TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Building an OpenBSD Router

151 点作者 fcambus超过 9 年前

7 条评论

jrcii超过 9 年前
I run OpenBSD routers in production. When getting the lay of the land to set these up I came across OP&#x27;s link as well as <a href="http:&#x2F;&#x2F;www.bsdnow.tv&#x2F;tutorials&#x2F;openbsd-router" rel="nofollow">http:&#x2F;&#x2F;www.bsdnow.tv&#x2F;tutorials&#x2F;openbsd-router</a> and a few others like <a href="http:&#x2F;&#x2F;geodsoft.com&#x2F;howto&#x2F;harden&#x2F;" rel="nofollow">http:&#x2F;&#x2F;geodsoft.com&#x2F;howto&#x2F;harden&#x2F;</a>
评论 #10875950 未加载
VLM超过 9 年前
Its a reasonable start.<p>It provided an example of a static nat forwarding for incoming traffic.<p>Another common task is blocking certain outgoing traffic<p>block return out quick on egress from any to any port smtp<p>to block all outgoing email if your internal machines are all windows (to block spambots or whatever).<p>Or to block outgoing traffic from one device (perhaps your laser printer, or abandoned smart TV, or an &quot;internet of powned things&quot; device).<p>block return out quick on egress from 10.1.2.3<p>You can have huge fun with tables. So make a table of addresses to block from the internet (much like the martians table in the example), and a pile of crontab that pfctl add and pfctl delete the kids i-devices around bed time or homework time or whatever.<p>As a starter, its pretty good, but there should be commentary on troubleshooting tools. Here&#x27;s the care and feeding of the log command to figure out what you&#x27;re actually doing vs what you think you&#x27;re doing. Here&#x27;s how you see the current NAT table using pfctl, stuff like that. As with many security issues, its easier to enable uPNP than it is to correctly debate if you should enable uPNP, its easier to enable your whole lan to access the internet rather than blocking the laserprinter, so that&#x27;s a fun topic in general.<p>Also it&#x27;s been a tradition in linux and presumably bsd software firewalls since the mid 90s to add endless complication and logging that serves no useful purpose and is never examined or acted upon after installation until a hardware limit for hardware of that year is reached, then complain software firewalls are too slow and maybe a couple years of hardware advances will make them practical, repeat endlessly. You can shove a couple megs&#x2F;sec using a 486, I certainly did in the 90s, although you can also clutter up a top of the line desktop today such that the CPU and disk IO will flood about a couple hundred K if you try hard enough by writing every packet to disk and having pages of firewall rules.
评论 #10875525 未加载
zdw超过 9 年前
If you want hardware to run this on, I really like the PCEngines APU (<a href="http:&#x2F;&#x2F;www.pcengines.ch&#x2F;apu1d4.htm" rel="nofollow">http:&#x2F;&#x2F;www.pcengines.ch&#x2F;apu1d4.htm</a>), which is surprisingly powerful (dual AMD64 cores, 4GB RAM, multiple miniPCIe ports), and inexpensive given the capabilities.
评论 #10875792 未加载
评论 #10876802 未加载
ris超过 9 年前
I used to run openbsd routers, but the lack of <i>real</i> package management or a decent manageable upgrade story made it more trouble than it&#x27;s worth.<p>(That said, I&#x27;m still quite fond of openbsd, but from afar)
评论 #10876738 未加载
评论 #10876859 未加载
评论 #10877779 未加载
Decade超过 9 年前
Any router guide that does not cover IPv6 is sadly obsolete.
评论 #10877292 未加载
评论 #10876518 未加载
pyvpx超过 9 年前
I particularly like the inclusion of DNSCrypt
评论 #10875668 未加载
评论 #10875824 未加载
ksec超过 9 年前
I actually want all my internet Appliance to run on OpenBSD. But I guess due to drivers problem I may never see that happen.
评论 #10879481 未加载