- Building a bootable ARM SD card (FreeBSD)
- NAS: Roll your own or turnkey? (FreeNAS)
- Using pfSense as a Server Only (pfSense)
- Fileserver converted to use ZFS (FreeBSD)
LinuxReality.com (a site with Linux related podcasts – similar to the BSD focused bsdtalk.blogspot.com) has posted a podcast (episode 84) that focuses on Linux and (network) security. In this episode Paul Asadoorian and Larry Pesce of the Pauldotcom Security Weekly Podcast are interviewed.
Amongst the many things discussed, M0n0wall and pfSense are also mentioned.
The third annual pfSense hackathon has been a great success. There was a lot of cleaning up code and cleaning up the many new features that are already in the development branches, rather than adding more new features. This leaves pfSense in a better position to get out future releases.
The third annual pfSense Hackathon starts this coming weekend through the following weekend, in Louisville, KY US. Two developers (Holger and Seth) will be coming in from Europe, as well as Bill from the Chicago area, Gary with Centipede Networks from Tulsa, and Scott and I who both live in Louisville.
This is the longest hackathon yet, at 8 days from start to finish time.
If you’re interested, have a look at the ideas page with a list of things that may/may not be worked on. If you know of something you’d like to see, please contact Chris and it may get added to the list.
For contact details and more details, read the full post here.
The second release candidate of pfSense, a FreeBSD-based firewall, is ready for testing:
pfSense 1.2-RC2 has been released. Here are just a few of the new improvements and features that have made their way into this new version: automatically restarts racoon (ipsec-tools if it wedges); ensure CARP status page cache is cleared before load; updated lighttpd to 1.4.15; APC updated to 3.0.14; update to DNSMASQ 2.3.9; ensure that rules are cleared from UPNP when service is stopped; correctly show IPSEC firewall rules tab when Mobile IPSEC is enabled; quality graph miscellaneous alignments; backport show username on captive portal status screen; do not allow aliases named ‘pptp’; TCP timeout time fixes.
Read the complete changelog for full details.
Centipede Networks has recently entered a partnership with BSD Perimeter to offer commercial support for two important free software projects, pfSense and m0n0wall.
The Free Software Magazine talked to Jeff Starkweather (CEO of Centipede Networks), Chris Buechler (BSD Perimiter’s CTO) and Scott Ullrich (Chief Architect at BSD Perimiter).
TM: Hello everybody, and thank you for answering my questions! Jeff, Chris, Scott please introduce yourselves and your companies to our readers.
JS: My name is Jeff Starkweather and I am the CEO of Centipede Networks. Centipede Networks is a dba of S4F, Inc. in Tulsa, OK, U.S.A. The company started out about 10 years ago as an ISP providing dialup access that had content filtering bundled with the service. As time progressed we branched out into products which included an internet security appliance that provides firewall, content filter and spam and virus filtering services.
CB: My name is Chris Buechler and I am the CTO of BSD Perimeter, a co-founder of the pfSense project, and a long time m0n0wall contributor. I’m not a developer on either project, but possess a deep understanding of networks and security that has enabled me to contribute heavily to both projects in project direction, testing, documentation and support.
BSD Perimeter was founded in Louisville, KY, U.S.A. by Chris Buechler and I to provide commercial backing and support for the pfSense and m0n0wall projects.
SU: My name is Scott Ullrich, and I am the Chief Architect of BSD Perimeter, the other co-founder of pfSense, and its primary developer.
Read the whole interview here
A number of pfSense developers will be flying in to Louisville from around the world to participate in the 2007 Hackthon! During this time a number of pfSense developers get together and spend most of their time hacking on pfSense, testing and many other related items.
Have you ever wasted too much time online? Right, so posting this on my blog imparts some selection bias to the answers to that question. But have you really wasted time to the point of not getting work done, or letting other things fall by the wayside?
We’re going to block some sites that sing their siren song to us, calling like the blue light inside the bug zapper. I’ll use four that friends have suggested.
Now, it’s simply no good to just cut off your access to these sites. The goal here is to get you back to work, not to make it so that you have to go find a way around an all-encompassing block to get your fix. So, we’re going to block access to problem sites during parts of the day when you think you ought not be accessing them.
This can now be easily done with pfSense
To implement this we need to break down the problem into two parts:
1. What do we want to block?
2. When do we want to block it?
Read the complete howto here.