There are currently a couple of known issues.
Your VM is a clean install of OpenBSD 7.6-release + errata. You can ssh into it:
vmXX$ ssh username@XXX.XXX.XXX.XXX OpenBSD 7.6 (GENERIC) #332: Mon Sep 30 08:45:17 MDT 2024 ... vmXX$
Get the password from ~/.ssh/authorized_keys
and switch to root
.
vmXX$ awk '{print$NF}' .ssh/authorized_keys XXXXXXXXXXXXXXXXXXXXXXXXXX vmXX$ su - Password: vmXX#
Add your username to /etc/doas.conf
:
vmXX# echo 'permit username' > /etc/doas.conf vmXX# echo 'permit nopass keepenv root as root' >> /etc/doas.conf vmXX#
All errate should be applied, but you can check 7.6 errata and apply available patches.
vmXX# syspatch ... Relinking to create unique kernel... done; reboot to load the new kernel Errata can be reviewed under /var/syspatch vmXX# reboot Connection to XXX.XXX.XXX.XXX closed by remote host.
Preventing password logins to your VM with ssh. (optional)
vmXX# rcctl set sshd flags -o PasswordAuthentication=no vmXX# rcctl restart sshd vmXX#
Easily set and manage your PTR / Reverse DNS records.
Protect your important data with our Backup Service.
To get connected to the console you need to have access to the host your VM is running on. The same username and public SSH key, as provided for the VM, are used to create a local user on the host.
All SSH fingerprints (SSHFP) records of all the hosts are added to DNS. You can verify the SSH fingerprint by adding “-o VerifyHostKeyDNS=yes” to the ssh command.
$ ssh -e none -p PORT -o VerifyHostKeyDNS=yes serverXX.openbsd.amsterdam The authenticity of host '[serverXX.openbsd.amsterdam]' can't be established. ED25519 key fingerprint is SHA256:Wi1k5YbFY+o0y4ygaRmsI9+S/0k5FB3OvgKCvtaHS/k. Matching host key fingerprint found in DNS. Are you sure you want to continue connecting (yes/no/[fingerprint])? yes ... serverXX$
You can also use mosh to connect to the host. We added a short write-up on how to use mosh on your own VM.
When this is done you can use vmctl(8) to manage your VM.
The options you have are:
serverXX$ vmctl console vmXX serverXX$ vmctl stop [-fw] vmXX serverXX$ vmctl start [-c] vmXX serverXX$ vmctl start [-c] [-b path] vmXX
-f
Forcefully stop the VM without attempting a graceful shutdown.
-w
Wait until the VM has been terminated.
-c
Automatically connect to the VM console.
-b path
Boot the VM with the specified OpenBSD kernel. For example /var/vmm/bsd.rd.
~.
To exit the console, which uses cu(1)
Note: id can also be your VM name.