OpenBSD

NextCloud - OpenBSD 7.3

NextCloud on OpenBSD 7.3 some install notes … Powerup Fresh VM Upgrade to 7.3 Beta (7.3 is not yet released) pkg_info nextcloud pkg_info -Q nextcloud -D snap nextcloud-23.0.12p0 nextcloud-24.0.10 nextcloud-25.0.4 nextcloudclient-3.7.4 adding 25.0.4 pkg_add -D snap nextcloud quirks-6.121 signed on 2023-03-21T18:57:42Z Ambiguous: choose package for nextcloud a 0: <None> 1: nextcloud-23.0.12p0 2: nextcloud-24.0.10 3: nextcloud-25.0.4 Your choice: 3 installed: php-8.1 lot of stuff got some readme ... nextcloud-25.0.4:gd-2.3.3: ok nextcloud-25.0.4:php-gd-8.1.16: ok nextcloud-25.

OpenBSD - OpenSMTPD

Running a Mailserver on OpenBSD … Source https://karchnu.fr/posts/2020-09-17-certificate-smtp-imap-antispam.html Requirements OpenBSD VM Public IP & FQDN no Portfilter from Hoster root permission Packages pkg_add opensmtpd-extras opensmtpd-filter-rspamd dovecot dovecot-pigeonhole redis rspamd-- opensmtpd-filter-senderscore FQDN export host="hostname" export domain="domain.tld" export fqdn="${host}.${domain}" httpd.conf f="/etc/httpd.conf"; test -f ${f} && cp ${f} "${f}-$(date +'%s')" cat << EOF > ${f} # added $(date) server "${fqdn}" { listen on * port 80 location "/.well-known/acme-challenge/*" { root "/acme" request strip 2 } } EOF chown root:wheel ${f}; chmod 644 ${f} pf.

OpenBSD - Rainloop

Source https://www.rainloop.net/ how to add a nice WebInterface to an existing Mailserver Vars export fqdn="your.server.de" add pkg PHP Version ? I took 8.1 pkg_add \ curl-- \ php--%8.1 \ php-curl--%8.1 \ php-pdo_sqlite--%8.1 \ php-zip--%8.1 \ pecl81-mcrypt \ unzip-- \ zip-- Cert Assume you already have a TLS Cert, you can skip this one php cd /etc/php-8.1.sample/ cp * /etc/php-8.1/ size sed -i 's/^upload_max_filesize.*/upload_max_filesize = 25M/' /etc/php-8.1.ini sed -i 's/^post_max_size.*/post_max_size = 29M/' /etc/php-8.

OpenBSD - Minio

Inspired https://obsd.solutions/en/blog/2023/01/11/minio-on-openbsd-72-install/ Requirements Fresh VM, running OpenBSD 7.2, fully patched Public IP, all Ports allowed FQDN pointing to your IP run all the commands as root (or with ‘doas’ prepending …) add Package as usual with OpenBSD pkg_add minio Extend File Limits we need some more current open files … cat << EOF >> /etc/login.conf # Minio, added $(date) EOF cat << 'EOF' >> /etc/login.conf minio:\ :openfiles-cur=4096:\ :openfiles-max=8192:\ :tc=daemon: EOF # Rebuild capdb cap_mkdb /etc/login.

OpenBSD - Packages

How to Build a Package on OpenBSD Thx for the Initial Support remi@openbsd.org …! Useful Links https://www.openbsd.org/faq/ports/guide.html https://bsd.port.mk/ Setup Build Machine on Current Install OpenBSD Upgrade to Current get SYS & Ports Switch to Port to Update cd /usr/ports/net/scapy Change to 2.5.0 make makesum make update-plist make make test make install make package Add your own PKG Repo export PKG_PATH="https://your.server.de/pub/OpenBSD/7.2/packages-self/amd64/" # Check Repo root@host# pkg_info -Q scapy scapy-2.5.0p0 # add Repo root@host# pkg_add -V scapy https://your.

IP over SSH

wanna tunnel IP over SSH ? give a try ? Tested for you with … OpenBSD :) Host1 do the following as root echo "net.inet.ip.forwarding=1" >> /etc/sysctl.conf sysctl net.inet.ip.forwarding=1 echo "inet 10.0.0.1 255.255.255.0 10.0.0.2" >> /etc/hostname.tun0 sh /etc/netstart tun0 sed -i '/PermitTunnel .*/PermitTunnel yes/' /etc/ssh/sshd_config rcctl restart sshd ssh-copy-id root@host2 Host2 do the following as root echo "net.inet.ip.forwarding=1" >> /etc/sysctl.conf sysctl net.inet.ip.forwarding=1 echo "inet 10.0.0.2 255.255.255.0 10.0.0.1" >> /etc/hostname.tun0 sh /etc/netstart tun0 sed -i '/PermitTunnel .

OpenBSD - Rock4C+

How to get OpenBSD on OKdo Rock 4C+ got a new Toy and i’d like to put puffy on it Hardware OKDO Hardware Wiki Getting Started Inspired by exoticsilicon Serial Console Mount SD Card on APU/existing HW dmesg |grep sd1 sd1 at scsibus2 targ 1 lun 0: <Generic-, Multi-Card, 1.00> removable serial.0bda0309201209010309 sd1: 58911MB, 512 bytes/sector, 120649728 sectors Speedtest dd if=/dev/random of=/dev/rsd1c bs=1m count=512 dd: /dev/rsd1c: Device not configured not working properly :(

Softraid on OpenBSD

Softraid Inspired by a book from MWL - OpenBSD Mastery Filesystems, here some Notes .. Target build a RAID with 3 Disks, add some Data, destroy one Disk, and rebuild the Raid (and it’s Data). Requirements OpenBSD 7.2 Running added 3 Disk with 20G each: sd0, sd1, sd2 Find Disks root@puffy # dmesg |grep -i sec wd0: 64-sector PIO, LBA, 20480MB, 41943040 sectors sd0: 20480MB, 512 bytes/sector, 41943040 sectors sd1: 20480MB, 512 bytes/sector, 41943040 sectors sd2: 20480MB, 512 bytes/sector, 41943040 sectors sd0, sd1, sd2 are New Disks for RAID

Vault on OpenBSD

how to Install and run Hashicorp Vault on OpenBSD in addition to [https://blog.stoege.net/categories/vault/](this Blog Entry), here some instructions for OpenBSD. Requirements VM with OpenBSD 7.2 (or older …) and root/doas permission Domain, or at least a FQDN Name pointing to your VM HTTP/HTTPS allowed from Internet (for Certificate Generation) Nginx installed (pkg_add nginx) Source https://developer.hashicorp.com/vault/docs/get-started/developer-qs Install Vault all the Steps must be run as root (or with doas) pkg_add vault Vault Config Backup the prev.

Yubikey - on OpenBSD

Running YubiKey on OpenBSD buy a Key and give try … Source https://www.yubico.com/ Install Software pkg_add yubikey-manager-3.1.2p4 pkg_add yubikey-manager-3.1.2p4 quirks-6.42 signed on 2023-01-08T01:39:04Z yubikey-manager-3.1.2p4:py3-click-7.1.2: ok yubikey-manager-3.1.2p4:py3-pyusb-1.0.2p5: ok yubikey-manager-3.1.2p4:pcsc-lite-1.9.8: ok yubikey-manager-3.1.2p4:py3-cparser-2.19p2: ok yubikey-manager-3.1.2p4:py3-cffi-1.15.1: ok yubikey-manager-3.1.2p4:py3-cryptography-38.0.0p0: ok yubikey-manager-3.1.2p4:py3-pyscard-2.0.3: ok yubikey-manager-3.1.2p4:py3-openssl-22.0.0: ok yubikey-manager-3.1.2p4:libyubikey-1.13p4: ok yubikey-manager-3.1.2p4:json-c-0.16: ok yubikey-manager-3.1.2p4:ykpers-1.20.0p2: ok yubikey-manager-3.1.2p4: ok The following new rcscripts were installed: /etc/rc.d/pcscd See rcctl(8) for details. --- +yubikey-manager-3.1.2p4 ------------------- NOTE: yubikey-manager (ykman) is only partially functional on OpenBSD. Most of the "ykman fido xxx" commands (pin-setting and others) stall.