17 KiB
Turris OS
Linux distribution based on top of OpenWrt. Check the website for more information.
- TL;DR
- LED diodes settings
- Local DNS resolution
- Static DHCP leases and hostnames
- Containers
- Hardening
- The SFP+ caged module
- Further readings
- Sources
TL;DR
# Show settings.
uci show
uci show 'dhcp'
# Show what interface is the WAN.
uci show network.wan.device | cut -d "'" -f 2
# Configure a static IP address lease.
uci add dhcp host
uci set dhcp.@host[-1].name='hostname'
uci set dhcp.@host[-1].mac='11:22:33:44:55:66'
uci set dhcp.@host[-1].ip='192.168.1.2'
# Show changes to the settings.
uci changes
uci changes 'dhcp'
# Commit changes.
uci commit
uci commit 'dhcp'
# Reload the configuration.
# Necessary to reflect changes to the settings.
reload_config
luci-reload
# Get LEDs intensity.
rainbow brightness -q
# Set LEDs intensity.
# 0 to 8 normally, 0 to 255 using '-p'.
rainbow brightness '5'
rainbow brightness -p '100'
# Manage services.
/etc/init.d/sshd restart
# Gracefully reboot the device.
reboot
# Gracefully shutdown the device.
poweroff
# Get the current temperature.
cat '/sys/class/thermal/thermal_zone0/temp'
sensors
# List available LXC container images.
# Default source is 'repo.turris.cz/lxc'.
lxc-create -n 'test' -t 'download'; lxc-destroy -n 'test'
lxc-create … -t 'download' -- --server 'images.linuxcontainers.org'
# Create LXC containers.
# Default source is 'repo.turris.cz/lxc'.
# Values are case sensitive and depend from what is on the server.
lxc-create -n 'alpine' -t 'download' -- -d 'Alpine' -r '3.18' -a 'armv7l'
lxc-create --name 'ubuntu-focal' --template 'download' -- \
--server 'repo.turris.cz/lxc' \
--dist 'Ubuntu' --release 'Focal' --arch 'armv7l'
# List snapshots.
schnapps list
# Create snapshots.
schnapps create 'description'
schnapps create -t 'pre' 'description'
# Change snapshots' information.
schnapps modify '4' -t 'time' -d 'new description'
# Rollback to a snapshot.
schnapps rollback '2'
# Delete snapshots by number.
schnapps delete '3'
# Delete snapshots by type.
schnapps delete -t 'post'
LED diodes settings
Permanent changes can be set in /etc/config/rainbow, the UCI configuration file.
The rainbow utility allows to change the color and set the status of each diode individually.
The setting are disable (off), enable (on) or auto; auto leaves the control of the diodes to the hardware, like
blinking during data transfer and so on.
rainbow's brightness subcommand uses numbers from 0 to 8, or from 0 to 255 if using the -p switch for higher
precision.
Automatic overnight dimming
Automatically adjust the intensity of LEDs using a cronjob to be able to see the state of individual devices during the day, but not to be dazzled by the diodes in the night.
Create the cron file in the /etc/cron.d directory:
# File /etc/cron.d/rainbow_night.
# Set the light intensity to the second lowest degree every day at 11 PM and set
# it back to maximum every day at 7 AM.
MAILTO="" # avoid automatic logging of the output
0 23 * * * root rainbow brightness -p 3
0 7 * * * root rainbow brightness 5
Local DNS resolution
Turris OS can answer DNS queries for local devices.
Requires the Network Settings > DNS > Enable DHCP clients in DNS option to be enabled.
Static DHCP leases and hostnames
When assigning static DHCP leases LuCI only requires the IP and MAC addresses, while reForis will also:
- require a unique hostname for each entry
- set the lease time to infinite
Setting a hostname in an entry will make Turris OS resolve the IP address only with that given hostname (and not
the name the host presents itself with).
Not setting a hostname in an entry will make Turris OS resolve the IP address with the name the host presents itself
with.
CLI procedure:
uci add dhcp host
uci set dhcp.@host[-1].name='paracelsus'
uci set dhcp.@host[-1].mac='11:22:33:44:55:66'
uci set dhcp.@host[-1].ip='192.168.1.200'
uci commit 'dhcp'
reload_config
luci-reload
Containers
Some packages are not available in opkg's repository, but containers can replace them.
This is particularly useful to run services off the system which are not officially supported (like Pi-hole).
At the time of writing LXC is the only container runtime supported in Turris OS, and this guide will assume one is
using it.
This requires the lxc package to be installed.
It is highly suggested to use an expansion disk to store any container, but specially any one I/O heavy.
The procedure to have a working container is as follows:
- Create a new container.
- Optionally, assign it a static IP address.
This is particularly suggested in case of services. - Start the container.
- Execute a shell to enter it and set it all up.
See the configuration examples below. - Check all is working as expected.
- If you changed the container's hostname from inside if, restart it for good measure.
- Set the container to start at boot if required.
Details for all actions are explained in the next sections.
Unless otherwise specified:
- All shell commands need to be executed from Turris OS.
- All WebUI actions need to be taken from LuCI.
At the time of writing reForis does not have a way to manage containers.
Create new containers
In shell:
# List available LXC container images.
# Default source is 'repo.turris.cz/lxc'.
lxc-create -n 'test' -t 'download'; lxc-destroy -n 'test'
lxc-create … -t 'download' -- --server 'images.linuxcontainers.org'
# Create LXC containers.
# Default source is 'repo.turris.cz/lxc'.
# Values are case sensitive and depend from what is on the server.
lxc-create -n 'pi-hole' -t 'download' -- -d 'Debian' -r 'Bullseye' -a 'armv7l'
lxc-create --name 'pi-hole' --template 'download' -- \
--server 'repo.turris.cz/lxc' \
--dist 'Ubuntu' --release 'Focal' --arch 'armv7l'
Using the WebUI:
- Navigate to the Services > LXC Containers page.
- In the Create New Container section, give it a name and choose its template.
- Click the Create button under Actions.
Assign containers a static IP address
In shell:
uci add dhcp host
uci set dhcp.@host[-1].name='pi-hole'
uci set dhcp.@host[-1].mac="$(grep 'hwaddr' '/srv/lxc/pi-hole/config' | sed 's/.*= //')"
uci set dhcp.@host[-1].ip='192.168.111.2'
uci commit 'dhcp'
reload_config
luci-reload
Using the WebUI:
-
Get the container's MAC address:
- Navigate to the Services > LXC Containers page.
- In the dropdown menu for the container, choose configure.
- Grab the MAC address from the textbox.
-
Navigate to the Network > DHCP and DNS page.
-
In the Static Leases tab, assign a new lease to the container's MAC address.
Start containers
In shell:
lxc-start --name 'pi-hole'
# Check it's running correctly.
lxc-info --name 'pi-hole'
Using the WebUI:
- Navigate to the Services > LXC Containers page.
- In the Available Containers section, click the Start button under Actions.
Execute a shell into containers
In shell:
lxc-attach --name 'pi-hole'
Start containers at boot
vim '/etc/config/lxc-auto'
config container
option name pi-hole
option timeout 60
Example: cfengine hub
CFEngine does not seem to support 32bits ARM processors anymore (but it does support arm64).
Still, since I am using a 32bit processor this is not doable for me.
Old installation test
This procedure assumes you are using an LXC container based on the Debian Bullseye image.
# Set the correct hostname.
hostnamectl set-hostname 'cfengine'
# Install CFEngine and the SSH server.
# Also install `unattended-upgrades` to ease updates management.
DEBIAN_FRONTEND='noninteractive' apt-get install --assume-yes 'cfengine3' 'openssh-server' 'unattended-upgrades'
# Set up passwordless authentication.
mkdir "${HOME}/.ssh" && chmod '700' "${HOME}/.ssh"
echo 'ssh-…' >> "${HOME}/.ssh/authorized_keys" && chmod '600' "${HOME}/.ssh/authorized_keys"
Example: basic, stripped git server
This procedure assumes you are using an LXC container based on the Debian Bullseye image.
# Set the correct hostname.
hostnamectl set-hostname 'git'
# Install Git and the SSH server.
# Also install `unattended-upgrades` to ease updates management.
DEBIAN_FRONTEND='noninteractive' apt-get install --assume-yes 'git' 'openssh-server' 'unattended-upgrades'
# (Optionally) configure the SSH server.
vim '/etc/ssh/sshd_config'
systemctl restart 'ssh.service'
# Create the git user.
adduser 'git'
# Set up passwordless authentication.
mkdir '/home/git/.ssh' && sudo chmod '700' '/home/git/.ssh'
touch '/home/git/.ssh/authorized_keys' && sudo chmod '600' '/home/git/.ssh/authorized_keys'
echo 'ssh-…' >> '/home/git/.ssh/authorized_keys'
# (Optionally) create the repositories' root directory.
mkdir '/home/git/repositories'
# Make sure the 'git' user has the correct permissions on the folders.
chown -R 'git' '/home/git'
# (Optionally) lock down the git user.
# This will *prevent* clients to set their SSH key using `ssh-copy-id`.
chsh 'git' -s "$(which 'git-shell')"
# All done!
exit
Example: gitea
This procedure assumes you are using an LXC container based on LinuxContainers' Alpine 3.20 image:
lxc-create --name 'gitea' --template 'download' -- \ --server 'images.linuxcontainers.org' --dist 'alpine' --release '3.20' --arch 'armhf'
# Set the correct hostname.
# Should be already set correctly.
echo 'gitea' > '/etc/hostname'
hostname -F '/etc/hostname'
# Install Gitea.
apk add 'gitea' 'gitea-openrc'
# Start Gitea.
rc-update add 'gitea'
rc-service 'gitea' start
# Connect to 'gitea:3000' to start the first-time installation wizard.
Example: monitoring
This procedure assumes you are using an LXC container based on the Debian Bullseye image.
# Set the correct hostname.
hostnamectl set-hostname 'monitoring'
# Install the requirements
DEBIAN_FRONTEND='noninteractive' apt-get install --assume-yes 'unattended-upgrades' 'wget'
# Stop installing recommended and suggested packages.
cat > /etc/apt/apt.conf.d/99norecommend << EOF
APT::Install-Recommends "0";
APT::Install-Suggests "0";
EOF
# Add Grafana's repository with its key.
wget -q -O /usr/share/keyrings/grafana.key https://apt.grafana.com/gpg.key
echo "deb [signed-by=/usr/share/keyrings/grafana.key] https://apt.grafana.com stable main" | tee -a /etc/apt/sources.list.d/grafana.list
# Install Prometheus and Grafana.
apt update
DEBIAN_FRONTEND='noninteractive' apt-get install --assume-yes 'grafana-enterprise' 'prometheus'
# Configure Prometheus and Grafana.
# See the '/docker/monitoring' example.
# Enable the services.
systemctl enable 'grafana-server.service'
systemctl enable 'prometheus.service'
# All done!
exit
Example: pi-hole
This procedure assumes you are using an LXC container based on the Debian Bullseye image.
See Installing pi-hole on Turris Omnia, Install Pi-hole and Pi-Hole on Turris Omnia for details.
Install and configure Pi-hole in the container:
# Set the correct hostname.
hostnamectl set-hostname 'pi-hole'
# Install pi-hole.
DEBIAN_FRONTEND='noninteractive' apt-get install --assume-yes 'ca-certificates' 'curl' 'unattended-upgrades'
curl -sSL 'https://install.pi-hole.net' | bash
# Follow the guided procedure.
# Change the Web interface password, if needed.
/etc/.pihole/pihole -a -p
# Update pi-hole as a whole, if needed.
/etc/.pihole/pihole -up
# Set the router as the primary DNS server.
sed -E -i.bak 's|^#?\s*DNS\s*=\s*.*$|DNS=192.168.1.1|' '/etc/systemd/resolved.conf'
# Set Cloudflare as the fallback DNS server.
# Optional.
sed -E -i.bak 's|^#?\s*FallbackDNS\s*=\s*.*$|FallbackDNS=1.1.1.1 1.0.0.1 2606:4700:4700::1111 2606:4700:4700::1001 # Cloudflare|' '/etc/systemd/resolved.conf'
# Set the interface to ignore DNS lists given by the DHCP server.
cp '/etc/systemd/network/eth0.network' '/etc/systemd/network/eth0.network.bak'
cat >> '/etc/systemd/network/eth0.network' <<EOF
[DHCP]
UseDNS=false
EOF
Finish setting up the container as explained above.
Then, in Turris OS:
# Distribute pi-hole as the primary DNS.
# Keep the router as secondary.
uci set dhcp.lan.dhcp_option='6,192.168.111.2,192.168.111.1'
# The DNS server address in the IPv6 RA should be the container's ULA address
# since the global routable IPv6 address tend to change daily.
uci add_list dhcp.lan.dns="$(lxc-info --name pi-hole | grep -E 'IP.* f[cd]' | sed 's/IP: *//')"
# Apply the new configuration.
uci commit 'dhcp' && reload_config && luci-reload
/etc/init.d/odhcpd restart
/etc/init.d/dnsmasq restart
Hardening
See:
The SFP+ caged module
List of supported SFP modules.
The physical WAN port and the SFP module cage are wired to a single controller; when a SFP module is inserted, the physical WAN port will be disabled, and the virtual WAN interface will automatically be switched to the SFP module.
When the OS is installed, it will probably miss the SFP kernel modules.
Check the module is recognized by the system like so:
-
Insert the module in the cage.
-
Check the module has been recognized automatically:
dmesg | grep 'sfp' -
If the
grepreturned results:[ 7.823007] sfp sfp: Host maximum power 3.0W [ 8.167128] sfp sfp: Turris RTSFP-10G rev A sn 1234567890 dc 123456the SFP module is recognized and probably started working already right away.
If, instead, no result has been returned:-
Make sure the SFP kernel modules are installed:
opkg install 'kmod-spf' -
Reboot (for safety).
-
Check the module has been recognized (see point 2 in this list).
-
Use the SFP module as a LAN port
To use the SFP module as a LAN port, assign any other physical switch port to the virtual WAN interface to use that as the WAN connection and the SFP module in the LAN.
In the Foris web interface:
- Go to Network Settings > Interfaces.
- Select the WAN interface.
- In the dropdown Network menu, change WAN to LAN.
- Select the LAN4 interface.
- In the dropdown Network menu, change LAN to WAN.
- Hit Save.
In the LuCI web interface:
- Go to Network > Interfaces.
- In the Interfaces tab, edit the WAN interface and assign the lan4 port to it.
- In the Devices tab, edit the br-lan bridge device to include the port used by the SFP module (on mine, it was
eth2). - Hit Save & Apply.
Using the CLI (yet to be tested):
uci set network.wan.device='lan4'
uci del_list network.br_lan.ports='lan4'
uci add_list network.br_lan.ports='eth2'
uci commit 'network'
reload_config
luci-reload
Further readings
- Website
- Turris' official documentation
- Turris' wiki
- How to control LED diodes
- Factory reset on Turris Omnia
- Supported SFP modules
- Home NAS
- OpenWrt
opkg- UCI
- LXC
Sources
All the references in the further readings section, plus the following: