Podcast Episode Details

Back to Podcast Episodes
78: From the Foundation (Part 2)

78: From the Foundation (Part 2)



This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We've also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.

This episode was brought to you by

iXsystems - Enterprise Servers and Storage for Open SourceDigitalOcean - Simple Cloud Hosting, Built for DevelopersTarsnap - Online Backups for the Truly Paranoid


Headlines

BSDCan 2015 schedule

  • The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well
  • Just a reminder: it's going to be held on June 12th and 13th at the University of Ottawa in Canada
  • This year's conference will have a massive fifty talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)
  • Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few "birds of a feather" gatherings
  • In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks
  • That's not the ideal balance we'd hope for, but BSDCan says they'll try to improve that next year
  • Those numbers are based on the speaker's background, or any past presentations, for the few whose actual topic wasn't made obvious from the title (so there may be a small margin of error)
  • Michael Lucas (who's on the BSDCan board) wrote up a blog post about the proposals and rejections this year
  • If you can't make it this year, don't worry, we'll be sure to announce the recordings when they're made available
  • We also interviewed Dan Langille about the conference and what to expect this year, so check that out too ***

SSL interception with relayd

  • There was a lot of commotion recently about superfish, a way that Lenovo was intercepting HTTPS traffic and injecting advertisements
  • If you're running relayd, you can mimic this evil setup on your own networks (just for testing of course…)
  • Reyk Floeter, the guy who wrote relayd, came up a blog post about how to do just that
  • It starts off with some backstory and some of the things relayd is capable of
  • relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL
  • When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario
  • The post is very long, with lo


    Published on 10 years, 10 months ago






If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate