There are two choices of Java Development Kits on FreeBSD:
OpenJDK
The &openjdk; project provides a native open-source
implementation of the &java; SE Platform and is available in
versions 7 and 8 for all supported FreeBSD releases on the i386
and amd64 platforms.
&openjdk; 7 is frequently updated, and it is suggested to refer to a
revision log for
detailed release history. Additionally, one may choose to review more information at
- FreshPorts.
To install &openjdk; 7 package use the pkg(8) utility:
pkg install openjdk
or
cd /usr/ports/java/openjdk7
make install clean
&openjdk; 8 is frequently updated, and it is suggested to refer to a
revision log for
detailed release history. Additionally, one may choose to review more information at
FreshPorts.
To install &openjdk; 8 package use the pkg(8) utility:
pkg install openjdk8
or
cd /usr/ports/java/openjdk8
make install clean
Oracle JDK for Linux
This port installs the Java Development Kit from Oracle which was built for Linux. It will run under FreeBSD using the Linux compatibility.
cd /usr/ports/java/linux-oracle-jdk18
make install clean
Note: Please note that due to the current licensing policy the
Oracle JDK on FreeBSD binaries can not be distributed and you are only
permitted to use them personally. For the same reason, the sources
must be fetched manually.
Legacy Native JDK
The FreeBSD Foundation is no longer providing supported &java; &jdk; and
&jre; packages based on Sun's partner sources. Older packages for &java;
&jdk; and &jre; 5.0 and 6.0 are no longer available.
The best thing you can do is download the latest release, install it, and try all your favorite Java applications. If they don't work, see below.
... reporting a bug
If you find an application that does not work, or crashes, here are the steps you should follow before reporting it:
Try it again.
Check your settings for this application. Check to see if you made a mistake in starting it up.
Try it on a different platform. If you have access to a reference platform, try it there. (We need to determine if it is an application error, a Java bug, or a FreeBSD specific bug.)
Narrow down the problem. If it is your own code, narrow down the bug to the offending code. Otherwise, determine the steps required to reproduce the problem.
Notify the JDK porting team. Send email to freebsd-java@FreeBSD.org. Be sure to include the steps you have followed.
Finally, and most importantly, be willing to work with the team to fix the problem.
...writing documentation
Everyone can help here. If you have a suggestion to add to the documentation, write it up and send it to freebsd-java@FreeBSD.org
Index: head/en_US.ISO8859-1/htdocs/multimedia/multimedia-input.xml
===================================================================
--- head/en_US.ISO8859-1/htdocs/multimedia/multimedia-input.xml (revision 52075)
+++ head/en_US.ISO8859-1/htdocs/multimedia/multimedia-input.xml (revision 52076)
@@ -1,15692 +1,15692 @@
Queue Portrait: Robert Watsonhttps://queue.acm.org/detail_video.cfm?id=2382552
George Neville-Neil, Queue's Kode Vicious, interviews
Robert Watson to learn about Capsicum and other
exciting research projects at Cambridge.
2012interviewresearchRobert WatsonGeorge Neville-NeilBSDCan-2012 Photos - Fridayhttp://www.db.net/gallery/BSDCan/BSDCan_2012_day_1/
Photos taken during the Conference on Friday at BSDCan 2012 in Ottawa
by Diane Bruce.
2012bsdcanbsdcan2012photosdiane bruceBSDCan-2012 Photos - Saturdayhttp://www.db.net/gallery/BSDCan/BSDCan_2012_day_2/
Photos taken during both the DevSummit and Conference on Saturday at
BSDCan 2012 in Ottawa by Diane Bruce.
2012bsdcanbsdcan2012photosdiane bruceBSDCan-2012 Photos - Saturdayhttps://plus.google.com/photos/117117406211143183805/albums/5742469737904181073?banner=pwa&authkey=COK7-ca5-N--TQ
Photos taken during both the DevSummit and Conference on Saturday at
BSDCan 2012 in Ottawa by Benedict Reuschling.
2012bsdcanbsdcan2012photosbenedict reuschlingBSDCan-2012 - Michael Dexter - An applied survey of BSD multiplicity
and virtualization strategies from chroot to BHyVe
Ever since the University of California, Berkeley CSRG
implemented the chroot(8) command and system call in its
BSD operating system in 1982, the community-developed
BSD Unix derivatives have set the standard for
the introduction of plurality to the conventionally-singular
Unix computing model. Today's system operators and developers
have an array of BSD-licensed multiplicity strategies at their
disposal that offer various degrees of both isolation and
virtualization when introducing plurality. This paper will
survey current and experimental BSD multiplicity strategies
including chroot, FreeBSD jail, NetBSD/Xen, Amazon EC2,
compatlinux, GXemul and SIMH, plus experimental strategies
such as FreeBSD BHyVe, compatmach, Usermode NetBSD,
Dragonfly BSD vkernel, OpenBSD sysjail and NetBSD mult.
As an applied survey, this paper will both categorize each
multiplicity strategy by the Unix environment to which
it introduces plurality and demonstrate the usage
of the utilities relating to each solution.
http://www.bsdcan.org/2012/schedule/events/291.en.html2012bsdcanbsdcan2012papersmichael dexterhttp://www.bsdcan.org/2011/schedule/events/291en.htmlhtmlhtmlBSDCan-2012 - Kirk McKusick - An Overview of Locking in the FreeBSD
Kernel
The FreeBSD kernel uses seven different types of locks
to ensure proper access to the resources that it manages.
This talk describes the hierarchy of these locks from
the low-level and simple to the high-level and full-featured.
The functionality of each type of lock is described along
with the problem domain for which it is intended.
The talk concludes by describing the witness system
within the FreeBSD kernel that tracks the usage of all
the locks in the system and reports any possible deadlocks
that might occur because of improper acquisition ordering
of locks.
http://www.bsdcan.org/2012/schedule/events/306.en.html2012bsdcanbsdcan2012paperskirk mckusickhttp://www.bsdcan.org/2012/schedule/attachments/195_locking.pdf27 KbSlidespdfBSDCan-2012 - Pawel Jakub Dawidek - auditdistd - Secure and reliable distribution of audit trail files
Security Event Audit is a facility to provide fine-grained,
configurable logging of security-relevant events.
Audit events are stored in trail files that can be used
for postmortem analysis in case of system compromise.
Once the system is compromised, an attacker has access
to audit trail files and can modify or delete them.
The auditdistd daemon's role is to distribute audit
trail files to a remote system in a secure and reliable way.
http://www.bsdcan.org/2012/schedule/events/335.en.html2012bsdcanbsdcan2012paperspawel jakub dawidekhttp://www.bsdcan.org/2012/schedule/attachments/217_Auditdistd%20slidesPDF=265.6 Kb50 pagespdfBSDCan-2012 - Ivan Voras - Bullet Cache - Balancing speed and usability in a cache server
Bullet Cache is an in-memory cache server inspired by
memcached, but with a twist: a powerful record tagging
and bulk query facility, configurable multithreading
models and a dump / cache prewarm option. This talk
will have two parts: a technical description of
Bullet Cache's implementation with focus on programming
techniques and optimizations, and a description of usage
scenarios with the focus on how it can help real-world
applications (not limited to Web applications).
http://www.bsdcan.org/2012/schedule/events/339.en.html2012bsdcanbsdcan2012papersivan vorashttp://www.bsdcan.org/2012/schedule/attachments/198_BSDCan2012.pdfPDF=661.3 Kb40 pagespdfBSDCan-2012 - Benedict Reuschling - Google Code-In and FreeBSD
A summary of FreeBSD's participation in the 2011 contest.
http://www.bsdcan.org/2012/schedule/events/354.en.html2012bsdcanbsdcan2012papersbenedict reuschlinghttp://www.bsdcan.org/2012/schedule/attachments/213_FreeBSDGCIN2011Summary.pdfPDF=82 Kb16 pagespdfBSDCan-2012 Photos - Developers summit and conferencehttp://gallery.keltia.net/v/voyages/conferences/bsdcan-2012/devsummit/
Photos taken during both the DevSummit and Conference on Saturday at
BSDCan 2012 in Ottawa by Ollivier Robert.
2012bsdcanbsdcan2012photosollivier robertBSDCan-2011 - Brooks Davis - Improving System Management with ZFS
The Zetabyte File System (ZFS) is a modern file system
which combines traditional file system features like a
POSIX file system interface with RAID and volume management
functionality. Features such as snapshot management and file
share management are all managed within the ZFS interface.
This management interface provides a number of
opportunities to simplify system management. In the
Technical Computing Services Sub-division of The
Aerospace Corporation we are taking advantage of these
features in a number of different ways. This talk
presents some of the more interesting ones.
http://www.bsdcan.org/2011/schedule/events/233.en.html2011bsdcanbsdcan2011papersbrooks davishttp://www.bsdcan.org/2011/schedule/attachments/149_abstract.pdfPDF=40.4 Kb2 pagespdfBSDCan-2011 Photos - Saturday
Photos taken during the Conference on Saturday at
BSDCan 2011 in Ottawa by Diane Bruce.
http://www.db.net/gallery/BSDCan/BSDCan_2011_day_2/2011bsdcanbsdcan2011photosdiane bruceBSDCan-2011 Photos - Friday
Photos taken during the Conference on Friday at
BSDCan 2011 in Ottawa by Diane Bruce.
http://www.db.net/gallery/BSDCan/BSDCan_2011_day_1/2011bsdcanbsdcan2011photosdiane bruceBSDCan-2010 Photos - Saturday
Photos taken during the Conference on Saturday at
BSDCan 2010 in Ottawa by Diane Bruce.
http://www.db.net/gallery/BSDCan/BSDCan_2010_day_2/2010bsdcanbsdcan2010photosdiane bruceBSDCan-2010 Photos - Friday
Photos taken during the Conference on Friday at
BSDCan 2010 in Ottawa by Diane Bruce.
http://www.db.net/gallery/BSDCan/BSDCan_2010_day_1/2010bsdcanbsdcan2010photosdiane bruceBSDCan-2010 - Kris Moore - The PBI format re-implemented for
FreeBSD and PC-BSD
The PBI format (Push Button Installer) has been the default
package management system for PC-BSD going on 5+ years now.
However as we looked to the future it became apparent that it
was greatly needing an overhaul to both improve its
functionality, and expand its usage outside the scope of
just PC-BSD. Among the areas needing improvement were how
it dealt with identical libraries between applications,
the heavy requirements from being implemented in QT/KDE,
and lack of a digital verification mechanism.
http://www.bsdcan.org/2011/schedule/events/215.en.html2010bsdcanbsdcan2010paperskris moorehttp://www.bsdcan.org/2011/schedule/events/215.en.htmlhtmlhtmlA Few FreeBSD Core Team Members
Interview with a few of the FreeBSD Core Team members
at BSDCan 2009: Robert Watson, Brooks Davis, Hiroki
Sato, Philip Paeps, and George V. Neville-Neil. We
talk about the recent 7.2 release, and what is
coming for 8.
http://bsdtalk.blogspot.com/2009/05/bsdtalk173-few-freebsd-core-team.htmlbsdtalkinterviewbsdcanfreebsd core teamrobert watsonbrooks davishiroki satophilip paepsgeorge neville-neilhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk173.mp318 Mb38 minutesMP3 versionmp3bsdtalk173.ogg38 minutesOgg versionoggBSDCan 2009 with Dan Langille
Interview with Dan Langille. We talk about BSDCan
2009. More information at http://www.bsdcan.org.
http://bsdtalk.blogspot.com/2009/04/bsdtalk172-bsdcan-2009-with-dan.htmlbsdtalkinterviewbsdcandan langillehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk172.mp36 Mb13 minutesMP3 versionmp3bsdtalk172.ogg13 minutesOgg versionoggAndrew Doran from the NetBSD Project
Interview with Andrew Doran from the NetBSD Project.
We talk about the upcoming 5.0 release.
http://bsdtalk.blogspot.com/2009/03/bsdtalk171-andrew-doran-from-netbsd.htmlbsdtalkinterviewnetbsdandrew doranhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk171.mp310 Mb22 minutesMP3 versionmp3bsdtalk171.ogg22 minutesOgg versionoggMarshall Kirk McKusick at DCBSDCon
A recording of Marshall Kirk McKusick's talk "A
Narrative History of BSD" at DCBSDCon this past
weekend.
You can get a much more complete history here:
http://www.mckusick.com/history/index.html
http://bsdtalk.blogspot.com/2009/02/bsdtalk170-marshall-kirk-mckusick-at.htmlbsdtalkpresentationbsdhistorykirk mckusickhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk170.mp326 Mb55 minutesMP3 versionmp3bsdtalk170.ogg55 minutesOgg versionoggJustin Sherrill of the DragonFlyBSD Digest
Interview with Justin Sherrill of the DragonFlyBSD
Digest, which can be found at
http://www.shiningsilence.com/dbsdlog/
http://bsdtalk.blogspot.com/2009/01/bsdtalk169-justin-sherrill-of.htmlbsdtalkinterviewdragonflybsdjustin sherrilhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk169.mp310 Mb22 minutesMP3 versionmp3bsdtalk169.ogg22 minutesOgg versionoggMichael Lauth from iXsystems
Interview with Michael Lauth, CEO of iXsystems. We
talk about his experiences with running a business
using BSD.
http://bsdtalk.blogspot.com/2008/12/bsdtalk168-michael-lauth-from-ixsystems.htmlbsdtalkinterviewixsystemsmichael lauthhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk168.mp38 Mb17 minutesMP3 versionmp3bsdtalk168.ogg17 minutesOgg versionoggDCBSDCon with Jason Dixon
I speak with Jason Dixon about DCBSDCon, which will
take place in February 2009. For more info see
www.dcbsdcon.org
http://bsdtalk.blogspot.com/2008/12/bsdtalk167-dcbsdcon-with-jason-dixon.htmlbsdtalkinterviewdcbsdcondcbsdcon2009jason dixonhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk167.mp35 Mb10 minutesMP3 versionmp3bsdtalk167.ogg10 minutesOgg versionoggAsterisk Open Source Community Director John Todd
An interview with Asterisk Open Source Community
Director John Todd, who also happens to be a user
of BSD. We talk about Asterisk on BSD, and his
choice of OpenBSD for his systems.
http://bsdtalk.blogspot.com/2008/11/bsdtalk166-asterisk-open-source.htmlbsdtalkinterviewjohn toddasteriskopenbsdhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk166.mp311 Mb23 minutesMP3 versionmp3bsdtalk166.ogg23 minutesOgg versionoggJulian Elischer
An interview with Julian Elischer at MeetBSD in
California. We talk about his early days with BSD
and his work using BSD at various companies. He is
currently with IronPort, which was bought by Cisco.
http://bsdtalk.blogspot.com/2008/11/bsdtalk165-julian-elischer.htmlbsdtalkinterviewjulian elischerironporthttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk165.mp316 Mb35 minutesMP3 versionmp3bsdtalk165.ogg16 minutesOgg versionoggAt MeetBSD with some of the FreeBSD Core Team
A conversation with some of the FreeBSD Core Team
at MeetBSD California 2008. I speak with Brooks
Davis, Kris Kennaway, Robert Watson, Peter Wemm,
and Philip Paeps about the recent core team election,
FreeBSD 7.1 and 8, Developer Summits, and the move
to Subversion.
http://bsdtalk.blogspot.com/2008/11/bsdtalk164-at-meetbsd-with-some-of.htmlbsdtalkinterviewfreebsd core teammeetbsd2008meetbsdrobert watsonbrooks daviskris kennawaypeter wemmphilip paepsfreebsdsubversionhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk164.mp318 Mb38 minutesMP3 versionmp3bsdtalk164.ogg38 minutesOgg versionoggA Tour of iXsystems
A brief description of my visit to iXsystems in
California prior to MeetBSD 2008.
http://bsdtalk.blogspot.com/2008/11/bsdtalk163-tour-of-ixsystems.htmlbsdtalkinterviewixsystemshttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk163.mp34 Mb8 minutesMP3 versionmp3bsdtalk163.ogg8 minutesOgg versionoggBSD on a eeePC 900A
I look forward to attending MeetBSD this weekend.
A brief description of my first attempts to get BSD
on a eeePC 900A. I try OpenBSD 4.4, DragonFlyBSD
2.0.1, PC-BSD 7.0.1, and FreeBSD 7.
http://bsdtalk.blogspot.com/2008/11/bsdtalk162-bsd-on-eeepc-900a.htmlbsdtalkeeepchttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk162.mp35 Mb10 minutesMP3 versionmp3bsdtalk162.ogg10 minutesOgg versionoggLive from NYCBSDCon Sunday
A copy of Sunday's live stream from NYCBSDCon
2008.
http://bsdtalk.blogspot.com/2008/10/bsdtalk161-live-from-nycbsdcon-sunday.htmlbsdtalknycbsdcon2008nycbsdconinterviewhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk161.mp312 Mb25 minutesMP3 versionmp3bsdtalk161.ogg25 minutesOgg versionoggLive from NYCBSDCon Saturday
A copy of Saturday's live stream from NYCBSDCon
2008. I wander around during lunch talking to random
people. Voices include Jason Dixon, Pawel Jakub
Dawidek, Kris Moore, Matt Olander, George Neville-Neil,
Phillip Coblentz, and Jason Wright.
http://bsdtalk.blogspot.com/2008/10/bsdtalk160-live-from-nycbsdcon-saturday.htmlbsdtalknycbsdcon2008nycbsdconinterviewjason dixonpawel jakub dawidekkris morematt olandergeorge neville-neilphillip coblentzjason wrighthttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk160.mp318 Mb40 minutesMP3 versionmp3bsdtalk160.ogg40 minutesOgg versionoggKris Moore
Interview with Kris Moore. We talk about the recent
release of PC-BSD 7.0.
http://bsdtalk.blogspot.com/2008/10/bsdtalk159-kris-moore.htmlbsdtalkinterviewkris morepc-bsdhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk159.mp36 Mb12 minutesMP3 versionmp3bsdtalk159.ogg12 minutesOgg versionoggInterview with Chess Griffin
Interview with Chess Griffin, host of the LinuxReality
podcast. We talk about his use of Linux and recent
exploration into the BSDs.
http://bsdtalk.blogspot.com/2008/09/bsdtalk158-interview-with-chess-griffin.htmlbsdtalkinterviewchess griffinhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk158.mp311 Mb24 minutesMP3 versionmp3bsdtalk158.ogg24 minutesOgg versionoggQuestions for you
Things have been very busy at the beginning of the school year, so I'm sorry that I haven't been producing as many shows as usual.
Registration is open for NYCBSDCon and the list of speakers is available. Are you going?
I plan on streaming live during the conference. Do you have any suggestions for live streaming software that is known to work well on the BSDs? Are there any live CDs like Dyne:bolic?
I've come into possession of a Soekris 5501. What are your suggestions for soekris-friendly projects to test?
http://bsdtalk.blogspot.com/2008/09/bsdtalk157-questions-for-you.htmlbsdtalkhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk157.mp33 Mb6 minutesMP3 versionmp3bsdtalk157.ogg6 minutesOgg versionoggNYCBSDCon Update with Isaac Levy and Steven Kreuzer
An update on NYCBSDCon 2008 with Isaac Levy and
Steven Kreuzer. More information on the conference
can be found at http://www.nycbsdcon.org/
http://bsdtalk.blogspot.com/2008/08/bsdtalk156-nycbsdcon-update-with-isaac.htmlbsdtalkinterviewnycbugnycbsdconnycbsdcon2008isaac levysteven kreuzerhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk156.mp37 Mb15 minutesMP3 versionmp3bsdtalk156.ogg15 minutesOgg versionoggMartin Tournoij from DaemonForums.org
A brief interview with Martin Tournoij, one of the
founders of DaemonForums.org.
http://bsdtalk.blogspot.com/2008/07/bsdtalk-155-martin-tournoij-from.htmlbsdtalkinterviewdaemonforumsmartin tournoijhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk155.mp33 Mb7 minutesMP3 versionmp3bsdtalk155.ogg7 minutesOgg versionoggMatthew Dillon
An interview with Matthew Dillon. He gives a fairly
technical description of the HAMMER filesystem
features that will make it in the DragonflyBSD 2.0
release.
http://bsdtalk.blogspot.com/2008/07/bsdtalk154-matthew-dillon.htmlbsdtalkinterviewhammermatthew dillonhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk154.mp314 Mb30 minutesMP3 versionmp3bsdtalk154.ogg30 minutesOgg versionoggMichael W. Lucas
Interview with Michael W. Lucas at BSDCan 2008. We
talk about some of his books and strategies for
writing technical publications.
http://bsdtalk.blogspot.com/2008/06/bsdtalk153-michael-w-lucas.htmlbsdtalkinterviewbsdcan2008michael lucashttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk153.mp36 Mb12 minutesMP3 versionmp3bsdtalk153.ogg12 minutesOgg versionoggA Few FreeBSD Core Team Members
An interview with a few of the FreeBSD Core Team
members: Warner Losh, George V. Neville-Neil, Murray
Stokeley, Hiroki Sato, Robert Watson, Brooks Davis,
and Philip Paeps. The interview was recorded at
BSDCan2008 in Ottawa, Cananda.
http://bsdtalk.blogspot.com/2008/06/bsdtalk152-few-freebsd-core-team.htmlbsdtalkinterviewbsdcan2008freebsd corewarner loshgeorge neville-neil murray stokelyhiroki satorobert watsonbrooks davisphilip paepshttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk152.mp312 Mb26 minutesMP3 versionmp3bsdtalk152.ogg26 minutesOgg versionoggSean Cody from Frantic Films VFX
Interview with Sean Cody at BSDCan2008. We talk
about his use of BSD at a visual effects studio.
http://bsdtalk.blogspot.com/2008/05/bsdtalk151-sean-cody-from-frantic-films.htmlbsdtalkinterviewbsdcan2008frantic filmssean codyhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk151.mp36 Mb13 minutesMP3 versionmp3bsdtalk151.ogg13 minutesOgg versionoggAlex Feldman from Sangoma
Interview at BSDCan2008 with Alex Feldman from Sangoma.
http://bsdtalk.blogspot.com/2008/05/bsdtalk150-alex-feldman-from-sangoma.htmlbsdtalkinterviewsangomaalex feldmanhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk150.mp34 Mb9 minutesMP3 versionmp3bsdtalk150.ogg9 minutesOgg versionoggJustin Gibbs from the FreeBSD Foundation
Interview with Justin Gibbs from the FreeBSD Foundation.
http://bsdtalk.blogspot.com/2008/05/bsdtalk149-justin-gibbs-from-freebsd.htmlbsdtalkinterviewfreebsd foundationjustin gibbshttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk149.mp35 Mb11 minutesMP3 versionmp3bsdtalk149.ogg11 minutesOgg versionoggJeremy White, Founder of CodeWeavers
Interview with Jeremy White, Founder of CodeWeavers.
We talk about the recent availability of an
experimental build of Crossover Games for BSD.
http://bsdtalk.blogspot.com/2008/05/bsdtalk148-jeremy-white-founder-of.htmlbsdtalkinterviewfreebsdcodeweaverscrossoverjeremy whitehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk148.mp37 Mb16 minutesMP3 versionmp3bsdtalk148.ogg16 minutesOgg versionoggFreeBSD Developer Alexander Motin
Interview with FreeBSD Developer Alexander Motin.
We talk about mpd, the netgraph based Multi-link
PPP Daemon. For more information, see
http://mpd.sourceforge.net/.
http://bsdtalk.blogspot.com/2008/04/bsdtalk147-freebsd-developer-alexander.htmlbsdtalkinterviewfreebsdmpdalexander motinhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk147.mp38 Mb16 minutesMP3 versionmp3bsdtalk147.ogg16 minutesOgg versionoggJames Cornell
Another interview with Sysadmin James Cornell. We
talk about BSD, OpenSolaris, and Linux on the
desktop.
http://bsdtalk.blogspot.com/2008/04/bsdtalkalk146-james-cornell.htmlbsdtalkinterviewdesktopjames cornellhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk146.mp39 Mb20 minutesMP3 versionmp3bsdtalk146.ogg9 minutesOgg versionoggAdam Wright from No Starch Press
Intro: Some musings on the consistency and simplicity of BSD.
A brief interview with Adam Wright from No Starch
Press, recorded by Micheal Dexter on behalf of
BSDTalk. They talk about recent and future BSD
books.
http://bsdtalk.blogspot.com/2008/04/bsdtalk145-adam-wright-from-no-starch.htmlbsdtalkinterviewbooksno starch pressadam wrighthttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk145.mp34 Mb8 minutesMP3 versionmp3bsdtalk145.ogg8 minutesOgg versionoggDan Langille
Interview with Dan Langille. We talk about his new
job with Afilias, and BSDCan 2008.
http://bsdtalk.blogspot.com/2008/03/bsdtalk144-dan-langille.htmlbsdtalkinterviewafiliasbsdcan2008dan langillehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk144.mp310 Mb22 minutesMP3 versionmp3bsdtalk144.ogg22 minutesOgg versionoggBSD Hobbiest Deborah Norling
Interview with Deborah Norling. We talk about her
use of BSD on old hardware, accessibility on the
BSDs, and Simh (http://simh.trailing-edge.com).
http://bsdtalk.blogspot.com/2008/03/bsdtalk143-bsd-hobbiest-deborah-norling.htmlbsdtalkinterviewaccessibilitydeborah norlinghttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk143.mp310 Mb23 minutesMP3 versionmp3bsdtalk143.ogg23 minutesOgg versionoggFreeBSD Lead Release Engineer Ken Smith
Interview with FreeBSD Lead Release Engineer Ken Smith.
http://bsdtalk.blogspot.com/2008/02/bsdtalk142-freebsd-lead-release.htmlbsdtalkinterviewfreebsdrelease engineerken smithhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk142.mp37 Mb16 minutesMP3 versionmp3bsdtalk142.ogg16 minutesOgg versionoggPBI 4 with Kris Moore
Interview with PC-BSD founder Kris Moore about the
new features in PBI 4.
http://bsdtalk.blogspot.com/2008/02/bsdtalk141-pbi4-with-kris-moore.htmlbsdtalkinterviewpc-bsdkris moorehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk141.mp35 Mb10 minutesMP3 versionmp3bsdtalk141.ogg10 minutesOgg versionoggThe Mult Project with Kristaps Dzonsons
We talk about the Mult project, which is "an on-going
research project to create a high-performance
instance multiplicity system." You can find more
information at http://mult.bsd.lv/. He also gives
a quick update on Sysjail.
http://bsdtalk.blogspot.com/2008/02/bsdtalk140-mult-project-with-kristaps.htmlbsdtalkinterviewmulti projectkristaps dzonsonshttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk140.mp314 Mb30 minutesMP3 versionmp3bsdtalk140.ogg30 minutesOgg versionoggDru Lavigne
Interview with Dru Lavigne. We talk about her new
book "The Best of FreeBSD Basics" and also get an
update on some other projects including BSD
Certification.
http://bsdtalk.blogspot.com/2008/01/bsdtalk139-dru-lavigne.htmlbsdtalkinterviewdru lavignethe best of freebsd basicshttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk139.mp37 Mb14 minutesMP3 versionmp3bsdtalk139.ogg14 minutesOgg versionoggCentral Syslog
Setting up a central syslog server.
If you are concerned about the security of your logs, use a dedicated machine and lock it down.
Keep clocks in sync.
You may need to change log rotation schedule in /etc/newsyslog.conf. You can rotate based in size and/or time. This can be as much a policy decision as a hardware decision.
On central log host, change syslogd flags to listen to network. Each BSD does this differently, so check the man pages. Also, check out the -n flag for busy environments.
Make sure host firewall allows syslog traffic through.
Be careful to limit syslog traffic to just the trusted network or hosts. FreeBSD man page refers to syslogd as a "remote disk filling service".
For heavy logging environments, it is important to have a dedicated network. A down syslogd server can create a lot of "ARP who-has" broadcasts.
Most network devices such as printers and commercial firewalls support sending to a central syslog server. Take a look at "Snare" for Windows hosts.
To send messages from a Unix host, specify the host name prepended with @ instead of a file for logging in /etc/syslog.conf. For example, change /var/log/xferlog to @loghost.mydomain.biz. You can also copy and edit the line to have it log to both a local file and a remote host.
http://bsdtalk.blogspot.com/2008/01/bsdtalk138-central-syslog.htmlbsdtalksysloghttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk138.mp33 Mb7 minutesMP3 versionmp3bsdtalk138.ogg7 minutesOgg versionoggOpen Community Camp with Marten Vijn
Interview with Marten Vijn about www.OpenCommunityCamp.org.
http://bsdtalk.blogspot.com/2008/01/bsdtalk137-open-community-camp-with.htmlbsdtalkinterviewopencommunitycampmarten vijnhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk137.mp36 Mb13 minutesMP3 versionmp3bsdtalk137.ogg13 minutesOgg versionoggPF with Peter N. M. Hansteen
An interview with Peter N. M. Hansteen, recorded
by Michael Dexter on behalf of BSDTalk. If you would
like to learn more about the PF firewall, check out
"The Book of PF" which is available at
http://nostarch.com/frameset.php?startat=pf
http://bsdtalk.blogspot.com/2007/12/bsdtalk136-pf-with-peter-n-m-hansteen.htmlbsdtalkinterviewpfmichael dexterpeter n m hansteenbook of pfhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk136.mp37 Mb16 minutesMP3 versionmp3bsdtalk136.ogg15 minutesOgg versionoggJoerg Sonnenberger
Michael Dexter sent me an interview he recorded on
behalf of BSDTalk with Joerg Sonnenberger at
EuroBSDCon 2007.
http://bsdtalk.blogspot.com/2007/11/bsdtalk135-joerg-sonnenberger.htmlbsdtalkintervieweurobsdconeurobsdcon2007michael dexterjoerg sonnenbergerhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk135.mp38 Mb17 minutesMP3 versionmp3bsdtalk135.ogg17 minutesOgg versionoggAsiaBSDCon Update with Hiroki Sato and George Neville-Neil
A quick update on AsiaBSDCon 2008 with Hiroki Sato
and George Neville-Neil. More information at
http://2008.asiabsdcon.org/.
http://bsdtalk.blogspot.com/2007/10/bsdtalk134-asiabsdcon-update-with.htmlbsdtalkinterviewasiabsdconhiroki satogeorge neville-neilhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk134.mp35 Mb10 minutesMP3 versionmp3bsdtalk134.ogg10 minutesOgg versionoggOpenCon 2007 update from Marc Balmer
A short update on OpenCon 2007 with Marc Balmer.
More information at http://www.opencon.org/.
http://bsdtalk.blogspot.com/2007/10/bsdtalk133-opencon-2007-update-from.htmlbsdtalkinterviewopenconmarc balmerhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk133.mp33 Mb7 minutesMP3 versionmp3bsdtalk133.ogg7 minutesOgg versionoggRichard Stallman
Interview with Richard Stallman.
http://bsdtalk.blogspot.com/2007/10/bsdtalk132-richard-stallman.htmlbsdtalkinterviewrmsrichard stallmanhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk132.ogg16 Mb28 minutesOgg versionoggPCC with Anders "Ragge" Magnusson
Interview with Anders "Ragge" Magnusson. We talk
about his work on the Portable C Compiler. More
information can be found at http://pcc.ludd.ltu.se/.
http://bsdtalk.blogspot.com/2007/10/bsdtalk131-pcc-with-anders-ragge.htmlbsdtalkinterviewpccraggeanders magnussonhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk131.mp37 Mb15 minutesMP3 versionmp3bsdtalk131.ogg15 minutesOgg versionoggNetwork Stack Virtualization with Marko Zec
Michael Dexter sent me an interview he recorded on
behalf of BSDTalk with Marko Zec at EuroBSDCon 2007.
More information on the project at
http://imunes.tel.fer.hr/virtnet/.
http://bsdtalk.blogspot.com/2007/10/bsdtalk130-network-stack-virtualization.htmlbsdtalkinterviewstack virtualizationmarko zechttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk130.mp38 Mb16 minutesMP3 versionmp3bsdtalk130.ogg16 minutesOgg versionoggBSDCertification Update with Dru Lavigne
Interview with Dru Lavigne. We talk about the
progress of BSDCertification.org and also her new
position with the Open Source Business Resource at
http://www.osbr.ca/.
http://bsdtalk.blogspot.com/2007/09/bsdtalk129-bsdcertification-update-with.htmlbsdtalkinterviewbsdcertificationdru lavignehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk129.mp310 Mb20 minutesMP3 versionmp3bsdtalk129.ogg22 minutesOgg versionoggSysjail Revisited with Michael Dexter
Interview with Michael Dexter. We talk about the
new sysjail and the recent system call wrapper
issues.
http://bsdtalk.blogspot.com/2007/09/bsdtalk128-sysjail-revisited-with.htmlbsdtalkinterviewsysjailmichael dexterhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk128.mp310 Mb22 minutesMP3 versionmp3bsdtalk128.ogg22 minutesOgg versionoggWhy I like the CLI
Why I like the CLI:
Uses minimal resources. Less space, less memory, fewer dependencies.
Similar between Unix-like systems. GUI tools seem to change every week.
Remote management. SSH rocks.
Everything is text. Configs, devices, output. CLI is natural complement.
Pipes and scripts. One time is hard, a thousand times is easy.
Only need a few tools. Grep, sed, awk, vi, cron.
Text config files. Easy to version, share, and comment.
Requires reading skills instead of clicking skills.
Much faster when you know what you are doing.
http://bsdtalk.blogspot.com/2007/08/bsdtalk127-why-i-like-cli.htmlbsdtalkcliwill backmanhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk127.mp36 Mb12 minutesMP3 versionmp3bsdtalk127.ogg12 minutesOgg versionoggMidnightBSD founder Lucas Holt
Interview with MidnightBSD founder Lucas Holt.
http://bsdtalk.blogspot.com/2007/08/bsdtalk126-midnightbsd-founder-lucas.htmlbsdtalkinterviewmidnightbsdlucas holthttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk126.mp37 Mb15 minutesMP3 versionmp3bsdtalk126.ogg15 minutesOgg versionoggMatthew Dillon
Interview with DragonflyBSD's Matthew Dillon. We
talk about the 1.10 release and the design of a new
filesystem.
http://bsdtalk.blogspot.com/2007/08/bsdtalk125-matthew-dillon.htmlbsdtalkinterviewdragonflybsdmattew dillonhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk125.mp310 Mb20 minutesMP3 versionmp3bsdtalk125.ogg20 minutesOgg versionoggPC-BSD Founder Kris Moore
Interview with PC-BSD Founder Kris Moore. We talk
about the upcoming 1.4 release.
http://bsdtalk.blogspot.com/2007/08/bsdtalk124-pc-bsd-founder-kris-moore.htmlbsdtalkinterviewpc-bsdkris moorehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk124.mp36 Mb12 minutesMP3 versionmp3bsdtalk124.ogg12 minutesOgg versionoggWilliam "whurley" Hurley, Chief Architect of Open Source Strategy at BMC Software, Inc.
Interview with William "whurley" Hurley, Chief
Architect of Open Source Strategy at BMC Software,
Inc. We talk about the BMC Developer Network.
http://bsdtalk.blogspot.com/2007/07/bsdtalk123-william-whurley-hurley-chief.htmlbsdtalkinterviewbmc softwarewhurleywilliam hurleyhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk123.mp314 Mb28 minutesMP3 versionmp3bsdtalk123.ogg28 minutesOgg versionoggEmbedding FreeBSD with M. Warner Losh
Interview with M. Warner Losh about embedding FreeBSD.
http://bsdtalk.blogspot.com/2007/07/bsdtalk122-embedding-freebsd-with-m.htmlbsdtalkinterviewembedding freebsdm warner loshhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk122.mp38 Mb16 minutesMP3 versionmp3bsdtalk122.ogg16 minutesOgg versionoggFast IPSec with George Neville-Neil
Interview with George Neville-Neil about Fast IPSec.
http://bsdtalk.blogspot.com/2007/07/bsdtalk121-fast-ipsec-with-george.htmlbsdtalkinterviewipsecgeorge neville-neilhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk121.mp37 Mb14 minutesMP3 versionmp3bsdtalk121.ogg14 minutesOgg versionoggBSD Hacker Isaac "Ike" Levy
Interview with BSD Hacker Isaac "Ike" Levy. To hear
more of Ike and other NYCBUG audio, visit
http://www.fetissov.org/public/nycbug/
http://bsdtalk.blogspot.com/2007/07/bsdtalk120-bsd-hacker-isaac-ike-levy.htmlbsdtalkinterviewnycbugisaac levyhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk120.mp313 Mb26 minutesMP3 versionmp3bsdtalk120.ogg26 minutesOgg versionoggPlaying with IPv6
I ramble on about how I have been experimenting
with IPv6. For more details, see http://cisx1.uma.maine.edu/~wbackman/cis341/resources/ipv6-test-lab.html.
http://bsdtalk.blogspot.com/2007/07/bsdtalk119-playing-with-ipv6.htmlbsdtalkipv6http://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk119.mp38 Mb15 minutesMP3 versionmp3bsdtalk119.ogg15 minutesOgg versionoggSidsel Jensen from EuroBSDCon
Interview with Sidsel Jensen from www.eurobsdcon.org.
http://bsdtalk.blogspot.com/2007/06/bsdtalk118-sidsel-jensen-from.htmlbsdtalkintervieweurobsdconeurobsdcon2007sidsel jensenhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk118.mp35 Mb9 minutesMP3 versionmp3bsdtalk118.ogg9 minutesOgg versionoggOne Time Passwords
Important when you don't trust the computer you are using, such as a library computer or internet kiosk.
Available by default in Free/Net/Open BSD.
FreeBSD uses OPIE, Net/Open use S/Key.
One time passwords are based on your pass phrase, a non-repeating sequence number, and a seed.
Initial setup should be done directly on the server.
"skeyinit" for Net/Open, "opiepasswd -c" for FreeBSD.
Enter a pass phrase that is not your regular account password.
Find your current sequence number and seed with "opieinfo" or "skeyinfo", for example: "497 pc5246".
Generate a list of the next 10 passwords and write them down, using "opiekey -n 10 497 pc5246" or "skey -n 10 497 pc5246".
When you log in from a remote machine that might have a keystroke logger, you can now use a one time password instead of your regular password.
For OpenBSD, log in as account:skey, for example "bob:skey", which will cause the system to present the s/key challenge.
For NetBSD, the system will always present you with the s/key challenge if it is configured for your account, although you can still use your regular password.
FreeBSD by default will force you to use a one time password if it is configured for your account.
If you want both OPIE and password authentication, FreeBSD allows you to list trusted networks or hosts in /etc/opieaccess.
Instead of carrying a list of passwords around, you can use s/key generators on a portable device that you trust, such as a palm pilot.
For more info, check the man pages.
http://bsdtalk.blogspot.com/2007/06/bsdtalk117-one-time-passwords.htmlbsdtalksecurityone time passwordshttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk117.mp34 Mb6 minutesMP3 versionmp3bsdtalk117.ogg6 minutesOgg versionoggRick Macklem and NFSv4
Interview with Rick Macklem about his work with NFSv4.
More information at http://snowhite.cis.uoguelph.ca/nfsv4/.
http://bsdtalk.blogspot.com/2007/06/bsdtalk116-rick-macklem-and-nfsv4.htmlbsdtalkinterviewnfsrick macklemhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk116.mp36 Mb13 minutesMP3 versionmp3bsdtalk116.ogg13 minutesOgg versionoggJun-ichiro "itojun" Itoh Hagino
Interview with KAME project core researcher Jun-ichiro
"itojun" Itoh Hagino.
http://bsdtalk.blogspot.com/2007/06/bsdtalk115-few-freebsd-core-team.htmlbsdtalkinterviewkameitojunjun-ichiro itoh haginohttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk115.mp34 Mb10 minutesMP3 versionmp3bsdtalk115.ogg10 minutesOgg versionoggA Few FreeBSD Core Team Members
An interview with a few of the FreeBSD Core Team
members: Brooks Davis, Warner Losh, George V.
Neville-Neil, Hiroki Sato, and Robert Watson. The
interview was recorded at BSDCan in Ottawa, Cananda.
http://bsdtalk.blogspot.com/2007/05/bsdtalk114-few-freebsd-core-team.htmlbsdtalkinterviewfreebsd corebrooks daviswarner loshgeorge neville-neilhiroki satorobert watsonhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk114.mp316 Mb35 minutesMP3 versionmp3bsdtalk114.ogg35 minutesOgg versionoggDesigning BSD Rootkits Author Joseph Kong
Interview with Joseph Kong, Author of "Designing
BSD Rootkits: An Introduction to Kernel Hacking"
from No Starch Press. The interview was recorded
at BSDCan in Ottawa.
http://bsdtalk.blogspot.com/2007/05/bsdtalk113-designing-bsd-rootkits.htmlbsdtalkinterviewkernelrootkitsbooksjoseph konghttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk113.mp38 Mb15 minutesMP3 versionmp3bsdtalk113.ogg15 minutesOgg versionoggQing Li and Tatuya Jinmei
Interview at BSDCan with Qing Li and Tatuya
Jinmei. We talk about the books that they authored
with Keiichi Shima: "IPv6 Core Protocols Implementation"
and "IPv6 Advanced Protocols Implementation." The
books are available at Amazon.com or on the publisher's
web site, www.mkp.com.
http://bsdtalk.blogspot.com/2007/05/bsdtalk112-qing-li-and-tatuya-jinmei.htmlbsdtalkinterviewipv6booksqing litatuya jimeihttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk112.mp310 Mb20 minutesMP3 versionmp3bsdtalk112.ogg20 minutesOgg versionoggFreeBSD Developer Diane Bruce
Interview with FreeBSD developer Diane Bruce. We
talk about Ham Radio on BSD.
Slides from one of her talks:
http://www.oarc.net/presentations/hamradio_on_freebsd.pdfhttp://bsdtalk.blogspot.com/2007/05/bsdtalk111-freebsd-developer-diane.htmlbsdtalkinterviewfreebsddiana brucehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk111.mp35 Mb10 minutesMP3 versionmp3bsdtalk111.ogg10 minutesOgg versionoggJosh Berkus, Postgresql Lead at Sun Microsystems
Interview with Josh Berkus, Postgresql Lead at Sun
Microsystems. We talk about the upcoming PGCon on
23-24 May 2007. More info at http://www.pgcon.org.
http://bsdtalk.blogspot.com/2007/05/bsdtalk110-josh-berkus-postgresql-lead.htmlbsdtalkinterviewpostgresqljosh berkushttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk110.mp39 Mb19 minutesMP3 versionmp3bsdtalk110.ogg19 minutesOgg versionoggGeorge Neville-Neil and Using VMs for Development
George Neville-Neil and Using VMs for Development.
See http://blogs.freebsdish.org/gnn for more
information.
http://bsdtalk.blogspot.com/2007/04/bsdtalk109-george-neville-neil-and.htmlbsdtalkinterviewvirtual machinesgeorge neville-neilhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk109.mp36 Mb12 minutesMP3 versionmp3bsdtalk109.ogg12 minutesOgg versionoggMatt Juszczak from bsdjobs.net
Interview with Matt Juszczak from bsdjobs.net.
http://bsdtalk.blogspot.com/2007/04/bsdtalk108-matt-juszczak-from.htmlbsdtalkinterviewbsdjobsmatt juszczakhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk108.mp34 Mb8 minutesMP3 versionmp3bsdtalk108.ogg4 minutesOgg versionoggContiki OS Developer Adam Dunkels
Interview with Contiki OS Developer Adam Dunkels. You can find more information at http://www.sics.se/contiki/.
http://bsdtalk.blogspot.com/2007/04/bsdtalk107-contiki-os-developer-adam.htmlbsdtalkinterviewcontikiosadam dunkelshttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk107.mp313 Mb27 minutesMP3 versionmp3bsdtalk107.ogg27 minutesOgg versionoggInterview with Matthieu Herrb about Xenocara
Interview with Matthieu Herrb about Xenocara.
http://bsdtalk.blogspot.com/2007/04/bsdtalk106-interview-with-matthieu.htmlbsdtalkinterviewxenocaramatthieu herrbhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk106.mp37 Mb14 minutesMP3 versionmp3bsdtalk106.ogg14 minutesOgg versionoggIntro to PF with Jason Dixon
Introduction to PF with Jason Dixon.
http://bsdtalk.blogspot.com/2007/03/bsdtalk105-intro-to-pf-with-jason-dixon.htmlbsdtalkinterviewpfjason dixonhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk105.mp312 Mb25 minutesMP3 versionmp3bsdtalk105.ogg25 minutesOgg versionoggGetting to know X
Getting to know the X Window System.
Make sure you are in a text only mode. You might
need to change how the system boots, or boot into
single user mode.
"startx" to make sure X is working right.
"X" by itself gives the basic grey screen.
"ctrl" and "alt" and "backspace" keys at the same time will zap X.
"X & xterm -display :0"
"xterm -geometry +300+300"
"twm" or "metacity"
http://bsdtalk.blogspot.com/2007/03/bsdtalk104-getting-to-know-x.htmlbsdtalkXhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk104.mp35 Mb10 minutesMP3 versionmp3bsdtalk104.ogg10 minutesOgg versionoggRobert Ricci from Emulab
Interview with Robert Ricci from www.Emulab.net.
http://bsdtalk.blogspot.com/2007/03/bsdtalk103-robert-ricci-from-emulab.htmlbsdtalkinterviewemulabrobert riccihttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk103.mp38 Mb16 minutesMP3 versionmp3bsdtalk103.ogg16 minutesOgg versionoggCisco Distinguished Engineer Randall Stewart
Interview with Cisco Distinguished Engineer Randall
Stewart. We talk about the Stream Control Transmission
Protocol and his work bringing it to FreeBSD.
http://bsdtalk.blogspot.com/2007/03/bsdtalk102-cisco-distinguished-engineer.htmlbsdtalkinterviewciscofreebsdstream control transmission protocolrandall stewarthttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk102.mp317 Mb35 minutesMP3 versionmp3bsdtalk102.ogg35 minutesOgg versionoggFreeBSD Developer George Neville-Neil
Interview with FreeBSD developer George Neville-Neil. We talk about the packet construction set and the packet debugger.
http://bsdtalk.blogspot.com/2007/02/bsdtalk101-freebsd-developer-george.htmlbsdtalkinterviewfreebsdpacket construction setgeorge neville-neilhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk101.mp310 Mb19 minutesMP3 versionmp3bsdtalk101.ogg19 minutesOgg versionoggNetBSD Developer Lubomir Sedlacik
Interview with NetBSD Developer Lubomir Sedlacik. We talk about pkgsrcCon 2007.
http://bsdtalk.blogspot.com/2007/02/bsdtalk100-netbsd-developer-lubomir.htmlbsdtalkinterviewnetbsdpkgsrcconlubomir sedlacikhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk100.mp37 Mb13 minutesMP3 versionmp3bsdtalk100.ogg13 minutesOgg versionoggAsiaBSDCon PC Chair George Neville-Neil
Interview with AsiaBSDCon 2007 Program Committee Chair George Neville-Neil.
http://bsdtalk.blogspot.com/2007/02/bsdtalk099-asiabsdcon-pc-chair-george.htmlbsdtalkinterviewasiabsdconasiabsdcon2007george neville-neilhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk099.mp37 Mb14 minutesMP3 versionmp3bsdtalk099.ogg14 minutesOgg versionoggDragonFlyBSD Developer Matthew Dillon
Interview with DragonFlyBSD developer Matthew Dillon.
We talk about the 1.8 release.
http://bsdtalk.blogspot.com/2007/02/bsdtalk098-dragonflybsd-developer.htmlbsdtalkinterviewdragonflybsdmathew dillonhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk098.mp312 Mb24 minutesMP3 versionmp3bsdtalk098.ogg24 minutesOgg versionoggOpenBSD Developer Pierre-Yves Ritschard
Interview with OpenBSD Developer Pierre-Yves
Ritschard. We talk about hoststated.
http://bsdtalk.blogspot.com/2007/02/bsdtalk097-openbsd-developer-pierre.htmlbsdtalkinterviewopenbsdhoststatedpierre-yves ritschardhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk097.mp38 Mb16 minutesMP3 versionmp3bsdtalk097.ogg16 minutesOgg versionoggArtist and Musician Ty Semaka
Interview with Artist and Musician Ty Semaka. You
can find his work at http://www.tysemaka.com/, and
also on the OpenBSD CDs, posters, and shirts.
http://bsdtalk.blogspot.com/2007/01/bsdtalk096-artist-and-musician-ty.htmlbsdtalkinterviewopenbsdartworkty semakahttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk096.mp36 Mb12 minutesMP3 versionmp3bsdtalk096.ogg12 minutesOgg versionoggOpenBSD Developer Claudio Jeker
Interview with OpenBSD Developer Claudio Jeker.
http://bsdtalk.blogspot.com/2007/01/bsdtalk095-openbsd-developer-claudio.htmlbsdtalkinterviewopenbsdclaudio jekerhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk095.mp37 Mb15 minutesMP3 versionmp3bsdtalk095.ogg15 minutesOgg versionoggBSD Consultant Jeremy C. Reed
Interview with BSD Consultant Jeremy C. Reed from http://www.reedmedia.net/
http://bsdtalk.blogspot.com/2007/01/bsdtalk094-bsd-consultant-jeremy-c.htmlbsdtalkinterviewconsultancyjeremy c reedhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk094.mp38 Mb16 minutesMP3 versionmp3bsdtalk094.ogg16 minutesOgg versionoggEMC Lab Admin Glen R. J. Neff
Interview with EMC Lab Administrator Glen R. J. Neff.
http://bsdtalk.blogspot.com/2007/01/bsdtalk093-emc-lab-admin-glen-r-j-neff.htmlbsdtalkinterviewemc labglen r j neffhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk093.mp315 Mb30 minutesMP3 versionmp3bsdtalk093.ogg30 minutesOgg versionoggRun Your Own Server Podcast Host Adam Glen
Interview with Adam Glen, one of the hosts of the Run Your Own Server Podcast.
http://bsdtalk.blogspot.com/2007/01/bsdtalk092-run-your-own-server-podcast.htmlbsdtalkinterviewrun your own serveradam glenhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk092.mp36 Mb12 minutesMP3 versionmp3bsdtalk092.ogg12 minutesOgg versionoggPhil Pereira from bsdnexus.com
Interview with Phil Pereira from bsdnexus.com.
http://bsdtalk.blogspot.com/2007/01/bsdtalk091-phil-pereira-from.htmlbsdtalkinterviewbsdnexusphil pereirahttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk091.mp39 Mb18 minutesMP3 versionmp3bsdtalk091.ogg18 minutesOgg versionoggSys Admin Mike Erdely
Interview with Sys Admin Mike Erdely. You can find more information on his use of binpatch at http://erdelynet.com/binpatch.
http://bsdtalk.blogspot.com/2006/12/bsdtalk090-sys-admin-mike-erdely.htmlbsdtalkinterviewbinpatchmike erdelyhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk090.mp38 Mb17 minutesMP3 versionmp3bsdtalk090.ogg17 minutesOgg versionoggNetBSD Release Engineer Jeff Rizzo
Interview with NetBSD Release Engineer Jeff Rizzo. We talk about the upcoming 4.0 release.
http://bsdtalk.blogspot.com/2006/12/bsdtalk089-netbsd-release-engineer.htmlbsdtalkinterviewnetbsdjeff rizzohttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk089.mp37 Mb15 minutesMP3 versionmp3bsdtalk089.ogg15 minutesOgg versionoggA Year of BSDTalk
A short ramble about the first year of bsdtalk.
http://bsdtalk.blogspot.com/2006/12/bsdtalk088-year-of-bsdtalk.htmlbsdtalkanniversaryhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk088.mp34 Mb8 minutesMP3 versionmp3bsdtalk088.ogg8 minutesOgg versionoggFreeBSD Developer Joseph Koshy
Interview with FreeBSD developer Joseph Koshy about libELF. You can find more information about libELF at https://wiki.freebsd.org/LibElf.
http://bsdtalk.blogspot.com/2006/12/bsdtalk087-freebsd-developer-joseph.htmlbsdtalkinterviewfreebsdlibelfjoseph koshyhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk087.mp35 Mb9 minutesMP3 versionmp3bsdtalk087.ogg9 minutesOgg versionoggFreeBSD Developer Kip Macy
Interview with FreeBSD developer Kip Macy. We talk about the Ultrasparc T1 port.
http://bsdtalk.blogspot.com/2006/12/bsdtalk086-freebsd-developer-kip-macy.htmlbsdtalkinterviewfreebsdultrasparc t1kip macyhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk086.mp310 Mb22 minutesMP3 versionmp3bsdtalk086.ogg22 minutesOgg versionoggFreeBSD Port Committer Thomas McLaughlin
Interview with FreeBSD Port Committer Thomas McLaughlin about the BSD# project.
http://bsdtalk.blogspot.com/2006/11/bsdtalk085-freebsd-port-committer.htmlbsdtalkinterviewfreebsdbsd#thomas mclaughlinhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk085.mp39 Mb18 minutesMP3 versionmp3bsdtalk085.ogg18 minutesOgg versionoggFreeBSD Release Engineer Bruce Mah
Interview with FreeBSD Release Engineer Bruce Mah.
http://bsdtalk.blogspot.com/2006/11/bsdtalk084-freebsd-release-engineer.htmlbsdtalkinterviewfreebsdrelease engineerbruce mahhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk084.mp37 Mb15 minutesMP3 versionmp3bsdtalk084.ogg15 minutesOgg versionoggPkgsrc Developer Johnny Lam
Interview with pkgsrc developer Johnny Lam.
http://bsdtalk.blogspot.com/2006/11/bsdtalk083-pkgsrc-developer-johnny-lam.htmlbsdtalkinterviewpkgsrcjohnny lamhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk083.mp36 Mb13 minutesMP3 versionmp3bsdtalk083.ogg13 minutesOgg versionoggOpenBSD Developer Jason Wright
Interview with OpenBSD developer Jason Wright. We talk about his work on sparc and also amateur radio.
http://bsdtalk.blogspot.com/2006/11/bsdtalk082-openbsd-developer-jason.htmlbsdtalkinterviewopenbsdsparcradiojason wrighthttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk082.mp38 Mb17 minutesMP3 versionmp3bsdtalk082.ogg17 minutesOgg versionoggThorsten Glaser from MirOS
Interview with Thorsten Glaser from MirOS, which can be found at www.mirbsd.org.
http://bsdtalk.blogspot.com/2006/11/bsdtalk081-thorsten-glaser-from-miros.htmlbsdtalkinterviewmirosthomas glaserhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk081.mp39 Mb19 minutesMP3 versionmp3bsdtalk081.ogg19 minutesOgg versionoggEuroBSDCon Organizer Massimiliano Stucchi
Interview with EuroBSDCon organizer Massimiliano Stucchi.
http://bsdtalk.blogspot.com/2006/11/bsdtalk080-eurobsdcon-organizer.htmlbsdtalkintervieweurobsdconeurobsdcon2006massimiliano stucchihttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk080.mp34 Mb8 minutesMP3 versionmp3bsdtalk080.ogg8 minutesOgg versionoggOpenBSD Developer David Gwynne
Interview with OpenBSD developer David Gwynne. We
talk about the upcoming 4.0 release of OpenBSD and
current projects that he is working on.
http://bsdtalk.blogspot.com/2006/10/bsdtalk079-openbsd-developer-david.htmlbsdtalkinterviewopenbsddavid gwynnehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk079.mp38 Mb16 minutesMP3 versionmp3bsdtalk079.ogg16 minutesOgg versionoggKris Moore from PC-BSD
Interview with Kris Moore from PC-BSD.
http://bsdtalk.blogspot.com/2006/10/bsdtalk078-kris-moore-from-pc-bsd.htmlbsdtalkinterviewpc-bsdkris moorehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk078.mp310 Mb21 minutesMP3 versionmp3bsdtalk078.ogg21 minutesOgg versionoggMatt Olander from iXsystems
Interview with Matt Olander from www.iXsystems.com.
http://bsdtalk.blogspot.com/2006/10/bsdtalk077-matt-olander-from-ixsystems.htmlbsdtalkinterviewixsystemsmatt olanderhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk077.mp39 Mb19 minutesMP3 versionmp3bsdtalk077.ogg19 minutesOgg versionoggOpenBSD Developer Marc Balmer
Interview with OpenBSD Developer Marc Balmer. We
talk about www.opencon.org and his work with OpenBSD.
http://bsdtalk.blogspot.com/2006/10/bsdtalk076-openbsd-developer-marc.htmlbsdtalkinterviewopenconopenbsdmarc balmerhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk076.mp37 Mb15 minutesMP3 versionmp3bsdtalk076.ogg15 minutesOgg versionoggInterview with Hiroki Sato and George Neville-Neil from AsiaBSDCon
Interview with Hiroki Sato and George Neville-Neil
from AsiaBSDCon. More info at http://2006.asiabsdcon.org/.
http://bsdtalk.blogspot.com/2006/10/bsdtalk074-interview-with-hiroki-sato.htmlbsdtalkinterviewasiabsdconasiabsdcon2006hiroki saogeorge neville-neilhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk074.mp36 Mb13 minutesMP3 versionmp3bsdtalk074.ogg13 minutesOgg versionoggInterview with Sevan Janiyan
Interview with Sevan Janiyan. We talk about the
Brighton Chilli WiFi hotspot project, which can
be found at http://brightonchilli.geeklan.co.uk/
http://bsdtalk.blogspot.com/2006/10/bsdtalk073-interview-with-sevan.htmlbsdtalkinterviewbrighton chilli wifisevan janiyanhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk073.mp36 Mb13 minutesMP3 versionmp3bsdtalk073.ogg13 minutesOgg versionoggInterview with Poul-Henning Kamp about Varnish
Interview with Poul-Henning Kamp about Varnish. More information at http://www.varnish-cache.org/.
http://bsdtalk.blogspot.com/2006/10/bsdtalk072-interview-with-poul-henning.htmlbsdtalkinterviewvarnishpoul-henning kamphttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk072.mp317 Mb36 minutesMP3 versionmp3bsdtalk072.ogg36 minutesOgg versionoggInterview with Einar Th. Einarsson from f-prot.com
Interview with Einar Th. Einarsson from f-prot.com.
http://bsdtalk.blogspot.com/2006/09/bsdtalk071-interview-with-einar-th.htmlbsdtalkinterviewf-proteinar th einarssonhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk071.mp38 Mb17 minutesMP3 versionmp3bsdtalk071.ogg17 minutesOgg versionoggInterview with NetBSD Developer Tim Rightnour
Interview with NetBSD Developer Tim Rightnour. We talk about NetBSD/prep.
http://bsdtalk.blogspot.com/2006/09/bsdtalk070-interview-with-netbsd.htmlbsdtalkinterviewnetbsdtim rightnourhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk070.mp37 Mb15 minutesMP3 versionmp3bsdtalk070.ogg15 minutesOgg versionoggInterview with Christoph Egger about Xen on OpenBSD
Interview with Christoph Egger about Xen on OpenBSD.
http://bsdtalk.blogspot.com/2006/09/bsdtalk069-interview-with-christoph.htmlbsdtalkinterviewopenbsdxenchristoph eggerhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk069.mp37 Mb15 minutesMP3 versionmp3bsdtalk069.ogg15 minutesOgg versionoggInterview with OpenBSD Developer Bob Beck
Interview with OpenBSD Developer Bob Beck.
http://bsdtalk.blogspot.com/2006/09/bsdtalk068-interview-with-openbsd.htmlbsdtalkinterviewopenbsdbob beckhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk068.mp312 Mb26 minutesMP3 versionmp3bsdtalk068.ogg26 minutesOgg versionoggInterview with Dan Langille about backups
Interview with Dan Langille about backups. Check out http://www.bacula.org/http://bsdtalk.blogspot.com/2006/09/bsdtalk067-interview-with-dan-langille.htmlbsdtalkinterviewbaculadan langillehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk067.mp310 Mb22 minutesMP3 versionmp3bsdtalk067.ogg22 minutesOgg versionoggInterview with Michael Dexter about sysjail
Interview with Michael Dexter about sysjail. http://sysjail.bsd.lv/http://bsdtalk.blogspot.com/2006/09/bsdtalk066-interview-with-michael.htmlbsdtalkinterviewsysjailmichael dexterhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk066.mp316 Mb35 minutesMP3 versionmp3bsdtalk066.ogg35 minutesOgg versionogg Interview with Eirik Øverby.
Interview with Eirik Øverby. We talk about
his use of BSD and Jails.
http://bsdtalk.blogspot.com/2006/09/bsdtalk065-interview-with-eirik-verby.htmlbsdtalkinterviewjailseirik Overbyhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk065.mp39 Mb18 minutesMP3 versionmp3bsdtalk065.ogg18 minutesOgg versionoggInterview with NetBSD Developer Jason Thorpe
Interview with NetBSD Developer Jason Thorpe
http://bsdtalk.blogspot.com/2006/09/bsdtalk064-interview-with-netbsd.htmlbsdtalkinterviewnetbsdjason thorpehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk064.mp318 Mb38 minutesMP3 versionmp3bsdtalk064.ogg38 minutesOgg versionoggInterview with Mitchell Smith about BSD and Accessibility
Interview with Mitchell Smith about BSD and Accessibility.
http://bsdtalk.blogspot.com/2006/08/bsdtalk063-interview-with-mitchell.htmlbsdtalkinterviewaccessibilitymitchell smithhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk063.mp38 Mb17 minutesMP3 versionmp3bsdtalk063.ogg17 minutesOgg versionoggInterview with YAWS developer Claes Klacke Wikstrom
Interview with YAWS developer Claes "Klacke" Wikstrom.
http://bsdtalk.blogspot.com/2006/08/bsdtalk062-interview-with-yaws.htmlbsdtalkinterviewyawsclaes wikstromhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk062.mp38 Mb18 minutesMP3 versionmp3bsdtalk062.ogg18 minutesOgg versionoggInterview with lighttpd developer Jan Kneschke
Interview with lighttpd developer Jan Kneschke.
http://bsdtalk.blogspot.com/2006/08/bsdtalk061-interview-with-lighttpd.htmlbsdtalkinterviewlighttpdjan kneschkehttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk061.mp317 Mb35 minutesMP3 versionbsdtalkinterviewlighttpdjan kneschkebsdtalk061.ogg35 minutesOgg versionbsdtalkinterviewlighttpdjan kneschkeMy BSD History
My BSD History, by Will Backman of BSDTalk, and a bit on accessibility.
http://bsdtalk.blogspot.com/2006/08/bsdtalk060-my-bsd-history.htmlbsdtalkaccessibilityhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk060.mp35 Mb10 minutesMP3 versionmp3bsdtalk060.ogg10 minutesOgg versionoggInterview with Matt Morley
Interview with Matt Morley, BSD user.
http://bsdtalk.blogspot.com/2006/08/bsdtalk059-interview-with-matt-morley.htmlbsdtalkinterviewmatt morleyhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk059.mp311 Mb25 minutesMP3 versionmp3bsdtalk059.ogg25 minutesOgg versionoggInterview with Jason Thaxter from gomoos.org
Interview with Jason Thaxter from gomoos.org.
http://bsdtalk.blogspot.com/2006/07/bsdtalk058-interview-with-jason.htmlbsdtalkinterviewgomoosjason thaxterhttp://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk058.mp311 Mb23 minutesMP3 versionmp3bsdtalk058.ogg23 minutesOgg versionoggUsing BSD in SchmooCon Labs
Using BSD in SchmooCon Labs
DCBSDCon 2009, Ken Caruso
clive URL: http://www.youtube.com/watch?v=9ZhfuP4jghY
http://www.youtube.com/watch?v=9ZhfuP4jghYyoutubepresentationdcbsdcondcbsdcon2009bsdschmooconken carusohttp://www.youtube.com/watch?v=9ZhfuP4jghY35:08FlashflashSleeping Beauty - NetBSD on Modern laptops
P9A: Sleeping Beauty - NetBSD on Modern Laptops
AsiaBSDCon 2008, Jorg Sonnenberger
clive URL: http://www.youtube.com/watch?v=v9ygBFjGR50
http://www.youtube.com/watch?v=v9ygBFjGR50youtubepresentationasiabsdcon2008asiabsdconnetbsdlaptopsjorg sonnenbergerhttp://www.youtube.com/watch?v=v9ygBFjGR501:20:56FlashflashOpenBSD Network Stack Internals
P8A: OpenBSD Network Stack Internals
AsiaBSDCon 2008, Claudio Jeker
clive URL: http://www.youtube.com/watch?v=V85It0dGUF4
http://www.youtube.com/watch?v=V85It0dGUF4youtubepresentationasiabsdcon2008asiabsdconopenbsdclaudio jekerhttp://www.youtube.com/watch?v=V85It0dGUF453:41Flashflash25 years with BSD
Thinking RealSpace: Life with BSD - ~25 years with BSD
AsiaBSDCon 2008, Hideki Sunahara
clive URL: http://www.youtube.com/watch?v=brYdkQ120Do
http://www.youtube.com/watch?v=brYdkQ120Doyoutubekeynoteasiabsdcon2008asiabsdconbsdhideki sunaharahttp://www.youtube.com/watch?v=brYdkQ120Do44:43FlashflashP6A: A Portable iSCSI Initiator
P3B: A Portable iSCSI Initiator
AsiaBSDCon 2008, Alistair Crooks
clive URL: http://www.youtube.com/watch?v=MiZY7PMu7Ic
http://www.youtube.com/watch?v=MiZY7PMu7Icyoutubepresentationasiabsdcon2008asiabsdconiscsialistair crookshttp://www.youtube.com/watch?v=MiZY7PMu7Ic40:57FlashflashP3B: BSD Implementations of XCAST6
P3B: BSD Implementations of XCAST6
AsiaBSDCon 2008, Yuji Imai
clive URL: http://www.youtube.com/watch?v=g1Ga48smqyI
http://www.youtube.com/watch?v=g1Ga48smqyIyoutubepresentationasiabsdcon2008asiabsdconxcast6yuji imaihttp://www.youtube.com/watch?v=g1Ga48smqyI55:42FlashflashP5A: Logical Resource Isolation in the NetBSD Kernel
P5A: Logical Resource Isolation in the NetBSD Kernel
AsiaBSDCon 2008, Kristaps Dzonsons
clive URL: http://www.youtube.com/watch?v=c63VneyQI-k
http://www.youtube.com/watch?v=c63VneyQI-kyoutubepresentationasiabsdcon2008asiabsdconnetbsdkristaps dzonsonshttp://www.youtube.com/watch?v=c63VneyQI-k56:29FlashflashP4B: Send and Receive of File System Protocols: Userspace Approach With puffs
P4B: Send and Receive of File System Protocols: Userspace Approach With puffs
AsiaBSDCon 2008, Antti Kantee
clive URL: http://www.youtube.com/watch?v=ziGeB8iRA0c
http://www.youtube.com/watch?v=ziGeB8iRA0cyoutubepresentationasiabsdcon2008asiabsdconpuffsantti kanteehttp://www.youtube.com/watch?v=ziGeB8iRA0c47:29FlashflashP1B: Tracking FreeBSD in a Commercial Setting
P1B: Tracking FreeBSD in a Commercial Setting
AsiaBSDCon 2008, M. Warner Losh
clive URL: http://www.youtube.com/watch?v=VaZ9Ef04bJg
http://www.youtube.com/watch?v=VaZ9Ef04bJgyoutubepresentationasiabsdcon2008asiabsdconfreebsdwarner loshhttp://www.youtube.com/watch?v=VaZ9Ef04bJg33:40FlashflashA Brief History of the BSD Fast Filesystem, Kirk McKusick
A Brief History of the BSD Fast Filesystem, Kirk McKusick
AsiaBSDCon 2008, Dr. Kirk McKusick
clive URL: http://www.youtube.com/watch?v=tzieR5MM06M
http://www.youtube.com/watch?v=tzieR5MM06Myoutubepresentationasiabsdcon2008asiabsdconbsd fast filesystemkirk mckusickhttp://www.youtube.com/watch?v=tzieR5MM06M42:01FlashflashPC-BSD, Matt Olander, AsiaBSDCon 2008
PC-BSD, Matt Olander, AsiaBSDCon 2008
clive URL: http://www.youtube.com/watch?v=N0q37X-MJzY
http://www.youtube.com/watch?v=N0q37X-MJzYyoutubepresentationasiabsdcon2008asiabsdconpc-bsdmatt olanderhttp://www.youtube.com/watch?v=N0q37X-MJzY28:50FlashflashUsing FreeBSD to Promote Open Source Development Methods, Brooks Davis, AsiaBSDCon 2008
Using FreeBSD to Promote Open Source Development
Methods, Brooks Davis, AsiaBSDCon 2008
clive URL: http://www.youtube.com/watch?v=4lcrinKBMas
http://www.youtube.com/watch?v=4lcrinKBMasyoutubepresentationasiabsdcon2008asiabsdconfreebsdpromotionopen source development modelsbrooks davishttp://www.youtube.com/watch?v=4lcrinKBMas30:07FlashflashKeynote, Peter Losher, Internet Systems Consortium, AsiaBSDCon 2008
Keynote, Peter Losher, Internet Systems Consortium,
AsiaBSDCon 2008
clive URL: http://www.youtube.com/watch?v=vQbdG7TwhKo
http://www.youtube.com/watch?v=vQbdG7TwhKoyoutubekeynoteasiabsdcon2008asiabsdconpeter losherhttp://www.youtube.com/watch?v=vQbdG7TwhKo42:44FlashflashGEOM - in Infrastructure We Trust, Pawel Jakub Dawidek, AsiaBSDCon 2008
GEOM - in Infrastructure We Trust, Pawel Jakub
Dawidek, AsiaBSDCon 2008
clive URL: http://www.youtube.com/watch?v=xMpmOezBJZo
http://www.youtube.com/watch?v=xMpmOezBJZoyoutubepresentationasiabsdcon2008asiabsdcongeompawel jakub dawidekhttp://www.youtube.com/watch?v=xMpmOezBJZo46:38FlashflashReducing Lock Contention in a Multi-Core System, Randall Stewart, AsiaBSDCon 2008
Reducing Lock Contention in a Multi-Core System,
Randall Stewart, AsiaBSDCon 2008
clive URL: http://www.youtube.com/watch?v=OQOMva1SmbY
http://www.youtube.com/watch?v=OQOMva1SmbYyoutubepresentationasiabsdcon2008asiabsdconmulticorelock contentionrandall stewarthttp://www.youtube.com/watch?v=OQOMva1SmbY28:12FlashflashFreeBSD Kernel Internals, Dr. Marshall Kirk McKusick
The first hour of Marshall Kirk McKusick's course
on FreeBSD kernel internals based on his book, The
Design and Implementation of the FreeBSD Operating
System. This course has been given at BSD Conferences
and technology companies around the world.
clive URL: http://www.youtube.com/watch?v=nwbqBdghh6E
http://www.youtube.com/watch?v=nwbqBdghh6Eyoutubecoursefreebsddesign and implementation of the freebsd operating systemkirk mckusickhttp://www.youtube.com/watch?v=nwbqBdghh6E59:57FlashflashMay 2008 developer Vimage report
A sneak peak into the FreeBSD development process.
Warning 2 hours! filmed over 2 days.
(The schedule worked out was optimistic to say the
least but it's still looking ok...)
Marko Zec and Julian Elischer report back to the
developers at BSDCan on the progress on virtualizing
the network stack in FreeBSD. This has been a long
term project but at the time of this recording was
just reaching the point of feasibility. In this
video you can see some of the dynamics of the group
as developers become familiar with the project and
discussions take place regarding such things as
maintainability, ABI compatibility, and even what
to call the feature. In this video you can see the
decision being made by a "quorum" of developers to
take this project mainstream.
The sound is less that perfect, but it's what we have.
This is a montage of 3 video sources, one of which
is a lower resolution, but at times it was the only
camera capturing the action. (the other ran out of
tape for a while)
Thanks to Ed Maste for the added footage.
I will be doing more editing later and will be
substituting in better footage in some places.
clive URL: http://au.youtube.com/watch?v=Px-pSXm32dE
http://www.youtube.com/watch?v=Px-pSXm32dEyoutubefreebsdvimagemarko zecjulian elischerhttp://www.youtube.com/watch?v=Px-pSXm32dE2:44:36FlashflashZFS in FreeBSD, by Pawel Jakub Dawidek
Pawel goes over ZFS, and tells us the state of the
FreeBSD port. Source: Julian
clive URL: http://au.youtube.com/watch?v=5-CR3o-Q2CU
http://www.youtube.com/watch?v=5-CR3o-Q2CUyoutubefreebsdzfspawel jakubhttp://www.youtube.com/watch?v=5-CR3o-Q2CU54:34FlashflashIsilon and FreeBSD
Zach Loafman explains how Isilon uses FreeBSD and
how the company adds to it and interacts with the
FreeBSD community.
clive URL: http://au.youtube.com/watch?v=OlMocIwM5QU
http://www.youtube.com/watch?v=OlMocIwM5QUyoutubefreebsdisilonzach loafmanhttp://www.youtube.com/watch?v=OlMocIwM5QU28:58FlashflashFreeBSD networking work summary
Robert Watson reports on work currently under way
to optimize the networking stack for new hardware.
Source: Julian
clive URL: http://www.youtube.com/watch?v=ohLVNmI3lCg
http://www.youtube.com/watch?v=ohLVNmI3lCgyoutubefreebsdnetworkingrobert watsonhttp://www.youtube.com/watch?v=ohLVNmI3lCg55:21FlashflashKris Moore and PCBSD
PCBSD from a developer's perspective. Source: Julian
clive URL: http://au.youtube.com/watch?v=aHRRa-OvwxM
http://au.youtube.com/watch?v=aHRRa-OvwxMyoutubepcbsdkris moorehttp://au.youtube.com/watch?v=aHRRa-OvwxM25:14FlashflashFreeBSD, klaster pocztowy
"Projektowanie korporacyjnego klastra pocztowego",
Jan Srzednicki at MeetBSD 2007 in Warsaw, Poland.
clive URL: http://www.youtube.com/watch?v=9B8MDy-37TI
http://www.youtube.com/watch?v=9B8MDy-37TIyoutubemeetbsdmeetbsd2007polishjan srzednickihttp://www.youtube.com/watch?v=9B8MDy-37TI1:07:56FlashflashMeet BSD projects from GSoC 2007
"Meet BSD projects from Google Summer of Code 2007",
Pawel Solyga at MeetBSD 2007 in Warsaw, Poland.
clive URL: http://www.youtube.com/watch?v=snVtilaj-KI
http://www.youtube.com/watch?v=snVtilaj-KIyoutubemeetbsdmeetbsd2007google socpawel solygahttp://www.youtube.com/watch?v=snVtilaj-KI34:37FlashflashGoogle Summer of Code 2008. BSD summary
A panel discusses the GSOC project an how it and BSD get on.
Source: Julian
clive URL: http://www.youtube.com/watch?v=3l3tuhSmp_E
http://www.youtube.com/watch?v=3l3tuhSmp_Eyoutubemeetbsdmeetbsd2008google sochttp://www.youtube.com/watch?v=3l3tuhSmp_E35:15FlashflashEmbedded FreeBSD
"FreeBSD do zabudowy czyli nie tylko pecety", Rafal
Jaworowski at MeetBSD 2007 in Warsaw, Poland.
clive URL: http://www.youtube.com/watch?v=2HcIJvJX4y8
http://www.youtube.com/watch?v=2HcIJvJX4y8youtubemeetbsdmeetbsd2007embeddedfreebsdpolishrafal jaworowskihttp://www.youtube.com/watch?v=2HcIJvJX4y81:11:09FlashflashDTrace
"DTrace - Monitoring i strojenie systemu w XXI
wieku", Slawomir Zak at MeetBSD 2007 in Warsaw, Poland.
clive URL: http://www.youtube.com/watch?v=5VK6tV4y3r0
http://www.youtube.com/watch?v=5VK6tV4y3r0youtubemeetbsdmeetbsd2007dtracepolishslawomir zakhttp://www.youtube.com/watch?v=5VK6tV4y3r01:04:23FlashflashNew features in FreeBSD 7
"New features and improvements in FreeBSD 7", Kris
Kennaway at MeetBSD 2007 in Warsaw, Poland
clive URL: http://www.youtube.com/watch?v=XUjJWhlnujQ
http://www.youtube.com/watch?v=XUjJWhlnujQyoutubemeetbsdmeetbsd2007freebsdkris kennawayhttp://www.youtube.com/watch?v=XUjJWhlnujQ1:07:18FlashflashDetangling and debugging
"Detangling and debugging: friends in unexpected
places", Philip Paeps at MeetBSD 2007 in Warsaw,
Poland.
clive URL: http://www.youtube.com/watch?v=G8Fm8mgPyDc
http://www.youtube.com/watch?v=G8Fm8mgPyDcyoutubemeetbsdmeetbsd2007debuggingphilip paepshttp://www.youtube.com/watch?v=G8Fm8mgPyDc18:36FlashflashFreeBSD Profiling, Kris Kennaway, MeetBSD 2008
FreeBSD Profiling tools, tips and tricks, Kris
Kennaway, MeetBSD 2008
clive URL: http://www.youtube.com/watch?v=Mfb5_uG7BCA
http://www.youtube.com/watch?v=Mfb5_uG7BCAyoutubemeetbsdmeetbsd2008freebsdprofilingkris kennawayhttp://www.youtube.com/watch?v=Mfb5_uG7BCA1:06:23FlashflashBSD v. GPL, Jason Dixon, NYCBSDCon 2008
BSD vs GPL is a sweeping epic, focused on the
dichotomy between good and evil. It peers inside
the hearts and minds of the creators of these
movements and dissects their battle for world
domination. No common documentary will dare to
follow the path that BSD vs GPL blazes. This
presentation was given by Jason Dixon at the NYC
BSD Conference at Columbia University on October
11, 2008
clive URL: http://www.youtube.com/watch?v=mMmbjJI5su0
http://www.youtube.com/watch?v=mMmbjJI5su0youtubenycbsdconnycbsdcon2008bsd versus gpljason dixonhttp://www.youtube.com/watch?v=mMmbjJI5su016:21FlashflashBSD is Dying, Jason Dixon, NYCBSDCon 2007
A tongue-in-cheek look at the history and future
of the BSD movement. Modeled after the presentation
styles of Lessig and Hardt, the talk provides a
light-hearted introspection of the leaders,
technologies, and community that forges ahead despite
having been left for dead some 15 years past. This
presentation was given by Jason Dixon at the NYC
BSD Conference at Columbia University on October
28, 2006
clive URL: http://www.youtube.com/watch?v=g7tvI6JCXD0
http://www.youtube.com/watch?v=g7tvI6JCXD0youtubenycbsdconnycbsdcon2007bsd is dyingjason dixonhttp://www.youtube.com/watch?v=g7tvI6JCXD017:41FlashflashPC-BSD: FreeBSD on the Desktop
"PC-BSD: FreeBSD on the Desktop", Matt Olander at
MeetBSD 2007 in Warsaw, Poland.
clive URL: http://www.youtube.com/watch?v=oC4gsipGfQU
http://www.youtube.com/watch?v=oC4gsipGfQUyoutubemeetbsdmeetbsd2007pc-bsdmatt olanderhttp://www.youtube.com/watch?v=oC4gsipGfQU31:30FlashflashFreeBSD, Protecting Privacy with Tor
"Protecting your Privacy with FreeBSD and Tor",
Christian Brüffer at MeetBSD 2007 in Warsaw, Poland.
clive URL: http://www.youtube.com/watch?v=OwBh8ro7xHQ
http://www.youtube.com/watch?v=OwBh8ro7xHQyoutubemeetbsdmeetbsd2007freebsdtorprivacychristian brufferhttp://www.youtube.com/watch?v=OwBh8ro7xHQ46:24FlashflashFreeBSD, Building a Computing Cluster
"Reflections on Building a High-Performance Computing
Cluster using FreeBSD", Brooks Davis at MeetBSD
2007 in Warsaw, Poland.
clive URL: http://www.youtube.com/watch?v=BpsRb9fJ4Ds
http://www.youtube.com/watch?v=BpsRb9fJ4Dsyoutubemeetbsdmeetbsd2007freebsdclusterperformancebrooks davishttp://www.youtube.com/watch?v=BpsRb9fJ4Ds47:51FlashflashIsolating Cluster Jobs for Performance and Predictability, Brooks Davis, MeetBSD 2008
Isolating Cluster Jobs for Performance and
Predictability by Brooks Davis, The Aerospace
Corporation, MeetBSD November 15, 2008
clive URL: http://www.youtube.com/watch?v=0uBFLJm7IHc
http://www.youtube.com/watch?v=0uBFLJm7IHcyoutubemeetbsdmeetbsd2008clusterperformancebrooks davishttp://www.youtube.com/watch?v=0uBFLJm7IHc43:40FlashflashBSD Certification, MeetBSD 2008
BSD Certification by Dru Lavigne, Chair, BSD
Certification Group, MeetBSD November 15, 2008
clive URL: http://www.youtube.com/watch?v=rGQmLYplO9U
http://www.youtube.com/watch?v=rGQmLYplO9Uyoutubemeetbsdmeetbsd2008bsd certificationdru lavignehttp://www.youtube.com/watch?v=rGQmLYplO9U44:14FlashflashEmbedding FreeBSD, MeetBSD 2008
Embedding FreeBSD by Warner Losh and Philip Paeps,
MeetBSD November 15, 2008
clive URL: http://www.youtube.com/watch?v=Fc3xYrxvIU0
http://www.youtube.com/watch?v=Fc3xYrxvIU0youtubemeetbsdmeetbsd2008embeddedfreebsdphilip paepswarner loshhttp://www.youtube.com/watch?v=Fc3xYrxvIU038:56FlashflashFreeBSD Foundation Update & Recognition, MeetBSD 2008
Robert Watson provides a status update on the
non-profit FreeBSD Foundation at MeetBSD November
16, 2008
clive URL: http://www.youtube.com/watch?v=sNQ2d41Vn2A
http://www.youtube.com/watch?v=sNQ2d41Vn2Ayoutubemeetbsdmeetbsd2008freebsd foundationrobert watsonhttp://www.youtube.com/watch?v=sNQ2d41Vn2A16:22FlashflashLousy virtualization, Happy users: FreeBSD's jail(2) facility
Lousy virtualization, Happy users: FreeBSD's jail(2) facility by Poul-Henning Kamp (phk@FreeBSD.org)
http://www.ukuug.org/events/spring2007/programme/ukuugpresentationfreebsdjailspoul-henning kamphttp://www.ukuug.org/events/spring2007/programme/jails.pdf2.7 MbSlidespdfPoul-Henning Kamp - GBDE -- Spook strength disk encryption
GBDE is a disk encryption facility designed with
both usability and strength as requirements and it
attempts to protect both the user and the data. The
talk is about avoiding self-deceiving analysis, how
to make real world usable cryptography and generally
protect yourself and your data. Required skill
level: Laptop user.
http://conferences.suug.ch/sucon/04/suugpresentationgbdepoul-henning kamphttp://phk.freebsd.dk/pubs/bsdcon-03.gbde.paper.pdf104 KbPaperpdfhttp://www.suug.ch/sucon/04/slides/gbde.pdf113 KbSlidespdfMax Laier - PF - Extended Introduction
The talk will introduce packet filter (pf) - a *BSD
firewall system - and summarize its history and
projected future. After providing a short overview
of pf's general functionality and some firewall
basics, it will concentrate on packet filter's
advanced feature-set from the administrator's point
of view. The talk will also cover the integration
of ALTQ, a mature framework for traffic shaping and
priorization. Finally it will provide a short
overview of the "Common Address Redundancy Protocol"
(CARP) and its integration in pf.
http://conferences.suug.ch/sucon/04/suugpresentationpfaltqmax laierhttps://people.FreeBSD.org/~mlaier/sucon.pdf1 MbSlidespdfhttp://mirror.switch.ch/sucon-04/max_laier-pf_extended_introduction.avi94 MbVideo/MPEGavihttp://mirror.switch.ch/sucon-04/max_laier-pf_extended_introduction.mp322 MbAudio/MP3mp3Poul-Henning Kamp - Old mistakes repeated (but you do get the source code now)
UNIX is the best operating system ever designed so
everybody is running UNIX on their computer, right
? This presentation takes a partisan looks a why
UNIX never became a big success in the eighties,
failed to win the market in the nineties, and still
struggles in the market in the new millennium.
Poul-Henning will take a critical look at the
mistakes of the past and the mistakes of the present
and try to make it really clear what needs to happen
for UNIX to become a real success.
http://conferences.suug.ch/sucon/04/suugpresentationunixmistakespoul-henning kamphttp://www.suug.ch/sucon/04/slides/oldmistakes.pdf65 KbSlidespdfDCBSDCon 2009 - Photos
Photos of the 2009 DCBSDCon
http://www.flickr.com/photos/34727619@N03/dcbsdcondcbsdcon2009photosEuroBSDCon 2008 - Paeps Philip - How-to embed FreeBSD
This paper provides a how-to embed FreeBSD. A console
server built form an AT91RM9200 based ARM system
will be explored. This paper will talk about the
selection of hardware. It will explore creating
images for the target system, as well as concentrate
on different alternatives for deploying the system.
A number of different options exist today, and no
comprehensive guide for navigating through the
choices exists today. This paper will explore the
different alternatives that exist today for producing
images targeted at different size requirements. The
differing choices for storage in an embedded
environment are explored. The techniques used to
access rich debugging environments are discussed.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008embedfreebsdphilip paepshttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2828&type=oggOGG1 byte43 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2828&type=mp3MP31 byte43 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2828&type=pdfPDF1 byte17 pagespdfEuroBSDCon 2008 - George Neville-Neil - Multicast Performance in FreeBSD
In the past ten years most of the research in network
protocols has gone into TCP, leaving UDP to languish
as a local configuration protocol. While the majority
of Internet traffic is TCP, UDP remains the only
IP protocol that works over multicast and as such
has some specific, and interesting uses in some
areas of computing. In 2008 we undertook a study
of the performance of UDP multicast on both 1Gbps
and 10Gbps Ethernet networks in order to see if
changing the physical layer of the network would
give a linear decrease in packet latency. To measure
the possible gains we developed a new network
protocol test program, mctest, which is capable of
recording packet round trip times from many hosts
simultaneously and which we believe accurately
represents how many environments use multicast. The
mctest program has been integrated into FreeBSD and
is now being used to verify the proper operation
of multicast on various pieces of 10Gbps hardware.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008multicastfreebsdgeorge neville-neilhttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2827&type=oggOGG1 byte39 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2827&type=mp3MP31 byte39 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2827&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Pedro Giffuni - Working with Engineering Applications in FreeBSD
In recent years, traditional branches of engineering
like Civil, Chemical, Mechanical, Electrical and
Industrial Engineering are requiring extensive
computing facilities for their needs. Several well
known labs (Sandia, Lawrence Livermore) rely on
huge clusters to do all types of complex analysis
that were unthinkable a couple of decades ago. While
the free BSD variants share the environment with
traditional UNIX systems, frequently used for such
computations, it was not common to find adequate
free software packages to carry complex calculations.
Eventually commercial versions of important math
related packages started to appear for the Linux
platform. Even when the big packages were distant,
the BSDs learned and adapted in resourceful ways:
Matlab and Mathematica, running under Linux emulation,
demanded functionality from the BSDs and NetBSD
implemented a signal trampoline to be able to run
AutoCAD with IRIX binary compatibility. A notable
project that was always available under a free
license was Berkeley's Spice circuit analysis
program, however it was an exception rather than
the rule. Even when the scientific community pressed
for a while to get other important tools like NASA's
FEA package Nastran under a free license, the
objective of being able to access and enhance open
scientific tools was elusive. About a decade ago
the situation started to improve: FreeBSD's ports
system started growing exponentially, first with a
high content in the math category, afterwards with
a CAD section and after sustained growth in those
categories a science section was created. This
growth was mostly pushed by Universities and their
research projects and in general are not well known
with respect to the commercial counterparts. I
started porting math/engineering code for FreeBSD
around 1996. Back then it was absolutely unthinkable
for a Mechanical Engineer to depend only on FreeBSD
for it's daily work. The situation nowadays is
different: there are some very high quality engineering
analysis packages like EDF's Code Aster, with more
than 12 years of professional development, that
just can't be ignored. A Finite Element package,
like Code Aster, can easily cost 5000 US$, is priced
according to the maximum problem size it can solve,
can require yearly licenses, and is rarely available
with source code. In NASTRAN's case the source code
is only available for US citizens under a yearly
fee. Free software does have serious limitations
though; just like in office applications there are
proprietary CAD formats or sometimes the package
simply doesn't have the required functionality.
Having the sources, of course, always has the
advantage of being able to implement (or pay for)
some specific functionality you might need. Many
commercial packages have been recently ported to
Linux, but even when they gain some of the advantages
of an open environment they still have yet another
limitation: they have been very slow to make use
of the multicored features of the new processors
in the market, a huge limitation now that the speed
war between processors has been limited by the
overheating problem. The objective of the talk is
to give an overview of several CAD/CAE packages
that have been made available recently as part of
FreeBSD's ports system and the decisions that were
made to port them. BRLCAD and Varkon are two CAD
utilities that made a transition from closed source
to an open environment and in the process in the
process of getting ported to BSD have gained greater
portability and general "bug" fixes critical for
their consolidation as usable and maintainable
projects. There are also some tricks that have not
been well documented: it is possible to enable
threads and some extra optimizations on some packages,
and it is also possible to replace the standard
BLAS library with the faster GOTO BLAS without
rebuilding the package. It is also possible to build
the packages optimized for a clustered environment,
but perhaps what is most interesting of all is how
all the packages interrelate with each other and
can turn FreeBSD into a complete enginering
environment. No OS distribution so far is offering
all the engineering specific utilities offered
through FreeBSD's ports system: from design to
visualization, passing through analysis FreeBSD is
becoming an option that can't be ignored, and best
of all, it is an effort that will benefit not only
FreeBSD but the wider audience.
Pedro F. Giffuni M. Sc. Industrial Engineering -
University of Pittsburgh Mechanical Engineer -
Universidad Nacional de Colombia I was born in
Bogota, Colombia but I am an Italian citizen. My
experience with computers started when I was about
12 years old With the TRS-80 Color Computer first
using Basic and the OS-9. I studied electronics for
3 years but became tired of worrying about "whatever
happened to electrons in there" and moved to
Mechanical Engineering. For a while I rested from
the computer world until the Internet came stepping
along. I started using FreeBSD around 1995 and soon
fell in love with the idea of being able to install
a complete version of UNIX from the net with just
one floppy. After submitting a the 999th port to
the FreeBSD project Walnut Creek was kind enough
to give me a subscription for several years to
FreeBSD's CD-ROM. Since then I've been on and off
porting software packages or fixing the bugs I have
caused while porting them. Of course there has
always been great respect for the other BSDs and
their wonderful license and while I've given up on
the idea of one day seeing a "UnifiedBSD" I am glad
to see different approaches sharing ideas in a
healthful environment.
Keywords: BSD, engineering, CAE, CAD, math, mechanical,
FreeBSD ports
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008freebsdengineering applicationspedro giffunihttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2826&type=oggOGG1 byte51 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2826&type=mp3MP31 byte51 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2826&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Constantine Murenin - OpenBSD Hardware Sensors Framework
In this talk, we will discuss the past and present
history and the design principles of the OpenBSD
hardware sensors framework. Sensors framework
provides a unified interface for storing, registering
and accessing information about hardware monitoring
sensors. Sensor types include, but are not limited
to, temperature, voltage, fan RPM, time offset and
logical drive status. The framework spans
sensor_attach(9), sysctl(3), sysctl(8), sensorsd(8),
ntpd(8), snmpd(8) and more than 67 drivers, ranging
from I2C temperature sensors and Super I/O hardware
monitors to IPMI, RAID and SCSI enclosures. Several
third-party tools are also available, for example,
a plug-in for Nagios and ports/sysutils/symon.
Originally based on some ideas from NetBSD, the
framework has sustained many improvements in OpenBSD,
and was ported and committed to FreeBSD and DragonFly
BSD.
Constantine A. Murenin is an MMath graduate student
at the David R. Cheriton School of Computer Science
at the University of Waterloo (CA). Prior to his
graduate appointment, Constantine attended and
subsequently graduated from East Carolina University
(US) and De Montfort University (UK), receiving two
bachelor degrees in computer science, with honors
and honours respectively. A FreeBSD Google Summer
of Code 2007 Student, OpenBSD Committer and Mozilla
Contributor, Constantine's interests range from
standards compliance and usability at all levels,
to quiet computing and hardware monitoring.
http://Constantine.SU/http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008presentationopenbsdhardware sensorsconstantine mureninhttp://www.openbsd.org/papers/eurobsdcon2008-sensors.pdfPDF539395 bytes38 pagespdfEuroBSDCon 2008 - Ion-Mihai Tetcu - Improving FreeBSD ports/packages quality
This talk is focused on ways to improve the quality
of FreeBSD's ports and packages and it's partially
based on the 5 months experience of writing and
running the consecutive versions of "QA Tindy".
Ion-Mihai "IOnut" Tetcu is a 28 years old FreeBSD
ports committer and maintains about 40 ports scattered
in the Ports Tree. He lives in Bucharest, Romania
where he runs and co-owns an IT company and he's
a member of Romanian FreeBSD and FreeUnix User Group
(RoFUG). His non-IT interests include history,
philosophy and mountain climbing.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008freebsdportspackagesion-mihai tetcuhttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2824&type=oggOGG1 byte56 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2824&type=mp3MP31 byte56 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2824&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Yvan Vanhullebus - IPSec tools: past, present and future
The first part will explain what have been major
changes since Manu's presentation at Bale's EuroBSDCon,
including more detailed informations on changes
which have a significant impact on administrator's
bad habits (why the common way of doing it is bad,
why it was sometimes needed in the past, how to do
it the good way now, why this is far better), on
both the UserLand (ipsec-tools project) and maybe
in [Free|Net]BSD kernels/ IPSec stacks.
The second part will talk about the future of the
project. News of the next major version (which may
be out or about to be out when we'll be ate
EuroBSDCon), news works which are planned or which
are done but not yet public, but also news about
the team: it's new members, new tools, what we would
like to do in tue future, a
Yvan VANHULLEBUS works as an R&D security engineer
for NETASQ since 2000, where he works on FreeBSD
OS. He started to work on KAME's IPSec stack in
2001, provided many patches for various parts of
the stack, then became one of the maintainers of
ipsec-tools project, a fork of KAME's userland
daemon. He became a NetBSD developper when ipsec-tools
was migrated to NetBSD's CVS.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008ipsecyvan vanhullebushttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2823&type=oggOGG1 byte46 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2823&type=mp3MP31 byte46 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2823&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 Keynote - George Neville-Neil - Thinking about thinking codeEuroBSDCon 2008 Keynote - George Neville-Neil - Thinking about thinking codehttp://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008george neville-neilhttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2822&type=oggOGG1 byte37 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2822&type=mp3MP31 byte37 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2822&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Robert Watson - FreeBSD Network Stack Performance Optimizations for Modern Hardware
The arrival of high CPU core density, with commodity
quad-core notebooks and 32-core servers, combined
with 10gbps networking have transformed network
design principles for operating systems. This talk
will describe changes in the FreeBSD 6.x, 7.x, and
forthcoming 8.x network stacks required to exploit
multiple cores and serve 10gbps networks. The goal
of the session will be to introduce the audience
to general strategies used to improve performance,
their rationales, and their impact on applications
and users:
Introduction to the SMPng Project and the follow-on Netperf Project
Workloads and performance measurement
Efficient primitives to support modern network stacks
Multi-core and cache-aware network memory allocator
Fine-grained network stack locking
Load-balancing and contention-avoidance across multiple CPUs
CPU affinity for network stack data structures
TCP performance enhancements including TSO, LRO, and TOE
Zero-copy Berkely Packet Filter (BPF) buffers
Direct network stack dispatch from interrupt handlers
Multiple input and output queues
Robert Watson is a researcher at the University of
Cambridge Computer Laboratory investinging operating
system and network security. Prior to joining the
Computer Laboratory to work on a PhD, he was Senior
Principal Scientist at McAfee Research, now SPARTA
ISSO, a leading security research and development
organization, directing government and commercial
research contracts for customers that include DARPA,
the US Navy, and Apple Computer. His research
interests include operating system security, network
stack structure and performance, and windowing
system structure. He is also a member of the FreeBSD
Core Team and president of the FreeBSD Foundation.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008freebsdnetwork stackhardwarerobert watsonhttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2821&type=oggOGG1 byte53 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2821&type=mp3MP31 byte53 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2821&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Martin Schuette - Improved NetBSD Syslogd
Martin Schuette has three main goals, defined by three
internet drafts to implement:
TLS transport is the most obvious improvement: it
provides a reliable network transport with data encryption
and peer authentication. To make full use of this a
buffering mechanism to bridge temporary network errors
is implemented as well.
Syslog-protocol extends the message format to use
a complete timestamp, include a fully qualified domain
name, and allow UTF-8 messages. It also offers a
structured data field to unambiguously encode application
dependent information.
Syslog-sign will allow any syslog sender to digitally
sign its messages, so their integrity can be verified
later. This enable the detection of loss, deletion or
other manipulation syslog data after network transfer
or archiving on storage media.
Martin Schuette is a student of computer science in
Potsdam, Germany, and has been working as a part-time
system administrator for BSD servers since 2004.
In 2007 Martin Schuette already gave a talk on Syslog
at the Chemnitze Linux-Tage
(http://chemnitzer.linux-tage.de/2007/vortraege/detail.html?idx=547
in german; for a newer english version see these slides
for a seminar talk:
http://fara.cs.uni-potsdam.de/~mschuett/uni/syslog-protocols-080522.pdf).
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008netbsdsyslogdmartin schuettehttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2820&type=oggOGG1 byte42 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2820&type=mp3MP31 byte42 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2820&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Aggelos Economopoulos - An MP-capable network stack for DragonFlyBSD with minimal use of locks
Given the modern trend towards multi-core shared
memory multiprocessors, it is inconceivable for
production OS kernels not to be reentrant. The
typical approach for allowing multiple execution
contexts to simultaneously execute in kernel mode
has been to use fine-grained locking for synchronising
access to shared resources. While this technique
has been proven efficient, empirical evidence
suggests that the resulting locking rules tend to
be cumbersome even for the experienced kernel
programmer, leading to bugs that are hard to diagnose.
Moreover, scaling to more processors requires
extensive use of locks, which may impose unnecessary
locking overhead for small scale multiprocessor
systems. This talk will describe the typical approach
and then discuss the alternative approach taken in
the DragonFlyBSD network stack. We will give an
overview of the various protocol threads employed
for network I/O processing and the common-case code
paths for packet reception and transmission.
Additionally, we'll need to make a passing reference
to DragonFlyBSD's message passing model. This should
establish a baseline, allowing us to focus on the
recent work by the author to eliminate use of the
Big Giant Lock in the performance-critical paths
for the TCP and UDP protocols. The decision to
constrain this work on the two by far most widely-used
transport protocols was made in order to (a) limit
the amount of work necessary and (b) explore the
effectiveness of the approach on the cases that
matter at this point in time.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008dragonflybsdmpnetwork stackaggelos economopouloshttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2817&type=oggOGG1 byte42 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2817&type=mp3MP31 byte42 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2817&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Edd Barret - Modern Typesetting on BSD
Edd Barrett will speak about using the BSD Platform
as a means of typesetting from a practical standpoint
at EuroBSDcon 2008. Edd Barrett does not wish to
go into the technicalities of each typesetter, but
rather state which are good for certain types of
document, and which tools (ports and packages),
integrate well with the available typesetters.
Edd Barrett os a student from the UK, currently on
"placement year" as a systems administrator for
Bournemouth University. Open Source *NIX has been
his platform of choice for many years and he has
been using OpenBSD for about 3 years now, simply
because it is small, clean, correct and secure.
Just recently he has started developing things I
want or need for OpenBSD.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008typesettingbsdedd barretthttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2816&type=oggOGG1 byte33 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2816&type=mp3MP31 byte33 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2816&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Michael Dexter - Zen and the Art of Multiplicity Maintenance: An applied survey of BSD-licensed multiplicity strategies from chroot to mult
Many BSD-licensed strategies of various levels of
maturity exist to implement multiplicity, herein
defined as the introduction of plurality to
traditionally singular computing environments via
isolation, virtualization, or other method. For
example, the chroot utility introduces an additional
isolated root execution environment within that of
the host; or an emulator provides highly-isolated
virtual systems that can run complete native or
foreign operating systems. Motivations for multiplicity
vary, but a demonstrable desire exists for users
to obtain root or run a foreign binary or operating
system. We propose a hands-on survey of portable
and integrated BSD-licensed multiplicity strategies
applicable to the FreeBSD, OpenBSD, DragonFlyBSD
and NetBSD operating systems on the i386 architecture.
We will also address three oft-coupled disciplines:
software storage devices, the installation of
operating system and userlands in multiplicity
environments plus the management of select multiplicity
environments. Finally we will comment on each
strategies potential limits of isolation, compatibility,
independence and potential overhead in comparison
to traditional systems. Keywords: multiplicity,
virtualization, chroot, jail, hypervisor, xen,
compat.
Michael Dexter has used Unix systems since 1991 and
BSD-licensed multiplicity strategies for over five
years. He is the Program Manager at the BSD Fund
and Project Manager of the BSD.lv Project.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008bsdmichael dexterhttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2815&type=oggOGG1 byte38 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2815&type=mp3MP31 byte38 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2815&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Nick Barkas - Dynamic memory allocation for dirhash in UFS2
Hello My name is Nick Barkas. I'm a master's student
studying scientific computing at Kungliga Tekniska
hgskolan (KTH) in Stockholm, Sweden. I have just
begun work on a Google Summer of Code project with
FreeBSD: Dynamic memory allocation for dirhash in
UFS2 . I would like to present my results from
this project at EuroBSDCon this year. This project
is very much a work in progress now so it is a bit
difficult to summarize what I would ultimately
present. I will try to describe an outline, though.
First I will give background information on dirhash:
an explanation of the directory data structure in
UFS2, how directory lookups in this structure
necessitate a linear search, and how dirhash speeds
these lookups up without having to change anything
about the directory data structure. Next I will
explain the current limitation that dirhash's maximum
memory use must be manually specified by administrators,
or left at a small conservative default of 2MB. I
will explain some different methods I will have
explored to try and make this maximum memory limit
dynamically increase and decrease as the system has
more or less free memory, and which method I will
have ultimately settled on and implemented. Then
I'll present some test results of performance of
operations on very large directories with and without
dynamic memory allocation enabled for dirhash. Next
I will talk about how speed gains from dirhash are
limited by the fact that the hash tables exist only
in memory and must be recreated after each system
boot, as big directories are scanned for the first
time, or even have to be recreated for a directory
that has not been scanned in some time if its dirhash
has been discarded to free memory. These problems
can be eliminated by using an on-disk index for
directory entries. I will talk about some of the
challenges of implementing on-disk indexing, such
as remaining backwards compatible with older versions
of UFS2 and interoperating properly with softupdates.
Then, if my SoC project has permitted me time to
work on this aspect of it, I will explain some
possible methods for adding directory indexing to
UFS2 that meets these challenges, and which of those
ideas I will have implemented. Finally I will present
results of some benchmarks on this filesystem with
indices, and compare to performance with dirhash,
and with no indices or dirhashes.
Keywords: dirhash, ufs2, filesystems, performance tuning
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008ufs2nick barkashttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2814&type=oggOGG1 byte32 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2814&type=mp3MP31 byte32 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2814&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Paul Richards - eXtreme Programming: FreeBSD a case study
Traditional project management methodologies are
typically based on the waterfall model where there
are distinct phases: requirements capture, design,
implementation, testing, delivery. Once a project
has moved on to the next phase there is no going
back. The end result is often a late project that
no-one wants anymore because the requirements have
fundamentally changed by the time the project is
delivered.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008freebsdextreme programmingpaul richardshttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2813&type=oggOGG1 byte54 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2813&type=mp3MP31 byte54 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2813&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Hauke Fath - Managing BSD desktop clients - Fencing in the herd
The members of the BSD family have traditionally
prospered off the desktop, as operating systems on
servers and embedded systems. The advent of MacOS
X has marked a change, and moved the desktop more
into focus. Modern desktop systems create a richer
software landscape, with more diverse requirements,
than their server counterparts. User demands,
software package interdependencies and frequent
security issues result in a change rate that can
put a considerable load on the admin staff. Without
central management tools, previously identical
installations diverge quickly. This paper looks at
concepts and strategies for managing tens to hundreds
of modern, Unix-like desktop clients. The available
management tools range from simple, image-based
software distribution, mainly used for setting up
uniform clients, to "intelligent" rule-based engines
capable of search-and-replace operations on
configuration files. We will briefly compare their
properties and limitations, then take a closer look
at Radmind, a suite for file level administration
of Unix clients. Radmind has been in use in the
Institute of Telecommunication at Technische
Universitt Darmstadt for over three years, managing
NetBSD and Debian Linux clients in the labs as well
as faculty members' machines. We will explore the
Radmind suite's underlying concepts and functionality.
In order to see how the concept holds up, we will
discuss real-world scenarios from the system
life-cycle of Installation, configuration changes,
security updates, component updates, and system
upgrades.
Hauke Fath works as a systems administrator for the
Institut fr Nachrichtentechnik (telecommunication)
at Technische Universitt Darmstadt. He has been
using NetBSD since 1994, when he first booted a
NetBSD 1.0A kernel on a Macintosh SE/30. NetBSD
helped shaping his career by causing a slow drift
from application programmer's work towards systems
and network administration. Hauke Fath holds a MS
in Physics and became a NetBSD developer in late
2006.
Keywords: Managing Unix desktop clients, software
distribution, tripwire
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008bsddesktophauke fathhttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2812&type=oggOGG1 byte50 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2812&type=mp3MP31 byte50 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2812&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Joerg Sonnenberger - Sleeping beauty - NetBSD on Modern Laptops
This paper discusses the NetBSD Power Management
Framework (PMF) and related changes to the kernel.
The outlined changes allow NetBSD to support essential
functions like suspend-to-RAM on most post-Y2K X86
machines. They are also the fundation for intelligent
handling of device activity by enabling devices
on-demand. This work is still progressing. Many of
the features will be available in the up-coming
NetBSD 5.0 release The NetBSD kernel is widely
regarded to be one of the cleanest and most portable
Operating System kernels available. For various
reasons it is also assumed that NetBSD only runs
well on older hardware. In the summer of 2006 Charles
Hannum, one of the founders of NetBSD, left with a
long mail mentioning as important issues the lack
of proper power management and suspendto- RAM
support. One year later, Jared D. McNeill posted a
plan for attacking this issue based on ideas derived
from the Windows Driver Model. This plan would
evolve into the new NetBSD Power Management Framework
(PMF for short).
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008netbsdlaptopsjoerg sonnenbergerhttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2811&type=oggOGG1 byte54 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2811&type=mp3MP31 byte54 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2811&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Brooks Davis - Isolating cluster jobs for performance and predictability
The Aerospace Corporation operates a federally
funded research and development center in support
of national-security, civil and commercial space
programs. Many of our 2400+ engineers use a variety
of computing technologies to support their work.
Applications range from small models which are
easily handled by desktops to parameter studies
involving thousands of cpu hours and traditional,
large scale parallel codes such as computational
fluid dynamics and molecular modeling applications.
Our primary resources used to support these large
applications are computing clusters. Our current
primary cluster, the Fellowship cluster consists
of 352 dual-processor nodes with a total of 14xx
cores. Two additional clusters, beginning at 150
dual-processor nodes each are being constructed to
augment Fellowship. As in In any multiuser computing
environment with limited resources, user competition
for resources is a significant burden. Users want
everything they need to do their job, right now.
Unfortunately, other users may need those resources
at the same time. Thus, systems to arbitrate this
resource contention are necessary. On Fellowship
we have deployed the Sun Grid Engine scheduler which
scheduled batch jobs across the nodes. In the next
section we discuss the performance problems that
can occur when sharing resources in a high performance
computing cluster. We then discuss range of
possibilities to address these problems. We then
explain the solutions we are investigating and
describe our experiments with them. We then conclude
with a discussion of future work.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008freebsdclusterbrooks davishttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2810&type=oggOGG1 byte51 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2810&type=mp3MP31 byte51 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2810&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Russel Sutherland - UTORvpn: A BSD based VPN service for the masses
The University of Toronto is a large educational
institutional with over 70,000 students and 10,000
staff and faculty. For the past three years, we
have developed and implemented a ubiquitous VPN
service, based up on OpenVPN and FreeBSD. The service
has over 3000 active customers, with up to 35
simultaneous users. The system supports, Linux, Mac
OS X and Windows XP/Vista/2000 clients. Tools have
been developed to create a central CA which enables
users to log in to a secure server and get their
customized client, certificates and configuration.
The NSIS installer is used to generate the customized
windows installers. Similar packages are generated
for the various Unix based clients. Additional
WWW/PHP based tools, have been developed to monitor
and log usage of the service, using standard graphs,
alarms for excessive use and a certificate revocation
mechanism. The system has been integrated into the
local identity management system (Kerberos/LDAP)
in order to authorize and authenticate users upon
initiation and per session usage. All code is Open
Source and freely available.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008freebsdvpnrussel sutherlandhttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2808&type=oggOGG1 byte52 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2808&type=mp3MP31 byte52 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2808&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - George Neville-Neil - Four years of summer of code
The Google Summer of Code is a program designed to
provide students with real world experience
contributing to open source projects during the
summer break in university studies. Each year Google
selects a number of open source projects to act as
mentoring organizations. Students are invited to
submit project proposals for the open source projects
that are most interesting to them. FreeBSD was one
of the projects selected to participate in the
inaugural Summer of Code in 2005 and we have
participated each year since then. Over the past 4
years a total of 79 students have participated in
the program and it has become a very significant
source of new committers to FreeBSD. This talk will
examine in detail the selection criteria for projects,
the impact that successful projects have had, and
some suggestions for how we can better leverage
this program in the future.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008google socgeorge neville-neilhttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2807&type=oggOGG1 byte27 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2807&type=mp3MP31 byte27 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2807&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Anttii Kantee - Converting kernel file systems to services
ABSD/UNIX operating system is traditionally split
into two pieces: the kernel and userspace. Historically
the reasons for this were clear: the UNIX kernel
was a simple entity. However, over time the kernel
has grown more and more complex. Currently, most
of the same functionality is available both in
userspace and the kernel, but under different names.
Examples include synchronization routines and
threading support. For instance, to lock a mutex
in the NetBSD kernel, the call is mutex_enter(),
while in userspace the routine which does exactly
the same thing is known as pthread_mutex_enter().
Taking another classic example, a BSD style OS has
malloc()/free() available both in userspace and the
kernel, but with different linkage (the kernel
malloc interface is currently being widely deprecated,
though). This imposes a completely arbitrary division
between the kernel and userspace. Most functionality
provided by an opearating system should be treated
as a service instead of explicitly pinning it down
as a userspace daemon or a kernel driver. Currently,
due to the arbitrarily difference in programming
interface names, functionality must be explicitly
ported between the kernel and userspace if it is
to run in one or the other environment. By unifying
the environments where possible, the arbitrary
division is weakened and porting between these
environments becomes simpler.
Antti Kantee has been a NetBSD developer for many
many moons. He has managed to work on quite a few
bits and pieces of a BSD system: userland utilities,
the pkgsrc packaging system, networking, virtual
memory, device drivers, hardware support and file
systems.
See also http://www.netbsd.org/docs/puffs/rump.htmhttp://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008anttii kanteehttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2806&type=oggOGG1 byte55 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2806&type=mp3MP31 byte55 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2806&type=pdfPDF1 byten pagespdfEuroBSDCon 2008 - Matthieu Herrb - Input handling in wscons and X.Org
This talk will present the different layers that
handle input, from the key that gets pressed or the
mouse motion to the applications, all the way through
the kernel drivers, X drivers and libraries, in the
case of the OpenBSD/NetBSD wscons driver and the
current and future X.Org server. It will cover stuff
like keyboard mappings, touch-screen calibration,
multi-pointer X or input coordinates transformations.
It will show some problems of current implementations
and try to show how current evolutions can solve
them.
Matthieu Herrb is maintaing X on OpenBSD. I've been
using X on various systems (SunOS, NetBSD, OpenBSD,
Mac OS X,...) since 1989. He has been a member of
the XFree86 Core Team for a short period in 2003
and is now a member of the X.Org Foundation BoD.
Matthieu Herrb works at LAAS a research laborarory
of the French National Research Agency (CNRS) both
on robotics and network security.
http://2008.eurobsdcon.org/talks.htmleurobsdconeurobsdcon2008wsconsx.orgmatthieu herrbhttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2805&type=oggOGG1 byte57 minutesogghttp://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2805&type=mp3MP31 byte57 minutesmp3http://audiovideocours.u-strasbg.fr/avc/courseaccess?id=2805&type=pdfPDF1 byten pagespdfEuroBSDCon 2007 Videoshttp://misc.allbsd.de/Vortrag/EuroBSDCon_2007/EuroBSDCon 2007 Paperseurobsdconeurobsdcon2007videoshttp://video.eurobsdcon.dk/2007/AnttiKanteeAndAlistairCrooks.EuroBSDCon.2007.aviAntti Kantee - ReFUSE: Userspace FUSE Reimplementation Using puffs197 Mbavirefuseantti kanteeBrooksDavis.EuroBSDCon.2007.aviBrooks Davis - Using FreeBSD to Promote Open Source Development Methods92 Mbavipromotionfreebsdbrooks davisClaudioJeker.EuroBSDCon.2007.aviClaudio Jeker - Routing on OpenBSD394 Mbaviroutingopenbsdclaudio jekerGeorgeNeville-Neil.EuroBSDCon.2007.aviGeorge Neville-Neil - Network Protocol Testing in FreeBSD and in General271 Kbavinetwork testingfreebsdgeorge neville-neilJohnHartmann.EuroBSDCon.2007.aviJohn P Hartmann - Real Men's Pipes - When UNIX meets the mainframe mindset315 Mbavipipesunixmainframesjohn p hartmannMarshallKirkMcKusick.EuroBSDCon.2007.aviKirk Mckusick - A Brief History of the BSD Fast Filesystem251 Mbavifast file systemkirk mckusickPawelJakubDawidek.EuroBSDCon.2007.aviPawel Jakub - FreeBSD/ZFS - last word in operating/file systems203 Mbavizfsfreebsdpawel jakubPierre-YvesRitschard.EuroBSDCon.2007.aviPierre Yves Ritschard - Load Balancing219 Mbaviload balancingpierre yves ritschardRyanBickhart.EuroBSDCon.2007.aviRyan Bickhart - Transparent TCP-to-SCTP Translation Shim Layer376 Mbavitcp-to-sctpfreebsdryan bickhartSorenStraarup.EuroBSDCon.2007.aviSoren Straarup - An ARM from shoulder to hand141 Mbaviarmsoren straarupSam-eurobsdcon-large.movSam Leffler - Long Distance Wireless (for Emerging Regions)248 Mbmovsam lefflerSamSmith.EuroBSDCon.2007.aviSam Smith - Fighting "Technical fires"147 Mbavisam smithSimonLNielsen.EuroBSDCon.2007.aviSimon L Nielsen - The FreeBSD Security Officer function195 Kbavifreebsdsecurity officersimon l nielsenStephenBorrill.EuroBSDCon.2007.aviStephen Borrill - Building products with NetBSD - thin-clients364 Mbavinetbsdthin clientsstephen borrillStevenMurdoch.EuroBSDCon.2007.aviSteven Murdoch - Hot or Not: Fingerprinting hosts through clock skew235 Mbavifinger printingclocksSteven MurdochYvanVanhullebus.EuroBSDCon.2007.aviYvan VanHullebus - NETASQ and BSD: a success story382 Mbavinetasqyvan vanhullebusGregersPetersen.EuroBSDCon.2007.aviGregers Petersen - Open Source - is it something new?285 Mbaviopen sourcegregers petersenEuroBSDCon 2007 Papershttp://2007.eurobsdcon.org/presentations/EuroBSDCon 2007 Paperseurobsdconeurobsdcon2007papershttp://misc.allbsd.de/Vortrag/EuroBSDCon_2007/Antti_Kantee/refuse.pdfAntti Kantee - ReFUSE: Userspace FUSE Reimplementation Using puffs102 Kbpdfrefuseantti kanteeBrooks_Davis/davis-eurobsdcon2007.pdfBrooks Davis - Using FreeBSD to Promote Open Source Development Methods989 Kbpdfpromotionfreebsdbrooks davisBrooks_Davis/eurobsdcon2007-cluster-tutorial.pdfBrooks Davis - Building clusters with FreeBSD2.2 Mbpdfclustersfreebsdbrooks davisClaudio_Jeker/routing_on_openbsd.tarClaudio Jeker - Routing on OpenBSD1.3 Mbtarroutingopenbsdclaudio jekerGeorge_Neville-Neil/EuroBSD2007.pdfGeorge Neville-Neil - Network Protocol Testing in FreeBSD and in General251 Kbpdfnetwork testingfreebsdgeorge neville-neilIsaac_Levy/ike-jail-with_SRC.tbzIsaac Levy - FreeBSD jail(8) Overview, the Secure Virtual Server120 Mbjailfreebsdisaac levyJohn_P_Hartmann/fbsd2007.odpJohn P Hartmann - Real Men's Pipes - When UNIX meets the mainframe mindset382 Kbodppipesunixmainframesjohn p hartmannJohn_P_Hartmann/pipjarg.pdfJohn P Hartmann - CMS Pipelines Explained118 Kbpdfcms pipesjohn p hartmannKirk_Mckusick/talk.pdfKirk Mckusick - A Brief History of the BSD Fast Filesystem145 Kbpdffast file systemkirk mckusickMarc_Balmer/radio_clocks.pdfMarc Balmer - Supporting Radio Clocks in OpenBSD304 Kbpdfradio clocksopenbsdmarc balmerMarko_Zec/TUTORIAL.PDFMarko Zec - Network stack virtualization for FreeBSD 7.0401 Kbpdfnetwork stackvirtualizationfreebsdmarko zecPawel_Jakub_Dawidek/eurobsdcon07_zfs.pdfPawel Jakub - FreeBSD/ZFS - last word in operating/file systems337 Kbpdfzfsfreebsdpawel jakubPeter_Hansteen/pf-firewall.pdfPeter Hansteen - Firewalling with OpenBSD's PF packet filter531 Kbpdfpfopenbsdpeter hansteenPierre_Yves_Ritschard/loadbalancin.tgzPierre Yves Ritschard - Load Balancing23 Kbhtmlload balancingpierre yves ritschardRobert_Watson/20070914-security-features.pdfRobert Watson - FreeBSD Advanced Security Features152 Kbpdfsecurityfreebsdrobert watsonRyan_Bickhart/Ryan_Bickhart.pdfRyan Bickhart - Transparent TCP-to-SCTP Translation Shim Layer491 Kbpdftcp-to-sctpfreebsdryan bickhartRyan_Bickhart/Ryan_Bickhart.pptRyan Bickhart - Transparent TCP-to-SCTP Translation Shim Layer692 Kbppttcp-to-sctpfreebsdryan bickhartS%f8ren_Straarup/arm_from_hand_to_shoulder_eurobsdcon_2007.pdfSoren Straarup - An ARM from shoulder to hand307 Kbpdfarmsoren straarupSam_Leffler/EuroBSDCon2007.pdfSam Leffler - Long Distance Wireless (for Emerging Regions)19 Mbpdfsam lefflerSam_Smith/eurobsdcon-talk.pdfSam Smith - Fighting "Technical fires"1.4 Mbpdfsam smithSimon_L_Nielsen/freebsd-so-function-eurobsdcon-2007.pdfSimon L Nielsen - The FreeBSD Security Officer function251 Kbpdffreebsdsecurity officersimon l nielsenStephen_Borrill/eurobsdcon.pdfStephen Borrill - Building products with NetBSD - thin-clients407 Kbpdfnetbsdthin clientsstephen borrillSteven_Murdoch/eurobsdcon07hotornot.pdfSteven Murdoch - Hot or Not: Fingerprinting hosts through clock skew6.1 Mbpdffinger printingclocksSteven MurdochYvan_VanHullebus/2007-09-15-NETASQ-BSD-pub.pdfYvan VanHullebus - NETASQ and BSD: a success story2.4 Mbpdfnetasqyvan vanhullebusEuroBSDCon 2007 Photoshttp://www.flickr.com/photos/tags/eurobsdcon2007/EuroBSDCon 2007 Photos by various peopleeurobsdconeurobsdcon2007photosflickrhttp://www.flickr.com/photos/edkikkert/sets/72157602007517635/Ed Kikkert - EuroBSDCon 2007 taken place in Copenhagen, Denmark 14-15 September 2007 at the Symbion Science Parked kikkerthttp://www.flickr.com/photos/tom_snow/sets/72157602050540536/Tom (Snow) - Foto's taken bij Tom and Robert of www.snow.nltom snowhttp://www.flickr.com/photos/rickvanderzwet/sets/72157602002839498/Rick van der Zwetrick van der zwethttp://www.flickr.com/photos/13801854@N02/sets/72157602081330565/Peternmhansteenpeternmhansteenhttp://www.flickr.com/photos/12884927@N07/sets/72157601996279923/Eystein.aarseth - Photos from EuroBSDCon in Copenhagen, Denmark, september 2007eystein aarsethAndre Opperman - The papers I write for EuroBSDCon 05
The papers I write for EuroBSDCon 05 on New Networking
Feature in FreeBSD 6.0 and Optimizing FreeBSD IP
and TCP in 7-CURRENT
https://people.FreeBSD.org/~andre/eurobsdconeurobsdcon2005paperfreebsdnetworkingandre oppermanhttps://people.FreeBSD.org/~andre/New%20Networking%20Features%20in%20FreeBSD%206.pdf92 KbNew Networking Features in FreeBSD 6pdfOptimizing%20the%20FreeBSD%20IP%20and%20TCP%20Stack.pdf1 MbOptimizing the FreeBSD IP and TCP StackpdfThe presentation I gave at SUCON 04
The presentation I gave at SUCON 04 on 2nd September
2004 about enhancements/changes in FreeBSD 5.3
Networking Stack.
suconpresentationfreebsdnetworkingandre oppermanhttps://people.FreeBSD.org/~andre/FreeBSD-5.3-Networking.pdf115 KbFreeBSD-5.3-Networking.pdfpdfAsiaBSDCon 2009 Paper List
Papers of the AsiaBSDCon 2009
http://2009.asiabsdcon.org/papers/asiabsdconasiabsdcon2009http://2009.asiabsdcon.org/papers/abc2009-P1A-paper.pdf351 Kb9 pagesPC-BSD - Making FreeBSD on the Desktop a reality by Kris Moorepdfpaperfreebsdpcbsdkris mooreabc2009-P1B-paper.pdf58 Kb3 pagesCrypto Acceleration on FreeBSD by Philip Paepspdfpapercrypto accelerationfreebsdphilip paepsabc2009-P2A-paper.pdf401 Kb6 pagesOpenBGPD - Bringing full views to OpenBSD since 2004 by Claudio Jekerpdfpaperopenbgpdopenbsdclaudio jekerabc2009-P2B-paper.pdf359 Kb12 pagesFreeBSD on high performance multi-core embedded PowerPC systems - Rafal Jaworowskipdfpaperfreebsdhigh performancerafal jaworowskiabc2009-P3A-paper.pdf662 Kb7 pagesIsolating Cluster Users (and Their Jobs) for Performance and Predictability by Brooks Davispdfpaperclustersbrooksdavisabc2009-P3B-paper.pdf245 Kb14 pagesOpenBSD Hardware Sensors Framework by Constantine A. Mureninpdfpaperopenbsdhardware sensorsconstantine mureninabc2009-P4A-paper.pdf753 Kb4 pagesFreeBSD and SOI-Asia Project Mohamad by Dikshie Fauziepdfpaperfreebsddikshie fauzieabc2009-P4B-paper.pdf67 Kb8 pagesAn Overview of FreeBSD/mips by M. Warner Loshpdfpaperfreebsdmipswarner loshabc2009-P5A-paper.pdf213 Kb10 pagesEnvironmental Independence: BSD Kernel TCP/IP in Userspace by Antti Kanteepdfpapertcpipantti kanteeabc2009-P5B-paper.pdf154 Kb20 pagesActive-Active Firewall Cluster Support in OpenBSD by David Gwynnepdfpaperfirewall clusteropenbsddavid gwynneabc2009-P6A-paper.pdf55 Kb7 pagesThe Locking Infrastructure in the FreeBSD kernel by Attilio Raopdfpaperlockingfreebsdattilio Raoabc2009-P6B-paper.pdf114 Kb8 pagesDeprecating groff for BSD manual display by Kristaps Dzonsonspdfpapergroffkristaps dzonsonsabc2009-P7B-paper.pdf150 Kb3 pagesMail system for distributed network by Andrey Zakharchenkopdfpapermailandrey zakharchenkoAsiaBSDCon 2008 Paper List
Papers of the AsiaBSDCon 2007
http://2008.asiabsdcon.org/papers/asiabsdconasiabsdcon2008http://2008.asiabsdcon.org/papers/abc2008-proc-cover.pdf467 KbCover pagepdfpapercoverabc2008-proc-all.pdf9.3 MbWhole of the proceedingspdfpaperP1A-paper.pdf6.4 MbPC-BSD: FreeBSD on the Desktop, Matt Olander (iXsystems)pdfpaperpc-bsdfreebsddesktopmatt olanderP1B-paper.pdf94 KbTracking FreeBSD in a Commercial Setting, M. Warner Losh (Cisco Systems, Inc.)pdfpaperfreebsdwarner loshP3A-paper.pdf92 KbGaols: Implementing Jails Under the kauth Framework, Christoph Badura (The NetBSD Foundation)pdfpapernetbsdjailskauthchristoph baduraP3B-paper.pdf526 KbBSD implementations of XCAST6, Yuji IMAI, Takahiro KUROSAWA, Koichi SUZUKI, Eiichi MURAMOTO, Katsuomi HAMAJIMA, Hajimu UMEMOTO, and Nobuo KAWAGUTI (XCAST fan club, Japan)pdfpaperbsdxcast6yuji imaitakahiro kurosawakoichi suzukieiichi muramotokatsuomi hamajimahajimu umemotonobuo kawagutiP4A-paper.pdf483 KbUsing FreeBSD to Promote Open Source Development Methods, Brooks Davis, Michael AuYeung, Mark Thomas (The Aerospace Corporation)pdfpaperfreebsdpromotionbrooks davidmichael auyeungmark thomasP4B-paper.pdf126 KbSend and Receive of File System Protocols: Userspace Approach With puffs, Antti Kantee (Helsinki University of Technology, Finland)pdfpaperpuffsantti kanteeP5A-paper.pdf97 KbLogical Resource Isolation in the NetBSD Kernel, Kristaps Dzonsons (Centre for Parallel Computing, Swedish Royal Institute of Technology) pdfpapernetbsdresourceskristaps dzonsonsP5B-paper.pdf91 KbGEOM --- in Infrastructure We Trust, Pawel Jakub Dawidek (The FreeBSD Project) pdfpaperfreebsdgeompawel jakub dawidekP6A-paper.pdf341 KbA Portable iSCSI Initiator, Alistair Crooks (The NetBSD Foundation)pdfpapernetbsdiscsialistair crooksP8A-paper.pdf410 KbOpenBSD Network Stack Internals, Claudio Jeker (The OpenBSD Project)pdfpaperopenbsdnetwork stackclaudio jekerP8B-paper.pdf72 KbReducing Lock Contention in a Multi-Core System, Randall Stewart (Cisco Systems, Inc.)pdfpaperfreebsdlock contentionsmprandall stewartP9A-paper.pdf87 KbSleeping Beauty --- NetBSD on Modern Laptops, Jorg Sonnenberger, Jared D. McNeill (The NetBSD Foundation)pdfpapernetbsdlaptopsjorg sonnenbergerjared d mcneillAsiaBSDCon 2007 Paper/Slides List
Slides and papers of the AsiaBSDCon 2007
http://2007.asiabsdcon.org/papers/asiabsdconasiabsdcon2007http://2007.asiabsdcon.org/papers/abc2007-proc-cover.pdf588 KbCover pagepdfpapercoverabc2007-proc-all.pdf6.5 MbWhole of the ProceedingspdfpaperP01-paper.pdf412 KbA NetBSD-based IPv6 NEMO Mobile Router, Jean Lorchat, Koshiro Mitsuya, Romain Kuntz (Keio University, Japan) [paper]pdfpapernetbsdipv6nemojean lorchatkoshiro mitsuyaromain kuntzP02-paper.pdf1371 KbReflections on Building a High Performance Computing Cluster Using FreeBSD, Brooks Davis (The Aerospace Corporation/brooks at FreeBSD.org, USA) [paper]pdfpaperfreebsdhigh performance computingbrooks davisP03-paper.pdf86 KbSupport for Radio Clocks in OpenBSD, Marc Balmer (mbalmer at openbsd.org, Switzerland) [paper]pdfpaperopenbsdradio clocksmarc balmerP04-paper.pdf68 Kbpuffs - Pass to Userspace Framework File System, Antti Kantee (Helsinki University of Technology, Finland) [paper]pdfpaperpuffsantii kanteeP04-slides.pdf116 Kbpuffs - Pass to Userspace Framework File System, Antti Kantee (Helsinki University of Technology, Finland) [slides]pdfslidespuffsantii kanteeP05-paper.pdf140 KbAn ISP Perspective, jail(8) Virtual Private Servers, Isaac Levy (NYC*BUG/LESMUUG, USA) [paper]pdfpaperfreebsdjailispisaac levyP05-slides.pdf20 MbAn ISP Perspective, jail(8) Virtual Private Servers, Isaac Levy (NYC*BUG/LESMUUG, USA) [slides]pdfslidesfreebsdjailispisaac levyP06-paper.pdf32 KbNsswitch Development: Nss-modules and libc Separation and Caching, Michael A Bushkov (Southern Federal University/bushman at FreeBSD.org, Russia) [paper]pdfpapernsswitchmichael bushkovP08-paper.pdf328 KbHow the FreeBSD Project Works, Robert N M Watson (University of Cambridge/rwatson at FreeBSD.org, United Kingdom) [paper]pdfpaperfreebsdfreebsd projectrobert watsonP10-paper.pdf311 KbSHISA: The Mobile IPv6/NEMO BS Stack Implementation Current Status, Keiichi Shima (Internet Initiative Japan Inc., Japan), Koshiro Mitsuya, Ryuji Wakikawa (Keio University, Japan), Tsuyoshi Momose (NEC Corporation, Japan), Keisuke Uehara (Keio University, Japan) [paper]pdfpaperipv6nemokeiichi shimakoshiro mitsuyaryuji wakikawatsoyoshi momosekeisuke ueharaP11-slides.pdf601 KbBluffs: BSD Logging Updated Fast File System, Stephan Uphoff (Yahoo!, Inc./ups at FreeBSD.org, USA) [slides]pdfslidesbluffsstephan uphoffP12-paper.pdf1071 KbImplementation and Evaluation of the Dual Stack Mobile IPv6, Koshiro Mitsuya, Ryuji Wakikawa, Jun Murai (Keio University, Japan) [paper]pdfpaperipv6koshiro mitsuyaryuji wakikawajun muraiP15-paper.pdf97 KbSecurity Measures in OpenSSH, Damien Miller (djm at openbsd.org, Australia) [paper]pdfpaperopensshdamien millerP16-paper.pdf96 KbPorting the ZFS File System to the FreeBSD Operating System, Pawel Jakub Dawidek (pjd at FreeBSD.org, Poland) [paper]pdfpaperfreebsdzfspawel jakub dawidekP16-slides.pdf278 KbPorting the ZFS File System to the FreeBSD Operating System, Pawel Jakub Dawidek (pjd at FreeBSD.org, Poland) [slides]pdfslidesfreebsdzfspawel jakub dawidekRobert Watson's Slides from EuroBSDCon 2004
Robert Watson will describe the design and application
of the TrustedBSD MAC Framework, a flexible kernel
security framework developed on FreeBSD, and recently
experimentally ported to Apple's Darwin operating
system. The MAC Framework permits loadable access
control kernel modules to be loaded, modifying the
security behavior of the operating system, including
SEBSD, a port of the SELinux FLASK/TE security model
to FreeBSD.
http://www.watson.org/~robert/freebsd/2004eurobsdcon/eurobsdconeurobsdcon2004slidestrustedbsdfreebsdmacrobert watsonhttp://www.watson.org/~robert/freebsd/2004eurobsdcon/20041031-eurobsdcon-macframework.pdf270 KbTrustedBSD MAC Framework on FreeBSD and DarwinpdfRobert Watson's Slides from UKUUG LISA 2006
UKUUG LISA 2006 took place in Durham, UK in March,
2006. On this page, you can find my slides from
this conference.
OpenBSM is a BSD-licensed implementation of Sun's
Basic Security Module (BSM) API and file format,
and is the foundation of the TrustedBSD audit
implementation for FreeBSD. This talk will cover
the requirements, design, and implementation of
audit support for FreeBSD. Security audit support
provides detailed logging of security-relevant
events, and meets the requirements of the CAPP
Common Criteria protection profile.
http://www.watson.org/~robert/freebsd/2006ukuuglisa/ukuugslidesopenbsmtrustedbsdfreebsdrobert watsonhttp://www.watson.org/~robert/freebsd/2006ukuuglisa/20060323-ukuug2006lisa-audit.pdf199 KbCAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD (UKUUG LISA 2006).pdfRobert Watson's Slides from EuroBSDCon 2006 and FreeBSD Developer Summit
EuroBSDCon 2006 took place in Milan, Italy, and not
only offered excellent food on a flexible schedule,
but also an interesting array of talks on work
spanning the BSD's. On this page, you can find my
slides from the FreeBSD developer summit and full
conference.
Status report on the TrustedBSD Project: introduction
and status regarding Audit, plus a TODO list;
introduction to the priv(9) work recently merged
to 7.x.
The FreeBSD Project is one of the oldest and most
successful open source operating system projects,
seeing wide deployment across the IT industry. From
the root name servers, to top tier ISPs, to core
router operating systems, to firewalls, to embedded
appliances, you can't use a networked computer for
ten minutes without using FreeBSD dozens of times.
Part of FreeBSD's reputation for quality and
reliability comes from the nature of its development
organization--driven by a hundreds of highly skilled
volunteers, from high school students to university
professors. And unlike most open source projects,
the FreeBSD Project has developers who have been
working on the same source base for over twenty
years. But how does this organization work? Who
pays the bandwidth bills, runs the web servers,
writes the documentation, writes the code, and calls
the shots? And how can developers in a dozen time
zones reach agreement on the time of day, let alone
a kernel architecture? This presentation will attempt
to provide, in 45 minutes, a brief if entertaining
snapshot into what makes FreeBSD run.
http://www.watson.org/~robert/freebsd/2006eurobsdcon/eurobsdconeurobsdcon2006robert watsonhttp://www.watson.org/~robert/freebsd/2006eurobsdcon/20061110-devsummit-trustedbsd.pdf166 KbTrustedBSD presentation on Audit and priv(9) (Developer Summit)pdfslidestrustedbsdfreebsd20061111-eurobsdcon2006-how-freebsd-works.pdf4.4 MbHow the FreeBSD Project Works (EuroBSDCon 2006 Full Conference)pdfslidesfreebsdfreebsd projectRobert Watson's Slides from BSDCan 2006 and FreeBSD Developer Summit
As usual, Dan Langille ran an excellent BSDCan conference.
On this page, you can find my slides from the
developer summit and full conference, excluding the
contents of the WIPs, for which I don't have
permission to redistribute the slides.
http://www.watson.org/~robert/freebsd/2006bsdcan/bsdcanbsdcan2006notesdevsummitrobert watsonhttp://www.watson.org/~robert/freebsd/2006bsdcan/20060511-devsummit-network-cabal-summary.pdf72 KbNotes from the 10 May 2006 Meeting of the Network Stack Cabal (Developer Summit)pdffreebsd20060511-devsummit-smpng-network-summary.pdf91 KbSMPng Network Stack Update (Developer Summit)pdfsmp20060511-devsummit-trustedbsd-mac-framework-retrofit.pdf120 KbTrustedBSD Project Update (Developer Summit)pdftrustedbsd20060512-bsdcan2006-how-freebsd-works.pdf4.4 Mb KbHow the FreeBSD Project Works (BSDCan 2006 Full Conference)pdffreebsdfreebsd projectRobert Watson's Slides from EuroBSDCon 2005
EuroBSDCon 2005 took place in Basel, Switzerland
in November, 2005. Due to an injury, I was unable
to attend the conference itself, and my talks were
presented in absentia by Poul-Henning Kamp and Ed
Maste, who have my greatest appreciation!
The FreeBSD SMPng Project has spent the past five
years redesigning and reimplementing SMP support
for the FreeBSD operating system, moving from a
Giant-locked kernel to a fine-grained locking
implementation with greater kernel threading and
parallelism. This paper introduces the FreeBSD SMPng
Project, its architectural goals and implementation
approach. It then explores the impact of SMPng on
the FreeBSD network stack, including strategies for
integrating SMP support into the network stack,
locking approaches, optimizations, and challenges.
http://www.watson.org/~robert/freebsd/2005eurobsdcon/eurobsdconeurobsdcon2005slidesfreebsdsmprobert watsonpoul-henning kamped mastehttp://www.watson.org/~robert/freebsd/2005eurobsdcon/eurobsdcon2005-netperf.pdf370 KbIntroduction to Multithreading and Multiprocessing in the FreeBSD SMPng Network StackpdfRobert Watson's Slides from BSDCan 2004
BSDCan 2004 took place at the University of Ottawa
in Ottawa, Canada. On this page, you can find my
slides from the conference.
Robert Watson will describe a variety of pieces of
work done as part of the TrustedBSD Project, including
the TrustedBSD MAC Framework, Audit facilities for
FreeBSD, as well as supporting infrastructure work
such as GEOM/GBDE, UFS2, OpenPAM. He will also
discuss how certification and evaluation play into
feature selection, design, and documentation.
http://www.watson.org/~robert/freebsd/2004bsdcan/bsdcanbsdcan2004slidestrustedbsdfreebsdrobert watsonhttp://www.watson.org/~robert/freebsd/2004bsdcan/20040515-2004bsdcan-trustedbsd.pdf277 KbTrustedBSD: Trusted Operating System Features for BSDpdfRobert Watson's Slides from AsiaBSDCon 2004AsiaBSDCon 2004 took place in Taipei, Taiwan, in March 2004, and was hosted by Academia Sinica.http://www.watson.org/~robert/freebsd/2004asiabsdcon/asiabsdconasiabsdcon2004robert watsonhttp://www.watson.org/~robert/freebsd/2004asiabsdcon/200403-asiabsdcon2004-trustedbsd.pdf135 KbExtensible Kernel Security through the TrustedBSD MAC Framework.pdfslidestrustedbsdmac20040313-asiabsdcon04-bsdbof.pdf1.4 MbAsiaBSDCon 2004 BSD (FreeBSD) BoF sessionpdfslidesfreebsdA Tale of Four Kernels
The FreeBSD, GNU/Linux, Solaris, and Windows operating
systems have kernels that provide comparable
facilities. Interestingly, their code bases share
almost no common parts, while their development
processes vary dramatically. We analyze the source
code of the four systems by collecting metrics in
the areas of file organization, code structure,
code style, the use of the C preprocessor, and data
organization. The aggregate results indicate that
across various areas and many different metrics,
four systems developed using wildly different
processes score comparably. This allows us to posit
that the structure and internal quality attributes
of a working, non-trivial software artifact will
represent first and foremost the engineering
requirements of its construction, with the influence
of process being marginal, if any.
http://www.spinellis.gr/pubs/freebsdlinuxsolariswindowsarticlekerneldiomidis spinellishttp://www.spinellis.gr/pubs/conf/2008-ICSE-4kernel/html/Spi08b.html
Diomidis Spinellis. A tale of four kernels.
In Wilhem Schfer, Matthew B. Dwyer, and
Volker Gruhn, editors, ICSE '08: Proceedings
of the 30th International Conference on
Software Engineering, pages 381-390, New
York, May 2008. Association for Computing
Machinery.
htmlconf/2008-ICSE-4kernel/html/Spi08b.pdf
Diomidis Spinellis. A tale of four kernels.
In Wilhem Schfer, Matthew B. Dwyer, and
Volker Gruhn, editors, ICSE '08: Proceedings
of the 30th International Conference on
Software Engineering, pages 381-390, New
York, May 2008. Association for Computing
Machinery.
pdfGlobal software development in the FreeBSD project
FreeBSD is a sophisticated operating system developed
and maintained as open-source software by a team
of more than 350 individuals located throughout the
world. This study uses developer location data, the
configuration management repository, and records
from the issue database to examine the extent of
global development and its effect on productivity,
quality, and developer cooperation. The key findings
are that global development allows round-the-clock
work, but there are some marked differences between
the type of work performed at different regions.
The effects of multiple dispersed developers on the
quality of code and productivity are negligible.
Mentoring appears to be sometimes associated with
developers living closer together, but ad-hoc
cooperation seems to work fine across continents.
http://www.spinellis.gr/pubs/freebsdarticleglobal software developmentdomidis spinellishttp://www.spinellis.gr/pubs/conf/2006-GSD-FreeBSD/html/GSD-FreeBSD.htmlInternational Workshop on Global Software Development for the Practitioner, pages 73-79. ACM Press, May 2006htmlconf/2006-GSD-FreeBSD/html/GSD-FreeBSD-presentation.pdfIn NASSCOM Quality Summit 2006: Setting benchmarks in global outsourcing, Bangalore, India, September 2006. National Association of Software and Services Companies (NASSCOM).htmltrade/2006-LinuxFormat-GSD/html/GSDEV.htmLinux Format, (11):60?63, September/October 2006. In Greek.htmlBSDCan-2006 Photos - Fridayhttp://www.db.net/gallery/BSDCan/BSDCan_2006_Friday/
Photos taken during the Conference on Friday at BSDCan 2006 in Ottawa
by Diane Bruce.
2006bsdcanbsdcan2006photosdiane bruceBSDCan-2006 Photos - Saturdayhttp://www.db.net/gallery/BSDCan/BSDCan_2006_Saturday/
Photos taken during the Conference on Saturday at BSDCan 2006 in Ottawa
by Diane Bruce.
2006bsdcanbsdcan2006photosdiane bruceWhat's your biggest Time Management problem?
What's your biggest Time Management problem?
Tom Limoncelli is a FreeBSD user and the author of
the O'Reilly book,"Time Management for System
Administrators". He'll be giving a brief presentation
with highlights from his book then will take questions
from the audience. Whether you are a system
administrator, a developer (or even a Linux user)
this presentation will help you with something more
precious a quad-processor AMD box.
Speaker Bio
Victor Duchovni trained in mathematics, switched
tracks to CS in 1980s leaving Princeton with a
master's degree in mathematics and newly acquired
skills in Unix system administration and system
programming. In 1990 moved to Lehman Brothers,
worked on system management tooling, and network
engineering. Ported "Moira" from MIT to Lehman,
built efficient build systems that predated (and
partly inspired) Jumpstart. In 1994 joined ESM to
market "CMDB" tools to enterprise users, but this
did not pan out, in the mean time learned Tcl, and
contributed bunch of patches to the 7.x early 8.x
TCL releases. In 1997 returned to New York, working
in IT Security at Morgan Stanley since late 1999.
At Morgan Stanley, developed a hobby in perimeter
email security, becoming an active Postfix user and
very soon contributor in May of 2001. In addition
to many smaller feature improvements, contributed
initial implementation of SMTP connection caching,
overhauled and currently maintain LDAP and TLS
support. Made significant design contributions to
queue manager in collaboration with Wietse and
Patrik Raq. In 2.6 contributing support for TLS EC
ciphers and multi-instance management tooling,
ideally also TLS SNI if time permits.
http://www.nycbug.org/index.php?NAV=Home;SUBM=10168nycbugpresentationpostfixjohn masheyhttp://www.fetissov.org/public/nycbug/nycbug-02-04-09.mp3MP3 versionmp311 MbIntroduction to Puppet
What it is and how can it make system administration
less painful
About the speaker:
Larry Ludwig - Principal Consultant/Founder of
Empowering Media. Empowering Media is a consulting
firm and managed hosting provider. Larry Ludwig
has been in the industry for over 15 years as a
system administration and system programmer. He's
had previous experience working for many Fortune
500 corporations and holds a BS in CS from Clemson
University. Larry, along with Eric E. Moore and
Brian Gupta are founding members of the NYC Puppet
usergroup.
Many modern CPUs provide on chip counters for
performance events such as retiring instructions
and cache misses. The hwpmc driver and libraries
in FreeBSD give systems administrators and programmers
access to APIs which make it possible to measure
performance without modifying source code and with
minimal intrusion into application execution. This
talk will be a brief introduction to HWPMC, and how
to use it.
Bio: George Neville-Neil is the co-author with Kirk
McKusick of The Design and Implementation of the
FreeBSD Operating System. He works on networking
an operating systems for fun and profit.
http://www.nycbug.org/index.php?NAV=Home;SUBM=10166nycbugpresentationgeorge neville-neilcountershttp://www.fetissov.org/public/nycbug/nycbug-11-05-08.mp3MP3 versionmp34 MbNew York City BSD Con 2008: BSD v. GPL - a.k.a. not the sequel to "BSD is Dying"
BSD vs GPL is a sweeping epic, focused on the
dichotomy between good and evil. It peers inside
the hearts and minds of the creators of these
movements and dissects their battle for world
domination. No common documentary will dare to
follow the path that BSD vs GPL blazes.
http://talks.dixongroup.net/nycbsdcon2008/nycbsdconnycbsdcon2008presentationhumorbsd versus gpljason dixonhttp://talks.dixongroup.net/nycbsdcon2008/BSDvGPL.mp415 MbMP4mp4New York City BSD Con 2008
Slides of presentations given at New York City BSD
Conference 2008.
http://www.nycbsdcon.orgnycbsdcon2008nycbsdconpresentationhttp://www.squid-cache.org/~adrian/talks/20081007%20-%20NYCBSDCON%20-%20Disk%20IO.pdf197 Kb92 pagesAdrian Chadd: High-throughput concurrent disk IO in FreeBSD.pdffreebsdhigh performanceadrian chaddhttp://www.nycbsdcon.org/2008/files/dillon_hammer.tgz820 Kb16 pagesMetthew Dillon: The HAMMER File System.htmlhammermetthew dillonhttp://www.nycbsdcon.org/2008/files/magnusson_pcc.pdf123 Kb29 pagesAnders Magnusson: Design and Implementation of the Portable C Compiler.pdfpccanders magnussonhttp://www.openbsd.org/papers/nycbsdcon08-pie/21 pagesKurt Miller: OpenBSD's Position Independent Executables (PIE) Implementation.htmlopenbsdpiekurt millerhttp://www.silby.com/nycbsdcon08/NYCBSDCon-tcpdiff.pdf88 Kb28 pagesMike Silbersack: Detecting TCP regressions with tcpdiff.pdftcp regressiontcpdiffmike silbersackhttp://www.nycbsdcon.org/2008/files/wright_hardware-wrong.pdf1.7 Mb22 pagesJason L Wright: When Hardware Is Wrong, or "They can Fix It In Software".pdfhardwarejason l wrighthttp://www.nycbsdcon.org/2008/files/vidal_atf.pdf570 Kb18 pagesJulio M. Merino Vidal: An introduction to the Automated Testing Framework (ATF) for NetBSD.pdfnetbsdatfjulio m merino vidalNew York City BSD Con 2008
Audio recordings of presentations given at New York
City BSD Conference 2008. Courtesy of nikolai at
fetissov.org. The main page also has links to the
slides.
http://www.fetissov.org/public/nycbsdcon08/nycbsdcon2008nycbsdconpresentationhttp://www.fetissov.org/public/nycbsdcon08/1.1.mp314 MbAdrian Chadd: High-throughput concurrent disk IO in FreeBSD.mp3freebsdhigh performanceadrian chadd1.2.mp39 MbJason L Wright: When Hardware Is Wrong, or "They can Fix It In Software".mp3hardwarejason l wright1.3.mp314 MbMetthew Dillon: The HAMMER File System.mp3hammermetthew dillon1.4.mp315 MbAnders Magnusson: Design and Implementation of the Portable C Compiler.mp3pccanders magnusson1.5.mp311 MbMichael Shalayeff: Porting PCC. mp3pccmichael shalayeff1.6.mp310 MbJulio M. Merino Vidal: An introduction to the Automated Testing Framework (ATF) for NetBSD.mp3netbsdatfjulio m merino vidal1.7.mp315 MbJeremy C. Reed: Introduction to DNSSEC.mp3dnssecjeremy c reed1.8.mp34 MbJason Dixon: BSD versus GPL.mp3bsd versus gpljason dixon2.2.mp316 MbPawel Jakub Dawidek: A closer look at the ZFS file system.mp3freebsdzfspawel jakub dawidek2.3.mp310 MbKurt Miller: OpenBSD's Position Independent Executables (PIE) Implementation.mp3openbsdpiekurt miller2.4.mp311 MbMike Silbersack: Detecting TCP regressions with tcpdiff.mp3tcp regressiontcpdiffmike silbersack2.5.mp310 MbMichael Lucas: Network Refactoring, or doing an oil change at 80 MPH.mp3network refactoringmichael lucasPublic Key sudo
Two tools which have become the norm in Linux- and
Unix-based environments are SSH for secure
communications, and sudo for performing administrative
tasks. These are independent programs with substantially
different purposes, but they are often used in
conjunction. In this talk, I describe a flaw in
their interaction, and then present our solution
called public-key sudo.
Public-key sudo is an extension to the sudo
authentication mechanism which allows for public
key authentication using the SSH public key framework.
I describe our implementation of a generic SSH
authentication module and the sudo modifications
required to use this module.
Bio:
Matthew Burnside is a Ph.D. student in the Computer
Science department at Columbia University, in New
York. He works for Professor Angelos Keromytis in
the Network Security Lab. He received his B.A and
M.Eng from MIT in 2000, and 2002, respectively. His
research interests are in network anonymity, trust
management, and enterprise-scale policy enforcement.
http://www.nycbug.org/index.php?NAV=Home;SUBM=10160nycbugpresentationsudopublic keymatthew burnsidehttp://www.fetissov.org/public/nycbug/nycbug-08-06-08.mp3MP3 versionmp32 MbConfiguration Management with Cfengine
Configuration Management with Cfengine
Cfengine is a policy-based configuration management
system. Its primary function is to provide automated
configuration and maintenance of computers, from a
policy specification.
The cfengine project was started in 1993 as a
reaction to the complexity and non-portability of
shell scripting for Unix configuration management,
and continues today. The aim was to absorb frequently
used coding paradigms into a declarative, domain-specific
language that would offer self-documenting
configuration.
about the speaker:
Steven Kreuzer has been working with Open Source
technologies since as long as he can remember,
starting out with a 486 salvaged from a dumpster
behind his neighborhood computer store. In his spare
time he enjoys doing things with technology that
have absolutely no redeeming social value.
This talk is the result of an after-meeting discussion
with a few folks, when it became apparent that there
is some confusion as to how to deal with OpenBSD
in small and large environments. The topic of
installation and upgrading came up again. This talk
is aimed to hopefully dispel many of the rumors,
provide a thorough description and walk through of
the various stages of running OpenBSD in any size
environment, and some of the features and tools at
the administrator's disposal.
Okan Demirmen has been working with UNIX-like systems
for as long as he can remember and has found OpenBSD
to match some of the same philosophies in which he
believes, namely simplicity and correctness, and
reap the benefits of such.
http://www.nycbug.org/index.php?NAV=Home;SUBM=10154nycbugpresentationopenbsdsystem managementhttp://www.fetissov.org/public/nycbug/nycbug-05-07-08.mp3MP3 versionmp3103 minutes11 MbBuilding a High-Performance Computing Cluster Using FreeBSD
Special NYC*BUG meeting with FreeBSD developer Brooks Davis
Since late 2000 we have developed and maintained a
general purpose technical and scientific computing
cluster running the FreeBSD operating system. In
that time we have grown from a cluster of 8 dual
Intel Pentium III systems to our current mix of 64
dual, quad-core Intel Xeon and 289 dual AMD Opteron
systems.
In this talk we reflect on the system architecture
as documented in our BSDCon 2003 paper "Building a
High-performance Computing Cluster Using FreeBSD"
and our changes since that time. After a brief
overview of the current cluster we revisit the
architectural decisions in that paper and reflect
on their long term success. We then discuss lessons
learned in the process. Finally, we conclude with
thoughts on future cluster expansion and designs.
Bio
Brooks Davis is an Engineering Specialist in the
High Performance Computing Section of the Computer
Systems Research Department at The Aerospace
Corporation. He has been a FreeBSD user since 1994,
a FreeBSD committer since 2001, and a core team
member since 2006. He earned a Bachelors Degree in
Computer Science from Harvey Mudd College in 1998.
His computing interests include high performance
computing, networking, security, mobility, and, of
course, finding ways to use FreeBSD in all these
areas. When not computing, he enjoys reading,
cooking, brewing and pounding on red-hot iron in
his garage blacksmith shop.
http://www.nycbug.orgnycbugpresentationhigh performance computingfreebsdbrooks davishttp://www.fetissov.org/public/nycbug/nycbug-03-20-08.mp3MP3 versionmp380 minutes9 MbUser Interfaces and How People Think
"User Interfaces and How People Think" will introduce
concepts of designing software for different users
by observing how they think about and do what they
do. While much of design today focuses on the
front-end of computer systems, there is opportunity
to innovate in every area where a human interacts
with software.
Bio:
Jeffery Mau is a user experience designer with the
leading business and technology consulting firm
Sapient. He has helped clients create great customer
experiences in the financial services, education,
entertainment and telecommunications industries.
With a passion for connecting people with technology,
Jeff specializes in Information Architecture and
Business Strategy. Jeff holds a Masters in Design
from the IIT Institute of Design in Chicago, Illinois.
http://www.nycbug.orgnycbugpresentationuser interfaceshttp://www.fetissov.org/public/nycbug/nycbug-03-05-08.mp3MP3 versionmp378 minutes9 MbOpen Meeting on OpenSSH
Open Meeting on OpenSSH
Febrary's NYCBUG meeting is a broad look at OpenSSH,
the de facto method for remote administration and
more. OpenSSH celebrated its 8th anniversary this
past September, and we thought this would be a great
opportunity to discuss OpenSSH, and for others to
contribute their hacks and interesting applications.
SSARES: Secure Searchable Automated Remote Email
Storage - A usable, secure email system on a remote
untrusted server
The increasing centralization of networked services
places user data at considerable risk. For example,
many users store email on remote servers rather
than on their local disk. Doing so allows users to
gain the benefit of regular backups and remote
access, but it also places a great deal of unwarranted
trust in the server. Since most email is stored in
plaintext, a compromise of the server implies the
loss of confidentiality and integrity of the email
stored therein. Although users could employ an
end-to-end encryption scheme (e.g., PGP), such
measures are not widely adopted, require action on
the sender side, only provide partial protection
(the email headers remain in the clear), and prevent
the users from performing some common operations,
such as server-side search.
To address this problem, we present Secure Searchable
Automated Remote Email Storage (SSARES), a novel
system that offers a practical approach to both
securing remotely stored email and allowing
privacy-preserving search of that email collection.
Our solution encrypts email (the headers, body, and
attachments) as it arrives on the server using
public-key encryption. SSARES uses a combination
of Identity Based Encryption and Bloom Filters to
create a searchable index. This index reveals little
information about search keywords and queries, even
against adversaries that compromise the server.
SSARES remains largely transparent to both the
sender and recipient. However, the system also
incurs significant costs, primarily in terms of
expanded storage requirements. We view our work as
a starting point toward creating privacy-friendly
hosted services.
Angelos Keromytis is an Associate Professor with
the Department of Computer Science at Columbia
University, and director of the Network Security
Laboratory. He received his B.Sc. in Computer Science
from the University of Crete, Greece, and his M.Sc.
and Ph.D. from the Computer and Information Science
(CIS) Department, University of Pennsylvania. He
is the author and co-author of more than 100 papers
on refereed conferences and journals, and has served
on over 40 conference program committees. He is an
associate editor of the ACM Transactions on Information
and Systems Security (TISSEC). He recently co-authored
a book on using graphics cards for security, and
is a co-founder of StackSafe Inc. His current
research interests revolve around systems and network
security, and cryptography.
This talk will be on some of the basics of IPv6
including addressing, subnetting, and tools to test
connectivity. There will be a lab (network permitting),
and setups for an as of yet undisclosed flavor of
BSD as well as some of the well known daemons (Apache
2, SSHD) will be demonstrated. Setting up a BSD OS
as an IPv6 router and tunneling system will also
be covered.
Bio
Gene Cronk, CISSP-ISSAP, NSA-IAM is a freelance
network security consultant, specializing in *NIX
solutions. He has been working with computers for
well over 20 years, electronics for over 15, and
IPv6 specifically for 4 years. He has given talks
on IPv6 and a multitude of other topics at DefCon,
ShmooCon and other "underground" venues.
Gene is from Jacksonville, FL. When not involved
in matters concerning IPv6, he can be found gaming
(Anarchy Online), helping out with the Jacksonville Linux
User's Group, being one of the benevolent
dictators of the Hacker Pimps
Security Think Tank, or fixing up his house.
http://www.nycbug.org/index.php?NAV=Home;SUBM=10133nycbugpresentationipv6gene cronkhttp://www.fetissov.org/public/nycbug/nycbug-10-03-07.mp3MP3 versionmp360 minutes14MbUsing Cryptography to Improve Web Application Performance and Security
Cryptography has a reputation of slowing down
applications. However if done correctly, it can
actually be used to improve performance by storing
high-value/high-cost results "in public." In addition
the same techniques can solve common security
problems such as authorization, parameter scanning,
and parameter rewriting.
All are welcome - no previous experience with
cryptography is required, and the techniques will
be presented in a programming-language neutral
format.
Nick Galbreath have been working on high performance
servers and web security at various high profile
startups since 1994 (most recently Right Media).
He holds a Master degree of Mathematics from Boston
University, and published a book on cryptography.
He currently lives in the Lower East Side.
http://www.nycbug.org/index.php?NAV=Home;SUBM=10129nycbugpresentationcryptographynick galbreathhttp://www.fetissov.org/public/nycbug/nycbug-09-05-07.mp3MP3 versionmp318MbMarc Spitzer on Nagios
Nagios is a platform for monitoring services and
the hosts they reside on. It provides a reasonable
tool for monitoring your network and you can not
beat the price.
We plan on covering the following topics:
what it is
how it works
where to get it
how to install it
how to configure it
how to customize it for your environment
where the data is stored
how to write a basic plug-in
About the Speaker
Marc Spitzer started as a VAX/VMS operator who
taught himself some basic scripting in DCL to help
me remember how to do procedures that did not come
up enough to actually remember all the steps, this
was in 1990. Since then he has worked with HPUX,
Solaris, Windows, Linux, and the BSDs, FreeBSD being
his favorite. He has held a variety of positions,
admin and engineering, where he has been able to
introduce BSD into his work place. He currently
works for Columbia University as a Systems
Administrator.
He is a founding member of NYCBUG and LispNYC and
on the board of UNIGroup.
Most of his career has been building tools to solve
operational problems, with extra effort going to
the ones that irritated him personally. He takes a
great deal of pride in not needing a budget to solve
most problems.
http://www.nycbug.org/index.php?NAV=Home;SUBM=10122nycbugpresentationnagiosmarc spitzerhttp://www.fetissov.org/public/nycbug/nycbug-08-01-07.mp3MP3 versionmp319MbIsaac 'Ike' Levy on the Real Unix Tradition
"The Real Unix Tradition"
UNIX hackers, all standing on the shoulders of giants.
"...the number of UNIX installations has grown to
10, with more expected..." - Dennis Ritchie and Ken
Thompson, June 1972
"Well, it was all Open Source, before anybody really
called it that". - Brian Redman, 2003
UNIX is the oldest active and growing computing
culture alive today. From it's humble roots in the
back room at Bell Laboratories, to today's global
internet infrastructure- UNIX has consistently been
at the core of major advances in computing. Today,
the BSD legacy is the most direct continuation of
the most successful principles in UNIX, and continues
to lead major advances in computing.
Why? What's so great about UNIX?
This lecture aims to prove that UNIX history is
surprisingly useful (and fun)- for developers,
sysadmins, and anyone working with BSD systems.
About the speaker
Isaac Levy, (ike) is a freelance BSD hadker based
in NYC. He runs Diversaform Inc. as an engine to
make his hacking feed itself, (and ike). Diversaform
specializes in *BSD based solutions, providing 'IT
special weapons and tatics' for various sized
business clients, as well as running a small
high-availability datacenter operation from lower
Manhattan. With regard to FreeBSD jail(8), ike was
a partner in the first jail (8)-based web hosting
ISP in America, iMeme, and has been developing
internet applications in and out of jails since
1999. Isaac is a proud member of NYC*BUG (the New
York City *BSD Users Group), and a long time member
of LESMUUG, (the Lower East Side Mac Unix Users
Group).
http://www.nycbug.org/index.php?NAV=Home;SUBM=10107nycbugpresentationunix traditionisaac levyhttp://www.fetissov.org/public/nycbug/nycbug-07-05-07.mp3MP3 versionmp310MbSteven Kreuzer on Denial of Service Mitigation Techniques
Protecting your servers, workstations and networks
can only go so far. Attacks which consume your
available Internet-facing bandwidth, or overpower
your CPU, can still take you offline. His presentation
will discuss techniques for mitigating the effects
of such attacks on servers designed to provide
network intensive services such as HTTP or routing.
About the speaker
Steven Kreuzer is currently employed by Right Media
as a Systems Administrator focusing on building and
managing high transaction infrastructures around
the globe. He has been working with Open Source
technologies since as long as he can remember,
starting out with a 486 salvaged from a dumpster
behind his neighborhood computer store. In his spare
time he enjoys doing things with technology that
have absolutely no redeeming social value.
http://www.nycbug.org/index.php?NAV=Home;SUBM=10108nycbugpresentationdenialofservicesteven kreuzerhttp://www.fetissov.org/public/nycbug/nycbug-06-06-07.mp3MP3 versionmp310MbAmitai Schlair on pkgsrcCon.
The fourth annual pkgsrcCon is
April 27-29 in Barcelona. As might be expected when
brains congregate, pkgsrcCon traditionally results
in a flurry of activity toward new directions and
initiatives. Mere hours after returning to New
York, Amitai will give us a recap of the
proceedings, including his presentation,
"Packaging djbware."
Amitai Schlair
is a pkgsrc developer who has worked in such diverse
areas as Mac OS X platform support and packages of
software by Dan Bernstein. His full-time undergraduate
studies at Columbia are another contributing factor
to his impending insanity. He consults in software
and IT.
http://www.nycbug.org/index.php?NAV=Home;SUBM=10102nycbugpresentationpkgsrcconnetbsdamitai schlairhttp://www.fetissov.org/public/nycbug/nycbug-05-02-07.mp3MP3 versionmp321MbRay Lai: on OpenCVS
This presentation was inspired by the recent
Subversion presentation. It will talk about the
origins of OpenRCS and OpenCVS, its real-world usage
in the OpenBSD project, and why OpenBSD will continue
to use CVS.
Ray is an OpenBSD developer who uses Subversion by
day, CVS by night. Taking the phrase "complexity
is the enemy of security" to heart, he believes
that the beauty of UNIX's security is in its
simplicity.
Security policies are a key component in protecting
enterprise networks. But, while there are many
diverse defensive options available, current models
and mechanisms for mechanically-enforced security
policies are limited to traditional admission-based
access control. Defensive capabilities include among
others logging, firewalls, honeypots, rollback/recovery,
and intrusion detection systems, while policy
enforcement is essentially limited to one-off access
control. Furthermore, access-control mechanisms
operate independently on each service, which can
(and often does) lead to inconsistent or incorrect
application of the intended system-wide policy. We
propose a new scheme for global security policies.
Every policy decision is made with near-global
knowledge, and re-evaluated as global knowledge
changes. Using a variety of actuators, we make the
full array of defensive capabilities available to
the global policy. Our goal is a coherent,
enterprise-wide response to any network threat.
Biography
Matthew Burnside is a Ph.D. student in the Computer
Science department at Columbia University, in New
York. He works for Professor Angelos Keromytis in
the Network Security Lab. He received his B.A and
M.Eng from MIT in 2000, and 2002, respectively. His
main research interests are in computer security,
trust management, and network anonymity.
http://www.nycbug.org/index.php?NAV=Home;SUBM=10089mp3presentationenterprise securitymatthew burnsidehttp://www.fetissov.org/public/nycbug/nycbug-03-07-07.mp3MP3 versionmp3Ivan Ivanov on The Version Control System Subversion
The presentation will discuss Subversion from both
client and server points of view. It will show how
to create repositories and how to make them accessible
over the network using different access schemes
like http://, file:// or svn://. Pointers are given
on securing the repositories and on authenticating
and authorizing the clients. Next, the presentation
shows how an user interacts with the repository and
describes some of the important Subversion client
commands. Finally, it deals with administrating
the repository using "hook scripts".
Ivan Ivanov is generally interested in Version
Control Systems since his student years in Sofia
University, Bulgaria, where he set up and maintained
a CVS server for an academic project. When Subversion
became a fact and proved to be "a better CVS" he
researched it and last year deployed it for his
NYC-based employer Ariel Partners
(http://www.arielpartners.com/). He integrated the
Subversion repositories with Apache Web Server over
https to enable a reliable and secure way to access
them from any point.
http://www.fetissov.org/public/nycbug/nycbugpresentationsubversionivan ivanovhttp://www.fetissov.org/public/nycbug/nycbug-02-07-07.mp3MP3 versionnycbugpresentationsubversionivan ivanovOkan Demirmen on PF
We have had lots of meetings that have peripherally
discussed OpenBSD's wildly popular PF firewall...
but finally we will have a meeting focused on it.
http://www.fetissov.org/public/nycbug/nycbugpresentationopenbsdpfokan demirmenhttp://www.fetissov.org/public/nycbug/nycbug-01-03-07.mp3MP3 versionmp3New York City BSD Con 2006: BSD is Dying - A Cautionary Tale of Sex and Greed
BSD is Dying A Cautionary Tale of Sex and Greed Jason Dixon October 28, 2006
First and foremost, I would like to thank the unique
presentation styles of Dick Hardt and Lawrence
Lessig for inspiring me to create this presentation.
The following videos were created by exporting the
original Keynote presentation slides into QuickTime
video, then manually synchronizing them using iMovie
HD with the audio recordings captured by Nikolai
Fetissov. They were then exported into QuickTime,
mpeg4 (H.264/AAC), and iPod movie formats. If you
are having difficulties with the MP4 copy, and are
unable to view QuickTime movies, please contact me
and I'll try to assist.
http://talks.dixongroup.net/nycbsdcon2006/nycbugpresentationhumorbsd is dyingjason dixonhttp://talks.dixongroup.net/nycbsdcon2006/BSD_is_Dying_640x480.mov19MbQuickTimemovBSD_is_Dying_640x480.mp431MbMP4mp4BSD_is_Dying_640x480.m4v36MbiPodm4vNew York City BSD Con 2006
Audio recordings of presentations given at New York
City BSD Conference 2006. Courtesy of nikolai at
fetissov.org. The main page also has links to the
slides.
http://www.fetissov.org/public/nycbsdcon06/nycbugnycbsdconnycbsdcon2006presentationhttp://www.fetissov.org/public/nycbsdcon06/1.1.mp314 MbCorey Benninger: Security with Ruby on Rails in BSDmp3rubyruby on railssecuritycorey benninger1.2.mp310 MbBrian A. Seklecki: A Framework for NetBSD Network Appliances.mp3netbsdbrian a seklecki1.3.mp315 MbBob Beck: PF, it is not just for firewalls anymore.mp3pfbob beck1.4.mp39 MbBjorn Nelson: A Build System for FreeBSDmp3freebsdbjorn nelson1.5.mp313 MbJohnny C. Lam: The "hidden dependency" problem.mp3johnny c lam1.6.mp311 MbMarco Peereboom: Bio & Sensors in OpenBSD.mp3openbsdsensorsmarco peerenboom1.7.mp312 MbRussell Sutherland: BSD on the Edge of the Enterprise.mp3russel sutherland1.8.mp35 MbJason Dixon: BSD Is Dying.mp3humorbsd is dyingjason dixon2.1.mp39 MbJason Wright: OpenBSD on sparc64.mp3openbsdsparc64jason wright2.2.mp315 MbKristaps Johnson: BSD Virtualisation with sysjail.mp3sysjailkristaps johnson2.3.mp316 MbWietse Venema: Postfix as a Secure Programming Example.mp3postfixwietse venema2.4.mp316 MbBob Beck: spamd - spam deferral daemon.mp3spamdbob beckIsaac 'Ike' Levy on m0n0wall and PFSense
UNIX professionals are busy these days. Setting up
routers and firewalls are fundamental to any network,
but in environments where the focus is on various
applications, (servers, workstations, and the
software that runs on them), it's difficult for a
business not to choose off-the-shelf SOHO routers
and networking gear. The web management GUIs are
understandable by everyone, (even techs without
UNIX knowledge), and the gear is cheap - this saves
time and money.
In the meantime, the features of your average Linksys
or Netgear router often leave MUCH to be desired,
(https auth management, for one simple example).
Enter m0n0wall and PFSense, 2 BSD based packaged
router/firewall solutions that are as solid and
full featured as you'd expect from any BSD system-
PLUS THEY HAVE HTML WEB INTERFACES FOR MANAGEMENT!
m0n0wall and PFSense become an easy sell in any
small professional environment, any competent tech
can manage the network within minutes... At home,
in every hackers home network, they free the hacker
to have trusted tools available, but are as time-saving
as using any Linksys router.
m0n0wall and PFSense are both light and clean,
designed to run on embedded systems- (Soekris,
WRAP), but are monsters when unleashed on even
legacy PCs around the office. If you manage UNIX
networks and systems all day, do you really want
to manage the router for your DSL when you get home?
But then doesn't it bug you to use a chincey Linksys
box?
Ike has been a member of NYC*BUG since we first
launched in January 2004. He is a long-time member
of the Lower East Side Mac Unix User Group. He has
spoken frequently on a number of topics at various
venues, particularly on the issue of FreeBSD's jail
(8).
nycbugpresentationmonowallpfsenseisaac levyhttp://www.fetissov.org/public/nycbug/nycbug-09-06-06.mp39 Mbmp3Alfred Perlstein on Sendmail Hacks
Alfred will discuss the hacks used to turn Sendmail
into a high performance solution for delivering
millions of messages to OKCupid's subscribers.
Topics covered will be system tuning and sendmail
hacks used in house to achieve massive throughput.
Alfred Perlstein is the CTO of OKcupid.com, the
largest free online dating site. He has been a
FreeBSD hacker for five years, he's worked on NFS,
VFS, pthreads, networking and general system
maintenance during his tenure on both FreeBSD and
OS X kernels.
nycbugpresentationsendmailalfred perlsteinhttp://www.fetissov.org/public/nycbug/nycbug-07-05-06.mp311 Mbmp3Episode 07 of "FreeBSD for all" uploaded
This week we talk about podcast clients, ipfw firewall etc.
http://freebsdforall.blogspot.com/2006/07/episode-07.htmlfreebsd for alltalkpodcast clientsipfwhttp://www.archive.org/download/FreeBSD_for_all_podcast_Episode_07/FreeBSD_for_all_podcast_Episode_07.mp311 Mb23 minutes128 kbps MP3 versionmp3FreeBSD_for_all_podcast_Episode_07_64kb.mp323 minutes64 kbps MP3 versionmp3FreeBSD_for_all_podcast_Episode_07.ogg23 minutesOgg versionoggEpisode 06 of "FreeBSD for all" uploaded
This week we talk about
Macromedia plugin
FreeBSD-Linux differences part 2
John Baldwin Introduction
Podcast announcement - call for co-hosts!
http://freebsdforall.blogspot.com/2006/06/episode-06.htmlfreebsd for alltalkjohn baldwinfreebsd vs linuxhttp://www.archive.org/download/FreeBSD_for_all_podcast_Episode_06/FreeBSD_for_all_podcast_Episode_06.mp3MP3 versionmp3FreeBSD_for_all_podcast_Episode_06.oggOgg versionoggFreeBSD_for_all_podcast_Episode_06_64kb.mp364 kbps MP3 versionmp3Nate Lawson on ACPIOur Topic:
FreeBSD's ACPI implementation: The details.
Our Speaker:
Nate Lawson, FreeBSD Committer.
Our Topic:
FreeBSD's ACPI implementation is based on code for ACPI released
by Intel. Nate and others wrote the glue code to make this code
work on FreeBSD. He explains how this was done, and why.
bafugpresentationfreebsdacpinate lawsonhttps://people.FreeBSD.org/~julian/BAFUG/talks/ACPI/bafug7-nate2.mov245 MbmovNetwork Protocol Development Tools and Techniques for FreeBSDOur Topic:
Network Protocol Development Tools and Techniques for FreeBSD
Our Speaker:
George Neville-Neil, co-author of the "Design and
Implementation of the FreeBSD Operating System"
"daemon" book.
Our Topic:
While computers have gotten faster and more powerful
the tools we use to develop network protocols, such
as TCP, UDP, IPv4 and IPv6 have not. Most network
protocols are developed, in C, in the kernel, and
require a lot of work to test. Over the past year
or so I have been working with virtual machines, a
couple of pieces of open source software, and begun
developing a library for use in protocol testing.
This talk will cover three topics:
Developing and testing kernel code with Virtual Machines
Finding good tests for networking code
Packet Construction Set (PCS) a new library for
writing protocol tests
bafugpresentationfreebsdpacket construction setgeorge neville-neilhttps://people.FreeBSD.org/~julian/BAFUG/talks/bafug6-gnn.mov211 MbmovTim Kientzler on developing libarchive and tar
libarchive..........Tim Kientzler on developing
libarchive and tar.
https://people.FreeBSD.org/~julian/BAFUG/talks/libarchive/bafugpresentationlibarchivetim kientzlerhttps://people.FreeBSD.org/~julian/BAFUG/talks/libarchivebafug5-tim-1.mov50 MbPart 1bafugpresentationlibarchivetim kientzlerbafug5-tim-2.mov125 MbPart 2bafugpresentationlibarchivetim kientzlerbafug5-tim-3.mov30 MbPart 3bafugpresentationlibarchivetim kientzlerFosdem 2006: BSD
We talk with Daniel Seuffert about BSD. Several
flavours of BSD were represented in a joint BSD
booth: OpenBSD, FreeBSD, NetBSD and MirOS. Daniel
is representative of the FreeBSD project and among
other things talks about the different operating
systems that are build on top of FreeBSD. For
instance, there are two distributions called PC-BSD
and DesktopBSD that are targeted towards desktop
users. There also is a version that specializes on
security entitled TrustedBSD.
http://www.source21.nl/2006/06/05/fosdem-2006-bsd/
source21interviewdaniel seufferthttp://www.source21.nl/media/20060605/bsd_-_daniel_seuffert.mp4mp4COMPLETE Hard Disk Encryption with FreeBSD
COMPLETE Hard Disk Encryption with FreeBSD, by Marc Schiesser
Learn how to effectively protect not only your data
but also your applications.
Most technologies and techniques intended for
securing digital data focus on protection while the
machine is turned on mostly by defending against
remote attacks. An attacker with physical access
to the machine, however, can easily circumvent these
defenses by reading out the contents of the storage
medium on a different, fully accessible system or
even compromise program code on it in order to leak
encrypted information. Especially for mobile users,
that threat is real. And for those carrying around
sensitive data, the risk is most likely high. This
talk will introduce a method of mitigating that
particular risk by protecting not only the data
through encryption, but also the applications and
the operating system from being compromised while
the machine is turned off.
http://events.ccc.de/congress/2005/fahrplan/events/1139.en.htmlcccccc2005ccc22presentationfreebsdharddisk encryptionmarc schiesserhttp://events.ccc.de/congress/2005/fahrplan/attachments/687-slides_Complete_Hard_Disk_Encryption.pdf679KbSlidesslideshttp://events.ccc.de/congress/2005/fahrplan/attachments/905-22C3-1139-en-complete_harddisk_encryption_with_freebsd.mp4.torrent37KbBittorrent linkmp4FreeBSD Security Officer funktionen
"FreeBSD Security Officer funktionen" at the AAUUG,
AAUUG, 22 August 2006 by Simon L. Nielsen (FreeBSD
Deputy Security Officer)
http://www.aauug.dk/aauugpresentationdanishfreebsdsecurity officersimon l nielsenhttps://people.FreeBSD.org/~simon/presentations/freebsd-so-function-aauug-2006-08-22.pdf211 KbPDF (danish)pdfFreeBSD Security Officer funktionen
"FreeBSD Security Officer funktionen" at the BSD-DK,
26 August 2006 by Simon L. Nielsen (FreeBSD Deputy
Security Officer)
aauugpresentationdanishfreebsdsecurity officersimon l nielsenhttps://people.FreeBSD.org/~simon/presentations/freebsd-so-function-bsd-dk-2006-08.pdf210 KbPDF (danish)pdfReleaseparty, the Varnish HTTP accelerator
VG sponsored the creation of a web-accellerator
called "Varnish" because Squid was too slow for
them. Varnish is being developed by Poul-Henning
Kamp and the Norwegian Linux consultancy Linpro.
This is the releaseparty for version 1.0.
The first half of the talk will introduce Varnish
and present some of the novel features it brings
to the business of web-serving.
The second half of the talk, using Varnish as the
example, will show ways to get the most performance
out of modern hardware and operating systems.
(The English text starts at about 5 minutes in the stream)
This is an extra track by the artist Ty Semaka (who
really has "had Puffy on his mind") which we included
on the audio CD.
This song details the process that Ty has to go
through to make the art and music for each OpenBSD
release. Ty and Theo really do go to a (very specific)
bar and discuss what is going on in the project,
and then try to find a theme that will work...
For RSS readers: Please note that the download URL
is an FTP site.
http://www.openbsd.org/lyrics.html#audio_extraopenbsdartworkftp://ftp.openbsd.org/pub/OpenBSD/songs/songty.mp33.9 Mb4 minutesMP3 versionopenbsdartworksongty.ogg6.0 Mb4 minutesOgg versionopenbsdartworkOpenBSD 4.4 Release Song - "Source Wars - Episode IV - Trial of the BSD Knights"
Nearly 10 years ago Kirk McKusick wrote a history
of the Berkeley Unix distributions for the O'Reilly
book "Open Sources: Voices from the Open Source
Revolution". We recommend you read his story,
entitled "Twenty Years of Berkeley Unix From
AT&T-Owned to Freely Redistributable" first, to see
how Kirk remembers how we got here. Sadly, since
it showed up in book form originally, this text has
probably not been read by enough people.
The USL(AT&T) vs BSDI/UCB court case settlement
documents were not public until recently; their
disclosure has made the facts more clear. But the
story of how three people decided to free the BSD
codebase of corporate pollution -- and release it
freely -- is more interesting than the lawsuit which
followed. Sure, a stupid lawsuit happened which
hindered the acceptance of the BSD code during a
critical period. But how did a bunch of guys go
through the effort of replacing so much AT&T code
in the first place? After all, companies had lots
of really evil lawyers back then too -- were they
not afraid?
After a decade of development, most of the AT&T
code had already been replaced by university
researchers and their associates. So Keith Bostic,
Mike Karels and Kirk McKusick (the main UCB CSRG
group) started going through the 4.3BSD codebase
to cleanse the rest. Keith, in particular, built a
ragtag team (in those days, USENIX conferences were
a gold mine for such team building) and led these
rebels to rewrite and replace all the Imperial AT&T
code, piece by piece, starting with the libraries
and userland programs. Anyone who helped only got
credit as a Contributor -- people like Chris Torek
and a cast of .. hundreds more.
Then Mike and Kirk purified the kernel. After a bit
more careful checking, this led to the release of
a clean tree called Net/2 which was given to the
world in June 1991 -- the largest dump of free
source code the world had ever received (for those
days -- not modern monsters like OpenOffice).
Some of these ragtags formed a company (BSDi) to
sell a production system based on this free code
base, and a year later Unix System Laboratories
(basically AT&T) sued BSDi and UCB. Eventually
AT&T lost and after a few trifling fixes (described
in the lawsuit documents) the codebase was free. A
few newer developments (and more free code) were
added, and released in June 1994 as 4.4BSD-Lite.
Just over 14 years later OpenBSD is releasing its
own 4.4 release (and for a lot less than $1000 per
copy).
The OpenBSD 4.4 release is dedicated to Keith Bostic,
Mike Karels, Kirk McKusick, and all of those who
contributed to making Net/2 and 4.4BSD-Lite free.
http://www.openbsd.org/lyrics.html#44openbsdartworkftp://ftp.openbsd.org/pub/OpenBSD/songs/song44.mp35.6 Mb3 minutes 5 secondsMP3 versionmp3song44.ogg4.4 Mb3 minutes 5 secondsOgg versionoggOpenBSD 4.3 Release Song - "Home to Hypocrisy"
We are just plain tired of being lectured to by a
man who is a lot like Naomi Campbell.
In 1998 when a United Airlines plane was waiting
in the queue at Washington Dulles International
Airport for take-off to New Orleans (where a Usenix
conference was taking place), one man stood up from
his seat, demanded that they stop waiting in the
queue and be permitted to deplane. Even after orders
from the crew and a pilot from the cockpit he refused
to sit down. The plane exited the queue and returned
to the airport gangway. Security personnel ran onto
the plane and removed this man, Richard Stallman,
from the plane. After Richard was removed from the
plane, everyone else stayed onboard and continued
their journey to New Orleans. A few OpenBSD developers
were on that same plane, seated very closeby, so
we have an accurate story of the events.
This is the man who presumes that he should preach
to us about morality, freedom, and what is best for
us. He believes it is his God-given role to tell
us what is best for us, when he has shown that he
takes actions which are not best for everyone. He
prefers actions which he thinks are best for him
-- and him alone -- and then lies to the public.
Richard Stallman is no Spock.
We release our software in ways that are maximally
free. We remove all restrictions on use and
distribution, but leave a requirement to be known
as the authors. We follow a pattern of free source
code distribution that started in the mid-1980's
in Berkeley, from before Richard Stallman had any
powerful influence which he could use so falsely.
We have a development sub-tree called "ports". Our
"ports" tree builds software that is 'found on the
net' into packages that OpenBSD users can use more
easily. A scaffold of Makefiles and scripts
automatically fetch these pieces of software, apply
patches as required by OpenBSD, and then build them
into nice neat little tarballs. This is provided
as a convenience for users. The ports tree is
maintained by OpenBSD entirely separately from our
main source tree. Some of the software which is
fetched and compiled is not as free as we would
like, but what can we do. All the other operating
system projects make exactly the same decision, and
provide these same conveniences to their users.
Richard felt that this "ports tree" of ours made
OpenBSD non-free. He came to our mailing lists and
lectured to us specifically, yet he said nothing
to the many other vendors who do the same; many of
them donate to the FSF and perhaps that has something
to do with it. Meanwhile, Richard has personally
made sure that all the official GNU software --
including Emacs -- compiles and runs on Windows.
That man is a false leader. He is a hypocrite. There
may be some people who listen to him. But we don't
listen to people who do not follow their own stupid
rules.
Those of us who work on OpenBSD are often asked why
we do what we do. This song's lyrics express the
core motivations and goals which have remained
unchanged over the years - secure, free, reliable
software, that can be shared with anyone. Many other
projects purport to share these same goals, and
love to wrap themselves in a banner of "Open Source"
and "Free Software". Given how many projects there
are one would think it might be easy to stick to
those goals, but it doesn't seem to work out that
way. A variety of desires drag many projects away
from the ideals very quickly.
Much of any operating system's usability depends
on device support, and there are some very tempting
alternative ways to support devices available to
those who will surrender their moral code. A project
could compromise by entering into NDA agreements
with vendors, or including binary objects in the
operating system for which no source code exists,
or tying their users down with contract terms hidden
inside copyright notices. All of these choices
surrender some subset of the ideals, and we simply
will not do this. Sure, we care about getting devices
working, but not at the expense of our original
goals.
Of course since "free to share with anyone" is part
of our goals, we've been at the forefront of many
licensing and NDA issues, resulting in a good number
of successes. This success had led to much recognition
for the advancement of Free Software causes, but
has also led to other issues.
We fully admit that some BSD licensed software has
been taken and used by many commercial entities,
but contributions come back more often than people
seem to know, and when they do, they're always still
properly attributed to the original authors, and
given back in the same spirit that they were given
in the first place.
That's the best we can expect from companies. After
all, we make our stuff so free so that everyone can
benefit -- it remains a core goal; we really have
not strayed at all in 10 years. But we can expect
more from projects who talk about sharing -- such
as the various Linux projects.
Now rather than seeing us as friends who can
cooperatively improve all codebases, we are seen
as foes who oppose the GPL. The participants of
"the race" are being manipulated by the FSF and
their legal arm, the SFLC, for the FSF's aims,
rather than the goal of getting good source into
Linux (and all other code bases). We don't want
this to come off as some conspiracy theory, but we
simply urge those developers caution -- they should
ensure that the path they are being shown by those
who have positioned themselves as leaders is still
true. Run for yourself, not for their agenda.
The Race is there to be run, for ourselves, not for
others. We do what we do to run our own race, and
finish it the best we can. We don't rush off at
every distraction, or worry how this will affect
our image. We are here to have fun doing right.
http://www.openbsd.org/lyrics.html#42openbsdartworkftp://ftp.openbsd.org/pub/OpenBSD/songs/song42.mp34.0 Mb4 minutes 40 secondsMP3 versionmp3song42.ogg6.4 Mb4 minutes 4- secondsOgg versionoggOpenBSD 4.1 Release Song - Puffy Baba and the 40 Vendors
As developers of a free operating system, one of
our prime responsibilities is device support. No
matter how nice an operating system is, it remains
useless and unusable without solid support for a
wide percentage of the hardware that is available
on the market. It is therefore rather unsurprising
that more than half of our efforts focus on various
aspects relating to device support.
Most parts of the operating system (from low kernel,
through to libraries, all the way up to X, and then
even to applications) use fairly obvious interface
layers, where the "communication protocols" or
"argument passing" mechanisms (ie. APIs) can be
understood by any developer who takes the time to
read the free code. Device drivers pose an additional
and significant challenge though: because many
vendors refuse to document the exact behavior of
their devices. The devices are black boxes. And
often they are surprisingly weird, or even buggy.
When vendor documentation does not exist, the
development process can become extremely hairy.
Groups of developers have found themselves focused
for months at a time, figuring out the most simple
steps, simply because the hardware is a complete
mystery. Access to documentation can ease these
difficulties rapidly. However, getting access to
the chip documentation from vendors is ... almost
always a negotiation. If we had open access to
documentation, anyone would be able to see how
simple all these devices actually are, and device
driver development would flourish (and not just in
OpenBSD, either).
When we proceed into negotiations with vendors,
asking for documentation, our position is often
weak. One would assume that the modern market is
fair, and that selling chips would be the primary
focus of these vendors. But unfortunately a number
of behemoth software vendors have spent the last
10 or 20 years building political
hurdles against the smaller players.
A particularly nasty player in this regard has been
the Linux vendors and some Linux developers, who
have played along with an American corporate model
of requiring NDAs for chip documentation. This has
effectively put Linux into the club with Microsoft,
but has left all the other operating system communities
-- and their developers -- with much less available
clout for requesting documentation. In a more fair
world, the Linux vendors would work with us, and
the device driver support in all free operating
systems would be fantastic by now.
We only ask that users
help us in changing the political landscape.
The last 10 years, every 6 month period has (without
fail) resulted in an official OpenBSD release making
it to the FTP servers. But CDs are also manufactured,
which the project sells to continue our development
goals.
While tests of the release binaries are done by
developers around the world, Theo and some developers
from Calgary or Edmonton (such as Peter Valchev or
Bob Beck) test that the discs are full of (only)
correct code. Ty Semaka works for approximately two
months to design and draw artwork that will fit the
designated theme, and coordinates with his music
buddies to write and record a song that also matches
the theme.
Then the discs and all the artwork gets delivered
to the plant, so that they can be pressed in time
for an official release date.
This release, instead of bemoaning vendors or
organizations that try to make our task of writing
free software more difficult, we instead celebrate
the 10 years that we have been given (so far) to
write free software, express our themes in art, and
the 5 years that we have made music with a group
of talented musicians.
OpenBSD developers have been torturing each other
for years now with Humppa-style music, so this
release our users get a taste of this too. Sometimes
at hackathons you will hear the same songs being
played on multiple laptops, out of sync. It is under
such duress that much of our code gets written.
We feel like Pufferix and Bobilix delivering The
Three Discs of Freedom to those who want them
whenever the need arises, then returning to celebrate
the (unlocked) source tree with all the other
developers.
For RSS readers: Please note that the download URL
is an FTP site.
http://www.openbsd.org/lyrics.html#40openbsdartworkftp://ftp.openbsd.org/pub/OpenBSD/songs/song40.mp32.3 Mb2 minutes 40 secondsMP3 versionmp3song40.ogg3.6 Mb2 minutes 40 secondsOgg versionoggEuroBSDCon 2006 picturesEuroBSDCon 2006 pictures by Christian Laursenhttp://photos.borderworlds.dk/eurobsdcon-2006/eurobsdconeurobsdcon2006photoschristian laursenEuroBSDCon 2006 picturesEuroBSDCon 2006 pictures by Erwin Lansing (erwin@)http://foto.droso.org/2006/20061108-13/eurobsdconeurobsdcon2006photoserwin lansingDiscussion - What's cooking for FreeBSD 7.0?Discussion - What's cooking for FreeBSD 7.0? (Bulgarian)http://openfest.org/archive/openfest-2007/openfestopenfest2007discussionfreebsdfreebsd7http://ludost.net/of2007/d2h2l7.avi105 MbAVIaviDimitri Vasileva - Visualizing Security Threats with Social Networking SoftwareDimitri Vasileva - Visualizing Security Threats with Social Networking Software (Bulgarian)http://openfest.org/archive/openfest-2007/openfestopenfest2007presentationfreebsdsecuritysocial networkingdimitri vasilevahttp://ludost.net/of2007/d2h2l6.avi331 MbAVIaviShcheryana Shopova - SNMP monitoringShcheryana Shopova - SNMP monitoring (Bulgarian)http://openfest.org/archive/openfest-2007/openfestopenfest2007presentationfreebsdsnmpmonitoringshcheryana shopovahttp://ludost.net/of2007/d2h2l5.avi271 MbAVIaviWillow Vachkov - FreeBSD and the new network and transport protocols (IPv6 and SCTP)Willow Vachkov - FreeBSD and the new network and transport protocols (IPv6 and SCTP) (Bulgarian)http://openfest.org/archive/openfest-2007/openfestopenfest2007presentationfreebsdipv6sctpwillow vanchkovhttp://ludost.net/of2007/d2h2l4.avi251 MbAVIaviAtanas Bchvarov - Packet Filtering in FreeBSDAtanas Bchvarov - Packet Filtering in FreeBSD (Bulgarian)http://openfest.org/archive/openfest-2007/openfestopenfest2007presentationfreebsdatanas bchvarovhttp://ludost.net/of2007/d2h2l3.avi186 MbAVIaviNikolai Denev - FreeBSD goes ZettabyteNikolai Denev - FreeBSD goes Zettabyte (Bulgarian)http://openfest.org/archive/openfest-2007/openfestopenfest2007presentationfreebsdzettabytenikolai denevhttp://ludost.net/of2007/d2h2l2.avi358 MbAVIaviVasil Dimov - The FreeBSD ports collection - tips and tricksVasil Dimov - The FreeBSD ports collection - tips and tricks (Bulgarian)http://openfest.org/archive/openfest-2007/openfestopenfest2007presentationfreebsdports collectionvasil dimovhttp://ludost.net/of2007/d2h2l1.avi341 MbAVIaviFreeBSD ports Erwin LansingCase study : managing a worldwide open source project: FreeBSD port managerhttp://openfest.org/program/openfestopenfest2006presentationfreebsdport managererwin lansinghttps://people.FreeBSD.org/~erwin/presentations/FreeBSD-portmgr-20061105-OpenFest.pdf128 KbPDFpdfThe Linux Link Tech Show Episode 179
Special Guests Will Backman and Scott Ruecker.
Will's talks about his podcast bsdtalk and about
Linux and BSD in general. We are joined by Troels
also. Dann on Devede and hopes for MythTV. Scott
Ruecker talks about Scale and general linux and
lxer stuff.
linux link tech showtalkwill backmanhttp://www.tllts.org/audio/tllts_179-02-14-07.mp331 Mb120 minutesMP3 versionmp3Ham Radio on FreeBSD
Last month I attended a meeting of the Ottawa Amateur
Radio Club (OARC)
as a member of my local BUG was giving a presentation
on Ham Radio on FreeBSD. Diane
Bruce, call sign VA3DB, has had her operator
license since 1969 and is well known in the BSD
community and for the development of ircd-hybrid.
In the past year she has assisted in the creation
- of the Hamradio
+ of the Hamradio
category in the FreeBSD ports tree and has
become the maintainer of over 20 of the hamradio
ports. She also contributed to the FreeBSD
entry at Hampedia, the Wikipedia for ham
operators.
Her presentation slides are a great introduction
to the various ham utilities which are available,
including both descriptions and screenshots of the
utilities in action.
oarcpresentationradiodiane brucehttp://www.oarc.net/presentations/hamradio_on_freebsd.pdf23 pagesPDF filemp3Installing OpenBSD in 5 minuteshttp://unix-tutorial.blogspot.com/2007/04/installing-openbsd-in-5-minutes.html
Installing OpenBSD. In real time :)
unix-tutorialflashopenbsdFreeBSD: Hard disk encryptionhttp://unix-tutorial.blogspot.com/2007/02/freebsd-hard-disk-encryption.html
How to protect your data on FreeBSD machine even
when your computer is turned off? This hard disk
encryption guide will help.
unix-tutorialflashfreebsdencryptionFreeBSD: First time install and configurehttp://unix-tutorial.blogspot.com/2007/01/freebsd-first-time-install-and.html
Tutorial how to install and configure FreeBSD. It
seems that comments in video are in Japanese :)
unix-tutorialflashfreebsdFreeBSD: using ports systemhttp://unix-tutorial.blogspot.com/2007/01/freebsd-using-ports-system.html
Using ports system in FreeBSD to install etherape.
unix-tutorialflashfreebsdportsFreeBSD installationhttp://unix-tutorial.blogspot.com/2007/01/freebsd-installation.html
Step-by-step installation of FreeBSD operating system.
unix-tutorialflashfreebsdNetBSD and ssshfshttp://unix-tutorial.blogspot.com/2007/04/netbsd-and-ssshfs.html
Usage of ssshfs on NetBSD with PUFFS.
unix-tutorialflashnetbsdpuffsInstall Debian and NetBSD on Xen Domuhttp://unix-tutorial.blogspot.com/2007/04/install-debian-and-netbsd-on-xen-domu.html
Video tutorial on installation of Debian and NetBsd on Domu with Xen.
unix-tutorialflashnetbsdxendebianNetBSD. More CPUs than Linux. + BSD ports/packages.http://www.berklix.com/free/talk/faraday/presentations/source/3_netbsd_marc/
From the talks with subject "Free Alternatives To
Microsoft" comes "NetBSD. More CPUs than Linux. +
BSD ports/packages.".
berklixnetbsdpackagesChris Buechler and Scott Ullrich - pfSense: 2.0 and beyondhttp://www.bsdcan.org/2009/schedule/events/130.en.html
pfSense: 2.0 and beyond
From firewall distribution to appliance building platform
pfSense is a BSD licensed customized distribution
of FreeBSD tailored for use as a firewall and router.
In addition to being a powerful, flexible firewalling
and routing platform, it includes a long list of
related features and a package system allowing
further expandability without adding bloat and
potential security vulnerabilities to the base
distribution.
This session will start with an introduction to the
project and its common uses, which have expanded
considerably beyond firewalling. We will cover much
of the new functionality coming in the 2.0 release,
which contains significant enhancements to nearly
every portion of the system as well as numerous new
features.
While the primary function of the project is a
firewalling and routing platform, with changes
coming in pfSense 2.0, it has also become an appliance
building framework enabling the creation of customized
special purpose appliances. The m0n0wall code where
pfSense originated has proved popular for this
purpose, with AskoziaPBX and FreeNAS also based
upon it, in addition to a number of commercial
solutions. The goal of this appliance building
framework is to enable creation of projects such
as these without having to fork and maintain another
code base. The existing appliances, including a DNS
server using TinyDNS, VoIP with FreeSWITCH, and
others will be discussed. For those interested in
creating appliances, an overview of the process
will be provided along with references for additional
information.
bsdcanbsdcan2009presentationpfsensechris buechlerscott ullrichhttp://www.bsdcan.org/2009/schedule/attachments/94_pfSense_2_0_and_beyond_BSDCan_09.pdf36 pages3.2 MbSlidespdfLuigi Rizzo - GEOM based disk schedulers for FreeBSDhttp://www.bsdcan.org/2009/schedule/events/122.en.html
GEOM based disk schedulers for FreeBSD
The high cost of seek operations makes the throughput
of disk devices very sensitive to the offered
workload. A disk scheduler can then help reorder
requests to improve the overall throughput of the
device, or improve the service guarantees for
individual users, or both.
Research results in recent years have introduced,
and proven the effectiveness of, a technique called
"anticipatory scheduling". The basic idea behind
this technique is that, in some cases, requests
that cause a seek should not be served immediately;
instead, the scheduler should wait for a short
period of time in case other requests arrive that
do not require a seek to be served. With many common
workloads, dominated by sequential synchronous
requests, the potential loss of throughput caused
by the disk idling times is more than balanced by
the overall reduction of seeks.
While a fair amount of research on disk scheduling
has been conducted on FreeBSD, the results were
never integrated in the OS, perhaps because the
various prototype implementations were very
device-specific and operated within the device
drivers. Ironically, anticipatory schedulers are
instead a standard part of Linux kernels.
This talk has two major contributions:
First, we will show how, thanks to the flexibility
of the GEOM architecture, an anticipatory disk
scheduling framework has been implemented in FreeBSD
with little or no modification to a GENERIC kernel.
While these schedulers operate slightly above the
layer where one would naturally put a scheduler,
they can still achieve substantial performance
improvements over the standard disk scheduler; in
particular, even the simplest anticipatory schedulers
can prevent the complete trashing of the disk
performance that often occurs in presence of multiple
processes accessing the disk.
Secondly, we will discuss how the basic anticipatory
scheduling technique can be used not only to improve
the overall throughput of the disk, but also to
give service guarantees to individual disk clients,
a feature that is extremely important in practice
e.g., when serving applications with pseudo-real-time
constraints such as audio or video streaming ones.
A prototype implementation of the scheduler that
will be covered in the presentation is available
at http://info.iet.unipi.it/~luigi/FreeBSD/
bsdcanbsdcan2009presentationfreebsdgeomdisk schedulersluigi rzzohttp://www.bsdcan.org/2009/schedule/attachments/100_gsched.pdf40 pages430 KbSlidespdfConstantine A. Murenin - Quiet Computing with BSDhttp://www.bsdcan.org/2009/schedule/events/119.en.html
Quiet Computing with BSD
Programming system hardware monitors for quiet computing
In this talk, we will present a detailed overview
of the features and common problems of microprocessor
system hardware monitors as they relate to the topic
of silent computing. In a nutshell, the topic of
programmable fan control will be explored.
Silent computing is an important subject as its
practice reduces the amount of unnecessary stress
and improves the motivation of the workforce, at
home and in the office.
Attendees will gain knowledge on how to effectively
programme the chips to minimise fan noise and avoid
system failure or shutdown during temperature
fluctuations, as well as some basic principles
regarding quiet computing.
Shortly before the talk, a patch for programming
the most popular chips (like those from Winbond)
will be released for the OpenBSD operating system,
although the talk itself will be more specific to
the microprocessor system hardware monitors themselves,
as opposed to the interfacing with thereof in modern
operating systems like OpenBSD, NetBSD, DragonFly
BSD and FreeBSD.
bsdcanbsdcan2009presentationopenbsdhardware sensorsconstantine mureninhttp://www.bsdcan.org/2009/schedule/attachments/95_BSDCan2009.cnst-fanctl.slides.pdf16 pages264 KbSlidespdfFernando Gont - Results of a Security Assessment of the TCP and IP protocols and Common implementation Strategieshttp://www.bsdcan.org/2009/schedule/events/129.en.html
Results of a Security Assessment of the TCP and IP
protocols and Common implementation Strategies
Fernando Gont will present the results of security
assessment of the TCP and IP protocols carried out
on behalf of the United Kingdom's Centre for the
Protection of National Infrastructure (Centre for
the Protection of National Infrastructure). His
presentation will provide an overview of the
aforementioned project, and will describe some of
the new insights that were gained as a result of
this project. Additionally, it will provide an
overview of the state of affairs of the different
TCP/IP implementations found in BSD operating systems
with respect to the aforementioned issues.
During the last twenty years, many vulnerabilities
have been identified in the TCP/IP stacks of a
number of systems. The discovery of these vulnerabilities
led in most cases to reports being published by a
number of CSIRTs and vendors, which helped to raise
awareness about the threats and the best possible
mitigations known at the time the reports were
published. For some reason, much of the effort of
the security community on the Internet protocols
did not result in official documents (RFCs) being
issued by the organization in charge of the
standardization of the communication protocols in
use by the Internet: the Internet Engineering Task
Force (IETF). This basically led to a situation in
which "known" security problems have not always
been addressed by all vendors. In addition, in many
cases vendors have implemented quick "fixes" to the
identified vulnerabilities without a careful analysis
of their effectiveness and their impact on
interoperability. As a result, producing a secure
TCP/IP implementation nowadays is a very difficult
task, in large part because of the hard task of
identifying relevant documentation and differentiating
between that which provides correct advisory, and
that which provides misleading advisory based on
inaccurate or wrong assumptions. During 2006, the
United Kingdom's Centre for the Protection of
National Infrastructure embarked itself in an
ambitious and arduous project: performing a security
assessment of the TCP and IP protocols. The project
did not limit itself to an analysis of the relevant
IETF specifications, but also included an analysis
of common implementation strategies found in the
most popular TCP and IP implementations. The result
of the project was a set of documents which identifies
possible threats for the TCP and IP protocols and,
where possible, proposes counter-measures to mitigate
the identified threats. This presentation will
describe some of the new insights that were gained
as a result of this project. Additionally, it will
provide an overview of the state of affairs of the
different TCP/IP implementations found in BSD
operating systems.
bsdcanbsdcan2009presentationbsdsecurity assessmentfernado gonthttp://www.bsdcan.org/2009/schedule/attachments/72_fgont-bsdcan2009-proposal.pdf3 pages93 KbProposalpdfhttp://www.bsdcan.org/2009/schedule/attachments/73_InternetProtocol.pdf63 pages660 KbSecurity Assessment of the Internet Protocolpdfhttp://www.bsdcan.org/2009/schedule/attachments/75_tn-03-09-security-assessment-TCP.pdf130 pages1.4 MbSecurity Assessment of the Transmission Control Protocol (TCP)pdfhttp://www.bsdcan.org/2009/schedule/attachments/78_fgont-bsdcan2009-tcp-ip-security-assessment.pdf64 pages473 KbSlidespdfRandi Harper - Automating FreeBSD Installationshttp://www.bsdcan.org/2009/schedule/events/126.en.html
Automating FreeBSD Installations
PXE Booting and install.cfg Demystified
This paper will provide an explanation of the tools
involved in performing an automated FreeBSD install
and a live demonstration of the process.
FreeBSD's sysinstall provides a powerful and flexible
mechanism for automated installs but doesn't get
used very often because of a lack of documentation.
bsdcanbsdcan2009presentationfreebsdpxesysinstallrandi harperhttp://www.bsdcan.org/2009/schedule/attachments/79_automating_freebsd_installations.odp14 pages33 KbSlidesodpBrooks Davis - Isolating Cluster Jobs for Performance and Predictabilityhttp://www.bsdcan.org/2009/schedule/events/125.en.html
Isolating Cluster Jobs for Performance and Predictability
At The Aerospace Corporation, we run a large FreeBSD
based computing cluster to support engineering
applications. These applications come in all shapes,
sizes, and qualities of implementation. To support
them and our diverse userbase we have been searching
for ways to isolate jobs from one another in ways
that are more effective than Unix time sharing and
more fine grained than allocating whole nodes to
jobs.
In this talk we discuss the problem space and our
efforts so far. These efforts include implementation
of partial file systems virtualization and CPU
isolation using CPU sets.
bsdcanbsdcan2009presentationfreebsdclusterbrooks davishttp://www.bsdcan.org/2009/schedule/attachments/91_job-isolation-performance-talk.pdf27 pages1.4 MbSlidespdfJohn Baldwin - Multiple Passes of the FreeBSD Device Treehttp://www.bsdcan.org/2009/schedule/events/118.en.html
Multiple Passes of the FreeBSD Device Tree
The existing device driver framework in FreeBSD
works fairly well for many tasks. However, there
are a few problems that are not easily solved with
the current design. These problems include having
"real" device drivers for low-level hardware such
as clocks and interrupt controllers, proper resource
discovery and management, and allowing most drivers
to always probe and attach in an environment where
interrupts are enabled. I propose extending the
device driver framework to support multiple passes
over the device tree during boot. This would allow
certain classes of drivers to be attached earlier
and perform boot-time setup before other drivers
are probed and attached. This in turn can be used
to develop solutions to the earlier list of problems.
bsdcanbsdcan2009presentationfreebsddevice treejohn baldwinhttp://www.bsdcan.org/2009/schedule/attachments/83_article.pdf8 pages103 KbPaperpdfhttp://www.bsdcan.org/2009/schedule/attachments/85_slides.pdf15 pages60 KbSlidespdfColin Percival - scrypt: A new key derivation functionhttp://www.bsdcan.org/2009/schedule/events/147.en.html
scrypt: A new key derivation function
Doing our best to thwart TLAs armed with ASICs
Password-based key derivation functions are used
for two primary purposes: First, to hash passwords
so that an attacker who gains access to a password
file does not immediately possess the passwords
contained therewithin; and second, to generate
cryptographic keys to be used for encrypting or
authenticating data.
In both cases, if passwords do not have sufficient
entropy, an attacker with the relevant data can
perform a brute force attack, hashing potential
passwords repeatedly until the correct key is found.
While commonly used key derivation functions, such
as Kamp's iterated MD5, Provos and Mazieres' bcrypt,
and RSA Laboratories' PBKDF1 and PBKDF2 make an
attempt to increase the difficulty of brute-force
attacks, they all require very little memory, making
them ideally suited to attack by custom hardware.
In this talk, I will introduce the concepts of
memory-hard and sequential memory-hard functions,
and argue that key derivation functions should be
sequential memory-hard. I will present a key
derivation function which, subject to common
assumptions about cryptographic hash functions, is
provably sequential memory-hard, and a variation
which appears to be stronger (but not provably so).
Finally, I will provide some estimates of the cost
of performing brute force attacks on a variety of
password strengths and key derivation functions.
bsdcanbsdcan2009presentationscryptcolin percivalhttp://www.bsdcan.org/2009/schedule/attachments/87_scrypt.pdf16 pages201 KbPaperpdfhttp://www.bsdcan.org/2009/schedule/attachments/86_scrypt_slides.pdf21 pages556 KbSlidespdfGeorge Neville-Neil - Thinking about thinking in codehttp://www.bsdcan.org/2009/schedule/events/145.en.html
Thinking about thinking in code
Proposed keynote talk
This is not a talk that's specific to any BSD but
is a more general talk about how we think about
coding and how our thinking changes the way we code.
I compare how we built systems to how other industries
build their products and talk about what we can
learn from how we work and from how others work as
well.
bsdcanbsdcan2009keynotebsdgeorge neville-neilhttp://www.bsdcan.org/2009/schedule/attachments/103_BSDCan2009Keynote.pdf137 pages4.0 MbSlidespdfStephen Borrill - Building products with NetBSD - thin-clientshttp://www.bsdcan.org/2009/schedule/events/140.en.html
Building products with NetBSD - thin-clients
NetBSD: delivering the goods
This talk will discuss what thin-clients are, why
they are useful and why NetBSD is good choice to
build such a device.
This talk will provide information on some alternatives
and the strengths and weaknesses of NetBSD when
used in such a device.
It will discuss problems that needed to be addressed
such as how to get a device with rich functionality
running from a small amount of flash storage, as
well as recent developments in NetBSD that have
helped improve the product.
bsdcanbsdcan2009presentationnetbsdthin clientstephen borrillhttp://www.bsdcan.org/2009/schedule/attachments/77_BuildingProductsWithNetBSDthin-clients-Stephen-Borrill.pdf60 pages499 KbSlidespdfCat Allman and Leslie Hawthorn - Getting Started in Free and Open Sourcehttp://www.bsdcan.org/2009/schedule/events/149.en.html
Getting Started in Free and Open Source
Interested in getting involved? But don't really
know where or how to start?
The talk is called "Getting Started in Free and
Open Source". It's a talk for beginners who are
interested to getting involved but don't really
know where or how to start.
We cover the basics of: -why you might want to get
involved -what you can get out of participating
-more than coding is needed -how to chose a project
-how to get started -etiquette of lists and other
communication -dos and don't of joining a community
bsdcanbsdcan2009presentationgetting startedcat allmanleslie hawthornhttp://www.bsdcan.org/2009/schedule/attachments/99_BSDCan_allman_lhawthorn.odp25 pages893 KbSlidesodfWarner Losh - Tracking FreeBSD in a commercial Environmenthttp://www.bsdcan.org/2009/schedule/events/143.en.html
Tracking FreeBSD in a commercial Environment
How to stay current while staying sane
The FreeBSD project publishes two lines of source
code: current and stable. All changes must first
be committed to current and then are merged into
stable. Commercial organizations wishing to use
FreeBSD in their products must be aware of this
policy. Four different strategies have developed
for tracking FreeBSD over time. A company can choose
to run only unmodified release versions of FreeBSD.
A company may choose to import FreeBSD's sources
once and then never merge newer versions. A company
can choose to import each new stable branch as it
is created, adding its own changes to that branch,
as well as integrating new versions from FreeBSD
from time to time. A company can track FreeBSD's
current branch, adding to it their changes as well
as newer FreeBSD changes. Which method a company
chooses depends on the needs of the company. These
methods are explored in detail, and their advantages
and disadvantages are discussed. Tracking FreeBSD's
ports and packages is not discussed.
Companies building products based upon FreeBSD have
many choices in how to use the projects sources and
binaries. The choices range from using unmodified
binaries from FreeBSD's releases, to tracking modify
FreeBSD heavily and tracking FreeBSD's evolution
in a merged tree. Some companies may only need to
maintain a stable version of FreeBSD with more bug
fixes or customizations than the FreeBSD project
wishes to place in that branch. Some companies also
wish to contribute some subset of their changes
back to the FreeBSD project.
FreeBSD provides an excellent base technology with
which to base products. It is a proven leader in
performance, reliability and scalability. The
technology also offers a very business friendly
license that allows companies to pick and choose
which changes they wish to contribute to the community
rather than forcing all changes to be contributed
back, or attaching other undesirable license
conditions to the code.
However, the FreeBSD project does not focus on
integration of its technology into customized
commercial products. Instead, the project focuses
on producing a good, reliable, fast and scalable
operating system and associated packages. The project
maintains two lines of development. A current branch,
where the main development of the project takes
place, and a stable branch which is managed for
stability and reliability. While the project maintains
documentation on the system, including its development
model, relatively little guidance has been given
to companies in how to integrate FreeBSD into their
products with a minimum of trouble.
Developing a sensible strategy to deal with both
these portions of FreeBSD requires careful planning
and analysis. FreeBSD's lack of guidelines to
companies leaves it up to them to develop a strategy.
FreeBSD's development model differs from some of
the other Free and Open Source projects. People
familiar with those systems often discover that
methods that were well suited to them may not work
as well with FreeBSD's development model. These two
issues cause many companies to make poor decisions
without understanding the problems that lie in their
future.
Very little formal guidance exists for companies
wishing to integrate FreeBSD into their products.
Some email threads can be located via a Google
search that could help companies, but many of them
are full of contradictory information, and it is
very disorganized. While the information about the
FreeBSD development process is in the FreeBSD
handbook, the implications of that process for
companies integrating FreeBSD into their products
are not discussed.
bsdcanbsdcan2009presentationfreebsdcommercial environmentwaner loshhttp://www.bsdcan.org/2009/schedule/attachments/82_bsdcan2009-paper.pdf10 pages104 KbSlidespdfhttp://www.bsdcan.org/2009/schedule/attachments/81_bsdcan2009-slides.pdf45 pages624 KbPaperpdfKris Moore - PC-BSD - Making FreeBSD on the desktop a realityhttp://www.bsdcan.org/2009/schedule/events/133.en.html
PC-BSD - Making FreeBSD on the desktop a reality
FreeBSD on the Desktop
While FreeBSD is a all-around great operating system,
it is greatly lagging behind in desktop appeal. Why
is this? In this talk, we will take a look at some
of the desktop drawbacks of FreeBSD, and how are
are attempting to fix them through PC-BSD.
FreeBSD has a reputation for its rock-solid
reliability, and top-notch performance in the server
world, but is noticeably absent when it comes to
the vast market of desktop computing. Why is this?
FreeBSD offers many, if not almost all of the same
open-source packages and software that can be found
in the more popular Linux desktop distributions,
yet even with the speed and reliability FreeBSD
offers, a relative few number of users are deploying
it on their desktops.
In this presentation we will take a look at some
of the reasons why FreeBSD has not been as widely
adopted in the desktop market as it has on the
server side. Several of the desktop weaknesses of
FreeBSD will be shown, along with how we are trying
to fix these short-comings through a desktop-centric
version of FreeBSD, known as PC-BSD. We will also
take a look at the package management system employed
by all open-source operating systems alike, and
some of the pitfalls it brings, which may hinder
widespread desktop adoption.
bsdcanbsdcan2009presentationpc-bsdfreebsdkris moorehttp://www.bsdcan.org/2009/schedule/attachments/76_pcbsd-bsdcan09.pdf35 pages512 KbSlidespdfhttp://www.bsdcan.org/2009/schedule/attachments/74_bsdcan09-PCBSD.pdf9 pages351 KbPaperpdfSean Bruno - Implementation of TARGET_MODE applicationshttp://www.bsdcan.org/2009/schedule/events/127.en.html
Implementation of TARGET_MODE applications
How we used TARGET_MODE in the kernel to create and
interesting product
This presentation will cover a real world implementation
of the TARGET_MODE infrastructure in the kernel
(stable/6). Topics to include: drivers used (isp,
aic7xxx, firewire). scsi_target userland code vs
kernel drivers missing drivers (4/8G isp support,
iSCSI target)
Target Mode describes a feature within certain
drivers that allows a FreeBSD system to emulate a
Target in the SCSI sense of the word. By recompiling
your kernel with this feature enabled, it permits
one to turn a FreeBSD system into an external hard
disk. This feature of the FreeBSD kernel provides
many interesting implementations and is highly
desirable to many organizations whom run FreeBSD
as their platform.
I have been tasked with the maintenance of a
proprietary target driver that interfaces with the
FreeBSD kernel to do offsite data mirroring at the
block level. This talk will discuss the implementation
of that kernel mode driver and the process my
employer went through to implement a robust and
flexible appliance.
Since I took over the implementation, we have
implemented U160 SCSI(via aic7xxx), 2G Fibre
Channel(via isp) and Firewire 400 (via sbp_targ).
Each driver has it's own subtleties and requirements.
I personally enhanced the existing Firewire target
driver and was able to get some interesting results.
I hope to demonstrate a functional Firewire 400/800
target and show how useful this application can be
for the embedded space. Also, I wish to demonstrate
the need for iSCSI. USB and 4/8G Fibre Channel
target implementations that use the TARGET_MODE
infrastructure that is currently in place to allow
others to expand their various interface types.
The presentation should consist of a high level
overview, followed by detailed implementation
instructions with regards to the Firewire implementation
and finish up with a hands-on demonstration with a
FreeBSD PC flipped into TARGET_MODE and a Mac.
bsdcanbsdcan2009presentationfreebsdfirewiresean brunohttp://www.bsdcan.org/2009/schedule/attachments/92_BSDCan_TMODE_Preso.pdf22 pages72 KbSlidespdfGeorge Neville-Neil - Understanding and Tuning SCHED_ULEhttp://www.bsdcan.org/2009/schedule/events/117.en.html
Understanding and Tuning SCHED_ULE
With the advent of widespread SMP and multicore CPU
architectures it was necessary to implement a new
scheduler in the FreeBSD operating system. The
SCHEDULE scheduler was added for the 5 series of
FreeBSD releases and has now matured to the point
where it is the default scheduler in the 7.1 release.
While scheduling processes was a difficult enough
task in the uniprocessor world, moving to multiple
processors, and multiple cores, has significantly
increased the number of problems that await engineers
who wish to squeeze every last ounce of performance
out of their system. This talk will cover the basic
design of SCHEDULE and focus a great deal of attention
on how to tune the scheduler for different workloads,
using the sysctl interfaces that have been provided
for that purpose.
Understanding and tuning a scheduler used to be
done only by operating systems designers and perhaps
a small minority of engineers focusing on esoteric
high performance systems. With the advent of
widespread multi-processor and multi-core architectures
it has become necessary for more users and
administrators to decide how to tune their systems
for the best performance. The SCHEDULE scheduler
in FreeBSD provides a set of sysctl interfaces for
tuning the scheduler at run time, but in order to
use these interfaces effectively the scheduling
process must first be understood. This presentation
will give an overview of how SCHEDULE works and
then will show several examples of tuning the system
with the interfaces provided.
The goal of modifying the scheduler's parameters
is to change the overall performance of programs
on the system. One of the first problems presented
to the person who wants to tune the scheduler is
how to measure the effects of their changes. Simply
tweaking the parameters and hoping that the tweaks will
help is not going to lead to good results. In our
recent experiments we have used the top(1) program
to measure our results.
bsdcanbsdcan2009presentationfreebsdsched_ulegeorge neville-neilhttp://www.bsdcan.org/2009/schedule/attachments/101_sched_tuning.pdf29 pages228 KbSlidespdfLawrence Stewart - Improving the FreeBSD TCP Implementationhttp://www.bsdcan.org/2009/schedule/events/121.en.html
Improving the FreeBSD TCP Implementation.
An update on all things TCP in FreeBSD and how they
affect you.
My involvement in improving the FreeBSD TCP stack
has continued this past year, with much of the work
targeted at FreeBSD 8. This talk will cover what
these changes entail, why they are of interest to
the FreeBSD community and how they help to improve
our TCP implementation.
It has been a busy year since attending my inaugural
BSDCan in 2008, where I talked about some of my
work with TCP in FreeBSD.
I have continued the work on TCP analysis/debugging
tools and integrating modular congestion control
into FreeBSD as part of the NewTCP research project.
I will provide a progress update on this work.
Additionally, a grant win from the FreeBSD Foundation
to undertake a project titled "Improving the FreeBSD
TCP Implementation" at Swinburne University's Centre
for Advanced Internet Architectures has been
progressing well. The project focuses on bringing
TCP Appropriate Byte Counting (RFC 3465), reassembly
queue auto-tuning and integration of low-level
analysis/debugging tools to the base system, all
of which I will also discuss.
bsdcanbsdcan2009presentationfreebsdtcplawrence stewarthttp://www.bsdcan.org/2009/schedule/attachments/89_bsdcan200905.pdf38 pages2.1 MbSlidespdfJoerg Sonnenberger - Journaling FFS with WAPBLhttp://www.bsdcan.org/2009/schedule/events/138.en.html
Journaling FFS with WAPBL
NetBSD 5 is the first NetBSD release with a journaling
filesystem. This lecture introduces the structure
of the Fast File System, the modifications for WAPBL
and specific constraints of the implementation.
The Fast File System (FFS) has been used in the BSD
land for more than two decades. The original
implementation offered two operational modes:
safe and slow (sync)
unsafe and fast (async) One decade ago, Kirk
McKusick introduced the soft dependency mechanism
to offset the performance impact without risk of
mortal peril on the first crash. With the advent
of Terabyte hard disks, the need for a file system
check (fsck) after a crash becomes finally unacceptable.
Even a background fsck like supported on FreeBSD
consumes lots of CPU time and IO bandwidth.
Based on a donation from Wasabi Systems, Write Ahead
Physical Block Logging (WAPBL) provides journaling
for FFS with similar or better performance than
soft dependencies during normal operation. Recovery
time after crashes depends on the amount of outstanding
IO operations and normally takes a few seconds.
This lecture gives a short overview of FFS and the
consistency constraints for meta data updates. It
introduces the WAPBL changes, both in terms of the
on-disk format and the implementation in NetBSD.
Finally the implementation is compared to the design
of comparable file systems and specific issues of
and plans for the current implementation are
discussed.
bsdcanbsdcan2009presentationnetbsdwapblffsjoerg sonnenbergerhttp://www.netbsd.org/gallery/presentations/joerg/bsdcan2009/wapbl.html24 pages10 KbSlideshtmlIvan Voras - Remote and mass management of systems with finstallhttp://www.bsdcan.org/2009/schedule/events/115.en.html
Remote and mass management of systems with finstall
Automated management on a largish scale
An important part of the "finstall" project, created
as a graphical installer for FreeBSD, is a configuration
server that can be used to remotely administer and
configure arbitrary systems. It allows for remote
scripting of administration tasks and is flexible
enough to support complete reconfiguration of running
systems.
The finstall project has two major parts - the
front-end and the back-end. The front-end is just
a GUI allowing the users to install the system in
a convenient way. The back-end is a network-enabled
XML-RPC server that is used by the front-end to
perform its tasks. It can be used as a stand-alone
configuration daemon. This talk will describe a way
to make use of this property of finstall to remotely
manage large groups of systems.
Determining if a TCP stack is working correctly is
hard. The tcpdiff project aims for a simpler goal:
To automatically detect differences in TCP behavior
between different versions of an operating system
and display those differences in an easy to understand
format. The value judgement of whether a certain
change between version X and Y of a TCP stack is
good or bad will be left to human eyes.
Determining if a TCP stack is working correctly is
hard. The tcpdiff project aims for a simpler goal:
To automatically detect differences in TCP behavior
between different versions of an operating system
and display those differences in an easy to understand
format. The value judgement of whether a certain
change between version X and Y of a TCP stack is
good or bad will be left to human eyes.
The initial version of tcpdiff presented at NYCBSDCon
2008 demonstrated that it could be used to detect
at least two major TCP bugs that were introduced
into FreeBSD in the past few years. The work from
that presentation can be viewed at
http://www.silby.com/nycbsdcon08/.
For BSDCan 2009, I hope to fix a number of bugs in
tcpdiff, make it easier to use, set up nightly tests
of FreeBSD, and improve it so that additional known
bugs can be detected. Additionally, I plan to run
it on OSes other than FreeBSD.
bsdcanbsdcan2009presentationtcpdifffreebsdmike silbersackhttp://www.bsdcan.org/2009/schedule/attachments/90_BSDCan-tcpdiff.pdf33 pages89 KbSlidespdfPhilip Paeps - Crypto Acceleration on FreeBSDhttp://www.bsdcan.org/2009/schedule/events/135.en.html
Crypto Acceleration on FreeBSD
As more and more services on the internet become
cryptographically secured, the load of cryptography
on systems becomes heavier and heavier. Crypto
acceleration hardware is available in different
forms for different workloads. Embedded communications
processors from VIA and AMD have limited acceleration
facilities in silicon and various manufacturers
build hardware for accelerating secure web traffic
and IPSEC VPN tunnels.
This talk gives an overview of FreeBSD's crypto
framework in the kernel and how it can be used
together with OpenSSL to leverage acceleration
hardware. Some numbers will be presented to demonstrate
how acceleration can improve performance - and how
it can curiously bring a system to a grinding halt.
Philip originally started playing with crypto
acceleration when he saw the "crypto block" in one
of his Soekris boards. As usual, addiction was
instant and by the grace of the "you touch it, you
own it" principle, he has been fiddling the crypto
framework more than is good for him.
bsdcanbsdcan2009presentationcrypto accelerationfreebsdphilip paepshttp://www.bsdcan.org/2009/schedule/attachments/97_crypto_acceleration_on_freebsd.pdf28 pages361 KbSlidespdfSean Bruno - Firewire BoF Plugfesthttp://www.bsdcan.org/2009/schedule/events/144.en.html
Firewire BoF Plugfest
Debugging and testing of Firewire products with FreeBSD
Come one come all to a Firewire plugfest. Let's
debug and test together and see if we can't knock
out some features and bugs.
A hands-on testing and debugging session of the
Firewire stack in FreeBSD.
Everyone who wishes to attend should bring their
Firewire devices, ext Drives and Cameras, and their
Laptops. I will be debugging and capturing data
points to enhance and improve features in the
Firewire stack.
We should be able to knock out quite a bunch of
bugs if folks can bring their various Firewire
devices along with their various PCs.
Even if your Firewire device works perfectly, bring
it by so it can be documented as supported by the
Firewire team!
bsdcanbsdcan2009presentationfirewireplugfestsean brunohttp://www.bsdcan.org/2009/schedule/attachments/93_FireWireBoF.odp1 page37 KbSlidesodpPeter Hansteen - Building the Network You Need with PF, the OpenBSD packet filterhttp://www.bsdcan.org/2009/schedule/track/Tutorial/114.en.html
Building the Network You Need with PF, the OpenBSD
packet filter.
Building the network you need is the central theme
for any network admin. This tutorial is for aspiring
or seasoned network professionals with at least a
basic knowledge of networking in general and TCP/IP
particular. The session aims at teaching tools and
techniques to make sure you build your network to
work the way it's supposed to, keeping you in charge.
Central to the toolbox is the OpenBSD PF packet
filter, supplemented with tools that interact with
it. Whether you are a greybeard looking for ways
to optimize your setups or a greenhorn just starting
out, this session will give you valuable insight
into the inner life of your network and provide
pointers to how to use that knowledge to build the
network you need. The session will also offer some
fresh information on changes introduced in OpenBSD
4.5, the most recent version of PF and OpenBSD. The
tutorial is loosely based on Hansteen's recent book,
/The Book of PF/ (No Starch Press), with updates
and adaptations based on developments since the
book's publication date.
bsdcanbsdcan2009tutorialpfopenbsdpeter hansteenhttp://www.bsdcan.org/2009/schedule/attachments/98_BSDCan2009_hansteen_pf_tutorial.zip68 pages2.5 MbSlideshtmlGeorge Neville-Neil - Networking from the Bottom Up: Device Drivershttp://www.bsdcan.org/2009/schedule/track/Tutorial/146.en.html
Networking from the Bottom Up: Device Drivers.
In this tutorial I will describe how to write and
maintain network drivers in FreeBSD and use the
example of the Intel Gigabit Ethernet driver (igb)
throughout the course.
Students will learn the basic data structures and
APIs necessary to implement a network driver in
FreeBSD. The tutorial is general enough that it can
be applied to other BSDs, and likely to other
embedded and UNIX like systems while being specific
enough that given a device and a manual the student
should be able to develop a working driver on their
own. This is the first of a series of lectures on
network that I am developing over the next year or
so.
The i in iSCSI stands for internet, some say for
insecure, personally I like to think interesting.
I'll try to share the road followed from RFC-3720
to the actual working driver, the challenges, the
frustrations.
pfSense is a free, open source customized distribution
of FreeBSD tailored for use as a firewall and router.
In addition to being a powerful, flexible firewalling
and routing platform, it includes a long list of
related features and a package system allowing
further expandability without adding bloat and
potential security vulnerabilities to the base
distribution. pfSense is a popular project with
more than 1 million downloads since its inception,
and proven in countless installations ranging from
small home networks protecting a PC and an Xbox to
large corporations, universities and other organizations
protecting thousands of network devices.
This tutorial is being presented by the founders
of the pfSense project, Chris Buechler and Scott
Ullrich.
The session will start with an introduction to the
project, hardware sizing and selection, installation,
firewalling concepts and basic configuration, and
continue to cover all the most popular features of
the system. Common usage scenarios, deployment
considerations, step by step configuration guidance,
and best practices will be covered for each feature.
Most configurations will be demonstrated in a live
lab environment.
Attendees are assumed to have basic knowledge of
TCP/IP and firewalling concepts, however no in-depth
knowledge in these areas or prior knowledge of
pfSense or FreeBSD is necessary.
bsdcanbsdcan2008tutorialfreebsdpfsensescott ullrichchris buechlerhttp://www.bsdcan.org/2008/schedule/attachments/66_pfSenseTutorial.pdf91 pages4.1 KbPDF filepdfBjoern A. Zeeb - BSDCan08 devsummit summaryhttps://people.FreeBSD.org/~bz/200805DevSummit/
200805DevSummit - BSDCan 2008 FreeBSD Developer summit summary
bsdcanbsdcan2008devsummitdevsummit2008freebsdwriteupbjoern a zeebRafal Jaworowski - FreeBSD Embedded Reporthttps://wiki.freebsd.org/200805DevSummit
FreeBSD Embedded Report
bsdcanbsdcan2008devsummitdevsummit2008freebsdembeddedrafal jaworowskihttps://wiki.freebsd.org/200805DevSummit?action=AttachFile&do=get&target=devsummit-200805-embedded_summary.pdf6 pages58 KbPDF filepdfRobert Watson - TCP SMP Scalabilityhttps://wiki.freebsd.org/200805DevSummit
TCP SMP Scalability
bsdcanbsdcan2008devsummitdevsummit2008freebsdsmprobert watsonhttps://wiki.freebsd.org/200805DevSummit?action=AttachFile&do=get&target=20080515-stack-parallelism.pdf8 pages70 KbPDF filepdfErwin Lansing - What's happening in the world of ports and portmgrhttps://wiki.freebsd.org/200805DevSummit
What's happening in the world of ports and portmgr
bsdcanbsdcan2008devsummitdevsummit2008freebsdportmgrerwin lansinghttps://wiki.freebsd.org/200805DevSummit?action=AttachFile&do=get&target=portmgr-BSDCan2008.pdf14 pages146 KbPDF filepdfKern Sibbald - Baculahttp://www.bsdcan.org/2008/schedule/events/96.en.html
Bacula
The Open Source Enterprise Backup Solution
The Bacula project started in January 2000 with
several goals, one of which was the ability to
backup any client from a Palm to a mainframe computer.
Bacula is available under a GPL license.
Bacula uses several distinct components, each
communicating via TCP/IP, to achieve a very scalable
and robust solution to backups.
Kern is one of the original project founders and
still one of the most productive Bacula developers.
FreeBSD now runs on the MIPS platform. FreeBSD/mips
supports MIPS-32 and MIPS-64 targets, including SMP
for multicore support.
FreeBSD/mips is targeted at the embedded MIPS
marketplace. FreeBSD has run on the MIPS platform
for many years. Juniper ported FreeBSD to the Mips
platform in the late 1990's. However, concern about
intellectual property issues kept Juniper from
contributing the port back to FreeBSD until recently.
The contributed port was a 64-bit mips port.
In the mean time, many efforts were made to bring
FreeBSD to the mips platform. The first substantial
effort to bring FreeBSD to the Mips platform was
done by Juli Mallet. This effort made it to single
user, but never further than that. This effort was
abandoned due to a change in Juli's life. The port
languished.
Two years ago at BSDcan, as my involvement with
FreeBSD/arm was growing, I tried to rally the troops
into doing a FreeBSD/mips port. My efforts resulted
in what has been commonly called the "mips2" effort.
The name comes from the choice of //depot/projects/mips2
to host the work in perforce. A number of people
worked on the earliest versions of the port, but
it too languished and seemed destined to suffer the
same fate as earlier efforts. Then, two individuals
stood up and started working on the port. Wojciech
A. Koszek and Oleksandr Tymoshenko pulled in code
from the prior efforts. Through their efforts of
stabilizing this code, the port to the single user
stage and ported it to three different platforms.
Others ported it to a few more. Snapshots of this
work were released from time to time.
Cavium Networks picked up one of these snapshots
and ported it to their multicore mips64 network
processor. Cavium has kindly donated much of their
work to the comminuty.
In December, I started at Cisco systems. My first
job was to merge all the divergent variants of
FreeBSD/mips and get it into shape to push into the
tree. With luck, this should be in the tree before
I give my talk.
In parallel to this, other advances in the embedded
support for FreeBSD have been happening as well.
I'll talk about new device drivers, new subsystems,
and new build tools that help to support the embedded
developer.
bsdcanbsdcan2008slidesfreebsdmipsembeddedwarner loshhttp://www.bsdcan.org/2008/schedule/attachments/63_freebsd-mips-bsdcan-2008.pdf19 pages1.3 MbPDF filepdfKris Moore - Building self-contained PBIs from Ports (Automagically)http://www.bsdcan.org/2008/schedule/events/81.en.html
Building self-contained PBIs from Ports (Automagically)
Creating a self-contained application from the ports tree
PC-BSD provides a user-friendly desktop experience,
for experts and casual users alike. PC-BSD is 100%
FreeBSD under the hood, while providing desktop
essentials, such as a graphical installation system,
point-n-click package-management using the PBI
system, and easy to use system management tools;
All integrated into an easy to use K Desktop
Environment (KDE).
The PBI (Push Button Installer) format is the
cornerstone of the PC-BSD desktop, which allows
users to install applications in a self-contained
format, free from dependency problems, and compile
issues that stop most casual users from desktop
adoption. The PBI format also provides power and
flexibility in user interaction, and scripting
support, which allows applications to be fine-tuned
to the best possible user experience.
This talk would go over in some detail our new PBI
building system, which converts a FreeBSD port,
such as FireFox, into a standalone self-contained
PBI installer for PC-BSD desktops.
The presentation will be divided into two main sections:
The Push Button Installer (PBI) Format
The basics of the PBI format
The PBI format construction
Add & Remove scripting support within PBI
Building PBIs from Ports "Auto-magically"
The PBI build server & standalone software
Module creation & configuration
Converting messy ports into PBIs
bsdcanbsdcan2008slidespc-bsdportspbikris moorehttp://www.bsdcan.org/2008/schedule/attachments/57_PBIPresentation26 pages120 KbPDF filepdfJohn Pertalion - An Open Source Enterprise VPN Solution with OpenVPN and OpenBSDhttp://www.bsdcan.org/2008/schedule/events/71.en.html
An Open Source Enterprise VPN Solution with OpenVPN and OpenBSD
Solving the problem
At Appalachian State University, we utilize an open
source VPN to allow faculty, staff and vendors
secure access to Appalachian State University's
internal network from any location that has an
Internet connection. To implement our virtual private
network project, we needed a secure VPN that is
flexible enough to work with our existing network
registration and LDAP authentication systems, has
simple client installation, is redundant, allows
multiple VPN server instances for special site-to-site
tunnels and unique configurations, and can run on
multiple platforms. Using OpenVPN running on OpenBSD,
we met those requirements and added a distributed
administration system that allows select users to
allow VPN access to specific computers for external
users and vendors without requiring intervention
from our network or security personnel. Our
presentation will start with a quick overview of
OpenVPN and OpenBSD and then detail the specifics
of our VPN implementation.
Dissatisfied with IPSec for road warrior VPN usage
we went looking for a better solution. We had hopped
that we could find a solution that would run on
multiple platforms, was flexible and worked well.
We found OpenVPN and have been pleased. Initially
we ran it on RHEL. We migrated to OpenBSD for pf
functionality and general security concerns. ...and
because we like OpenBSD.
Our presentation will focus on the specifics of our
VPN implementation. We will quickly cover the basics
of OpenVPN and the most used features of OpenBSD.
Moving along we will cover multiple authentication
methods, redundancy, running multiple instances,
integration with our netreg system, how pf has
extended functionality, embedding in appliances,
and client configuration. The system has proven
helpful with providing vendor access where needed
and we'll cover this aspect as well. Time permitting
we will cover current enhancement efforts and future
plans.
OpenVPN has been called the "Swiss army knife" of
VPN solutions. We hope our presentation leaves
participants with that feeling.
bsdcanbsdcan2008slidesopenbsdopenvpnjohn pertalionhttp://www.bsdcan.org/2008/schedule/attachments/59_OVPN-BSDCan2008.pdf26 pages127 KbPDF filepdfIvan Voras - "finstall" - the new FreeBSD installerhttp://www.bsdcan.org/2008/schedule/events/69.en.html
"finstall" - the new FreeBSD installer
A graphical installer for FreeBSD
The "finstall" project, sponsored by Google as a
Summer of Code 2007 project, is an attempt to create
a user-friendly graphical installer for FreeBSD,
with enough strong technical features to appeal to
the more professional users. A long term goal for
it is to be a replacement for sysinstall, and as
such should support almost all of the features
present in sysinstall, as well as add support for
new FreeBSD features such as GEOM, ZFS, etc. This
talk will describe the architecture of "finstall"
and focus on its lesser known features such as
remote installation.
"finstall" is funded by Google SoC as a possible
long-term replacement for sysinstall, as a "LiveCD"
with the whole FreeBSD base system on the CD, with
X11 and XFCE4 GUI. In the talk I intend to describe
what I did so far, and what are the future plans
for it. This includes the installer GUI, the backend
(which has the potential to become a generic FreeBSD
configuration backend) and the assorted tools
developed for finstall ("LiveCD" creation scripts).
More information on finstall can be found here:
https://wiki.freebsd.org/finstall.
bsdcanbsdcan2008slidesfreebsdinstallerivan vorashttp://www.bsdcan.org/2008/schedule/attachments/56_bsdcantalk.pdf39 pages1.1 MbPDF filepdfPoul-Henning Kamp - Measured (almost) does Air Traffic Controlhttp://www.bsdcan.org/2008/schedule/events/68.en.html
Measured (almost) does Air Traffic Control
Monitoring weird hardware reliably
The new Danish Air Traffic Control system, CASIMO,
prompted the development on a modular and general
software platform for data collection, control and
monitoring of "weird hardware" of all sorts.
The talk will present the "measured" daemon, and
detail some of the uses it has been put to, as an,
admittedly peripheral, component of the ATC system.
Many "SCADA" systems suffer from lack of usable
interfaces for external access to the data. Measured
takes the opposite point of view and makes real-time
situation available, and accepts control instructions
as ASCII text stream over TCP connections. Several
examples of how this can be used will be demonstrated.
Measured will run on any FreeBSD system, but has
not been ported to other UNIX variants yet, and it
is perfect for that "intelligent house" project of
yours.
I believe I gave a WIP presentation of this about
two years ago.
LLVM is a suite of carefully designed open source
libraries that implement compiler components (like
language front-ends, code generators, aggressive
optimizers, Just-In-Time compiler support, debug
support, link-time optimization, etc.). The goal
of the LLVM project is to build these components
in a way that allows them to be combined together
to create familiar tools (like a C compiler),
interesting new tools (like an OpenGL JIT compiler),
and many other things we haven't thought of yet.
Because LLVM is under continuous development, clients
of these components naturally benefit from improvements
in the libraries.
This talk gives an overview of LLVM's design and
approach to compiler construction, and gives several
example applications. It describes applications of
LLVM technology to llvm-gcc (a C/C++/Objective C
compiler based on the GNU GCC front-end), the OpenGL
stack in Mac OS/X Leopard, and Clang. Among other
things, the Clang+LLVM Compiler provides a fully
BSD-Licensed C and Objective-C compiler (with C++
in development) which compiles code several times
faster than GCC, produces code that is faster than
GCC in many cases, produces better warnings and
error messages, and supports many other applications
(e.g. static analysis and refactoring).
The traditional closing...
with some new and interesting twists. Sleep in if
you must, but don't miss this session.
bsdcanbsdcan2008slidesrobert watsonhttp://www.bsdcan.org/2008/schedule/attachments/47_BSDCann2008Closing.pdf55 pages428 KbPDF filepdfLeslie Hawthorn - Google SoChttp://www.bsdcan.org/2008/schedule/events/95.en.html
Google SoC
Summer of Code
In this talk, I will briefly discuss some general
ways Google's Open Source Team contributes to the
wider community. The rest of the talk will explore
some highlights of the Google Summer of Code program,
our initiative to get university students involved
in Open Source development.
I will cover the program's inception, lessons learned
over time and tips for success in the program for
both mentors and students. In particular, the talk
will detail some experiences of the *BSD mentoring
organizations involved in the program as a case
study in successfully managing the program from the
Open Source project's perspective. Any Google Summer
of Code participants in the audience are welcome
and encouraged to chime in with their own insights.
bsdcanbsdcan2008slidesgooglesummer of codeleslie hawthornhttp://www.bsdcan.org/2008/schedule/attachments/52_LeslieHawthorn_bsdcan2008.pdf44 pages2.2 MbPDF filepdfPawel Jakub Dawidek - A closer look at the ZFS file systemhttp://www.bsdcan.org/2008/schedule/events/93.en.html
A closer look at the ZFS file system
simple administration, transactional semantics, end-to-end data integrity
SUN's ZFS file system became part of FreeBSD on 6th
April 2007. ZFS is a new kind of file system that
provides simple administration, transactional
semantics, end-to-end data integrity, and immense
scalability. ZFS is not an incremental improvement
to existing technology; it is a fundamentally new
approach to data management. We've blown away 20
years of obsolete assumptions, eliminated complexity
at the source, and created a storage system that's
actually a pleasure to use.
ZFS presents a pooled storage model that completely
eliminates the concept of volumes and the associated
problems of partitions, provisioning, wasted bandwidth
and stranded storage. Thousands of file systems can
draw from a common storage pool, each one consuming
only as much space as it actually needs. The combined
I/O bandwidth of all devices in the pool is available
to all filesystems at all times.
All operations are copy-on-write transactions, so
the on-disk state is always valid. There is no need
to fsck(1M) a ZFS file system, ever. Every block
is checksummed to prevent silent data corruption,
and the data is self-healing in replicated (mirrored
or RAID) configurations. If one copy is damaged,
ZFS detects it and uses another copy to repair it.
bsdcanbsdcan2008slideszfsfreebsdpawel jakub dawidekhttp://www.bsdcan.org/2008/schedule/attachments/58_BSDCan2008-ZFSInternals.pdf33 pages150 KbPDF filepdfRafal Jaworowski - Interfacing embedded FreeBSD with U-Boothttp://www.bsdcan.org/2008/schedule/events/74.en.html
Interfacing embedded FreeBSD with U-Boot
Working with the de facto standard for an initial level boot loader
In the embedded world U-Boot is a de facto standard
for an initial level boot loader (firmware). It
runs on a great number of platforms and architectures,
and is open source.
This talk covers the development work on integrating
FreeBSD with U-Boot-based systems. Starting with
an overview of differences between booting an
all-purpose desktop computer vs. embedded system,
FreeBSD booting concepts are explained along with
requirements for the underlying firmware.
Historical attempts to interface FreeBSD with this
firmware are mentioned and explanation given on why
they failed or proved incomplete. Finally, the
recently developed approach to integrate FreeBSD
and U-Boot is presented, with implementation details
and particular attention on how it's been made
architecture and platform independent, and how
loader(8) has been bound to it.
bsdcanbsdcan2008slidesembeddedfreebsdu-bootrafal jaworowskihttp://www.bsdcan.org/2008/schedule/attachments/49_2008_uboot_freebsd.pdf26 pages300 KbPDF filepdfJohn Baldwin - Introduction to Debugging the FreeBSD Kernelhttp://www.bsdcan.org/2008/schedule/events/70.en.html
Introduction to Debugging the FreeBSD Kernel
Just like every other piece of software, the FreeBSD
kernel has bugs. Debugging a kernel is a bit different
from debugging a userland program as there is nothing
underneath the kernel to provide debugging facilities
such as ptrace() or procfs. This paper will give a
brief overview of some of the tools available for
investigating bugs in the FreeBSD kernel. It will
cover the in-kernel debugger DDB and the external
debugger kgdb which is used to perform post-mortem
analysis on kernel crash dumps.
Introduction to Debugging the FreeBSD Kernel
Basic crash messages, what a crash looks like
typical panic() invocation
page fault example
"live" debugging with DDB
stack traces
ps
deadlock examples
show lockchain
show sleepchain
Adding new DDB commands
KGDB
inspecting processes and threads
working with kernel modules
using scripts to extend
examining crashdumps using utilities
ps, netstat, etc.
debugging strategies
kernel crashes
system hangs
bsdcanbsdcan2008slidespaperdebuggingfreebsdjohn baldwinhttp://www.bsdcan.org/2008/schedule/attachments/46_slides.pdf26 pages113 Kbslides, PDF filepdfhttp://www.bsdcan.org/2008/schedule/attachments/45_article.pdf15 pages121 Kbpaper, PDF filepdfJohn Birrell - DTrace for FreeBSDhttp://www.bsdcan.org/2008/schedule/events/66.en.html
DTrace for FreeBSD
What on earth is that system doing?!
DTrace is a comprehensive dynamic tracing facility
originally developed for Solaris that can be used
by administrators and developers on live production
systems to examine the behavior of both user programs
and of the operating system itself. DTrace enables
users to explore their system to understand how it
works, track down performance problems across many
layers of software, or locate the cause of aberrant
behavior. DTrace lets users create their own custom
programs to dynamically instrument the system and
provide immediate, concise answers to arbitrary
questions you can formulate using the DTrace D
programming language.
This talk discusses the port of the DTrace facility
to FreeBSD and demonstrates examples on a live
FreeBSD system.
Introduction to the D language - probes, predicates and actions.
dtrace(8) and libdtrace - the userland side of the DTrace story.
The DTrace kernel module, it's ioctl interface to userland and the provider infrastructure in the kernel.
DTrace kernel hooks and the problem of code licensed under Sun's CDDL.
What does a DTrace probe actually do?
DTrace safety and how it is implemented.
Build system changes to add CTF (Compact C Type Format) data to objects, shared libraries and executables.
The DTrace test suite.
A brief list of things to do to port the DTrace facility to other BSD-derived operating systems.
The X.Org project provides an open source implementation
of the X Window System. The development work is
being done in conjunction with the freedesktop.org
community. The X.Org Foundation is the educational
non-profit corporation whose Board serves this
effort, and whose Members lead this work.
The X window system has been changing a lot in the
recent years, and still changing. This talk will
present this evolution, summarizing what has already
been done and showing the current roadmap for future
evolutions, with some focus on how *BSD kernels can
be affected by the developments done with Linux as
the primary target.
bsdcanbsdcan2008slidesx.orgmatthieu herrbhttp://www.bsdcan.org/2008/schedule/attachments/51_bsdcan08-xorg.pdf30 pages1.6 MbPDF filepdfAdrian Chad - What Not To Do When Writing Network Applicationshttp://www.bsdcan.org/2008/schedule/events/72.en.html
What Not To Do When Writing Network Applications
The lessons learnt working with not-so-high-performance network applications
This talk will look at issues which face the modern
network application developer, from the point of
view of poorly-designed examples. This will cover
internal code structure and dataflow, interaction
with the TCP stack, IO scheduling in high and low
latency environments and high-availability
considerations. In essence, this presentation should
be seen as a checklist of what not to do when writing
network applications.
Plenty of examples of well designed network
applications exist in the open and closed source
world today. Unfortunately there are just as many
examples of fast network applications as there are
"fast but workload specific"; sometimes failing
miserably in handling the general case. This may
be due to explicit design (eg Varnish) but many are
simply due to the designer not fully appreciating
the wide variance in "networks" - and their network
application degrades ungracefully when under duress.
My aim in this presentation is to touch on a wide
number of issues which face network application
programmers - most of which seem not "application
related" to the newcomer - such as including
pipelining into network communication, managing a
balance between accepting new requests and servicing
existing requests, or providing back-pressure to a
L4 loadbalancer in case of traffic bursts. Various
schemes for working with these issues will be
presented, and hopefully participants will walk
away with more of an understanding about how the
network, application and operating systems interact.
bsdcanbsdcan2008slidesnetwork applicationsadrian chadhttp://www.bsdcan.org/2008/schedule/attachments/61_BSDCan2008-Network-Applications.pdf73 pages190 KbPDF filepdfBrooks Davis - Using FreeBSD to Promote Open Source Development Methodshttp://www.bsdcan.org/2008/schedule/events/64.en.html
Using FreeBSD to Promote Open Source Development Methods
In this talk we present Aerosource, an initiative
to bring Open Source Software development methods
to internal software developers at The Aerospace
Corporation.
Within Aerosource, FreeBSD is used in several key
roles. First, we run most of our tools on top of
FreeBSD. Second, the ports collection (both official
ports and custom internal ones) eases our administrative
burden. Third, the FreeBSD project serves as an
example and role model for the results that can be
achieved by an Open Source Software projects. We
discuss the development infrastructure we have built
for Aerosource based largely on BSD licensed software
including FreeBSD, PostgreSQL, Apache, and Trac.
We will also discuss our custom management tools
including our system for managing our custom internal
ports. Finally, we will cover our development
successes and how we use projects like FreeBSD as
exemplars of OSS development.
bsdcanbsdcan2008abstractsoftware developmentbrooks davishttp://www.bsdcan.org/2008/schedule/attachments/43_extended-abstract.pdf2 pages72 KbPDF filepdfhttp://www.bsdcan.org/2008/schedule/attachments/62_freebsd-oss-methods.pdf33 pages1 MbPDF filepdfRandall Stewart - SCTP what it is and how to use ithttp://www.bsdcan.org/2008/schedule/events/91.en.html
SCTP - SCTP what it is and how to use it
This talk will introduce the attendee into the
interesting world of SCTP.
We will first discuss the new and different features
that SCTP (a new transport in FreeBSD 7.0) provide
to the user. Then we will shift gears and discuss
the extended socket API that is available to SCTP
users and will cover such items as:
The two socket programming models
Extended system calls that support the SCTP feature set.
Porting FreeBSD/ARM to Marvell Orion System-On-Chip
This talk covers the development work on porting
the FreeBSD/ARM to Marvell Orion family of highly
integrated chips.
ARM architecture is widely adopted in the embedded
devices, and since the architecture can be licensed,
many implementation variations exist: Orion is a
derivative compliant with the ARMv5TE definition,
it provides a rich set of on-chip peripherals.
Present state of the FreeBSD support for ARM is
explained, areas for improvement highlighted and
its overall shape and condition presented.
The main discussion covers scope of the Orion port
(what integrated peripherals required new development,
what was adapted from existing code base); design
decisions are explained for the most critical items,
and implementation details revealed.
Summary notes are given on general porting methodology,
debugging techniques and difficulties encountered
during such undertaking.
Welcome to BSDCan 2008
Traditional greetings
bsdcanbsdcan2008slidesdan langillehttp://www.bsdcan.org/2008/schedule/attachments/48_BSDCan2008Opening.pdf17 pages500 KbPDF filepdfBSDCan-2007 - Videoshttps://people.FreeBSD.org/~julian/BSDCan-2007/
The 2007 BSDCan conference
Kirk McKusick - Code Reading of Locally-Connected Sockets bsdcanbsdcan2007talkskirk mckusickhttps://people.FreeBSD.org/~julian/BSDCan-2007/Kirk_UnixDomain.mov35 minutes77 MbMOV filequicktimeBSDCan-2007 - Videoshttps://people.FreeBSD.org/~julian/BSDCan-2007/
The 2007 BSDCan conference
Erwin Lansing - The state of the FreeBSD Ports Tree bsdcanbsdcan2007talkserwin lansingportshttps://people.FreeBSD.org/~julian/BSDCan-2007/Lansing-Portmanager.mov20 minutes39 MbMOV filequicktimeBSDCan-2007 Videoshttps://people.FreeBSD.org/~julian/BSDCan-2007/
The 2007 BSDCan conference - Introduction of people.
bsdcanbsdcan2007talkshttps://people.FreeBSD.org/~julian/BSDCan-2007/Intro.mov9 minutes16 MbMOV filequicktimeBSDCan-2007 - Videoshttps://people.FreeBSD.org/~julian/BSDCan-2007/
The 2007 BSDCan conference
Kris Kennaway - Scalability Update 2007
Progress on FreeBSD SMP performance and scalablity
since BSDCan Dev Summit 2006
bsdcanbsdcan2007talkskris kennawayscalabilityhttps://people.FreeBSD.org/~julian/BSDCan-2007/kris_kennaway-scalability.mov73 minutes148 MbMOV filequicktimeBSDCan-2007 - Videoshttps://people.FreeBSD.org/~julian/BSDCan-2007/
The 2007 BSDCan conference
Qing Li - Routing, ARP and ND6
bsdcanbsdcan2007talksqing lirouting arp and nd6https://people.FreeBSD.org/~julian/BSDCan-2007/QingLi_Arp.mov30 minutes63 MbMOV filequicktimeBSDCan-2007 - Videoshttps://people.FreeBSD.org/~julian/BSDCan-2007/
The 2007 BSDCan conference
Marko Zec explains the vimage architecture
bsdcanbsdcan2007talksmarko zecvimagehttps://people.FreeBSD.org/~julian/BSDCan-2007/marko-vimage.mov20 minutes44 MbMOV filequicktimeBSDCan-2007 - Videoshttps://people.FreeBSD.org/~julian/BSDCan-2007/
The 2007 BSDCan conference
Max Laier - PFIL, firewalls and locking
bsdcanbsdcan2007talksmax laieripfhttps://people.FreeBSD.org/~julian/BSDCan-2007/max_ipf_pfil.mov30 minutes52 MbMOV filequicktimeBSDCan-2007 Photoshttp://gallery.keltia.net/v/voyages/conferences/bsdcan-2007/
Photos taken during both DevSummit and Conference at BSDCan 2007 in Ottawa by Ollivier Robert.
bsdcanbsdcan2007photosollivier robertBSDCan-2007 Photos - Fridayhttp://www.db.net/gallery/BSDCan/BSDCan_2007_Friday/
Photos taken during both DevSummit and Conference on Friday at BSDCan 2007 in Ottawa by Diane Bruce.
bsdcanbsdcan2007photosdiane bruceBSDCan-2007 Photos - Saturdayhttp://www.db.net/gallery/BSDCan/BSDCan_2007_Saturday/
Photos taken during both DevSummit and Conference on Saturday at BSDCan 2007 in Ottawa by Diane Bruce.
bsdcanbsdcan2007photosdiane bruceBSDCan-2007 Photos - Scott Murphyhttp://scott5.vox.com/library/post/bsdcan-2007-photos.html
Photos taken at BSDCan 2007 by Scott Murphy
bsdcanbsdcan2007photosscott murphyBSDCan-2007 Photos - Bjoern A. Zeebhttp://www.zabbadoz.net/users/bz/BSDCan2007/BSDCan2007-public/
Photos taken at BSDCan 2007 by Bjoern A. Zeeb
bsdcanbsdcan2007photosbjoern a zeebBSDCan-2007 Photos - Randi Harperhttp://www.flickr.com/photos/freebsdgirl/sets/72157600230001160/
Photos taken at BSDCan 2007 by Randi Harper
bsdcanbsdcan2007photosrandi harperfreebsdgirlBSDCan-2007 Photos - Dru Lavignehttp://picasaweb.google.com/dru.lavigne/BSDCan2007
Photos taken at BSDCan 2007 by Dru Lavigne
bsdcanbsdcan2007photosdru lavigneThe FreeBSD Security Officer functionhttps://people.FreeBSD.org/~simon/presentations/
"FreeBSD Security Officer function" at BSDCAN 2007 by Simon L. Nielsen (FreeBSD Deputy Security Officer)
bsdcanbsdcan2007pdffreebsdsecurity officersimon l nielsenhttps://people.FreeBSD.org/~simon/presentations/freebsd-so-function-bsdcan-2007.pdf252 Kb29 pagesPDF versionpdfFreeBSD Portsnaphttp://www.daemonology.net/papers/
"FreeBSD Portsnap -
What (it is), Why (it was written), and How (it works)"
by Colin Percival (cperciva@FreeBSD.org)
(Note: use ^L to get back in non-fullscreen mode)
bsdcanbsdcan2007pdfportsnapfreebsdcolin percivalhttp://www.daemonology.net/papers/bsdcan07.pdf1.3 Mb88 pagesPDF versionpdfBSDConTR 2007 - Photoshttp://www.bsdcontr.org/gallery/bsdcontr07/
Photos of the BSDConTR 2007
bsdcontrbsdcontr2007photosBSDConTR 2007 - Presentationshttp://www.bsdcontr.org/
Introducing FreeBSD 7.0
bsdcontrbsdcontr2007pdffreebsd 7.0freebsdkris kennawayhttps://people.FreeBSD.org/~kris/scaling/7.0%20Preview.pdf336 Kb37 pagesPDF versionpdfServer deployment in mass-hosting environment using FreeBSD Ports system by Stanislav Sedov (in russian)http://blog.springdaemons.com/freebsd/
Recently I have been attending Hostobzor 12th, the
Russian conference of hosting providers, beeing
held at Raivola hotel near St. Petersburg. The event
was great as always thanks to organizers. There was
a number of intersting talks given, a lot of
interesting discussions held, and, what I appreciate
better, a lot of new people with great ideas met.
I gave a talk on using the FreeBSD Ports system to
mange a large-scale virtual hosting installations
based on Hosting Telesystems experience. I tried
to describe in detail how we use the ports collection
to deploy a large number of servers diverced by
architecture and OS versions, how we build packages
and distribute them among servers, talked about how
we use Mercurial VCS to incrementally merge upstream
changes into our modified ports collection and
FreeBSD src trees. Hopefully, I've not screwed it
much... At least, some people was interested a lot
and asked interesting questions.
hostobzorhostobzor12freebsdportsstanislav sedovrussianhttp://blog.springdaemons.com/assets/2008/11/23/text.pdf61 Kb5 pagesPDF versionpaperpdfhttp://blog.springdaemons.com/assets/2008/11/23/slides.pdf470 Kb30 pagesPDF versionslidespdfCambridge FreeBSD DevSummit2012 - Photos - Ollivier
Roberthttp://gallery.keltia.net/v/voyages/conferences/devsummit-cam-2012/
Photos of the 2012 FreeBSD DevSummit at the University
of Cambridge by Ollivier Robert
devsummit2012devsummitphotosollivier robertWelcome - Cambridge University FreeBSD DevSummit - Robert Watsonhttps://wiki.freebsd.org/200808DevSummit
Welcome by Robert Watson
devsummit2008devsummitpdffreebsdrobert watsonhttps://wiki.freebsd.org/200808DevSummit?action=AttachFile&do=get&target=20080815-welcome.pdf264 Kb12 pagesPDF versionpdfvariant Symlinks - Brooks Davishttps://wiki.freebsd.org/200808DevSummitVariant Symlinks by Brooks Davisdevsummit2008devsummitpdffreebsdvariant symlinksbrooks davishttps://wiki.freebsd.org/200808DevSummit?action=AttachFile&do=get&target=variant-symlinks-for-freebsd.pdf213 Kb15 pagesPDF versionpdfCambridge FreeBSD DevSummit2008 - Photos - Kris Kennawayhttps://people.FreeBSD.org/~kris/Cambridge/
Photos of the 2008 FreeBSD DevSummit at the Cambridge University
by Kris Kennaway.
devsummit2008devsummitphotoskris kennawayCambridge FreeBSD DevSummit2008 - Photos - Ollivier Roberthttp://gallery.keltia.net/v/voyages/conferences/devsummit-cam/
Photos of the 2008 FreeBSD DevSummit at the Cambridge University by Ollivier Robert
devsummit2008devsummitphotosollivier robertCambridge FreeBSD DevSummit2008 - Photos - Simon Nielsenhttps://people.FreeBSD.org/~simon/gallery/cambridge-2008/
Photos of the 2008 FreeBSD DevSummit at the Cambridge University
by Simon Nielsen.
devsummit2008devsummitphotossimon nielsenVan FreeBSD Documentatie projectleider tot FreeBSD Developer - Remko Lodderhttp://www.nllgg.nl/communitydag_20081213#freebsd-doc-2-dev
In 2004 ben ik begonnen met het FreeBSD Dutch
Documentation Project, een project dat inmiddels
bijna het complete handboek vertaald heeft. Sinds
die tijd zijn er vele wegen geweest die ik behandeld
heb, van documentatie projectleider naar Security
Team-lid tot aan FreeBSD Developer.
Remko Lodder is momenteel 25 jaar en werkt als Unix
Engineer voor het bedrijf Snow B.V. waar hij zich
momenteel met name bezig houd met security (firewalls
etc). Hij is sinds 2004 lid van het FreeBSD Development
team en is momenteel 1 van de meest actieve developers
binnen het team.
nllggfreebsddocumentationnederlandsremko lodderhttp://www.evilcoder.org/download/9/594 Kb24 pagesPDF versionpdfEen historisch overzicht van BSD - Hans van de Looyhttp://www.nllgg.nl/communitydag_20081213#bsd-history
Hans zal een historisch overzicht geven van het
ontstaan van *BSD vanaf de oorsprong van UNIX tot
aan de nu bekende *BSD varianten. Hij zal daarbij
met name ingaan wat de oorsprong en het ontstaan
van een aantal *BSD-projecten zijn. Hierbij zal hij
zeer kort ingaan op de verschillende licentieproblemen
die we in het verleden gezien hebben en worden een
aantal bekende personen en data weer eens even op
de kaart geplaatst.
Hans van de Looy is oprichter van Madison Gurkha. Een bedrijf
dat gespecialiseerd is op het gebied van het uitvoeren
van technische ICT-beveiligingsonderzoeken, in de
media ook wel aangeduid met Etisch Hacken. Tijdens
dergelijke onderzoeken maakt hij ook regelmatig
gebruik van op BSD* gebaseerde systemen.
nllggbsdhistoryhans van de looyhttp://www.nllgg.nl/uploads/2078/HansvandeLooy.pdf5767 Kb38 pagesPDF versionpdfFreeBSD Google Summer of Code postershttps://www.freebsd.org/projects/summerofcode.html
Two posters usable for the announcement of the
participation of the FreeBSD Project in the Google
Summer of Code.
freebsdgooglesummer of codehttps://people.FreeBSD.org/~manolis/2009-freebsd-gsoc-alternate.png1.1 Mb2480 x 3507 pixelsPNG versionpnghttps://people.FreeBSD.org/~manolis/2009-freebsd-gsoc-alternate.pdf815 Kb1 pagePDF versionpdfPmcTools talk at the Bangalore chapter of the ACMhttp://edoofus.blogspot.com/2009/04/pmctools-talk-at-bangalore-chapter-of.html
In April 2009 I was invited to speak on FreeBSD/PmcTools
by the Bangalore chapter of the ACM.
This was an overview talk. The talk briefly touched
upon: the motivations and goals of the project, the
programming APIs, some aspects of the implementation
and on possible future work.
The FreeBSD/ppc project pages contain information about the FreeBSD
port to the PowerPC® architecture. As with the port itself, these
pages are still a work in progress.
The FreeBSD/ppc port is still a
Tier 2 platform. That means it is
not being fully supported by our security officer, release engineers and
toolchain maintainers.
ISO images of FreeBSD &rel.current; suitable for New-World Macs are
available for download, for details on how to obtain these see the
release announcement.
The powerpc64 port provides a 64-bit kernel and userland, and is supported
on all 64-bit CPUs. Users of 32-bit CPUs (G3, G4) must use the 32-bit
powerpc platform, users of 64-bit CPUs that support 32-bit operating
systems (G5) have a choice, and users of 64-bit CPUs that do not (Cell)
must use powerpc64. For those users with a choice, powerpc64 provides
some additional features (the ability to use more than 2 GB of RAM and
ZFS support) while having slightly worse ports support due to being
a newer and less common architecture. Like other 64-bit platforms,
FreeBSD/powerpc64 supports running 32-bit binaries as well as 64-bit ones.
Peter Grehan is the project
leader. Contact him if you can contribute code. If you just want
to know about the status of this project, check this page
regularly or join the
FreeBSD/ppc mailing list.
The FreeBSD/ppc port should run on any New-World Apple machine (any Apple
machine with a built-in USB port), as well as the Sony Playstation 3. A
port to IBM pSeries hardware is in progress. People reported FreeBSD runs
on following machines:
There is a known bug in the boot-loader, that prevents you from
loading an alternate kernel, so testing your kernel is a bit risky.
When booting the loader from the Open Firmware prompt, give it a
partition which is either non-existent, doesn't have a kernel to load,
or isn't a UFS partition:
0 > boot hd:loader hd:0
At this point, you can set currdev and manually load a kernel:
OK set currdev="hd":14
OK load /boot/kernel/kernel.save
Resources Of Interest To FreeBSD Contributors and Developers
Contributing to the FreeBSD Ports Collection
An introduction to how you can help contribute to the Ports
Collection, by either contributing new ports or helping to fix
problems in existing ports. Included is detailed information on
what the community will expect from you if you volunteer to maintain
one or more ports. Also includes a list of
further resources.
FreeBSD Porter's Handbook
The central reference book for FreeBSD ports submitters,
maintainers, and committers, mostly technically oriented. It
includes both mandatory requirements and recommendations of
what portmgr believes are the best approaches to common problems.
one or more ports. Also includes information about
keeping with changes as well.
FreeBSD Ports Build
Cluster
These machines continually build packages on all possible
combinations of OS release and CPU architecture (in our terminology,
build environments), and produce error logs of problems
that are encountered along the way.
FreeBSD Release Engineering for Third Party Packages
Describes the approach used by the FreeBSD release
engineering team to produce a high quality package set
suitable for official FreeBSD release media, with specific
emphasis on how to split up the packages for the release
media, and how to verify that a package set is
consistent.
Problem Report Handling Guidelines
While primarily aimed at FreeBSD committers, this should
also be read by users interested in how best to attract attention
to their PRs.
FreshPorts
A site maintained by Dan Langille that lets you browse
the state of the entire Ports Collection or any individual port
within it. Includes cross-references, links, charts and graphs,
and many other things. Of interest to users and developers
alike.
The
Porter's Handbook is the master reference for both creating new
ports and maintaining existing ports, including a section on
Keeping Up. It also contains more detail about the topics below, as
well as more references for further study.
- FreshPorts.org is a
+ FreshPorts.org is a
valuable tool for further information about individual ports,
such as current version, last checkin, and many other useful
statistics. You may subscribe to a mailing list to get the
latest information about your favorite ports.
The
Web Interface to the Source Repository
allows you to browse the files in the source repository. Changes
that affect the entire port system are now documented in the
CHANGES file.
Changes that affect individual ports are now documented in the
UPDATING file.
However, the definitive answer to any question is undoubtedly to read
the source code of
bsd.port.mk, and associated files.
The form above will allow you to search for ports on this site.
A completed search will take you to a
more complete search page.
However, if you already have the Ports Collection installed on
your machine, you may also search by changing to the /usr/ports
directory and performing make search name=string.
See
bsd.port.subdir.mk for all the options.
Another option is to visit
-FreshPorts.org
+FreshPorts.org
and either browse the site or subscribe to the lists hosted there.
The ports listed on these web pages are continually being updated.
It is strongly recommended that you refresh the entire collection
together, as many ports depend on other parts of the tree, even
where that might seem counterintuitive (e.g. japanese/.)
Changes that affect the entire port system are now documented in the
CHANGES file.
Changes that affect individual ports are now documented in the
UPDATING file.
For more information about new, changed or removed ports/packages,
or if you wish to search for a specific application to see if it's
available as a port/package, you may use the form above; alternatively,
you may wish to visit
-FreshPorts.org
+FreshPorts.org
and either browse the site or subscribe to the lists hosted there.
Most users of &os; will have hardware for either the amd64,
i386, or armv6 architectures.
Modern PCs use the amd64 architecture, including those with
Intel® branded processors. Computers with more than
3 GB of memory should use amd64. If the computer is an
older, 32-bit only model, use i386. For embedded devices and
single-board computers (SBC) such as the Raspberry Pi, Beagle
Bone Black, Panda Board, and Zed Board, use the armv6 SD card
image which supports ARMv6 and ARMv7 processors.
All other users should reference the
complete list
of supported &os; platforms.
Choosing an Image
The &os; installer can be downloaded in a number of different
formats including CD (disc1), DVD (dvd1), and Network Install
(bootonly) sized ISO
Disc Images, as well as regular and mini USB memory stick
images. Recent versions of &os; are also offered as prebuilt
expandable Virtual Machine images, and as SD Card images for embedded
platforms.
&os; Deployment Statistics
While &os; does not gather deployment statistics, having
statistical information available is essential. Please consider
installing the sysutils/bsdstats
+ href="https://www.freshports.org/sysutils/bsdstats/">sysutils/bsdstats
package, which collects hardware and software statistics,
helping developers understand how to best focus their
efforts. The information collected is available at the
bsdstats.org website.
If you are interested in a purely experimental
snapshot release of &os;-CURRENT (AKA
&rel.head;-CURRENT), aimed at developers and bleeding-edge
testers only, then please see the &os; Snapshot Releases page. For
more information about past, present and future releases in
general, please visit the release information
page.
If you plan on getting &os; via HTTP or FTP, please check
the listing of mirror
sites in the Handbook to see if there is a site
closer to you.
Install &os;
There are many options for installing &os;, including
installation from CD-ROM, DVD, USB Memory Stick or even directly
using anonymous FTP, HTTP, or NFS. Please read through the &os;
installation guide before downloading the entire &os;
distribution.
For downloading past releases, please visit the FTP
archive.
&os;-derived Operating System Distributions
&os; is widely used as a building block for other commercial
and open-source operating systems. The projects below are
widely used and of particular interest to &os; users.
FreeNAS is an open
source storage platform based on &os; and supports sharing
across Windows, Apple, and UNIX-like systems.
TrueOS (formerly
PC-BSD) is a &os;
derivative with a graphical installer. The desktop option installs
The Lumina Desktop Environment,
a fully BSD Licensed desktop, with
impressive desktop tools aimed at ease of use for the casual computer
user.
pfSense is a
&os; based customized distribution tailored for
use as a firewall and router.
Applications and Utility Software
The Ports Collection
The &os; Ports Collection is a diverse collection of utility
and application software that has been ported to &os;.
For information about how you can contribute
your favorite piece of software to the Ports Collection,
have a look at The
Porter's Handbook and the article Contributing
to &os;.