openbsd
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| openbsd [2023/06/23 09:00] – about and better context and spelling maja | openbsd [2023/06/23 11:41] (current) – reorder maja | ||
|---|---|---|---|
| Line 23: | Line 23: | ||
| \\ | \\ | ||
| ===== Installation ===== | ===== Installation ===== | ||
| - | Text based install only | + | OpenBSD installer is a text_only affair. (like many other BSD's or Linux server distros)\\ |
| + | Although initially jarring compared to modern GUI installers, the OpenBSD installer is light, fast, and easy to follow along.\\ | ||
| + | \\ | ||
| + | Choosing the disk-sets can be tricky from a USB booted image, as seems you have to re-mount it, and advanced disk partitioning can be daunting initially.\\ | ||
| + | \\ | ||
| + | The [[https:// | ||
| ===== Setup ===== | ===== Setup ===== | ||
| - | post install: | + | my normal |
| - | create user, add to wheel, operator, staff with #usermod -G wheel operator staff my-user-name \\ | + | |
| - | add to staff login group with #usermod -L staff my-user-name \\ | + | |
| - | config ''/ | + | |
| - | secure ssh server ''/ | + | |
| - | patch os #syspatch, and packages #pkg_add -u \\ | + | |
| - | firewall config appropriate for host in ''/ | + | |
| - | if web server, config httpd, acme-client, | + | |
| \\ | \\ | ||
| + | add my user to the operator and staff user groups with '' | ||
| + | add my user to the staff login profile with '' | ||
| + | \\ | ||
| + | sudo has been replaced with '' | ||
| + | as root create/ | ||
| + | \\ | ||
| + | i only use strong modern ssh keys, so i like to further secure the ssh-server\\ | ||
| + | edit the ''/ | ||
| + | \\ | ||
| + | keeping the OS and Apps upto date with binary patches\\ | ||
| + | os '' | ||
| + | \\ | ||
| + | For Servers adjust the firewall to allow access to services\\ | ||
| + | using '' | ||
| + | normally blocking all , allowing sshd and web with connection thresholds and overflows \\ | ||
| + | i might also install '' | ||
| + | \\ | ||
| + | and if your setting up a web server, config '' | ||
| + | \\ | ||
| + | For Desktops allow xenodm and setup your favorite DM/DE. FVWM and CWM are there in base, but XFCE and Gnome are in packages, as is Firefox and Chromium. | ||
| + | |||
| ===== Services ===== | ===== Services ===== | ||
| - | check in rc.conf and / | + | init based service control system, |
| - | rcctl enable|disable|start|stop|reload | + | services are easily controlled, with '' |
| - | ==== Firewall PF ==== | + | < |
| - | pf.conf and pf.os \\ | + | usage: |
| - | pfctl \\ | + | rcctl [-df] configtest|check|reload|restart|stop|start daemon ... |
| - | pftop \\ | + | rcctl disable|enable|order [daemon |
| + | rcctl ls all|failed|off|on|rogue|started|stopped | ||
| + | </ | ||
| + | eg; to stop the web-server' | ||
| ==== SSHD ==== | ==== SSHD ==== | ||
| + | OpenBSD team long ago forked SSH and created their own version, and probably their best known project. it's so good its now the de-facto variant installed on most other OS' | ||
| + | \\ | ||
| + | As a client i rarely modify the local file. if the host is a workstation/ | ||
| + | \\ | ||
| + | although defaults are always sane, for servers | ||
| + | <file - sshd_config> | ||
| + | #HostKey / | ||
| + | #HostKey / | ||
| + | HostKey / | ||
| + | # | ||
| + | PermitRootLogin prohibit-password | ||
| + | </ | ||
| + | \\ | ||
| + | which ends up with entertaining log files like ''/ | ||
| + | < | ||
| + | Jun 23 09:44:58 freyja sshd[95566]: | ||
| + | Jun 23 09:44:59 freyja sshd[72370]: | ||
| + | Jun 23 10:11:40 freyja sshd[39801]: | ||
| + | Jun 23 10:12:17 freyja sshd[52019]: | ||
| + | Jun 23 10:13:23 freyja sshd[12803]: | ||
| + | Jun 23 10:16:04 freyja sshd[56545]: | ||
| + | Jun 23 10:18:30 freyja sshd[23558]: | ||
| + | Jun 23 10:41:08 freyja sshd[82987]: | ||
| + | Jun 23 10:43:22 freyja sshd[50498]: | ||
| + | Jun 23 10:53:12 freyja sshd[8374]: Unable to negotiate with 218.92.0.31 port 17833: no matching host key type found. Their offer: ecdsa-sha2-nistp256, | ||
| + | Jun 23 10:55:36 freyja sshd[93234]: | ||
| + | Jun 23 10:57:45 freyja sshd[16168]: | ||
| + | Jun 23 11:02:15 freyja sshd[48351]: | ||
| + | Jun 23 11:12:35 freyja sshd[75959]: | ||
| + | Jun 23 11:25:11 freyja sshd[38673]: | ||
| + | Jun 23 11:26:01 freyja sshd[53372]: | ||
| + | |||
| + | $ grep negotiate / | ||
| + | 508 | ||
| + | </ | ||
| + | |||
| + | ==== Firewall PF ==== | ||
| + | PF is a super firewall, there is a good doco available in the [[https:// | ||
| + | main file is the ''/ | ||
| + | '' | ||
| + | '' | ||
| + | \\ | ||
| + | Combine SSH and PF and you'll passively discard a lot | ||
| + | <file text pf.conf> | ||
| + | # Allow SSH, trap and block offenders into ' | ||
| + | pass inet proto tcp from any to $ext_if port ssh \ | ||
| + | flags S/SA keep state \ | ||
| + | (max-src-conn 20, max-src-conn-rate 5/3, \ | ||
| + | | ||
| + | </ | ||
| + | < | ||
| + | $ doas pfctl -t ssh-abuse -Ts | wc -l | ||
| + | 1081 | ||
| + | </ | ||
| ==== Spamd ==== | ==== Spamd ==== | ||
openbsd.1687510809.txt.gz · Last modified: 2023/06/23 09:00 by maja
