I hereby claim:
- I am dcava on github.
- I am dcava (https://keybase.io/dcava) on keybase.
- I have a public key whose fingerprint is 6C01 2F8F 4F00 1D93 D8ED A8DB 2984 445A 0C0F FF10
To claim this, I am signing this object:
#!/bin/bash | |
# | |
# /etc/ppp/ip-down | |
# | |
# When the ppp link goes down, this script is called with the following | |
# parameters | |
# $1 the interface name used by pppd (e.g. ppp3) | |
# $2 the tty device name | |
# $3 the tty device speed | |
# $4 the local IP address for the interface |
# Install repo | |
echo "deb http://deb.debian.org/debian/ unstable main" > /etc/apt/sources.list.d/unstable-wireguard.list | |
printf 'Package: *\nPin: release a=unstable\nPin-Priority: 150\n' > /etc/apt/preferences.d/limit-unstable | |
apt update | |
#unstall kernel sources headers (not sure if need both) | |
apt install libmnl-dev rbp2-headers-$(uname -r) rbp2-source-$(uname -r) build-essential pkg-config | |
#ln the build dir to kernel headers |
Personal reminder guide on how to more securely setup OpenVPN on Synology DSM 6.2+ (Jan 2017) | |
Issues fixed: | |
1. Default OpenVPN is secured with auth-use-pass only | |
2. no HMAC | |
3. no client certificate | |
4. no DH | |
Problems: |
I hereby claim:
To claim this, I am signing this object:
# cat /usr/syno/etc.defaults/rc.d/S01iptables_nat.sh | |
# Script to enable port forwarding and IP Masquerading, to share | |
# the wireless connection to the ethernet port of ds213air | |
# e.g. computer -> eth0 -> diskstation -> wlan0 -> router -> interwebs | |
# Enable port forwarding, in case not enabled by default | |
echo 1 > /proc/sys/net/ipv4/ip_forward | |
# Load the required modules | |
/usr/syno/etc.defaults/rc.d/S01iptables.sh load_nat_mod forwarding_test |