If you are trying to use both NAT and IPv6 with pf on DragonFly, there was a bug (seen here with FreeBSD) with :0 where it would use link-local addresses.  It's now fixed.
If you are using 'set skip on ...' in your pf config, it used to match any interface that matched the specified type.  It now only matches members of that named group.  That may change behavior of your pf rules; check the commit to see what to look for.
Hardware-heavy this week, sorta.  
Did you know there's a default size limit to pf's routing table?  I did not, but it makes sense that there is one.  If for some reason you bump into this limit (difficult for home use, I'd think), here's how you change it.
Lots of BUG news this week; thank you all for the leads on groups to watch.  
Games are the unofficial accidental theme this week.    
Some of this is overflow from last week.
A calmer week, probably because of the U.S. holiday.
As promised last week, the BSDNow show has an interview with Jos Schellevis of OPNSense, along with the normal array of stories and links.
I managed to miss this last week because of issues with my RSS feeds, but the 71st episode of BSDNow is/has been up.  It's "systemd isaster", cause the interview is with Ian Sutton talking about BSD replacements for systemd dependencies.  There's a number of at-least-slightly DragonFly-related things in there, including OPNSense, pkgng, and Hammer mentions.
Remembered to do this all at the last minute, after I got the new server up.  
I'm going to dive right in with an anecdote: As is normal for anyone in systems administration, I'm busy at work.  I've been short an employee for some time, and I brought in a managed service provider to do some work.  This included a revamping of the network equipment and layout, as it has been growing organically rather than in a planned fashion. I received the formal assessment from the provider a few weeks ago, and it mentioned that we were using a non ICSA-certified firewall: pf, in the form of pfSense.  This was accompanied by some rather drastic warnings about how open source was targeted by hackers! and implied that ICSA certification was a mark of quality rather than a purchasable certification.  All bogus, of course. The reason I'm starting this review with this little story is to note that while open source has become well-accepted for system and application software, there's still a lot of people that expect commercial hardware to be exclusively handling data once it leaves the server.  That's been valid for a long time, but software like pf represents a realistic option, or even an improvement, over many commercial and proprietary options.  Since pf exists in one form or another on all the BSDs, it's a tool you should be at least somewhat familiar with. Peter N. M. Hansteen has written about pf first online, and then in printed form, for some time.  The Book of PF is in its third edition, and that's what I have to read.  (Disclosure: No Starch Press gave me the book free, without requirements) The book is excellent, and easier to read than I expected for a book about network processing.  It can be read in linear form, as it takes the reader from simple to more complex network layouts.  It works as a reference book, too, as it focuses on different tools around pf and what they are used for. It covers the different pf version in OpenBSD, NetBSD, and FreeBSD, and DragonFly gets at least a partial mention in some portions of the book.  For example, OpenBSD recently removed ALTQ, but the other BSDs still use it.  With- and without-ALTQ scenarios are covered every place it applies.  You're going to get the most mileage out of an OpenBSD setup with it, though. The parts where the book shines are the later chapters; the descriptions of greylisting and spamd, the traffic shaping notes, and the information on monitoring pf will be useful for most anyone.  It's quite readable; similar in tone to Peter's blog.  If you enjoy his in-depth online articles, the book will be a pleasant read. It's available now from Amazon and directly from No Starch Press.  It's linked in the book slider currently running on the right side of this site, too.
BSDNow 063 has the normal news articles and links, and an interview of Kristaps Džonsons, one of the people working on mandoc.  There's also a tutorial on bandwidth throttling with pf.
Hardly any source commits to point at this week, but there's still lots of stuff happening in BSD-land.
BSDNow 035 is up with a whole lot of pf content, including an interview of Peter Hansteen, of "Book of PF" fame.  There's a 3rd version of that book coming out soon.
Another active week.
Back to relatively normal volume, this week.
Finally, a quieter week.
It's possible your Internet service provider uses a non-routeable IP range (like 10.*) and occasionally your border device picks that up via DHCP by accident instead of an Internet address.  If that happens to you, and you're using DragonFly as your border gateway, it's possible to prevent it with PF dhclient.