Re: Feedback on redesigned OpenBSD.org

2023-08-12 Thread Stuart Henderson
To me, it looks just "different" rather than particularly better
(except on mobile browsers, where I find the redesigned one a bit worse
by having the links hidden away down the bottom. Scrolling to read the
text on mobile browsers with the existing version is a bit of a
nuisance, but so is scrolling to access the links in this rework).

And "different" is a bit of a problem, there are at least 7 associated
websites which intentionally have the same basic design, which now
no longer match up.

(I found v1 a lot worse than the existing one, mostly due to overriding
browser default font/colour choices and disabling underlining for links).

-- 
Please keep replies on the mailing list.



Re: Feedback on redesigned OpenBSD.org

2023-08-12 Thread Pontus Stenetorp
On Sat 12 Aug 2023, Stuart Henderson wrote:
>
> To me, it looks just "different" rather than particularly better
> (except on mobile browsers, where I find the redesigned one a bit worse
> by having the links hidden away down the bottom. Scrolling to read the
> text on mobile browsers with the existing version is a bit of a
> nuisance, but so is scrolling to access the links in this rework).
> 
> And "different" is a bit of a problem, there are at least 7 associated
> websites which intentionally have the same basic design, which now
> no longer match up.
> 
> (I found v1 a lot worse than the existing one, mostly due to overriding
> browser default font/colour choices and disabling underlining for links).

As someone using the current website both on desktop and phone, the
only thing that has ever sprung to mind as a possible improvement would
be to constrain the line length, as I often have to tighten the window a
bit (interestingly, a good line length tends to be around 80
characters [1] and where have we heard that number before?). On
man.openbsd.org there is a fixed line length, just that it is a tiny
bit too wide for reading comfort.

[1]: https://practicaltypography.com/line-length.html

I honestly like the current design. It is functional and stands out
when so many other projects seem to have spent too much time on style
rather than substance.



Problem with nsd not being reloaded.

2023-08-12 Thread WATANABE Takeo
To Whom It May Concern

I am using nsd, which runs by default on OpenBSD 7.2 amd64.
To update the zone file after changes have been made.

# rcctl reload nsd

would result in

nsd(failed)

and cannot be updated.

As far as I could find, restarting the host seems to be
the only way to update the zone information.

How can I use the rcctl command to reload the zo information,
as I am having trouble dealing with this?

-
# more rc.conf.local

nsd_flags=
smtpd_flags=NO
sshd_flags=NO
unbound_flags=


Yours faithfully,

---
WATANABE, Takeo
t...@kasaneiro.jp




Re: Problem with nsd not being reloaded.

2023-08-12 Thread Pontus Stenetorp
On Sat 12 Aug 2023, WATANABE Takeo wrote:
> 
> I am using nsd, which runs by default on OpenBSD 7.2 amd64.
> To update the zone file after changes have been made.
> 
> # rcctl reload nsd
> 
> would result in
> 
> nsd(failed)
> 
> and cannot be updated.
> 
> As far as I could find, restarting the host seems to be
> the only way to update the zone information.
> 
> How can I use the rcctl command to reload the zo information,
> as I am having trouble dealing with this?
> 
> -
> # more rc.conf.local
> 
> nsd_flags=
> smtpd_flags=NO
> sshd_flags=NO
> unbound_flags=

No solution, but I am experiencing the same issue on OpenBSD 7.3. You
do not need a restart though, you can just dig out the NSD PIDs with
grep(1) and ps(1); then pass them to kill(1) and then use rcctl(8). Not
pretty, but it works as I have not had the time to dig into what the
underlying problem is.

etc/rc.conf.local:

nsd_flags=

var/nsd/etc/nsd.conf:

server:
hide-version: yes
verbosity: 1
database: ""

remote-control:
control-enable: yes
control-interface: /var/run/nsd.sock

---8<---



Re: Problem with nsd not being reloaded.

2023-08-12 Thread Stuart Henderson
On 2023-08-12, Pontus Stenetorp  wrote:
> On Sat 12 Aug 2023, WATANABE Takeo wrote:
>> 
>> I am using nsd, which runs by default on OpenBSD 7.2 amd64.
>> To update the zone file after changes have been made.
>> 
>> # rcctl reload nsd
>> 
>> would result in
>> 
>> nsd(failed)
>> 
>> and cannot be updated.
>> 
>> As far as I could find, restarting the host seems to be
>> the only way to update the zone information.
>> 
>> How can I use the rcctl command to reload the zo information,
>> as I am having trouble dealing with this?
>> 
>> -
>> # more rc.conf.local
>> 
>> nsd_flags=
>> smtpd_flags=NO
>> sshd_flags=NO
>> unbound_flags=
>
> No solution, but I am experiencing the same issue on OpenBSD 7.3. You
> do not need a restart though, you can just dig out the NSD PIDs with
> grep(1) and ps(1); then pass them to kill(1) and then use rcctl(8). Not
> pretty, but it works as I have not had the time to dig into what the
> underlying problem is.
>
> etc/rc.conf.local:
>
>   nsd_flags=
>
> var/nsd/etc/nsd.conf:
>
>   server:
>   hide-version: yes
>   verbosity: 1
>   database: ""
>
>   remote-control:
>   control-enable: yes
>   control-interface: /var/run/nsd.sock
>
>   ---8<---
>
>

No problems here with "rcctl reload nsd" on 7.3 or 2-week-old -current,
though typically I use "nsd-control reload " after a change.

Any clues from rcctl -d reload nsd? Anything relevant in logs? If not
try bumping up the detail level e.g. "verbosity: 3" 

-- 
Please keep replies on the mailing list.



Re: Problem with nsd not being reloaded.

2023-08-12 Thread Christian Weisgerber
WATANABE Takeo:

> I am using nsd, which runs by default on OpenBSD 7.2 amd64.
> To update the zone file after changes have been made.
> 
> As far as I could find, restarting the host seems to be
> the only way to update the zone information.

nsd-control(8)

-- 
Christian "naddy" Weisgerber  na...@mips.inka.de



Re: Feedback on redesigned OpenBSD.org

2023-08-12 Thread Chris Bennett
On Sat, Aug 12, 2023 at 07:21:24PM +0900, Pontus Stenetorp wrote:
> On Sat 12 Aug 2023, Stuart Henderson wrote:
> >
> > To me, it looks just "different" rather than particularly better
> > (except on mobile browsers, where I find the redesigned one a bit worse
> > by having the links hidden away down the bottom. Scrolling to read the
> > text on mobile browsers with the existing version is a bit of a
> > nuisance, but so is scrolling to access the links in this rework).
> > 
> > And "different" is a bit of a problem, there are at least 7 associated
> > websites which intentionally have the same basic design, which now
> > no longer match up.
> > 
> > (I found v1 a lot worse than the existing one, mostly due to overriding
> > browser default font/colour choices and disabling underlining for links).
> 
> As someone using the current website both on desktop and phone, the
> only thing that has ever sprung to mind as a possible improvement would
> be to constrain the line length, as I often have to tighten the window a
> bit (interestingly, a good line length tends to be around 80
> characters [1] and where have we heard that number before?). On
> man.openbsd.org there is a fixed line length, just that it is a tiny
> bit too wide for reading comfort.
> 

I have always found that 72 characters is a bit better than 80.
In CSS, that would be 72ch. Versus 80ch.

I often adjust the width of the window my browser is in to control that
width, assuming the website doesn't fight me and force horizontal
scrolling. I have key bindings on fvwm2/3 to do that.

But definitely add the viewport to the head. Nothing bad can happen with
that and FWIW, it bumps up OpenBSD in many searching algorithms
(assuming that that is desirable).

-- 
Chris Bennett



Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-12 Thread SOUBHEEK NATH
Dear OpenBSD Mailing List Community,

I hope this email finds you well. I am writing to seek your expertise
and guidance regarding a Wireguard VPN configuration and pf rules on my
OpenBSD 7.3 system. I have successfully set up a Wireguard VPN using
the provided interface configuration, and the VPN is operational as
intended. However, I have encountered a challenge while attempting to
implement pf rules to restrict access to SSH login and port number 80
based on specific IP addresses.

Below is the pf rule settings I have applied:

set skip on lo
block return# block stateless traffic
pass# establish keep-state

# By default, do not permit remote connections to X11
block return in on ! lo0 proto tcp to port 6000:6010

# Port build user does not need network
block return in quick on bwfm0 proto tcp from ! 192.168.0.229 to bwfm0
port ssh
block return in quick on wg0 proto udp from ! 10.0.8.2 to wg0 port 80
block return in quick on bwfm0 proto tcp from ! 192.168.0.229 to bwfm0
port 80
block return out log proto {tcp udp} user _pbuild

pass in on egress proto tcp from any to any port 22

pass out on egress inet from (wg0:network) nat-to (bwfm0:0)

The objective of these rules is to restrict SSH login and access to port
80 exclusively for the machine with the IP address 192.168.0.229 when
the OpenBSD system is connected to the bwfm0 network interface. While
the rule for SSH login and IP address 192.168.0.229 is functioning as
expected, I have encountered an issue with the rule pertaining to port
80 and IP address 10.0.8.2, which is allocated by Wireguard (wg0)
during active Wireguard connections.

The problem arises when attempting to enforce the restriction on port 80
with IP address 10.0.8.2. Despite the pf rule in place, it seems that
Wireguard is overriding the restriction. For instance, devices with
assigned IP addresses such as 10.0.8.3 or 10.0.8.4, which are within
the Wireguard network, can access both SSH login and port 80, contrary
to the intended restriction.

I am providing the Wireguard configuration below for your reference:

[Interface]
ListenPort = 51820
PrivateKey = oPernzzF+Kl499z2TMU6wDdrDpnDN6/e630Q=

[Peer]
PublicKey = yyhY5Blx+PxCHu/wK7QgrXHQ34RmTi//zynVA=
AllowedIPs = 10.0.8.2/32
PersistentKeepalive = 25

[Peer]
PublicKey = dQO6ACctkgepDtWxGrHuGFdvaO9qfrL4mmjA=
AllowedIPs = 10.0.8.3/32
PersistentKeepalive = 25

I would greatly appreciate your insights, suggestions, and expertise in
resolving this issue. Your assistance will be invaluable in helping me
achieve the desired access restrictions while maintaining the
functionality of the Wireguard VPN.

Thank you for your time and consideration.
--
Soubheek Nath
Fifth Estate
Kolkata, India
soubheekn...@gmail.com



Re: Pausing/Freezing issues with Protectli FW4B

2023-08-12 Thread Daniel Ouellet

On 8/11/23 7:06 PM, Tim Baumgard wrote:

On Fri, Aug 11, 2023 at 5:56 PM Stuart Henderson
 wrote:


On 2023-08-11, Tim Baumgard  wrote:

I'm having an issue with my Protectli FW4B that's become more of a
problem lately. Essentially, it's the same thing that this person [0]
encountered.


IIRC those are the machines that have problems if there's no display connected


I put in a dummy HDMI plug from another piece of tricky hardware, and
that seems to have fixed it. 200 pings and not a single spike over
1 ms. Thanks!


For what ever it's worth, I did order my ProtectLi like 6 months ago and 
yes it is not the FW4B, but the VP2420.


But the first thing I did on this, is the REQUEST Core Boot, NOT the 
"vendor American Megatrends Inc. version "5.11" date 06/18/2021" one.


FYI. There is an update BIOS available for this. Your not running the 
latest one. Last release was "August 31, 2021"


https://kb.protectli.com/kb/bios-versions-for-the-vault/?seq_no=2

Not saying it would fix your problem, but I had issue with BIOS on 
SuperMicro servers that didn't load bios after the date was later the 
2020 or something and had the hardest time to upgrade the BIOS and after 
that I swear to myself to NEVER use ANY servers or computers that do not 
have core boot or support it.


I never look back.

May be this might fix your problem too. I do not know for sure.

Just my $0.02 worst for that ever it is.

Daniel



Re: Feedback on redesigned OpenBSD.org

2023-08-12 Thread Wolfgang Pfeiffer



On Fri, Aug 11, 2023 at 10:38:46PM -0400, Amelia A Lewis wrote:

On Fri, 11 Aug 2023 20:11:02 -0600, Theo de Raadt wrote:

When did it become an assumption that we would adopt any of these
changes?


I don't think that it did become an assumption, but as a number of
people have responded to the initial design, to the point that the
designer offered a revision, I thought I might add to the discussion. I
apologize if it was out place to do so.


The debate - since three days now - strongly suggests, that at least
some of those contributing to the debate were assuming that a change
of the looks of openbsd.org might be accepted. Otherwise: what sense
would it make to debate it here?

The point tho seems: there were at least two threads over the last 11
years on that topic:

2012:
"OpenBSD's webpage desing"
https://marc.info/?l=openbsd-misc&w=2&r=4&s=desing+webpage&q=b

2016:
"Suggestion: new webpage for openbsd.org"
https://marc.info/?t=14634695033&r=2&w=2

Result:
Just compare the archived version of the site from 2011 to the
present one:
https://web.archive.org/web/20111223000626/http://www.openbsd.org/

So to make sure my effort is making sense: what I most certainly would
have done before working on a redesign of the current page would have
been to ask its maintainers, whether they wanted the change. And if
yes: what sort of change. Because obviously it's, well: their page.
Not mine. Plus: they probably have specific needs that I don't know
about for the coding of it, to make it compatible with the frequent
changes of it: updates, announcement of patches etc. - Meaning: Before
doing any attempt to rewrite the code, I would have asked the
current maintainers about the constraints for a change.

Theo de Raadt about a rewrite of openbsd.org in 2016:

--
https://marc.info/?l=openbsd-misc&m=146378604413389&w=2

"We rarely do whole-scale replacements of anything in OpenBSD, unless
there is compelling reason the old should be discarded.  I have
probably received 500+ proposals for website rewrites, a handful with
the effort already expended.  This is another offer which will be
rejected.  It is kind of sad.

I think the site is fine. [ ... ]  I agree there would be value in
small tweaks to improve the view for narrow displays.

This is a project that does rapid incremental changes.  This entire
concept of throw-it-away, you-want-the-new-warts; I don't get where
it comes from."

--

Nice weekend, everyone!



Re: Virtio fix for testing

2023-08-12 Thread Greg Steuck
Andrew Cagney  writes:

> Ref: https://marc.info/?l=openbsd-tech&m=168458764424059&w=2
> https://marc.info/?l=openbsd-misc&m=168071258109433&w=2

I see you found a similar issue and even a fix, good job. I believe
misc@ is a better place for such questions, so I'm cc'ing that.

> Is there a way to get an updated ISO or kernel with the fix?

Have you tried a snapshot? They are produced pretty regularly. The
project only has resource for the releases and snapshots. So if
you need a build with a back port, you are likely in the best
position to do that.

Thanks
Greg



fyi: ftp.openbsd.org: download connection breaks over slow lines

2023-08-12 Thread Steffen Nurpmeso
Hello.

'Appeared as forceful breaks, ie, there were no seconds without
any activity, but real breaks from now to then.
Just in case anyone feels the desire to look and tune, or
whatever.

  -rw-rw  1 ports ports461016 Aug 12 19:05 openssh-9.4p1.tar.gz.partial
  $ curl --continue-at - --compressed -O 
https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-9.4p1.tar.gz
% Total% Received % Xferd  Average Speed   TimeTime Time  
Current
   Dload  Upload   Total   SpentLeft  Speed
   24 1801k   24  448k0 0   7226  0  0:04:15  0:01:03  0:03:12  8000
  curl: (18) transfer closed with 1386342 bytes remaining to read
  $ curl --continue-at - --compressed -O 
https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-9.4p1.tar.gz
  ** Resuming transfer from byte position 458752
% Total% Received % Xferd  Average Speed   TimeTime Time  
Current
   Dload  Upload   Total   SpentLeft  Speed
   33 1353k   33  448k0 0   7283  0  0:03:10  0:01:02  0:02:08  8000
  curl: (18) transfer closed with 927590 bytes remaining to read
  $ curl --continue-at - --compressed -O 
https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-9.4p1.tar.gz
  ** Resuming transfer from byte position 917504
% Total% Received % Xferd  Average Speed   TimeTime Time  
Current
   Dload  Upload   Total   SpentLeft  Speed
   49  905k   49  448k0 0   7171  0  0:02:09  0:01:03  0:01:06  4000
  curl: (18) transfer closed with 468838 bytes remaining to read
  $ curl --continue-at - --compressed -O 
https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-9.4p1.tar.gz
  ** Resuming transfer from byte position 1376256
% Total% Received % Xferd  Average Speed   TimeTime Time  
Current
   Dload  Upload   Total   SpentLeft  Speed
   97  457k   97  448k0 0   7146  0  0:01:05  0:01:04  0:00:01  9364
  curl: (18) transfer closed with 10086 bytes remaining to read
  $ curl ipv4.icanhazip.com
  217.144.132.164
  $ curl --continue-at - --compressed -O 
https://ftp.openbsd.org/pub/OpenBSD/OpenSSH/portable/openssh-9.4p1.tar.gz
  ** Resuming transfer from byte position 1835008
% Total% Received % Xferd  Average Speed   TimeTime Time  
Current
   Dload  Upload   Total   SpentLeft  Speed
  100 10086  100 100860 0   9417  0  0:00:01  0:00:01 --:--:--  9426
  $ ll openssh-9.*
  -rw-rw 1 ports ports 1835850 Jul 19 23:22 openssh-9.3p2.tar.gz
  -rw-rw 1 ports ports  461016 Aug 12 19:05 openssh-9.4p1.tar.gz.partial
  -rw-rw 1 ports ports 1845094 Aug 12 19:12 openssh-9.4p1.tar.gz
  $ rm openssh-9.4p1.tar.gz.partial

Thanks and Ciao!

--steffen
|
|Der Kragenbaer,The moon bear,
|der holt sich munter   he cheerfully and one by one
|einen nach dem anderen runter  wa.ks himself off
|(By Robert Gernhardt)



Re: Feedback on redesigned OpenBSD.org

2023-08-12 Thread Chris Bennett
On Sat, Aug 12, 2023 at 06:23:07PM +0200, Wolfgang Pfeiffer wrote:
> 
> On Fri, Aug 11, 2023 at 10:38:46PM -0400, Amelia A Lewis wrote:
> > On Fri, 11 Aug 2023 20:11:02 -0600, Theo de Raadt wrote:
> > > When did it become an assumption that we would adopt any of these
> > > changes?
> > 
> > I don't think that it did become an assumption, but as a number of
> > people have responded to the initial design, to the point that the
> > designer offered a revision, I thought I might add to the discussion. I
> > apologize if it was out place to do so.
> 
> The debate - since three days now - strongly suggests, that at least
> some of those contributing to the debate were assuming that a change
> of the looks of openbsd.org might be accepted. Otherwise: what sense
> would it make to debate it here?
> 
> The point tho seems: there were at least two threads over the last 11
> years on that topic:
> 
> 2012:
> "OpenBSD's webpage desing"
> https://marc.info/?l=openbsd-misc&w=2&r=4&s=desing+webpage&q=b
> 
> 2016:
> "Suggestion: new webpage for openbsd.org"
> https://marc.info/?t=14634695033&r=2&w=2
> 
> Result:
> Just compare the archived version of the site from 2011 to the
> present one:
> https://web.archive.org/web/20111223000626/http://www.openbsd.org/
> 
> So to make sure my effort is making sense: what I most certainly would
> have done before working on a redesign of the current page would have
> been to ask its maintainers, whether they wanted the change. And if
> yes: what sort of change. Because obviously it's, well: their page.
> Not mine. Plus: they probably have specific needs that I don't know
> about for the coding of it, to make it compatible with the frequent
> changes of it: updates, announcement of patches etc. - Meaning: Before
> doing any attempt to rewrite the code, I would have asked the
> current maintainers about the constraints for a change.
> 
> Theo de Raadt about a rewrite of openbsd.org in 2016:
> 
> --
> https://marc.info/?l=openbsd-misc&m=146378604413389&w=2
> 
> "We rarely do whole-scale replacements of anything in OpenBSD, unless
> there is compelling reason the old should be discarded.  I have
> probably received 500+ proposals for website rewrites, a handful with
> the effort already expended.  This is another offer which will be
> rejected.  It is kind of sad.
> 
> I think the site is fine. [ ... ]  I agree there would be value in
> small tweaks to improve the view for narrow displays.
> 
> This is a project that does rapid incremental changes.  This entire
> concept of throw-it-away, you-want-the-new-warts; I don't get where
> it comes from."
> 
> --
> 
> Nice weekend, everyone!
> 

>From what I am reading in this thread, nobody seems to agree about what
they really want. I think that that is a pretty good sign that a
consensus is not going to happen.

openbsd.org is on CVS.
OpenBSD comes with a built-in httpd.
As long as it's not publicly available, anyone can run a copy and insert
whatever CSS meets their needs.
The current website version can be updated from CVS.
Just change the stylesheet link to whatever your favorite styling looks
like and you are good.
If you don't know how to write CSS, learn it. What doesn't require
learning something new to use or contribute to OpenBSD? Nothing.

That is my opinion. I definitely do not get a vote, especially since I
have never even submitted a diff for the website.

Unless I am using my phone, I give it a 50% chance that I will be using
a text browser to view the site. I use lynx 100% to look at the packages
and installation files. It just works.

-- 
Chris Bennett



Re: [cpb_m...@bennettconstruction.us: I would like help matching my outgoing domains to the right IP for smtpd]

2023-08-12 Thread Chris Bennett
It's the weekend. I will see if anyone has any advice later.

I will spend my time looking at perhaps solving the problem with a
filter and using tcpdump and the debug features of smtpd to follow what
I come up with.

-- 
Chris Bennett



My /usr cleaning campaign..

2023-08-12 Thread Daniele B.


Hello,

Do not panic, I do not want to erase you, users of OpenBSD.. 
In prevision of my next sysupgrade I just found myself in the need to
free up space from /usr where I just remain with 2.1gb free.. Indeed I
feel these gb few although, I know, requirement is 1.1gb of free space
for a successful upgrade. Almost this is what OpenBSD says to myself..

I already used "sysclean" to check stuff but without much (space) luck..

I found instead /usr/share/relink/kernel/GENERIC.MP (636M) that is good
to not have, eventually. Is it safe to move away or erase it?

Any other suggestion for my /usr cleaning campaign? ;D

Thanks!

-- Daniele Bonini



Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-12 Thread lain.
First off, unless you faked your private and public keys, please change
them as soon as possible.
You've just made yourself volunerable to cyber attacks!

If I understand you correctly, you want to be able to SSH and HTTP only
over WireGuard, right?
In that case, on your WireGuard server:

# Block access to SSH and HTTP from everyone except for your WireGuard network
pass in quick on wg0 proto tcp from 10.0.8.0/24 to any port {22, 80}
block in quick on egress proto tcp from any to any port {22, 80}

>From your specifications, it's not quite clear whether your network is
accessible from the outside or not, whether you're using a dynamic IP or
static IP, how your router is configured, and all else, because
requirements change depending on these details.
If you're using a dynamic IP, and both your server and clienbts are
within the same network, there's a good chance that this setup is
unnecessary, given that using a WireGuard VPN makes sense if the server
is remote and normally accessible from the outside, and you want to make
it only accessible from the inside.

As for your WireGuard config, you might want to add the Address to your
"[Interface]" block like this for example:
Address = 10.0.8.1/24

Not necessarily required to get it working, but would still add an extra
layer of security if you generate a preshared key on each peer, then on
both your server and peers:
[Peer]
...
PreSharedKey = (output)
...

To generate the preshared key (only do this on your peers):
wg genpsk > preshared.key

On 2023年08月12日 20:30, SOUBHEEK NATH wrote:
> Dear OpenBSD Mailing List Community,
> 
> I hope this email finds you well. I am writing to seek your expertise
> and guidance regarding a Wireguard VPN configuration and pf rules on my
> OpenBSD 7.3 system. I have successfully set up a Wireguard VPN using
> the provided interface configuration, and the VPN is operational as
> intended. However, I have encountered a challenge while attempting to
> implement pf rules to restrict access to SSH login and port number 80
> based on specific IP addresses.
> 
> Below is the pf rule settings I have applied:
> 
> set skip on lo
> block return# block stateless traffic
> pass# establish keep-state
> 
> # By default, do not permit remote connections to X11
> block return in on ! lo0 proto tcp to port 6000:6010
> 
> # Port build user does not need network
> block return in quick on bwfm0 proto tcp from ! 192.168.0.229 to bwfm0
> port ssh
> block return in quick on wg0 proto udp from ! 10.0.8.2 to wg0 port 80
> block return in quick on bwfm0 proto tcp from ! 192.168.0.229 to bwfm0
> port 80
> block return out log proto {tcp udp} user _pbuild
> 
> pass in on egress proto tcp from any to any port 22
> 
> pass out on egress inet from (wg0:network) nat-to (bwfm0:0)
> 
> The objective of these rules is to restrict SSH login and access to port
> 80 exclusively for the machine with the IP address 192.168.0.229 when
> the OpenBSD system is connected to the bwfm0 network interface. While
> the rule for SSH login and IP address 192.168.0.229 is functioning as
> expected, I have encountered an issue with the rule pertaining to port
> 80 and IP address 10.0.8.2, which is allocated by Wireguard (wg0)
> during active Wireguard connections.
> 
> The problem arises when attempting to enforce the restriction on port 80
> with IP address 10.0.8.2. Despite the pf rule in place, it seems that
> Wireguard is overriding the restriction. For instance, devices with
> assigned IP addresses such as 10.0.8.3 or 10.0.8.4, which are within
> the Wireguard network, can access both SSH login and port 80, contrary
> to the intended restriction.
> 
> I am providing the Wireguard configuration below for your reference:
> 
> [Interface]
> ListenPort = 51820
> PrivateKey = oPernzzF+Kl499z2TMU6wDdrDpnDN6/e630Q=
> 
> [Peer]
> PublicKey = yyhY5Blx+PxCHu/wK7QgrXHQ34RmTi//zynVA=
> AllowedIPs = 10.0.8.2/32
> PersistentKeepalive = 25
> 
> [Peer]
> PublicKey = dQO6ACctkgepDtWxGrHuGFdvaO9qfrL4mmjA=
> AllowedIPs = 10.0.8.3/32
> PersistentKeepalive = 25
> 
> I would greatly appreciate your insights, suggestions, and expertise in
> resolving this issue. Your assistance will be invaluable in helping me
> achieve the desired access restrictions while maintaining the
> functionality of the Wireguard VPN.
> 
> Thank you for your time and consideration.
> --
> Soubheek Nath
> Fifth Estate
> Kolkata, India
> soubheekn...@gmail.com
> 

-- 
lain.

Did you know that?
90% of all emails sent on a daily basis are being sent in plain text, and it's 
super easy to intercept emails as they flow over the internet?
Never send passwords, tokens, personal information, or other volunerable 
information without proper PGP encryption!

If you're writing your emails unencrypted, please consider sending PGP 
encrypted emails for security reasons.
You can find my PGP public key at: https://fair.moe/lain.asc

Every good email client is able to send encrypted emails.
If yours can't, then you shoul

Re: Assistance Needed with Wireguard VPN Configuration and pf Rules on OpenBSD 7.3

2023-08-12 Thread lain.
I failed to come up with reasons for using a preshared key, so I've let
ChatGPT generate reasons for me:

Certainly! WireGuard's use of a preshared key (PSK) adds an additional layer of 
symmetric encryption to the standard asymmetric encryption. Here's a brief 
explanation of the advantage:

1. **Symmetric vs. Asymmetric Encryption**: WireGuard primarily uses asymmetric 
encryption, where each party has a pair of keys (public and private). Symmetric 
encryption, on the other hand, utilizes the same key for both encryption and 
decryption. By adding a PSK, WireGuard incorporates both types of encryption.

2. **Additional Security Layer**: The PSK is mixed into the encryption process 
along with the standard public and private keys. Even if an attacker could 
somehow compromise the asymmetric part (though practically very difficult), 
they would still need the PSK to decrypt the communication.

3. **Protection Against Quantum Attacks**: Though still theoretical at this 
point, quantum computers could eventually break the Diffie-Hellman key exchange 
used in many encryption protocols. By using a PSK, WireGuard adds protection 
against this potential future vulnerability.

4. **Simplicity**: WireGuard's design is intended to be simple and easy to 
implement. The use of a PSK aligns with this philosophy by providing a 
straightforward way to bolster security.

Here's an example of how you would generate and implement a preshared key in 
WireGuard:

Generate the PSK:
```bash
wg genpsk
```

You would then add the generated key to both the client and server 
configurations:

Server's `wg0.conf`:
```ini
[Peer]
PublicKey = CLIENT_PUBLIC_KEY
PresharedKey = GENERATED_PRESHARED_KEY
AllowedIPs = CLIENT_IP/32
```

Client's `wg0.conf`:
```ini
[Peer]
PublicKey = SERVER_PUBLIC_KEY
PresharedKey = GENERATED_PRESHARED_KEY
AllowedIPs = 0.0.0.0/0
Endpoint = SERVER_IP:PORT
```

In summary, adding a PSK provides an extra layer of security that complements 
the existing asymmetric encryption, protects against potential quantum attacks, 
and adheres to WireGuard's principles of simplicity and effectiveness.

On 2023年08月13日 10:22, lain. wrote:
> First off, unless you faked your private and public keys, please change
> them as soon as possible.
> You've just made yourself volunerable to cyber attacks!
> 
> If I understand you correctly, you want to be able to SSH and HTTP only
> over WireGuard, right?
> In that case, on your WireGuard server:
> 
> # Block access to SSH and HTTP from everyone except for your WireGuard network
> pass in quick on wg0 proto tcp from 10.0.8.0/24 to any port {22, 80}
> block in quick on egress proto tcp from any to any port {22, 80}
> 
> From your specifications, it's not quite clear whether your network is
> accessible from the outside or not, whether you're using a dynamic IP or
> static IP, how your router is configured, and all else, because
> requirements change depending on these details.
> If you're using a dynamic IP, and both your server and clienbts are
> within the same network, there's a good chance that this setup is
> unnecessary, given that using a WireGuard VPN makes sense if the server
> is remote and normally accessible from the outside, and you want to make
> it only accessible from the inside.
> 
> As for your WireGuard config, you might want to add the Address to your
> "[Interface]" block like this for example:
> Address = 10.0.8.1/24
> 
> Not necessarily required to get it working, but would still add an extra
> layer of security if you generate a preshared key on each peer, then on
> both your server and peers:
> [Peer]
> ...
> PreSharedKey = (output)
> ...
> 
> To generate the preshared key (only do this on your peers):
> wg genpsk > preshared.key
> 
> On 2023年08月12日 20:30, SOUBHEEK NATH wrote:
> > Dear OpenBSD Mailing List Community,
> > 
> > I hope this email finds you well. I am writing to seek your expertise
> > and guidance regarding a Wireguard VPN configuration and pf rules on my
> > OpenBSD 7.3 system. I have successfully set up a Wireguard VPN using
> > the provided interface configuration, and the VPN is operational as
> > intended. However, I have encountered a challenge while attempting to
> > implement pf rules to restrict access to SSH login and port number 80
> > based on specific IP addresses.
> > 
> > Below is the pf rule settings I have applied:
> > 
> > set skip on lo
> > block return# block stateless traffic
> > pass# establish keep-state
> > 
> > # By default, do not permit remote connections to X11
> > block return in on ! lo0 proto tcp to port 6000:6010
> > 
> > # Port build user does not need network
> > block return in quick on bwfm0 proto tcp from ! 192.168.0.229 to bwfm0
> > port ssh
> > block return in quick on wg0 proto udp from ! 10.0.8.2 to wg0 port 80
> > block return in quick on bwfm0 proto tcp from ! 192.168.0.229 to bwfm0
> > port 80
> > block return out log proto {tcp udp} user _pbuild
> > 
> > pass in on egress proto tcp from any

Re: My /usr cleaning campaign..

2023-08-12 Thread Matthew Ernisse

On Sun, Aug 13, 2023 at 02:31:44AM +0200, Daniele B. said:

I found instead /usr/share/relink/kernel/GENERIC.MP (636M) that is good
to not have, eventually. Is it safe to move away or erase it?


Leave it alone.


Any other suggestion for my /usr cleaning campaign? ;D


You have sufficient free space to safely proceed with the upgrade.  Why 
potentially risk deleting something you don't understand?


I would suggest either:
- Proceed with the upgrade.
- Reinstall the system from scratch with a larger /usr.

--
Please direct replies to the list.



Re: My /usr cleaning campaign..

2023-08-12 Thread Daniele B.


Thanks for this one Matthew.

Looking further, I noticed..

- /usr/local/share/gtk-doc (=131MB), html doc completed of some vary
  .png files..  I guess this could be not only an endemic problem of my
  stick as gtk-doc is not installed here: I'm not in the need of GTK C
  code documentation
- /usr/local/share/doc (=118MB)

and..
- what about /usr/local/share/gir-1.0 (70M) ?

I'd like almost to delete ./gtk-doc and move ./doc to eg. /home/ (with
sensibly more space) with a link to among the toppings.. ;D


Matthew Ernisse  wrote:

> On Sun, Aug 13, 2023 at 02:31:44AM +0200, Daniele B. said:
> >I found instead /usr/share/relink/kernel/GENERIC.MP (636M) that is
> >good to not have, eventually. Is it safe to move away or erase it?  
> 
> Leave it alone.
> 
> >Any other suggestion for my /usr cleaning campaign? ;D  
> 
> You have sufficient free space to safely proceed with the upgrade.
> Why potentially risk deleting something you don't understand?
> 
> I would suggest either:
> - Proceed with the upgrade.
> - Reinstall the system from scratch with a larger /usr.


-- 
Daniele Bonini
‎‎Project Owner and Author‎
http://5mode.com
via Massimo Gorki 23
40128 splash.ooo/g/Bologna‎
Italy
+390514086280
+393314029415

--
This message is confidential, including all materials contained inside
or attached to this email, and intended only for the addressee. If you
have received this message in error, please delete it from your
systems. You are hereby notified that distribution or copying of its
content is strictly prohibited. For information about 5 Mode visit
http://5mode.com



Re: My /usr cleaning campaign..

2023-08-12 Thread Daniele B.


Thanks for this one Matthew.

Looking further, I noticed..

- /usr/local/share/gtk-doc (=131MB), html doc completed of some vary
  .png files..  I guess this could be not only an endemic problem of my
  stick as gtk-doc is not installed here: I'm not in the need of GTK C
  code documentation
- /usr/local/share/doc (=118MB)

and..
- what about /usr/local/share/gir-1.0 (70M) ?

I'd like almost to delete ./gtk-doc and move ./doc to eg. /home/ (with
sensibly more space) with a link to among the toppings.. ;D


-- Daniele Bonini


Matthew Ernisse  wrote:

> On Sun, Aug 13, 2023 at 02:31:44AM +0200, Daniele B. said:  
> >I found instead /usr/share/relink/kernel/GENERIC.MP (636M) that is
> >good to not have, eventually. Is it safe to move away or erase it?
> 
> Leave it alone.
>   
> >Any other suggestion for my /usr cleaning campaign? ;D
> 
> You have sufficient free space to safely proceed with the upgrade.
> Why potentially risk deleting something you don't understand?
> 
> I would suggest either:
> - Proceed with the upgrade.
> - Reinstall the system from scratch with a larger /usr.