Debian/Ubuntu Tips and Tricks

Debuntu

Debian/Ubuntu Tips and Tricks

Archive for the 'System' Category

How Tos on running a debian/ubuntu linux system from getting over troubles, configuring X, bash scripting… Anything related to your local system.

How-To: Apache2 authentication using MySQL backend — page 2

Posted by chantra on 17th December 2008

This entry is part 1 of 2 in the series How-To: Apache2 authentication using MySQL backend

3. Creating users

Here we will be using sha1 password. To create a password, you can use the following command:

# echo -n 'password' | sha1sum
5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 -

Read the rest of this entry »

Tags: , , ,
Posted in Administration, HowTo, HTTP, Networking, System | 5 Comments »

How-To: Apache2 authentication using MySQL backend

Posted by chantra on 17th December 2008

This entry is part 1 of 2 in the series How-To: Apache2 authentication using MySQL backend

this tutorial will explain how to use a MySQL backend in order to authentication users against your Apache website.

To achieve this we will use Apache2 and its auth_mysql module.

Read the rest of this entry »

Tags: , , ,
Posted in Administration, HowTo, HTTP, Networking, System | 1 Comment »

How-To: Setting up BGP on Vyatta — page 3 — Setting BGP

Posted by chantra on 2nd November 2008

This entry is part 3 of 3 in the series How-To: Setting up BGP on Vyatta

3. Setting BGP

As told earlier on, vyatta-bgp1 will advertise AS 1 with network 1.1.1.0/24 to its neighbor vyatta-bgp2 handling AS 2
and
vyatta-bgp2 will advertise AS 2 with network 2.2.2.0/24 to its neighbor vyatta-bgp1 handling AS 1

They will use a common password for this communication, which is BGPtutorial.

Read the rest of this entry »

Tags: ,
Posted in Administration, HowTo, Networking, Softwares, System | No Comments »

How-To: Setting up BGP on Vyatta — page 2 — Network interfaces

Posted by chantra on 1st November 2008

This entry is part 2 of 3 in the series How-To: Setting up BGP on Vyatta

2. Setting the network interfaces

During this part, we are going to set up the 2 Border Gateway routers'network interfaces. In vyatta world, you need to enter the interactive configuration shell by typing:

Read the rest of this entry »

Tags: ,
Posted in Administration, HowTo, Networking, Softwares, System | No Comments »

How-To: Setting up BGP on Vyatta

Posted by chantra on 1st November 2008

This entry is part 1 of 3 in the series How-To: Setting up BGP on Vyatta

Vyatta is a Linux based distro that ease the set up of VPN, Routers, antivirus.... It has a really small footprint on your system as it only requires something like 800M to be installed and is based on Debian. On the top of that, it offers configuration wrappers to facilitate service settings.

This tutorial will explain how to set up 2 Border Gateway Protocol (BGP) boxes to route the traffic from one Autonomous System (AS) to the other using Vyatta.
Vyatta Community Edition 4.1.4 was used during this set up.

Read the rest of this entry »

Tags: ,
Posted in Administration, HowTo, Networking, Softwares, System | No Comments »

How-To: Bzr over ssh with no bzr server

Posted by chantra on 21st August 2008

Bazaar (bzr) is a distributed version control system (VCS) sponsored by Canonical and thus bzr is widely used by the Ubuntu community.

Like any vcs, bzr will let you track the different version of your code locally and let you push the changes to a remote server.

One cool feature of bzr is that you can maintain a remote copy of your code history without having a bzr server running, nor having a copy of bzr on the remote server running and simply by using ssh to transport the data.

This tutorial will not explain how bzr works, but will show the couple few step to create your local repository, add a few files, commit the changes, push them to a remote server and copy the branch newly created to another machine.

Read the rest of this entry »

Tags: , ,
Posted in Administration, HowTo, Softwares, System | No Comments »

How-To: encrypted partitions over LVM with LUKS — page 3 — install and config

Posted by chantra on 12th July 2008

This entry is part 3 of 3 in the series How-To: encrypted partitions over LVM with LUKS

4. Installing the system

we are now going to install the distro over our layout. Start the installer and make sure you choose manual partitioning. Then set up your filesystem like the one on the screenshot.

luks encryption over-lvm ubuntu installer

luks encryption over-lvm ubuntu installer

Read the rest of this entry »

Tags: ,
Posted in Administration, HowTo, System | 1 Comment »

How-To: encrypted partitions over LVM with LUKS — page 2 — encrypting the partitions

Posted by chantra on 12th July 2008

This entry is part 2 of 3 in the series How-To: encrypted partitions over LVM with LUKS

3. Encrypting the partitions

3.1. Filling the partition with random data

Now that we have our partition layout, we need to encrypt /home and /. The first thing we are going to do is to fill those partitions with random data. There is 2 ways of doing it. A fairly fast one or a really slow but efficient one.

Read the rest of this entry »

Tags: ,
Posted in Administration, HowTo, System | No Comments »

How-To: encrypted partitions over LVM with LUKS

Posted by chantra on 12th July 2008

This entry is part 1 of 3 in the series How-To: encrypted partitions over LVM with LUKS

Even though new distros installers tend to support filesystem encryption out of the box, most of the time, it might be interesting to actually understand how it works, mainly when it happens that your system fails to boot :).

Most literature found on the Internet tend to cover how to set up LVM over a partition encrypted with LUKS, this tutorial takes another approach and will explain how to create LUKS encrypted partitions over LVM. The reason for this.... I wanted to have unencrypted partitions :D.

Read the rest of this entry »

Tags: ,
Posted in Administration, HowTo, System | No Comments »

How-To: Remote syslog logging on Debian and Ubuntu

Posted by chantra on 30th June 2008

syslogd is the Linux system logging utility that take care of filling up your files in /var/log when it is asked to.

On a standard system, logging is only done on the local drive. But syslog can be configured to receive logging from a remote client, or to send logging to a remote syslog server.

Some of the use cases could be:

  • A machine which filesystem goes read-only
  • Log replication

this tutorial will explain how to set up both the server, to receive message from a remote client, and the client to emit messages to a syslogd server.

Read the rest of this entry »

Tags: ,
Posted in Administration, HowTo, System | No Comments »