Re: Secure end points for Internet tunnel, the most secure hardware

2020-05-12 Thread info
>That is a kernel level issue, not an SOC level one.

Well, I have ordered a couple of Orange PI ONE.

According to: http://philip.xinqu.net/orangepi.html

it shall work on OpenBSD at least without a video port.

Good features for my use case:

1) No video port means anyone non qualified enough cannot quickly boot and 
trojan it without a serial port.

2) This card is missing a WIFI which is good IMHO to avoid wireless exploits.

3) Small boot ROM, no other BLOBs like in Raspberry PI, and its BROM cannot be 
reflashed silently by someone while I am absent from home.

4) Its CPU is free of Spectre issues

5) Very cheap - used one costed me about 500 rub = $6.66 - already tested and 
includes a heat sink and a case :)


The last question is how to deal with Nitrokey on OpenBSD, especially on the 
server side for keeping private key of the daemon.

Anyone worked with Nitrokey on OpenBSD using ssh-pkcs11-helper?

https://support.nitrokey.com/t/can-nitrokey-pro2-be-used-in-openbsd-with-ssh-and-gpg/2347/3

> In generic: you don’t need OpenSC to use gpg or ssh on *BSD. E.g. 
> “ssh-pkcs11-helper first appeared in OpenBSD 4.7” which will make the 
> connection to your token. Also gpg brings there own ssh/token agent in the 
> package.

Will it work on OpenBSD server for SSHD daemon ?



Re: Secure end points for Internet tunnel, the most secure hardware

2020-05-12 Thread Aaron Mason
On Tue, May 12, 2020 at 1:27 PM  wrote:
>
> Aaron, thank you for your suggestion.
>
> For now I prefer to try to use the oldest suitable hardware I can find, not 
> sure if it is a good idea.
>

YMMV. Don't fall into the sunk cost fallacy.

> Please someone let me know if AllWinner SoC backdoor described at:
>
> https://www.theregister.co.uk/2016/05/09/allwinners_allloser_custom_kernel_has_a_nasty_root_backdoor/
>
> can be exploited in OpenBSD?
>

That is a kernel level issue, not an SOC level one.

https://github.com/friendlyarm/h3_lichee/blob/master/linux-3.4/arch/arm/mach-sunxi/sunxi-debug.c

Anyone who suggested this be put in OpenBSD's kernel would likely
receive a visit from Theo brandishing a flamethrower fuelled by
Substance N to melt their PC, house, land, self.

> Is it a bad idea to run a small communication server on a AllWinner A20 board 
> like a Cubitruck if it works with OpenBSD (it is not on the list though). 
> What about other compatible boards like AllWinner A10 Orange PI One?
>

If it isn't on the list, it either isn't supported or hasn't been
tested.  If you have the hardware on hand, it never hurts to try the
latest snap and send a dmesg to the the openbsd-arm mailing list so
they can update their docs or get an idea of what's missing.

> I just want my DNS (local) and postfix, dovecot (Internet)  and SSH (local 
> and Internet) work on it protected from hackers.

Running OpenBSD and spamd on your router and any non-internet facing
services on other systems behind it, and not making silly decisions
like password based root logins (or any login for that matter) and
employing a default permit policy on your firewall are a good start.
Anything else is service-specific.

-- 
Aaron Mason - Programmer, open source addict
I've taken my software vows - for beta or for worse



Fwd: Secure end points for Internet tunnel, the most secure hardware

2020-05-12 Thread info
Dear OpenBSD gurus,

Please suggest which one of the following types of CPU and preferably the whole 
system too  is the most secure and backdoor free:

ARM, PowerPC, SPARC64, SH-4, MIPS

Can you please suggest a specific model of the board compatible with OpenBSD?

 Пересылаемое сообщение 
11.05.2020, 09:14, i...@aulix.com:

> I need a secure dedicated textual SSH console connected to Internet at home - 
> Console1
> and preferably a two ports router on another end of the Internet line to 
> accept my SSH connections - Router1.

> 
> What is the most secure hardware (which was sold in public shops) for 
> Console1 and Router1 ?
> 
> Can you offer anything better than Cortex A7 board which is immune to Spectre 
> like issues?
> What is the most secure Cortex A7 board on which OpenBSD can run? I guess it 
> shall have as little BLOBs as possible - only a small Boot ROM like 
> Beaglebone Black which unfortunately is not Cortex A7, but rather Cortex A8.



Re: Secure end points for Internet tunnel, the most secure hardware

2020-05-11 Thread info
> What about other compatible boards like AllWinner A10 Orange PI One?

Sorry for my mistake, Orange PI One is based on Cortex A7 AllWinner H3.



Re: Secure end points for Internet tunnel, the most secure hardware

2020-05-11 Thread info
Aaron, thank you for your suggestion. 

For now I prefer to try to use the oldest suitable hardware I can find, not 
sure if it is a good idea.

Please someone let me know if AllWinner SoC backdoor described at:

https://www.theregister.co.uk/2016/05/09/allwinners_allloser_custom_kernel_has_a_nasty_root_backdoor/

can be exploited in OpenBSD? 

Is it a bad idea to run a small communication server on a AllWinner A20 board 
like a Cubitruck if it works with OpenBSD (it is not on the list though). What 
about other compatible boards like AllWinner A10 Orange PI One?

I just want my DNS (local) and postfix, dovecot (Internet)  and SSH (local and 
Internet) work on it protected from hackers.



Re: Secure end points for Internet tunnel, the most secure hardware

2020-05-11 Thread Aaron Mason
On Mon, May 11, 2020 at 5:16 PM  wrote:
>
> Hi,

Hi!

>
> [SNIP]
>
> Can you offer anything better than Cortex A7 board which is immune to Spectre?
> What is the most secure Cortex A7 board on which OpenBSD can run? I guess it 
> shall have as little BLOBs as possible - only a small Boot ROM like 
> Beaglebone Black which unfortunately is not Cortex A7, but rather Cortex A8.
>

The Pine A64 (US$15 for the 512mb version or US$21 for the 1GB plus
version) and the Rock64 (US$24.95 for the 1GB version) that both use a
Cortex-A53 CPU that is immune to Spectre, can't speak to the
blobbiness, though.

-- 
Aaron Mason - Programmer, open source addict
I've taken my software vows - for beta or for worse



Secure end points for Internet tunnel, the most secure hardware

2020-05-11 Thread info
Hi,

Please let me know, is it a good idea to use OpenBSD to connect to a remote LAN 
via SSH? Port forwarding is enough for me, though I can pass-through OpenVPN 
via SSH forward too.
SSH seems to me as the most secure channel compare to other software and it is 
easy to get it working.

I need a secure dedicated textual SSH console connected to Internet at home - 
Console1
and preferably a two ports router  on another end of the Internet line to 
accept my SSH connections - Router1.

What are the best methods to keep private keys in a safe place? I do not know 
anything better than devices like Nitrokey Pro, though some PCI card (secure 
java card) reader devices exist too.

Can OpenBSD use USB dongle (not a flash drive) Nitrokey Pro 2 to store SSH 
private keys BOTH on the server side and on the client side? One first dongle 
on the client and another second dongle on the server - two dongles in total :)

What is the most secure hardware (which was sold in public shops) for Console1 
and Router1 ?

Can you offer anything better than Cortex A7 board which is immune to Spectre?
What is the most secure Cortex A7 board on which OpenBSD can run? I guess it 
shall have as little BLOBs as possible - only a small Boot ROM like Beaglebone 
Black which unfortunately is not Cortex A7, but rather Cortex A8.