<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Fri, 17 Apr 2026 07:33:26 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Freebsd”</title>
    <link>https://techsnap.systems/tags/freebsd</link>
    <pubDate>Fri, 17 Apr 2020 00:15:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>427: Gigahertz Games</title>
  <link>https://techsnap.systems/427</link>
  <guid isPermaLink="false">809b6258-3513-4344-a965-b854e8c78fd3</guid>
  <pubDate>Fri, 17 Apr 2020 00:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/809b6258-3513-4344-a965-b854e8c78fd3.mp3" length="37075823" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.</itunes:subtitle>
  <itunes:duration>51:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.
Plus Intel's surprisingly overclockable laptop CPU, why you shouldn't freak out about 5G, and the incredible creativity of the Demoscene. 
</description>
  <itunes:keywords>AMD, Ryzen 9, Asus Zephyrus G14, Intel, 10th-generation, Comet Lake, H-series, overclocking, gaming laptop, 20.04, Ubuntu, Focal Fossa, Wi-Fi, FCC, Wi-Fi 6e, Wi-Fi 6, wireless spectrum, 6Ghz, 5G, cell towers, coronavirus, COVID-19, FreeBSD, Unix, GhostBSD, GNOME, MATE, ZFS on root, BSD, PC-BSD, Void Linux, Project Trident, MOD, s3m, tracker, Demoscene, Amiga, assembly, computer graphics, Farbrausch, DevOps, TechSNAP, Jupiter Broadcasting, A Cloud Guru, sysadmin podcast</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.</p>

<p>Plus Intel&#39;s surprisingly overclockable laptop CPU, why you shouldn&#39;t freak out about 5G, and the incredible creativity of the Demoscene.</p><p>Links:</p><ul><li><a title="Asus ROG Zephyrus G14—Ryzen 7nm mobile is here, and it’s awesome" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/asus-rog-zephyrus-g14-ryzen-7nm-mobile-is-here-and-its-awesome/">Asus ROG Zephyrus G14—Ryzen 7nm mobile is here, and it’s awesome</a></li><li><a title="Linux on Laptops: ASUS Zephyrus G14 with Ryzen 9 4900HS" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/linux-on-laptops-asus-zephyrus-g14-with-ryzen-9-4900hs/">Linux on Laptops: ASUS Zephyrus G14 with Ryzen 9 4900HS</a></li><li><a title="Intel’s 10th-generation H-series laptop CPUs break 5GHz | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/intels-10th-generation-h-series-laptop-cpus-break-5-ghz/">Intel’s 10th-generation H-series laptop CPUs break 5GHz | Ars Technica</a></li><li><a title="Wi-Fi 6E becomes official—the FCC will vote on rules this month" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/fcc-will-vote-on-rules-for-1-2ghz-of-new-wi-fi-6e-spectrum-on-april-23/">Wi-Fi 6E becomes official—the FCC will vote on rules this month</a></li><li><a title="Celebs share rumors linking 5G to coronavirus, nutjobs burn cell towers" rel="nofollow" href="https://arstechnica.com/science/2020/04/in-the-uk-pandemic-panic-has-people-burning-cell-phone-towers/">Celebs share rumors linking 5G to coronavirus, nutjobs burn cell towers</a></li><li><a title="Not-actually Linux distro review: FreeBSD 12.1-RELEASE" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-freebsd-12-1-release/">Not-actually Linux distro review: FreeBSD 12.1-RELEASE</a></li><li><a title="Not actually Linux distro review deux: GhostBSD" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/">Not actually Linux distro review deux: GhostBSD</a></li><li><a title="MOD (file format) - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/MOD_(file_format)">MOD (file format) - Wikipedia</a></li><li><a title="AT&amp;T.MOD (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=UspabZp09_Q">AT&amp;T.MOD (YouTube)</a></li><li><a title="DJ Moses Rising—Ice Cream Trance (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=RDDkGZWkEn0">DJ Moses Rising—Ice Cream Trance (YouTube)</a></li><li><a title="Farbrausch—The Product (64K Intro, 2000)" rel="nofollow" href="https://www.youtube.com/watch?v=Y3n3c_8Nn2Y">Farbrausch—The Product (64K Intro, 2000)</a></li><li><a title="Farbrausch—Poem to a Horse (64K Intro, 2002)" rel="nofollow" href="https://www.youtube.com/watch?v=gNOJhEX9YT0">Farbrausch—Poem to a Horse (64K Intro, 2002)</a></li><li><a title="Finland accepts the Demoscene on its national UNESCO list of intangible cultural heritage of humanity" rel="nofollow" href="http://demoscene-the-art-of-coding.net/2020/04/15/breakthrough-finland-accepts-demoscene-on-their-national-list-of-intangible-cultural-heritage-of-humanity/">Finland accepts the Demoscene on its national UNESCO list of intangible cultural heritage of humanity</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim finally gets his hands on an AMD Ryzen 9 laptop, some great news about Wi-Fi 6e, and our take on FreeBSD on the desktop.</p>

<p>Plus Intel&#39;s surprisingly overclockable laptop CPU, why you shouldn&#39;t freak out about 5G, and the incredible creativity of the Demoscene.</p><p>Links:</p><ul><li><a title="Asus ROG Zephyrus G14—Ryzen 7nm mobile is here, and it’s awesome" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/asus-rog-zephyrus-g14-ryzen-7nm-mobile-is-here-and-its-awesome/">Asus ROG Zephyrus G14—Ryzen 7nm mobile is here, and it’s awesome</a></li><li><a title="Linux on Laptops: ASUS Zephyrus G14 with Ryzen 9 4900HS" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/linux-on-laptops-asus-zephyrus-g14-with-ryzen-9-4900hs/">Linux on Laptops: ASUS Zephyrus G14 with Ryzen 9 4900HS</a></li><li><a title="Intel’s 10th-generation H-series laptop CPUs break 5GHz | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/intels-10th-generation-h-series-laptop-cpus-break-5-ghz/">Intel’s 10th-generation H-series laptop CPUs break 5GHz | Ars Technica</a></li><li><a title="Wi-Fi 6E becomes official—the FCC will vote on rules this month" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/fcc-will-vote-on-rules-for-1-2ghz-of-new-wi-fi-6e-spectrum-on-april-23/">Wi-Fi 6E becomes official—the FCC will vote on rules this month</a></li><li><a title="Celebs share rumors linking 5G to coronavirus, nutjobs burn cell towers" rel="nofollow" href="https://arstechnica.com/science/2020/04/in-the-uk-pandemic-panic-has-people-burning-cell-phone-towers/">Celebs share rumors linking 5G to coronavirus, nutjobs burn cell towers</a></li><li><a title="Not-actually Linux distro review: FreeBSD 12.1-RELEASE" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-freebsd-12-1-release/">Not-actually Linux distro review: FreeBSD 12.1-RELEASE</a></li><li><a title="Not actually Linux distro review deux: GhostBSD" rel="nofollow" href="https://arstechnica.com/gadgets/2020/04/not-actually-linux-distro-review-deux-ghostbsd/">Not actually Linux distro review deux: GhostBSD</a></li><li><a title="MOD (file format) - Wikipedia" rel="nofollow" href="https://en.wikipedia.org/wiki/MOD_(file_format)">MOD (file format) - Wikipedia</a></li><li><a title="AT&amp;T.MOD (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=UspabZp09_Q">AT&amp;T.MOD (YouTube)</a></li><li><a title="DJ Moses Rising—Ice Cream Trance (YouTube)" rel="nofollow" href="https://www.youtube.com/watch?v=RDDkGZWkEn0">DJ Moses Rising—Ice Cream Trance (YouTube)</a></li><li><a title="Farbrausch—The Product (64K Intro, 2000)" rel="nofollow" href="https://www.youtube.com/watch?v=Y3n3c_8Nn2Y">Farbrausch—The Product (64K Intro, 2000)</a></li><li><a title="Farbrausch—Poem to a Horse (64K Intro, 2002)" rel="nofollow" href="https://www.youtube.com/watch?v=gNOJhEX9YT0">Farbrausch—Poem to a Horse (64K Intro, 2002)</a></li><li><a title="Finland accepts the Demoscene on its national UNESCO list of intangible cultural heritage of humanity" rel="nofollow" href="http://demoscene-the-art-of-coding.net/2020/04/15/breakthrough-finland-accepts-demoscene-on-their-national-list-of-intangible-cultural-heritage-of-humanity/">Finland accepts the Demoscene on its national UNESCO list of intangible cultural heritage of humanity</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>414: Rooting for ZFS</title>
  <link>https://techsnap.systems/414</link>
  <guid isPermaLink="false">890ebb60-fe73-476d-bd48-1bcb93c016ba</guid>
  <pubDate>Fri, 18 Oct 2019 04:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/890ebb60-fe73-476d-bd48-1bcb93c016ba.mp3" length="30566945" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root. </itunes:subtitle>
  <itunes:duration>42:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We dive into Ubuntu 19.10's experimental ZFS installer and share our tips for making the most of ZFS on root. 
Plus why you may want to skip Nest Wifi, and our latest explorations of long range wireless protocols. 
</description>
  <itunes:keywords>LoRa, LoRaWAN, Sigfox, amazon sidewalk, wifi, 2g, RF Chirp, spread spectrum, low bandwidth, SureFi, wireless, wireless networking, google wifi, nest wifi, mesh wifi, unifi, tp-link, zfs, copy on write, btrfs, boot environments, freebsd, zsys, Canonical, ubuntu, 19.10,5.3, snapshots, backups, data integrity, eoan, DevOps, TechSNAP, Jupiter Broadcasting</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We dive into Ubuntu 19.10&#39;s experimental ZFS installer and share our tips for making the most of ZFS on root. </p>

<p>Plus why you may want to skip Nest Wifi, and our latest explorations of long range wireless protocols.</p><p>Links:</p><ul><li><a title="Decoding LoRa: Realizing a Modern LPWAN with SDR" rel="nofollow" href="https://pdfs.semanticscholar.org/710d/417a93fa65e30941ee337dbc49ce238871f0.pdf">Decoding LoRa: Realizing a Modern LPWAN with SDR</a> &mdash; LoRa is an emerging Low Power Wide Area Network (LPWAN), a type of wireless communication technology suitable for connecting low
power embedded devices over long ranges. This paper details the modulation and encoding elements that comprise the LoRa PHY, the structure of which is the result of the author’s recent blind analysis of the protocol. It also introduces grlora, an open source software defined implementation of the PHY that will empower wireless developers and security researchers to investigate this nascent protocol.</li><li><a title="Nest Wifi announced at Made by Google 2019 | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/nest-wi-fi-announced-at-made-by-google-2019-today/">Nest Wifi announced at Made by Google 2019 | Ars Technica</a> &mdash; Google says that a two-piece Nest Wifi kit—one Nest Router and one Nest Point—should cover up to 3,800 square feet and 85% of homes. This claim, like most arbitrary claims of Wi-Fi coverage with no real detail, should be taken with several grains of salt.

</li><li><a title="TP-LINK EAP series Business Wi-Fi Solution" rel="nofollow" href="https://www.tp-link.com/common/Promo/en/WiFi-Solution/default.html">TP-LINK EAP series Business Wi-Fi Solution</a> &mdash; The EAP Series Business Wi-Fi Solution incorporates EAP Series hardware, which provides a smooth, reliable wireless internet experience, and a powerful centralized management platform. </li><li><a title="Bloody Stupid Johnson | Discworld Wiki" rel="nofollow" href="https://discworld.fandom.com/wiki/Bloody_Stupid_Johnson">Bloody Stupid Johnson | Discworld Wiki</a> &mdash; Although evidently able in certain fields, Johnson is notorious for his complete inability to produce anything according to specification or common sense, or (sometimes) even the laws of physics. </li><li><a title="A Quick Look At EXT4 vs. ZFS Performance On Ubuntu 19.10 With An NVMe SSD" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=ubuntu1910-ext4-zfs&amp;num=1">A Quick Look At EXT4 vs. ZFS Performance On Ubuntu 19.10 With An NVMe SSD</a> &mdash; For those thinking of playing with Ubuntu 19.10's new experimental ZFS desktop install option in opting for using ZFS On Linux in place of EXT4 as the root file-system, here are some quick benchmarks looking at the out-of-the-box performance of ZFS/ZoL vs. EXT4 on Ubuntu 19.10 using a common NVMe solid-state drive.

</li><li><a title="ubuntu/zsys: zsys daemon and client for zfs systems" rel="nofollow" href="https://github.com/ubuntu/zsys">ubuntu/zsys: zsys daemon and client for zfs systems</a> &mdash; It allows running multiple ZFS systems in parallel on the same machine, get automated snapshots, managing complex zfs dataset layouts separating user data from system and persistent data, and more.

</li><li><a title="Ubuntu ZFS support in 19.10: ZFS on root · ~DidRocks" rel="nofollow" href="https://didrocks.fr/2019/10/11/ubuntu-zfs-support-in-19.10-zfs-on-root/">Ubuntu ZFS support in 19.10: ZFS on root · ~DidRocks</a> &mdash; We are shipping ZFS On Linux version 0.8.1, with features like native encryption, trimming support, checkpoints, raw encrypted zfs transmissions, project accounting and quota and a lot of performance enhancements.</li><li><a title="Ubuntu ZFS support in 19.10: introduction · ~DidRocks" rel="nofollow" href="https://didrocks.fr/2019/08/06/ubuntu-zfs-support-in-19.10-introduction/">Ubuntu ZFS support in 19.10: introduction · ~DidRocks</a> &mdash; We want to support ZFS on root as an experimental installer option, initially for desktop, but keeping the layout extensible for server later on.</li><li><a title="A detailed look at Ubuntu’s new experimental ZFS installer | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/10/a-detailed-look-at-ubuntus-new-experimental-zfs-installer/">A detailed look at Ubuntu’s new experimental ZFS installer | Ars Technica</a> &mdash; If you're new to the ZFS hype train, you might wonder why a new filesystem option in an OS installer is a big deal. So here's a quick explanation: ZFS is a copy-on-write filesystem, which can take atomic snapshots of entire filesystems. </li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We dive into Ubuntu 19.10&#39;s experimental ZFS installer and share our tips for making the most of ZFS on root. </p>

<p>Plus why you may want to skip Nest Wifi, and our latest explorations of long range wireless protocols.</p><p>Links:</p><ul><li><a title="Decoding LoRa: Realizing a Modern LPWAN with SDR" rel="nofollow" href="https://pdfs.semanticscholar.org/710d/417a93fa65e30941ee337dbc49ce238871f0.pdf">Decoding LoRa: Realizing a Modern LPWAN with SDR</a> &mdash; LoRa is an emerging Low Power Wide Area Network (LPWAN), a type of wireless communication technology suitable for connecting low
power embedded devices over long ranges. This paper details the modulation and encoding elements that comprise the LoRa PHY, the structure of which is the result of the author’s recent blind analysis of the protocol. It also introduces grlora, an open source software defined implementation of the PHY that will empower wireless developers and security researchers to investigate this nascent protocol.</li><li><a title="Nest Wifi announced at Made by Google 2019 | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/10/nest-wi-fi-announced-at-made-by-google-2019-today/">Nest Wifi announced at Made by Google 2019 | Ars Technica</a> &mdash; Google says that a two-piece Nest Wifi kit—one Nest Router and one Nest Point—should cover up to 3,800 square feet and 85% of homes. This claim, like most arbitrary claims of Wi-Fi coverage with no real detail, should be taken with several grains of salt.

</li><li><a title="TP-LINK EAP series Business Wi-Fi Solution" rel="nofollow" href="https://www.tp-link.com/common/Promo/en/WiFi-Solution/default.html">TP-LINK EAP series Business Wi-Fi Solution</a> &mdash; The EAP Series Business Wi-Fi Solution incorporates EAP Series hardware, which provides a smooth, reliable wireless internet experience, and a powerful centralized management platform. </li><li><a title="Bloody Stupid Johnson | Discworld Wiki" rel="nofollow" href="https://discworld.fandom.com/wiki/Bloody_Stupid_Johnson">Bloody Stupid Johnson | Discworld Wiki</a> &mdash; Although evidently able in certain fields, Johnson is notorious for his complete inability to produce anything according to specification or common sense, or (sometimes) even the laws of physics. </li><li><a title="A Quick Look At EXT4 vs. ZFS Performance On Ubuntu 19.10 With An NVMe SSD" rel="nofollow" href="https://www.phoronix.com/scan.php?page=article&amp;item=ubuntu1910-ext4-zfs&amp;num=1">A Quick Look At EXT4 vs. ZFS Performance On Ubuntu 19.10 With An NVMe SSD</a> &mdash; For those thinking of playing with Ubuntu 19.10's new experimental ZFS desktop install option in opting for using ZFS On Linux in place of EXT4 as the root file-system, here are some quick benchmarks looking at the out-of-the-box performance of ZFS/ZoL vs. EXT4 on Ubuntu 19.10 using a common NVMe solid-state drive.

</li><li><a title="ubuntu/zsys: zsys daemon and client for zfs systems" rel="nofollow" href="https://github.com/ubuntu/zsys">ubuntu/zsys: zsys daemon and client for zfs systems</a> &mdash; It allows running multiple ZFS systems in parallel on the same machine, get automated snapshots, managing complex zfs dataset layouts separating user data from system and persistent data, and more.

</li><li><a title="Ubuntu ZFS support in 19.10: ZFS on root · ~DidRocks" rel="nofollow" href="https://didrocks.fr/2019/10/11/ubuntu-zfs-support-in-19.10-zfs-on-root/">Ubuntu ZFS support in 19.10: ZFS on root · ~DidRocks</a> &mdash; We are shipping ZFS On Linux version 0.8.1, with features like native encryption, trimming support, checkpoints, raw encrypted zfs transmissions, project accounting and quota and a lot of performance enhancements.</li><li><a title="Ubuntu ZFS support in 19.10: introduction · ~DidRocks" rel="nofollow" href="https://didrocks.fr/2019/08/06/ubuntu-zfs-support-in-19.10-introduction/">Ubuntu ZFS support in 19.10: introduction · ~DidRocks</a> &mdash; We want to support ZFS on root as an experimental installer option, initially for desktop, but keeping the layout extensible for server later on.</li><li><a title="A detailed look at Ubuntu’s new experimental ZFS installer | Ars Technica" rel="nofollow" href="https://arstechnica.com/information-technology/2019/10/a-detailed-look-at-ubuntus-new-experimental-zfs-installer/">A detailed look at Ubuntu’s new experimental ZFS installer | Ars Technica</a> &mdash; If you're new to the ZFS hype train, you might wonder why a new filesystem option in an OS installer is a big deal. So here's a quick explanation: ZFS is a copy-on-write filesystem, which can take atomic snapshots of entire filesystems. </li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>406: SACK Attack</title>
  <link>https://techsnap.systems/406</link>
  <guid isPermaLink="false">310be811-6d1b-4463-96f3-8fc9579a5d66</guid>
  <pubDate>Sun, 23 Jun 2019 18:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/310be811-6d1b-4463-96f3-8fc9579a5d66.mp3" length="31361276" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.</itunes:subtitle>
  <itunes:duration>43:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>A new vulnerability may be the next 'Ping of Death'; we explore the details of SACK Panic and break down what you need to know.
Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it's a great time to be a ZFS user. 
</description>
  <itunes:keywords>SACK Panic, TCP, networking, Linux, FreeBSD, security, mss, ping of death, rowhammer, rambleed, RAM, ECC, memory, DRAM, Firefox, backdoor, Mozilla, zero day, sandbox, sandbox escape, targeted attack, cryptocurrency, crypto, ZFS, OpenZFS, TRIM, SSD, encryption, raw send, device removal, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A new vulnerability may be the next &#39;Ping of Death&#39;; we explore the details of SACK Panic and break down what you need to know.</p>

<p>Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it&#39;s a great time to be a ZFS user.</p><p>Links:</p><ul><li><a title="SACK Panic Security Bulletin" rel="nofollow" href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md">SACK Panic Security Bulletin</a> &mdash; Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.</li><li><a title="Ubuntu SACK Panic Guidance" rel="nofollow" href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic">Ubuntu SACK Panic Guidance</a> &mdash; You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
</li><li><a title="Red Hat SACK Panic Advisory" rel="nofollow" href="https://access.redhat.com/security/vulnerabilities/tcpsack">Red Hat SACK Panic Advisory</a> &mdash; Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   

</li><li><a title="RFC 2018 - TCP Selective Acknowledgment Options" rel="nofollow" href="https://tools.ietf.org/html/rfc2018">RFC 2018 - TCP Selective Acknowledgment Options</a> &mdash; TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time.  An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.</li><li><a title="Ping of Death" rel="nofollow" href="https://insecure.org/sploits/ping-o-death.html">Ping of Death</a> &mdash; In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.</li><li><a title="Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/firefox-zero-day-was-used-in-attack-against-coinbase-employees-not-its-users/">Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet</a> &mdash; A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.</li><li><a title="Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/mozilla-fixes-second-firefox-zero-day-exploited-in-the-wild/">Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet</a> &mdash; Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.

</li><li><a title="RAMBleed" rel="nofollow" href="https://rambleed.com/">RAMBleed</a> &mdash; RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. </li><li><a title="Digging into the new features in OpenZFS post-Linux migration | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/06/zfs-features-bugfixes-0-8-1/">Digging into the new features in OpenZFS post-Linux migration | Ars Technica</a> &mdash; One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.</li><li><a title="Allan Jude on Twitter" rel="nofollow" href="https://twitter.com/allanjude/status/1138651704558346245">Allan Jude on Twitter</a> &mdash; Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.</li><li><a title="ZFS on Linux Releases" rel="nofollow" href="https://github.com/zfsonlinux/zfs/releases">ZFS on Linux Releases</a></li><li><a title="Linux Academy is hiring! " rel="nofollow" href="https://jobs.lever.co/linuxacademy/">Linux Academy is hiring! </a></li><li><a title="Mozilla teases $5-per-month ad-free news subscription" rel="nofollow" href="https://www.theverge.com/2019/7/5/20683059/mozilla-news-subscription-service-ad-free-scroll-price">Mozilla teases $5-per-month ad-free news subscription</a> &mdash; Mozilla has started teasing an ad-free news subscription service, which, for $5 per month, would offer ad-free browsing, audio readouts, and cross-platform syncing of news articles from a number of websites.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A new vulnerability may be the next &#39;Ping of Death&#39;; we explore the details of SACK Panic and break down what you need to know.</p>

<p>Plus Firefox zero days targeting Coinbase, the latest update on Rowhammer, and a few more reasons it&#39;s a great time to be a ZFS user.</p><p>Links:</p><ul><li><a title="SACK Panic Security Bulletin" rel="nofollow" href="https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-001.md">SACK Panic Security Bulletin</a> &mdash; Netflix has identified several TCP networking vulnerabilities in FreeBSD and Linux kernels. The vulnerabilities specifically relate to the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SACK) capabilities. The most serious, dubbed “SACK Panic,” allows a remotely-triggered kernel panic on recent Linux kernels.</li><li><a title="Ubuntu SACK Panic Guidance" rel="nofollow" href="https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SACKPanic">Ubuntu SACK Panic Guidance</a> &mdash; You should update your kernel to the versions specified below in the Updates section and reboot. Alternatively, Canonical Livepatch updates will be available to mitigate these two issues without the need to reboot.
</li><li><a title="Red Hat SACK Panic Advisory" rel="nofollow" href="https://access.redhat.com/security/vulnerabilities/tcpsack">Red Hat SACK Panic Advisory</a> &mdash; Red Hat customers running affected versions of these Red Hat products are strongly recommended to update them as soon as errata are available. Customers are urged to apply the available updates immediately and enable the mitigations as they feel appropriate.   

</li><li><a title="RFC 2018 - TCP Selective Acknowledgment Options" rel="nofollow" href="https://tools.ietf.org/html/rfc2018">RFC 2018 - TCP Selective Acknowledgment Options</a> &mdash; TCP may experience poor performance when multiple packets are lost from one window of data. With the limited information available from cumulative acknowledgments, a TCP sender can only learn about a single lost packet per round trip time.  An aggressive sender could choose to retransmit packets early, but such retransmitted segments may have already been successfully received. A Selective Acknowledgment (SACK) mechanism, combined with a selective repeat retransmission policy, can help to overcome these limitations.</li><li><a title="Ping of Death" rel="nofollow" href="https://insecure.org/sploits/ping-o-death.html">Ping of Death</a> &mdash; In a nutshell, it is possible to crash, reboot or otherwise kill a large number of systems by sending a ping of a certain size from a remote machine.</li><li><a title="Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/firefox-zero-day-was-used-in-attack-against-coinbase-employees-not-its-users/">Firefox zero-day was used in attack against Coinbase employees, not its users | ZDNet</a> &mdash; A recent Firefox zero-day that has made headlines across the tech news world this week was actually used in attacks against Coinbase employees, and not the company's users.</li><li><a title="Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet" rel="nofollow" href="https://www.zdnet.com/article/mozilla-fixes-second-firefox-zero-day-exploited-in-the-wild/">Mozilla fixes second Firefox zero-day exploited in the wild | ZDNet</a> &mdash; Mozilla has released a second security update this week to patch a second zero-day that was being exploited in the wild to attack Coinbase employees and other cryptocurrency organizations.

</li><li><a title="RAMBleed" rel="nofollow" href="https://rambleed.com/">RAMBleed</a> &mdash; RAMBleed is a side-channel attack that enables an attacker to read out physical memory belonging to other processes. The implications of violating arbitrary privilege boundaries are numerous, and vary in severity based on the other software running on the target machine. As an example, in our paper we demonstrate an attack against OpenSSH in which we use RAMBleed to leak a 2048 bit RSA key. </li><li><a title="Digging into the new features in OpenZFS post-Linux migration | Ars Technica" rel="nofollow" href="https://arstechnica.com/gadgets/2019/06/zfs-features-bugfixes-0-8-1/">Digging into the new features in OpenZFS post-Linux migration | Ars Technica</a> &mdash; One of the most important new features in 0.8 is Native ZFS Encryption. Until now, ZFS users have relied on OS-provided encrypted filesystem layers either above or below ZFS. While this approach does work, it presented difficulties.</li><li><a title="Allan Jude on Twitter" rel="nofollow" href="https://twitter.com/allanjude/status/1138651704558346245">Allan Jude on Twitter</a> &mdash; Once the FreeBSDs are upstreamed, everything is changing to 'OpenZFS', including the github organization currently know as 'zfsonlinux'.</li><li><a title="ZFS on Linux Releases" rel="nofollow" href="https://github.com/zfsonlinux/zfs/releases">ZFS on Linux Releases</a></li><li><a title="Linux Academy is hiring! " rel="nofollow" href="https://jobs.lever.co/linuxacademy/">Linux Academy is hiring! </a></li><li><a title="Mozilla teases $5-per-month ad-free news subscription" rel="nofollow" href="https://www.theverge.com/2019/7/5/20683059/mozilla-news-subscription-service-ad-free-scroll-price">Mozilla teases $5-per-month ad-free news subscription</a> &mdash; Mozilla has started teasing an ad-free news subscription service, which, for $5 per month, would offer ad-free browsing, audio readouts, and cross-platform syncing of news articles from a number of websites.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>401: Everyday ZFS</title>
  <link>https://techsnap.systems/401</link>
  <guid isPermaLink="false">ea1f89db-e748-47fd-b288-833a330704ce</guid>
  <pubDate>Thu, 11 Apr 2019 22:15:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/ea1f89db-e748-47fd-b288-833a330704ce.mp3" length="34263376" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</itunes:subtitle>
  <itunes:duration>47:35</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.
Plus when not to use ZFS, the surprising way your disks are lying to you, and more! 
</description>
  <itunes:keywords>zfs, vdez, filesystems, sun microsystems, backups, snapshots, copy on write, throughput, iops, linux, GPL, CDDL, ZFS on Linux, ZoL, ashift, SSD, techSNAP, sysadmin podcast, DevOps, data integrity, checksum, ECC, hard drives, hard disks, FreeBSD, OpenZF S, Solaris, RAID, raidz, zfs on root, ubuntu, copyleft</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</p>

<p>Plus when not to use ZFS, the surprising way your disks are lying to you, and more!</p><p>Links:</p><ul><li><a title="ZFS - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/ZFS">ZFS - Ubuntu Wiki</a> &mdash; ZFS is a combined file system and logical volume manager designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens.</li><li><a title="Performance tuning - OpenZFS" rel="nofollow" href="http://open-zfs.org/wiki/Performance_tuning#Alignment_shift">Performance tuning - OpenZFS</a> &mdash; Make sure that you create your pools such that the vdevs have the correct alignment shift for your storage device's size. if dealing with flash media, this is going to be either 12 (4K sectors) or 13 (8K sectors).</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim and Wes sit down to bust some ZFS myths and share their tips and tricks for getting the most out of the ultimate filesystem.</p>

<p>Plus when not to use ZFS, the surprising way your disks are lying to you, and more!</p><p>Links:</p><ul><li><a title="ZFS - Ubuntu Wiki" rel="nofollow" href="https://wiki.ubuntu.com/ZFS">ZFS - Ubuntu Wiki</a> &mdash; ZFS is a combined file system and logical volume manager designed and implemented by a team at Sun Microsystems led by Jeff Bonwick and Matthew Ahrens.</li><li><a title="Performance tuning - OpenZFS" rel="nofollow" href="http://open-zfs.org/wiki/Performance_tuning#Alignment_shift">Performance tuning - OpenZFS</a> &mdash; Make sure that you create your pools such that the vdevs have the correct alignment shift for your storage device's size. if dealing with flash media, this is going to be either 12 (4K sectors) or 13 (8K sectors).</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>396: Floating Point Problems</title>
  <link>https://techsnap.systems/396</link>
  <guid isPermaLink="false">bc968a3f-c804-4203-ae2b-dc43ef919218</guid>
  <pubDate>Thu, 31 Jan 2019 20:45:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/bc968a3f-c804-4203-ae2b-dc43ef919218.mp3" length="19582037" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</itunes:subtitle>
  <itunes:duration>27:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.
Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux. Special Guest: Richard Yao.
</description>
  <itunes:keywords>GPL, CDDL, Oracle, FPU, SIMD, vectorized instructions, AVX, hardware acceleration, journaling, data integrity, LFNW, floating point, checksum, snapshot, clone, FreeBSD, kernel module, header, software license, Linux, Multitasking, kernel preemption, OpenZFS, ZFS, ZoL, ZFS on Linux, Storage, RAID, ZVOL, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</p>

<p>Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux.</p><p>Special Guest: Richard Yao.</p><p>Links:</p><ul><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; Join a bunch of JB hosts and community celebrating the 20th anniversary! </li><li><a title="Choose Linux" rel="nofollow" href="https://chooselinux.show/">Choose Linux</a> &mdash; The show that captures the excitement of discovering Linux.</li><li><a title="Linux 5.0: _kernel_fpu{begin,end} no longer exported" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8259">Linux 5.0: _kernel_fpu{begin,end} no longer exported</a> &mdash; The latest kernels removed the old compatibility headers.</li><li><a title="ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Workaround">ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support</a> &mdash; So while these symbols are important for SIMD vectorized checksums for ZFS in the name of performance, with Linux 5.0+ they are not going to be exported for use by non-GPL modules. ZFS On Linux developer Tony Hutter has now staged a change that would disable vector instructions on Linux 5.0+ kernels.</li><li><a title="Re: x86/fpu: Don&#39;t export __kernel_fpu_{begin,end}()" rel="nofollow" href="https://marc.info/?l=linux-kernel&amp;m=154714516832389">Re: x86/fpu: Don't export __kernel_fpu_{begin,end}()</a> &mdash; My tolerance for ZFS is pretty non-existant.  Sun explicitly did not want their code to work on Linux, so why would we do extra work to get their code to work properly?</li><li><a title="The future of ZFS in FreeBSD" rel="nofollow" href="https://lists.freebsd.org/pipermail/freebsd-current/2018-December/072422.html">The future of ZFS in FreeBSD</a> &mdash; This state of affairs has led to a general agreement among the stakeholders that I have spoken to that it makes sense to rebase FreeBSD's ZFS on ZoL. Brian Behlendorf has graciously encouraged me to add FreeBSD support directly so that we might all have a singleshared code base.</li><li><a title="Dephix: Kickoff to The Future" rel="nofollow" href="https://www.delphix.com/blog/kickoff-future-eko-2018">Dephix: Kickoff to The Future</a> &mdash; OpenZFS has grown over the last decade, and delivering our application on Linux provides great OpenZFS support while enabling higher velocity adoption of new environments.</li><li><a title="The future of ZFS on Linux [zfs-discuss] " rel="nofollow" href="http://list.zfsonlinux.org/pipermail/zfs-discuss/2019-January/033300.html">The future of ZFS on Linux [zfs-discuss] </a> &mdash; 
Do you realize that we don’t actually need the symbols that the kernel removed. It All they do is save/restore of register state while turning off/on preemption. Nothing stops us from doing that ourselves. It is possible to implement our own substitutes using code from either Illumos or FreeBSD or even write our own. 

Honestly, I am beginning to think that my attempt to compromise with mainline gave the wrong impression. I am simply tired of this behavior by them and felt like reaching out to put an end to it. In a few weeks, we will likely be running on Linux 5.0 as if those symbols had never been removed because we will almost certainly have our own substitutes for them. Having to bloat our code because mainline won’t give us access to trivial functionality is annoying, but it is not the end of the world.</li><li><a title="LINUX Unplugged Episode 284: Free as in Get Out" rel="nofollow" href="https://linuxunplugged.com/284">LINUX Unplugged Episode 284: Free as in Get Out</a></li><li><a title="BSD Now 279: Future of ZFS" rel="nofollow" href="https://www.bsdnow.tv/episodes/2019_01_02-future_of_zfs">BSD Now 279: Future of ZFS</a></li><li><a title="BSD Now 157: ZFS, The “Universal” File-system" rel="nofollow" href="https://www.bsdnow.tv/episodes/2016_08_31-the_universal_filesystem">BSD Now 157: ZFS, The “Universal” File-system</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Jim and Wes are joined by OpenZFS developer Richard Yao to explain why the recent drama over Linux kernel 5.0 is no big deal, and how his fix for the underlying issue might actually make things faster.</p>

<p>Plus the nitty-gritty details of vectorized optimizations and kernel preemption, and our thoughts on the future of the relationship between ZFS and Linux.</p><p>Special Guest: Richard Yao.</p><p>Links:</p><ul><li><a title="LinuxFest Northwest 2019" rel="nofollow" href="https://linuxfestnorthwest.org/conferences/2019">LinuxFest Northwest 2019</a> &mdash; Join a bunch of JB hosts and community celebrating the 20th anniversary! </li><li><a title="Choose Linux" rel="nofollow" href="https://chooselinux.show/">Choose Linux</a> &mdash; The show that captures the excitement of discovering Linux.</li><li><a title="Linux 5.0: _kernel_fpu{begin,end} no longer exported" rel="nofollow" href="https://github.com/zfsonlinux/zfs/issues/8259">Linux 5.0: _kernel_fpu{begin,end} no longer exported</a> &mdash; The latest kernels removed the old compatibility headers.</li><li><a title="ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support" rel="nofollow" href="https://www.phoronix.com/scan.php?page=news_item&amp;px=ZFS-On-Linux-5.0-Workaround">ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support</a> &mdash; So while these symbols are important for SIMD vectorized checksums for ZFS in the name of performance, with Linux 5.0+ they are not going to be exported for use by non-GPL modules. ZFS On Linux developer Tony Hutter has now staged a change that would disable vector instructions on Linux 5.0+ kernels.</li><li><a title="Re: x86/fpu: Don&#39;t export __kernel_fpu_{begin,end}()" rel="nofollow" href="https://marc.info/?l=linux-kernel&amp;m=154714516832389">Re: x86/fpu: Don't export __kernel_fpu_{begin,end}()</a> &mdash; My tolerance for ZFS is pretty non-existant.  Sun explicitly did not want their code to work on Linux, so why would we do extra work to get their code to work properly?</li><li><a title="The future of ZFS in FreeBSD" rel="nofollow" href="https://lists.freebsd.org/pipermail/freebsd-current/2018-December/072422.html">The future of ZFS in FreeBSD</a> &mdash; This state of affairs has led to a general agreement among the stakeholders that I have spoken to that it makes sense to rebase FreeBSD's ZFS on ZoL. Brian Behlendorf has graciously encouraged me to add FreeBSD support directly so that we might all have a singleshared code base.</li><li><a title="Dephix: Kickoff to The Future" rel="nofollow" href="https://www.delphix.com/blog/kickoff-future-eko-2018">Dephix: Kickoff to The Future</a> &mdash; OpenZFS has grown over the last decade, and delivering our application on Linux provides great OpenZFS support while enabling higher velocity adoption of new environments.</li><li><a title="The future of ZFS on Linux [zfs-discuss] " rel="nofollow" href="http://list.zfsonlinux.org/pipermail/zfs-discuss/2019-January/033300.html">The future of ZFS on Linux [zfs-discuss] </a> &mdash; 
Do you realize that we don’t actually need the symbols that the kernel removed. It All they do is save/restore of register state while turning off/on preemption. Nothing stops us from doing that ourselves. It is possible to implement our own substitutes using code from either Illumos or FreeBSD or even write our own. 

Honestly, I am beginning to think that my attempt to compromise with mainline gave the wrong impression. I am simply tired of this behavior by them and felt like reaching out to put an end to it. In a few weeks, we will likely be running on Linux 5.0 as if those symbols had never been removed because we will almost certainly have our own substitutes for them. Having to bloat our code because mainline won’t give us access to trivial functionality is annoying, but it is not the end of the world.</li><li><a title="LINUX Unplugged Episode 284: Free as in Get Out" rel="nofollow" href="https://linuxunplugged.com/284">LINUX Unplugged Episode 284: Free as in Get Out</a></li><li><a title="BSD Now 279: Future of ZFS" rel="nofollow" href="https://www.bsdnow.tv/episodes/2019_01_02-future_of_zfs">BSD Now 279: Future of ZFS</a></li><li><a title="BSD Now 157: ZFS, The “Universal” File-system" rel="nofollow" href="https://www.bsdnow.tv/episodes/2016_08_31-the_universal_filesystem">BSD Now 157: ZFS, The “Universal” File-system</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>393: Back to our /roots</title>
  <link>https://techsnap.systems/393</link>
  <guid isPermaLink="false">1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf</guid>
  <pubDate>Thu, 03 Jan 2019 04:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/1126dc11-7156-4c4d-84f1-a9aa9bf4ebcf.mp3" length="19076619" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</itunes:subtitle>
  <itunes:duration>22:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend. 
</description>
  <itunes:keywords>Security Breach, Flash, AWS, Cloud, Bitcoin, Dropbox, Sony, PSN Breach, Wordpress, SSL, TLS, Allan Jude, FreeBSD, Jim Salter, Information Density, Automation, Bitcoin, Security, Networking, SysAdmin podcast, DevOps, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In a special new year’s episode we take a moment to reflect on the show’s past, its future, and say goodbye to an old friend.</p><p>Links:</p><ul><li><a title="Jim Salter" rel="nofollow" href="https://arstechnica.com/author/jimsalter/">Jim Salter</a> &mdash; Jim Salter (@jrssnet) is an author, public speaker, small business owner, mercenary sysadmin, and father of three—not necessarily in that order. He got his first real taste of open source by running Apache on his very own dedicated FreeBSD 3.1 server back in 1999, and he's been a fierce advocate of FOSS ever since.</li><li><a title="Jim Salter on Twitter" rel="nofollow" href="https://twitter.com/jrssnet?lang=en">Jim Salter on Twitter</a></li><li><a title="Dropbox Flaws | TechSNAP | 1" rel="nofollow" href="https://www.youtube.com/watch?v=n7La9Z-XrCE&amp;t=972s">Dropbox Flaws | TechSNAP | 1</a></li><li><a title="PSN Breech Details | TechSNAP 3" rel="nofollow" href="https://www.youtube.com/watch?v=d5FCF9lpVYE">PSN Breech Details | TechSNAP 3</a></li><li><a title="2089 Days Uptime | TechSNAP 300" rel="nofollow" href="https://www.jupiterbroadcasting.com/106026/2089-days-uptime-techsnap-300/">2089 Days Uptime | TechSNAP 300</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 379: SegmentSmack is Whack</title>
  <link>https://techsnap.systems/379</link>
  <guid isPermaLink="false">7165f792-e1bf-4676-9d9e-2a2cc981db5c</guid>
  <pubDate>Fri, 10 Aug 2018 14:30:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/7165f792-e1bf-4676-9d9e-2a2cc981db5c.mp3" length="24883696" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </itunes:subtitle>
  <itunes:duration>29:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. 
It’s a busy TechSNAP week.
</description>
  <itunes:keywords>SegmentSmack, FreeBSD, Linux, UEFI remote attack, Buffer overflow, GitHub Audit, TruffleHog, GitRob, undersea datacenter, homebrew, Eric Holmes, Sysadmin podcast, TechSNAP</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </p>

<p>It’s a busy TechSNAP week.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code" rel="nofollow" href="https://securitytracker.com/id/1041415">HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code</a></li><li><a title="Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news" rel="nofollow" href="https://threatpost.com/update-mechanism-flaws-allow-remote-attacks-on-uefi-firmware/134785/">Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news</a></li><li><a title="How I gained commit access to Homebrew in 30 minutes" rel="nofollow" href="https://medium.com/@vesirin/how-i-gained-commit-access-to-homebrew-in-30-minutes-2ae314df03ab">How I gained commit access to Homebrew in 30 minutes</a></li><li><a title="Reconnaissance tool for GitHub organizations" rel="nofollow" href="https://github.com/michenriksen/gitrob">Reconnaissance tool for GitHub organizations</a></li><li><a title="TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history" rel="nofollow" href="https://github.com/dxa4481/truffleHog">TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history</a></li><li><a title="BFG Repo-Cleaner by rtyley" rel="nofollow" href="https://rtyley.github.io/bfg-repo-cleaner/">BFG Repo-Cleaner by rtyley</a></li><li><a title="TCP implementations vulnerable to Denial of Service" rel="nofollow" href="https://www.kb.cert.org/vuls/id/962459">TCP implementations vulnerable to Denial of Service</a></li><li><a title="SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]" rel="nofollow" href="https://access.redhat.com/articles/3553061">SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]</a></li><li><a title="Merge branch &#39;tcp-robust-ooo&#39; · torvalds/linux" rel="nofollow" href="https://github.com/torvalds/linux/commit/1a4f14bab1868b443f0dd3c55b689a478f82e72e">Merge branch 'tcp-robust-ooo' · torvalds/linux</a></li><li><a title="New Sysadmin dealing with stress." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/95od7h/new_sysadmin_dealing_with_stress/">New Sysadmin dealing with stress.</a></li><li><a title="Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data" rel="nofollow" href="https://www.theverge.com/tldr/2018/8/9/17669936/microsoft-undersea-datacenter-webcam">Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Take down a Linux or FreeBSD box with just 2kpps of traffic, own Homebrew in 30 minutes, and infiltrate an entire network via the Inkjet printers. </p>

<p>It’s a busy TechSNAP week.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code" rel="nofollow" href="https://securitytracker.com/id/1041415">HP Inkjet Printers Buffer Overflows in Processing Files Let Remote Users Execute Arbitrary Code</a></li><li><a title="Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news" rel="nofollow" href="https://threatpost.com/update-mechanism-flaws-allow-remote-attacks-on-uefi-firmware/134785/">Black Hat 2018: Update Mechanisms Allow Remote Attacks on UEFI Firmware | The first stop for security news</a></li><li><a title="How I gained commit access to Homebrew in 30 minutes" rel="nofollow" href="https://medium.com/@vesirin/how-i-gained-commit-access-to-homebrew-in-30-minutes-2ae314df03ab">How I gained commit access to Homebrew in 30 minutes</a></li><li><a title="Reconnaissance tool for GitHub organizations" rel="nofollow" href="https://github.com/michenriksen/gitrob">Reconnaissance tool for GitHub organizations</a></li><li><a title="TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history" rel="nofollow" href="https://github.com/dxa4481/truffleHog">TruffleHog: Searches through git repositories for high entropy strings and secrets, digging deep into commit history</a></li><li><a title="BFG Repo-Cleaner by rtyley" rel="nofollow" href="https://rtyley.github.io/bfg-repo-cleaner/">BFG Repo-Cleaner by rtyley</a></li><li><a title="TCP implementations vulnerable to Denial of Service" rel="nofollow" href="https://www.kb.cert.org/vuls/id/962459">TCP implementations vulnerable to Denial of Service</a></li><li><a title="SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]" rel="nofollow" href="https://access.redhat.com/articles/3553061">SegmentSmack: kernel: tcp segments with random offsets may cause a remote denial of service [CVE-2018-5390]</a></li><li><a title="Merge branch &#39;tcp-robust-ooo&#39; · torvalds/linux" rel="nofollow" href="https://github.com/torvalds/linux/commit/1a4f14bab1868b443f0dd3c55b689a478f82e72e">Merge branch 'tcp-robust-ooo' · torvalds/linux</a></li><li><a title="New Sysadmin dealing with stress." rel="nofollow" href="https://www.reddit.com/r/sysadmin/comments/95od7h/new_sysadmin_dealing_with_stress/">New Sysadmin dealing with stress.</a></li><li><a title="Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data" rel="nofollow" href="https://www.theverge.com/tldr/2018/8/9/17669936/microsoft-undersea-datacenter-webcam">Microsoft’s undersea data center now has a webcam with fish swimming past 27.6 petabytes of data</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 366: Catching up with Allan</title>
  <link>https://techsnap.systems/366</link>
  <guid isPermaLink="false">c3a8238e-1697-4086-90d1-7b9a02d8379c</guid>
  <pubDate>Wed, 02 May 2018 15:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/c3a8238e-1697-4086-90d1-7b9a02d8379c.mp3" length="41294844" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</itunes:subtitle>
  <itunes:duration>48:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.
Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop. Special Guest: Allan Jude.
</description>
  <content:encoded>
    <![CDATA[<p>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</p>

<p>Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.</p><p>Special Guest: Allan Jude.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Volkswagen and Audi Cars Vulnerable to Remote Hacking" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/volkswagen-and-audi-cars-vulnerable-to-remote-hacking/">Volkswagen and Audi Cars Vulnerable to Remote Hacking</a> &mdash; esearchers also gained access to the IVI system's root account, which they say allowed them access to other car data.</li><li><a title="It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out." rel="nofollow" href="https://theintercept.com/2018/04/28/computer-malware-tampering/">It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out.</a> &mdash; For the last two years, I have carried a “honeypot” laptop with me every time I’ve traveled; this computer was intended to attract (and then detect) tampering.</li><li><a title="chipsec" rel="nofollow" href="https://github.com/chipsec/chipsec">chipsec</a> &mdash;  Platform Security Assessment Framework </li><li><a title="UEFITool" rel="nofollow" href="https://github.com/LongSoft/UEFITool">UEFITool</a> &mdash; UEFI firmware image viewer and editor </li><li><a title="Haven Project" rel="nofollow" href="https://guardianproject.github.io/haven/">Haven Project</a> &mdash; Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy, through an Android app and on-device sensors</li><li><a title="Mr S. Delivers on his DO FreeNAS Guide" rel="nofollow" href="https://pastebin.com/sYV5pjQg">Mr S. Delivers on his DO FreeNAS Guide</a></li><li><a title="OZ Shares a War Story" rel="nofollow" href="https://pastebin.com/rWVgzd03">OZ Shares a War Story</a></li><li><a title="Dave&#39;s REALLY Close Call..." rel="nofollow" href="https://pastebin.com/mmtqt4g4">Dave's REALLY Close Call...</a></li><li><a title="Karl Gives us the CTO View on new Hires" rel="nofollow" href="https://pastebin.com/bN3SHfyv">Karl Gives us the CTO View on new Hires</a></li><li><a title="Our Approach to Employee Security Training | PagerDuty" rel="nofollow" href="https://www.pagerduty.com/blog/security-training-at-pagerduty/">Our Approach to Employee Security Training | PagerDuty</a> &mdash; These are both training courses that we developed in-house and delivered ourselves.</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We catch up with Allan Jude and he shares stories of hunting network bottlenecks, memories of old firewalls, and some classic ZFS updates.</p>

<p>Plus the vulnerabilities found in Volkswagen cars, and the lengths a security research went to create the ultimate honeypot laptop.</p><p>Special Guest: Allan Jude.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Volkswagen and Audi Cars Vulnerable to Remote Hacking" rel="nofollow" href="https://www.bleepingcomputer.com/news/security/volkswagen-and-audi-cars-vulnerable-to-remote-hacking/">Volkswagen and Audi Cars Vulnerable to Remote Hacking</a> &mdash; esearchers also gained access to the IVI system's root account, which they say allowed them access to other car data.</li><li><a title="It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out." rel="nofollow" href="https://theintercept.com/2018/04/28/computer-malware-tampering/">It’s Impossible to Prove Your Laptop Hasn’t Been Hacked. I Spent Two Years Finding Out.</a> &mdash; For the last two years, I have carried a “honeypot” laptop with me every time I’ve traveled; this computer was intended to attract (and then detect) tampering.</li><li><a title="chipsec" rel="nofollow" href="https://github.com/chipsec/chipsec">chipsec</a> &mdash;  Platform Security Assessment Framework </li><li><a title="UEFITool" rel="nofollow" href="https://github.com/LongSoft/UEFITool">UEFITool</a> &mdash; UEFI firmware image viewer and editor </li><li><a title="Haven Project" rel="nofollow" href="https://guardianproject.github.io/haven/">Haven Project</a> &mdash; Haven is for people who need a way to protect their personal spaces and possessions without compromising their own privacy, through an Android app and on-device sensors</li><li><a title="Mr S. Delivers on his DO FreeNAS Guide" rel="nofollow" href="https://pastebin.com/sYV5pjQg">Mr S. Delivers on his DO FreeNAS Guide</a></li><li><a title="OZ Shares a War Story" rel="nofollow" href="https://pastebin.com/rWVgzd03">OZ Shares a War Story</a></li><li><a title="Dave&#39;s REALLY Close Call..." rel="nofollow" href="https://pastebin.com/mmtqt4g4">Dave's REALLY Close Call...</a></li><li><a title="Karl Gives us the CTO View on new Hires" rel="nofollow" href="https://pastebin.com/bN3SHfyv">Karl Gives us the CTO View on new Hires</a></li><li><a title="Our Approach to Employee Security Training | PagerDuty" rel="nofollow" href="https://www.pagerduty.com/blog/security-training-at-pagerduty/">Our Approach to Employee Security Training | PagerDuty</a> &mdash; These are both training courses that we developed in-house and delivered ourselves.</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 351: Performance Meltdown</title>
  <link>https://techsnap.systems/351</link>
  <guid isPermaLink="false">92c20700-9d53-4470-a263-d3e009a19100</guid>
  <pubDate>Thu, 11 Jan 2018 16:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/92c20700-9d53-4470-a263-d3e009a19100.mp3" length="30893583" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.

Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. </itunes:subtitle>
  <itunes:duration>41:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.
Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. 
Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more! 
</description>
  <content:encoded>
    <![CDATA[<p>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.</p>

<p>Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. </p>

<p>Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="Meltdown and Spectre" rel="nofollow" href="https://meltdownattack.com/">Meltdown and Spectre</a> &mdash; Meltdown and Spectre exploit critical vulnerabilities in modern processors. </li><li><a title="The Meltdown and Spectre CPU Bugs, Explained" rel="nofollow" href="https://blog.barkly.com/meltdown-spectre-bugs-explained">The Meltdown and Spectre CPU Bugs, Explained</a></li><li><a title="How we got to Spectre and Meltdown A Timeline My version of the timeline..." rel="nofollow" href="https://plus.google.com/+jwildeboer/posts/jj6a9JUaovP">How we got to Spectre and Meltdown A Timeline My version of the timeline...</a> &mdash; My version of the timeline on Spectre Meltdown. This post will be updated! If you want to add/correct something, please comment.</li><li><a title="How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/01/06/how-tier-2-cloud-vendors-banded-together-to-cope-with-spectre-and-meltdown/">How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch</a> &mdash; Eventually six cloud providers — Scaleway, DigitalOcean, Packet, Vultr, Linode and OVH — formed a consortium of sorts to help one another and share information. In order to make the process more efficient, they started a Slack channel with CEOs, CTOs and engineers from the various companies sharing information and fixes as they became available.</li><li><a title="FreeBSD was made aware of Meltdown and Spectre in late December. There&#39;s currently no ETA for mitigation." rel="nofollow" href="https://www.reddit.com/r/freebsd/comments/7och5a/freebsd_was_made_aware_of_meltdown_and_spectre_in/">FreeBSD was made aware of Meltdown and Spectre in late December. There's currently no ETA for mitigation.</a> &mdash; It looks like Dragonfly BSD has a patch, so hopefully that will be useful for FreeBSD.</li><li><a title="heads up: Fix for intel hardware bug will lead to performance regressions" rel="nofollow" href="https://www.postgresql.org/message-id/20180102222354.qikjmf7dvnjgbkxe@alap3.anarazel.de">heads up: Fix for intel hardware bug will lead to performance regressions</a> &mdash; Upcoming versions of the linux kernel (and apparently also windows and
others), will include new feature that apparently has been implemented
with haste to work around an intel hardware bug.</li><li><a title="AWS Developer Forums: Degraded performance" rel="nofollow" href="https://forums.aws.amazon.com/thread.jspa?threadID=269858">AWS Developer Forums: Degraded performance</a> &mdash; Immediately following the reboot my server running on this instance started to suffer from cpu stress.</li><li><a title="Google is pushing Retpoline" rel="nofollow" href="https://www.blog.google/topics/google-cloud/protecting-our-google-cloud-customers-new-vulnerabilities-without-impacting-performance/">Google is pushing Retpoline</a> &mdash; With Retpoline, we could protect our infrastructure at compile-time, with no source-code modifications. Furthermore, testing this feature, particularly when combined with optimizations such as software branch prediction hints, demonstrated that this protection came with almost no performance loss.

</li><li><a title="PCID is now a critical performance/security feature on x86 " rel="nofollow" href="http://archive.is/ma8Iw#selection-341.2-344.0">PCID is now a critical performance/security feature on x86 </a> &mdash; On any system that does not currently show "pcid" in the flags line of /proc/cpuinfo, Meltdown is a bigger issue than "install latest updates".
</li><li><a title="Spectre &amp; Meltdown vulnerability/mitigation checker for Linux" rel="nofollow" href="https://github.com/speed47/spectre-meltdown-checker">Spectre &amp; Meltdown vulnerability/mitigation checker for Linux</a> &mdash; A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.</li><li><a title="Microsoft PowerShell Script to check for Meltdown" rel="nofollow" href="https://support.microsoft.com/en-gb/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in">Microsoft PowerShell Script to check for Meltdown</a> &mdash; To help customers verify that protections are enabled, Microsoft has published a PowerShell script that customers can run on their systems. Install and run the script by running the following commands.

</li><li><a title="Why Raspberry Pi isn&#39;t vulnerable to Spectre or Meltdown" rel="nofollow" href="https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/">Why Raspberry Pi isn't vulnerable to Spectre or Meltdown</a> &mdash; To help us understand why, here’s a little primer on some concepts in modern processor design. </li><li><a title="macOS High Sierra&#39;s App Store System Preferences Can Be Unlocked With Any Password" rel="nofollow" href="https://www.macrumors.com/2018/01/10/macos-high-sierra-app-store-password-bug/">macOS High Sierra's App Store System Preferences Can Be Unlocked With Any Password</a> &mdash; A bug report submitted on Open Radar this week has revealed a security flaw in the current version of macOS High Sierra that allows the App Store menu in System Preferences to be unlocked with any password. </li><li><a title="Major macOS High Sierra Bug Allows Full Admin Access Without Password" rel="nofollow" href="https://www.macrumors.com/2017/11/28/macos-high-sierra-bug-admin-access/">Major macOS High Sierra Bug Allows Full Admin Access Without Password</a></li><li><a title="WD My Cloud NAS devices have hard-wired backdoor" rel="nofollow" href="https://www.theregister.co.uk/2018/01/08/wd_mycloud_nas_backdoor/">WD My Cloud NAS devices have hard-wired backdoor</a> &mdash; Lets anyone log in as user mydlinkBRionyg with the password abc12345cba.</li><li><a title="Question: How could I measure all of these overhead performance hits?" rel="nofollow" href="https://slexy.org/view/s2hNxl4Ras">Question: How could I measure all of these overhead performance hits?</a> &mdash; My question: how could I measure all of these overhead performance hits, so I can put in a well educated request to adjust all of these components, so I have a computer that performs near its capacity?</li><li><a title="Perfmon" rel="nofollow" href="https://technet.microsoft.com/en-us/library/bb490957.aspx">Perfmon</a></li><li><a title="Troubleshooting with the Windows Sysinternals Tools" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/learn/troubleshooting-book">Troubleshooting with the Windows Sysinternals Tools</a></li><li><a title="ProcDump" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procdump">ProcDump</a></li><li><a title="Process Monitor - Replaces filemon" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procmon">Process Monitor - Replaces filemon</a></li><li><a title="Question: MySQL Replication Woes" rel="nofollow" href="https://slexy.org/view/s2iRKPgsGI">Question: MySQL Replication Woes</a> &mdash; The problem is that during some larger deletes on the master, the tables on the slave get locked and the slave lag goes through the roof.. During this time all of my selects that have been sent to the slave are just sitting there and waiting for the table to unlock while the master is just fine.</li><li><a title="Ask Noah 44: Red Hat with Brandon Johnson" rel="nofollow" href="http://www.jupiterbroadcasting.com/121292/redhat-with-brandon-johnson-ask-noah-44/">Ask Noah 44: Red Hat with Brandon Johnson</a></li><li><a title="BSD Now 228: The Spectre of Meltdown" rel="nofollow" href="http://www.jupiterbroadcasting.com/121362/the-spectre-of-meltdown-bsd-now-228/">BSD Now 228: The Spectre of Meltdown</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The types of workloads that will see the largest performance impacts from Meltdown, tools to test yourself, and the outlook for 2018.</p>

<p>Plus a concise breakdown of Meltdown, Spectre, and side-channel attacks like only TechSNAP can. </p>

<p>Then we run through the timeline of events, and the scuttlebutt of so called coordinated disclosure. We also discuss yet another security issue in macOS High Sierra, a backdoor in popular storage appliances, your questions, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li></ul><p>Links:</p><ul><li><a title="Meltdown and Spectre" rel="nofollow" href="https://meltdownattack.com/">Meltdown and Spectre</a> &mdash; Meltdown and Spectre exploit critical vulnerabilities in modern processors. </li><li><a title="The Meltdown and Spectre CPU Bugs, Explained" rel="nofollow" href="https://blog.barkly.com/meltdown-spectre-bugs-explained">The Meltdown and Spectre CPU Bugs, Explained</a></li><li><a title="How we got to Spectre and Meltdown A Timeline My version of the timeline..." rel="nofollow" href="https://plus.google.com/+jwildeboer/posts/jj6a9JUaovP">How we got to Spectre and Meltdown A Timeline My version of the timeline...</a> &mdash; My version of the timeline on Spectre Meltdown. This post will be updated! If you want to add/correct something, please comment.</li><li><a title="How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch" rel="nofollow" href="https://techcrunch.com/2018/01/06/how-tier-2-cloud-vendors-banded-together-to-cope-with-spectre-and-meltdown/">How Tier 2 cloud vendors banded together to cope with Spectre and Meltdown | TechCrunch</a> &mdash; Eventually six cloud providers — Scaleway, DigitalOcean, Packet, Vultr, Linode and OVH — formed a consortium of sorts to help one another and share information. In order to make the process more efficient, they started a Slack channel with CEOs, CTOs and engineers from the various companies sharing information and fixes as they became available.</li><li><a title="FreeBSD was made aware of Meltdown and Spectre in late December. There&#39;s currently no ETA for mitigation." rel="nofollow" href="https://www.reddit.com/r/freebsd/comments/7och5a/freebsd_was_made_aware_of_meltdown_and_spectre_in/">FreeBSD was made aware of Meltdown and Spectre in late December. There's currently no ETA for mitigation.</a> &mdash; It looks like Dragonfly BSD has a patch, so hopefully that will be useful for FreeBSD.</li><li><a title="heads up: Fix for intel hardware bug will lead to performance regressions" rel="nofollow" href="https://www.postgresql.org/message-id/20180102222354.qikjmf7dvnjgbkxe@alap3.anarazel.de">heads up: Fix for intel hardware bug will lead to performance regressions</a> &mdash; Upcoming versions of the linux kernel (and apparently also windows and
others), will include new feature that apparently has been implemented
with haste to work around an intel hardware bug.</li><li><a title="AWS Developer Forums: Degraded performance" rel="nofollow" href="https://forums.aws.amazon.com/thread.jspa?threadID=269858">AWS Developer Forums: Degraded performance</a> &mdash; Immediately following the reboot my server running on this instance started to suffer from cpu stress.</li><li><a title="Google is pushing Retpoline" rel="nofollow" href="https://www.blog.google/topics/google-cloud/protecting-our-google-cloud-customers-new-vulnerabilities-without-impacting-performance/">Google is pushing Retpoline</a> &mdash; With Retpoline, we could protect our infrastructure at compile-time, with no source-code modifications. Furthermore, testing this feature, particularly when combined with optimizations such as software branch prediction hints, demonstrated that this protection came with almost no performance loss.

</li><li><a title="PCID is now a critical performance/security feature on x86 " rel="nofollow" href="http://archive.is/ma8Iw#selection-341.2-344.0">PCID is now a critical performance/security feature on x86 </a> &mdash; On any system that does not currently show "pcid" in the flags line of /proc/cpuinfo, Meltdown is a bigger issue than "install latest updates".
</li><li><a title="Spectre &amp; Meltdown vulnerability/mitigation checker for Linux" rel="nofollow" href="https://github.com/speed47/spectre-meltdown-checker">Spectre &amp; Meltdown vulnerability/mitigation checker for Linux</a> &mdash; A simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.</li><li><a title="Microsoft PowerShell Script to check for Meltdown" rel="nofollow" href="https://support.microsoft.com/en-gb/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in">Microsoft PowerShell Script to check for Meltdown</a> &mdash; To help customers verify that protections are enabled, Microsoft has published a PowerShell script that customers can run on their systems. Install and run the script by running the following commands.

</li><li><a title="Why Raspberry Pi isn&#39;t vulnerable to Spectre or Meltdown" rel="nofollow" href="https://www.raspberrypi.org/blog/why-raspberry-pi-isnt-vulnerable-to-spectre-or-meltdown/">Why Raspberry Pi isn't vulnerable to Spectre or Meltdown</a> &mdash; To help us understand why, here’s a little primer on some concepts in modern processor design. </li><li><a title="macOS High Sierra&#39;s App Store System Preferences Can Be Unlocked With Any Password" rel="nofollow" href="https://www.macrumors.com/2018/01/10/macos-high-sierra-app-store-password-bug/">macOS High Sierra's App Store System Preferences Can Be Unlocked With Any Password</a> &mdash; A bug report submitted on Open Radar this week has revealed a security flaw in the current version of macOS High Sierra that allows the App Store menu in System Preferences to be unlocked with any password. </li><li><a title="Major macOS High Sierra Bug Allows Full Admin Access Without Password" rel="nofollow" href="https://www.macrumors.com/2017/11/28/macos-high-sierra-bug-admin-access/">Major macOS High Sierra Bug Allows Full Admin Access Without Password</a></li><li><a title="WD My Cloud NAS devices have hard-wired backdoor" rel="nofollow" href="https://www.theregister.co.uk/2018/01/08/wd_mycloud_nas_backdoor/">WD My Cloud NAS devices have hard-wired backdoor</a> &mdash; Lets anyone log in as user mydlinkBRionyg with the password abc12345cba.</li><li><a title="Question: How could I measure all of these overhead performance hits?" rel="nofollow" href="https://slexy.org/view/s2hNxl4Ras">Question: How could I measure all of these overhead performance hits?</a> &mdash; My question: how could I measure all of these overhead performance hits, so I can put in a well educated request to adjust all of these components, so I have a computer that performs near its capacity?</li><li><a title="Perfmon" rel="nofollow" href="https://technet.microsoft.com/en-us/library/bb490957.aspx">Perfmon</a></li><li><a title="Troubleshooting with the Windows Sysinternals Tools" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/learn/troubleshooting-book">Troubleshooting with the Windows Sysinternals Tools</a></li><li><a title="ProcDump" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procdump">ProcDump</a></li><li><a title="Process Monitor - Replaces filemon" rel="nofollow" href="https://docs.microsoft.com/en-us/sysinternals/downloads/procmon">Process Monitor - Replaces filemon</a></li><li><a title="Question: MySQL Replication Woes" rel="nofollow" href="https://slexy.org/view/s2iRKPgsGI">Question: MySQL Replication Woes</a> &mdash; The problem is that during some larger deletes on the master, the tables on the slave get locked and the slave lag goes through the roof.. During this time all of my selects that have been sent to the slave are just sitting there and waiting for the table to unlock while the master is just fine.</li><li><a title="Ask Noah 44: Red Hat with Brandon Johnson" rel="nofollow" href="http://www.jupiterbroadcasting.com/121292/redhat-with-brandon-johnson-ask-noah-44/">Ask Noah 44: Red Hat with Brandon Johnson</a></li><li><a title="BSD Now 228: The Spectre of Meltdown" rel="nofollow" href="http://www.jupiterbroadcasting.com/121362/the-spectre-of-meltdown-bsd-now-228/">BSD Now 228: The Spectre of Meltdown</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
