of useful information - hopefully with more info on the talks to come&lt;/li&gt;
&lt;li&gt;Of course, EuroBSDCon is coming up before then
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" target="_blank" rel="nofollow noopener"&gt;First experiences with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog post that leads off with "tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven't tried before"&lt;/li&gt;
&lt;li&gt;The author read the famous "&lt;a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" target="_blank" rel="nofollow noopener"&gt;BSD for Linux users&lt;/a&gt;" series (that most of us have surely seen) and decided to give BSD a try&lt;/li&gt;
&lt;li&gt;He details his different OS and distro history, concluding with how he "eventually became annoyed at the poor quality of Linux userland software"&lt;/li&gt;
&lt;li&gt;From there, it talks about how he used the OpenBSD USB image and got a fully-working system&lt;/li&gt;
&lt;li&gt;He especially liked the simplicity of OpenBSD's "hostname.if" system for network configuration&lt;/li&gt;
&lt;li&gt;Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" target="_blank" rel="nofollow noopener"&gt;NetBSD rump kernels on bare metal (and Kansai OSC report)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;When you're developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right&lt;/li&gt;
&lt;li&gt;However, NetBSD's rump kernels - a very unique concept - make this process a lot easier&lt;/li&gt;
&lt;li&gt;This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week&lt;/li&gt;
&lt;li&gt;Also have a look back at &lt;a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" target="_blank" rel="nofollow noopener"&gt;episode 8&lt;/a&gt; for our interview about rump kernels and what exactly they do&lt;/li&gt;
&lt;li&gt;While on the topic of NetBSD, there were also a couple of &lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" target="_blank" rel="nofollow noopener"&gt;very detailed reports&lt;/a&gt; (with lots of pictures!) of the various NetBSD-themed booths at the 2014 &lt;a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" target="_blank" rel="nofollow noopener"&gt;Kansai Open Source Conference&lt;/a&gt; that we wanted to highlight
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.openssl.org/news/secadv_20140806.txt" target="_blank" rel="nofollow noopener"&gt;OpenSSL and LibreSSL updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)&lt;/li&gt;
&lt;li&gt;Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=140752295222929&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;LibreSSL released a new version&lt;/a&gt; to address most of the vulnerabilities, but wasn't affected by some of them&lt;/li&gt;
&lt;li&gt;Whichever version of whatever SSL you use, make sure it's patched for these issues&lt;/li&gt;
&lt;li&gt;DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Robert Watson - &lt;a href="mailto:rwatson@freebsd.org" target="_blank" rel="nofollow noopener"&gt;rwatson@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD architecture, security research techniques, exploit mitigation&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/openvpn" target="_blank" rel="nofollow noopener"&gt;Protecting traffic with a BSD-based VPN&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" target="_blank" rel="nofollow noopener"&gt;A FreeBSD-based CGit server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you use git (like a certain host of this show) then you've probably considered setting up your own server&lt;/li&gt;
&lt;li&gt;This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend&lt;/li&gt;
&lt;li&gt;It even shows you how to set up multiple repos with key-based user separation and other cool things&lt;/li&gt;
&lt;li&gt;The author of the post is also a listener of the show, thanks for sending it in!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" target="_blank" rel="nofollow noopener"&gt;Backup devices for small businesses&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this article, different methods of data storage and backup are compared&lt;/li&gt;
&lt;li&gt;After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer&lt;/li&gt;
&lt;li&gt;He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers&lt;/li&gt;
&lt;li&gt;It also goes over some of the hardware specifics in the FreeNAS Mini
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" target="_blank" rel="nofollow noopener"&gt;A new Xenocara interview&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As a follow up to last week's OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara&lt;/li&gt;
&lt;li&gt;If you're not familiar with Xenocara, it's OpenBSD's version of Xorg with some custom patches&lt;/li&gt;
&lt;li&gt;In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing&lt;/li&gt;
&lt;li&gt;Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it's natural for him to do a lot of the maintainership work there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" target="_blank" rel="nofollow noopener"&gt;Building a high performance FreeBSD samba server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what's the best solution?&lt;/li&gt;
&lt;li&gt;FreeBSD, ZFS and Samba obviously!&lt;/li&gt;
&lt;li&gt;The master image and related files clock in at over 20GB, and will be accessed at the same time by &lt;em&gt;all&lt;/em&gt; of those clients&lt;/li&gt;
&lt;li&gt;This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)&lt;/li&gt;
&lt;li&gt;It doesn't even require the newest or best hardware with the right changes, pretty cool
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" target="_blank" rel="nofollow noopener"&gt;An interesting Reddit thread&lt;/a&gt; (&lt;a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" target="_blank" rel="nofollow noopener"&gt;or two&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21t7L5bqO" target="_blank" rel="nofollow noopener"&gt;PB writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20MFywDqZ" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Td6nq11J" target="_blank" rel="nofollow noopener"&gt;Steve writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s215MlpJYV" target="_blank" rel="nofollow noopener"&gt;Lachlan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2N4JKkoKt" target="_blank" rel="nofollow noopener"&gt;Justin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, vpn, vps, openvpn, tunnel, ssh, security, exploit mitigation, zfs, lzo, tls, xenocara, x11, xorg, freenas, freenas mini, ixsystems, network attached storage, nas, meetbsd, rump kernels, libressl, openssl, kansai</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>27: BSD Now vs. BSDTalk</title>
  <link>https://www.bsdnow.tv/27</link>
  <guid isPermaLink="false">9c2ed198-48a2-4ed6-988c-6d5ce1ed66c7</guid>
  <pubDate>Wed, 05 Mar 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9c2ed198-48a2-4ed6-988c-6d5ce1ed66c7.mp3" length="73930325" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>The long-awaited meetup is finally happening on today's show. We're going to be interviewing the original BSD podcaster, Will Backman, to discuss what he's been up to and what the future of BSD advocacy looks like. After that, we'll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We've got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:42:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;The long-awaited meetup is finally happening on today's show. We're going to be interviewing the original BSD podcaster, Will Backman, to discuss what he's been up to and what the future of BSD advocacy looks like. After that, we'll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We've got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/SummerOfCode2014" target="_blank" rel="nofollow noopener"&gt;FreeBSD and OpenBSD in GSOC2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Google Summer of Code is a way to encourage students to write code for open source projects and make some money&lt;/li&gt;
&lt;li&gt;Both FreeBSD and OpenBSD were accepted, and we'd love for anyone listening to check out their GSOC pages&lt;/li&gt;
&lt;li&gt;The FreeBSD wiki has a list of things that they'd be interested in someone helping out with&lt;/li&gt;
&lt;li&gt;OpenBSD's want list was &lt;a href="http://www.openbsdfoundation.org/gsoc2014.html" target="_blank" rel="nofollow noopener"&gt;also posted&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;DragonflyBSD and NetBSD were sadly not accepted this year
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" target="_blank" rel="nofollow noopener"&gt;Yes, you too can be an evil network overlord&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog post about monitoring your network using only free tools&lt;/li&gt;
&lt;li&gt;OpenBSD is a great fit, and has all the stuff you need in the base system or via packages&lt;/li&gt;
&lt;li&gt;It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)&lt;/li&gt;
&lt;li&gt;There's also details about flowd and nfsen, more great tools to make network monitoring easy&lt;/li&gt;
&lt;li&gt;If you're listening, Peter... stop ignoring our emails and come on the show! We know you're watching!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" target="_blank" rel="nofollow noopener"&gt;BSDMag's February issue is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The theme is "configuring basic services on OpenBSD 5.4"&lt;/li&gt;
&lt;li&gt;There's also an interview with Peter Hansteen (oh hey...)&lt;/li&gt;
&lt;li&gt;Topics also include locking down SSH, a GIMP lesson, user/group management, and...&lt;/li&gt;
&lt;li&gt;Linux and Solaris articles? Why??
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=139320023202696&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Changes in bcrypt&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation&lt;/li&gt;
&lt;li&gt;There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)&lt;/li&gt;
&lt;li&gt;"The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor 'b'."&lt;/li&gt;
&lt;li&gt;As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward&lt;/li&gt;
&lt;li&gt;Lots of specifics in the email, check the full thing
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Will Backman - &lt;a href="mailto:bitgeist@yahoo.com" target="_blank" rel="nofollow noopener"&gt;bitgeist@yahoo.com&lt;/a&gt; / &lt;a href="https://twitter.com/bsdtalk" target="_blank" rel="nofollow noopener"&gt;@bsdtalk&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The BSDTalk podcast, BSD advocacy, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/current-nbsd" target="_blank" rel="nofollow noopener"&gt;Tracking and cross-compiling -CURRENT (NetBSD)&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140223112426" target="_blank" rel="nofollow noopener"&gt;X11 no longer needs root&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Xorg has long since required root privileges to run the main server&lt;/li&gt;
&lt;li&gt;With &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;;m=139245772023497&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;recent work&lt;/a&gt; from the OpenBSD team, now everything (even KMS) can run as a regular user&lt;/li&gt;
&lt;li&gt;Now you can set the "machdep.allowaperture" sysctl to 0 and still use a GUI
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.6 CFT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Shortly after the huge 6.5 release, we get a routine bugfix update&lt;/li&gt;
&lt;li&gt;Test it out on as many systems as you can&lt;/li&gt;
&lt;li&gt;Check the mailing list for the full bug list
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140225072408" target="_blank" rel="nofollow noopener"&gt;Creating an OpenBSD USB drive&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Since OpenBSD doesn't distribute any official USB images, here are some instructions on how to do it&lt;/li&gt;
&lt;li&gt;Step by step guide on how you can make your very own&lt;/li&gt;
&lt;li&gt;However, there's some &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140228231258" target="_blank" rel="nofollow noopener"&gt;recent emails&lt;/a&gt; that suggest official USB images may be coming soon... &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139377587526463&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;oh wait&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New PBI updates that allow separate ports from /usr/local&lt;/li&gt;
&lt;li&gt;You need to rebuild pbi-manager if you want to try it out&lt;/li&gt;
&lt;li&gt;Updates and changes to Life Preserver, App Cafe, PCDM
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JpJ5EaZp" target="_blank" rel="nofollow noopener"&gt;espressowar writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2QpPevJ3J" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2EZLxDfWh" target="_blank" rel="nofollow noopener"&gt;Christian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gEBZbmG" target="_blank" rel="nofollow noopener"&gt;Adam writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2RnCO1p9c" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, will backman, bsdtalk, podcast, cross compile, build.sh, portable, portability, cross-build, building a release, google summer of code, gsoc, gsoc2014, 2014, spamd, dd, opensmtpd, tcpdump, packet filtering, monitoring, network, bcrypt, solar designer, ixsystems, usb, bootable, jails, openbsd usb drive, ezjail, jails, bsd jail, x11, openssh, pflow, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The long-awaited meetup is finally happening on today&#39;s show. We&#39;re going to be interviewing the original BSD podcaster, Will Backman, to discuss what he&#39;s been up to and what the future of BSD advocacy looks like. After that, we&#39;ll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We&#39;ve got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://wiki.freebsd.org/SummerOfCode2014" rel="nofollow">FreeBSD and OpenBSD in GSOC2014</a></h3>

<ul>
<li>The Google Summer of Code is a way to encourage students to write code for open source projects and make some money</li>
<li>Both FreeBSD and OpenBSD were accepted, and we&#39;d love for anyone listening to check out their GSOC pages</li>
<li>The FreeBSD wiki has a list of things that they&#39;d be interested in someone helping out with</li>
<li>OpenBSD&#39;s want list was <a href="http://www.openbsdfoundation.org/gsoc2014.html" rel="nofollow">also posted</a></li>
<li>DragonflyBSD and NetBSD were sadly not accepted this year
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" rel="nofollow">Yes, you too can be an evil network overlord</a></h3>

<ul>
<li>A new blog post about monitoring your network using only free tools</li>
<li>OpenBSD is a great fit, and has all the stuff you need in the base system or via packages</li>
<li>It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)</li>
<li>There&#39;s also details about flowd and nfsen, more great tools to make network monitoring easy</li>
<li>If you&#39;re listening, Peter... stop ignoring our emails and come on the show! We know you&#39;re watching!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" rel="nofollow">BSDMag&#39;s February issue is out</a></h3>

<ul>
<li>The theme is &quot;configuring basic services on OpenBSD 5.4&quot;</li>
<li>There&#39;s also an interview with Peter Hansteen (oh hey...)</li>
<li>Topics also include locking down SSH, a GIMP lesson, user/group management, and...</li>
<li>Linux and Solaris articles? Why??
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=139320023202696&w=2" rel="nofollow">Changes in bcrypt</a></h3>

<ul>
<li>Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation</li>
<li>There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)</li>
<li>&quot;The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor &#39;b&#39;.&quot;</li>
<li>As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward</li>
<li>Lots of specifics in the email, check the full thing
***</li>
</ul>

<h2>Interview - Will Backman - <a href="mailto:bitgeist@yahoo.com" rel="nofollow">bitgeist@yahoo.com</a> / <a href="https://twitter.com/bsdtalk" rel="nofollow">@bsdtalk</a></h2>

<p>The BSDTalk podcast, BSD advocacy, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/current-nbsd" rel="nofollow">Tracking and cross-compiling -CURRENT (NetBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140223112426" rel="nofollow">X11 no longer needs root</a></h3>

<ul>
<li>Xorg has long since required root privileges to run the main server</li>
<li>With <a href="http://marc.info/?l=openbsd-cvs&;m=139245772023497&w=2" rel="nofollow">recent work</a> from the OpenBSD team, now everything (even KMS) can run as a regular user</li>
<li>Now you can set the &quot;machdep.allowaperture&quot; sysctl to 0 and still use a GUI
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" rel="nofollow">OpenSSH 6.6 CFT</a></h3>

<ul>
<li>Shortly after the huge 6.5 release, we get a routine bugfix update</li>
<li>Test it out on as many systems as you can</li>
<li>Check the mailing list for the full bug list
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140225072408" rel="nofollow">Creating an OpenBSD USB drive</a></h3>

<ul>
<li>Since OpenBSD doesn&#39;t distribute any official USB images, here are some instructions on how to do it</li>
<li>Step by step guide on how you can make your very own</li>
<li>However, there&#39;s some <a href="http://undeadly.org/cgi?action=article&sid=20140228231258" rel="nofollow">recent emails</a> that suggest official USB images may be coming soon... <a href="http://marc.info/?l=openbsd-cvs&m=139377587526463&w=2" rel="nofollow">oh wait</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI updates that allow separate ports from /usr/local</li>
<li>You need to rebuild pbi-manager if you want to try it out</li>
<li>Updates and changes to Life Preserver, App Cafe, PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JpJ5EaZp" rel="nofollow">espressowar writes in</a></li>
<li><a href="http://slexy.org/view/s2QpPevJ3J" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2EZLxDfWh" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21gEBZbmG" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s2RnCO1p9c" rel="nofollow">Alex writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The long-awaited meetup is finally happening on today&#39;s show. We&#39;re going to be interviewing the original BSD podcaster, Will Backman, to discuss what he&#39;s been up to and what the future of BSD advocacy looks like. After that, we&#39;ll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We&#39;ve got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://wiki.freebsd.org/SummerOfCode2014" rel="nofollow">FreeBSD and OpenBSD in GSOC2014</a></h3>

<ul>
<li>The Google Summer of Code is a way to encourage students to write code for open source projects and make some money</li>
<li>Both FreeBSD and OpenBSD were accepted, and we&#39;d love for anyone listening to check out their GSOC pages</li>
<li>The FreeBSD wiki has a list of things that they&#39;d be interested in someone helping out with</li>
<li>OpenBSD&#39;s want list was <a href="http://www.openbsdfoundation.org/gsoc2014.html" rel="nofollow">also posted</a></li>
<li>DragonflyBSD and NetBSD were sadly not accepted this year
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" rel="nofollow">Yes, you too can be an evil network overlord</a></h3>

<ul>
<li>A new blog post about monitoring your network using only free tools</li>
<li>OpenBSD is a great fit, and has all the stuff you need in the base system or via packages</li>
<li>It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)</li>
<li>There&#39;s also details about flowd and nfsen, more great tools to make network monitoring easy</li>
<li>If you&#39;re listening, Peter... stop ignoring our emails and come on the show! We know you&#39;re watching!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" rel="nofollow">BSDMag&#39;s February issue is out</a></h3>

<ul>
<li>The theme is &quot;configuring basic services on OpenBSD 5.4&quot;</li>
<li>There&#39;s also an interview with Peter Hansteen (oh hey...)</li>
<li>Topics also include locking down SSH, a GIMP lesson, user/group management, and...</li>
<li>Linux and Solaris articles? Why??
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=139320023202696&w=2" rel="nofollow">Changes in bcrypt</a></h3>

<ul>
<li>Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation</li>
<li>There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)</li>
<li>&quot;The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor &#39;b&#39;.&quot;</li>
<li>As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward</li>
<li>Lots of specifics in the email, check the full thing
***</li>
</ul>

<h2>Interview - Will Backman - <a href="mailto:bitgeist@yahoo.com" rel="nofollow">bitgeist@yahoo.com</a> / <a href="https://twitter.com/bsdtalk" rel="nofollow">@bsdtalk</a></h2>

<p>The BSDTalk podcast, BSD advocacy, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/current-nbsd" rel="nofollow">Tracking and cross-compiling -CURRENT (NetBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140223112426" rel="nofollow">X11 no longer needs root</a></h3>

<ul>
<li>Xorg has long since required root privileges to run the main server</li>
<li>With <a href="http://marc.info/?l=openbsd-cvs&;m=139245772023497&w=2" rel="nofollow">recent work</a> from the OpenBSD team, now everything (even KMS) can run as a regular user</li>
<li>Now you can set the &quot;machdep.allowaperture&quot; sysctl to 0 and still use a GUI
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" rel="nofollow">OpenSSH 6.6 CFT</a></h3>

<ul>
<li>Shortly after the huge 6.5 release, we get a routine bugfix update</li>
<li>Test it out on as many systems as you can</li>
<li>Check the mailing list for the full bug list
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140225072408" rel="nofollow">Creating an OpenBSD USB drive</a></h3>

<ul>
<li>Since OpenBSD doesn&#39;t distribute any official USB images, here are some instructions on how to do it</li>
<li>Step by step guide on how you can make your very own</li>
<li>However, there&#39;s some <a href="http://undeadly.org/cgi?action=article&sid=20140228231258" rel="nofollow">recent emails</a> that suggest official USB images may be coming soon... <a href="http://marc.info/?l=openbsd-cvs&m=139377587526463&w=2" rel="nofollow">oh wait</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI updates that allow separate ports from /usr/local</li>
<li>You need to rebuild pbi-manager if you want to try it out</li>
<li>Updates and changes to Life Preserver, App Cafe, PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JpJ5EaZp" rel="nofollow">espressowar writes in</a></li>
<li><a href="http://slexy.org/view/s2QpPevJ3J" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2EZLxDfWh" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21gEBZbmG" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s2RnCO1p9c" rel="nofollow">Alex writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
