Clé USB Bootable Openbsd Clé USB Bootable Openbsd

Total Page:16

File Type:pdf, Size:1020Kb

Clé USB Bootable Openbsd Clé USB Bootable Openbsd 2018/05/25 10:12 1/11 Clé USB bootable OpenBSD Clé USB bootable OpenBSD Je vais indiquer ici comment créer une clé USB bootable avec OpenBSD. Intérêt ? Quel est l'intérêt de la chose ? Et bien il est multiple : Avoir un UNIX sous la main, c'est le bien Avoir un système de secours sur clé USB, c'est le pied Booter sur un système super-sécurisé, ça le fé ! C'est fun C'est la frime Les différents usages : obtenir un dmesg super détaillé pour identifier du matériel récupérer un système endommagé Avoir un anti-virus non compromis installer OpenBSD sur une nouvelle machine (oui, en plus d'être bootable, l'installation est possible !) faire de la maintenance Bref, ça le fait bien. Installation C'est l'enfance de l'art : booter sur un CD OpenBSD (i386 pour une plus grande compatibilité, mais ça marche pareil avec un amd64…), une clé USB déjà préparée, une disquette, en réseau… et lancez l'installation ! Repérez bien le device qui correspond à votre clé USB (sd0 ou sd1 probablement) et installez le système dessus. Le plus simple ? Une seule partition 'a', pas de swap, créer un utilisateur autre que root, n'installez pas compXX.tgz, ni gameXX.tgz (pour gagner quelques Mo…). Et surtout, utilisez les DUID pour identifier les disques au montage ! Exemple <mavie> J'ai reçu une clé USB Duracell de 4Go avec le programme de fidélité Orange Davantage Internet. Cool. Je m'en va installer le bousin là-dessus. Bon, le formatage prend des plombes, l'installation complète met deux heures pour aboutir, le Chez moi... - http://wiki.free-unices.org/ Last update: 2015/09/08 13:48 config:openbsd:bootableflashdrive http://wiki.free-unices.org/doku.php/config/openbsd/bootableflashdrive système est super lent. Clé de merde. Je recommence avec une cle USB de 1Go plus vieille. Cool, ça marche 92 fois mieux… Moralité : si vous trouvez ça lent, utilisez un autre périphérique ! </mavie> Bref, je fais l'installation sur une clé de 1Go, avec une seule partition et un utilisateur live (mot de passe live : on ne cherche pas à faire compliqué), j'installe tous les sets sauf comp51.tgz et game51.tgz. Détails Une fois l'installation terminée, ne rebootez pas !!! Vous avez fini l'installation et avez un shell à disposition. Votre partition est montée sur /mnt : profitez-en ! Systèmes de fichiers Histoire d'avoir un système rapide malgré un périphérique lent, je vais monter des répertoires en RAM. Les répertoires nécessitant un accès en écritures sont : /tmp, /var/run, /var/tmp, /dev. Les systèmes de fichiers en RAM sous OpenBSD peuvent être initialisés par une copie d'un périphérique ou d'un répertoire, ce qui est bien cool. Nous allons en tirer profit pour les répertoires pré-cités : # cd /mnt # mkdir -P proxy/dev # cp dev/MAKEDEV proxy/dev # cd proxy/dev # sh ./MAKEDEV all # cd .. # cp -Rp /mnt/var . # cp -Rp /mnt/home . # cp -RP /mnt/tmp . # vi /mnt/etc/fstab Et voici le fichier fstab incriminé : fstab # Le / est identifié par DUID, ce sera /dev/sd1a probablement au final... # Les Soft Updates allègent les écritures sur le disque. # L'option 'noatime' peut aussi être envisagée. 03328efc2aa11b61.a / ffs rw,softdep 1 1 http://wiki.free-unices.org/ Printed on 2018/05/25 10:12 2018/05/25 10:12 3/11 Clé USB bootable OpenBSD swap /dev mfs rw,-s=2M,-i=1,-P=/proxy/dev/ 0 0 swap /var/log mfs rw,-s=20M,-P=/proxy/var/log/ 0 0 swap /var/run mfs rw,-s=5M,-P=/proxy/var/run/ 0 0 swap /var/tmp mfs rw,-s=5M 0 0 swap /tmp mfs rw,-s=30M 0 0 swap /home mfs rw,-s=100M,-P=/proxy/home/ 0 0 Explications : Toutes les lignes commençant par swap sont “spéciales”. Par exemple : /dev sera monté en mémoire (mfs = Memory File System), d'une taille de 2Mo, en copiant /proxy/dev/ à l'initialisation. Ici, je précise aussi qu'il faut beaucoup d'inodes (option '-i') : il y a 1198 devices et normalement, il n'y a “que” 128 inodes sur 2Mo. man mount_mfs est votre ami ! Un rapide calcul nous montrera qu'il faut au moins 162Mo de RAM sur le système pour pouvoir monter tous les RAM-fs. J'avoue n'avoir pas eu le vice de tester sur une machine virtuelle avec 64Mo de RAM par exemple… Dernier point : la première ligne de votre fichier sera différente de la mienne, c'est normal, il s'agit d'un identifiant unique (man disklabel) ! Services Soyons clairs, sur un système de secours/d'installation, il n'y a pas besoin d'avoir de services configurés. Voici donc le contenu du fichier rc.conf.local (qui sera créé pour l'occasion) : /etc/rc.conf.local # Local rc configuration inetd_flags=NO sendmail_flags=NO apmd_flags="-a -C" Le daemon apmd peut être utile sur un portable… Avant de redémarrer Encore deux petites modifications avant de rebooter. D'abord, il est préférable que l'ordinateur s'arrête directement plutôt que d'appuyer sur le bouton (partisans du moindre effort, vous êtes les bienvenus !) donc modifiez rc.shutdown : /etc/rc.shutdown Chez moi... - http://wiki.free-unices.org/ Last update: 2015/09/08 13:48 config:openbsd:bootableflashdrive http://wiki.free-unices.org/doku.php/config/openbsd/bootableflashdrive powerdown=YES Enfin, nous allons configurer le firewall maintenant, histoire de… Seules les connexions SSH entrantes sont autorisées (on ne sait jamais…), et toutes celles sortantes bien sûr… /etc/pf.conf set skip on lo # filter rules and anchor for ftp-proxy(8) #anchor "ftp-proxy/*" #pass in quick inet proto tcp to port ftp divert-to 127.0.0.1 port 8021 # anchor for relayd(8) #anchor "relayd/*" pass out # to establish keep-state block in # rules for spamd(8) #table <spamd-white> persist #table <nospamd> persist file "/etc/mail/nospamd" #pass in on egress proto tcp from any to any port smtp \ # rdr-to 127.0.0.1 port spamd #pass in on egress proto tcp from <nospamd> to any port smtp #pass in log on egress proto tcp from <spamd-white> to any port smtp #pass out log on egress proto tcp to any port smtp #block in quick from urpf-failed to any # use with care pass in log proto tcp from any to any port ssh modulate state # By default, do not permit remote connections to X11 block in on ! lo0 proto tcp to port 6000:6010 Allez, hop ! On redémarre : # cd # sync # umount /mnt # reboot Premier boot http://wiki.free-unices.org/ Printed on 2018/05/25 10:12 2018/05/25 10:12 5/11 Clé USB bootable OpenBSD N'oubliez pas de sélectionner votre clé USB comme périphérique de démarrage et zou, Welcome to OpenBSD. Logiquement, tout devrait bien se passer et le système devrait démarrer. Logguez-vous en root et c'est parti. Faciliter l'utilisation Comme sur la plupart des système, il y a quelques modifications à effectuer, histoire de vous simplifier la vie. Commencez par donner un peu plus de droits à l'utilisateur du système “live USB” (il s'agit de live dans mon exemple) : # visudo Modifiez le fichier comme suit (ajouter un alias de commandes et décommenter le groupe wheel) : /etc/sudoers # sudoers file. # # This file MUST be edited with the 'visudo' command as root. # Failure to use 'visudo' may result in syntax or file permission errors # that prevent sudo from running. # # See the sudoers man page for the details on how to write a sudoers file. # # Host alias specification # User alias specification # Cmnd alias specification Cmnd_Alias HALT = /sbin/halt, /sbin/reboot # Defaults specification Defaults env_keep +="DESTDIR DISTDIR EDITOR FETCH_CMD FLAVOR FTPMODE GROUP MAKE" Defaults env_keep +="MAKECONF MULTI_PACKAGES NOMAN OKAY_FILES OWNER PKG_CACHE" Defaults env_keep +="PKG_DBDIR PKG_DESTDIR PKG_PATH PKG_TMPDIR PORTSDIR" Defaults env_keep +="RELEASEDIR SHARED_ONLY SSH_AUTH_SOCK SUBPACKAGE VISUAL" Defaults env_keep +="WRKOBJDIR" Chez moi... - http://wiki.free-unices.org/ Last update: 2015/09/08 13:48 config:openbsd:bootableflashdrive http://wiki.free-unices.org/doku.php/config/openbsd/bootableflashdrive # Uncomment to disable the lecture the first time you run sudo #Defaults !lecture # Uncomment to preserve the environment for users in group wheel #Defaults:%wheel !env_reset # Runas alias specification # User privilege specification root ALL=(ALL) SETENV: ALL # Uncomment to allow people in group wheel to run all commands # and set environment variables. %wheel ALL=(ALL) SETENV: ALL, NOPASSWD: HALT # Same thing without a password # %wheel ALL=(ALL) NOPASSWD: SETENV: ALL # Samples # %users ALL=/sbin/mount /cdrom,/sbin/umount /cdrom # %users localhost=/sbin/shutdown -h now Ensuite, modifiez le fichier .profile du root : # cat >> ~/.profile <<_EOF_ kernversion=`sysctl -n kern.osrelease` machinetype=`sysctl -n hw.machine` PKG_PATH="./:http://ftp.fr.openbsd.org/pub/OpenBSD/$kernversion/packages/$ma chinetype/" PS1="\$PWD \\$> " export PS1 PKG_PATH _EOF_ # Vous pouvez ensuite vous déconnecter/reconnecter pour bénéficier d'un zouli prompt et surtout pour pouvoir installer les packages. Décommenter la ligne suivante dans /etc/sysctl.conf, machdep.lidsuspend=1 # laptop lid closes cause a suspend histoire d'avoir un comportement “sain” sur un portable… Enfin, installation de packages utiles (ou pas, à vous de juger et de choisir – notez le nouveau prompt au passage…) : /root #> pkg_add aumix clamav dillo hping iperf mupdf qiv rox-filer xbattbar xosd http://wiki.free-unices.org/ Printed on 2018/05/25 10:12 2018/05/25 10:12 7/11 Clé USB bootable OpenBSD Comme vous pouvez le voir, il y a des programmes “de luxe” : un mixer audio, un visualiseur d'images ou un moniteur de batterie ne sont pas obligatoires… Le cas ClamAV Dans mon cas, avec une clé de 1Go, j'ai environ 20Mo de libre et clamav (enfin freshclam) est dans l'incapacité de télécharger sa base de données par manque de place.
Recommended publications
  • BSD UNIX Toolbox 1000+ Commands for Freebsd, Openbsd
    76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page i BSD UNIX® TOOLBOX 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page ii 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iii BSD UNIX® TOOLBOX 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD®Power Users Christopher Negus François Caen 76034ffirs.qxd:Toolbox 4/2/08 12:50 PM Page iv BSD UNIX® Toolbox: 1000+ Commands for FreeBSD®, OpenBSD, and NetBSD® Power Users Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-0-470-37603-4 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 Library of Congress Cataloging-in-Publication Data is available from the publisher. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permis- sion should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Openbsd Spamd
    OpenBSD Spamd Nicolas Greneche MAPMO Projet SDS Mathrice Rouen 2008 Sommaire 1 Introduction 2 Architecture et Algorithmes 3 Composants 4 Lancement et Param`etres 5 Exploitation 2 / 15 ... mais aussi OpenSSH, OpenNTPD, OpenCVS, OpenBGPD et Packet Filter ! Introduction - OpenBSD Syst`emed'exploitation Orient´es´ecurit´e S´eparation syst`eme de base / ports Support des mod`elesMAC et DAC Audit strict de s´ecurit´edu syst`emede base OpenBSD c'est Spamd ... 3 / 15 Introduction - OpenBSD Syst`emed'exploitation Orient´es´ecurit´e S´eparation syst`eme de base / ports Support des mod`elesMAC et DAC Audit strict de s´ecurit´edu syst`emede base OpenBSD c'est Spamd ... ... mais aussi OpenSSH, OpenNTPD, OpenCVS, OpenBGPD et Packet Filter ! 3 / 15 Introduction - Packet Filter Macros de remplacement (attribut unique ou liste) Redirections (NAT / RDR / BiNAT) R`egles Tables (rapidit´edes lookups / dynamiques) Ancres (r`eglesdynamiques) QoS authpf CARP & PFSync Port \expiretable" 4 / 15 ! Rien `afaire, c'est dans le syst`emede base Configuration de spamd Dans /etc/pf.conf : table <spamd-white> persist no rdr inet proto tcp from <spamd-white> to any port smtp rdr pass inet proto tcp from any to any port smtp ! 127.0.0.1 port spamd Dans /etc/rc.conf.local : spamd flags=““ Merci de votre attention, des questions ? Introduction - (et fin ?) Installation de spamd 5 / 15 Dans /etc/pf.conf : table <spamd-white> persist no rdr inet proto tcp from <spamd-white> to any port smtp rdr pass inet proto tcp from any to any port smtp ! 127.0.0.1 port spamd Dans /etc/rc.conf.local
    [Show full text]
  • Opensmtpd: We Deliver
    OpenSMTPD: we deliver Giovanni Bechis <[email protected]> LinuxCon Europe 2015 About Me I sys admin and developer @SNB I OpenBSD developer I Open Source developer in several other projects OpenSMTPD story I first import in late 2008 I default smtp server in OpenBSD since March 2014 I current version is 5.7.3 released October 5, 2015 I portable version is available for *BSD, Linux and MacOSX why OpenSMTPD ? I in OpenBSD we needed a new smtp server to replace sendmail(8) I Postfix has not a "good" licence (from an OpenBSD pov) I OpenSMTPD is designed with security in mind I pf.conf(5) like configuration file OpenSMTPD: security in mind I multiple processes I privilege revocation I chroot I strlcpy(3), reallocarray(3), arc4random(3), imsg, ... I no auth on unsecure connections I crypt(3) as password hashing function OpenSMTPD: features I smtp protocol as defined in RFC 5321 I backup mx support I mbox and maildir support I authentication inbound and outbound with multiple backends I masquerade support I mailwrapper(8) for sendmail(8) I filters I compressed or crypted mail queue OpenSMTPD: extras I in base src code lives the main smtp server implementation I in extra src code lives all extra features: I table(5) support for different databases I different queue backends I different schedulers I filters OpenSMTPD: basic configuration listen on lo0 table aliases db:/etc/mail/aliases.db # accept from any for domain "example.org" alias <aliases> deliver to mbox accept for local alias <aliases> deliver to mbox accept from local for any relay OpenSMTPD:
    [Show full text]
  • Firewalling with Openbsd's PF Packet Filter
    Firewalling with OpenBSD’s PF packet filter Peter N. M. Hansteen [email protected] Copyright © 2005 - 2012 Peter N. M. Hansteen This document is © Copyright 2005 - 2012, Peter N. M. Hansteen. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. The document is a ’work in progress’, based on a manuscript prepared for a lecture at the BLUG (see http://www.blug.linux.no/) meeting of January 27th, 2005. Along the way it has spawned several conference tutorials as well as The Book of PF (http://nostarch.com/pf2.htm) (second edition, No Starch Press November 2010), which expands on all topics mentioned in this document presents several topics that are only hinted at here.
    [Show full text]
  • The Book of PF Is the PETER N.M
    With a foreword by BUILDBUILD THETHE BOB BECK, NETWORKNETWORK YOUYOU Director of NEEDNEED WITHWITH PFPF the OpenBSD Foundation THETHE BOOKBOOK THE BOOK OF PF OF THE BOOK THE BOOK OF PF OF THE BOOK OpenBSD’s stateful packet filter, PF, offers an amazing • Use PF to create a wireless access point, and lock it OFOF PFPF feature set and support across the major BSD platforms. down tight with authpf and special access restrictions A NO-NONSENSE GUIDE TO THE Like most firewall software though, unlocking PF’s full • Maximize availability by using redirection rules for potential takes a good teacher. OPENBSD FIREWALL load balancing and CARP for failover Peter N.M. Hansteen’s PF website and conference • Use tables for proactive defense against would-be tutorials have helped thousands of users build the attackers and spammers networks they need using PF. The Book of PF is the PETER N.M. HANSTEEN product of Hansteen’s knowledge and experience, • Set up queues and traffic shaping with ALTQ, so your teaching good practices as well as bare facts and network stays responsive software options. Throughout the book, Hansteen • Master your logs with monitoring and visualization, emphasizes the importance of staying in control by because you can never be too paranoid having a written network specification, using macros to make rule sets more readable, and performing rigid The Book of PF is written for BSD enthusiasts and network testing when loading in new rules. admins at any level of expertise. With more and more services placing high demands on bandwidth and Today’s system administrators face increasing challenges increasing hostility coming from the Internet at large, you in the quest for network quality, and The Book of PF can can never be too skilled with PF.
    [Show full text]
  • Zettabyte File System
    ZFS Zettabyte File System Powered by: www.netbsd.ir www.usenix.ir ZFS Futures – Zpool – Snapshot – Zil – Compression – Deduplication – Copy-On-Write – L2ARC – Adaptive Replacement Cache (ARC) – Transaction Group (TXG) – vdev Types – Dataset – Clone – Checksum – Dataset Quota – RAID-Z ZFS Limits Max. volume size : 256 zebibytes (2^78 bytes) Max. file size : 16 exbibytes (2^64 bytes) Max. number of files : Per directory: 2^48 Per file system : unlimited ZFS Zpool ZFS Zil ZFS Compression ● LZ4 ● LZJB ● GZIP ● ZLE ZFS Copy-On-Write ZFS Deduplication ZFS ARC/L2ARC ZFS Dataset ZFS Clone ZFS RAID ZFS Checksum ZFS FreeNAS/NAS4Free Powered by : www.netbsd.ir www.usenix.ir OpenBSD Theo de Raadt October 1995 OpenBSD Pay attention to security problems and fix them before anyone else does (Try to be the #1 most secure operating system.) Provide the best development platform possible Integrate good code from any source with acceptable licenses Greater integration of cryptographic software. Track and implement standards (ANSI, POSIX, parts of X/Open, etc.) Work towards a very machine independent source tree Be as politics-free as possible; solutions should be decided on the basis of technical merit. Focus on being developer-oriented in all senses, including holding developer-only events called hackathons Do not let serious problems sit unsolved. Make a CDROM-based release approximately every six months. OpenBSD "Secure by Default" To ensure that novice users of OpenBSD do not need to become security experts overnight (a viewpoint which other vendors seem to have), we ship the operating system in a Secure by Default mode. All non-essential services are disabled.
    [Show full text]
  • The Silent Network: Denying the Spam and Malware Chatter
    The silent network Denying the spam and malware chatter using free tools Peter N. M. Hansteen [email protected] According to statements by a certain proprietary software marketer, the spam and malware problem should have been solved by now. That company isn’t even close, but in the free software world we are getting there fast and having fun at the same time. This paper offers an overview of principles and tools with real life examples and data, and covers the almost-parallel evolution of malware and spam and effective counter-measures. We present recent empirical data interspersed with examples of practical approaches to ensuring a productive, malware and spam free environment for your colleagues and yourself, using free tools. The evolution of content scanning is described and contrasted with other methods based on miscreants’ (and their robot helpers’) behavior, concluding with a discussing of recent advances in greylisting and greytrapping with an emphasis on those methods’ relatively modest resource demands. Copyright © 2006-2007 by Peter N. M. Hansteen This document is Copyright © 2006-2007 Peter N. M. Hansteen. All rights reserved. Paper presented at the BSDCan conference in Ottawa, Ontario, Canada on May 18, 2007. Table of Contents Malware, virus, spam - some definitions ..........................................................................1 A history of malware .............................................................................................................2 The first virus: the Elk Cloner .........................................................................................2
    [Show full text]
  • The Journal of AUUG Inc. Volume 24 ¯ Number 2 June 2003
    The Journal of AUUG Inc. Volume 24 ¯ Number 2 June 2003 Features: Microsoftens 10 OpenBSD 3.3 Released 11 Linux System’ Administrator’s Security Guide (Part 1) 15 The Roadman for FreBSD 5-stable 20 Mail and Dynamic IP 24 Intrusion Detection System (Part 1) 25 FreeBSD 5.1 Release Process 40 SCO-vs.-IBM: the Open Source Initiative Position Paper on the Complaint 41 AUUG 2003 Systems Administration Symposium Photo Gallery 57 NetBSD 1.6.1 CD 58 News: Public Notices 4 AUUG: Corporate Members 9 AUUG Conference 2003 Invitation 59 AUUG Membership Renewal 61 AUUG: Chapter Meetings and Contact Details 63 Regulars: President’s Column 3 My Home Network 4 ISSN 1035-7521 Print post approved by Australia Post - PP2391500002 AUUG Membership and General Correspondence The AUUG Secretary PO Box 7071 Edi oria Baulkham Hills BC NSW 2153 Con Zymaris auu.qn@auu,q.or,q.au Telephone: 02 8824 9511 or 1800 625 655 (Toll-Free) I imagine I’m not alone in expressing fond memories Facsimile: 02 8824 9522 Email: [email protected] of both Carl Sagan and Stephen Jay Gould. Both of these gentleman were not only practicing scientists AUUG Management Committee but also exemplary communicators of science and of Email: [email protected] the technical, complex and beautiful cosmos that we inhabit. President Greg Lehey PO Box 460 Through his combination of vision and chutzpah, Echunga, SA, 5153 Sagan caused us to pause for a moment and consider Bus. Tel (08) 8388 8286, Mobile 0418 838 708, Fax (08) 8388 8725 the majesty of star-stuff, of galaxies and of the human <[email protected]> discourse which ensued over millennia in trying to Immediate Past President reveal their secrets.
    [Show full text]
  • Hosting BSD L Cloud Computing L Open BSD, Netbsd and Freebsd As File Sharing Servers - Part2
    Editor in Chief: Olga Kartseva Dear Readers! [email protected] Contributing: BSD is already becoming international magazine. People Jan Stedehouder, Rob Somerville, Marko Milenovic, Petr all over the world have an access to our magazine and Topiarz, Paul McMath, Eric Vintimilla, Matthias Pfeifer, Theodore Tereshchenko, Mikel King, Machtelt Garrels, Jesse Smith download it. We are happy that our work is so appreciated and BSD magazine popularity is growing!. Special thanks to: Marko Milenovic, Worth Bishop and Mike Bybee Art Director: First of all I wanted to thank you for you letters of Agnieszka Marchocka support, they mean really a lot to us and help constantly DTP: to improve! All our authors worked hard to make their Ireneusz Pogroszewski articles interesting and useful. I really hope you will like this issue as much as the previous. Senior Consultant/Publisher: Paweł Marciniak [email protected] This month topic is “BSD as a desktop”. Why this National Sales Manager: Ewa Łozowicka topic? [email protected] We thought that some of you still might have doubts Marketing Director: Ewa Łozowicka on choosing OS, so this issue surely will help you to [email protected] learn more about BSD as a desktop and help to make a decision. Executive Ad Consultant: Karolina Lesińska [email protected] But those of you who already use BSD should not Advertising Sales: close the magazine after reading my previous statement, Olga Kartseva because you could loose a lot. =) [email protected] Publisher : Software Press Sp. z o.o. SK Please feel free to contact us, we are open to critics, ul.
    [Show full text]
  • Openbsd Frequently Asked Questions
    OpenBSD Frequently Asked Questions Language: en [teams] de fr nl pl pt Documentation and Frequently Other Documents Asked Questions Upgrade Guide Following -current Commonly Encountered Issues Recent updates Port Testing Guide Using AnonCVS Stable This FAQ is supplemental documentation to the man pages, available both in the installed Using CVSup system and online. The FAQ covers the active release of OpenBSD, currently v3.8. There Manual pages are likely features and changes to features in the development version (-current) of Bug Reporting OpenBSD that are not covered in this FAQ. Mail lists PF User's Guide The FAQ in PDF and plain text form is available in the pub/OpenBSD/doc directory OpenSSH FAQ from the FTP mirrors, along with other documents. PDF files OpenBSD FAQ PF User's Guide 1 - Introduction to OpenBSD Text files ● 1.1 - What is OpenBSD? ● OpenBSD FAQ 1.2 - On what systems does OpenBSD run? ● PF User's Guide 1.3 - Is OpenBSD really free? ● 1.4 - Why might I want to use OpenBSD? ● 1.5 - How can I help support OpenBSD? Back to OpenBSD ● 1.6 - Who maintains OpenBSD? ● 1.7 - When is the next release of OpenBSD? ● 1.8 - What is included with OpenBSD? ● 1.9 - What is new in OpenBSD 3.8? ● 1.10 - Can I use OpenBSD as a desktop system? ● 1.11 - Why is/isn't ProductX included? 2 - Other OpenBSD Information Resources ● 2.1 - Web Pages ● 2.2 - Mailing Lists ● 2.3 - Manual Pages ● 2.4 - Reporting Bugs 3 - Obtaining OpenBSD ● 3.1 - Buying an OpenBSD CD set ● 3.2 - Buying OpenBSD T-Shirts ● 3.3 - Does OpenBSD provide an ISO image for download? http://www.openbsd.org/faq/index.html (1 of 7) [19/04/2006 23:03:44] OpenBSD Frequently Asked Questions ● 3.4 - Downloading via FTP, HTTP or AFS ● 3.5 - Obtaining Current Source Code 4 - OpenBSD 3.8 Installation Guide ● 4.1 - Overview of the OpenBSD installation procedure.
    [Show full text]
  • Opensmtpd for the Real World Mail Server Tutorial
    OpenSMTPD for the Real World Mail Server Tutorial Aaron Poffenberger 2016-06-09 Thu Aaron Poffenberger OpenSMTPD for the Real World Mail Server Tutorial2016-06-09 Thu 1 / 38 Outline 1 Introduction 2 Tutorial Goals and Prerequisites 3 OpenSMTPD 4 PF 5 BGP-Spamd 6 Amavisd Overview 7 ClamAV 8 Dovecot 9 SpamAssassin 10 Conclusion 11 Resources Aaron Poffenberger OpenSMTPD for the Real World Mail Server Tutorial2016-06-09 Thu 2 / 38 Introduction – Background Software developer Software Development 30+ years Experience 17+ years professionally PentaSafe Technologies Security software developer NetIQ Design and implement TheAnimenetwork.com secure APIs BRS Labs Consulting Giant Gray IT Background InfoSec Boeing Software vulnerability ISP (dial-up land) assessment Consulting Auditing DevOps CISSP 2005+ US Army Aaron Poffenberger OpenSMTPD for the Real World Mail Server Tutorial2016-06-09 Thu 3 / 38 Introduction – Other OpenBSD user Amateur radio enthusiast Electronics hobbyist Aaron Poffenberger OpenSMTPD for the Real World Mail Server Tutorial2016-06-09 Thu 4 / 38 OpenBSD FreeBSD NetBSD DragonFly BSD HardenedBSD MidnightBSD Debian GNU/kFreeBSD UbuntuBSD Windows with Bash shell Who runs: Anyone want to admit to: Introduction – You Enough about me, let’s talk about you. Aaron Poffenberger OpenSMTPD for the Real World Mail Server Tutorial2016-06-09 Thu 5 / 38 Debian GNU/kFreeBSD UbuntuBSD Windows with Bash shell OpenBSD FreeBSD NetBSD DragonFly BSD HardenedBSD MidnightBSD Anyone want to admit to: Introduction – You Enough about me, let’s talk about you. Who runs: Aaron Poffenberger OpenSMTPD for the Real World Mail Server Tutorial2016-06-09 Thu 5 / 38 Debian GNU/kFreeBSD UbuntuBSD Windows with Bash shell FreeBSD NetBSD DragonFly BSD HardenedBSD MidnightBSD Anyone want to admit to: Introduction – You Enough about me, let’s talk about you.
    [Show full text]
  • What Is Openbsd? Short History
    About me Dominik Lang (phil) Student of Computer Science phildom.de [email protected] [email protected] What is OpenBSD? Short History http://oreilly.com/catalog/opensources/book/kirkmck.html http://cisx1.uma.maine.edu/~wbackman/bsdtalk/bsdtalk170.ogg http://openbsd.org/lyrics.html#44 Philosophy Philosophy Security / Quality Security: Do the task it is supposed to do, no matter what. Through Security you get Quality Philosophy Openness / Freedom Anti-Blobs Anti-NDA Free to use for everyone E.g. CVS, CARP, ACPI, (Atheros) WLAN drivers ... Open Documentation for Hardware (Theo de Raadt): http://cvs.openbsd.org/papers/brhard2007/index.html Philosophy Security / Quality Openness / Freedom http://openbsd.org/lyrics.html#42 http://openbsd.org/lyrics.html#41 http://openbsd.org/lyrics.html#39 http://openbsd.org/goals.html http://openbsd.org/security.html http://openbsd.org/crypto.html Mechanisms Mechanisms Simplicity Developer / Code User Tools / Daemons in base system E.g.: ifconfig, pf.conf, smtpd.conf, ... Mechanisms Good predefined Defaults Security problems through misconfigurations Defaults for the most common use-cases Examples Tools / Daemons in base system Mechanisms Documentation Man pages No Documentation, No Commit One Developer checks all man page commits FAQ http://openbsd.org/faq/index.html Mechanisms Evolutionary not Revolutionary Design and plan Think about what is to be done Sourcetree is stable E.g. rthreads, pf Mechanisms Release Cycle http://cvs.openbsd.org/papers/asiabsdcon2009-release_ engineering/index.html Every six months version + 0.1 Current 5.1 (May 1, 2012) Snapshots almost every day Locks / Unlocks are suprise events Hackathons Mechanisms Simplicity Good predefined Defaults Documentation Evolutionary Release Cycle Puffy at Work - getting Code right and secure, the OpenBSD way (Henning Brauer): http://quigon.bsws.de/papers/2010/bsdcan/index.html OpenSSH OpenBGPD OpenOSPFD OpenRIPD OpenNTPD OpenSMTPD spamd pf softraid ..
    [Show full text]