diff options
author | Lain Soykaf <lain@lain.com> | 2024-05-28 12:31:12 +0400 |
---|---|---|
committer | Lain Soykaf <lain@lain.com> | 2024-05-28 12:31:12 +0400 |
commit | 3b4be5daa2c24d674665d6bc490e5d8f0878dd6e (patch) | |
tree | eca0c6d7754dd4c824f32cb262fe2d815400bcec /docs/installation/openbsd_en.md | |
parent | 6e51845d44cd0cee89d9ad17faee4754435d582e (diff) | |
parent | 25903a4996d12306d454be960a0a7478541b1879 (diff) | |
download | pleroma-3b4be5daa2c24d674665d6bc490e5d8f0878dd6e.tar.gz pleroma-3b4be5daa2c24d674665d6bc490e5d8f0878dd6e.zip |
Merge branch 'develop' of git.pleroma.social:pleroma/pleroma into pleroma-secure-mode
Diffstat (limited to 'docs/installation/openbsd_en.md')
-rw-r--r-- | docs/installation/openbsd_en.md | 8 |
1 files changed, 6 insertions, 2 deletions
diff --git a/docs/installation/openbsd_en.md b/docs/installation/openbsd_en.md index c80c8f678..e58e144d2 100644 --- a/docs/installation/openbsd_en.md +++ b/docs/installation/openbsd_en.md @@ -62,7 +62,7 @@ rcctl start postgresql To check that it started properly and didn't fail right after starting, you can run `ps aux | grep postgres`, there should be multiple lines of output. #### httpd -httpd will have three fuctions: +httpd will have three functions: * redirect requests trying to reach the instance over http to the https URL * serve a robots.txt file @@ -195,6 +195,10 @@ rcctl enable relayd rcctl start relayd ``` +##### (Strongly recommended) serve media on another domain + +Refer to the [Hardening your instance](../configuration/hardening.md) document on how to serve media on another domain. We STRONGLY RECOMMEND you to do this to minimize attack vectors. + #### pf Enabling and configuring pf is highly recommended. In /etc/pf.conf, insert the following configuration: @@ -221,7 +225,7 @@ pass in quick on $if inet6 proto icmp6 to ($if) icmp6-type { echoreq unreach par pass in quick on $if proto tcp to ($if) port { http https } # relayd/httpd pass in quick on $if proto tcp from $authorized_ssh_clients to ($if) port ssh ``` -Replace *<network interface\>* by your server's network interface name (which you can get with ifconfig). Consider replacing the content of the authorized\_ssh\_clients macro by, for exemple, your home IP address, to avoid SSH connection attempts from bots. +Replace *<network interface\>* by your server's network interface name (which you can get with ifconfig). Consider replacing the content of the authorized\_ssh\_clients macro by, for example, your home IP address, to avoid SSH connection attempts from bots. Check pf's configuration by running `pfctl -nf /etc/pf.conf`, load it with `pfctl -f /etc/pf.conf` and enable pf at boot with `rcctl enable pf`. |