vedetta

OpenBSD Router Boilerplate

Github星跟蹤圖

vedetta (alpha)

OpenBSD Router Boilerplate

Vedetta Logo

About

an opinionated, best practice, vanilla OpenBSD base configuration for bare-metal, or cloud routers

What would an OpenBSD router configured using examples from the OpenBSD FAQ and Manual pages look like?

Features

Share what you've got, keep what you need:

Sysadmin:

Hardware

OpenBSD likes small form factor, low-power, lots of ECC memory, AES-NI support, open source boot, and the fastest supported network cards. This configuration has been tested on APU2.

Install

Encryption is the easiest method for media sanitization and disposal. OpenBSD supports full disk encryption using a keydisk (e.g. a USB stick).

Partitions are important for security, stability, and integrity. A minimum partition layout example for router with (upgrade itself) binary base, and no packages (comfortable fit on flash memory cards/drives):, Filesystem, Mount, Size, :----------, :-----------, -------:, a, /, 512M, b, /swap, 1024M, d, /var, 512M, e, /var/log, 128M, f, /tmp, 1024M, g, /usr, 1024M, h, /usr/local, 64M, i, /home, 16M, Total, 4304M, ## SSL
It's best practice to create CAs on a single purpose secure machine, with no network access.

Specify which certificate authorities (CAs) are allowed to issue certificates for your domain, by adding DNS Certification Authority Authorization (CAA) Resource Record (RR) to var/nsd/zones/master/vedetta.lan.zone

Revoke certificates as often as possible.

SSH

SSH fingerprints verified by DNS is done by adding Secure Shell (Key) Fingerprint (SSHFP) Resource Record (RR) to var/nsd/zones/master/vedetta.lan.zone: ssh-keygen -r vedetta.lan.
Verify: dig -t SSHFP vedetta.lan
Usage: ssh -o "VerifyHostKeyDNS ask" acolyte.vedetta.lan

Manage keys with ssh-agent.

Detect tampered keyfiles or man in the middle attacks with ssh-keyscan.

Control access to local users with principals.

Firewall

Guests can use the DNS nameserver to access the ad-free web, while authenticated users gain desired permissions. It's best to authenticate an IP after connecting to VPN. There are three users in this one person scenario: one for wheel, one for sftp, and one for authpf.

Performance

Consider using mount_mfs in order to reduce wear and tear, as well as to speed up the system. Remember to set the sticky bit on mfs /tmp, see etc/fstab.

Caveats

  • VPN with IKEv2 or IKEv1, not both. While there are many tecnologies for VPN, only IKEv2 and IKEv1 are standard (considerable effort was put into testing and securing)
  • relayd does not support CRL, SNI, nor OCSP (yet)
  • httpd without custom error pages (can be patched)
  • 11n is max WiFi mode, is this enough?

Support

Via issues and #vedetta:matrix.org

Contribute

Want to help out? :star: Fork this repo :star:

主要指標

概覽
名稱與所有者vedetta-com/vedetta
主編程語言Shell
編程語言Shell (語言數: 3)
平台
許可證ISC License
所有者活动
創建於2017-06-12 20:43:58
推送於2019-07-29 14:30:42
最后一次提交2019-07-29 09:30:41
發布數5
最新版本名稱v6.3.0-alpha (發布於 )
第一版名稱v6.1.0-alpha (發布於 )
用户参与
星數297
關注者數29
派生數31
提交數449
已啟用問題?
問題數9
打開的問題數2
拉請求數174
打開的拉請求數0
關閉的拉請求數0
项目设置
已啟用Wiki?
已存檔?
是復刻?
已鎖定?
是鏡像?
是私有?