Skip to content

Commit cd48967

Browse files
committed
add drafts and small headshot
1 parent fbfe51b commit cd48967

File tree

3 files changed

+82
-0
lines changed

3 files changed

+82
-0
lines changed
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
+++
2+
date = "2016-05-31T09:49:09-07:00"
3+
draft = true
4+
title = "Ubuntu Thunar, vlc and samba"
5+
6+
+++
7+
8+
Out of the box, Thunar does not have SMB support.
9+
10+
gvfs-bin ?
11+
gvfs-backend ?
12+
http://jorisvandijk.com/2013/vlc-wont-play-smb-shares/
13+
http://crunchbang.org/forums/viewtopic.php?id=25943
14+
Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
+++
2+
date = "2016-06-01T13:23:19-07:00"
3+
draft = true
4+
title = "openswan connections to aws vpn"
5+
6+
+++
7+
8+
# hi
9+
10+
```yaml
11+
## general configuration parameters ##
12+
13+
config setup
14+
plutodebug=all
15+
plutostderrlog=/var/log/pluto.log
16+
protostack=netkey
17+
nat_traversal=yes
18+
virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,!$RIGHT_SUBNET
19+
## disable opportunistic encryption in Red Hat ##
20+
oe=off
21+
22+
conn AWS
23+
type=tunnel
24+
authby=secret
25+
auto=start
26+
ike=aes128-sha1
27+
ikelifetime=28800s
28+
salifetime=3600s
29+
dpddelay=10
30+
dpdtimeout=60
31+
dpdaction=restart_by_peer
32+
rekey=yes
33+
keyingtries=%forever
34+
## phase 1 ##
35+
keyexchange=ike
36+
## phase 2 ##
37+
phase2=esp
38+
phase2alg=aes128-sha1
39+
pfs=yes
40+
left=%defaultroute
41+
leftid=52.196.123.135 # Elastic/public IP of *this* instance. Also this is specfied as the customer gateway IP address https://ap-northeast-1.console.aws.amazon.com/vpc/home?region=ap-northeast-1#cgws
42+
# This could be anything - it's a way to identify itself when looking up the PSK in the secrets file
43+
leftnexthop=%defaultroute
44+
leftsubnet=10.0.0.0/24 # Private subnet where this instance resides
45+
right=52.196.160.248 # Public IP address of the other side (AWS VPN Tunnel endpoint #1)
46+
rightsubnet=10.1.0.0/24 # Private CIDR range for the AWS Subnet
47+
#leftsourceip=10.0.0.185 # May not be necessary - need to test, but this is the private IP of this instance
48+
```
49+
50+
dflkj *hello* **adf**
51+
52+
Other things to note:
53+
54+
If deploying the VPN server on AWS:
55+
56+
* Disable source ip check
57+
* Specify the VPN instance as the route for the foreign CIDR block in the source subnets
58+
* Make sure to open all TCP/UDP/ICMP traffic from the "local" subnet's SG to the SG of the VPN
59+
* Flow logs are your friend!
60+
61+
1. hi
62+
2. there
63+
3. wtf
64+
65+
https://clauseriksen.net/2011/02/02/ipsec-on-debianubuntu/
66+
https://forums.aws.amazon.com/message.jspa?messageID=466186
67+
https://docs.openvpn.net/how-to-tutorialsguides/administration/extending-vpn-connectivity-to-amazon-aws-vpc-using-aws-vpc-vpn-gateway-service/
68+
http://xmodulo.com/create-site-to-site-ipsec-vpn-tunnel-openswan-linux.html
5.67 KB
Loading

0 commit comments

Comments
 (0)