<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>MWC Labs &#187; OpenBSD</title>
	<atom:link href="https://www.conceicao.eti.br/blog/categoria/openbsd/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.conceicao.eti.br/blog</link>
	<description>TI, BSD, Linux, Network &#38; Security !</description>
	<lastBuildDate>Fri, 23 May 2014 22:37:30 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.9.40</generator>
	<item>
		<title>Instalando OpenBSD com softraid</title>
		<link>https://www.conceicao.eti.br/blog/2013/12/05/instalando-openbsd-com-softraid/</link>
		<comments>https://www.conceicao.eti.br/blog/2013/12/05/instalando-openbsd-com-softraid/#comments</comments>
		<pubDate>Thu, 05 Dec 2013 21:33:45 +0000</pubDate>
		<dc:creator><![CDATA[Matheus]]></dc:creator>
				<category><![CDATA[OpenBSD]]></category>
		<category><![CDATA[raid]]></category>
		<category><![CDATA[softraid]]></category>

		<guid isPermaLink="false">http://www.conceicao.eti.br/blog/?p=123</guid>
		<description><![CDATA[Buenas; Segue dica para instalar o OpenBSD 5.4 com dois discos em RAID 1 via software (softraid). (I)nstall, (U)pgrade or (S)hell?Â s #Â cd /dev #Â sh /dev/MAKEDEV sd1 sd2 #Â fdisk -iy sd0 Writing MBR at offset 0. #Â fdisk -iy sd1 Writing MBR at offset 0. #Â disklabel -E sd0 Label editor (enter â€˜?â€™ for help at any prompt) [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Buenas;</p>
<p>Segue dica para instalar o OpenBSD 5.4 com dois discos em RAID 1 via software (softraid).</p>
<pre>(I)nstall, (U)pgrade or (S)hell?Â <strong>s</strong>
#<strong>Â cd /dev
</strong>#<strong>Â sh /dev/MAKEDEV sd1 sd2
</strong>#<strong>Â fdisk -iy sd0
</strong>Writing MBR at offset 0.<strong>
</strong>#<strong>Â fdisk -iy sd1
</strong>Writing MBR at offset 0.<strong>
</strong>#<strong>Â disklabel -E sd0
</strong>Label editor (enter â€˜?â€™ for help at any prompt)<strong>
</strong>&gt;<strong>Â a a
</strong>offset: [64]<strong>Â [ENTER]
</strong>size: [41929586]<strong>Â [ENTER]
</strong>FS type: [4.2BSD]<strong>Â RAID
</strong>&gt;<strong>Â q
</strong>Write new label?: [y]Â <strong>y</strong>
#<strong>Â cd /tmp
</strong>#<strong>Â disklabel sd0 &gt; protofile
</strong>#<strong>Â disklabel -R sd1 protofile
</strong>#<strong>Â <strong>bioctl -c 1 -l /dev/sd0a,/dev/sd1a softraid0
</strong></strong>sd2 at scscibus2 targ 1 lun 0: &lt;OPENBSD, SR RAID 1, 005&gt; SCSI2 0/direct fixed
sd2:Â 20473MB, 512 bytes/sector,Â 41929058 sectors
softraid0: RAID 1 volume attached as sd2<strong><strong>
</strong></strong>#<strong>Â <strong>dd if=/dev/zero of=/dev/rsd2c bs=1m count=1
</strong></strong>1+0 records in
1+0 records out
1048576 bytes transferred in 0.009 secs (111337439 bytes/sec)<strong><strong>
</strong></strong>#<strong>Â exit</strong></pre>
<p>O instalador voltarÃ¡ para a tela inicial. Escolha a opÃ§Ã£o <strong>(I)nstall</strong> e proceda normalmente com a instalaÃ§Ã£o. Lembre-se de realizar a instalaÃ§Ã£o no disco <strong>sd2</strong> (volume RAID criado pelo softraid).</p>
<p><em><strong>ReferÃªncia:</strong><br />
<a href="http://spiritedblowfish.wordpress.com/2012/07/19/installing-openbsd-5-1-amd64-using-softraid/">http://spiritedblowfish.wordpress.com/2012/07/19/installing-openbsd-5-1-amd64-using-softraid/</a></em></p>
]]></content:encoded>
			<wfw:commentRss>https://www.conceicao.eti.br/blog/2013/12/05/instalando-openbsd-com-softraid/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Proxy transparente em outra mÃ¡quina no PF</title>
		<link>https://www.conceicao.eti.br/blog/2010/05/25/proxy-transparente-em-outra-maquina-no-pf/</link>
		<comments>https://www.conceicao.eti.br/blog/2010/05/25/proxy-transparente-em-outra-maquina-no-pf/#comments</comments>
		<pubDate>Tue, 25 May 2010 20:18:32 +0000</pubDate>
		<dc:creator><![CDATA[Matheus]]></dc:creator>
				<category><![CDATA[FreeBSD]]></category>
		<category><![CDATA[OpenBSD]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[lusca]]></category>
		<category><![CDATA[PF]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[remoto]]></category>
		<category><![CDATA[Squid]]></category>
		<category><![CDATA[transparente]]></category>

		<guid isPermaLink="false">http://conceicao.eti.br/blog/?p=42</guid>
		<description><![CDATA[OlÃ¡ pessoal; Para fazer com que o seu proxy transparente fique em outra mÃ¡quina, alÃ©m da regra de redirecionamento da porta 80 para a porta do seu proxy, vocÃª deve fazer uma regra de nat tambÃ©m. &#160; No gateway/firewall da rede: 1. Defina a seguinte sysctl: sysctl net.inet.ip.redirect=0 Obs.: NÃ£o esqueÃ§a de definir a sysctl [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><span style="font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; white-space: normal;">OlÃ¡ pessoal;</span><br />
Para fazer com que o seu proxy transparente fique em outra mÃ¡quina, alÃ©m da regra de redirecionamento da porta 80 para a porta do seu proxy, vocÃª deve fazer uma regra de nat tambÃ©m.</p>
<p>&nbsp;</p>
<p><strong>No gateway/firewall da rede:</strong></p>
<p style="padding-left: 30px;">1. Defina a seguinte sysctl:</p>
<pre>sysctl net.inet.ip.redirect=0</pre>
<p style="padding-left: 30px;">Obs.: NÃ£o esqueÃ§a de definir a sysctl no /etc/sysctl.conf</p>
<p style="padding-left: 30px;">2. Adicione a seguinte linha no PF:</p>
<pre>
pass in quick on $int_if route-to ($int_if $IP_Proxy) proto tcp from ! $IP_Proxy to any port www
</pre>
</p>
<p>&nbsp;</p>
<p><strong>No servidor de proxy:</strong></p>
<p style="padding-left: 30px;">1. Defina a seguinte sysctl:</p>
<pre>sysctl net.inet.ip.redirect=0</pre>
<p>Obs.: NÃ£o esqueÃ§a de definir a sysctl no /etc/sysctl.conf</p>
<p style="padding-left: 30px;">2. FaÃ§a a regra de redirecionamento de porta (80 para 3128) no PF:</p>
<pre>
rdr inet proto tcp from ! $IP_Proxy to any port www -&gt; $IP_Proxy port 3128
</pre>
</p>
<p>T+;</p>
]]></content:encoded>
			<wfw:commentRss>https://www.conceicao.eti.br/blog/2010/05/25/proxy-transparente-em-outra-maquina-no-pf/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Proxy Transparente com Squid e PF no OpenBSD</title>
		<link>https://www.conceicao.eti.br/blog/2009/04/17/proxy-transparente-com-squid-e-pf-no-openbsd/</link>
		<comments>https://www.conceicao.eti.br/blog/2009/04/17/proxy-transparente-com-squid-e-pf-no-openbsd/#comments</comments>
		<pubDate>Fri, 17 Apr 2009 14:05:20 +0000</pubDate>
		<dc:creator><![CDATA[Matheus]]></dc:creator>
				<category><![CDATA[OpenBSD]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Firewall]]></category>
		<category><![CDATA[lusca]]></category>
		<category><![CDATA[PF]]></category>
		<category><![CDATA[Ports]]></category>
		<category><![CDATA[Proxy]]></category>
		<category><![CDATA[Squid]]></category>
		<category><![CDATA[transparente]]></category>

		<guid isPermaLink="false">http://blog.matheuswc.com/blog/?p=7</guid>
		<description><![CDATA[E ai pessoal, tudo certo? EntÃ£o, aqui vamos dar uma olhada na instalaÃ§Ã£o e configuraÃ§Ã£o de um proxy Squid operando como transparente e tambÃ©m as regras que serÃ£o necessÃ¡rias adicionar nas regras de firewall (PF). Vamo lÃ¡.. InstalaÃ§Ã£o Realizei a instalaÃ§Ã£o pelo package manager do OpenBSD onde tem os pacotes prÃ©-compilados, mas nada impede de [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>E ai pessoal, tudo certo?</p>
<p>EntÃ£o, aqui vamos dar uma olhada na instalaÃ§Ã£o e configuraÃ§Ã£o de um proxy <a href="http://www.squid-cache.org/">Squid</a> operando como transparente e tambÃ©m as regras que serÃ£o necessÃ¡rias adicionar nas regras de firewall (<a href="http://www.openbsd.org/faq/pf/">PF</a>).</p>
<p>Vamo lÃ¡..</p>
<h2><strong>InstalaÃ§Ã£o</strong></h2>
<p>Realizei a instalaÃ§Ã£o pelo package manager do <a href="http://openbsd.org">OpenBSD</a> onde tem os pacotes prÃ©-compilados, mas nada impede de vocÃª instalar pelo <a title="OpenBSD Ports" href="http://www.openbsd.org/ports.html">Ports</a>.</p>
<h3>Package Manager (pkg_add)</h3>
<p>Primeiro de tudo vamos exportar a variÃ¡vel com o <em>mirror</em> onde se encontra os pacotes:</p>
<pre># export PKG_PATH=ftp://ftp.das.ufsc.br/pub/OpenBSD/4.4/packages/i386/</pre>
<p>Vamos instalar o pacote:</p>
<pre># pkg_add -i -v squid</pre>
<p>A versÃ£o do Squid que instalei aqui foi a <em>squid-2.7.STABLE3-ldap</em>.</p>
<h3>Ports</h3>
<pre>
# cd /usr/ports/www/squid
# env FLAVOR=transparent make install
</pre>
<h2>ConfiguraÃ§Ã£o</h2>
<h3>Squid</h3>
<p>Vamos configurar o Squid para subir no boot.</p>
<p>Edite o arquivo <strong>/etc/rc.local</strong> com seu editor de texto e adicione as linhas abaixo logo apÃ³s <em># Add your local startup actions here.</em></p>
<pre># Squid
/usr/local/sbin/squid</pre>
<p>Vamos editar agora o arquivo de configuraÃ§Ã£o do Squid, que Ã© o <strong>/etc/squid/squid.conf</strong>.</p>
<p>Faremos uma configuraÃ§Ã£o bÃ¡sica do Squid.</p>
<pre>http_port 3128 transparent

visible_hostname pr0xy.conceicao.eti.br

error_directory /usr/local/share/squid/errors/Portuguese

# Logs
cache_access_log /var/log/squid/access.log
cache_log /var/log/squid/cache.log

# SVN
extension_methods REPORT MERGE MKACTIVITY CHECKOUT PROPFIND

# ACLs
acl all src 0.0.0.0/0.0.0.0
acl rede src 192.168.1.0/24
acl SSL_Ports port 443 563 2096
acl Safe_ports port 80 21 443 563 70 210 1025-65535
acl Safe_ports port 280 # http-mgmt
acl Safe_ports port 488 # gss-http
acl Safe_ports port 591 # filemaker
acl Safe_ports port 777 # multiling http
acl CONNECT method CONNECT

#Pessoas com acesso total
acl vips arp "/etc/squid/controle.vips"

#BlackList
acl blacklist dstdomain "/etc/squid/controle.blacklist"

##
# Permite ou Nega

http_access deny !Safe_ports
http_access deny CONNECT !SSL_ports

http_access allow vips
http_access deny blacklist

http_access allow rede
http_access deny all
##</pre>
<p>Obs.: Crie os arquivos <strong>/etc/squid/controle.vips</strong> e <strong>/etc/squid/controle.blacklist</strong></p>
<p>Agora temos que iniciar o Squid com a opÃ§Ã£o -z para que seja criado os diretÃ³rios de swap.</p>
<pre># /usr/local/sbin/squid -z</pre>
<p>Pronto, agora jÃ¡ podemos iniciar o squid!</p>
<pre># /usr/local/sbin/squid</pre>
<p>Sempre que for feita uma alteraÃ§Ã£o no arquivo de configuraÃ§Ã£o do Squid, devemos executar o comando a seguir para que as configuraÃ§Ãµes sejam recarregadas:</p>
<pre># /usr/local/sbin/squid -k reconfigure</pre>
<h3>PF</h3>
<p>O arquivo de configuraÃ§Ã£o do PF Ã© o <strong>/etc/pf.conf</strong> (padrÃ£o). Adicione/adapte as seguintes regras:</p>
<pre>rdr on $int_if Â inet proto tcp from any to any port www-&gt; 127.0.0.1 port 3128

pass in on $int_if inet proto tcp from any to 127.0.0.1 port 3128
pass out on $ext_if inet proto tcp from any to any port www</pre>
<p>Ã‰ preciso tambÃ©m liberar o acesso do Squid ao <strong>/dev/pf</strong> para que o mesmo consulte o filtro de pacotes jÃ¡ que o padrÃ£o Ã© somente o <strong>root</strong> ter acesso. O Squid roda com o grupo <strong>_squid</strong>.</p>
<pre>
# chgrp _squid /dev/pf
# chmod g+rw /dev/pf
</pre>
<p>EntÃ£o Ã© isso.. qualquer coisa Ã© sÃ³ dar um grito. =]</p>
<p>T+</p>
<h6><em>ReferÃªncia: <a href="http://www.openbsd-br.org/index.php?q=node/15">http://www.openbsd-br.org/index.php?q=node/15</a></em></h6>
]]></content:encoded>
			<wfw:commentRss>https://www.conceicao.eti.br/blog/2009/04/17/proxy-transparente-com-squid-e-pf-no-openbsd/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
