Files
oam/knowledge base/turris os.md
2023-07-14 23:01:16 +02:00

15 KiB

Turris OS

Linux distribution based on top of OpenWrt. Check the website for more information.

Table of contents

  1. TL;DR
  2. LED diodes settings
    1. Automatic overnight dimming
  3. Local DNS resolution
  4. Static DHCP leases and hostnames
  5. Containers
    1. Create new containers
    2. Assign containers a static IP address
    3. Start containers
    4. Execute a shell into containers
    5. Start containers at boot
    6. Examples
      1. CFEngine hub
      2. Git server
      3. Pi-hole
  6. Hardening
  7. The SFP+ caged module
    1. Use the SFP module as a LAN port
  8. Further readings
  9. Sources

TL;DR

# Show settings.
uci show
uci show 'dhcp'

# Show what interface is the WAN.
uci show network.wan.device | cut -d "'" -f 2

# Configure a static IP address lease.
uci add dhcp host
uci set dhcp.@host[-1].name='hostname'
uci set dhcp.@host[-1].mac='11:22:33:44:55:66'
uci set dhcp.@host[-1].ip='192.168.1.2'

# Show changes to the settings.
uci changes
uci changes 'dhcp'

# Commit changes.
uci commit
uci commit 'dhcp'

# Reload the configuration.
# Necessary to reflect changes to the settings.
reload_config
luci-reload

# Get LEDs intensity.
rainbow brightness -q

# Set LEDs intensity.
# 0 to 8 normally, 0 to 255 using '-p'.
rainbow brightness '5'
rainbow brightness -p '100'

# Manage services.
/etc/init.d/sshd restart

# Gracefully reboot the device.
reboot

# Gracefully shutdown the device.
poweroff

# Create LXC containers.
lxc-create --name 'ubuntu-focal' --template 'download' -- --dist 'Ubuntu' --release 'Focal' --arch 'armv7l' --server 'repo.turris.cz/lxc'
lxc-create … -t 'download' -- --dist 'debian' --release 'bullseye' --arch 'armhf' --server 'images.linuxcontainers.org'

# List snapshots.
schnapps list

# Create snapshots.
schnapps create 'description'
schnapps create -t 'pre' 'description'

# Change snapshots' information.
schnapps modify '4' -t 'time' -d 'new description'

# Rollback to a snapshot.
schnapps rollback '2'

# Delete snapshots by number.
schnapps delete '3'

# Delete snapshots by type.
schnapps delete -t 'post'

LED diodes settings

A permanent change of color can be set in the UCI configuration file /etc/config/rainbow.

The rainbow utility allows one to change the color and set the status of each diode individually. The setting are disable (off), enable (on) or auto; auto leaves the control of the diodes to the hardware, like blinking during data transfer and so on.

rainbow's brightness subcommand uses numbers from 0 to 8, or from 0 to 255 if using the -p switch for higher precision.

Automatic overnight dimming

Should you want to see the state of individual devices during day but not to be dazzled by the diodes in the night, you can automatically adjust the intensity of LEDs using a cronjob.

Create a text file in the /etc/cron.d directory:

# File /etc/cron.d/rainbow_night.
# Set the light intensity to the second lowest degree every day at 11 PM and set
# it back to maximum every day at 7 AM.
MAILTO=""   # avoid automatic logging of the output
0  23  *  *  *  root   rainbow brightness 1
0   7  *  *  *  root   rainbow brightness 5

Local DNS resolution

Turris OS can answer DNS queries for local devices.

Requires the Network Settings > DNS > Enable DHCP clients in DNS option to be enabled.

Static DHCP leases and hostnames

When assigning static DHCP leases LuCI only requires the IP and MAC addresses, while reForis will also:

  • require a unique hostname for each entry
  • set the lease time to infinite

Setting a hostname in an entry will make Turris OS resolve the IP address only with that given hostname (and not the name the host presents itself with).
Not setting a hostname in an entry will make Turris OS resolve the IP address with the name the host presents itself with.

CLI procedure:

uci add dhcp host
uci set dhcp.@host[-1].name='paracelsus'
uci set dhcp.@host[-1].mac='11:22:33:44:55:66'
uci set dhcp.@host[-1].ip='192.168.1.200'
uci commit 'dhcp'
reload_config
luci-reload

Containers

Some packages are not available in opkg's repository, but containers can replace them.
This is particularly useful to run services off the system which are not officially supported (like Pi-hole).

At the time of writing LXC is the only container runtime supported in Turris OS, and this guide will assume one is using it.
This requires the lxc package to be installed.

It is highly suggested to use an expansion disk to store any container, but specially any one I/O heavy.

The procedure to have a working container is as follows:

  1. Create a new container.
  2. Optionally, assign it a static IP address.
    This is particularly suggested in case of services.
  3. Start the container.
  4. Execute a shell to enter it and set it all up.
    See the configuration examples below.
  5. Check all is working as expected.
  6. If you changed the container's hostname from inside if, restart it for good measure.
  7. Set the container to start at boot if required.

Details for all actions are explained in the next sections.
Unless otherwise specified:

  • All shell commands need to be executed from Turris OS.
  • All WebUI actions need to be taken from LuCI.
    At the time of writing reForis does not have a way to manage containers.

Create new containers

In shell:

# Default source is 'repo.turris.cz/lxc'.
lxc-create --name 'test' --template 'download'
lxc-create -n 'pi-hole' -t 'download' -- --dist 'debian' --release 'bullseye' --arch 'armhf' --server 'images.linuxcontainers.org'

Using the WebUI:

  1. Navigate to the Services > LXC Containers page.
  2. In the Create New Container section, give it a name and choose its template.
  3. Click the Create button under Actions.

Assign containers a static IP address

In shell:

uci add dhcp host
uci set dhcp.@host[-1].name='pi-hole'
uci set dhcp.@host[-1].mac="$(grep 'hwaddr' '/srv/lxc/pi-hole/config' | sed 's/.*= //')"
uci set dhcp.@host[-1].ip='192.168.111.2'
uci commit 'dhcp'
reload_config
luci-reload

Using the WebUI:

  1. Get the container's MAC address:

    1. Navigate to the Services > LXC Containers page.
    2. In the dropdown menu for the container, choose configure.
    3. Grab the MAC address from the textbox.
  2. Navigate to the Network > DHCP and DNS page.

  3. In the Static Leases tab, assign a new lease to the container's MAC address.

Start containers

In shell:

lxc-start --name 'pi-hole'

# Check it's running correctly.
lxc-info --name 'pi-hole'

Using the WebUI:

  1. Navigate to the Services > LXC Containers page.
  2. In the Available Containers section, click the Start button under Actions.

Execute a shell into containers

In shell:

lxc-attach --name 'pi-hole'

Start containers at boot

vim '/etc/config/lxc-auto'
config container
      option name pi-hole
      option timeout 60

Examples

CFEngine hub

CFEngine does not seem to support 32bits ARM processors (but it does support arm64) anymore.

Old installation test

This procedure assumes an LXC container based upon Debian Bullseye.

# Set the correct hostname.
hostnamectl set-hostname 'cfengine'

# Install CFEngine and the SSH server.
# Also install `unattended-upgrades` to ease updates management.
DEBIAN_FRONTEND='noninteractive' apt-get install --assume-yes 'cfengine3' 'openssh-server' 'unattended-upgrades'

# Set up passwordless authentication.
mkdir "${HOME}/.ssh" && chmod '700' "${HOME}/.ssh"
echo 'ssh-…' >> "${HOME}/.ssh/authorized_keys" && chmod '600' "${HOME}/.ssh/authorized_keys"

Git server

This procedure assumes an LXC container based upon Debian Bullseye.

# Set the correct hostname.
hostnamectl set-hostname 'git'

# Install Git and the SSH server.
# Also install `unattended-upgrades` to ease updates management.
DEBIAN_FRONTEND='noninteractive' apt-get install --assume-yes 'git' 'openssh-server' 'unattended-upgrades'

# (Optionally) configure the SSH server.
vim '/etc/ssh/sshd_config'
systemctl restart 'ssh.service'

# Create the git user.
adduser 'git'

# Set up passwordless authentication.
mkdir '/home/git/.ssh' && sudo chmod '700' '/home/git/.ssh'
touch '/home/git/.ssh/authorized_keys' && sudo chmod '600' '/home/git/.ssh/authorized_keys'
echo 'ssh-…' >> '/home/git/.ssh/authorized_keys'

# (Optionally) create the repositories' root directory.
mkdir '/home/git/repositories'

# Make sure the 'git' user has the correct permissions on the folders.
chown -R 'git' '/home/git'

# (Optionally) lock down the git user.
# This will *prevent* clients to set their SSH key using `ssh-copy-id`.
chsh 'git' -s "$(which 'git-shell')"

# All done!
exit

Pi-hole

This procedure assumes an LXC container based upon Debian Bullseye.

See Installing pi-hole on Turris Omnia, Install Pi-hole and Pi-Hole on Turris Omnia for details.

Install and configure Pi-hole in the container:

# Set the correct hostname.
hostnamectl set-hostname 'pi-hole'

# Install pi-hole.
DEBIAN_FRONTEND='noninteractive' apt-get install --assume-yes 'ca-certificates' 'curl' 'unattended-upgrades'
curl -sSL 'https://install.pi-hole.net' | bash

# Follow the guided procedure.

# Change the Web interface password, if needed.
/etc/.pihole/pihole -a -p

# Update pi-hole as a whole, if needed.
/etc/.pihole/pihole -up

# Set the router as the primary DNS server.
sed -E -i.bak 's|^#?\s*DNS\s*=\s*.*$|DNS=192.168.1.1|' '/etc/systemd/resolved.conf'

# Set Cloudflare as the fallback DNS server.
# Optional.
sed -E -i.bak 's|^#?\s*FallbackDNS\s*=\s*.*$|FallbackDNS=1.1.1.1 1.0.0.1 2606:4700:4700::1111 2606:4700:4700::1001 # Cloudflare|' '/etc/systemd/resolved.conf'

# Set the interface to ignore DNS lists given by the DHCP server.
cp '/etc/systemd/network/eth0.network' '/etc/systemd/network/eth0.network.bak'
cat >> '/etc/systemd/network/eth0.network' <<EOF
[DHCP]
UseDNS=false
EOF

Finish setting up the container as explained above.
Then, in Turris OS:

# Distribute pi-hole as the primary DNS.
# Keep the router as secondary.
uci set dhcp.lan.dhcp_option='6,192.168.111.2,192.168.111.1'

# The DNS server address in the IPv6 RA should be the container's ULA address
# since the global routable IPv6 address tend to change daily.
uci add_list dhcp.lan.dns="$(lxc-info --name pi-hole | grep -E 'IP.* f[cd]' | sed 's/IP: *//')"

# Apply the new configuration.
uci commit 'dhcp' && reload_config && luci-reload
/etc/init.d/odhcpd restart
/etc/init.d/dnsmasq restart

Hardening

Suggestions:

  • SSH:
    • Change the SSH port from the default 22 value.
    • Restrict login to specific IP addresses.
    • Restrict authentication options to keys.

The SFP+ caged module

List of supported SFP modules.

The physical WAN port and the SFP module cage are wired to a single controller; when a SFP module is inserted, the physical WAN port will be disabled, and the virtual WAN interface will automatically be switched to the SFP module.

When the OS is installed, it will probably miss the SFP kernel modules.
Check the module is recognized by the system like so:

  1. Insert the module in the cage.

  2. Check the module has been recognized automatically:

    dmesg | grep 'sfp'
    
  3. If the grep returned results:

    [   7.823007] sfp sfp: Host maximum power 3.0W
    [   8.167128] sfp sfp: Turris  RTSFP-10G  rev A  sn 1234567890  dc 123456
    

    the SFP module is recognized and probably started working already right away.
    If, instead, no result has been returned:

    1. Make sure the SFP kernel modules are installed:

      opkg install 'kmod-spf'
      
    2. Reboot (for safety).

    3. Check the module has been recognized (see point 2 in this list).

Use the SFP module as a LAN port

To use the SFP module as a LAN port, assign any other physical switch port to the virtual WAN interface to use that as the WAN connection and the SFP module in the LAN.

In the Foris web interface:

  1. Go to Network Settings > Interfaces.
  2. Select the WAN interface.
  3. In the dropdown Network menu, change WAN to LAN.
  4. Select the LAN4 interface.
  5. In the dropdown Network menu, change LAN to WAN.
  6. Hit Save.

In the LuCI web interface:

  1. Go to Network > Interfaces.
  2. In the Interfaces tab, edit the WAN interface and assign the lan4 port to it.
  3. In the Devices tab, edit the br-lan bridge device to include the port used by the SFP module (on mine, it was eth2).
  4. Hit Save & Apply.

Using the CLI (yet to be tested):

uci set network.wan.device='lan4'
uci del_list network.br_lan.ports='lan4'
uci add_list network.br_lan.ports='eth2'
uci commit 'network'
reload_config
luci-reload

Further readings

Sources

All the references in the further readings section, plus the following: