NextCloud on OpenBSD 7.3 some install notes …
Powerup Fresh VM Upgrade to 7.3 Beta (7.3 is not yet released) pkg_info nextcloud pkg_info -Q nextcloud -D snap nextcloud-23.0.12p0 nextcloud-24.0.10 nextcloud-25.0.4 nextcloudclient-3.7.4 adding 25.0.4 pkg_add -D snap nextcloud quirks-6.121 signed on 2023-03-21T18:57:42Z Ambiguous: choose package for nextcloud a 0: <None> 1: nextcloud-23.0.12p0 2: nextcloud-24.0.10 3: nextcloud-25.0.4 Your choice: 3 installed:
php-8.1 lot of stuff got some readme ... nextcloud-25.0.4:gd-2.3.3: ok nextcloud-25.0.4:php-gd-8.1.16: ok nextcloud-25.
Running a Mailserver on OpenBSD … Source https://karchnu.fr/posts/2020-09-17-certificate-smtp-imap-antispam.html Requirements OpenBSD VM Public IP & FQDN no Portfilter from Hoster root permission Packages pkg_add opensmtpd-extras opensmtpd-filter-rspamd dovecot dovecot-pigeonhole redis rspamd-- opensmtpd-filter-senderscore FQDN export host="hostname" export domain="domain.tld" export fqdn="${host}.${domain}" httpd.conf f="/etc/httpd.conf"; test -f ${f} && cp ${f} "${f}-$(date +'%s')" cat << EOF > ${f} # added $(date) server "${fqdn}" { listen on * port 80 location "/.well-known/acme-challenge/*" { root "/acme" request strip 2 } } EOF chown root:wheel ${f}; chmod 644 ${f} pf.
Source https://www.rainloop.net/ how to add a nice WebInterface to an existing Mailserver
Vars export fqdn="your.server.de" add pkg PHP Version ? I took 8.1
pkg_add \ curl-- \ php--%8.1 \ php-curl--%8.1 \ php-pdo_sqlite--%8.1 \ php-zip--%8.1 \ pecl81-mcrypt \ unzip-- \ zip-- Cert Assume you already have a TLS Cert, you can skip this one
php cd /etc/php-8.1.sample/ cp * /etc/php-8.1/ size sed -i 's/^upload_max_filesize.*/upload_max_filesize = 25M/' /etc/php-8.1.ini sed -i 's/^post_max_size.*/post_max_size = 29M/' /etc/php-8.
Inspired https://obsd.solutions/en/blog/2023/01/11/minio-on-openbsd-72-install/
Requirements Fresh VM, running OpenBSD 7.2, fully patched
Public IP, all Ports allowed
FQDN pointing to your IP
run all the commands as root (or with ‘doas’ prepending …)
add Package as usual with OpenBSD
pkg_add minio Extend File Limits we need some more current open files …
cat << EOF >> /etc/login.conf # Minio, added $(date) EOF cat << 'EOF' >> /etc/login.conf minio:\ :openfiles-cur=4096:\ :openfiles-max=8192:\ :tc=daemon: EOF # Rebuild capdb cap_mkdb /etc/login.
How to Build a Package on OpenBSD Thx for the Initial Support remi@openbsd.org …!
Useful Links https://www.openbsd.org/faq/ports/guide.html
https://bsd.port.mk/
Setup Build Machine on Current Install OpenBSD Upgrade to Current get SYS & Ports Switch to Port to Update cd /usr/ports/net/scapy Change to 2.5.0
make makesum
make update-plist
make
make test
make install
make package
Add your own PKG Repo export PKG_PATH="https://your.server.de/pub/OpenBSD/7.2/packages-self/amd64/" # Check Repo root@host# pkg_info -Q scapy scapy-2.5.0p0 # add Repo root@host# pkg_add -V scapy https://your.
wanna tunnel IP over SSH ? give a try ? Tested for you with … OpenBSD :)
Host1 do the following as root
echo "net.inet.ip.forwarding=1" >> /etc/sysctl.conf sysctl net.inet.ip.forwarding=1 echo "inet 10.0.0.1 255.255.255.0 10.0.0.2" >> /etc/hostname.tun0 sh /etc/netstart tun0 sed -i '/PermitTunnel .*/PermitTunnel yes/' /etc/ssh/sshd_config rcctl restart sshd ssh-copy-id root@host2 Host2 do the following as root
echo "net.inet.ip.forwarding=1" >> /etc/sysctl.conf sysctl net.inet.ip.forwarding=1 echo "inet 10.0.0.2 255.255.255.0 10.0.0.1" >> /etc/hostname.tun0 sh /etc/netstart tun0 sed -i '/PermitTunnel .
How to get OpenBSD on OKdo Rock 4C+ got a new Toy and i’d like to put puffy on it
Hardware OKDO Hardware Wiki Getting Started Inspired by exoticsilicon Serial Console Mount SD Card on APU/existing HW dmesg |grep sd1 sd1 at scsibus2 targ 1 lun 0: <Generic-, Multi-Card, 1.00> removable serial.0bda0309201209010309 sd1: 58911MB, 512 bytes/sector, 120649728 sectors Speedtest dd if=/dev/random of=/dev/rsd1c bs=1m count=512 dd: /dev/rsd1c: Device not configured not working properly :(
Softraid Inspired by a book from MWL - OpenBSD Mastery Filesystems, here some Notes ..
Target build a RAID with 3 Disks, add some Data, destroy one Disk, and rebuild the Raid (and it’s Data).
Requirements OpenBSD 7.2 Running added 3 Disk with 20G each: sd0, sd1, sd2 Find Disks root@puffy # dmesg |grep -i sec wd0: 64-sector PIO, LBA, 20480MB, 41943040 sectors sd0: 20480MB, 512 bytes/sector, 41943040 sectors sd1: 20480MB, 512 bytes/sector, 41943040 sectors sd2: 20480MB, 512 bytes/sector, 41943040 sectors sd0, sd1, sd2 are New Disks for RAID
how to Install and run Hashicorp Vault on OpenBSD in addition to [https://blog.stoege.net/categories/vault/](this Blog Entry), here some instructions for OpenBSD.
Requirements VM with OpenBSD 7.2 (or older …) and root/doas permission Domain, or at least a FQDN Name pointing to your VM HTTP/HTTPS allowed from Internet (for Certificate Generation) Nginx installed (pkg_add nginx) Source https://developer.hashicorp.com/vault/docs/get-started/developer-qs
Install Vault all the Steps must be run as root (or with doas)
pkg_add vault Vault Config Backup the prev.
Running YubiKey on OpenBSD buy a Key and give try …
Source https://www.yubico.com/
Install Software pkg_add yubikey-manager-3.1.2p4 pkg_add yubikey-manager-3.1.2p4 quirks-6.42 signed on 2023-01-08T01:39:04Z yubikey-manager-3.1.2p4:py3-click-7.1.2: ok yubikey-manager-3.1.2p4:py3-pyusb-1.0.2p5: ok yubikey-manager-3.1.2p4:pcsc-lite-1.9.8: ok yubikey-manager-3.1.2p4:py3-cparser-2.19p2: ok yubikey-manager-3.1.2p4:py3-cffi-1.15.1: ok yubikey-manager-3.1.2p4:py3-cryptography-38.0.0p0: ok yubikey-manager-3.1.2p4:py3-pyscard-2.0.3: ok yubikey-manager-3.1.2p4:py3-openssl-22.0.0: ok yubikey-manager-3.1.2p4:libyubikey-1.13p4: ok yubikey-manager-3.1.2p4:json-c-0.16: ok yubikey-manager-3.1.2p4:ykpers-1.20.0p2: ok yubikey-manager-3.1.2p4: ok The following new rcscripts were installed: /etc/rc.d/pcscd See rcctl(8) for details. --- +yubikey-manager-3.1.2p4 ------------------- NOTE: yubikey-manager (ykman) is only partially functional on OpenBSD. Most of the "ykman fido xxx" commands (pin-setting and others) stall.