1
0
Fork 0
machines/content/posts/vidhyaalakshmi.md

426 lines
10 KiB
Markdown
Raw Permalink Normal View History

---
2022-09-12 21:19:42 +05:30
title: "Setup vidhyaalakshmi (Router)"
date: 2022-07-23T08:00:40+05:30
draft: false
toc: true
---
# Debian
2022-09-12 21:15:13 +05:30
## Basic setup
2022-09-12 21:15:13 +05:30
### Set hostname
2022-09-12 21:15:13 +05:30
```bash
2022-09-12 21:19:42 +05:30
sudo hostnamectl set-hostname vidhyalakshmi
2022-09-12 21:15:13 +05:30
```
### Set timezone
```bash
sudo timedatectl set-timezone Asia/Kolkata
```
---
## Networking setup
### If you use PPPoE
This hasn't been tested... RTFM :)
```bash
INTERFACE=
USERNAME=
PASSWORD=
sudo nmcli connection add type pppoe ${INTERFACE} ${USERNAME} ${PASSWORD} 802-3-ethernet.mtu 1452
```
### Static IP
#### IPv4
```bash
NETWORK_CONNECTION=$(nmcli -g name,device connection show | grep 'enp\|eth' | cut -f1 -d":" | head -n 1)
IPV4_DNS="1.1.1.2,1.0.0.2,8.8.8.8,8.8.4.4"
MY_IPV4_ADDR="" # 192.168.1.1/27
MY_IPV4_GTWY=""
2022-09-12 21:15:13 +05:30
sudo nmcli connection modify "${NETWORK_CONNECTION}" ipv4.addresses "${MY_IPV4_ADDR}"
sudo nmcli connection modify "${NETWORK_CONNECTION}" ipv4.dns "${IPV4_DNS}"
sudo nmcli connection modify "${NETWORK_CONNECTION}" ipv4.gateway "${MY_IPV4_GTWY}"
2022-09-12 21:15:13 +05:30
sudo nmcli connection modify "${NETWORK_CONNECTION}" ipv4.ignore-auto-dns yes
sudo nmcli connection modify "${NETWORK_CONNECTION}" ipv4.method manual
```
2022-09-12 21:15:13 +05:30
#### IPv6
2022-09-12 21:15:13 +05:30
``` bash
## OPTIONAL
IPV6_DNS="2606:4700:4700:0:0:0:0:1112,2606:4700:4700:0:0:0:0:1002,2001:4860:4860:0:0:0:0:8888,2001:4860:4860:0:0:0:0:8844"
MY_IPV6_ADDR=""
MY_IPV6_GTWY=""
2022-09-12 21:15:13 +05:30
sudo nmcli connection modify "${NETWORK_CONNECTION}" ipv6.addresses "${IPV6_DNS}"
sudo nmcli connection modify "${NETWORK_CONNECTION}" ipv6.dns "${MY_IPV6_ADDR}"
sudo nmcli connection modify "${NETWORK_CONNECTION}" ipv6.gateway "${MY_IPV6_GTWY}"
sudo nmcli connection modify "${NETWORK_CONNECTION}" ipv6.ignore-auto-dns yes
sudo nmcli connection modify "${NETWORK_CONNECTION}" ipv6.method manual
```
## Make a bridge
Use **eth1** _NOT eth0_ (or whatever the name ends up being as per freedesktop) as LAN
```bash
```
2022-09-12 21:15:13 +05:30
## Enable IPv4 forwarding
```bash
sudo sed -i 's/#net.ipv4.ip_forward=1/net.ipv4.ip_forward=1/g' /etc/sysctl.conf
```
## Firewall config
```bash
sudo firewall-cmd --add-masquerade --permanent
sudo firewall-cmd --add-service=dns --add-service=dhcp --permanent
sudo firewall-cmd --reload
```
2022-09-12 21:15:13 +05:30
## Reboot
```bash
systemctl reboot
```
---
# OpenBSD
## Installation
```sh
WAN_INTERFACE= #vio0 in VM
LAN_INTERFACE= #vio1 in VM
```
- Terminal type? [vt220] **`vt220`**
- Chose your keyboard layout ('?' or 'L' for list) [default] **`us`**
- System hostname? (short form, e.g. 'foo') **`vidhyalakshmi`**
- Which network interface do you wish to configure? (or 'done') [abc0] **`${WAN_INTERFACE}`**
- IPv4 address for `${WAN_INTERFACE}` (or 'autoconf' or 'none') [autoconf] **`autoconf`**
- IPv6 address for `${WAN_INTERFACE}` (or 'autoconf' or 'none') [autoconf] **`none`**
- Which network interface do you wish to configure? (or 'done') [done] **`done`**
- Start sshd(8) by default? [yes] **`yes`**
- Setup a user? (enter a lower-case loginname, or 'no') [no] **`pratham`**
- Full name for the user pratham? [pratham] **`Pratham Patel`**
- Allow root ssh login? (yes, no, prohibit-password) [no] **`no`**
- What timezone are you in? ('?' for list) [Asia/Kolkata] **`Asia/Kolkata`**
- Which disk is the root disk? ('?' for details) **`?`**
- MBR has invalid signature; not showing it. Use (W)hole disk or (E)dit the MBR? [whole] **`W`**
- Use (A)uto layout, (E)dit auto layout, or create (C)ustom layout? [a] **`A`**
- Which disk do you wish to initialize? (or 'done') [done] **`done`**
- Let's install the sets! Location of sets? (disk http nfs or 'done') [http] **`http`**
- HTTP proxy URL? (e.g. 'http://proxy:8080', or 'none') [none] **`none`**
- HTTP Server? (hostname, list#, 'done' or '?') [cdn.openbsd.org] **`cdn.openbsd.org`**
- Server directory? [pub/OpenBSD/x.y/riscv64] **`pub/OpenBSD/x.y/riscv64`**
- Sets: **`-game* -x*`**
## Install updates
```bash
fw_update
pkg_add -imUuVv
pkg_check -Fimv
sysupgrade
```
## Basic setup
### Timezone
```bash
ln -sf /usr/share/zoneinfo/Asia/Kolkata /etc/localtime
```
### SSH Config
```bash
#echo "ListenAddress 10.0.0.1" >> /etc/ssh/sshd_config
```
### Doas setup
```bash
echo "permit keepenv pratham" > /etc/doas.conf
```
## Reboot
```bash
shutdown -r now
```
## Install new packages
```bash
pkg_add -imUuVv bash bash-completion curl git htop iftop iperf iperf3 pftop vim--no_x11 vnstat wget wireguard-tools
```
## Router setup
Heavily inspired by the official [OpenBSD documentation](https://www.openbsd.org/faq/pf/example1.html)/guide.
### Setup IP addresses for WAN and LAN interfaces
Use the `10.0.0.0/8` subnet for `$WAN_INTERFACE`.
```bash
WAN_INTERFACE= #em0 or vio0 or something else...
LAN_INTERFACE= #em1 or vio1 or something else...
```
```bash
WAN_IF_CONF="inet MY_STATIC_IPv4_HERE 255.255.255.224 NONE
!route add default MY_ISPs_GATEWAY_HERE
inet6 autoconf"
LAN_IF_CONF="inet 10.0.0.1 255.0.0.0 10.0.0.255"
```
```bash
echo ${WAN_IF_CONF} > /etc/hostname.${WAN_INTERFACE}
echo ${LAN_IF_CONF} > /etc/hostname.${LAN_INTERFACE}
```
### Enable IP Forwarding
#### IPv4
```bash
echo 'net.inet.ip.forwarding=1' >> /etc/sysctl.conf
```
#### IPv6
```
echo "net.inet6.ip6.forwarding=1" >> /etc/sysctl.conf
```
### DHCP
```bash
rcctl enable dhcpd
rcctl set dhcpd flags ${LAN_INTERFACE}
```
```bash
DHCPD_CONF_CONTENTS="# my main devices go on this subnet; phone, laptop, computer, rpis, etc...
subnet 10.0.0.0 netmask 255.255.255.0 {
option routers 10.0.0.1;
option domain-name-servers 10.0.0.1;
range 10.0.0.10 10.0.0.100;
# static LAN IP for my primary phone
host barbet {
fixed-address 10.0.0.11;
hardware ethernet 00:00:00:00:00:00;
}
# static LAN IP for old phone
host merlin {
fixed-address 10.0.0.12;
hardware ethernet 00:00:00:00:00:00;
}
# static LAN IP for old-old phone
host vince {
fixed-address 10.0.0.13;
hardware ethernet 00:00:00:00:00:00;
}
# static LAN IP for my MBP (Wi-Fi)
host ringmaster {
fixed-address 10.0.0.21;
hardware ethernet 00:00:00:00:00:00;
}
# static LAN IP for my Desktop/Workstation
host flameboi {
fixed-address 10.0.0.22;
hardware ethernet 00:00:00:00:00:00;
}
# static LAN IP for my MBP (eth dongle)
host bramha {
fixed-address 10.0.0.23;
hardware ethernet 00:00:00:00:00:00;
}
# static LAN IP for my Raspberry Pi 4 Model B 4GB
host sentinel {
fixed-address 10.0.0.31;
hardware ethernet 00:00:00:00:00:00;
}
# static LAN IP for my Raspberry Pi 4 Model B 8GB
host bluefeds {
fixed-address 10.0.0.32;
hardware ethernet 00:00:00:00:00:00;
}
# static LAN IP for my primary WAP
host rahu {
fixed-address 10.0.0.90;
hardware ethernet 00:00:00:00:00:00;
}
}
## IoT devices go on this subnet; extra WAP, Android set-top box, etc...
#subnet 10.0.10.0 netmask 255.255.255.0 {
# option routers 10.0.10.1;
# option domain-name-servers 10.0.10.1;
# range 10.0.10.10 10.0.10.100;
#
#
# # static LAN IP for my Android set top box
# host vibhishan {
# fixed-address 10.0.10.11;
# hardware ethernet 00:00:00:00:00:00;
# }
#
#
# # static LAN IP for my guest WAP
# host ketu {
# fixed-address 10.0.10.90;
# hardware ethernet 00:00:00:00:00:00;
# }
#}
"
```
```bash
echo ${DHCPD_CONF_CONTENTS} > /etc/dhcpd.conf
```
### Firewall
```bash
rcctl enable pf # not really necessary, but OCD
```
```bash
WAN_INTERFACE= #em0 or vio0 or something else...
LAN_INTERFACE= #em1 or vio1 or something else...
```
```bash
PF_CONF_CONTENTS="# set macros for LAN_IF and WAN_IF
LAN_IF = "${LAN_INTERFACE}"
WAN_IF = "${WAN_INTERFACE}"
# network hosts; look at "/etc/dhcpd.conf" for what they are
host_barbet = "10.0.0.11"
host_merlin = "10.0.0.12"
host_ringmaster = "10.0.0.21"
host_flameboi = "10.0.0.22"
host_bramha = "10.0.0.23"
host_sentinel = "10.0.0.31"
host_bluefeds = "10.0.0.32"
host_rahu = "10.0.0.90"
#host_vince = "10.0.0.13"
#host_ketu = "10.0.10.11"
#host_vibhishan = "10.0.10.90"
#host_ = "10."
hosts_allow_ssh = "{" $host_ringmaster $host_flameboi $host_bramha $host_bluefeds "}"
hosts_protected = "{" $host_barbet $host_merlin $host_ringmaster $host_flameboi $host_sentinel $host_bluefeds "}"
hosts_known_guests = "{" $host_rahu "}"
#hosts_known_guests = "{" $host_vince $host_rahu $host_ketu "}"
#hosts_totally_isolated = "{" $host_vibhishan "}"
# table for blocking IP addresses
# yet to be populated
#table <assholes> const { x.x.x.x, y.y.y.y }
# table for my VLANs
table <vlan_protected_tab> const { 10.0.0.0/8 }
table <vlan_isolated_tab> const { 10.0.10.0/24 }
#table <vlan__tab> const { }
# don't need to route any traffic from loop-back interface
set skip on lo0
# don't respond to the sendor if their packets have been blocked
set block-policy drop
# block everything
block drop all
# activate spoofing protection for all interfaces
block in quick from urpf-failed
# only allow ssh connections from the local network if it's from the
# $host_allow_ssh hosts. use "block return" so that a TCP RST is
# sent to close blocked connections right away. use "quick" so that this
# rule is not overridden by the "pass" rules below.
block return in quick on $LAN_IF proto tcp from ! $hosts_allow_ssh to $LAN_IF port ssh
# passing packets LAN <-> LAN
# this is not needed now, since I have only one LAN interface
# the switch will do this
#pass in on $LAN_IF from $LAN_IF:network to any keep state
# allow OpenBSD to connect to the internet (package management, etc)
# pass WAN network to WAN without modification
pass out on $WAN_IF from $WAN_IF:network to any keep state
# pass LAN network OUT to WAN using Network Address Translation
pass out on $WAN_IF from $LAN_IF:network to any nat-to ($WAN_IF) keep state
#pass out on $WAN_IF proto { tcp, udp, icmp } from $LAN_IF:network to any nat-to ($WAN_IF) modulate state
# pass tcp, udp, and icmp out on the external (internet) interface.
# tcp connections will be modulated, udp/icmp will be tracked statefully.
pass out on $WAN_IF proto { tcp udp icmp } all modulate state
"
```
```bash
echo ${PF_CONF_CONTENTS} > /etc/pf.conf
pfctl -nf /etc/pf.conf && pfctl -f /etc/pf.conf
```
### DNS
```bash
rcctl enable unbound
```
```bash
```
---
### Monitoring
```bash
systat ifstat
systat netstat
netstat -an
pftop
iftop
vnstatd -d && vnstat
tcpdump
```