|
|
Line 141: |
Line 141: |
| # mount /my-mount-location # now it will be there when you reboot! but do this to get it NOW :-) | | # mount /my-mount-location # now it will be there when you reboot! but do this to get it NOW :-) |
| # Note that if you mount the new drive under /spiceflow, samba will already be serving it up, whoop! | | # Note that if you mount the new drive under /spiceflow, samba will already be serving it up, whoop! |
| |}
| |
| {| class="mw-collapsible mw-collapsed wikitable"
| |
| ! thedigitalmachine LAN IP addresses
| |
| |-
| |
| | We want all IP address management to happen on the Buffalo DD-WRT router, as much as possible.
| |
|
| |
| Ideally, static IPs will be served up to every known box based on MAC address.
| |
| Then no matter what OS is booted, the machine will have the same name and IP address.
| |
| The router is slick, it can do it, but be careful to Save AND Apply changes there.
| |
| DHCP dynamic assignment IP range is 2...99, keep static IPs out of this range.
| |
|
| |
| every [/etc/hosts] should include this block:
| |
| <pre>
| |
| # ========================================================================================
| |
| # MDM My LAN names v10
| |
|
| |
| 192.168.21.1 tdm
| |
| 192.168.21.200 buffalo # hardcoded Buffalo DD-WRT router IP
| |
|
| |
| # MDM Buffalo DHCP-provided static IPs assigned by MAC addresses
| |
| # It's important to assign static IPs via router
| |
| # It will always give the same IP regardless of OS
| |
| # And it has the ability to provide the names via local DNS (I think!)
| |
| # NOTE THAT 192.168.21.2-99 are RESERVED for dynamic IPs
| |
| 192.168.21.132 wimpy # F4-6D-04-25-9C-60
| |
| 192.168.21.133 wallee-wireless # macbook pro 00:26:bb:07:d3:7d
| |
| 192.168.21.134 wallee # macbook pro 00:26:4a:18:ed:58
| |
| 192.168.21.140 babe # andrea's ipad2 04:54:53:3A:7B:2A
| |
| 192.168.21.179 dune # 00:1f:e2:07:2d:0e
| |
|
| |
| # TO BE ADDED UPDATED AND VERIFIED AS NEEDED
| |
| # NOTE THAT 192.168.21.2-99 are RESERVED for dynamic IPs
| |
| 192.168.21.4 darthfun # mike's iphone 00:26:B0:99:7F:7E
| |
| 192.168.21.5 eetee # ipod touch 8gb 00:26:b0:59:4a:94
| |
| 192.168.21.6 sweepea # girl's d-link card 00:1e:58:96:3a:2a
| |
| 192.168.21.7 wiihii # wii 00:21:47:ba:c8:c2
| |
| 192.168.21.8 iroku # roku wired 00:0d:4b:49:a6:30
| |
| 192.168.21.9 irokit # roku wireless 00:0d:4b:49:a6:31
| |
| 192.168.21.10 wynter # bailey's win7 laptop 00:11:F5:89:7B:00
| |
| 192.168.21.11 hermione # andrea's dell inspiron 00:24:D6:78:42:A8
| |
| 192.168.21.12 toothless # wren's eee 1C:4B:D6:A3:E1:28
| |
| 192.168.21.13 dunno # 00:0f:b5:f6:99:d2
| |
| 192.168.21.16 jackwhite # wren's iphone 54:26:96:BB:A4:CD
| |
| 192.168.21.193 hermione-wired
| |
| 192.168.21.194 toothless-wired # MAC address 48:5B:39:2B:8F:E8
| |
| 192.168.21.195 6c-blade1
| |
|
| |
| # ========================================================================================
| |
| </pre>
| |
| |} | | |} |
| {| class="mw-collapsible mw-collapsed wikitable" | | {| class="mw-collapsible mw-collapsed wikitable" |
Line 247: |
Line 198: |
| # don't forget to clean up.. | | # don't forget to clean up.. |
| rm /spiceflow/newraid-4tb-bp/dd_test_output.dat | | rm /spiceflow/newraid-4tb-bp/dd_test_output.dat |
| |}
| |
| {| class="mw-collapsible mw-collapsed wikitable"
| |
| ! Updating mediawiki installation
| |
| |-
| |
| |
| |
| cd /var/www/localhost/htdocs/mediawiki
| |
| emacs LocalSettings_redirector.php (to hardcode each site)
| |
| php maintenance/update.php
| |
| (repeat for each site)
| |
| emacs LocalSettings_redirector.php (to reset dynamic behavior)
| |
| |}
| |
| {| class="mw-collapsible mw-collapsed wikitable"
| |
| ! Creating a new ssh key pair for no-password access to a remote system
| |
| |-
| |
| | Say you've got a new machine with user [m] and you want to connect to it, do this:
| |
| * install sshd, make sure it's running
| |
| * get on the new machine - ssh to the new machine by typing the password if you don't have direct access
| |
| * $ scp m@tdm:.ssh/id_rsa .ssh/
| |
| * $ scp m@tdm:.ssh/authorized_keys .ssh/
| |
|
| |
| wow I just had serious issues with basic ssh usage, so i'll put a summary on the wiki
| |
| basically most misunderstandings stem from describing these two:
| |
| client: machine that is trying to ssh into the server
| |
| server: machine that the client user wants to get to
| |
| most poor sots are just sitting on the client
| |
| and they create a pair and push their public key to the server
| |
| but in my case, more often, i want to create a pair on the server
| |
| and push the private key to the multiple places i need to connect FROM
| |
| when doing that, you have to push the public key into the server's authorized_keys
| |
| and configure the client to juggle multiple private keys
| |
|
| |
| create a key pair:
| |
| ssh suser@server
| |
| ssh-keygen
| |
| use defaults
| |
| will create:
| |
| .ssh/id_rsa (private key)
| |
| .ssh/id_rsa.pub (public key)
| |
|
| |
| put the public key in place:
| |
| cd .ssh
| |
| cat id_rsa.pub >>authorized_keys
| |
|
| |
| put the private key on the client and configure:
| |
| scp id_rsa cuser@client:.ssh/id_rsa_server
| |
| ssh cuser@client
| |
| em .ssh/config
| |
| Host tdm thedigitalmachine.com
| |
| Hostname thedigitalmachine.com
| |
| IdentityFile ~/.ssh/id_rsa
| |
| User m
| |
| Host server
| |
| Hostname server.com
| |
| IdentityFile ~/.ssh/id_rsa_server
| |
| User suser
| |
|
| |
| all is full of light
| |
| |} | | |} |
| {| class="mw-collapsible mw-collapsed wikitable" | | {| class="mw-collapsible mw-collapsed wikitable" |
Line 705: |
Line 599: |
| * ubuntu root ub_root -> ../../sda5 | | * ubuntu root ub_root -> ../../sda5 |
| * /vista /dev/sda3 | | * /vista /dev/sda3 |
| | |} |
| | {| class="mw-collapsible mw-collapsed wikitable" |
| | ! Updating mediawiki installation |
| | |- |
| | | |
| | cd /var/www/localhost/htdocs/mediawiki |
| | emacs LocalSettings_redirector.php (to hardcode each site) |
| | php maintenance/update.php |
| | (repeat for each site) |
| | emacs LocalSettings_redirector.php (to reset dynamic behavior) |
| | |} |
| | {| class="mw-collapsible mw-collapsed wikitable" |
| | ! Creating a new ssh key pair for no-password access to a remote system |
| | |- |
| | | Say you've got a new machine with user [m] and you want to connect to it, do this: |
| | * install sshd, make sure it's running |
| | * get on the new machine - ssh to the new machine by typing the password if you don't have direct access |
| | * $ scp m@tdm:.ssh/id_rsa .ssh/ |
| | * $ scp m@tdm:.ssh/authorized_keys .ssh/ |
| | |
| | wow I just had serious issues with basic ssh usage, so i'll put a summary on the wiki |
| | basically most misunderstandings stem from describing these two: |
| | client: machine that is trying to ssh into the server |
| | server: machine that the client user wants to get to |
| | most poor sots are just sitting on the client |
| | and they create a pair and push their public key to the server |
| | but in my case, more often, i want to create a pair on the server |
| | and push the private key to the multiple places i need to connect FROM |
| | when doing that, you have to push the public key into the server's authorized_keys |
| | and configure the client to juggle multiple private keys |
| | |
| | create a key pair: |
| | ssh suser@server |
| | ssh-keygen |
| | use defaults |
| | will create: |
| | .ssh/id_rsa (private key) |
| | .ssh/id_rsa.pub (public key) |
| | |
| | put the public key in place: |
| | cd .ssh |
| | cat id_rsa.pub >>authorized_keys |
| | |
| | put the private key on the client and configure: |
| | scp id_rsa cuser@client:.ssh/id_rsa_server |
| | ssh cuser@client |
| | em .ssh/config |
| | Host tdm thedigitalmachine.com |
| | Hostname thedigitalmachine.com |
| | IdentityFile ~/.ssh/id_rsa |
| | User m |
| | Host server |
| | Hostname server.com |
| | IdentityFile ~/.ssh/id_rsa_server |
| | User suser |
| | |
| | all is full of light |
| |} | | |} |
| {| class="mw-collapsible mw-collapsed wikitable" | | {| class="mw-collapsible mw-collapsed wikitable" |