Google Serch

Custom Search

Monday 30 November 2009

Configuring Strong Wi-fi (802.1x) Authentication in Linux

Configuring Strong Wi-fi (802.1x) Authentication in Linux

In this tutorial series, we'll first see how 802.1X authentication fits into the big picture of wireless LAN security. Then we'll configure the authentication settings in Ubuntu. Lastly, we'll review the manual configuration of 802.1X supplicants. Lets get started!

Back when the vulnerabilities of WEP encryption for Wi-Fi networks were uncovered, the IEEE and wireless industry started developing new protocols and standards. They came up with the 802.11i, a standard to finally implement a fully secure encryption mechanism for wireless LANs. Before it was completed, the Wi-Fi Alliance released the Wi-Fi Protected Access (WPA) encryption standard, loosely based on 802.11i using TKIP for the underlying encryption. Later they released WPA2, which includes full support for 802.11i using AES/CCMP encryption...


NFS and Firewall on Centos & Red Hat

NFS and Firewall on Centos/Red Hat

Today we will talk about some trick on how to enable NFS with Firewall integrated on a Centos or Red Hat server.

Ok, I believe that you already configured a NFS server on Centos or Red hat but you have difficulties to have acces on with the firewall enabled.

This is a trick that I managed to put in place:

  • Create a file "/etc/sysconfig/nfs" and add the following contents:
STATD_PORT=4001
LOCKD_TCPPORT=4002
LOCKD_UDPPORT=4002
MOUNTD_PORT=4003

  • Append the following to the file "/etc/services":
rquotad 4004/tcp # rpc.rquotad tcp port
rquotad 4004/udp # rpc.rquotad udp port

  •  Restart the nfs services
From there, open these ports -> 111:tcp, 111:udp, 2049:tcp, 2049:udp,
4001:tcp, 4001:udp, 4002:tcp, 4002:udp, 4003:tcp, 4003:udp, 4004:tcp,
4004:udp on your firewall configuration.
(you can choose any ports, just be aware that they shall be related to your NFS config).

Linux / Windows Application For Prevention Of RSI (Repetitive Strain Injury)

Linux / Windows Application For Prevention Of RSI (Repetitive Strain Injury).
by Vivek Gite


workrave-image
Repetitive strain injury (RSI) is occupational overuse syndrome, non-specific arm pain or work related upper limb disorder. RSI caused from overusing the hands to perform a repetitive task, such as typing, writing, or clicking a mouse. Unfortunately, most people do not understand what RSI is or how serious it can be. You can easily prevent RSI using open source software called Workrave.

What are the symptoms of RSI?

I'm quoting from this page:
Do you experience:
  1. Fatigue or lack of endurance?
  2. Weakness in the hands or forearms?
  3. Tingling, numbness, or loss of sensation?
  4. Heaviness: Do your hands feel like dead weight?
  5. Clumsiness: Do you keep dropping things?
  6. Lack of strength in your hands? Is it harder to open jars? Cut vegetables?
  7. Lack of control or coordination?
  8. Chronically cold hands?
  9. Heightened awareness? Just being slightly more aware of a body part can be a clue that something is wrong.
  10. Hypersensitivity?
  11. Frequent self-massage (subconsciously)?
  12. Sympathy pains? Do your hands hurt when someone else talks about their hand pain?

How To Reduce Your Risk Of Developing RSI

  • Take breaks, when using your computer, every 30 minutes or so. Use software such as workwave to prevent RSI.
  • Regular exercise can prevent all sort of injuries including RSI.
  • Use good posture. Adjust your computer desk and/or chair to support muscles necessary for good posture.

Workrave

Workrave is a free open source software application intended to prevent computer users from developing RSI or myopia. The software periodically locks the screen while an animated character, "Miss Workrave", walks the user through various stretching exercises and urges them to take a coffee break. The program frequently alerts you to take micro-pauses, rest breaks and restricts you to your daily limit. The program works under MS-Windows and Linux / UNIX operating systems.

Install workrave

Type the following command under Debian / Ubuntu Linux, enter:
sudo apt-get install workrave
Note CentOS / RHEL / Fedora Linux user can download it software and install the same using rpm command.

Configure workrave

Workrave works as an applet which is a small application whose user interface resides within a panel. You need to add workrave to panel to control behavior and appearance of the software.

Adding a New Workrave Object To Panel

  • Right-click on a vacant space on a panel to open the panel popup menu.
  • Choose Add to Panel.
  • The Add to Panel dialog opens.The available panel objects are listed alphabetically, with launchers at the top. Select workrave applet and click on Add button.
Fig.01: Adding an Object (Workwave) to a Panel
Fig.01: Adding an Object (Workwave) to a Panel

How Do I Modify Properties Of Workrave Software?

To modify the properties of an object workrave, perform the following steps:
  • Right-click on the workrave object to open the panel object popup.
  • Choose Preference. Use the Properties dialog to modify the properties as required.
Fig.02: Modifying the Properties of The Workrave Software
Fig.02: Modifying the Properties of The Workrave Software

Workwave in Action

The main window shows the time remaining until it suggests a pause. The windows can be closed and you will the time remaining on the panel itself:

Fig.03: Time reaming counter
Fig.03: Time reaming counter
Fig.04: Miss Workrave - an animated character walks you through various stretching exercises
Fig.04: Miss Workrave - an animated character walks you through various stretching exercises
The break prelude window, bugging you to take a micro-pause:

Fig.05: Time for a micro-pause remainder
Fig.05: Time for a micro-pause remainder
Fig.06: You can skip Micro-break
Fig.06: You can skip Micro-break


Taken from that website.

Installing Apache2 With PHP5 And MySQL Support On OpenSUSE 11.2 (LAMP)

Installing Apache2 With PHP5 And MySQL Support On OpenSUSE 11.2 (LAMP)
By Falko Timme 

 LAMP is short for Linux, Apache, MySQL, PHP. This tutorial shows how you can install an Apache2 webserver on an OpenSUSE 11.2 server with PHP5 support (mod_php) and MySQL support.

I do not issue any guarantee that this will work for you!


Please find more information on that Link.



Sunday 29 November 2009

FreeBSD 8.0 Review: Enterprise Ready Server Operating System

FreeBSD 8.0 Review: Enterprise Ready Server Operating System

by Vivek Gite

The FreeBSD Project is one of the oldest and successful project. FreeBSD is well known for its reliability, robustness, and performance.
 

FreeBSD 8 has been released.Find release announcement on that link.



Jails v2

FreeBSD jails (operating system-level virtualization) are perfect for virtual hosting environments. It offers security and ability to partition a FreeBSD-based system into independent system. Jail v2 features the extensible jail parameters and hierchical jails. By setting a jail's children.max parameter, processes within a jail may be able to create jails of their own. You can also use multiple IPv4 and IPv6 addresses (added in 7.2) per jails. You can also restrict jails to certain CPUs and jail admin can create and manage their own ZFS file systems within the jails.
Listing Active FreeBSD Jails with jls and jexec commands
Listing Active FreeBSD Jails with jls and jexec commands

Improved ZFS & DTrace

FreeBSD 8 includes improved ZFS support which bringing ZFS out of the "experimental" status to "stable". Zpool format upgrade to 13 from 6 and many bugs are fixed. DTrace is a comprehensive dynamic tracing framework for the Solaris. It provides a powerful infrastructure that permits administrators, developers, and service personnel to concisely answer arbitrary questions about the behavior of the operating system and user programs. Also kmem_max, limit has been increased to 512 GB from 2GB.

ULE scheduler

The default scheduler is ULE:
$ sysctl kern.sched.name
Sample outputs:
kern.sched.name: ULE
The ULE scheduler provides a number of advanced scheduler features not present in bsd scheduler [sched_4bsd(4)], the traditional system scheduler. These features address SMP and interactivity and include:
  1. Thread CPU affinity.
  2. CPU topology awareness, including for hyper-threading.
  3. Assigning individual CPUs to jails.
  4. Performance improvements etc.

New USB Stack

After a long period of review and testing FreeBSD 8 will ship with Hans Peter's new usb stack:
  1. A new and mutex enabled USB API.
  2. Linux USB kernel compatibility layer.
  3. New UGEN backend and libusb library, finally solves the "driver unloading" problem.
  4. New "usbconfig" utility, for easy configuration of USB.
  5. Full support for Split transactions, which means you can use your full speed USB audio device on a high speed USB HUB.
  6. Full support for USB on embedded platforms, mostly cache flushing and buffer invalidating stuff.
  7. Autodetect of annoying USB install disks.
  8. Support for USB transfers like I/O vectors, means more throughput and less interrupts.

Get Detailed Process Information

The new procstat(8) utility displays detailed information about the running processes. This is useful for for debugging server problems. You can display the following information with procstat:
  • Binary information for the process.
  • Command line arguments for the process.
  • File descriptor information for the process.
  • The stacks of kernel threads in the process, excluding stacks of threads currently running on a CPU and threads with stacks swapped to disk.
  • Security credential information for the process.
  • Thread information for the process.
  • Virtual memory mappings for the process.
Fig.02: procstat(8) Output
Fig.02: procstat(8) Output

Superpages

Superpages provides good application support for quad-core and newer AMD / Intel CPUs. The FreeBSD virtual memory subsystem now supports fully transparent use of superpages (included since 7.2) for application memory. This can be enabled by setting a loader tunable vm.pmap.pg_ps_enabled to 1 and vm.pmap.pg_ps_enabled=1. By default it was turned on under FreeBSD 8.

Xen DomU Support

New experimental Xen support has been added into FreeBSD 8. It means you can use a 32-bit guest operating system on recent versions of Xen dom0. You will not able use XEN as host i.e. you can use CentOS or other Linux as host and install FreeBSD as guest. Xen HVM support can be added using the following two options and buildworld inside VM (see config(5) man page or /usr/src/sys/`uname -p`/conf/XENHVM config file):
options         XENHVM
device          xenpci
Work is also in progress to make FreeBSD 8 ready to used on Amazon EC2.

Network Stack Virtualization (VIMAGE)

The network stack virtualization project aims at extending the FreeBSD kernel to maintain multiple independent instances of networking state. This will allow for complete networking independence between jails on a system, including giving each jail its own firewall, virtual network interfaces, rate limiting, routing tables, and IPSEC configuration. The vimage is a jail with a virtualized instance of the FreeBSD network stack. It is an experimental feature. To enable VIMAGE, edit your kernel config file and add the following line:
options VIMAGE
Make sure you remove the SCTP option. Save and close the file. Rebuild the kernel:
make buildkernel KERNCONF=NIXCRAFT
make installkernel KERNCONF=NIXCRAFT
reboot
You can easily create the vimage enabled jail using jail, run:
jail -c vjail1 name=vjail1 host.hostname=vjail1.nixcraft.in path=/ persist
You can easily communicate between jails using epair driver interface which is a pair of virtual back-to-back connected Ethernet interfaces:
ifconfig epair0 create
ifconfig epair0a config-options
See jail(8), and epair(4) man page for more details.

Virtualbox (Port)

VirtualBox is an actively developed, complete virtualization package, that is available for FreeBSD. You can run MS-Windows or UNIX / Linux like guests. VirtualBox is available as a FreeBSD port in emulators/virtualbox.
Fig.03: Freebsd 8 Running Virtualbox Virtualization Software
Fig.03: Freebsd 8 Running Virtualbox Virtualization Software

Stack-smashing Protection (ProPolice)

The "Stack-Smashing Protector" (ProPolice SSP) is an enhancement which prevent exploits that use stack-based buffer overflows. ProPolice moves canary code generation from the back-end to the front-end of the compiler. ProPolice also protects all registers saved in function's prologue (for example the frame pointer), and not only the Return Address. ProPolice, in addition to canary protection, also sorts array variables (where possible) to the highest part of the stack frame, to make it more difficult to overflow them and corrupt other variables. It also creates copies of arguments of the function, and relocates them together with local variables, effectively protecting the arguments.

Rewritten NFS client/server Introducing NFSv4

FreeBSD 8 supports NFSv4 with ACLs, strong authentication, stateful protocol, and performance improvements. FreeBSD 8 also includes a brand new NFS Lock Manager which runs in kernel mode and uses the normal local locking infrastructure for its state.

Textdumps (debugging)

The textdump(4) facility allows the capture of kernel debugging information to disk in a human-readable rather than the machine-readable form normally used with kernel memory dumps and minidumps. This representation, while less complete in that it does not capture full kernel state, can provide debugging information in a more compact, portable, and persistent form than a traditional dump. It is recommended that you use textdumps with ddb(4).

Wireless Mesh Support

FreeBSD 8 includes IEEE 802.11s wireless mesh standard. Wireless mesh networks are expected to become widespread as routers and network appliances deploy them, allowing wireless networks to be built and extended dynamically.

gvinum Improvements

gvinum is a Logical Volume Manager for FreeBSD. It supports the following features:
  1. JBOD, RAID 0 / 1 / 5
  2. Create a mirror on disk
  3. Volume management and much more

Other Improvements (quoting from the release notes)

  1. TTY layer rewrite.
  2. Multicast updates including IGMPv3.
  3. Back end support for equal-cost multi-path (ECMP) for both IPv4 and IPv6.
  4. FreeBSD 8 should no longer panic when you remove a USB drive without unmounting it first.
  5. Boot support for GPT partitions.
  6. bsdlabel now support 26 partitions.
  7. The aac(4) driver now supports volumes larger than 2TB in size.
  8. The top(1) command now supports a -P flag to provide per-CPU usage statistics.
  9. Increased the maximum number of groups a user may belong - GROUPS_MAX and NGROUPS have been increased from 16 to 1023 and 1024 respectively.
  10. FreeBSD 8 supports new Intel Nehalem / Core i7 platform.
  11. OpenSSH has been updated to 5.2p1. Finally you can specifies a path to chroot(2) to after authentication using ChrootDirectory directive.
  12. FreeBSD 8 bundles lots of software via ports including Firefox 3.5.5, Gnome gnome2-2.26,kde4-4.3.1, gimp 2.6.6, and much more. FreeBSD desktop is feature rich and perfect for software development and/or network / sys admin purpose.
  13. The awk(1) utility now supports 64 files. The upper limit was 20 in the prior releases.
  14. BIND has been updated to version 9.6.1rc1.
  15. OpenBSM 1.1 from Trusted BSD Project has been merged.

Conclusion

This release improves on the functionality of FreeBSD 7.2 and introduces often requested new features in jail, SMP-optimized scheduler, virtualization, virtual network stack, NFS4, and storage subsystem improvements. This the most impressive FreeBSD releases to date. Kudos to FreeBSD team for rolling out stable and feature rich enterprise ready FreeBSD 8 operating systems.
For more details about the release, refer to the official announcement on the FreeBSD mailing list (yet to announce). You can download the installation images from the FreeBSD mirrors (main FTP site) or via BitTorrent.
In the meantime, I'm testing and deploying a few FreeBSD 8 boxes with virtual network stack and Jail v2 features, stay tuned for updates.