Wednesday, 22 October 2008

eebuntu and eeepc 1000

It was a bit annoying but got it working... finally.

1. download the new version of eebuntu from here the standard version (more linux looking than the other (although same applies there as well)

2. use an existing install of ubuntu or a VM to create the damn USB stick/bootable thingy following the "manual"

3. keep pressing escape to boot from the usb stick - install - be happy - boot the actual OS

4. realize that none of the nics work

5. download the new kernel and its modules

6. install them
sudo dpkg-i linux-image-2.6.24-21-eeepc_2.6.24-21.39eeepc1_i386.deb-ubuntu linux-modules-2.6.24-21-eeepc_2.6.24-21.30eeepc5_i386.deb

7. reboot and be happy!

8. realize that pressing Fn+F2 kills the laptop

9. download the alternative script

sudo mv /etc/acpi
sudo chmod +x

10. connect to the net and fix bluetooth
sudo apt-get install bluetooth bluez-gnome bluez-utils

11. for eee-pc related updates you can add the array repo by:
sudo mv -v array.list /etc/apt/sources.list.d/
sudo apt-key add array-apt-key.asc
sudo apt-get update
sudo apt-get install linux-eeepc linux-headers-eeepc

12. Force avahi to shut up and stop creating aliased NICs

chmod -x /etc/init.d/avahi*

13.go get yourself a drink :) its not like you did something huge but at least you can enjoy your new laptop now :)

thanks for playing :)

Thursday, 16 October 2008

Solaris 10 firewalling

To make matters easy:

iptables -L == ipfstat -io

The configuration file for the firewall is on /etc/ipf/ipf.conf and its service's FMRI is svc:/network/pfil:default

ipf -E : Enable ipfilter when running for the first time.

ipf -f /etc/ipf/ipf.conf : Load rules in /etc/ipf/ipf.conf file into the active firewall.

ipf -Fa -f /etc/ipf/ipf.conf : Flush all rules, then load rules in /etc/ipf/ipf.conf into active firwall.

ipf -Fi : Flush all input rules.

ipf -I -f /etc/ipf/ipf.conf : Load rules in /etc/ipf/ipf.conf file into inactive firewall.

ipfstat -hio : Show hits against all rules

ipfstat -t -T 5 : Monitor the state table and refresh every 5 seconds. Output is similar to 'top'

And finally an example of a ipf.conf just for the heck of having one just in case:

# 11/18/04 - Newest Firewall for testing.
# Rich Shattuck
# My IP:
# Block any packets which are too short to be real
block in log quick all with short
# drop and log any IP packets with options set in them.
block in log all with ipopts
# Allow all traffic on loopback.
pass in quick on lo0 all
pass out quick on lo0 all
# Public Network.   Block everything not explicity allowed.
block in  on elxl0 all
block out on elxl0 all
# Allow pings out.
pass out quick on elxl0 proto icmp all keep state
# for testing, allow pings from ben and jerry
pass in quick on elxl0 proto icmp from to
pass in quick on elxl0 proto icmp from to
# Allow outbound state related packets.
pass out quick on elxl0 proto tcp/udp from any to any keep state
# allow ssh from only.
# pass in log quick on elxl0 from to port = 22
# Actually, allow ssh only from ben, jerry, MSU
pass in log quick on elxl0 proto tcp from to port = 22
pass in log quick on elxl0 proto tcp from to port = 22
pass in log quick on elxl0 proto tcp from to port = 22

Thanks for playing :)