<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 05 May 2026 21:37:02 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Xinuos”</title>
    <link>https://www.bsdnow.tv/tags/xinuos</link>
    <pubDate>Wed, 15 Jul 2015 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>98: Our Code is Your Code</title>
  <link>https://www.bsdnow.tv/98</link>
  <guid isPermaLink="false">ed9812b6-0041-42fd-804b-8cf3e5bba0fc</guid>
  <pubDate>Wed, 15 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ed9812b6-0041-42fd-804b-8cf3e5bba0fc.mp3" length="53150260" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be talking with the CTO of Xinuos, David Meyer, about their adoption of FreeBSD. We also discuss the BSD license model for businesses and the benefits of contributing changes back.</itunes:subtitle>
  <itunes:duration>1:13:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this time on the show, we'll be talking with the CTO of Xinuos, David Meyer, about their adoption of FreeBSD. We also discuss the BSD license model for businesses and the benefits of contributing changes back.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://community.arm.com/groups/processors/blog/2015/07/07/enabling-freebsd-on-aarch64" target="_blank" rel="nofollow noopener"&gt;Enabling FreeBSD on AArch64&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the things the FreeBSD foundation has been dumping money into lately is ARM64 support, but we haven't heard too much about it - this article should change that&lt;/li&gt;
&lt;li&gt;Since it's on a mainstream ARM site, the article begins with a bit of FreeBSD history, leading up to the current work on ARM64&lt;/li&gt;
&lt;li&gt;There's also a summary of some of the ARM work done at this year's BSDCan, including details about running it on the Cavium ThunderX platform (which has 48 cores)&lt;/li&gt;
&lt;li&gt;As of just a couple months ago, dtrace is even working on this new architecture&lt;/li&gt;
&lt;li&gt;Come 11.0-RELEASE, the plan is for ARM64 to get the same "tier 1" treatment as X86, which would imply binary updates for base and ports - something Raspberry Pi users often complain about not having
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=8kR-tW1kyDc#t=8" target="_blank" rel="nofollow noopener"&gt;OpenBSD's tcpdump detailed&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Most people are probably familiar with &lt;a href="https://en.wikipedia.org/wiki/Tcpdump" target="_blank" rel="nofollow noopener"&gt;tcpdump&lt;/a&gt;, a very useful packet sniffing and capturing utility that's included in all the main BSD base systems&lt;/li&gt;
&lt;li&gt;This video guide is specifically about the version in OpenBSD, which has gone through some major changes (it's pretty much a fork with no version number anymore)&lt;/li&gt;
&lt;li&gt;Unlike on the other platforms, OpenBSD's tcpdump will always run in a chroot as an unprivileged user - this has saved it from a number of high-profile exploits&lt;/li&gt;
&lt;li&gt;It also has support for the "pf.os" system, allowing you to filter out operating system fingerprints in the packet captures&lt;/li&gt;
&lt;li&gt;There's also PF (and pflog) integration, letting you see which line in your ruleset triggered a specific match&lt;/li&gt;
&lt;li&gt;Being able to run tcpdump directly &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;on your router&lt;/a&gt; is pretty awesome for troubleshooting
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-kamil-czekirda.html" target="_blank" rel="nofollow noopener"&gt;More FreeBSD foundation at BSDCan&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has another round of trip reports from this year's BSDCan&lt;/li&gt;
&lt;li&gt;First up is Kamil Czekirda, who gives a good summary of some of the devsummit, FreeBSD-related presentations, some tutorials, getting freebsd-update bugs fixed and of course eating cake&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-christian.html" target="_blank" rel="nofollow noopener"&gt;second post&lt;/a&gt; from Christian Brueffer, who cleverly planned ahead to avoid jetlag, details how he got some things done during the FreeBSD devsummit&lt;/li&gt;
&lt;li&gt;Their &lt;a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-warren-block.html" target="_blank" rel="nofollow noopener"&gt;third report&lt;/a&gt; is from our buddy Warren Block, who (unsurprisingly) worked on a lot of documentation-related things, including getting more people involved with writing them&lt;/li&gt;
&lt;li&gt;In true doc team style, his report is the most well-written of the bunch, including lots of links and a clear separation of topics (doc lounge, contributing to the wiki, presentations...)&lt;/li&gt;
&lt;li&gt;Finally, the &lt;a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-shonali.html" target="_blank" rel="nofollow noopener"&gt;fourth one&lt;/a&gt; comes to us from Shonali Balakrishna, who also gives an outline of some of the talks&lt;/li&gt;
&lt;li&gt;"Not only does a BSD conference have way too many very smart people in one room, but also some of the nicest."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2015/07/08/16391.html" target="_blank" rel="nofollow noopener"&gt;DragonFly on the Chromebook C720&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got one of the Chromebook laptops and weren't happy with the included OS, DragonFlyBSD might be worth a go&lt;/li&gt;
&lt;li&gt;This article is a "mini-report" on how DragonFly functions on the device as a desktop, and &lt;/li&gt;
&lt;li&gt;While the 2GB of RAM proved to be a bit limiting, most of the hardware is well-supported&lt;/li&gt;
&lt;li&gt;DragonFly's wiki has &lt;a href="http://www.dragonflybsd.org/docs/newhandbook/ConfigChromebook/" target="_blank" rel="nofollow noopener"&gt;a full guide&lt;/a&gt; on getting set up on one of these devices as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - David Meyer - &lt;a href="mailto:info@xinuos.com" target="_blank" rel="nofollow noopener"&gt;info@xinuos.com&lt;/a&gt; / &lt;a href="https://twitter.com/xinuos" target="_blank" rel="nofollow noopener"&gt;@xinuos&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Xinuos, BSD license model vs. others, community interaction&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/sergev/LiteBSD" target="_blank" rel="nofollow noopener"&gt;Introducing LiteBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We definitely don't talk about 4.4BSD a lot on the show&lt;/li&gt;
&lt;li&gt;LiteBSD is "a variant of [the] 4.4BSD operating system adapted for microcontrollers"&lt;/li&gt;
&lt;li&gt;If you've got really, really old hardware (or are working in the embedded space) then this might be an interesting hobby project to look info
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://hardenedbsd.org/article/shawn-webb/2015-07-06/announcing-aslr-completion" target="_blank" rel="nofollow noopener"&gt;HardenedBSD announces ASLR completion&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;HardenedBSD, now officially &lt;a href="http://hardenedbsd.org/content/about" target="_blank" rel="nofollow noopener"&gt;a full-on fork of FreeBSD&lt;/a&gt;, has declared their ASLR patchset to be complete&lt;/li&gt;
&lt;li&gt;The latest and last addition to the work was VDSO (Virtual Dynamic Shared Object) randomization, which is now configurable with a sysctl&lt;/li&gt;
&lt;li&gt;This post gives a summary of the six main features they've added since &lt;a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" target="_blank" rel="nofollow noopener"&gt;the beginning&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Only a few small things are left to do - man page cleanups, possibly shared object load order improvements
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143636371501474&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Unlock the reaper&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In the ongoing quest to make more of OpenBSD SMP-friendly, a new patch was posted that unlocks the reaper in the kernel&lt;/li&gt;
&lt;li&gt;When there's a &lt;a href="https://en.wikipedia.org/wiki/Zombie_process" target="_blank" rel="nofollow noopener"&gt;zombie process&lt;/a&gt; causing a resource leak, it's the &lt;a href="https://en.wikipedia.org/wiki/Wait_%28system_call%29" target="_blank" rel="nofollow noopener"&gt;reaper's job&lt;/a&gt; to deallocate their resources (and yes we're still talking about computers, not horror movies)&lt;/li&gt;
&lt;li&gt;Initial testing has yielded &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143642748717836&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;positive&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143639356810690&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;results&lt;/a&gt; and &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143638955809675&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;no regressions&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;They're looking for testers, so you can install a -current snapshot and get it automatically&lt;/li&gt;
&lt;li&gt;An updated version of the patch is &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143643025118637&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;coming soon&lt;/a&gt; too&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.openbsd.org/images/hackathons/c2k15-s.gif" target="_blank" rel="nofollow noopener"&gt;A hackathon&lt;/a&gt; is going on &lt;em&gt;right now&lt;/em&gt;, so you can expect more SMP improvements in the near future
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2015/07/the-importance-of-mentoring-or-how-i.html" target="_blank" rel="nofollow noopener"&gt;The importance of mentoring&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd has a blog post up about mentoring new users, and it tells the story of how he originally got into FreeBSD&lt;/li&gt;
&lt;li&gt;He tells the story of, at age 11, meeting someone else who knew about making crystal sets that became his role model&lt;/li&gt;
&lt;li&gt;Eventually we get to his first FreeBSD 1.1 installation (which he temporarily abandoned for Linux, since it didn't have a color "ls" command) and how he started using the OS&lt;/li&gt;
&lt;li&gt;Nowadays, there's a formal mentoring system in FreeBSD&lt;/li&gt;
&lt;li&gt;While he talks about FreeBSD in the post, a lot of the concepts apply to all the BSDs (or even just life in general)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s29LpvIxDD" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21I1MZsDl" target="_blank" rel="nofollow noopener"&gt;Herminio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20kk3ilM6" target="_blank" rel="nofollow noopener"&gt;Stuart writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2pL5xA80B" target="_blank" rel="nofollow noopener"&gt;Richard writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, xinuos, business, bsd license, gpl, mit, copyright, copyleft, copyfree, bsdcan, chromebook, c720, tcpdump, arm64, aarch64, litebsd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking with the CTO of Xinuos, David Meyer, about their adoption of FreeBSD. We also discuss the BSD license model for businesses and the benefits of contributing changes back.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://community.arm.com/groups/processors/blog/2015/07/07/enabling-freebsd-on-aarch64" rel="nofollow">Enabling FreeBSD on AArch64</a></h3>

<ul>
<li>One of the things the FreeBSD foundation has been dumping money into lately is ARM64 support, but we haven&#39;t heard too much about it - this article should change that</li>
<li>Since it&#39;s on a mainstream ARM site, the article begins with a bit of FreeBSD history, leading up to the current work on ARM64</li>
<li>There&#39;s also a summary of some of the ARM work done at this year&#39;s BSDCan, including details about running it on the Cavium ThunderX platform (which has 48 cores)</li>
<li>As of just a couple months ago, dtrace is even working on this new architecture</li>
<li>Come 11.0-RELEASE, the plan is for ARM64 to get the same &quot;tier 1&quot; treatment as X86, which would imply binary updates for base and ports - something Raspberry Pi users often complain about not having
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=8kR-tW1kyDc#t=8" rel="nofollow">OpenBSD&#39;s tcpdump detailed</a></h3>

<ul>
<li>Most people are probably familiar with <a href="https://en.wikipedia.org/wiki/Tcpdump" rel="nofollow">tcpdump</a>, a very useful packet sniffing and capturing utility that&#39;s included in all the main BSD base systems</li>
<li>This video guide is specifically about the version in OpenBSD, which has gone through some major changes (it&#39;s pretty much a fork with no version number anymore)</li>
<li>Unlike on the other platforms, OpenBSD&#39;s tcpdump will always run in a chroot as an unprivileged user - this has saved it from a number of high-profile exploits</li>
<li>It also has support for the &quot;pf.os&quot; system, allowing you to filter out operating system fingerprints in the packet captures</li>
<li>There&#39;s also PF (and pflog) integration, letting you see which line in your ruleset triggered a specific match</li>
<li>Being able to run tcpdump directly <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">on your router</a> is pretty awesome for troubleshooting
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-kamil-czekirda.html" rel="nofollow">More FreeBSD foundation at BSDCan</a></h3>

<ul>
<li>The FreeBSD foundation has another round of trip reports from this year&#39;s BSDCan</li>
<li>First up is Kamil Czekirda, who gives a good summary of some of the devsummit, FreeBSD-related presentations, some tutorials, getting freebsd-update bugs fixed and of course eating cake</li>
<li>A <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-christian.html" rel="nofollow">second post</a> from Christian Brueffer, who cleverly planned ahead to avoid jetlag, details how he got some things done during the FreeBSD devsummit</li>
<li>Their <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-warren-block.html" rel="nofollow">third report</a> is from our buddy Warren Block, who (unsurprisingly) worked on a lot of documentation-related things, including getting more people involved with writing them</li>
<li>In true doc team style, his report is the most well-written of the bunch, including lots of links and a clear separation of topics (doc lounge, contributing to the wiki, presentations...)</li>
<li>Finally, the <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-shonali.html" rel="nofollow">fourth one</a> comes to us from Shonali Balakrishna, who also gives an outline of some of the talks</li>
<li>&quot;Not only does a BSD conference have way too many very smart people in one room, but also some of the nicest.&quot;
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/07/08/16391.html" rel="nofollow">DragonFly on the Chromebook C720</a></h3>

<ul>
<li>If you&#39;ve got one of the Chromebook laptops and weren&#39;t happy with the included OS, DragonFlyBSD might be worth a go</li>
<li>This article is a &quot;mini-report&quot; on how DragonFly functions on the device as a desktop, and </li>
<li>While the 2GB of RAM proved to be a bit limiting, most of the hardware is well-supported</li>
<li>DragonFly&#39;s wiki has <a href="http://www.dragonflybsd.org/docs/newhandbook/ConfigChromebook/" rel="nofollow">a full guide</a> on getting set up on one of these devices as well
***</li>
</ul>

<h2>Interview - David Meyer - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a> / <a href="https://twitter.com/xinuos" rel="nofollow">@xinuos</a></h2>

<p>Xinuos, BSD license model vs. others, community interaction</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/sergev/LiteBSD" rel="nofollow">Introducing LiteBSD</a></h3>

<ul>
<li>We definitely don&#39;t talk about 4.4BSD a lot on the show</li>
<li>LiteBSD is &quot;a variant of [the] 4.4BSD operating system adapted for microcontrollers&quot;</li>
<li>If you&#39;ve got really, really old hardware (or are working in the embedded space) then this might be an interesting hobby project to look info
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-07-06/announcing-aslr-completion" rel="nofollow">HardenedBSD announces ASLR completion</a></h3>

<ul>
<li>HardenedBSD, now officially <a href="http://hardenedbsd.org/content/about" rel="nofollow">a full-on fork of FreeBSD</a>, has declared their ASLR patchset to be complete</li>
<li>The latest and last addition to the work was VDSO (Virtual Dynamic Shared Object) randomization, which is now configurable with a sysctl</li>
<li>This post gives a summary of the six main features they&#39;ve added since <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">the beginning</a></li>
<li>Only a few small things are left to do - man page cleanups, possibly shared object load order improvements
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143636371501474&w=2" rel="nofollow">Unlock the reaper</a></h3>

<ul>
<li>In the ongoing quest to make more of OpenBSD SMP-friendly, a new patch was posted that unlocks the reaper in the kernel</li>
<li>When there&#39;s a <a href="https://en.wikipedia.org/wiki/Zombie_process" rel="nofollow">zombie process</a> causing a resource leak, it&#39;s the <a href="https://en.wikipedia.org/wiki/Wait_%28system_call%29" rel="nofollow">reaper&#39;s job</a> to deallocate their resources (and yes we&#39;re still talking about computers, not horror movies)</li>
<li>Initial testing has yielded <a href="https://www.marc.info/?l=openbsd-tech&m=143642748717836&w=2" rel="nofollow">positive</a> <a href="https://www.marc.info/?l=openbsd-tech&m=143639356810690&w=2" rel="nofollow">results</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=143638955809675&w=2" rel="nofollow">no regressions</a></li>
<li>They&#39;re looking for testers, so you can install a -current snapshot and get it automatically</li>
<li>An updated version of the patch is <a href="https://www.marc.info/?l=openbsd-tech&m=143643025118637&w=2" rel="nofollow">coming soon</a> too</li>
<li><a href="http://www.openbsd.org/images/hackathons/c2k15-s.gif" rel="nofollow">A hackathon</a> is going on <em>right now</em>, so you can expect more SMP improvements in the near future
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2015/07/the-importance-of-mentoring-or-how-i.html" rel="nofollow">The importance of mentoring</a></h3>

<ul>
<li>Adrian Chadd has a blog post up about mentoring new users, and it tells the story of how he originally got into FreeBSD</li>
<li>He tells the story of, at age 11, meeting someone else who knew about making crystal sets that became his role model</li>
<li>Eventually we get to his first FreeBSD 1.1 installation (which he temporarily abandoned for Linux, since it didn&#39;t have a color &quot;ls&quot; command) and how he started using the OS</li>
<li>Nowadays, there&#39;s a formal mentoring system in FreeBSD</li>
<li>While he talks about FreeBSD in the post, a lot of the concepts apply to all the BSDs (or even just life in general)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29LpvIxDD" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21I1MZsDl" rel="nofollow">Herminio writes in</a></li>
<li><a href="http://slexy.org/view/s20kk3ilM6" rel="nofollow">Stuart writes in</a></li>
<li><a href="http://slexy.org/view/s2pL5xA80B" rel="nofollow">Richard writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking with the CTO of Xinuos, David Meyer, about their adoption of FreeBSD. We also discuss the BSD license model for businesses and the benefits of contributing changes back.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://community.arm.com/groups/processors/blog/2015/07/07/enabling-freebsd-on-aarch64" rel="nofollow">Enabling FreeBSD on AArch64</a></h3>

<ul>
<li>One of the things the FreeBSD foundation has been dumping money into lately is ARM64 support, but we haven&#39;t heard too much about it - this article should change that</li>
<li>Since it&#39;s on a mainstream ARM site, the article begins with a bit of FreeBSD history, leading up to the current work on ARM64</li>
<li>There&#39;s also a summary of some of the ARM work done at this year&#39;s BSDCan, including details about running it on the Cavium ThunderX platform (which has 48 cores)</li>
<li>As of just a couple months ago, dtrace is even working on this new architecture</li>
<li>Come 11.0-RELEASE, the plan is for ARM64 to get the same &quot;tier 1&quot; treatment as X86, which would imply binary updates for base and ports - something Raspberry Pi users often complain about not having
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=8kR-tW1kyDc#t=8" rel="nofollow">OpenBSD&#39;s tcpdump detailed</a></h3>

<ul>
<li>Most people are probably familiar with <a href="https://en.wikipedia.org/wiki/Tcpdump" rel="nofollow">tcpdump</a>, a very useful packet sniffing and capturing utility that&#39;s included in all the main BSD base systems</li>
<li>This video guide is specifically about the version in OpenBSD, which has gone through some major changes (it&#39;s pretty much a fork with no version number anymore)</li>
<li>Unlike on the other platforms, OpenBSD&#39;s tcpdump will always run in a chroot as an unprivileged user - this has saved it from a number of high-profile exploits</li>
<li>It also has support for the &quot;pf.os&quot; system, allowing you to filter out operating system fingerprints in the packet captures</li>
<li>There&#39;s also PF (and pflog) integration, letting you see which line in your ruleset triggered a specific match</li>
<li>Being able to run tcpdump directly <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">on your router</a> is pretty awesome for troubleshooting
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-kamil-czekirda.html" rel="nofollow">More FreeBSD foundation at BSDCan</a></h3>

<ul>
<li>The FreeBSD foundation has another round of trip reports from this year&#39;s BSDCan</li>
<li>First up is Kamil Czekirda, who gives a good summary of some of the devsummit, FreeBSD-related presentations, some tutorials, getting freebsd-update bugs fixed and of course eating cake</li>
<li>A <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-christian.html" rel="nofollow">second post</a> from Christian Brueffer, who cleverly planned ahead to avoid jetlag, details how he got some things done during the FreeBSD devsummit</li>
<li>Their <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-warren-block.html" rel="nofollow">third report</a> is from our buddy Warren Block, who (unsurprisingly) worked on a lot of documentation-related things, including getting more people involved with writing them</li>
<li>In true doc team style, his report is the most well-written of the bunch, including lots of links and a clear separation of topics (doc lounge, contributing to the wiki, presentations...)</li>
<li>Finally, the <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-shonali.html" rel="nofollow">fourth one</a> comes to us from Shonali Balakrishna, who also gives an outline of some of the talks</li>
<li>&quot;Not only does a BSD conference have way too many very smart people in one room, but also some of the nicest.&quot;
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/07/08/16391.html" rel="nofollow">DragonFly on the Chromebook C720</a></h3>

<ul>
<li>If you&#39;ve got one of the Chromebook laptops and weren&#39;t happy with the included OS, DragonFlyBSD might be worth a go</li>
<li>This article is a &quot;mini-report&quot; on how DragonFly functions on the device as a desktop, and </li>
<li>While the 2GB of RAM proved to be a bit limiting, most of the hardware is well-supported</li>
<li>DragonFly&#39;s wiki has <a href="http://www.dragonflybsd.org/docs/newhandbook/ConfigChromebook/" rel="nofollow">a full guide</a> on getting set up on one of these devices as well
***</li>
</ul>

<h2>Interview - David Meyer - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a> / <a href="https://twitter.com/xinuos" rel="nofollow">@xinuos</a></h2>

<p>Xinuos, BSD license model vs. others, community interaction</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/sergev/LiteBSD" rel="nofollow">Introducing LiteBSD</a></h3>

<ul>
<li>We definitely don&#39;t talk about 4.4BSD a lot on the show</li>
<li>LiteBSD is &quot;a variant of [the] 4.4BSD operating system adapted for microcontrollers&quot;</li>
<li>If you&#39;ve got really, really old hardware (or are working in the embedded space) then this might be an interesting hobby project to look info
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-07-06/announcing-aslr-completion" rel="nofollow">HardenedBSD announces ASLR completion</a></h3>

<ul>
<li>HardenedBSD, now officially <a href="http://hardenedbsd.org/content/about" rel="nofollow">a full-on fork of FreeBSD</a>, has declared their ASLR patchset to be complete</li>
<li>The latest and last addition to the work was VDSO (Virtual Dynamic Shared Object) randomization, which is now configurable with a sysctl</li>
<li>This post gives a summary of the six main features they&#39;ve added since <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">the beginning</a></li>
<li>Only a few small things are left to do - man page cleanups, possibly shared object load order improvements
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143636371501474&w=2" rel="nofollow">Unlock the reaper</a></h3>

<ul>
<li>In the ongoing quest to make more of OpenBSD SMP-friendly, a new patch was posted that unlocks the reaper in the kernel</li>
<li>When there&#39;s a <a href="https://en.wikipedia.org/wiki/Zombie_process" rel="nofollow">zombie process</a> causing a resource leak, it&#39;s the <a href="https://en.wikipedia.org/wiki/Wait_%28system_call%29" rel="nofollow">reaper&#39;s job</a> to deallocate their resources (and yes we&#39;re still talking about computers, not horror movies)</li>
<li>Initial testing has yielded <a href="https://www.marc.info/?l=openbsd-tech&m=143642748717836&w=2" rel="nofollow">positive</a> <a href="https://www.marc.info/?l=openbsd-tech&m=143639356810690&w=2" rel="nofollow">results</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=143638955809675&w=2" rel="nofollow">no regressions</a></li>
<li>They&#39;re looking for testers, so you can install a -current snapshot and get it automatically</li>
<li>An updated version of the patch is <a href="https://www.marc.info/?l=openbsd-tech&m=143643025118637&w=2" rel="nofollow">coming soon</a> too</li>
<li><a href="http://www.openbsd.org/images/hackathons/c2k15-s.gif" rel="nofollow">A hackathon</a> is going on <em>right now</em>, so you can expect more SMP improvements in the near future
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2015/07/the-importance-of-mentoring-or-how-i.html" rel="nofollow">The importance of mentoring</a></h3>

<ul>
<li>Adrian Chadd has a blog post up about mentoring new users, and it tells the story of how he originally got into FreeBSD</li>
<li>He tells the story of, at age 11, meeting someone else who knew about making crystal sets that became his role model</li>
<li>Eventually we get to his first FreeBSD 1.1 installation (which he temporarily abandoned for Linux, since it didn&#39;t have a color &quot;ls&quot; command) and how he started using the OS</li>
<li>Nowadays, there&#39;s a formal mentoring system in FreeBSD</li>
<li>While he talks about FreeBSD in the post, a lot of the concepts apply to all the BSDs (or even just life in general)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29LpvIxDD" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21I1MZsDl" rel="nofollow">Herminio writes in</a></li>
<li><a href="http://slexy.org/view/s20kk3ilM6" rel="nofollow">Stuart writes in</a></li>
<li><a href="http://slexy.org/view/s2pL5xA80B" rel="nofollow">Richard writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>51: Engineering Nginx</title>
  <link>https://www.bsdnow.tv/51</link>
  <guid isPermaLink="false">4502bfee-e803-4a0d-bdcc-fd4420b30bb1</guid>
  <pubDate>Wed, 20 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4502bfee-e803-4a0d-bdcc-fd4420b30bb1.mp3" length="62975956" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up on the show, we'll be showing you how to set up a secure, SSL-only webserver. There's also an interview with Eric Le Blan about community participation and FreeBSD's role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:27:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up on the show, we'll be showing you how to set up a secure, SSL-only webserver. There's also an interview with Eric Le Blan about community participation and FreeBSD's role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" target="_blank" rel="nofollow noopener"&gt;Password gropers take spamtrap bait&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" target="_blank" rel="nofollow noopener"&gt;Peter Hansteen&lt;/a&gt;, who keeps his eyes glued to his log files, has a new blog post&lt;/li&gt;
&lt;li&gt;He seems to have discovered another new weird phenomenon in his pop3 logs&lt;/li&gt;
&lt;li&gt;"yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia"&lt;/li&gt;
&lt;li&gt;Someone tried to log in to his service with an address that was known to be invalid&lt;/li&gt;
&lt;li&gt;The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" target="_blank" rel="nofollow noopener"&gt;Inside the Atheros wifi chipset&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd - sometimes known in the FreeBSD community as "the wireless guy" - gave a talk at the Defcon Wireless Village 2014&lt;/li&gt;
&lt;li&gt;He covers a lot of topics on wifi, specifically on Atheros chips and why they're so popular for open source development&lt;/li&gt;
&lt;li&gt;There's a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards&lt;/li&gt;
&lt;li&gt;Very technical talk; some parts might go over your head if you're not a driver developer&lt;/li&gt;
&lt;li&gt;The raw video file is also available &lt;a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" target="_blank" rel="nofollow noopener"&gt;to download&lt;/a&gt; on archive.org&lt;/li&gt;
&lt;li&gt;Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" target="_blank" rel="nofollow noopener"&gt;Trip report and hackathon mini-roundup&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted&lt;/li&gt;
&lt;li&gt;Mark Linimon mentions some of the future plans for FreeBSD's release engineering and ports&lt;/li&gt;
&lt;li&gt;Bapt &lt;a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" target="_blank" rel="nofollow noopener"&gt;also has a BSDCan report&lt;/a&gt; detailing his work on ports and packages&lt;/li&gt;
&lt;li&gt;Antoine Jacoutot &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140812064946" target="_blank" rel="nofollow noopener"&gt;writes about&lt;/a&gt; his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout&lt;/li&gt;
&lt;li&gt;Peter Hessler, a latecomer to the hackathon, &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140806125308" target="_blank" rel="nofollow noopener"&gt;details his experience&lt;/a&gt; too, hacking on the installer and built-in upgrade function&lt;/li&gt;
&lt;li&gt;Christian Weisgerber &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140803122705" target="_blank" rel="nofollow noopener"&gt;talks about&lt;/a&gt; starting some initial improvements of OpenBSD's ports infrastructure
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" target="_blank" rel="nofollow noopener"&gt;DragonFly BSD 3.8.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Although it was already branched, the release media is now available for DragonFly 3.8.2&lt;/li&gt;
&lt;li&gt;This is a minor update, mostly to fix the recent OpenSSL vulnerabilities&lt;/li&gt;
&lt;li&gt;It also includes some various other small fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Eric Le Blan - &lt;a href="mailto:info@xinuos.com" target="_blank" rel="nofollow noopener"&gt;info@xinuos.com&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Xinuos' recent FreeBSD integration, BSD in the commercial server space&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/nginx" target="_blank" rel="nofollow noopener"&gt;Building a hardened, feature-rich webserver&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" target="_blank" rel="nofollow noopener"&gt;Defend your network and privacy, FreeBSD version&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back in &lt;a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" target="_blank" rel="nofollow noopener"&gt;episode 39&lt;/a&gt;, we covered a blog post about creating an OpenBSD gateway - partly based on &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;our tutorial&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This is a follow-up post, by the same author, about doing a similar thing with FreeBSD&lt;/li&gt;
&lt;li&gt;He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs&lt;/li&gt;
&lt;li&gt;The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" target="_blank" rel="nofollow noopener"&gt;Don't encrypt all the things&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another couple of interesting blog posts from &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; about encryption&lt;/li&gt;
&lt;li&gt;It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good&lt;/li&gt;
&lt;li&gt;After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie&lt;/li&gt;
&lt;li&gt;He also talks a bit about some PGP weaknesses and a possible future replacement&lt;/li&gt;
&lt;li&gt;He also has another, similar post entitled "&lt;a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" target="_blank" rel="nofollow noopener"&gt;in defense of opportunistic encryption&lt;/a&gt;"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=270096" target="_blank" rel="nofollow noopener"&gt;New automounter lands in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The work on the new automounter has just landed in 11-CURRENT&lt;/li&gt;
&lt;li&gt;With help from the FreeBSD Foundation, we'll have a new "autofs" kernel option&lt;/li&gt;
&lt;li&gt;Check the SVN viewer online to read over the man pages if you're not running -CURRENT&lt;/li&gt;
&lt;li&gt;You can also read a bit about it in the &lt;a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" target="_blank" rel="nofollow noopener"&gt;recent newsletter&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.7 CFT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It's been a little while since the last OpenSSH release, but 6.7 is almost ready&lt;/li&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;Damien Miller&lt;/a&gt; issued a call for testing for the upcoming version, which includes a fair amount of new features&lt;/li&gt;
&lt;li&gt;It includes some old code removal, some new features and some internal reworkings - we'll cover the full list in detail when it's released&lt;/li&gt;
&lt;li&gt;This version also officially supports being built with LibreSSL now&lt;/li&gt;
&lt;li&gt;Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20yIP7VXa" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2DeeUjAn6" target="_blank" rel="nofollow noopener"&gt;Lachlan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216imwEb0" target="_blank" rel="nofollow noopener"&gt;Francis writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2oc8vavWe" target="_blank" rel="nofollow noopener"&gt;Frank writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20wL61sSr" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, xinuos, cloud computing, hosting solution, nginx, webserver, httpd, spamd, atheros, wifi, aircrack-ng, kismet, defcon, wireless, bsdcan, hackathon, autofs, automounter, https, tls, ssl, openssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up on the show, we&#39;ll be showing you how to set up a secure, SSL-only webserver. There&#39;s also an interview with Eric Le Blan about community participation and FreeBSD&#39;s role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" rel="nofollow">Password gropers take spamtrap bait</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a>, who keeps his eyes glued to his log files, has a new blog post</li>
<li>He seems to have discovered another new weird phenomenon in his pop3 logs</li>
<li>&quot;yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia&quot;</li>
<li>Someone tried to log in to his service with an address that was known to be invalid</li>
<li>The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" rel="nofollow">Inside the Atheros wifi chipset</a></h3>

<ul>
<li>Adrian Chadd - sometimes known in the FreeBSD community as &quot;the wireless guy&quot; - gave a talk at the Defcon Wireless Village 2014</li>
<li>He covers a lot of topics on wifi, specifically on Atheros chips and why they&#39;re so popular for open source development</li>
<li>There&#39;s a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards</li>
<li>Very technical talk; some parts might go over your head if you&#39;re not a driver developer</li>
<li>The raw video file is also available <a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" rel="nofollow">to download</a> on archive.org</li>
<li>Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" rel="nofollow">Trip report and hackathon mini-roundup</a></h3>

<ul>
<li>A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted</li>
<li>Mark Linimon mentions some of the future plans for FreeBSD&#39;s release engineering and ports</li>
<li>Bapt <a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" rel="nofollow">also has a BSDCan report</a> detailing his work on ports and packages</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20140812064946" rel="nofollow">writes about</a> his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout</li>
<li>Peter Hessler, a latecomer to the hackathon, <a href="http://undeadly.org/cgi?action=article&sid=20140806125308" rel="nofollow">details his experience</a> too, hacking on the installer and built-in upgrade function</li>
<li>Christian Weisgerber <a href="http://undeadly.org/cgi?action=article&sid=20140803122705" rel="nofollow">talks about</a> starting some initial improvements of OpenBSD&#39;s ports infrastructure
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" rel="nofollow">DragonFly BSD 3.8.2 released</a></h3>

<ul>
<li>Although it was already branched, the release media is now available for DragonFly 3.8.2</li>
<li>This is a minor update, mostly to fix the recent OpenSSL vulnerabilities</li>
<li>It also includes some various other small fixes
***</li>
</ul>

<h2>Interview - Eric Le Blan - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a></h2>

<p>Xinuos&#39; recent FreeBSD integration, BSD in the commercial server space</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nginx" rel="nofollow">Building a hardened, feature-rich webserver</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy, FreeBSD version</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">episode 39</a>, we covered a blog post about creating an OpenBSD gateway - partly based on <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a></li>
<li>This is a follow-up post, by the same author, about doing a similar thing with FreeBSD</li>
<li>He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs</li>
<li>The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" rel="nofollow">Don&#39;t encrypt all the things</a></h3>

<ul>
<li>Another couple of interesting blog posts from <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> about encryption</li>
<li>It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good</li>
<li>After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie</li>
<li>He also talks a bit about some PGP weaknesses and a possible future replacement</li>
<li>He also has another, similar post entitled &quot;<a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" rel="nofollow">in defense of opportunistic encryption</a>&quot;
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=270096" rel="nofollow">New automounter lands in FreeBSD</a></h3>

<ul>
<li>The work on the new automounter has just landed in 11-CURRENT</li>
<li>With help from the FreeBSD Foundation, we&#39;ll have a new &quot;autofs&quot; kernel option</li>
<li>Check the SVN viewer online to read over the man pages if you&#39;re not running -CURRENT</li>
<li>You can also read a bit about it in the <a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" rel="nofollow">recent newsletter</a>
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" rel="nofollow">OpenSSH 6.7 CFT</a></h3>

<ul>
<li>It&#39;s been a little while since the last OpenSSH release, but 6.7 is almost ready</li>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> issued a call for testing for the upcoming version, which includes a fair amount of new features</li>
<li>It includes some old code removal, some new features and some internal reworkings - we&#39;ll cover the full list in detail when it&#39;s released</li>
<li>This version also officially supports being built with LibreSSL now</li>
<li>Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20yIP7VXa" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DeeUjAn6" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s216imwEb0" rel="nofollow">Francis writes in</a></li>
<li><a href="http://slexy.org/view/s2oc8vavWe" rel="nofollow">Frank writes in</a></li>
<li><a href="http://slexy.org/view/s20wL61sSr" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up on the show, we&#39;ll be showing you how to set up a secure, SSL-only webserver. There&#39;s also an interview with Eric Le Blan about community participation and FreeBSD&#39;s role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" rel="nofollow">Password gropers take spamtrap bait</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a>, who keeps his eyes glued to his log files, has a new blog post</li>
<li>He seems to have discovered another new weird phenomenon in his pop3 logs</li>
<li>&quot;yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia&quot;</li>
<li>Someone tried to log in to his service with an address that was known to be invalid</li>
<li>The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" rel="nofollow">Inside the Atheros wifi chipset</a></h3>

<ul>
<li>Adrian Chadd - sometimes known in the FreeBSD community as &quot;the wireless guy&quot; - gave a talk at the Defcon Wireless Village 2014</li>
<li>He covers a lot of topics on wifi, specifically on Atheros chips and why they&#39;re so popular for open source development</li>
<li>There&#39;s a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards</li>
<li>Very technical talk; some parts might go over your head if you&#39;re not a driver developer</li>
<li>The raw video file is also available <a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" rel="nofollow">to download</a> on archive.org</li>
<li>Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" rel="nofollow">Trip report and hackathon mini-roundup</a></h3>

<ul>
<li>A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted</li>
<li>Mark Linimon mentions some of the future plans for FreeBSD&#39;s release engineering and ports</li>
<li>Bapt <a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" rel="nofollow">also has a BSDCan report</a> detailing his work on ports and packages</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20140812064946" rel="nofollow">writes about</a> his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout</li>
<li>Peter Hessler, a latecomer to the hackathon, <a href="http://undeadly.org/cgi?action=article&sid=20140806125308" rel="nofollow">details his experience</a> too, hacking on the installer and built-in upgrade function</li>
<li>Christian Weisgerber <a href="http://undeadly.org/cgi?action=article&sid=20140803122705" rel="nofollow">talks about</a> starting some initial improvements of OpenBSD&#39;s ports infrastructure
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" rel="nofollow">DragonFly BSD 3.8.2 released</a></h3>

<ul>
<li>Although it was already branched, the release media is now available for DragonFly 3.8.2</li>
<li>This is a minor update, mostly to fix the recent OpenSSL vulnerabilities</li>
<li>It also includes some various other small fixes
***</li>
</ul>

<h2>Interview - Eric Le Blan - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a></h2>

<p>Xinuos&#39; recent FreeBSD integration, BSD in the commercial server space</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nginx" rel="nofollow">Building a hardened, feature-rich webserver</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy, FreeBSD version</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">episode 39</a>, we covered a blog post about creating an OpenBSD gateway - partly based on <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a></li>
<li>This is a follow-up post, by the same author, about doing a similar thing with FreeBSD</li>
<li>He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs</li>
<li>The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" rel="nofollow">Don&#39;t encrypt all the things</a></h3>

<ul>
<li>Another couple of interesting blog posts from <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> about encryption</li>
<li>It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good</li>
<li>After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie</li>
<li>He also talks a bit about some PGP weaknesses and a possible future replacement</li>
<li>He also has another, similar post entitled &quot;<a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" rel="nofollow">in defense of opportunistic encryption</a>&quot;
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=270096" rel="nofollow">New automounter lands in FreeBSD</a></h3>

<ul>
<li>The work on the new automounter has just landed in 11-CURRENT</li>
<li>With help from the FreeBSD Foundation, we&#39;ll have a new &quot;autofs&quot; kernel option</li>
<li>Check the SVN viewer online to read over the man pages if you&#39;re not running -CURRENT</li>
<li>You can also read a bit about it in the <a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" rel="nofollow">recent newsletter</a>
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" rel="nofollow">OpenSSH 6.7 CFT</a></h3>

<ul>
<li>It&#39;s been a little while since the last OpenSSH release, but 6.7 is almost ready</li>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> issued a call for testing for the upcoming version, which includes a fair amount of new features</li>
<li>It includes some old code removal, some new features and some internal reworkings - we&#39;ll cover the full list in detail when it&#39;s released</li>
<li>This version also officially supports being built with LibreSSL now</li>
<li>Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20yIP7VXa" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DeeUjAn6" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s216imwEb0" rel="nofollow">Francis writes in</a></li>
<li><a href="http://slexy.org/view/s2oc8vavWe" rel="nofollow">Frank writes in</a></li>
<li><a href="http://slexy.org/view/s20wL61sSr" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
