POPULARITY
5.1.25, Joe Maloney from the American Gambling Association joins the Kevin Sheehan Show to discuss the remaining steps for the new RFK Stadium to be fully passed.
5.1.25 Hour 3, Kevin Sheehan talks about the projected win total for the Commanders in 2025 and lists his top NFC teams going into next season. Joe Maloney from the American Gambling Association joins the Kevin Sheehan Show to discuss the remaining steps for the new RFK Stadium to be fully passed.
5.1.25 Hour 1, Kevin Sheehan recaps the Washington Capitals closing out the first round series and advancing to the next round to face the Hurricanes and the possibility of the Commanders signing Nick Chubb. Kevin Sheehan reacts to Lakers Head Coach JJ Reddick storming out of a press conference. Greg Wyshynski from ESPN joins the Kevin Sheehan Show to give analysis on the Washington Capitals and other teams in the NHL Playoffs. 5.1.25 Hour 2, Kevin Sheehan and callers give their thoughts on which free agents the Commanders should sign now that the NFL Draft is over. Thor Nystrom from Fantasy Life joins the Kevin Sheehan Show to give his Commanders draft class analysis and evaluates the NFL Draft as a whole. 5.1.25 Hour 3, Kevin Sheehan talks about the projected win total for the Commanders in 2025 and lists his top NFC teams going into next season. Joe Maloney from the American Gambling Association joins the Kevin Sheehan Show to discuss the remaining steps for the new RFK Stadium to be fully passed.
Boston was always a big Led Zeppelin town, starting back at the very beginning with the marathon Tea Party gigs, through this show right here. July 20, 1973 is the last time Zeppelin played Boston. The crowd is wild at this gig, so much so that the band eliminate Misty Mountain Hop, Since I've Been Loving You, and Moby Dick from the setlist. All to keep the crowd from going Chernobyl. No encores either. I play Celebration Day, a smokin' Stairway, and a brilliant No Quarter that presages the brilliance about to be recorded in NYC a week later.
Legendary sports shock jock Scott Ferrall takes the gaming world by storm with his “in your face” style, previewing the evening slate of games going over lines, totals and props, keeping you out of harms way and on the right side of the line. Ferrall and the crew are back for an all new episode of Coast to Coast! On this episode, Ferrall, live from Radio Row in New Orleans is joined by Carver to preview tonight's NBA and college basketball action, take a look at the latest odds and props for Super Bowl LIX, preview tonight's NHL slate, and more. Plus, Ferrall welcomes special guests: Ian Rapoport, Joe Maloney, and more. And Cam Stewart joins to preview and share best bets for the WM Phoenix Open!
Jay Cicero the CEO of the New Orleans Super Bowl host committee joins Scott and so does Joe Maloney of the American Gaming Commission and more from New Orleans. See omnystudio.com/listener for privacy information.
Legendary sports shock jock Scott Ferrall takes the gaming world by storm with his “in your face” style, previewing the evening slate of games going over lines, totals and props, keeping you out of harms way and on the right side of the line. Ferrall and the crew are back for an all new episode of Coast to Coast! On this episode, Ferrall, live from Radio Row in New Orleans is joined by Carver to preview tonight's NBA and college basketball action, take a look at the latest odds and props for Super Bowl LIX, preview tonight's NHL slate, and more. Plus, Ferrall welcomes special guests: Ian Rapoport, Joe Maloney, and more. And Cam Stewart joins to preview and share best bets for the WM Phoenix Open!
Joe Maloney explains what's next for the RFK stadium transfer bill
The BMitch & Finlay Show Hour 2 features: 1.Congressional Insider Joe Maloney Explains The RFK Bill Situation 2.Talking Commanders With Greg Rosenstein 3.Jeff Walker's Week 16 Hype Song
We listen to a transfer of Joe Maloney's master mono reel of Led Zeppelin at the legendary Boston Garden, on Sept. 9, 1970. No surprise this is an incredible show with Robert in full power, and Jimmy, Bonzo, and Jonesy just perfectly locked in. I play Immigrant Song>Heartbreaker in all one chunk, and the mini acoustic set of That's the Way and a beautiful performance of the instrumental Bron-Y-Aur (5 years before it appeared on Physical Graffiti) also present in one chunk, to improve flow.
Welcome back to the World Series of Politics! This episode Brendan Bussmann and Brandt Iden are joined by Joe Maloney, senior vice president of strategic communications at the American Gaming Association to get a flavour of what's on offer at this year's G2E.
09/06 Hour 1: Chiefs Defeat The Ravens 27-20 In A Thriller - 1:00 Sports Page - 17:00 Joe Maloney Joins The Junkies - 35:00
09/06 FULL SHOW: Hour 1 - 1:00 Hour 2 - 45:00 Hour 3 - 1:27:00 Hour 4 - 2:08:00 The Sports Junkies final show ahead of the Commanders week 1 matchup against Tampa. The guys deep dive into Jayden Daniels' first official NFL game and what Washington needs to do to get the win. Today's guests were Joe Maloney, Kevin McCarthy, John Feinstein, and Scott Abraham.
Joe Maloney fills us in on the latest with the Commanders stadium saga.
Joe Maloney tells us how much money will be wagered on the NCAA Tournament
Hour 1 - 00:00 - Pro Day Season Is Underway 20:04 - Shohei Ohtani Victim Of $4.5 Million "Theft" 30:51 - Joe Maloney From The American Gaming Association
2.29.24 Joe Maloney, Former Head of Public Affairs for the Commanders, on the RFK site being the next home for the Commanders stadium.
2.29.24 Kevin discusses Maryland's 68-61 loss to Northwestern and Lebron James' epic performance Wednesday night for the Lakers. Joe Maloney, Former Commanders' Head of Public Affairs, on the stadium potentially returning to the RFK site.
A new 9-part true crime series from RTÉ Documentary On One. To get free early access to next episodes (one week in advance of here) please subscribe to 'Runaway Joe' from wherever you get your podcasts. Episodes released each Friday.Episode 6:As information is sent into us by listeners, we begin to piece together new, unknown parts of Joe Maloney's story. We also focus in on the transatlantic efforts being made to arrest him and to bring him to justice - all of which leads to blowing the cover on the alias identity of Michael O'Shea. (Ep 6/9)Credits: Runaway Joe is written, reported and produced by Pavel Barter and Tim Desmond. Research by Nicoline Greer. Original music soundtrack by Martin Klusák and Tomáš Borl. Sound designer is Peadar Kearney and the executive producer is Liam O'Brien. Press and Publicity by Jilly McDonough. Promo Producer is Damien Reid. Marketing by Roísín Clune and Hilary O'Callaghan. The designer is Loren Gibbons. Graphics by Amy Gilsenan. Social Media by Bree Treacy and Anne Whitmore. Audio Product Support by Nigel Wheatley. With online supporting content from Anna Joyce. Email documentaries@rte.ie Episodes released weekly, on Fridays Hosted on Acast. See acast.com/privacy for more information.
A new 9-part true crime series from RTÉ Documentary On One. To get free early access to next episodes (one week in advance of here) please subscribe to 'Runaway Joe' from wherever you get your podcasts. Episodes released each Friday.Episode 5:The actions of Joe Maloney have far reaching effects, beyond what even he could ever have imagined. Broken families. Broken homes. Broken lives. We manage to find close family members of both June and Joe - and are shocked by what they have to tell us. (Ep 5/9) Credits: Runaway Joe is written, reported and produced by Pavel Barter and Tim Desmond. Research by Nicoline Greer. Original music soundtrack by Martin Klusák and Tomáš Borl. Sound designer is Peadar Kearney and the executive producer is Liam O'Brien. Press and Publicity by Jilly McDonough. Promo Producer is Damien Reid. Marketing by Roísín Clune and Hilary O'Callaghan. The designer is Loren Gibbons. Graphics by Amy Gilsenan. Social Media by Bree Treacy and Anne Whitmore. Audio Product Support by Nigel Wheatley. With online supporting content from Anna Joyce. Email documentaries@rte.ie Episodes released weekly, on Fridays Hosted on Acast. See acast.com/privacy for more information.
A new 9-part true crime series from RTÉ Documentary On One. To get free early access to next episodes (one week in advance of here) please subscribe to 'Runaway Joe' from wherever you get your podcasts. Episodes released each Friday. EP4 - Living Large Different countries. Different lives. One man becomes another and creates a life the other could never have imagined. Within two years of allegedly murdering his wife, Joe Maloney has become Michael O'Shea. He marries a shy Dublin woman and through a series of lucky breaks, begins to live the life of a wealthy squire. Eclectic. Extravagant. Is this all fantasy? And if it is, when and where will it all end? (Ep 4/9)Credits: Runaway Joe is written, reported and produced by Pavel Barter and Tim Desmond. Research by Nicoline Greer. Original music soundtrack by Martin Klusák and Tomáš Borl. Sound designer is Peadar Kearney and the executive producer is Liam O'Brien. Press and Publicity by Jilly McDonough. Promo Producer is Damien Reid. Marketing by Roísín Clune and Hilary O'Callaghan. The designer is Loren Gibbons. Graphics by Amy Gilsenan. Social Media by Bree Treacy and Anne Whitmore. Audio Product Support by Nigel Wheatley. With online supporting content from Anna Joyce. Email documentaries@rte.ie Episodes released weekly, on Fridays Hosted on Acast. See acast.com/privacy for more information.
Joe Maloney Senior Vice President of Strategic Communications American Gaming Association on sports gambling and the Commanders efforts to return to DC
Hour 4 - 00:00 - Joe Maloney On The Commanders Efforts To Return To DC 20:40 - Commanders Talk With Peter Rosenberg 33:34 - JP's Sphere Review
Bram is live from Vegas with another packed show! He and Callow react to the Commanders news with some new coaches. He's joined by Terps head coach Mike Locksley to start the show, to talk college ball, Nick Saban retiring and more. Lisa Kerney joins to tell us about some of the gambling aspects on Sunday. (35:44) DMV legend David Chang joins the show to weigh in on some of the DC sports storylines and where to eat in DC. (43:17) Bram and Callow react to Ted Leonsis' latest interview on the move to Virginia. (58:09) Former Commanders executive Joe Maloney on the Commanders next stadium. (1:10:37) DMV native and Ravens Hall of FAme lineman Jonathan Ogden joins the show to weigh in on the Super Bowl, the Ravens loss in the AFC Championship and the state of the Commanders. The Bram Weinstein Show Live Weekdays: 3:00pm-6:00pm EST Listen Live: ESPN 630 App | Sportscapitoldc.com | ESPN 630 AM Podcast: Apple | Google Podcasts | Spotify | Amazon Twitter: @RealBramW | @Mike_Callow | @ESPN630DCSee omnystudio.com/listener for privacy information.
Valerie Wilson, chairman of Valerie Wilson Travel and godmother of SH Diana, and Joe Maloney, Swan Hellenic's new vice president of sales for North America, talk with Pam Apple of Insider Travel Report about Swan Hellenic's newest entry in luxury expedition cruising, Wilson tells us what she likes about the ship, which she christened last month, and Maloney tells you how to sell it. For more information, visit www.swanhellenic.com. If interested, the original video of this podcast can be found on the Insider Travel Report Youtube channel or by searching for the podcast's title on Youtube.
Chuck and Roxy are back with Simon (@simonpearl) and open the show with just SOME of the amazing emails and messages we got this past week! Next it's time to "Meet the Littles" and weather.gov says there is a 100% chance you will love our guest JOE MALONEY! Twitter: @JoeTheITO (12:00) Then our hosts close out the show with this weeks Friday 5. (50:00) SONG: Hot Left Pole - The Highest Road In England by Jared Booth. Instagram @jaredisabooth OR on Spotify and YouTube search Jared Booth. Podcast Email - WTFCPODNET@GMAIL.COM Twitter:@loyallittlespod Instagram: @theloyallittlespodcast LOGO DESIGN by Eric Londergan www.redbubble.com Search: ericlondergan Jinglefest Kickstarter: https://www.kickstarter.com/projects/littlesongs/little-songs-live-2022-back-to-virginia --- Support this podcast: https://anchor.fm/loyallittles/support
They say ‘nice guys finish last' but when it comes this guest, that's definitely not the case. Dave Worsfold's a three-time Australian Bare-Back Champion who's rodeoed around the world, but if you were to pull up next to him at the pub, you'd never guess it.Throughout his career, Dave's put his head down, bum up and worked hard. He treats rodeoing like the sport it is and trains like a professional athlete, all while being a good bloke and that's what absolutely comes through in his conversation with Kay Becker.Produced by: Joe Maloney and Caitlyn HewittBrought to you by: Hewitt Consulting Co
Lynton Tapp had a typical Territory childhood - riding horses and hunting, and not a whole lot of schooling.But a combination of heartbreaking events - including an accident that could have killed his sister - forced him to imagine life beyond the red dirt. He, of course, ended up in the most unlikely of places - on national television, in a cooking competition.Lynton reveals his journey to host Caitlyn Hewitt - and no subject was off-limits including his complex relationship with his Dad, his career lows, and his burning desire to return to the bush.Episode Brought to you: Hewitt Consulting Co.Host: Caitlyn HewittProduced by: Joe Maloney & Jessica Howard
This episode features a robust conversation about Inclusive Growth across the Capital Region. Host JB Holston is joined by Tony Pierce, a GWP board member, in discussion with Sheila Johnson and Jason Wright, Co-Chairs of GWP's Inclusive Growth Strategy Council.Hosted by JB Holston. Produced by Maribeth Romslo and Nina Sharma. Edited by Maribeth Romslo. Engineered by Micah Johnson. With support from Francesca Ioffreda, Jenna Klym, Justin Matheson-Turner, Joe Maloney, Giardy Ritz, and Christian Rodriguez.SPEAKER BIOS TONY PIERCE Tony Pierce is the partner in charge of the Washington DC office of Akin Gump Strauss Hauer Feld LLP. His clients span an array of industries, including technology, telecommunications, health care, energy, media and entertainment, financial services and government contracting. An experienced trial lawyer, Tony brings well-honed litigation skills, ingenuity and a vigorous presence.Throughout his career, Tony has been an active force in legal organizations, including the Legal Aid Society of the District of Columbia. He is the past chair of the Greater Washington Board of Trade and serves on the board of the Greater Washington Partnership, a group of civic-minded business leaders investing in solutions that drive growth and create economic opportunity. He is also the General Counsel of the Economic Club of Washington and a member of the Executive Committee of the Federal City Council.SHEILA C. JOHNSONSheila Johnson is Founder and CEO of Salamander Hotels & Resorts, a collection of properties along the east coast and in the Caribbean that includes Salamander Resort & Spa in Middleburg, Virginia, which has been awarded the distinguished Forbes Five Star rating.As Vice Chairman of Monumental Sports & Entertainment, Ms. Johnson is the only African-American woman to have ownership in three professional sports teams: NBA's Washington Wizards, NHL's Washington Capitals, and the WNBA's 2019 World Champions Washington Mystics, for which she serves as President and Managing Partner. Ms. Johnson is a member of the Collective Bargaining Committee of the WNBA. In 2016, she spearheaded WE Capital, a venture capital consortium that invests in female-led enterprises.Ms. Johnson is a founding partner of Black Entertainment Television. Ms. Johnson is founder and chair of the Middleburg Film Festival. A supporter of education, the Sheila C. Johnson Fellowship at the Harvard Kennedy School supported a cohort of 50 fellows – emerging leaders dedicated to improving the lives of the underserved.JASON WRIGHTJason Wright is the President of the Washington Football Team. He is the first Black team president in the history of the NFL and currently is the youngest team president in the League. He is the fourth former NFL player to become president of a team.Prior to joining the Washington Football Team, Jason was a partner in McKinsey & Company's Washington DC office. His work focused on expanding the value of large, complex organizations through operations and culture transformations. Jason also led McKinsey's global inclusion strategy and recently spearheaded the rollout of McKinsey's anti-racism and inclusion strategy. He co-founded the Black Economic Institute, a research entity that analyzes the racial wealth gap, and is a prominent voice in public discussions regarding racial equity in corporate America.
Alison can not get enough of Tyler Doe and his totally legit amnesia. Karlin tries to track down Joe Maloney. Get ad free episodes, early access & two bonus episodes a month on Patreon:https://www.patreon.com/resolvedmysteriespodcastSupport us: https://resolvedmysteriespodcast.com/advertising-supportFollow us!IG @resolvedmysteriespodcastFacebook @resolvethepodTwitter @resolvethepodHave a favorite unsolved mystery of your own?Contact us! resolvedmysteriespodcast@gmail.comOooooh get that sweeeeeeeet RM merch, honeys!https://resolvedmysteriespodcast.com/merchMusic by Sam Cooper: samcoopermusic.comLogo Design by @rachellenidrasommaContent Warning by: Jared B
It's Teacher Appreciation Week and in this week's episode Ron interviews Joe Maloney about his passion for teaching and the challenges teachers face in the current COVID environment. #morningswithron
We listen to tracks from Joe Maloney's excellent recording of Bad Company live at the Boston Music Hall, on May 31, 1975. This is their first headlining tour and they are on fire. It's a great setlist with a great recording. I hope you enjoy it.
Tales from a core file, Lenovo X260 BIOS Update with OpenBSD, the problem of Unix iowait and multi-CPU machines, Hugo workflow using FreeBSD Jails, Caddy, Restic; extending NetBSD-7 branch support, a tale of two hypervisor bugs, and more. Headlines Tales From a Core File - Lessons from the Unix stdio ABI: 40 Years Later (https://fingolfin.org/blog/20200327/stdio-abi.html) On the side, I’ve been wrapping up some improvements to the classic Unix stdio libraries in illumos. stdio contains the classic functions like fopen(), printf(), and the security nightmare gets(). While working on support for fmemopen() and friends I got to reacquaint myself with some of the joys of the stdio ABI and its history from 7th Edition Unix. With that in mind, let’s dive into this, history, and some mistakes not to repeat. While this is written from the perspective of the C programming language, aspects of it apply to many other languages. Update Lenovo X260 BIOS with OpenBSD (https://www.tumfatig.net/20200331/update-lenovo-x260-bios-with-openbsd/) My X260 only runs OpenBSD and has no CD driver. But I still need to upgrade its BIOS from time to time. And this is possible using the ISO BIOS image. First off all, you need to download the “BIOS Update (Bootable CD)” from the Lenovo Support Website. News Roundup The problem of Unix iowait and multi-CPU machines (https://utcc.utoronto.ca/~cks/space/blog/unix/IowaitAndMultipleCPUs) Various Unixes have had a 'iowait' statistic for a long time now (although I can't find a source for where it originated; it's not in 4.x BSD, so it may have come through System V and sar). The traditional and standard definition of iowait is that it's the amount of time the system was idle but had at least one process waiting on disk IO. Rather than count this time as 'idle' (as you would if you had a three-way division of CPU time between user, system, and idle), some Unixes evolved to count this as a new category, 'iowait'. My Latest Self Hosted Hugo Workflow using FreeBSD Jails, Caddy, Restic and More (https://www.jaredwolff.com/my-latest-self-hosted-hugo-workflow/) After hosting with Netlify for a few years, I decided to head back to self hosting. Theres a few reasons for that but the main reasoning was that I had more control over how things worked. In this post, i’ll show you my workflow for deploying my Hugo generated site (www.jaredwolff.com). Instead of using what most people would go for, i’ll be doing all of this using a FreeBSD Jails based server. Plus i’ll show you some tricks i’ve learned over the years on bulk image resizing and more. Let’s get to it. Extending support for the NetBSD-7 branch (http://blog.netbsd.org/tnf/entry/extending_support_for_the_netbsd) Typically, some time after releasing a new NetBSD major version (such as NetBSD 9.0), we will announce the end-of-life of the N-2 branch, in this case NetBSD-7. We've decided to hold off on doing that to ensure our users don't feel rushed to perform a major version update on any remote machines, possibly needing to reach the machine if anything goes wrong. Security fixes will still be made to the NetBSD-7 branch. We hope you're all safe. Stay home. Tale of two hypervisor bugs - Escaping from FreeBSD bhyve (http://phrack.org/papers/escaping_from_freebsd_bhyve.html) VM escape has become a popular topic of discussion over the last few years. A good amount of research on this topic has been published for various hypervisors like VMware, QEMU, VirtualBox, Xen and Hyper-V. Bhyve is a hypervisor for FreeBSD supporting hardware-assisted virtualization. This paper details the exploitation of two bugs in bhyve - FreeBSD-SA-16:32.bhyve (VGA emulation heap overflow) and CVE-2018-17160 (Firmware Configuration device bss buffer overflow) and some generic techniques which could be used for exploiting other bhyve bugs. Further, the paper also discusses sandbox escapes using PCI device passthrough, and Control-Flow Integrity bypasses in HardenedBSD 12-CURRENT Beastie Bits GhostBSD 20.02 Overview (https://www.youtube.com/watch?v=kFG-772WGwg) FuryBSD 12.1 Overview (https://www.youtube.com/watch?v=5V8680uoXxw) > Joe Maloney got in touch to say that the issues in the video and other ones found have since been fixed. Now that's community feedback in action, and an example of a developer who does his best to help the community. A great guy indeed. OS108-9.0 amd64 MATE released (https://forums.os108.org/d/27-os108-9-0-amd64-mate-released) FreeBSD hacking: carp panics & test (https://www.twitch.tv/videos/584064729) Inaugural FreeBSD Office Hours (https://www.youtube.com/watch?v=6qBm5NM3zTQ) Feedback/Questions Shody - systemd question (http://dpaste.com/2SAQDJJ#wrap) Ben - GELI and GPT (http://dpaste.com/1S0DGT3#wrap) Stig - DIY NAS (http://dpaste.com/2NGNZG5#wrap) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Your browser does not support the HTML5 video tag.
OpenBSD 6.4 released, GhostBSD RC2 released, MeetBSD - the ultimate hallway track, DragonflyBSD desktop on a Thinkpad, Porting keybase to NetBSD, OpenSSH 7.9, and draft-ietf-6man-ipv6only-flag in FreeBSD. ##Headlines OpenBSD 6.4 released See a detailed log of changes between the 6.3 and 6.4 releases. See the information on the FTP page for a list of mirror machines. Have a look at the 6.4 errata page for a list of bugs and workarounds. signify(1) pubkeys for this release: base: RWQq6XmS4eDAcQW4KsT5Ka0KwTQp2JMOP9V/DR4HTVOL5Bc0D7LeuPwA fw: RWRoBbjnosJ/39llpve1XaNIrrQND4knG+jSBeIUYU8x4WNkxz6a2K97 pkg: RWRF5TTY+LoN/51QD5kM2hKDtMTzycQBBPmPYhyQEb1+4pff/H6fh/kA ###GhostBSD 18.10 RC2 Announced This second release candidate of GhostBSD 18.10 is the second official release of GhostBSD with TrueOS under the hood. The official desktop of GhostBSD is MATE. However, in the future, there might be an XFCE community release, but for now, there is no community release yet. What has changed since RC1 Removed drm-stable-kmod and we will let users installed the propper drm-*-kmod Douglas Joachin added libva-intel-driver libva-vdpau-driver to supports accelerated some video driver for Intel Issues that got fixed Bug #70 Cannot run Octopi, missing libgksu error. Bug #71 LibreOffice doesn’t start because of missing libcurl.so.4 Bug #72 libarchive is a missing dependency Again thanks to iXsystems, TrueOS, Joe Maloney, Kris Moore, Ken Moore, Martin Wilke, Neville Goddard, Vester “Vic” Thacker, Douglas Joachim, Alex Lyakhov, Yetkin Degirmenci and many more who helped to make the transition from FreeBSD to TrueOS smoother. Updating from RC1 to RC2: sudo pkg update -f sudo pkg install -f libarchive curl libgksu sudo pkg upgrade Where to download: All images checksum, hybrid ISO(DVD, USB) and torrent are available here: https://www.ghostbsd.org/download [ScreenShots] https://www.ghostbsd.org/sites/default/files/Screenshotat2018-10-2013-22-41.png https://www.ghostbsd.org/sites/default/files/Screenshotat2018-10-20_13-27-26.png ###OpenSSH 7.9 has been released and it has support for OpenSSL 1.1 Changes since OpenSSH 7.8 This is primarily a bugfix release. New Features ssh(1), sshd(8): allow most port numbers to be specified using service names from getservbyname(3) (typically /etc/services). ssh(1): allow the IdentityAgent configuration directive to accept environment variable names. This supports the use of multiple agent sockets without needing to use fixed paths. sshd(8): support signalling sessions via the SSH protocol. A limited subset of signals is supported and only for login or command sessions (i.e. not subsystems) that were not subject to a forced command via authorizedkeys or sshdconfig. bz#1424 ssh(1): support "ssh -Q sig" to list supported signature options. Also "ssh -Q help" to show the full set of supported queries. ssh(1), sshd(8): add a CASignatureAlgorithms option for the client and server configs to allow control over which signature formats are allowed for CAs to sign certificates. For example, this allows banning CAs that sign certificates using the RSA-SHA1 signature algorithm. sshd(8), ssh-keygen(1): allow key revocation lists (KRLs) to revoke keys specified by SHA256 hash. ssh-keygen(1): allow creation of key revocation lists directly from base64-encoded SHA256 fingerprints. This supports revoking keys using only the information contained in sshd(8) authentication log messages. Bugfixes ssh(1), ssh-keygen(1): avoid spurious "invalid format" errors when attempting to load PEM private keys while using an incorrect passphrase. bz#2901 sshd(8): when a channel closed message is received from a client, close the stderr file descriptor at the same time stdout is closed. This avoids stuck processes if they were waiting for stderr to close and were insensitive to stdin/out closing. bz#2863 ssh(1): allow ForwardX11Timeout=0 to disable the untrusted X11 forwarding timeout and support X11 forwarding indefinitely. Previously the behaviour of ForwardX11Timeout=0 was undefined. sshd(8): when compiled with GSSAPI support, cache supported method OIDs regardless of whether GSSAPI authentication is enabled in the main section of sshd_config. This avoids sandbox violations if GSSAPI authentication was later enabled in a Match block. bz#2107 sshd(8): do not fail closed when configured with a text key revocation list that contains a too-short key. bz#2897 ssh(1): treat connections with ProxyJump specified the same as ones with a ProxyCommand set with regards to hostname canonicalisation (i.e. don't try to canonicalise the hostname unless CanonicalizeHostname is set to 'always'). bz#2896 ssh(1): fix regression in OpenSSH 7.8 that could prevent public- key authentication using certificates hosted in a ssh-agent(1) or against sshd(8) from OpenSSH
UNCOVERING UNEXPLAINED MYSTERIES SHIRTS ARE IN!! Click the link to check them out (supplies limited): dancingwithghosts2.bandcamp.com/merch Video from Josh's trip to the Unsolved Mysteries listening party & interview with Ryan from Terror-Vision Records: www.youtube.com/watch?v=kfggDtPalk0 Consider supporting us on Patreon: www.patreon.com/UncoveringUnexplainedMysteries --------------------------------------- Today's podcast features Mike going solo for the first time. In this episode Mike talks about three particular cases from the case files of Unsolved Mysteries. The surreal case of a sudden identical twin, a strange case of Amnesia that may or may not be true, and the torrid tale of a man who poisoned his wife to death on his son's fifth birthday. --------------------------------------- For more Josh & Mike, but separate, check them out on YouTube: Josh: www.youtube.com/DancingWithGhosts Mike: www.youtube.com/OCPCommunications
The hunt is on in the wide-world of whiskey for all things Pappy Van Winkle, but are there cheaper alternatives that are easier to find?This week, Kirsten Ellis and Jeff Carlin welcome back to Barrel to Bottle w/Binny’s Beverage Depot, Whiskey Hotline expert Joe Maloney and Beer Buzz expert Roger Adamson to find out. Kristen lays out the historic legacy of Pappy Van Winkle while Joe puts Roger and Jeff to the test in a blind tasting of unique alternatives […]
On this week’s episdoe of Barrel to Bottle with Binny’s Beverage Depot as winter weather sets in, host Kristen Ellis lays out a couple of guidelines for picking the perfect cold weather wine that pairs well with football party fare and hearty cold-weather favorites like stews and roasts. Co-host Jeff Carlin and Kristen are joined by Binny’s Whiskey Hotline expert Joe Maloney and Binny’s Beer Buzz expert Roger Adamson on tour of Italian wines that are sure to impress. Have […]
Hosts Kristen Ellis and Jeff Carlin are joined by the world-renowned Whiskey Hotline on this episode of Barrel to Bottle with Binny’s Beverage Depot. Special guests Brett Pontoni and Joe Maloney explain the basics of American Whiskey. What’s the difference between bourbon and rye? And what about those mysterious allocated whiskeys? Have a question for Binny’s Beverage Depot? Hit us on Twitter and you might win a $20 gift card toward your next purchase! Follow @BinnysBev Want to attend an […]
This week on BSDNow, reports from AsiaBSDcon, TrueOS and FreeBSD news, Optimizing IllumOS Kernel, your questions and more. This episode was brought to you by Headlines AsiaBSDcon Reports and Reviews () AsiaBSDcon schedule (https://2017.asiabsdcon.org/program.html.en) Schedule and slides from the 4th bhyvecon (http://bhyvecon.org/) Michael Dexter's trip report on the iXsystems blog (https://www.ixsystems.com/blog/ixsystems-attends-asiabsdcon-2017) NetBSD AsiaBSDcon booth report (http://mail-index.netbsd.org/netbsd-advocacy/2017/03/13/msg000729.html) *** TrueOS Community Guidelines are here! (https://www.trueos.org/blog/trueos-community-guidelines/) TrueOS has published its new Community Guidelines The TrueOS Project has existed for over ten years. Until now, there was no formally defined process for interested individuals in the TrueOS community to earn contributor status as an active committer to this long-standing project. The current core TrueOS developers (Kris Moore, Ken Moore, and Joe Maloney) want to provide the community more opportunities to directly impact the TrueOS Project, and wish to formalize the process for interested people to gain full commit access to the TrueOS repositories. These describe what is expected of community members and committers They also describe the process of getting commit access to the TrueOS repo: Previously, Kris directly handed out commit bits. Now, the Core developers have provided a small list of requirements for gaining a TrueOS commit bit: Create five or more pull requests in a TrueOS Project repository within a single six month period. Stay active in the TrueOS community through at least one of the available community channels (Gitter, Discourse, IRC, etc.). Request commit access from the core developers via core@trueos.org OR Core developers contact you concerning commit access. Pull requests can be any contribution to the project, from minor documentation tweaks to creating full utilities. At the end of every month, the core developers review the commit logs, removing elements that break the Project or deviate too far from its intended purpose. Additionally, outstanding pull requests with no active dissension are immediately merged, if possible. For example, a user submits a pull request which adds a little-used OpenRC script. No one from the community comments on the request or otherwise argues against its inclusion, resulting in an automatic merge at the end of the month. In this manner, solid contributions are routinely added to the project and never left in a state of “limbo”. The page also describes the perks of being a TrueOS committer: Contributors to the TrueOS Project enjoy a number of benefits, including: A personal TrueOS email alias: @trueos.org Full access for managing TrueOS issues on GitHub. Regular meetings with the core developers and other contributors. Access to private chat channels with the core developers. Recognition as part of an online Who's Who of TrueOS developers. The eternal gratitude of the core developers of TrueOS. A warm, fuzzy feeling. Intel Donates 250.000 $ to the FreeBSD Foundation (https://www.freebsdfoundation.org/news-and-events/latest-news/new-uranium-level-donation-and-collaborative-partnership-with-intel/) More details about the deal: Systems Thinking: Intel and the FreeBSD Project (https://www.freebsdfoundation.org/blog/systems-thinking-intel-and-the-freebsd-project/) Intel will be more actively engaging with the FreeBSD Foundation and the FreeBSD Project to deliver more timely support for Intel products and technologies in FreeBSD. Intel has contributed code to FreeBSD for individual device drivers (i.e. NICs) in the past, but is now seeking a more holistic “systems thinking” approach. Intel Blog Post (https://01.org/blogs/imad/2017/intel-increases-support-freebsd-project) We will work closely with the FreeBSD Foundation to ensure the drivers, tools, and applications needed on Intel® SSD-based storage appliances are available to the community. This collaboration will also provide timely support for future Intel® 3D XPoint™ products. Thank you very much, Intel! *** Applied FreeBSD: Basic iSCSI (https://globalengineer.wordpress.com/2017/03/05/applied-freebsd-basic-iscsi/) iSCSI is often touted as a low-cost replacement for fibre-channel (FC) Storage Area Networks (SANs). Instead of having to setup a separate fibre-channel network for the SAN, or invest in the infrastructure to run Fibre-Channel over Ethernet (FCoE), iSCSI runs on top of standard TCP/IP. This means that the same network equipment used for routing user data on a network could be utilized for the storage as well. This article will cover a very basic setup where a FreeBSD server is configured as an iSCSI Target, and another FreeBSD server is configured as the iSCSI Initiator. The iSCSI Target will export a single disk drive, and the initiator will create a filesystem on this disk and mount it locally. Advanced topics, such as multipath, ZFS storage pools, failover controllers, etc. are not covered. The real magic is the /etc/ctl.conf file, which contains all of the information necessary for ctld to share disk drives on the network. Check out the man page for /etc/ctl.conf for more details; below is the configuration file that I created for this test setup. Note that on a system that has never had iSCSI configured, there will be no existing configuration file, so go ahead and create it. Then, enable ctld and start it: sysrc ctld_enable=”YES” service ctld start You can use the ctladm command to see what is going on: root@bsdtarget:/dev # ctladm lunlist (7:0:0/0): Fixed Direct Access SPC-4 SCSI device (7:0:1/1): Fixed Direct Access SPC-4 SCSI device root@bsdtarget:/dev # ctladm devlist LUN Backend Size (Blocks) BS Serial Number Device ID 0 block 10485760 512 MYSERIAL 0 MYDEVID 0 1 block 10485760 512 MYSERIAL 1 MYDEVID 1 Now, let's configure the client side: In order for a FreeBSD host to become an iSCSI Initiator, the iscsd daemon needs to be started. sysrc iscsid_enable=”YES” service iscsid start Next, the iSCSI Initiator can manually connect to the iSCSI target using the iscsictl tool. While setting up a new iSCSI session, this is probably the best option. Once you are sure the configuration is correct, add the configuration to the /etc/iscsi.conf file (see man page for this file). For iscsictl, pass the IP address of the target as well as the iSCSI IQN for the session: + iscsictl -A -p 192.168.22.128 -t iqn.2017-02.lab.testing:basictarget You should now have a new device (check dmesg), in this case, da1 The guide them walks through partitioning the disk, and laying down a UFS file system, and mounting it This it walks through how to disconnect iscsi, incase you don't want it anymore This all looked nice and easy, and it works very well. Now lets see what happens when you try to mount the iSCSI from Windows Ok, that wasn't so bad. Now, instead of sharing an entire space disk on the host via iSCSI, share a zvol. Now your windows machine can be backed by ZFS. All of your problems are solved. Interview - Philipp Buehler - pbuehler@sysfive.com (mailto:pbuehler@sysfive.com) Technical Lead at SysFive, and Former OpenBSD Committer News Roundup Half a dozen new features in mandoc -T html (http://undeadly.org/cgi?action=article&sid=20170316080827) mandoc (http://man.openbsd.org/mandoc.1)'s HTML output mode got some new features Even though mdoc(7) is a semantic markup language, traditionally none of the semantic annotations were communicated to the reader. [...] Now, at least in -T html output mode, you can see the semantic function of marked-up words by hovering your mouse over them. In terminal output modes, we have the ctags(1)-like internal search facility built around the less(1) tag jump (:t) feature for quite some time now. We now have a similar feature in -T html output mode. To jump to (almost) the same places in the text, go to the address bar of the browser, type a hash mark ('#') after the URI, then the name of the option, command, variable, error code etc. you want to jump to, and hit enter. Check out the full report by Ingo Schwarze (schwarze@) and try out these new features *** Optimizing IllumOS Kernel Crypto (http://zfs-create.blogspot.com/2014/05/optimizing-illumos-kernel-crypto.html) Sašo Kiselkov, of ZFS fame, looked into the performance of the OpenSolaris kernel crypto framework and found it lacking. The article also spends a few minutes on the different modes and how they work. Recently I've had some motivation to look into the KCF on Illumos and discovered that, unbeknownst to me, we already had an AES-NI implementation that was automatically enabled when running on Intel and AMD CPUs with AES-NI support. This work was done back in 2010 by Dan Anderson.This was great news, so I set out to test the performance in Illumos in a VM on my Mac with a Core i5 3210M (2.5GHz normal, 3.1GHz turbo). The initial tests of “what the hardware can do” were done in OpenSSL So now comes the test for the KCF. I wrote a quick'n'dirty crypto test module that just performed a bunch of encryption operations and timed the results. KCF got around 100 MB/s for each algorithm, except half that for AES-GCM OpenSSL had done over 3000 MB/s for CTR mode, 500 MB/s for CBC, and 1000 MB/s for GCM What the hell is that?! This is just plain unacceptable. Obviously we must have hit some nasty performance snag somewhere, because this is comical. And sure enough, we did. When looking around in the AES-NI implementation I came across this bit in aes_intel.s that performed the CLTS instruction. This is a problem: 3.1.2 Instructions That Cause VM Exits ConditionallyCLTS. The CLTS instruction causes a VM exit if the bits in position 3 (corresponding to CR0.TS) are set in both the CR0 guest/host mask and the CR0 read shadow. The CLTS instruction signals to the CPU that we're about to use FPU registers (which is needed for AES-NI), which in VMware causes an exit into the hypervisor. And we've been doing it for every single AES block! Needless to say, performing the equivalent of a very expensive context switch every 16 bytes is going to hurt encryption performance a bit. The reason why the kernel is issuing CLTS is because for performance reasons, the kernel doesn't save and restore FPU register state on kernel thread context switches. So whenever we need to use FPU registers inside the kernel, we must disable kernel thread preemption via a call to kpreemptdisable() and kpreemptenable() and save and restore FPU register state manually. During this time, we cannot be descheduled (because if we were, some other thread might clobber our FPU registers), so if a thread does this for too long, it can lead to unexpected latency bubbles The solution was to restructure the AES and KCF block crypto implementations in such a way that we execute encryption in meaningfully small chunks. I opted for 32k bytes, for reasons which I'll explain below. Unfortunately, doing this restructuring work was a bit more complicated than one would imagine, since in the KCF the implementation of the AES encryption algorithm and the block cipher modes is separated into two separate modules that interact through an internal API, which wasn't really conducive to high performance (we'll get to that later). Anyway, having fixed the issue here and running the code at near native speed, this is what I get: AES-128/CTR: 439 MB/s AES-128/CBC: 483 MB/s AES-128/GCM: 252 MB/s Not disastrous anymore, but still, very, very bad. Of course, you've got keep in mind, the thing we're comparing it to, OpenSSL, is no slouch. It's got hand-written highly optimized inline assembly implementations of most of these encryption functions and their specific modes, for lots of platforms. That's a ton of code to maintain and optimize, but I'll be damned if I let this kind of performance gap persist. Fixing this, however, is not so trivial anymore. It pertains to how the KCF's block cipher mode API interacts with the cipher algorithms. It is beautifully designed and implemented in a fashion that creates minimum code duplication, but this also means that it's inherently inefficient. ECB, CBC and CTR gained the ability to pass an algorithm-specific "fastpath" implementation of the block cipher mode, because these functions benefit greatly from pipelining multiple cipher calls into a single place. ECB, CTR and CBC decryption benefit enormously from being able to exploit the wide XMM register file on Intel to perform encryption/decryption operations on 8 blocks at the same time in a non-interlocking manner. The performance gains here are on the order of 5-8x.CBC encryption benefits from not having to copy the previously encrypted ciphertext blocks into memory and back into registers to XOR them with the subsequent plaintext blocks, though here the gains are more modest, around 1.3-1.5x. After all of this work, this is how the results now look on Illumos, even inside of a VM: Algorithm/Mode 128k ops AES-128/CTR: 3121 MB/s AES-128/CBC: 691 MB/s AES-128/GCM: 1053 MB/s So the CTR and GCM speeds have actually caught up to OpenSSL, and CBC is actually faster than OpenSSL. On the decryption side of things, CBC decryption also jumped from 627 MB/s to 3011 MB/s. Seeing these performance numbers, you can see why I chose 32k for the operation size in between kernel preemption barriers. Even on the slowest hardware with AES-NI, we can expect at least 300-400 MB/s/core of throughput, so even in the worst case, we'll be hogging the CPU for at most ~0.1ms per run. Overall, we're even a little bit faster than OpenSSL in some tests, though that's probably down to us encrypting 128k blocks vs 8k in the "openssl speed" utility. Anyway, having fixed this monstrous atrocity of a performance bug, I can now finally get some sleep. To made these tests repeatable, and to ensure that the changes didn't break the crypto algorithms, Saso created a crypto_test kernel module. I have recently created a FreeBSD version of crypto_test.ko, for much the same purposes Initial performance on FreeBSD is not as bad, if you have the aesni.ko module loaded, but it is not up to speed with OpenSSL. You cannot directly compare to the benchmarks Saso did, because the CPUs are vastly different. Performance results (https://wiki.freebsd.org/OpenCryptoPerformance) I hope to do some more tests on a range of different sized CPUs in order to determine how the algorithms scale across different clock speeds. I also want to look at, or get help and have someone else look at, implementing some of the same optimizations that Saso did. It currently seems like there isn't a way to perform addition crypto operations in the same session without regenerating the key table. Processing additional buffers in an existing session might offer a number of optimizations for bulk operations, although in many cases, each block is encrypted with a different key and/or IV, so it might not be very useful. *** Brendan Gregg's special freeware tools for sysadmins (http://www.brendangregg.com/specials.html) These tools need to be in every (not so) serious sysadmins toolbox. Triple ROT13 encryption algorithm (beware: export restrictions may apply) /usr/bin/maybe, in case true and false don't provide too little choice... The bottom command lists you all the processes using the least CPU cycles. Check out the rest of the tools. You wrote similar tools and want us to cover them in the show? Send us an email to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) *** A look at 2038 (http://www.lieberbiber.de/2017/03/14/a-look-at-the-year-20362038-problems-and-time-proofness-in-various-systems/) I remember the Y2K problem quite vividly. The world was going crazy for years, paying insane amounts of money to experts to fix critical legacy systems, and there was a neverending stream of predictions from the media on how it's all going to fail. Most didn't even understand what the problem was, and I remember one magazine writing something like the following: Most systems store the current year as a two-digit value to save space. When the value rolls over on New Year's Eve 1999, those two digits will be “00”, and “00” means “halt operation” in the machine language of many central processing units. If you're in an elevator at this time, it will stop working and you may fall to your death. I still don't know why they thought a computer would suddenly interpret data as code, but people believed them. We could see a nearby hydropower plant from my parents' house, and we expected it to go up in flames as soon as the clock passed midnight, while at least two airplanes crashed in our garden at the same time. Then nothing happened. I think one of the most “severe” problems was the police not being able to open their car garages the next day because their RFID tokens had both a start and end date for validity, and the system clock had actually rolled over to 1900, so the tokens were “not yet valid”. That was 17 years ago. One of the reasons why Y2K wasn't as bad as it could have been is that many systems had never used the “two-digit-year” representation internally, but use some form of “timestamp” relative to a fixed date (the “epoch”). The actual problem with time and dates rolling over is that systems calculate timestamp differences all day. Since a timestamp derived from the system clock seemingly only increases with each query, it is very common to just calculate diff = now - before and never care about the fact that now could suddenly be lower than before because the system clock has rolled over. In this case diff is suddenly negative, and if other parts of the code make further use of the suddenly negative value, things can go horribly wrong. A good example was a bug in the generator control units (GCUs) aboard Boeing 787 “Dreamliner” aircrafts, discovered in 2015. An internal timestamp counter would overflow roughly 248 days after the system had been powered on, triggering a shut down to “safe mode”. The aircraft has four generator units, but if all were powered up at the same time, they would all fail at the same time. This sounds like an overflow caused by a signed 32-bit counter counting the number of centiseconds since boot, overflowing after 248.55 days, and luckily no airline had been using their Boing 787 models for such a long time between maintenance intervals. The “obvious” solution is to simply switch to 64-Bit values and call it day, which would push overflow dates far into the future (as long as you don't do it like the IBM S/370 mentioned before). But as we've learned from the Y2K problem, you have to assume that computer systems, computer software and stored data (which often contains timestamps in some form) will stay with us for much longer than we might think. The years 2036 and 2038 might be far in the future, but we have to assume that many of the things we make and sell today are going to be used and supported for more than just 19 years. Also many systems have to store dates which are far in the future. A 30 year mortgage taken out in 2008 could have already triggered the bug, and for some banks it supposedly did. sysgettimeofday() is one of the most used system calls on a generic Linux system and returns the current time in form of an UNIX timestamp (timet data type) plus fraction (susecondst data type). Many applications have to know the current time and date to do things, e.g. displaying it, using it in game timing loops, invalidating caches after their lifetime ends, perform an action after a specific moment has passed, etc. In a 32-Bit UNIX system, timet is usually defined as a signed 32-Bit Integer. When kernel, libraries and applications are compiled, the compiler will turn this assumption machine code and all components later have to match each other. So a 32-Bit Linux application or library still expects the kernel to return a 32-Bit value even if the kernel is running on a 64-Bit architecture and has 32-Bit compatibility. The same holds true for applications calling into libraries. This is a major problem, because there will be a lot of legacy software running in 2038. Systems which used an unsigned 32-Bit Integer for timet push the problem back to 2106, but I don't know about many of those. The developers of the GNU C library (glibc), the default standard C library for many GNU/Linux systems, have come up with a design for year 2038 proofness for their library. Besides the timet data type itself, a number of other data structures have fields based on timet or the combined struct timespec and struct timeval types. Many methods beside those intended for setting and querying the current time use timestamps 32-Bit Windows applications, or Windows applications defining _USE32BITTIMET, can be hit by the year 2038 problem too if they use the timet data type. The _time64t data type had been available since Visual C 7.1, but only Visual C 8 (default with Visual Studio 2015) expanded timet to 64 bits by default. The change will only be effective after a recompilation, legacy applications will continue to be affected. If you live in a 64-Bit world and use a 64-Bit kernel with 64-Bit only applications, you might think you can just ignore the problem. In such a constellation all instances of the standard time_t data type for system calls, libraries and applications are signed 64-Bit Integers which will overflow in around 292 billion years. But many data formats, file systems and network protocols still specify 32-Bit time fields, and you might have to read/write this data or talk to legacy systems after 2038. So solving the problem on your side alone is not enough. Then the article goes on to describe how all of this will break your file systems. Not to mention your databases and other file formats. Also see Theo De Raadt's EuroBSDCon 2013 Presentation (https://www.openbsd.org/papers/eurobsdcon_2013_time_t/mgp00001.html) *** Beastie Bits Michael Lucas: Get your name in “Absolute FreeBSD 3rd Edition” (https://blather.michaelwlucas.com/archives/2895) ZFS compressed ARC stats to top (https://svnweb.freebsd.org/base?view=revision&revision=r315435) Matthew Dillon discovered HAMMER was repeating itself when writing to disk. Fixing that issue doubled write speeds (https://www.dragonflydigest.com/2017/03/14/19452.html) TedU on Meaningful Short Names (http://www.tedunangst.com/flak/post/shrt-nms-fr-clrty) vBSDcon and EuroBSDcon Call for Papers are open (https://www.freebsdfoundation.org/blog/submit-your-work-vbsdcon-and-eurobsdcon-cfps-now-open/) Feedback/Questions Craig asks about BSD server management (http://pastebin.com/NMshpZ7n) Michael asks about jails as a router between networks (http://pastebin.com/UqRwMcRk) Todd asks about connecting jails (http://pastebin.com/i1ZD6eXN) Dave writes in with an interesting link (http://pastebin.com/QzW5c9wV) > applications crash more often due to errors than corruptions. In the case of corruption, a few applications (e.g., Log-Cabin, ZooKeeper) can use checksums and redundancy to recover, leading to a correct behavior; however, when the corruption is transformed into an error, these applications crash, resulting in reduced availability. ***
Wisconsin Off Road Serieos Iola Bump and Jump Please excuse the audio for the first half of this episode. We were having some major technical issues. Don't skip over the first half though, because the elite men's winner, Joe Maloney, joins the show to discuss his race (his sound is ok). Listen in to hear about the rest of the Iola Bump and Jump, The WORS Report in general, and what it coming up in the WORS series. Related Show Links: Wisconsin Off Road Series Website WORS Youtube Channel WORS Twitter WORS Facebook Joe Maloney's Twitter Joe Maloney's Blog Saris Save $$$, Get great stuff, and Support MBR by becoming a member
October 29, 2013 Todd Nutter checks in one last time for the season to give you a final wrap up and chat with top WORS racers, Joe Maloney and Lisa Krayer. They called in to share their thoughts about racing, the season, and what they have in store. Related Show Links: Wisconsin Off Road Series Website WORS Youtube Channel WORS Twitter WORS Facebook 2014 WORS Calendar WIN Cycling Adventure 212 Cycling Joe Maloney's Twitter Joe Maloney's Blog