Added thumbnails to Raspberry Pi OS server and Linux strongSwan client guides

This commit is contained in:
Sun Knudsen 2020-12-11 08:39:56 -05:00
parent d79fb8c0ff
commit 207e9f6bbc
No known key found for this signature in database
GPG Key ID: 1FA767862BBD1305
6 changed files with 14 additions and 10 deletions

View File

@ -39,8 +39,8 @@ $ app-cleaner.sh /Applications/AppCleaner.app
Checking for running processes...
Finding application data...
/Applications/AppCleaner.app
/Users/johndoe/Library/Preferences/net.freemacsoft.AppCleaner.plist
/Users/johndoe/Library/Saved Application State/net.freemacsoft.AppCleaner.savedState
/Users/sunknudsen/Library/Preferences/net.freemacsoft.AppCleaner.plist
/Users/sunknudsen/Library/Saved Application State/net.freemacsoft.AppCleaner.savedState
Move application data to trash (y or n)? y
Moving application data to trash...
Done

View File

@ -10,6 +10,8 @@ Listed: true
# How to configure hardened Raspberry Pi OS server
[![How to configure hardened Raspberry Pi OS server - YouTube](how-to-configure-hardened-raspberry-pi-os-server.png)](https://www.youtube.com/watch?v=6R8uKdstnts "How to configure hardened Raspberry Pi OS server - YouTube")
## Requirements
- [Raspberry Pi](https://www.raspberrypi.org/)

Binary file not shown.

After

Width:  |  Height:  |  Size: 695 KiB

View File

@ -10,6 +10,8 @@ Listed: true
# How to configure strongSwan client on headless Debian-based Linux computer
[![How to configure strongSwan client on headless Debian-based Linux computer - YouTube](how-to-configure-strongswan-client-on-headless-debian-based-linux-computer.png)](https://www.youtube.com/watch?v=fW1TUByQqk8 "How to configure strongSwan client on headless Debian-based Linux computer - YouTube")
## Requirements
- [Self-hosted hardened strongSwan IKEv2/IPsec VPN server](../how-to-self-host-hardened-strongswan-ikev2-ipsec-vpn-server-for-ios-and-macos) 📦
@ -410,7 +412,7 @@ curl https://checkip.amazonaws.com
👍
> Heads-up: use following steps to assign static private IP to strongSwan client
> Heads-up: use following steps to assign static IP to strongSwan client
### Step 12: log in to server
@ -428,7 +430,7 @@ su -
### Step 14: get virtual MAC address assigned to strongSwan client
Replace `10.0.2.171` with private IP assigned to strongSwan client by strongSwan server (see [step 10](#step-10-confirm-strongswan-client-is-connected)).
Replace `10.0.2.171` with IP assigned to strongSwan client by strongSwan server (see [step 10](#step-10-confirm-strongswan-client-is-connected)).
```shell
$ cat /var/lib/misc/dnsmasq.leases | grep "10.0.2.171" | awk '{print $2}'

View File

@ -42,8 +42,8 @@ gpg (GnuPG) 2.2.20; Copyright (C) 2020 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
gpg: directory '/Users/johndoe/.gnupg' created
gpg: keybox '/Users/johndoe/.gnupg/pubring.kbx' created
gpg: directory '/Users/sunknudsen/.gnupg' created
gpg: keybox '/Users/sunknudsen/.gnupg/pubring.kbx' created
Please select what kind of key you want:
(1) RSA and RSA (default)
(2) DSA and Elgamal
@ -81,10 +81,10 @@ We need to generate a lot of random bytes. It is a good idea to perform
some other action (type on the keyboard, move the mouse, utilize the
disks) during the prime generation; this gives the random number
generator a better chance to gain enough entropy.
gpg: /Users/johndoe/.gnupg/trustdb.gpg: trustdb created
gpg: /Users/sunknudsen/.gnupg/trustdb.gpg: trustdb created
gpg: key 1BDC94DFB97BE4D4 marked as ultimately trusted
gpg: directory '/Users/johndoe/.gnupg/openpgp-revocs.d' created
gpg: revocation certificate stored as '/Users/johndoe/.gnupg/openpgp-revocs.d/F365EDCF06F4D9F09BB7D4EB1BDC94DFB97BE4D4.rev'
gpg: directory '/Users/sunknudsen/.gnupg/openpgp-revocs.d' created
gpg: revocation certificate stored as '/Users/sunknudsen/.gnupg/openpgp-revocs.d/F365EDCF06F4D9F09BB7D4EB1BDC94DFB97BE4D4.rev'
public and secret key created and signed.
pub rsa4096 2020-06-16 [SC]
@ -163,7 +163,7 @@ This is a test!
### Decrypt message to stdout and decode quoted-printable characters
```console
$ gpg --decrypt /Users/johndoe/Desktop/encrypted.asc | perl -MMIME::QuotedPrint -0777 -nle 'print decode_qp($_)'
$ gpg --decrypt /Users/sunknudsen/Desktop/encrypted.asc | perl -MMIME::QuotedPrint -0777 -nle 'print decode_qp($_)'
gpg: encrypted with 4096-bit RSA key, ID 5574F4B0B0F67D7F, created 2019-10-17
"Sun Knudsen <hello@sunknudsen.com>"
gpg: encrypted with 4096-bit RSA key, ID 0DA22A1AC7DBA3F9, created 2020-06-16