Episode Details
Back to Episodes
234: Code and Community
Description
GSoC 2018 Projects announced, tutorial FreeBSD jails with iocage, new Code of Conduct for FreeBSD, libhijack, and fancy monitoring for OpenSMTPD
This episode was brought to you by
Headlines
Google Summer of Code 2018
You can join #freebsd-soc on the efnet IRC network to chat with FreeBSD developers interested in mentoring student proposals and projects, past FreeBSD/GSoC students, and other students applying to FreeBSD/GSoC this year.
You can get a stipend (paid for by Google) and spend a few months getting to know and improving the insides of NetBSD or pkgsrc.
The schedule is:
12-27 March Applying
23 April Find out if you were accepted
14 May - 22 August Do the project!
We have some suggestions for suitable projects:
- ARM EFI bootloader
- Using libFuzzer on base tools
- Refactoring ALTQ (QoS implementation) and integrating with NPF
- Testsuite for libcurses
- Improve pkgin
Other suggestions and details are at:
https://wiki.netbsd.org/projects/gsoc/
These projects are suggestions; you can come up with your own. Suggestions for other suitable projects are welcome.
Feel free to contact, or chat around on IRC: irc.freenode.org #netbsd #netbsd-code #pkgsrc
- Haiku
- Students: How to Apply for a Haiku Idea
- Project Ideas > If you have questions you can contact the devs on IRC: irc.freenode.org #haiku
FreeBSD Jails with iocage
- Introduction
FreeBSD jails allow users to run multiple, isolated instances of FreeBSD on a single server. Iocage simplifies the management of FreeBSD Jails. Following this tutorial, the jails will be configured to bind to an IP address on the jail host's internal network, and the host OS will pass traffic from the external network to the jail.
The jails will be managed with Iocage. Iocage uses ZFS properties to store configuration data for each jail, so a ZFS file system is required.
- Network setup These steps will:
- Set up the internal network.
- Enable the pf packet filter
- Configure pf pass internet traffic to and from the jail.
PF is full featured firewall, and can do more than just pass traffic to an internal network. Refer to the PF documentation for additional configuration options.
- Run the following to configure the internal network and enable pf.
sysrc cloned_interfaces+="lo1"
sysrc ifconfig_lo1="inet 192.0.2.1/24"
sysrc pf_enable="YES"


