Fixed wrong code block types

This commit is contained in:
Sun Knudsen 2020-12-25 10:08:11 -05:00
parent 6b2f0adff7
commit 7f98e95fb4
No known key found for this signature in database
GPG Key ID: 1FA767862BBD1305
3 changed files with 6 additions and 6 deletions

View File

@ -31,7 +31,7 @@ When asked for file in which to save key, enter `pi`.
When asked for passphrase, use output from `openssl rand -base64 24` (and store passphrase in password manager). When asked for passphrase, use output from `openssl rand -base64 24` (and store passphrase in password manager).
```shell ```console
$ mkdir -p ~/.ssh $ mkdir -p ~/.ssh
$ cd ~/.ssh $ cd ~/.ssh

View File

@ -76,7 +76,7 @@ EOF
#### Generate client cert #### Generate client cert
``` ```console
$ openssl genrsa -out $STRONGSWAN_CLIENT_NAME.key 4096 $ openssl genrsa -out $STRONGSWAN_CLIENT_NAME.key 4096
Generating RSA private key, 4096 bit long modulus Generating RSA private key, 4096 bit long modulus
............................++ ............................++
@ -389,7 +389,7 @@ systemctl restart strongswan
### Step 10: confirm strongSwan client is connected ### Step 10: confirm strongSwan client is connected
```shell ```console
$ ipsec status $ ipsec status
Security Associations (1 up, 0 connecting): Security Associations (1 up, 0 connecting):
ikev2[1]: ESTABLISHED 3 minutes ago, 10.0.1.248[bob@vpn-server.com]...185.193.126.203[vpn-server.com] ikev2[1]: ESTABLISHED 3 minutes ago, 10.0.1.248[bob@vpn-server.com]...185.193.126.203[vpn-server.com]
@ -432,7 +432,7 @@ su -
Replace `10.0.2.171` with IP assigned to strongSwan client by strongSwan server (see [step 10](#step-10-confirm-strongswan-client-is-connected)). Replace `10.0.2.171` with IP assigned to strongSwan client by strongSwan server (see [step 10](#step-10-confirm-strongswan-client-is-connected)).
```shell ```console
$ cat /var/lib/misc/dnsmasq.leases | grep "10.0.2.171" | awk '{print $2}' $ cat /var/lib/misc/dnsmasq.leases | grep "10.0.2.171" | awk '{print $2}'
7a:a7:9f:c0:9d:b0 7a:a7:9f:c0:9d:b0
``` ```
@ -471,7 +471,7 @@ systemctl restart strongswan
### Step 20: confirm strongSwan client has IP `10.0.2.2` ### Step 20: confirm strongSwan client has IP `10.0.2.2`
```shell ```console
$ ipsec status $ ipsec status
Security Associations (1 up, 0 connecting): Security Associations (1 up, 0 connecting):
ikev2[1]: ESTABLISHED 3 minutes ago, 10.0.1.248[bob@vpn-server.com]...185.193.126.203[vpn-server.com] ikev2[1]: ESTABLISHED 3 minutes ago, 10.0.1.248[bob@vpn-server.com]...185.193.126.203[vpn-server.com]

View File

@ -130,7 +130,7 @@ EOF
### Step 8: reboot and confirm hostname and MAC address have been spoofed ### Step 8: reboot and confirm hostname and MAC address have been spoofed
```shell ```console
# Spoofed hostname # Spoofed hostname
$ scutil --get HostName $ scutil --get HostName
Gatlins-MacBook-Pro Gatlins-MacBook-Pro