Posts with the tag openbsd:

dhcpleased, unwind and resolvd

dhcpleased is a new daemon in OpenBSD that will dynamically configure the client network. It monitors network interfaces for IP address proposals from DHCP, IPv6 router advertisements to configure the network and then sets the resolv.conf. unwind is a validating DNS resolver that runs on the client machine. resolvd handles the contents of /etc/resolv.conf. The 3 deamons effectively replace my dhclient and unbound set up and make the life much easier. For more details on the advantages of these daemons and what problem they solve, please read the man pages and reference links. Here I will give the configuration. Configuration We will first create a blocklist file that dictates which domains should be blocked by unwind.

Blocking ads with unbound

So you have set up a WireGuard VPN on the Raspbeery Pi and would like to block ads and trackers for all the connected clients on the network. This last part of the series will explain how to do it using unbound(8). Configuring unbound Unbound is already available by default in OpenBSD. By default it is chrooted to /var/unbound. The configuration file is located at /var/unbound/etc/unbound.conf. Here is what I have in unbound.conf. In the access control, I have included the vpn network 10.0.0.0/24 so that unbound can serve DNS on this network. The include statement will include blocklist file that contains all the domains we would like to block.

Setting up WireGuard on OpenBSD

In the previous post we installed OpenBSD on Raspberry Pi 4. If you have not already done, it is time to run syspatch and apply patches to the system. In this first part we will configure WireGuard VPN endpoint with a road warrior setup. As of 6.8, WireGuard is available natively on OpenBSD. We will only use tools available on the default install of OpenBSD. Setting up the server WireGuard works by exchanging public keys. Let us first create keypair for the server. We will use openssl rand command to generate a private key. We then create a wg(4) interface and use it to extract corresponding public key.

Installing OpenBSD to Raspberry Pi 4

This is a three part series where I will explain how I setup my Raspberry Pi4 as a Wireguard VPN server with ad blocking using Unbound. In this first part we will install OpenBSD to Raspberry Pi 4. I will assume you have a basic understading of installing and using OpenBSD. What do you need? A microSD card (only a small card is needed) A USB storage device where you will install the OS A USB to TTL serial cable USB wireless adapter that is supported by OpenBSD (Optional. Only needed if you don’t want to use the ethernet) A second USB storage to store the sets and wireless firmware.

Setting Up Failover Interface Using Trunk

Often times you want the convenience of seemlessly switching over from your wired connection to wireless connection and vice versa. This is where the trunk interface comes into picture. What is trunk trunk is a pseudo interface that allows aggregation of multiple network interfaces as one virtual trunk interface(man 4 trunk). Though trunk supports multiple protocols our focus here is on setting it up in failover mode. In the failover mode, the first interface added will be a master interface and any subsequent interfaces added will be failover interfaces. In this example, I will set up my ethernet interface em0 as master and wireless interface urtwn0 as a failover interface by adding them to trunk0.

Installing OpenBSD To USB Drive Using VirtualBox

You have installed OpenBSD on your MacBook but want to install on your USB drive for on the go usage. This procedure was tested using macOS Sierra. Installation is done using UEFI partition table and with full disk encryption. Note: The process may take much longer than the regular hard disk or VirtualBox install since we are writing to the disk directly from inside the VirtualBox. Before proceeding you will need A USB drive that can be formatted without worrying about the data Access to a machine with virtual box installed OpenBSD installer ISO file An optional USB wireless adapter.

How To Dual Boot OpenBSD With macOS

This blog outlines installation of OpenBSD 6.0 alongside macOS using the native boot loader. Pre-install Tasks First download a disk image of 64-bit OpenBSD installer(installXX.fs) from OpenBSD site and write it to a USB drive. $ sudo dd if=Downloads/install60.fs of=/dev/disk2 bs=1m Broadcom wireless chips used in MacBook lacks a driver in OpenBSD. I used TP-LINK TL-WN725N USB wireless adapter. Download the urtwn firmware from OpenBSD site Now we will mount the EFI partition and copy the firmware file downloaded to it. $ sudo mkdir /Volumes/efi $ sudo mount -t msdos /dev/disk0s1 /Volumes/efi $ sudo cp urtwn-firmware-1.2.tgz /Volumes/efi/ Now we will create two HFS partitions using the Disk Utility application in macOS.