Knot

KNOT DNS some information related to knot dns / knot-dnsutils. Tested with ‘knotd (Knot DNS), version 3.3.3’ running on OpenBSD 7.5. Install Knot pkg_add knot Build Config we’re configure this server as “slave” which get’s it’s config from a Primary Nameserver # /etc/knot/knot.conf server: rundir: "/var/run/knot" user: _knot:_knot automatic-acl: on listen: [ xx.xx.xx.xx@53, xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx@53 ] log: - target: syslog any: info database: storage: "/var/db/knot" key: - id: mykey algorithm: hmac-sha256 secret: xXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXxXx= remote: - id: primary address: [ xx.

Debian

Patch OpenSSH Only apt install --only-upgrade openssh-client openssh-server openssh-sftp-server Time Zone timedatectl set-timezone Europe/Zurich -> set symlink: /etc/localtime -> ../usr/share/zoneinfo/Europe/Zurich Any Comments ? sha256: 7e5018c28bea4357e2f6703ec2876e92798e020801a61e46d6e3698151bc5a38

Sound Selector MacOS

Sound Selector for MacOS on MacOS, you can switch the input and output source on “system setting/sound”. i’d like todo this on the cli. SwitchAudio there is a litte tool called switchaudio. it can list, and also set the input/output device. let’s build a small wrapper around. brew install switchaudio-osx Usage List Sound Devices stoege@mac ~ % sound.sh 1: Externe Kopfhörer 2: Externes Mikrofon 3: Jabra Link 400 4: Mac mini-Lautsprecher 5: SRS-XB33 6: USB Audio Device Set Sound Device

Mariadb

Install MariaDB on OpenBSD Wanna install and Operate MariaDB on OpenBSD? Here a few hints … Install Package pkg_add mariadb-server mariadb-client root@puffy /tmp# pkg_add mariadb-server quirks-7.14 signed on 2024-06-15T18:27:56Z mariadb-server-10.9.8p0v1:lzo2-2.10p2: ok mariadb-server-10.9.8p0v1:snappy-1.1.10p1: ok mariadb-server-10.9.8p0v1:mariadb-client-10.9.8v1: ok mariadb-server-10.9.8p0v1:p5-FreezeThaw-0.5001p0: ok mariadb-server-10.9.8p0v1:p5-MLDBM-2.05p0: ok mariadb-server-10.9.8p0v1:p5-Net-Daemon-0.49: ok mariadb-server-10.9.8p0v1:p5-PlRPC-0.2020p0: ok mariadb-server-10.9.8p0v1:p5-Math-Base-Convert-0.11p0: ok mariadb-server-10.9.8p0v1:p5-Clone-0.46: ok mariadb-server-10.9.8p0v1:p5-Module-Runtime-0.016p0: ok mariadb-server-10.9.8p0v1:p5-Params-Util-1.102: ok mariadb-server-10.9.8p0v1:p5-SQL-Statement-1.414: ok mariadb-server-10.9.8p0v1:p5-DBI-1.643p0: ok mariadb-server-10.9.8p0v1:p5-DBD-MariaDB-1.23: ok mariadb-server-10.9.8p0v1:libxml-2.12.7: ok mariadb-server-10.9.8p0v1: ok Running tags: ok The following new rcscripts were installed: /etc/rc.

SSHChat

SSH Chat how to run your own SSH Chat Server Setup # add go pkg_add go # add user 'sshchat' adduser # switch user su - sshchat ftp https://github.com/shazow/ssh-chat/archive/v1.10.tar.gz tar zxf v1.10.tar.gz cd ssh-chat-1.10/ make build # back to root exit cp /home/sshchat/ssh-chat-1.10/ssh-chat /usr/local/bin/ sshchat - ipfile manage whiteliste ip in dedicated file # create folder mkdir -p /etc/pf.d # sample file echo "127.0.0.1" > /etc/pf.d/sshchat # set permission chmod 600 /etc/pf.

PyProject 1

Sample PyProject from: https://github.com/volfpeter/motorhead/tree/main PyProject poetry init poetry add motor pydantic poetry add mkdocs-material mkdocstrings[python] mypy ruff poethepoet pytest pytest-asyncio pytest-random-order --group dev [project] name = "motorhead" description = "Async MongoDB with vanilla Pydantic v2+ - made easy." readme = "README.md" license = { text = "MIT" } authors = [ { name = "Peter Volf", email = "do.volfp@gmail.com" }, ] requires-python = ">=3.10" dependencies = ["pydantic", "motor"] classifiers = [ "Intended Audience :: Information Technology", "Operating System :: OS Independent", "Programming Language :: Python :: 3", "Development Status :: 4 - Beta", "Topic :: Internet", "Topic :: Software Development :: Libraries", "Topic :: Software Development", "Typing :: Typed", "Environment :: Web Environment", "Framework :: FastAPI", "Intended Audience :: Developers", "License :: OSI Approved :: MIT License", "Topic :: Internet :: WWW/HTTP", ] [project.

Borgbackup

Prerequisite you need a remote Borg Server (Unix/Linux Machine with Borg installed) valid User and Key for SCP Transfer SSH Key -> /backup/id_ed25519 Create Local Folder test -d /backup || (mkdir /backup; chmod 700 /backup) Borg Backup Script cat << 'EOF2' > /backup/borg.sh #!/usr/bin/env bash # BorgBackup Script, v1.0, 2024-04-09, by @stoege # Remote server details REMOTE_USER="borguser" REMOTE_HOST="your.remote.borg.server" REMOTE_REPO="mysamplerepo" # Local directory to backup LOCAL_DIR="/" # List of directories to exclude EXCLUDE_DIRS=( "*/.

Python MTR

Setup Project Poetry poetry init poetry add twisted poetry add twisted-mtr Build Python Script cat << 'EOF' > main.py #!/usr/bin/env python3 ''' An example usage for twisted-mtr which initiates multiple async traceroutes to multiple IPv4 and IPv6 target IP addresses at the same time. You will need to set your source IP addresses correctly and have a working dual IPv4/IPv6 networking stack to run this example. ''' import sys import signal import logging import ipaddress from twisted.

Python Twisted

WebServer with Python Twisted cat << 'EOF' > main.py from twisted.web import server, resource from twisted.internet import reactor, endpoints class Counter(resource.Resource): isLeaf = True numberRequests = 0 def render_GET(self, request): client_ip = request.getClientAddress().host r=request.uri.decode('utf-8') if not r =="/favicon.ico": self.numberRequests += 1 request.setHeader(b"content-type", b"text/plain") content = u"I am request #{} from {}\n".format(self.numberRequests, client_ip) return content.encode("ascii") endpoints.serverFromString(reactor, "tcp:8080").listen(server.Site(Counter())) reactor.run() EOF Run poetry init poetry add twisted poetry run python main.py Browse Open your Browser: http://ip-of-your-host:8080

XZ

MacOS even MacOS seems not hardly affected, better safe than sorry ! # get Version brew info xz # Cleanup Cache brew cleanup -v -s --prune=all # Downgrade brew reinstall xz # Update brew update # Upgrade brew upgrade # reboot reboot # confirm, 5.4.6 should be fine xz -V Links https://www.openwall.com/lists/oss-security/2024/03/29/4 https://nvd.nist.gov/vuln/detail/CVE-2024-3094 https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/ https://github.com/orgs/Homebrew/discussions/5243 https://github.com/amlweems/xzbot https://www.nzz.ch/technologie/xz-luecke-der-verrueckteste-angriff-ein-programmierer-entdeckt-per-zufall-eine-gefaehrliche-hintertuere-im-code-wohl-von-einem-geheimdienst-ld.1824766 https://www.deepfactor.io/an-accidental-discovery-of-a-backdoor-likely-prevented-thousands-of-infections/ fun: https://infosec.exchange/@tinker/112196180295212632 Any Comments ? sha256: d2d6b0518ee60fc80381a2fb44dee61d06c02a7d4182045ff25d59f4894d1a10