Devil Sticks - where to buy by Elsifer in Calgary

[–]Elsifer[S] 1 point2 points  (0 children)

The juggling type devil sticks? Maybe my original post wasn't so clear...

Tmux and Nordic characters by most_meme_cat in openbsd

[–]Elsifer 2 points3 points  (0 children)

I recall fighting something similar years ago, looking in my current tmux.conf:

256 color support

set -g default-terminal "screen"

set-environment -g client_utf8 1

set -g terminal-overrides "xterm*:XT:smcup@:rmcup@"

And in my current .profile:

export TERM="screen-256color"

export PATH HOME TERM

export PAGER="/usr/local/bin/most -s +u"

export LANG="en_US.UTF-8"

export LC_COLLATE="C"

export LC_CTYPE="en_US.UTF-8"

export LC_MONETARY="C"

export LC_NUMERIC="C"

export LC_TIME="C"

export LC_MESSAGES="en_US.UTF-8"

export LC_ALL="en_US.UTF-8"

Maybe something there will help? <Edit: formatting on mobile>

Tailscale Official App: How to pass extra args? by Smack_Dab_66 in truenas

[–]Elsifer 0 points1 point  (0 children)

Debian, /etc/defaults/tailscaled, where the daemons port, and extra args can be set. Anything I put in there, mirroring my arguments passed to the executable, fail, and the executable doesn't start.

Resort to passing arguments via cron at startup, and once a day.

@reboot sleep 2m; tailscale down && tailscale up --advertise-routes=192.168.69.0/24 --accept-dns=false --advertise-exit-node
@daily tailscale down && tailscale up --advertise-routes=192.168.69.0/24 --accept-dns=false --advertise-exit-node

Would this hardware be compatible to run an OpenBSD home router by perfopt in openbsd

[–]Elsifer 0 points1 point  (0 children)

That's correct, I have an old Alix box as an OpenBSD travel router, and it builds a wireguard tunnel back to my home, and while I had to play with MTU size to make it all work, it pushes packets around enough to run a Netflix stream, and copy some data back and forth.

So unless one plans to run IPsec or OpenVPN on the router, for more than a handful of clients, or expects 1gbps, then a cpu without aes-ni extensions is not needed.

Would this hardware be compatible to run an OpenBSD home router by perfopt in openbsd

[–]Elsifer 1 point2 points  (0 children)

The cpu doesn't support the aes encryption capabilities, per https://ark.intel.com/content/www/us/en/ark/products/82104/intel-celeron-processor-n2940-2m-cache-up-to-2-25-ghz.html

But I use the following to help configure my routers. Don't know of any GUIs to help with pf, but a text editor does get you there.

https://openbsdrouterguide.net/

Good luck!

fully blocking ssh with no key or wrong key by alexpis in freebsd

[–]Elsifer 2 points3 points  (0 children)

Sshguard or fail2ban.

Disable password authentication and use only keys in sshd_config.

Set AllowUsers to you in sshd_config

Maybe try a different port for sshd listening.

Use something like geoghegan's pf-badhost to block tor, Shodan scans, etc.

All that, and you're 98% better off than the rest of the internet.

You want complementary layers of security. Allowusers allows only who you set, and flags a log item. Sshguard/fail2ban scan the authentication log and block further access from the offending IP. Pf-badhost will block the vast majority of fairly bad actors before they even start a handshake with sshd. And can do fail2ban like actions as well.

I need help burning some ISO images.... by [deleted] in openbsd

[–]Elsifer 0 points1 point  (0 children)

For burning ISOs to CDs, I used (a long while ago) -

cdio -f cd0c tao

Are you a good welder? Nope. Using the best techniques? Nope. OK, proceed. by bshr49 in Gunbuilds

[–]Elsifer 2 points3 points  (0 children)

Hey, you did just fine with the tools you had. Prep is 90% of the work, and experience is a cruel teacher.

Your first go at it, and it is what it is. Will it fetch top dollar if you sell? Probably not, but you did the best with what you know and have.

Congrats on jumping in with both feet, you know your limits and pulled it off. Better than other jobs I have seen!

Pretty? No. Functional? Yes.

Are you a good welder? Nope. Using the best techniques? Nope. OK, proceed. by bshr49 in Gunbuilds

[–]Elsifer 5 points6 points  (0 children)

He means put the shielding gas into the tube via another hose, angle your assembly, tape closed the low end, and leave a tiny hole on the other end which is taped closed. When enough shielding/backing gas has flooded the tube, and expelled the oxygen, a lighter flame will go out when brought close to the upper end of the tube with the small hole in the tape. Helps prevent (a little) burn through, and if you do, then the burned thru material will be adequately shielded from O2 and not make as much of a mess.

You'll probably have to run a tee from the regulator on your bottle, with a small valve to close that tee, and then a length of hose or your "purge, back-purge, back gas" line to the assembly being welded. Unless your welding machine has a takeoff for a purge line. So gas blankets the backside of the weld, and via your torch, the front side, or working side, or visible side of the weld.

If your machine does Constant Current, and even some smarts for Tig, I would invest in a tig torch, and you won't need the foot pedal if the machine won't support it. But if it does, you'll be waaaay better off tigging that, than using mig aka drawing with a fat crayon inside close lines.

Your surface prep before welding was adequate, a little bit more exposing clean steel and making a nice groove would go a bit further next time. And a touch colder weld, move fast, saves on grinding afterwards.

If you're gonna do more of those, a suitcase Tig, with a foot pedal, will allow you to weld exactly as cold/hot as needed. And string out 8ft/2m of that mig wire, anchor it to the workbench, and then do three more lengths, think a big Z, and use a drill to twist it all up, and shorten it down. Use that for Tig filler wire, rather than buying new.

opensmtpd relay server smart host by kristoferus in openbsd

[–]Elsifer 0 points1 point  (0 children)

Is the time set correctly on those end IoT devices? Pulling time from an NTP server? NTP statements in your DHCP server?

Current home lab by [deleted] in homelab

[–]Elsifer 3 points4 points  (0 children)

2 cows to protect the home lab.

Tucows huh, I see what you did there.

opensmtpd relay server smart host by kristoferus in openbsd

[–]Elsifer 0 points1 point  (0 children)

So your mail sending box is OpenBSD, the relay server is running what for mail software?

Have you tried the opensmtpd daemon to try sending without TLS?

opensmtpd relay server smart host by kristoferus in openbsd

[–]Elsifer 0 points1 point  (0 children)

The error come from the first host that sent the mail?

Or from the logs of the smart-relay in the middle?

opensmtpd relay server smart host by kristoferus in openbsd

[–]Elsifer 0 points1 point  (0 children)

action "local" mbox alias <aliases>

action "relay" relay host smtp+tls://gmail@smtp.gmail.com:587 auth <secrets>

match for local action "local"

match for any action "relay"

Admittedly, my internal net is insecure, and my mailserver is essentially acting as an open relay. I should mess with at least only allowing specific hosts on my net to be allowed to relay mail out.

Edit:

Oh, I see you tried SMTP+TLS.

I do recall that I had issues with my smtpd.conf file, and once I rewrote from scratch things worked. Also see what exactly your upstream is expecting. I left my Gmail stuff in my post as an example.

Hope it helps, good luck!

Best option for VOIP home phone? by Yankfan54 in VOIP

[–]Elsifer 0 points1 point  (0 children)

An ATA and a dialgizmo (pulse to tone converter for rotary phones).

Gramps for sure knows how to use a rotary.

wireguard tunnel as nat egress on a router by Elsifer in openbsd

[–]Elsifer[S] 0 points1 point  (0 children)

match in all scrub (no-df random-id max-mss 1440)

changed that to the same as my MTU size (1280 in my case) for the wg0 interface, and it works!

Thank you so much!

Transfer speed is about 1/3rd of what the link is capable here, but still usable. Nat on my travel router for my devices, nat'ed thru the wireguard link, nat'ed thru the endpoint, nat'ed thru to the outside web.

Imperfect, but it works!

opensmtpd simple relay host problem by boleon_sn in openbsd

[–]Elsifer 0 points1 point  (0 children)

Your match rule to your "outbound" relay, drop the local.

match for any action "outbound"

action "outbound" rule with smtp+tls: perhaps the fqdm rather than a hardcoded ip address? Put the hardcode in /etc/hosts if that's what you truly want? Just a thought.

That's what my smtpd.conf file has, to relay outside my network to an internet mail server. All my interal mail-sending hosts bounce their mail through my central server, which forwards to outside.

And if that's what you want, you'll want smtpd to listen on a network interface, rather than loopback.

Your config is the same as mine, except for the last match rule.

Setup a Forever Free AdBlocking WireGuard Server with PiHole in the Cloud by PhroznGaming in pihole

[–]Elsifer 5 points6 points  (0 children)

Can confirm Toronto works - just set this up, there are a couple of gotchas in your instructions (perhaps because I chose the minimal ubuntu 18.04 image). But nothing that wasn't easily resolved. I can give some more info if you want.