Emergencia... ¡OpenBSD!
- (pensando) ¡Cáspitas! me pillan en fuera de juego, no he hecho los deberes... hums (click), interesante (click), probemos:
$ date
Fri Nov 24 17:19:46 CET 2006
$ wget -mc ftp://ftp.zedz.net/pub/OpenBSD.snapshot/openbsd40-i386-06-11-24.iso
...
$ wget -mc ftp://ftp.zedz.net/pub/OpenBSD.snapshot/openbsd40-i386-06-11-24.iso
...
Length: 249,708,544 (238M)
100%[====================================>] 249,708,544 605.12K/s ETA 00:00
$ burncd -f /dev/acd0 -s 16 -e data openbsd40-i386-06-11-24.iso fixate
next writeable LBA 0
writing from file openbsd40-i386-06-11-24.iso size 243856 KB
written this track 243856 KB (100%) total 243856 KB
$ date
Fri Nov 24 17:31:09 CET 2006
- ¡Instalado!, reiniciamos...
$ ssh root@192.168.1.58 -C
Welcome to OpenBSD: The proactively secure Unix-like operating system.
Terminal type? [xterm]
# date
Fri Nov 24 17:39:16 CET 2006
# sysctl net.inet.ip.forwarding=1
# grep ip.forwarding /etc/sysctl.conf
net.inet.ip.forwarding=1 # 1=Permit forwarding (routing) of IPv4 packets
#
# cat /etc/pf.conf
# Macros
loop="lo0"
ext_if="rl0"
int_if="fxp0"
int_net="192.168.10.0/24"
# Opciones
set optimization normal # Tiempo medio de ruptura de conexiones
set block-policy return # Las peticiones a puertos bloqueados son devueltas
set skip on $loop # No tratar el dispositivo loopback con pf
# Normalizacion de trafico
scrub in all
# Regla de NAT
nat on $ext_if from $int_net to any -> ($ext_if)
# echo 'pf=YES' >> /etc/rc.conf.local
# pfctl -e
pf enabled
# date
Fri Nov 24 17:47:09 CET 2006
# ^D
Connection to 192.168.1.58 closed.