mirror of
https://github.com/sunknudsen/privacy-guides.git
synced 2025-02-23 17:43:56 +00:00
Fixed wrong code block types
This commit is contained in:
parent
6b2f0adff7
commit
7f98e95fb4
@ -31,7 +31,7 @@ When asked for file in which to save key, enter `pi`.
|
|||||||
|
|
||||||
When asked for passphrase, use output from `openssl rand -base64 24` (and store passphrase in password manager).
|
When asked for passphrase, use output from `openssl rand -base64 24` (and store passphrase in password manager).
|
||||||
|
|
||||||
```shell
|
```console
|
||||||
$ mkdir -p ~/.ssh
|
$ mkdir -p ~/.ssh
|
||||||
|
|
||||||
$ cd ~/.ssh
|
$ cd ~/.ssh
|
||||||
|
@ -76,7 +76,7 @@ EOF
|
|||||||
|
|
||||||
#### Generate client cert
|
#### Generate client cert
|
||||||
|
|
||||||
```
|
```console
|
||||||
$ openssl genrsa -out $STRONGSWAN_CLIENT_NAME.key 4096
|
$ openssl genrsa -out $STRONGSWAN_CLIENT_NAME.key 4096
|
||||||
Generating RSA private key, 4096 bit long modulus
|
Generating RSA private key, 4096 bit long modulus
|
||||||
............................++
|
............................++
|
||||||
@ -389,7 +389,7 @@ systemctl restart strongswan
|
|||||||
|
|
||||||
### Step 10: confirm strongSwan client is connected
|
### Step 10: confirm strongSwan client is connected
|
||||||
|
|
||||||
```shell
|
```console
|
||||||
$ ipsec status
|
$ ipsec status
|
||||||
Security Associations (1 up, 0 connecting):
|
Security Associations (1 up, 0 connecting):
|
||||||
ikev2[1]: ESTABLISHED 3 minutes ago, 10.0.1.248[bob@vpn-server.com]...185.193.126.203[vpn-server.com]
|
ikev2[1]: ESTABLISHED 3 minutes ago, 10.0.1.248[bob@vpn-server.com]...185.193.126.203[vpn-server.com]
|
||||||
@ -432,7 +432,7 @@ su -
|
|||||||
|
|
||||||
Replace `10.0.2.171` with IP assigned to strongSwan client by strongSwan server (see [step 10](#step-10-confirm-strongswan-client-is-connected)).
|
Replace `10.0.2.171` with IP assigned to strongSwan client by strongSwan server (see [step 10](#step-10-confirm-strongswan-client-is-connected)).
|
||||||
|
|
||||||
```shell
|
```console
|
||||||
$ cat /var/lib/misc/dnsmasq.leases | grep "10.0.2.171" | awk '{print $2}'
|
$ cat /var/lib/misc/dnsmasq.leases | grep "10.0.2.171" | awk '{print $2}'
|
||||||
7a:a7:9f:c0:9d:b0
|
7a:a7:9f:c0:9d:b0
|
||||||
```
|
```
|
||||||
@ -471,7 +471,7 @@ systemctl restart strongswan
|
|||||||
|
|
||||||
### Step 20: confirm strongSwan client has IP `10.0.2.2`
|
### Step 20: confirm strongSwan client has IP `10.0.2.2`
|
||||||
|
|
||||||
```shell
|
```console
|
||||||
$ ipsec status
|
$ ipsec status
|
||||||
Security Associations (1 up, 0 connecting):
|
Security Associations (1 up, 0 connecting):
|
||||||
ikev2[1]: ESTABLISHED 3 minutes ago, 10.0.1.248[bob@vpn-server.com]...185.193.126.203[vpn-server.com]
|
ikev2[1]: ESTABLISHED 3 minutes ago, 10.0.1.248[bob@vpn-server.com]...185.193.126.203[vpn-server.com]
|
||||||
|
@ -130,7 +130,7 @@ EOF
|
|||||||
|
|
||||||
### Step 8: reboot and confirm hostname and MAC address have been spoofed
|
### Step 8: reboot and confirm hostname and MAC address have been spoofed
|
||||||
|
|
||||||
```shell
|
```console
|
||||||
# Spoofed hostname
|
# Spoofed hostname
|
||||||
$ scutil --get HostName
|
$ scutil --get HostName
|
||||||
Gatlins-MacBook-Pro
|
Gatlins-MacBook-Pro
|
||||||
|
Loading…
x
Reference in New Issue
Block a user