<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.chepkov.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dburdick</id>
	<title>VVCWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://www.chepkov.com/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Dburdick"/>
	<link rel="alternate" type="text/html" href="https://www.chepkov.com/wiki/Special:Contributions/Dburdick"/>
	<updated>2026-04-28T17:09:48Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://www.chepkov.com/w/index.php?title=DPB&amp;diff=489</id>
		<title>DPB</title>
		<link rel="alternate" type="text/html" href="https://www.chepkov.com/w/index.php?title=DPB&amp;diff=489"/>
		<updated>2012-06-27T22:56:41Z</updated>

		<summary type="html">&lt;p&gt;Dburdick: Created page with &amp;quot;Dennis Burdick&amp;#039;s Work page.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Dennis Burdick&#039;s Work page.&lt;/div&gt;</summary>
		<author><name>Dburdick</name></author>
	</entry>
	<entry>
		<id>https://www.chepkov.com/w/index.php?title=Creating_server_certificate&amp;diff=456</id>
		<title>Creating server certificate</title>
		<link rel="alternate" type="text/html" href="https://www.chepkov.com/w/index.php?title=Creating_server_certificate&amp;diff=456"/>
		<updated>2010-07-16T17:15:01Z</updated>

		<summary type="html">&lt;p&gt;Dburdick: /* Create openssl config file */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== Create openssl config file ===&lt;br /&gt;
&lt;br /&gt;
Here is an example of server.cnf&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
[ req ]&lt;br /&gt;
default_bits = 2048&lt;br /&gt;
default_md = sha1&lt;br /&gt;
distinguished_name = req_dn&lt;br /&gt;
req_extensions = cert_type&lt;br /&gt;
prompt = no&lt;br /&gt;
&lt;br /&gt;
[ req_dn ]&lt;br /&gt;
# country (2 letter code)&lt;br /&gt;
C=US&lt;br /&gt;
&lt;br /&gt;
# State or Province Name (full name)&lt;br /&gt;
ST=Missouri&lt;br /&gt;
&lt;br /&gt;
# Locality Name (eg. city)&lt;br /&gt;
L=St. Louis&lt;br /&gt;
&lt;br /&gt;
# Organization (eg. company)&lt;br /&gt;
O=IVK/VVC &lt;br /&gt;
&lt;br /&gt;
# Organizational Unit Name (eg. section)&lt;br /&gt;
OU=VPS1 server&lt;br /&gt;
&lt;br /&gt;
# Common Name (*.example.com is also possible)&lt;br /&gt;
CN=vps1.chepkov.com&lt;br /&gt;
&lt;br /&gt;
# E-mail contact&lt;br /&gt;
emailAddress=root@ivk.com.au&lt;br /&gt;
&lt;br /&gt;
[ cert_type ]&lt;br /&gt;
keyUsage=digitalSignature,keyEncipherment&lt;br /&gt;
extendedKeyUsage=serverAuth&lt;br /&gt;
subjectAltName=IP:209.20.74.232,DNS:vps1.chepkov.com,DNS:ivk.com.au&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
*Note: Using a file like this with &#039;&#039;subjectAltName&#039;&#039; is the only way to generate a request that will result in a certificate that is valid for more than one &#039;&#039;name&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
=== Generate server private key ===&lt;br /&gt;
 openssl genrsa -out server.key 2048&lt;br /&gt;
&lt;br /&gt;
=== Generate certificate request ===&lt;br /&gt;
 openssl req -new -key server.key -out server.csr -config server.cnf&lt;br /&gt;
&lt;br /&gt;
Now you need to send your request to a certificate authority or if you have your own, sign the request (see [[Managing_Certificate_Authority#Signing_Certificate_Request|example]])&lt;br /&gt;
You will get server certificate server.crt&lt;br /&gt;
[[Category:OpenSSL]]&lt;/div&gt;</summary>
		<author><name>Dburdick</name></author>
	</entry>
	<entry>
		<id>https://www.chepkov.com/w/index.php?title=Dburdick&amp;diff=258</id>
		<title>Dburdick</title>
		<link rel="alternate" type="text/html" href="https://www.chepkov.com/w/index.php?title=Dburdick&amp;diff=258"/>
		<updated>2009-07-09T15:15:06Z</updated>

		<summary type="html">&lt;p&gt;Dburdick: Created page with &amp;#039;=just a place for dennis to put crap=  Using Squid As A Proxy&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=just a place for dennis to put crap=&lt;br /&gt;
&lt;br /&gt;
[[Using Squid As A Proxy]]&lt;/div&gt;</summary>
		<author><name>Dburdick</name></author>
	</entry>
	<entry>
		<id>https://www.chepkov.com/w/index.php?title=Encrypt_Fedora&amp;diff=230</id>
		<title>Encrypt Fedora</title>
		<link rel="alternate" type="text/html" href="https://www.chepkov.com/w/index.php?title=Encrypt_Fedora&amp;diff=230"/>
		<updated>2009-02-06T20:44:48Z</updated>

		<summary type="html">&lt;p&gt;Dburdick: /* Create backup */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This article will help you to encrypt your existing Fedora 10 installation&lt;br /&gt;
=== Where we begin ===&lt;br /&gt;
We have the following disk configuration:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# fdisk -l /dev/sda&lt;br /&gt;
&lt;br /&gt;
Disk /dev/sda: 40.0 GB, 40000000000 bytes&lt;br /&gt;
255 heads, 63 sectors/track, 4863 cylinders&lt;br /&gt;
Units = cylinders of 16065 * 512 = 8225280 bytes&lt;br /&gt;
Disk identifier: 0x000e6cc7&lt;br /&gt;
&lt;br /&gt;
   Device Boot      Start         End      Blocks   Id  System&lt;br /&gt;
/dev/sda1   *           1          13      104391   83  Linux&lt;br /&gt;
/dev/sda2              14        4863    38957625   8e  Linux LVM&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;/dev/sda1&#039;&#039;&#039; is our &#039;&#039;&#039;/boot&#039;&#039;&#039; partition&lt;br /&gt;
* &#039;&#039;&#039;/dev/sda2&#039;&#039;&#039; is physical volume for existing volume group &#039;&#039;&#039;vg0&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# cat /etc/fstab&lt;br /&gt;
/dev/vg0/root           /                       ext3    noatime         1 1&lt;br /&gt;
/dev/vg0/tmp            /tmp                    ext2    noatime         1 2&lt;br /&gt;
/dev/vg0/home           /home                   ext3    noatime         1 2&lt;br /&gt;
/dev/vg0/var            /var                    ext3    noatime         1 2&lt;br /&gt;
/dev/vg0/usr            /usr                    ext3    noatime         1 2&lt;br /&gt;
LABEL=boot              /boot                   ext2    noatime         1 2&lt;br /&gt;
tmpfs                   /dev/shm                tmpfs   defaults        0 0&lt;br /&gt;
devpts                  /dev/pts                devpts  gid=5,mode=620  0 0&lt;br /&gt;
sysfs                   /sys                    sysfs   defaults        0 0&lt;br /&gt;
proc                    /proc                   proc    defaults        0 0&lt;br /&gt;
/dev/vg0/swap           swap                    swap    defaults        0 0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Install required packages ===&lt;br /&gt;
* dump&lt;br /&gt;
* plymouth-system-plugin&lt;br /&gt;
* cryptsetup-luks&lt;br /&gt;
&lt;br /&gt;
 yum install dump plymouth-system-plugin cryptsetup-luks&lt;br /&gt;
&lt;br /&gt;
=== Create backup ===&lt;br /&gt;
Mount your external USB disk, for example, to /mnt and use dump to backup your current installation.&lt;br /&gt;
Make two copies, on two different disks, to be sure, &#039;&#039;&#039;this is the most important step&#039;&#039;&#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
dump -0 -f /mnt/root.dump /&lt;br /&gt;
dump -0 -f /mnt/usr.dump /usr&lt;br /&gt;
dump -0 -f /mnt/var.dump /var&lt;br /&gt;
dump -0 -f /mnt/home.dump /home&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Boot in rescue mode ===&lt;br /&gt;
Skip mounting existing installation, we are going to destroy it in the next step&lt;br /&gt;
* Make the existing data unrecoverable&lt;br /&gt;
 shred -v -n 1 -z /dev/sda2&lt;br /&gt;
&lt;br /&gt;
* Create new encrypted physical volume&lt;br /&gt;
 cryptsetup --verify-passphrase luksFormat --cipher aes-cbc-essiv:sha256 --key-size 256 /dev/sda2&lt;br /&gt;
 cryptsetup --verbose luksOpen /dev/sda2 cryptpv&lt;br /&gt;
&lt;br /&gt;
* recreate volume group and logical volumes&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
lvm pvcreate /dev/mapper/cryptpv&lt;br /&gt;
lvm vgcreate -s 32M vg0 /dev/mapper/cryptpv&lt;br /&gt;
lvm lvcreate --size 512 --name root vg0&lt;br /&gt;
lvm lvcreate --size 2G  --name swap vg0&lt;br /&gt;
lvm lvcreate --size 4G  --name usr  vg0&lt;br /&gt;
lvm lvcreate --size 1G  --name var  vg0&lt;br /&gt;
lvm lvcreate --size 1G  --name home vg0&lt;br /&gt;
lvm lvcreate --size 256 --name tmp  vg0&lt;br /&gt;
mke2fs -j -L root /dev/vg0/root&lt;br /&gt;
mkswap -L swap /dev/vg0/swap&lt;br /&gt;
mke2fs -j -L usr /dev/vg0/usr&lt;br /&gt;
mke2fs -j -L var /dev/vg0/var&lt;br /&gt;
mke2fs -j -L home /dev/vg0/home&lt;br /&gt;
mke2fs -L tmp /dev/vg0/tmp&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* remount backup and root&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mkdir /tmp/root&lt;br /&gt;
mkdir /tmp/mnt&lt;br /&gt;
mount /dev/sdb1 /tmp/mnt&lt;br /&gt;
mount -t ext3 /dev/vg0/root /tmp/root&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* restore root&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cd /tmp/root&lt;br /&gt;
restore -r -f /tmp/mnt/root.dump&lt;br /&gt;
rm restoresymtable&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* mount and restore remaining file systems&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mount -t ext3 -o noatime /dev/vg0/usr /tmp/root/usr &lt;br /&gt;
cd /tmp/root/usr&lt;br /&gt;
restore -r -f /tmp/mnt/usr.dump&lt;br /&gt;
rm restoresymtable&lt;br /&gt;
mount -t ext3 -o noatime /dev/vg0/var /tmp/root/var &lt;br /&gt;
cd /tmp/root/var&lt;br /&gt;
restore -r -f /tmp/mnt/var.dump&lt;br /&gt;
rm restoresymtable&lt;br /&gt;
mount -t ext3 -o noatime /dev/vg0/home /tmp/root/home &lt;br /&gt;
cd /tmp/root/home&lt;br /&gt;
restore -r -f /tmp/mnt/home.dump&lt;br /&gt;
rm restoresymtable&lt;br /&gt;
mount -t ext2 -o noatime /dev/vg0/tmp /tmp/root/tmp&lt;br /&gt;
chmod 1777 /tmp/root/tmp&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* unmount backup, create all device nodes for chrooted environment&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
umount /tmp/mnt&lt;br /&gt;
cp -ax /dev/* /tmp/root/dev&lt;br /&gt;
mkdir /tmp/root/dev/shm&lt;br /&gt;
mount -t proc proc /tmp/root/proc&lt;br /&gt;
mount -t sysfs sysfs /tmp/root/sys&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* chroot into restored system&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
chroot /tmp/root&lt;br /&gt;
mount -a&lt;br /&gt;
swapon -a&lt;br /&gt;
vgcfgbackup&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* recreate initrd image&lt;br /&gt;
 cd /boot&lt;br /&gt;
 mkinitrd -v -f `ls initrd*` `ls /lib/modules`&lt;br /&gt;
&lt;br /&gt;
* force fsck check and selinux relabeling of the new system&lt;br /&gt;
 touch /.autofsck /.autorelabel&lt;br /&gt;
&lt;br /&gt;
=== You are done ===&lt;br /&gt;
 exit&lt;br /&gt;
 reboot&lt;br /&gt;
&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Dburdick</name></author>
	</entry>
	<entry>
		<id>https://www.chepkov.com/w/index.php?title=File:SSHTunnel.png&amp;diff=174</id>
		<title>File:SSHTunnel.png</title>
		<link rel="alternate" type="text/html" href="https://www.chepkov.com/w/index.php?title=File:SSHTunnel.png&amp;diff=174"/>
		<updated>2008-12-26T17:54:13Z</updated>

		<summary type="html">&lt;p&gt;Dburdick: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Dburdick</name></author>
	</entry>
</feed>