APU – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Mon, 01 Nov 2021 01:41:54 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png APU – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Linux Action News 213 https://original.jupiterbroadcasting.net/146592/linux-action-news-213/ Sun, 31 Oct 2021 17:00:00 +0000 https://original.jupiterbroadcasting.net/?p=146592 Show Notes: linuxactionnews.com/213

The post Linux Action News 213 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/213

The post Linux Action News 213 first appeared on Jupiter Broadcasting.

]]>
Snappy New Year! | TechSNAP 247 https://original.jupiterbroadcasting.net/92196/snappy-new-year-techsnap-247/ Thu, 31 Dec 2015 08:09:23 +0000 https://original.jupiterbroadcasting.net/?p=92196 We take a look back at some of the big stories of 2015, at least, as we see it. Plus the round up & more! Thanks to: Get Paid to Write for DigitalOcean Direct Download: HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent RSS […]

The post Snappy New Year! | TechSNAP 247 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

We take a look back at some of the big stories of 2015, at least, as we see it.

Plus the round up & more!

Thanks to:


DigitalOcean


Ting


iXsystems

Direct Download:

HD Video | Mobile Video | MP3 Audio | OGG Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feed | Torrent Feed

Become a supporter on Patreon:

Patreon

— Show Notes: —

Episode 227: Oracle’s EULAgy #oraclefanfic

  • Oracle Chief Security Officer, Mary Ann Davidson, makes a blog post railing against reverse engineering and security research
  • Claims Oracle is pretty good at finding bugs in their own code, and doesn’t need anyone else’s help, and that is violates their EULA
  • The blog post was quickly taken down, but this is the Internet, it doesn’t work like that

Episode 196: Sony’s Hard Lessons

  • Bruce Schneier walks us through what we can learn from the hack of Sony’s corporate network

Episode 217: An Encryptioner’s Conscience

  • A recurring theme: firmware is terrible
  • Replace your router with something that runs a real OS
  • Luckily, more and more routers finally have enough hardware to run a minimal Linux or BSD install
  • Smaller APU and Atom machines can run full OS or appliance software like pfSense

Episode 211: The French Disconnection

  • Episodes recorded live in the studio always have a different feel to them, especially when it happens to be the 4th anniversary of the show
  • The top story in this episode was about how to detect when your network has been breached
  • Some great detail, and discussion of the Target and Sony hacks as examples of what to do, and what not to do

Episode 212: Dormant Docker Disasters

  • The man who broke the music business
  • Detailing the infinalside story of how some of the most popular music albums made it onto the internet before they were even in stores
  • Again, in person episodes are always special

Episode 237: A Rip in NTP

  • Recap of my visit to the OpenZFS

Round Up:

The post Snappy New Year! | TechSNAP 247 first appeared on Jupiter Broadcasting.

]]>
Big Network, SmallWall | BSD Now 97 https://original.jupiterbroadcasting.net/84942/big-network-smallwall-bsd-now-97/ Thu, 09 Jul 2015 10:06:09 +0000 https://original.jupiterbroadcasting.net/?p=84942 Coming up this time on the show, we’ll be chatting with Lee Sharp. He’s recently revived the m0n0wall codebase, now known as SmallWall, and we’ll find out what the future holds for this new addition to the BSD family. As usual, we’ve also got answers to your emails and all this week’s news on BSD […]

The post Big Network, SmallWall | BSD Now 97 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up this time on the show, we’ll be chatting with Lee Sharp. He’s recently revived the m0n0wall codebase, now known as SmallWall, and we’ll find out what the future holds for this new addition to the BSD family. As usual, we’ve also got answers to your emails and all this week’s news on BSD Now – the place to B.. SD.

Thanks to:


DigitalOcean


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

BSDCan and pkgsrcCon videos


OPNsense 15.7 released

  • The OPNsense team has released version 15.7, almost exactly six months after their initial debut
  • In addition to pulling in the latest security fixes from upstream FreeBSD, 15.7 also includes new integration of an intrusion detection system (and new GUI for it) as well as new blacklisting options for the proxy server
  • Taking a note from upstream PF’s playbook, ALTQ traffic shaping support has finally been retired as of this release (it was deprecated from OpenBSD a few years ago, and the code was completely removed just over a year ago)
  • The LibreSSL flavor has been promoted to production-ready, and users can easily migrate over from OpenSSL via the GUI – switching between the two is simple; no commitment needed
  • Various third party ports have also been bumped up to their latest versions to keep things fresh, and there’s the usual round of bug fixes included
  • Shortly afterwards, 15.7.1 was released with a few more small fixes

NetBSD at Open Source Conference 2015 Okinawa

  • If you liked last week’s episode then you’ll probably know what to expect with this one
  • The NetBSD users group of Japan hit another open source conference, this time in Okinawa
  • This time, they had a few interesting NetBSD machines on display that we didn’t get to see in the interview last week
  • We’d love to see something like this in North America or Europe too – anyone up for installing BSD on some interesting devices and showing them off at a Linux con?

OpenBSD BGP and VRFs

  • VRFs, or in OpenBSD rdomains, are a simple, yet powerful (and sometimes confusing) topic”
  • This article aims to explain both BGP and rdomains, using network diagrams, for some network isolation goodness
  • With multiple rdomains, it’s also possible to have two upstream internet connections, but lock different groups of your internal network to just one of them
  • The idea of a “guest network” can greatly benefit from this separation as well, even allowing for the same IP ranges to be used without issues
  • Combining rdomains with the BGP protocol allows for some very selective and precise blocking/passing of traffic between networks, which is also covered in detail here
  • The BSDCan talk on rdomains expands on the subject a bit more if you haven’t seen it, as well as a few related posts

Interview – Lee Sharp – lee@smallwall.org

SmallWall, a continuation of m0n0wall


News Roundup

Solaris adopts more BSD goodies

  • We mentioned a while back that Oracle developers have begun porting a current version of OpenBSD’s PF firewall to their next version, even contributing back patches for SMP and other bug fixes
  • They recently published an article about PF, talking about what’s different about it on their platform compared to others – not especially useful for BSD users, but interesting to read if you like firewalls
  • Darren Moffat, who was part of originally getting an SSH implementation into Solaris, has a second blog post up about their “SunSSH” fork
  • Going forward, their next version is going to offer a completely vanilla OpenSSH option as well, with the plan being to phase out SunSSH after that
  • The article talks a bit about the history of getting SSH into the OS, forking the code and also lists some of the differences between the two
  • In a third blog post, they talk about a new system call they’re borrowing from OpenBSD, getentropy(2), as well as the addition of arc4random to their libc
  • With an up-to-date and SMP-capable PF, ZFS with native encryption, jail-like Zones, unaltered OpenSSH and secure entropy calls… is Solaris becoming better than us?
  • Look forward to the upcoming “Solaris Now” podcast (not really)

EuroBSDCon 2015 talks and tutorials

  • This year’s EuroBSDCon is set to be held in Sweden at the beginning of October, and the preliminary list of accepted presentations has been published
  • The list looks pretty well-balanced between the different BSDs, something Paul would be happy to see if he was still with us
  • It even includes an interesting DragonFly talk and a couple talks from NetBSD developers, in addition to plenty of FreeBSD and OpenBSD of course
  • There are also a few tutorials planned for the event, some you’ve probably seen already and some you haven’t
  • Registration for the event will be opening very soon (likely this week or next)

Using ZFS replication to improve offsite backups

  • If you take backups seriously, you’re probably using ZFS and probably keeping an offsite copy of the data
  • This article covers doing just that, but with a focus on making use of the replication capability
  • It’ll walk you through taking a snapshot of your pool and then replicating it to another remote system, using “zfs send” and SSH – this has the benefit of only transferring the files that have changed since the last time you did it
  • Steps are also taken to allow a regular user to take and manage snapshots, so you don’t need to be root for the SSH transfer
  • Data integrity is a long process – filesystem-level checksums, resistance to hardware failure, ECC memory, multiple copies in different locations… they all play a role in keeping your files secure; don’t skip out on any of them
  • One thing the author didn’t mention in his post: having an offline copy of the data, ideally sealed in a safe place, is also important

Block encryption in OpenBSD

  • We’ve covered ways to do fully-encrypted installations of OpenBSD (and FreeBSD) before, but that requires dedicating a whole drive or partition to the sensitive data
  • This blog post takes you through the process of creating encrypted containers in OpenBSD, à la TrueCrypt – that is, a file-backed virtual device with an encrypted filesystem
  • It goes through creating a file that looks like random data, pointing vnconfig at it, setting up the crypto and finally using it as a fake storage device
  • The encrypted container method offers the advantage of being a bit more portable across installations than other ways

Docker hits FreeBSD ports

  • The inevitable has happened, and an early FreeBSD port of docker is finally here
  • Some details and directions are available to read if you’d like to give it a try, as well as a list of which features work and which don’t
  • There was also some Hacker News discussion on the topic

Microsoft donates to OpenSSH

  • We’ve talked about big businesses using BSD and contributing back before, even mentioning a few other large public donations – now it’s Microsoft’s turn
  • With their recent decision to integrate OpenSSH into an upcoming Windows release, Microsoft has donated a large sum of money to the OpenBSD foundation, making them a gold-level sponsor
  • They’ve also posted some contract work offers on the OpenSSH mailing list, and say that their changes will be upstreamed if appropriate – we’re always glad to see this

Feedback/Questions


  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • We’re always looking for interviews – get in touch if you’re doing anything cool with BSD that you’d like to talk about (or want to suggest someone else)
  • The FreeNAS community recently lost one of their most active members, Marbus90, who has been a big help to them for a long time – rest in peace and thanks for all your work

The post Big Network, SmallWall | BSD Now 97 first appeared on Jupiter Broadcasting.

]]>
PIE in the Sky | BSD Now 85 https://original.jupiterbroadcasting.net/80552/pie-in-the-sky-bsd-now-85/ Thu, 16 Apr 2015 11:18:11 +0000 https://original.jupiterbroadcasting.net/?p=80552 This time on the show, we’ll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He’ll tell us what types of attacks it prevents, and why it’s such a big deal. We’ve also got answers to questions from you in the audience and all this week’s news, on BSD Now – […]

The post PIE in the Sky | BSD Now 85 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This time on the show, we’ll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He’ll tell us what types of attacks it prevents, and why it’s such a big deal. We’ve also got answers to questions from you in the audience and all this week’s news, on BSD Now – the place to B.. SD.

Thanks to:


DigitalOcean


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

Solaris’ networking future is with OpenBSD

  • A curious patch from someone with an Oracle email address was recently sent in to one of the OpenBSD mailing lists
  • It was revealed that future releases of Solaris are going to drop their IPFilter firewall entirely, in favor of a port of the current version of PF
  • For anyone unfamiliar with the history of PF, it was actually made as a replacement for IPFilter in OpenBSD, due to some licensing issues
  • What’s more, Solaris was the original development platform for IPFilter, so the fact that it would be replaced in its own home is pretty interesting
  • This blog post goes through some of the backstory of the two firewalls
  • PF is in a lot of places – other BSDs, Mac OS X and iOS – but there are plenty of other OpenBSD-developed technologies end up ported to other projects too
  • “Many of the world’s largest corporations and government agencies are heavy Solaris users, meaning that even if you’re neither an OpenBSD user or a Solaris user, your kit is likely interacting intensely with both kinds, and with Solaris moving to OpenBSD’s PF for their filtering needs, we will all be benefiting even more from the OpenBSD project’s emphasis on correctness, quality and security”
  • You’re welcome, Oracle

BAFUG discussion videos

  • The Bay Area FreeBSD users group has been uploading some videos from their recent meetings
  • Sean Bruno gave a recap of his experiences at EuroBSDCon last year, including the devsummit and some proposed ideas from it (as well as their current status)
  • Craig Rodrigues also gave a talk about Kyua and the FreeBSD testing framework
  • Lastly, Kip Macy gave a talk titled “network stack changes, user-level FreeBSD”
  • The main two subjects there are some network stack changes, and how to get more people contributing, but there’s also open discussion about a variety of FreeBSD topics
  • If you’re close to the Bay Area in California, be sure to check out their group and attend a meeting sometime

More than just a makefile

  • If you’re not a BSD user just yet, you might be wondering how the various ports and pkgsrc systems compare to the binary way of doing things on Linux
  • This blog entry talks about the ports system in OpenBSD, but a lot of the concepts apply to all the ports systems across the BSDs
  • As it turns out, the ports system really isn’t that different from a binary package manager – they are what’s used to create binary packages, after all
  • The author goes through what makefiles do, customizing which options software is compiled with, patching source code to build and getting those patches back upstream
  • After that, he shows you how to get your new port tested, if you’re interesting in doing some porting yourself, and getting involved with the rest of the community
  • This post is very long and there’s a lot more to it, so check it out (and more discussion on Hacker News)

Securing your home fences

  • Hopefully all our listeners have realized that trusting your network(s) to a consumer router is a bad idea by now
  • We hear from a lot of users who want to set up some kind of BSD-based firewall, but don’t hear back from them after they’ve done it.. until now
  • In this post, someone goes through the process of setting up a home firewall using OPNsense on a PCEngines APU board
  • He notes that you have a lot of options software-wise, including vanilla FreeBSD, OpenBSD or even Linux, but decided to go with OPNsense because of the easy interface and configuration
  • The post covers all the hardware you’ll need, getting the OS installed to a flash drive or SD card and going through the whole process
  • Finally, he goes through setting up the firewall with the graphical interface, applying updates and finishing everything up
  • If you don’t have any experience using a serial console, this guide also has some good info for beginners about those (which also applies to regular FreeBSD)
  • We love super-detailed guides like this, so everyone should write more and send them to us immediately

Interview – Pascal Stumpf – pascal@openbsd.org

Static PIE in OpenBSD


News Roundup

LLVM’s new libFuzzer

  • We’ve discussed fuzzing on the show a number of times, albeit mostly with the American Fuzzy Lop utility
  • It looks like LLVM is going to have their own fuzzing tool too now
  • The Clang and LLVM guys are no strangers to this type of code testing, but decided to “close the loop” and start fuzzing parts of LLVM (including Clang) using LLVM itself
  • With Clang being the default in both FreeBSD and Bitrig, and with the other BSDs considering the switch, this could make for some good bug hunting across all the projects in the future

HardenedBSD upgrades secadm

  • The HardenedBSD guys have released a new version of their secadm tool, with the showcase feature being integriforce support
  • We covered both the secadm tool and integriforce in previous episodes, but the short version is that it’s a way to prevent files from being altered (even as root)
  • Their integriforce feature itself has also gotten a couple improvements: shared objects are now checked too, instead of just binaries, and it uses more caching to speed up the whole process now

RAID5 returns to OpenBSD

  • OpenBSD’s softraid subsystem, somewhat similar to FreeBSD’s GEOM, has had experimental RAID5 support for a while
  • However, it was exactly that – experimental – and required a recompile to enable
  • With some work from recent hackathons, the final piece was added to enable resuming partial array rebuilds
  • Now it’s on by default, and there’s a call for testing being put out, so grab a snapshot and put the code through its paces
  • The bioctl softraid command also now supports DUIDs during pseudo-device detachment, possibly paving the way for the installer to drop the “do you want to enable DUIDs?” question entirely

pkgng 1.5.0 released

  • Going back to what we talked about last week, the final version of pkgng 1.5.0 is out
  • The “provides” and “requires” support is finally in a regular release
  • A new “-r” switch will allow for direct installation to a chroot or alternate root directory
  • Memory usage should be much better now, and some general code speed-ups were added
  • This version also introduces support for Mac OS X, NetBSD and EdgeBSD – it’ll be interesting to see if anything comes of that
  • Many more bugs were fixed, so check the mailing list announcement for the rest (and plenty new bugs were added, according to bapt)

p2k15 hackathon reports

  • There was another OpenBSD hackathon that just finished up in the UK – this time it was mainly for ports work
  • As usual, the developers sent in reports of some of the things they got done at the event
  • Landry Breuil, both an upstream Mozilla developer and an OpenBSD developer, wrote in about the work he did on the Firefox port (specifically WebRTC) and some others, as well as reviewing lots of patches that were ready to commit
  • Stefan Sperling wrote in, detailing his work with wireless chipsets, specifically when the vendor doesn’t provide any hardware documentation, as well as updating some of the games in ports
  • Ken Westerback also sent in a report, but decided to be a rebel and not work on ports at all – he got a lot of GPT-related work done, and also reviewed the RAID5 support we talked about earlier

Feedback/Questions


Mailing List Gold


  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • If you want to come on for an interview, or know someone else who might be interesting to hear from, let us know

The post PIE in the Sky | BSD Now 85 first appeared on Jupiter Broadcasting.

]]>
Common *Sense Approach | BSD Now 72 https://original.jupiterbroadcasting.net/75627/common-sense-approach-bsd-now-72/ Thu, 15 Jan 2015 12:55:22 +0000 https://original.jupiterbroadcasting.net/?p=75627 This week on the show, we’ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We’ll learn some of the backstory and see what they’ve got planned for the future. We’ve also got all this week’s news and answers to all your emails, on BSD Now – the […]

The post Common *Sense Approach | BSD Now 72 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This week on the show, we’ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We’ll learn some of the backstory and see what they’ve got planned for the future. We’ve also got all this week’s news and answers to all your emails, on BSD Now – the place to B.. SD.

Thanks to:


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

Be your own VPN provider with OpenBSD

  • We’ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past – but what if you don’t trust any VPN company?
  • It’s easy for anyone to say “of course we don’t run a modified version of OpenVPN that logs all your traffic… what are you talking about?”
  • The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk
  • With this guide, you’ll be able to cut out the middleman and create your own VPN, using OpenBSD
  • It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN

FreeBSD vs Gentoo comparison

  • People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software
  • This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems
  • The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things
  • If you’re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more

Kernel W^X in OpenBSD

  • W^X, “Write XOR Execute,” is a security feature of OpenBSD with a rather strange-looking name
  • It’s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time
  • This helps prevent some types of buffer overflows: code injected into it won’t execute, but will crash the program (quite obviously the lesser of the two evils)
  • Through some recent work, OpenBSD’s kernel now has no part of the address space without this feature – whereas it was only enabled in the userland previously
  • Doing this incorrectly in the kernel could lead to far worse consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that’s been in the works for a while
  • More technical details can be found in some recent CVS commits

Building an IPFW-based router

  • We’ve covered building routers with PF many times before, but what about IPFW?
  • A certain host of a certain podcast decided it was finally time to replace his disappointing consumer router with something FreeBSD-based
  • In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall
  • He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit
  • If you’re an IPFW fan and are thinking about putting together a new router, give this post a read

Interview – Jos Schellevis – project@opnsense.org / @opnsense

The birth of OPNsense


News Roundup

On profiling HTTP

  • Adrian Chadd, who we’ve had on the show before, has been doing some more ultra-high performance testing
  • Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools
  • According to him, it’s “not very pretty”
  • He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process
  • You can check out his new code on Github right now

Using divert(4) to reduce attacks

  • We talked about using divert(4) with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)
  • It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you’re running
  • PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won’t work
  • The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious
  • Consider setting this up to reduce the attack spam in your logs if you run public services

ChaCha20 patchset for GELI

  • A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the disk encryption system
  • There are also some benchmarks that look pretty good in terms of performance
  • Currently, GELI defaults to AES in XTS mode with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)
  • There’s some discussion going on about whether a stream cipher is suitable or not for disk encryption though, so this might not be a match made in heaven just yet

PCBSD update system enhancements

  • The PCBSD update utility has gotten an update itself, now supporting automatic upgrades
  • You can choose what parts of your system you want to let it automatically handle (packages, security updates)
  • There’s also a new graphical frontend available for it
  • The update system uses ZFS + Boot Environments for safe updating and bypasses some dubious pkgng functionality

Feedback/Questions


Mailing List Gold


  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv
  • Watch live Wednesdays at 2:00PM Eastern (19:00 UTC)

The post Common *Sense Approach | BSD Now 72 first appeared on Jupiter Broadcasting.

]]>
Conference Connoisseur | BSD Now 66 https://original.jupiterbroadcasting.net/73002/conference-connoisseur-bsd-now-66/ Thu, 04 Dec 2014 11:40:12 +0000 https://original.jupiterbroadcasting.net/?p=73002 This week on the show, we’ll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We’ve also got answers to all your emails and the latest news, coming up on BSD Now – the place to B.. […]

The post Conference Connoisseur | BSD Now 66 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This week on the show, we’ll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We’ve also got answers to all your emails and the latest news, coming up on BSD Now – the place to B.. SD.

Thanks to:


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

More BSD presentation videos

  • The MeetBSD video uploading spree continues with a few more talks, maybe this’ll be the last batch
  • Corey Vixie, Web Apps in Embedded BSD
  • Allan Jude, UCL config
  • Kip Macy, iflib
  • While we’re on the topic of conferences, AsiaBSDCon’s CFP was extended by one week
  • This year’s ruBSD will be on December 13th in Moscow
  • Also, the BSDCan call for papers is out, and the event will be in June next year
  • Lastly, according to Rick Miller, “A potential vBSDcon 2015 event is being explored although a decision has yet to be made.”

BSD-powered digital library in Africa

  • You probably haven’t heard much about Nzega, Tanzania, but it’s an East African country without much internet access
  • With physical schoolbooks being a rarity there, a few companies helped out to bring some BSD-powered reading material to a local school
  • They now have a pair of FreeNAS Minis at the center of their local network, with over 80,000 books and accompanying video content stored on them (~5TB of data currently)
  • The school’s workstations also got wiped and reloaded with FreeBSD, and everyone there seems to really enjoy using it

pfSense 2.2 status update

  • With lots of people asking when the 2.2 release will be done, some pfSense developers have provided a status update
  • 2.2 will have a lot of changes: being based on FreeBSD 10.1, Unbound instead of BIND, updating PHP to something recent, including the new(ish) IPSEC stack updates, etc
  • All these things have taken more time than previously expected
  • The post also has some interesting graphs showing the ratio of opened and close bugs for the upcoming release

Recommended hardware threads

  • A few threads on caught our attention this week, all about hardware recommendations for BSD setups
  • In the first one, the OP asks about mini-ITX hardware to run a FreeBSD server and NAS
  • Everyone gave some good recommendations for low power, Atom-based systems
  • The second thread started off asking about which CPU architecture is best for PF on an OpenBSD router, but ended up being another hardware thread
  • For a router, the ALIX, APU and Soekris boards still seem to be the most popular choices, with the third and fourth threads confirming this
  • If you’re thinking about building your first BSD box – server, router, NAS, whatever – these might be some good links to read

Interview – Paul Schenkeveld – freebsd@psconsult.nl

Running a BSD conference


News Roundup

From Linux to FreeBSD – for reals

  • Another Linux user is ready to switch to BSD, and takes to Reddit for some community encouragement (seems to be a common thing now)
  • After being a Linux guy for 20(!) years, he’s ready to switch his systems over, and is looking for some helpful guides to transition
  • In the comments, a lot of new switchers offer some advice and reading material
  • If any of the listeners have some things that were helpful along your switching journey, maybe send ’em this guy’s way

Running FreeBSD as a Xen Dom0

  • Continuing progress has been made to allow FreeBSD to be a host for the Xen hypervisor
  • This wiki article explains how to run the Xen branch of FreeBSD and host virtual machines on it
  • Xen on FreeBSD currently supports PV guests (modified kernels) and HVM (unmodified kernels, uses hardware virtualization features)
  • The wiki provides instructions for running Debian (PV) and FreeBSD (HVM), and discusses the features that are not finished yet

HardenedBSD updates and changes

  • a.out is the old executable format for unix
  • “The name stands for assembler output, and was coined by Ken Thompson as the fixed name for output of his PDP-7 assembler in 1968”
  • FreeBSD, on which HardenedBSD is based, switched away from a.out in FreeBSD 3.0
  • A restriction against NULL mapping was introduced in FreeBSD 7 and enabled by default in FreeBSD 8
  • However, for reasons of compatibility, it could be switched off, allowing buggy applications to continue to run, at the risk of allowing a kernel bug to be exploited
  • HardenedBSD has removed the sysctl, making it impossible to run in ‘insecure mode’
  • Package Building Update: more consistent repo, no more i386 packages

Feedback/Questions


Mailing List Gold


  • All the tutorials are posted in their entirety at bsdnow.tv
  • If you’re in New York’s Capital District, there’s a meeting for the BSD users group on December 9th
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv – if there’s a tutorial you’d like to see, or maybe someone you want us to interview, let us know!
  • Watch live Wednesdays at 2:00PM Eastern (19:00 UTC)
  • Reminder: just like we ask during the interviews, we want to hear how all the viewers and listeners first got into BSD. Email us your story, either written or a video version, and we’ll read and play some of them for the Christmas episode. You’ve got until December 17th to send them in.

The post Conference Connoisseur | BSD Now 66 first appeared on Jupiter Broadcasting.

]]>
A Man’s man(1) | BSD Now 63 https://original.jupiterbroadcasting.net/71412/a-mans-man-bsd-now-63/ Thu, 13 Nov 2014 13:16:48 +0000 https://original.jupiterbroadcasting.net/?p=71412 This time on the show, we’ve got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week’s news, answers to your emails and even some […]

The post A Man's man(1) | BSD Now 63 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

This time on the show, we’ve got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week’s news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now – the place to B.. SD.

Thanks to:


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

Updates to FreeBSD’s random(4)

  • FreeBSD’s random device, which presents itself as “/dev/random” to users, has gotten a fairly major overhaul in -CURRENT
  • The CSPRNG (cryptographically secure pseudo-random number generator) algorithm, Yarrow, now has a new alternative called Fortuna
  • Yarrow is still the default for now, but Fortuna can be used with a kernel option (and will likely be the new default in 11.0-RELEASE)
  • Pluggable modules can now be written to add more sources of entropy
  • These changes are expected to make it in 11.0-RELEASE, but there hasn’t been any mention of MFCing them to 10 or 9

OpenBSD Tor relays and network diversity

  • We’ve talked about getting more BSD-based Tor nodes a few times in previous episodes
  • The “tor-relays” mailing list has had some recent discussion about increasing diversity in the Tor network, specifically by adding more OpenBSD nodes
  • With the security features and attention to detail, it makes for an excellent dedicated Tor box
  • More and more adversaries are attacking Tor nodes, so having something that can withstand that will help the greater network at large
  • A few users are even saying they’ll convert their Linux nodes to OpenBSD to help out
  • Check the archive for the full conversation, and maybe run a node yourself on any of the BSDs
  • The Tor wiki page on OpenBSD is pretty out of date (nine years old!?) and uses the old pf syntax, maybe one of our listeners can modernize it

SSP now default for FreeBSD ports

  • SSP, or Stack Smashing Protection, is an additional layer of protection against buffer overflows that the compiler can give to the binaries it produces
  • It’s now enabled by default in FreeBSD’s ports tree, and the pkgng packages will have it as well – but only for amd64 (all supported releases) and i386 (10.0-RELEASE or newer)
  • This will only apply to regular ports and binary packages, not the quarterly branch that only receives security updates
  • If you were using the temporary “new Xorg” or SSP package repositories instead of the default ones, you need to switch back over
  • NetBSD made this the default on i386 and amd64 two years ago and OpenBSD made this the default on all architectures twelve years ago
  • Next time you rebuild your ports, things should be automatically hardened without any extra steps or configuration needed

Building an OpenBSD firewall and router

  • While we’ve discussed the software and configuration of an OpenBSD router, this Reddit thread focuses more on the hardware side
  • The OP lists some of his potential choices, but was originally looking for something a bit cheaper than a Soekris
  • Most agree that, if it’s for a business especially, it’s worth the extra money to go with something that’s well known in the BSD community
  • They also list a few other popular alternatives: ALIX or the APU series from PC Engines, some Supermicro boards, etc.
  • Through the comments, we also find out that QuakeCon runs OpenBSD on their network
  • Hopefully most of our listeners are running some kind of BSD as their gateway – try it out if you haven’t already

Interview – Kristaps Džonsons – kristaps@openbsd.org

Mandoc, historical man pages, various topics


Tutorial

Throttling bandwidth with PF


News Roundup

NetBSD at Kansai Open Forum 2014

  • Japanese NetBSD users invade yet another conference, demonstrating that they can and will install NetBSD on everything
  • From a Raspberry Pi to SHARP Netwalkers to various luna68k devices, they had it all
  • As always, you can find lots of pictures in the trip report

Getting to know your portmgr lurkers

  • The lovable “getting to know your portmgr” series makes its triumphant return
  • This time around, they interview Alex, one of the portmgr lurkers that joined just this month
  • “How would you describe yourself?” “Too lazy.”
  • Another post includes a short interview with Emanuel, another new lurker
  • We discussed the portmgr lurkers initiative with Steve Wills a while back

NetBSD’s ARM port gets SMP

  • The ARM port of NetBSD now has SMP support, allowing more than one CPU to be used
  • This blog post on the website has a list of supported boards: Banana Pi, Cubieboard 2, Cubietruck, Merrii Hummingbird A31, CUBOX-I and NITROGEN6X
  • NetBSD’s release team is working on getting these changes into the 7 branch before 7.0 is released
  • There are also a few nice pictures in the article

A high performance mid-range NAS

  • This blog post is about FreeNAS and optimizing iSCSI performance
  • It talks about using mid-range hardware with FreeNAS and different tunables you can change to affect performance
  • There are some nice graphs and lots of detail if you’re interested in tweaking some of your own settings
  • They conclude “there is no optimal configuration; rather, FreeNAS can be configured to suit a particular workload”

Feedback/Questions


Mailing List Gold


  • All the tutorials are posted in their entirety at bsdnow.tv
  • The OpenBSD router tutorial now has a new section on bandwidth throttling
  • We’ll also have links on the site to a MeetBSD recap post, definitely worth reading, as well as a review of the new Book of PF
  • Speaking of that, Peter Hansteen’s Book of PF auction raised a total of $3,050 for the OpenBSD foundation
  • As usual, send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv – we do the show for you guys, so let us know if there’s something specific you’d like to see covered (especially new tutorial ideas)
  • Watch live Wednesdays at 2:00PM Eastern (19:00 UTC)

The post A Man's man(1) | BSD Now 63 first appeared on Jupiter Broadcasting.

]]>
The Promised WLAN | BSD Now 55 https://original.jupiterbroadcasting.net/67012/the-promised-wlan-bsd-now-55/ Thu, 18 Sep 2014 10:26:43 +0000 https://original.jupiterbroadcasting.net/?p=67012 Coming up this week, we’ll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we’ve got the latest news and answers to all your emails, on BSD Now – the place to B.. SD. Thanks to: Direct Download: Video | […]

The post The Promised WLAN | BSD Now 55 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Coming up this week, we’ll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we’ve got the latest news and answers to all your emails, on BSD Now – the place to B.. SD.

Thanks to:


iXsystems


Tarsnap

Direct Download:

Video | HD Video | MP3 Audio | OGG Audio | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | HD Vid Feed | HD Torrent Feed

– Show Notes: –

Headlines

FreeBSD 10.1-BETA1 is out

  • The first maintenance update in the 10.x series of FreeBSD is on its way
  • Since we can’t see a changelog yet, the 10-STABLE release notes offer a glimpse at some of the new features and fixes that will be included in 10.1
  • The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11
  • Initial UEFI support, multithreaded softupdates for UFS and many more things were added
  • You can check the release schedule for the planned release dates
  • Details for the various forms of release media can be found in the announcement

Remote headless OpenBSD installation

  • A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes
  • Sometimes you’ll get lucky and they’ll offer FreeBSD, but it’s much harder to find ones that natively support other BSDs
  • This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely
  • It required a few specific steps you’ll want to take note of, but is extremely useful for those pesky hosting providers

Building a firewall appliance with pfSense

  • In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate ALIX2C3 APU
  • After the author’s modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board
  • The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)
  • There’s a lot of great pictures of the hardware and detailed screenshots, definitely worth a look

Receive Side Scaling – UDP testing

  • Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress
  • He’s using some quad core boxes with 10 gigabit ethernet for the tests
  • The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do
  • He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)
  • And speaking of Adrian Chadd…

Interview – Adrian Chadd – adrian@freebsd.org / @erikarn

BSD on laptops, wifi, drivers, various topics


News Roundup

Sendmail removed from OpenBSD

  • Mail server admins around the world are rejoicing, because sendmail is finally gone from OpenBSD
  • With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded
  • If you’ve ever compared a “sendmail.cf” file to an “smtpd.conf” file… the different is as clear as night and day
  • 5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it
  • If you still need it for some reason, sendmail will live in ports from now on
  • Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly’s mail transfer agent in base (instead of an entire mail server)

pfSense backups with pfmb

  • We’ve mentioned the need for a tool to back up pfSense configs a number of times on the show
  • This script, hosted on github, does pretty much exactly that
  • It can connect to one (or more!) pfSense installations and back up the configuration
  • You can roll back or replace failed hardware very easily with its restore function
  • Everything is done over SSH, so it should be pretty secure

The Design and Implementation of the FreeBSD Operating System

  • We mentioned when the pre orders were up, but now “The Design and Implementation of the FreeBSD Operating System, 2nd edition” seems to be shipping out
  • If you’re interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy
  • We’ve even had all three authors on the show before!

OpenBSD’s systemd replacement updates

  • We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention
  • One of the developers writes in to Undeadly, detailing what’s going on and what the overall status is
  • He also clears up any confusion about “porting systemd to BSD” (that’s not what’s going on) or his code ever ending up in base (it won’t)
  • The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux… poor guy

Feedback/Questions


  • All the tutorials are posted in their entirety at bsdnow.tv
  • Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv – we’d love to hear from you!
  • Last week we mentioned that Ken was looking for help to port Lumina to other BSDs, and now it’s been done for OpenBSD and DragonFly – so now you can try it out there too
  • Antoine Jacoutot sent a screenshot of Lumina on OpenBSD
  • We’ll be at EuroBSDCon soon, so there will be a prerecorded episode next week
  • When we’re not in Europe, you can usually watch live Wednesdays at 2:00PM Eastern (18:00 UTC)

The post The Promised WLAN | BSD Now 55 first appeared on Jupiter Broadcasting.

]]>
Battery Malware | TechSNAP 16 https://original.jupiterbroadcasting.net/10763/battery-malware-techsnap-16/ Thu, 28 Jul 2011 22:52:47 +0000 https://original.jupiterbroadcasting.net/?p=10763 Attackers take aim at Apple with an exploit that could brick your Macbook, or perhaps worse. Plus you need to patch against a 9 year old SSL flaw.

The post Battery Malware | TechSNAP 16 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Attackers take aim at Apple with an exploit that could brick your Macbook, or perhaps worse. Plus you need to patch against a 9 year old SSL flaw.

Plus find out about a Google bug that could wipe a site from their Index, and a excellent batch of your feedback!

All that and more, on this week’s TechSNAP!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | OGG Audio | YouTube

Subscribe via RSS and iTunes:

[ad#shownotes]

Show Notes:

iPhones vulnerable to 9 year old SSL sniffing attack

  • A nine year old bug discovered and disclosed by Moxie Marlinspike in 2002 allows attackers to decrypt intercepted SSL sessions. Moxie Marlinspike released a newer, easier to use version of the tool on monday, to coincide with Apple finally patching the flaw on iPhone and other iOS devices.
  • Any unpatched iOS device can have all of it’s SSL traffic trivially intercepted and decrypted
  • This means anyone with this new easy to use tool sitting near a wifi hotspot, can intercept encrypted login information (gmail, facebook), banking credentials, e-commerce transactions, or anything else people do from their phone.
  • The bug was in the way iOS interpreted the certificate chain. Apple failed to respect the ‘basicConstraint’ parameter, allowing an attacker to sign a certificate for any domain with an existing valid certificate, a condition normally prevented by the constraint.
  • There are no known flaws in SSL it self, in this case, the attacker could perform a man-in-the-middle attack, by feeding the improperly signed certificate to the iPhone which would have accepted it, and used the attackers key to encrypt the data.
  • Patch is out with a support doc and direct download links

Apple Notebook batteries vulnerable to firmware hack

  • After analyzing a battery firmware update that Apple pushed in 2009, researchers found that all patched batteries, and all batteries manufactured since, use the same password
  • With this password, it is possible to control the firmware on the battery
  • This means that an attacker can remotely brick your Macbook, or cause the battery to overheat and possibly even explode
  • The attacker can also falsify the data returned to the OS from the battery, causing odd system behaviour
  • The attacker could also completely replace the Apple firmware, with one designed to silently infect the machine with malware. Even if the malware is removed, the battery would be able to reinfect the machine, even after a complete OS wipe and reinstall.
  • Further research will be presented at this years Black Hat Security Conference
  • In the meantime, researchers have notified Apple of the vulnerability, and have created a utility that generates a completely random password for your Mac’s battery.
    Additional Link

Facebook fixes glitch that let you see private video information

  • A glitch in facebook allowed you to see the thumbnail preview and description of private videos posted by other users, even when they were not shared with you.
  • It was not possible to view the actual videos

Google was quick to shutdown Webmaster Tools after vulnerability found

  • Using the google webmaster tools, users were able to remove websites that did not belong to them from the Google Index
  • By simply modifying the query string of a valid request to remove your own site from the google index, and changing one of the two references to the target url, you were able to remove an arbitrary site from the google index
  • The issue was resolved within 7 hours of being reported to Google
  • Google restored sites that were improperly removed from its index.

Researchers find vulnerablity in Skype

  • Inproper input validation and output sanitation allowed attackers to inject code into their skype profile
  • By entering html and java script in to the ‘mobile phone’ section of your profile, anyone who had you on their friends list would execute the injected code.
  • This vulnerability could have allowed attackers to high your session, steal your account, capture your payment data, and change your password

Feedback


Q: (Sargoreth) I downloaded eclipse, and I didn’t bother to verify the md5 hash they publish on the download page, how big a security risk is this?
A: Downloadable software often has an MD5 hash published along with the downloadable file, as a measure to allow you to ensure that the file you downloaded is valid. Checking the downloaded file against this hash can ensure that the file was not corrupted during transfer. However it is not a strong enough indicator that the file has not been tampered with. If the file was modified, the MD5 hash could just as easily have been updated along with it. In order to be sure that the file has not been tampered with, you need a hash that is provided out of band, from a trusted source (The FreeBSD Ports tree comes with the SHA256 hashs of all files, which are then verified once they are downloaded). SHA256 is much more secure, as MD5 has been defeated a number of times, with attackers able to craft two files with matching hashes. SHA-1 is no longer considered secure enough for cryptographic purposes. It should also be noted that SHA-512 is actually faster to calculate than SHA256 on 64bit hardware, however it is not as widely supported yet. The ultimate solution for ensuring the integrity of downloadable files is a GPG signature, verified against a trusted public key. Many package managers (such as yum) take this approach, and some websites offer a .asc file for verification. A number of projects have stopped publishing the GPG signatures because the proportion of users who checked the signature was too low to justify the additional effort. Some open source projects have had backdoors injected in to their downloadable archives on official mirrors, such as the UnrealIRCd project.


Q: (Christoper) I have a windows 7 laptop, and a Ubuntu desktop, what would be a cheap and easy way to share files between them?
A: The easiest and most secure way, is to enable SSH on the ubuntu machine, and then use an SFTP client like FileZilla (For Windows, Mac and Linux), and then just login to your ubuntu machine using your ubuntu username/password. Alternatively, If you have shared a folder on your windows machine, you should be be able to browse to it from the Nautilus file browser in Ubuntu. Optionally, you can also install Samba, to allow your Ubuntu machine to share files with windows, it will appear as if it were another windows machine in your windows ‘network neighbourhood’.


Q: (Chad) I have a network of CentOS servers, and a central NFS/NIS server, however we are considering adding a FreeNAS box to provide ZFS. I need to be able to provide consistent centralized permissions control on this new file system. I don’t want to have to manually recreate the users on the FreeNAS box. Should I switch to LDAP?
A: FreeNAS is based on FreeBSD, so it has a native NIS client you can use (ypbind) to connect to your existing NIS system. This would allow the same users/groups to exist across your heterogeneous network. You may need to modify the /etc/nsswitch.conf file to configure the order local files and NIS are checked in, and set your NIS domain in /etc/rc.conf. Optionally, you could use LDAP, again, adding some additional parameters to nsswitch.conf and configuring LDAP. If you decide to use LDAP, I would recommend switching your CentOS machines to using LDAP as well, allowing you to again maintain a single system for both Linux and BSD, instead of maintaining separate account databases. If you are worried about performance, you might consider setting the BSD machine up as an NIS slave, so that it maintains a local copy of the NIS database. The FreeBSD NIS server is called ypserv. You can find out more about configuring NIS on FreeBSD here


Bitcoin Blaster

Roundup

The post Battery Malware | TechSNAP 16 first appeared on Jupiter Broadcasting.

]]>