OpenBSD admin and ports maintainer

  • 0 Posts
  • 54 Comments
Joined 1 month ago
cake
Cake day: May 29th, 2024

help-circle


  • It’s as easy as following any set of instructions. Whether or not you actually understand what the instructions are doing is an entirely different story. If you actually want to learn how to operate a posix system, doing a bunch of command line installs of Linux isn’t going to help you with that. What will help is living in something with excellent documentation like OpenBSD, with minimal reliance on external tooling. Once you have the skills, they’ll transfer anywhere.









  • Just make the file root owned and readable by no one. An unreadable file can’t be copied. You can use chattr to add some flags like immutability if you desire (shouldn’t really need to). Use a command like find /some/path -type f -exec chattr whatever {} \; if you need to do this recursively. Root account should need a password, and should (hopefully) not be accessable with an unprivileged user’s password through sudo/doas, but on its own account with it’s own password using su or login.

    Note that without encrypting the file, this does not protect you from someone just grabbing your storage device and mounting it with root permissions and then they can do whatever they want with your data. It also doesn’t protect you if someone gets root access to your device through other remote means. If you want to encrypt the file, use something like openssl some-cipher -k 'your password' -in file -out file.cipher_ext. If you want to encrypt multiple files, put them in a tarball and encrypt the tarball. You can again also use find with openssl to encrypt/decrypt recursively if you don’t want to use a tarball, which may be better with ciphers like blowfish that aren’t secure at large file sizes; but if you do that, you expose your encrypted file system structure to attackers.

    I am not a fan of full disk encryption, because it usually means leaving all your data decrypted during runtime with how most people use it. If you only decrypt a block device when you need to, there’s nothing wrong with that, and can work as an alternative to encrypting a tarball.






  • OpenBSD’s default public domain kornshell fork on OpenBSD, oksh (portable OpenBSD ksh clone) on Linux/MacOS/Other Unix. It has far fewer extensions than something like Bash (which I consider a positive) while being much faster (tested with hyperfine), and the extensions it does have are all useful (arrays, coprocesses, select, .* not expanding to . or .., pattern blocks, suspending of the whole shell).


  • I dislike the paradigm that there are “techy people/programmers” and “tech illiterates/non programmers”. Anyone can develop the skills to properly use unix interfaces given proper training; and I know that’s true because the whole world used to run (mostly) unix on the desktop before corporate took over. Unix doesn’t need to be windowsified/macosified to get people to move over; people need to unlearn the interfaces corporate has brainwashed them with for generations. There are so many more interesting user interfaces than just what Windows and MacOS provide; graphical or otherwise.