Add password authentication to Elasticsearch 7.10 on FreeBSD 12.2

If you want/need to add password authentication to your FreeBSD Elasticsearch cluster (this should work on any FreeBSD with elasticsearch7) TLDR; (again) Add the following lines to your /usr/local/etc/elasticsearch/elasticsearch.yml: true true and restart elasticsearch. service elasticsearch restart Make sure curl is installed: pkg install curl Link the installed Java into the bundled directory (this is neither recommended nor supported but it does the trick) mkdir -p /usr/local/lib/elasticsearch/jdk/bin ln -s /usr/local/bin/java /usr/local/lib/elasticsearch/jdk/bin/java And run the password setup utility (this might take up to 2 minutes)

How to secure your Saltstack Salt Master using spiped

This is a short how-to for securing Saltstack communication via spiped. (most of it is based on the how-to I wrote on securing Elasticsearch with spiped) At first: install spiped FreeBSD pkg install spiped Debian/Ubuntu apt install spiped CentOS (fo those who haven’t migrated yet) vim /etc/yum.repos.d/spiped.repo [lsde-spiped] name=spiped repo baseurl=$basearch/ type=rpm-md skip_if_unavailable=True gpgcheck=1 gpgkey= repo_gpgcheck=0 enabled=1 enabled_metadata=1 install spiped yum clean all yum install spiped generate symmetric encryption key dd if=/dev/urandom of=/root/saltpipe.

Using FIDO2 Auth Keys (Yubikey, Solokeys) with MacOS and FreeBSD

OpenSSH 8.2p1 with FIDO2 support was recently added to MacOS (via Homebrew) and FreeBSD (via ports/pkg). Here’s a short how-to securely login to your FreeBSD servers via FIDO2 (Yubikey, Solokey et. al.). On your MacOS client: Open your terminal and install libfido2 and openssh (8.2p1) brew install openssh libfido2 Generate you ecdsa key with libfido2. Insert your FIDO2 usb stick and run (push the auth button on your key when prompted):

How-to migrate your FreeBSD jails from iocage to bastille

Stop the running jail and export it: iocage stop jailname iocage export jailname Move the backup files (.zip and .sha256) into Bastille backup dir (default: /usr/local/bastille/backups/): mv /iocage/images/jailname_2020-03-26.* /usr/local/bastille/backups/ for remote systems you could use rsync: rsync -avh /iocage/images/jailname_2020-03-26.* [email protected]:/usr/local/bastille/backups/ Import the iocage backup file (use zip file name) bastille import ```</pr```e> Set your new ip address and interface: vim /usr/local/bastille/jails/jailname/jail.conf interface = bastille0; ip4.addr = ""; You can use you primary network interface instead of the virtual bastille0 interface as well if you know what you’re doing.

Easy and lightweight jails with BastilleBSD

Go to 2021 version HowTo create jails with Bastille TDLR of install bastille Bastille is very active so make sure you switch to latest pkg mirror vim /etc/pkg/FreeBSD.conf FreeBSD: { url: "pkg+${ABI}/latest", mirror_type: "srv", signature_type: "fingerprints", fingerprints: "/usr/share/keys/pkg", enabled: yes } enable bastille sysrc bastille_enable=YES create virtual network bridge sysrc cloned_interfaces+=lo1 sysrc ifconfig_lo1_name="bastille0" service netif cloneup edit /etc/pf.conf (add the lines without #) ext_if="em0" set block-policy return scrub in on $ext_if all fragment reassemble set skip on lo table <jails> persist nat on $ext_if from <jails> to any -> ($ext_if) block in all pass out quick modulate state antispoof for $ext_if inet pass in inet proto tcp from any to any port ssh flags S/SA keep state add ZFS support (check zpool with “zpool list”)

Install Redmine 3.4 on FreeBSD 11.2 with Apache, Passenger and MySQL

TLDR for Redmine on FreeBSD 11.2 install redmine and a bunch of dependencies UPDATE 2019/03/11 redmine pkg is currently not available on quaterly mirror (make sure you use latest branch in /etc/pkg/FreeBSD.conf) pkg install redmine apache24 mysql56-server mysql56-client rubygem-passenger-apache vim /usr/local/etc/apache24/httpd.conf add the following lines to your httpd.conf or Inlcudes/redmine.conf LoadModule passenger_module /usr/local/lib/ruby/gems/2.4/gems/passenger-6.0.0/buildout/apache2/ PassengerRoot /usr/local/lib/ruby/gems/2.4/gems/passenger-6.0.0 PassengerRuby /usr/local/bin/ruby24 to use ssl uncomment the following lines and set Listen port to 443 LoadModule ssl_module libexec/apache24/mod_ssl.

Secure Elasticsearch without X-Pack or SSL/TLS

HowTo Secure Elasticsearch using spiped on FreeBSD, Debian and CentOS Spiped makes it really easy to secure connections between clients and Elasticsearch databases. Keep in mind that the symmetric key (once compromised) can be used to intercept/mitm all connections. install spiped FreeBSD pkg install spiped Debian/Ubuntu apt install spiped CentOS vim /etc/yum.repos.d/spiped.repo [lsde-spiped] name=Copr repo for spiped owned by lsde baseurl=> epel-7-$basearch/ type=rpm-md skip_if_unavailable=True gpgcheck=1 gpgkey= repo_gpgcheck=0 enabled=1 enabled_metadata=1 install spiped