Install new Fonts on Ubuntu Server
apt install fontconfig
cp -R ~/arial /usr/share/fonts/truetype/
sudo fc-cache -f -v
References
http://chapter31.com/2012/09/24/installing-new-fonts-on-ubuntu-server/
apt install fontconfig
cp -R ~/arial /usr/share/fonts/truetype/
sudo fc-cache -f -v
References
http://chapter31.com/2012/09/24/installing-new-fonts-on-ubuntu-server/
The IntelliJ IDEA short-cut to reformat source code is Ctrl+Alt+L. This happens to lock the screen in KDE (Gnome too?). How can I disable this so IntelliJ receives the key sequence?
On KDE Plasma 5 go to System Settings | Desktop Behaviour | Screen Locking
Here you will find a “Keyboard Shortcut” option. Change it to something else or set to none
References
https://stackoverflow.com/questions/211043/disable-global-ctrl-alt-l-hotkey-in-kde
LC_ALL=C lscpu | grep Virtualization
zgrep CONFIG_KVM /proc/config.gz
sudo pacman -S virt-manager qemu vde2 ebtables dnsmasq bridge-utils openbsd-netcat
sudo systemctl enable libvirtd.service
sudo systemctl start libvirtd.service
dos2unix run.sh
References
https://stackoverflow.com/questions/2920416/configure-bin-shm-bad-interpreter
Local bridge Setup
VPN Server IP: 192.168.7.1 VPN Client IP Range: 192.168.7.50-192.168.7.60 Tap Device name: tap_soft
ifconfig tap_soft
apt-get install dnsmasq
nano /etc/dnsmasq.conf
interface=tap_soft dhcp-range=tap_soft,192.168.7.50,192.168.7.60,12h dhcp-option=tap_soft,3,192.168.7.1
config tap
ifconfig tap_soft 192.168.7.1
Add this file to /etc/sysctl.d/
to enable ipv4 forwarding
/etc/sysctl.d/ipv4_forwarding.conf
Wih this content
net.ipv4.ip_forward = 1
sysctl --system
Then we add a POSTROUTING rule to iptables
iptables -t nat -A POSTROUTING -s 192.168.7.0/24 -j SNAT --to-source [YOUR VPS IP ADDRESS]
# /etc/init.d/vpnserver restart # /etc/init.d/dnsmasq restart
References
http://blog.lincoln.hk/blog/2013/05/17/softether-on-vps-using-local-bridge/
You can drop the second ping response by:
iptables -A OUTPUT -p icmp -m ttl --ttl-gt 100 -j DROP
References
https://github.com/SoftEtherVPN/SoftEtherVPN/issues/332
https://github.com/SoftEtherVPN/SoftEtherVPN/issues/245
sudo apt-get install strongswan strongswan-plugin-eap-mschapv2 moreutils
Creating a Certificate Authority
mkdir vpn-certs cd vpn-certs
ipsec pki --gen --type rsa --size 4096 --outform pem > server-root-key.pem chmod 600 server-root-key.pem
ipsec pki --self --ca --lifetime 3650 \ --in server-root-key.pem \ --type rsa --dn "C=US, O=VPN Server, CN=VPN Server Root CA" \ --outform pem > server-root-ca.pem
Generating a Certificate for the VPN Server
ipsec pki --gen --type rsa --size 4096 --outform pem > vpn-server-key.pem
ipsec pki --pub --in vpn-server-key.pem \ --type rsa | ipsec pki --issue --lifetime 1825 \ --cacert server-root-ca.pem \ --cakey server-root-key.pem \ --dn "C=US, O=VPN Server, CN=server_name_or_ip" \ --san server_name_or_ip \ --flag serverAuth --flag ikeIntermediate \ --outform pem > vpn-server-cert.pem
sudo cp ./vpn-server-cert.pem /etc/ipsec.d/certs/vpn-server-cert.pem sudo cp ./vpn-server-key.pem /etc/ipsec.d/private/vpn-server-key.pem
sudo chown root /etc/ipsec.d/private/vpn-server-key.pem sudo chgrp root /etc/ipsec.d/private/vpn-server-key.pem sudo chmod 600 /etc/ipsec.d/private/vpn-server-key.pem
Configuring StrongSwan
sudo cp /etc/ipsec.conf /etc/ipsec.conf.original
echo '' | sudo tee /etc/ipsec.conf
sudo nano /etc/ipsec.conf
config setup charondebug="ike 1, knl 1, cfg 0" uniqueids=no conn ikev2-vpn auto=add compress=no type=tunnel keyexchange=ikev2 fragmentation=yes forceencaps=yes ike=aes128-sha1-modp1024,aes128-sha1-modp1536,aes128-sha1-modp2048,aes128-sha256-ecp256,aes128-sha256-modp1024,aes128-sha256-modp1536,aes128-sha256-modp2048,aes256-aes128-sha256-sha1-modp2048-modp4096-modp1024,aes256-sha1-modp1024,aes256-sha256-modp1024,aes256-sha256-modp1536,aes256-sha256-modp2048,aes256-sha256-modp4096,aes256-sha384-ecp384,aes256-sha384-modp1024,aes256-sha384-modp1536,aes256-sha384-modp2048,aes256-sha384-modp4096,aes256gcm16-aes256gcm12-aes128gcm16-aes128gcm12-sha256-sha1-modp2048-modp4096-modp1024,3des-sha1-modp1024! esp=aes128-aes256-sha1-sha256-modp2048-modp4096-modp1024,aes128-sha1,aes128-sha1-modp1024,aes128-sha1-modp1536,aes128-sha1-modp2048,aes128-sha256,aes128-sha256-ecp256,aes128-sha256-modp1024,aes128-sha256-modp1536,aes128-sha256-modp2048,aes128gcm12-aes128gcm16-aes256gcm12-aes256gcm16-modp2048-modp4096-modp1024,aes128gcm16,aes128gcm16-ecp256,aes256-sha1,aes256-sha256,aes256-sha256-modp1024,aes256-sha256-modp1536,aes256-sha256-modp2048,aes256-sha256-modp4096,aes256-sha384,aes256-sha384-ecp384,aes256-sha384-modp1024,aes256-sha384-modp1536,aes256-sha384-modp2048,aes256-sha384-modp4096,aes256gcm16,aes256gcm16-ecp384,3des-sha1! dpdaction=clear dpddelay=300s rekey=no left=%any leftid=@server_name_or_ip leftcert=/etc/ipsec.d/certs/vpn-server-cert.pem leftsendcert=always leftsubnet=0.0.0.0/0 right=%any rightid=%any rightauth=eap-mschapv2 rightdns=8.8.8.8,8.8.4.4 rightsourceip=10.10.10.0/24 rightsendcert=never eap_identity=%identity
Configuring VPN Authentication
sudo nano /etc/ipsec.secrets
server_name_or_ip : RSA "/etc/ipsec.d/private/vpn-server-key.pem" your_username %any% : EAP "your_password"
sudo ipsec reload
Configuring the Firewall & Kernel IP Forwarding
sudo iptables -A INPUT -i lo -j ACCEPT sudo iptables -A INPUT -p udp --dport 500 -j ACCEPT sudo iptables -A INPUT -p udp --dport 4500 -j ACCEPT sudo iptables -A FORWARD --match policy --pol ipsec --dir in --proto esp -s 10.10.10.10/24 -j ACCEPT sudo iptables -A FORWARD --match policy --pol ipsec --dir out --proto esp -d 10.10.10.10/24 -j ACCEPT sudo iptables -t nat -A POSTROUTING -s 10.10.10.10/24 -o eth0 -m policy --pol ipsec --dir out -j ACCEPT sudo iptables -t nat -A POSTROUTING -s 10.10.10.10/24 -o eth0 -j MASQUERADE sudo iptables -t mangle -A FORWARD --match policy --pol ipsec --dir in -s 10.10.10.10/24 -o eth0 -p tcp -m tcp --tcp-flags SYN,RST SYN -m tcpmss --mss 1361:1536 -j TCPMSS --set-mss 1360
sudo nano /etc/sysctl.conf
# Uncomment the next line to enable packet forwarding for IPv4 net.ipv4.ip_forward=1 # Do not accept ICMP redirects (prevent MITM attacks) net.ipv4.conf.all.accept_redirects = 0 # Do not send ICMP redirects (we are not a router) net.ipv4.conf.all.send_redirects = 0 net.ipv4.ip_no_pmtu_disc = 1
sudo reboot
Restart if required
systemctl restart strongswan
References
https://www.digitalocean.com/community/tutorials/how-to-set-up-an-ikev2-vpn-server-with-strongswan-on-ubuntu-16-04
https://www.digitalocean.com/community/tutorials/how-to-set-up-an-ikev2-vpn-server-with-strongswan-on-ubuntu-18-04-2
https://www.howtoforge.com/tutorial/how-to-setup-ikev2-vpn-using-strongswan-and-letsencrypt-on-centos-7/
https://wiki.strongswan.org/projects/strongswan/wiki/ConnSection
Set JAVA_HOME temporary :
export JAVA_HOME=/usr/lib/jvm/default
Set JAVA_HOME permanently for all Users :
sudo nano /etc/profile
export JAVA_HOME=/usr/lib/jvm/default export PATH=$JAVA_HOME/bin:$PATH
source /etc/profile
References
https://stackoverflow.com/questions/24641536/how-to-set-java-home-in-linux-for-all-users
https://docs.opsgenie.com/docs/setting-java_home
https://bbs.archlinux.org/viewtopic.php?id=222751
chmod 600 deployment_key.txt
ssh -i deployment_key.txt demo@192.237.248.66
References
https://support.rackspace.com/how-to/logging-in-with-an-ssh-private-key-on-linuxmac/