NoMachine NX client and FreeNX will start your GUI as KDE or GNOME. But if you choose custom desktop from configuration menu, you can set the command to ‘startxfce4’. This will start the XFCE desktop instead (if installed).
Archive for August, 2012
Setting nomachine NX client and FreeNX client to start XFCE Desktop
Saturday, August 18th, 2012Installing iFolder 3.8 on OpenSuSE 12.1 (or 11.4)
Friday, August 17th, 2012This is a copy of the original post on http://yourlinuxguy.com/?p=916.
It looks like some people are working very hard out there to try and preserve iFolder for future versions of Opensuse. To those people (the NoFolder crew, Ravi Kumar, etc.), I’m indebted; I simply would be at a loss without iFolder. Yes, I use DropBox, and a couple other things, but there’s just nothing like iFolder for complete control over the server and the sync’d content.
But the sad fact is, it has suffered a bit of neglect as of late. Okay, a LOT of neglect. And you’re probably here because you have an Opensuse 12.1 (or 11.4) server, and you tried to install iFolder 3.8.x on it, and had some trouble.
Notes: I strongly recommend you see my old post about setting up iFolder 3.8 on Opensuse 11.1 for background and additional detail, as this post will be brief and to-the-point without much supporting detail. All the work in this doc was performed on the x86_64 version of Opensuse, and was tested on both 12.1 and 11.4.
FIRST, you need a working Apache2 installation with SSL support. Find previous post if you need help with this.
We need to install below packages :
ifolder3-enterprise-3.8.4.0.11091.1-6.2.x86_64
novell-ifolder-enterprise-plugins-3.8.4.10192.1-6.3.x86_64
And run all 3 configuration scripts and please note that you must use an alternative simias datastore location of /ifolder
:
simias-server-setup ifolder-admin-setup ifolder-web-setup NOTE: When asked for server address, use a fully qualified server address as below :
Change :
Public URL: https://192.168.0.79/simias10
Private URL: https://192.168.0.79/simias10
to
Public URL: https://ifolder01.MyDomainName.com:52443/simias10
Private URL: https://192.168.0.79/simias10
…and now my external clients can connect via the ifolder client, and sync seems to be working.
NOTE 2 : Don’t use default server data folder. I use /home/iFolder/
A note about the next step: If you just stopped here, you’d be able to pull up the /admin page, but not log in; you’d get a red message saying that your password doesn’t match or whatever. I see this error quite commonly out there… So let’s change the FlaimWrapper softlink pointer to an existing location:
rm /usr/lib64/simias/web/bin/FlaimWrapper.so ln -s /usr/lib64/libFlaimWrapper.so.0 /usr/lib64/simias/web/bin/FlaimWrapper.so
And lastly, restart stuff:
rcSuSEfirewall2 restart;rcapache2 stop; rcapache2 start
And that should do it! Log in at /admin, configure some users, etc., etc., etc. I’m guessing you are here because you know already how to *use* iFolder, just got stuck installing and configuring it, so I’ll not go into any usage detail.
By the way, the NoFolder.com page has some good troubleshooting tips, but if you follow these steps accurately, and you use the SAME hostname throughout the configuration, you should be fine.
See, it’s not that bad. And it’s totally worth it. Enjoy!
Configuring APACHE2 with SSL support in OpenSuSE
Friday, August 17th, 2012Following is a step-by-step guide to creating your own CA (Certificate Authority) — and also self-signed SSL server certificates — with openssl on Linux. Self-signing is the simpler route to take, but making one’s own CA allows the signing of multiple server certificates using the same CA and involves only a few extra steps.
After using openssl to generate the necessary files, you’ll need to integrate them into Apache. This process differs between Linux distros and versions of Apache.
You need Apache and openssl. Compiling them from source, handling dependencies, etc. is beyond the scope of this document. You can consult their documentation, or go with a mainstream Linux distro that will do the preliminary work for you.Now you need to decide whether you’ll make a CA (Certificate Authority) and sign a server certificate with it — or just self-sign a server certificate. Both procedures are detailed below.
Generate a server key:
openssl genrsa -des3 -out server.key 4096 Then create a certificate signing request with it. This command will prompt for a series of things (country, state or province, etc.). Make sure that “Common Name (eg, YOUR name)” matches the registered fully qualified domain name of your box (or your IP address if you don’t have one). I also suggest not making a challenge password at this point, since it’ll just mean more typing for you. The default values for the questions ([AU], Internet Widgits Pty Ltd, etc.) are stored here: /etc/ssl/openssl.cnf. So if you’ve got a large number of certificate signing requests to process you probably want to carefully edit that file where appropriate. Otherwise, just execute the command below and type what needs to be typed:mv server.key.insecure server.key
In this step you’ll take the place of VeriSign, Thawte, etc. You’ll first build the CA key, then build the certificate itself.
The Common Name (CN) of the CA and the Server certificates must NOT match or else a naming collision will occur and you’ll get errors later on. In this step, you’ll provide the CA entries. In a step below, you’ll provide the Server entries. In this example, I just added “CA” to the CA’s CN field, to distinguish it from the Server’s CN field. Use whatever schema you want, just make sure the CA and Server entries are not identical.
CA:
Common Name (CN): www.somesite.edu CA
Organization (O): Somesite
Organizational Unit (OU): Development
Server:
Common Name (CN): www.somesite.edu
Organization (O): Somesite
Organizational Unit (OU): Development
If you don’t have a fully qualified domain name, you should use the IP that you’ll be using to access your SSL site for Common Name (CN). But, again, make sure that something differentiates the entry of the CA’s CN from the Server’s CN.
openssl req -new -x509 -days 365 -key ca.key -out ca.crt
openssl req -new -key server.key -out server.csr
The command below does a number of things. It takes your signing request (csr) and makes a one-year valid signed server certificate (crt) out of it. In doing so, we need to tell it which Certificate Authority (CA) to use, which CA key to use, and which Server key to sign. We set the serial number to 01, and output the signed key in the file named server.crt. If you do this again after people have visited your site and trusted your CA (storing it in their browser), you might want to use 02 for the next serial number, and so on. You might create some scheme to make the serial number more “official” in appearance or makeup but keep in mind that it is fully exposed to the public in their web browsers, so it offers no additional security in itself.
openssl req -noout -text -in server.csr
openssl rsa -noout -text -in ca.key
openssl x509 -noout -text -in ca.crt
mv server.key server.key.secure
mv server.key.insecure server.key
server.csr: Server certificate signing request.
server.key: The private server key, does not require a password when starting Apache.
server.key.secure: The private server key, it does require a password when starting Apache.
If you took route 1B and created a CA, you’ll have two additional files:
ca.crt: The Certificate Authority’s own certificate.
ca.key: The key which the CA uses to sign server signing requests.
The CA files are important to keep if you want to sign additional server certificates and preserve the same CA. You can reuse these so long as they remain secure, and haven’t expired.
cp server.crt /etc/apache2/ssl.crt
cp server.csr /etc/apache2/ssl.csr
mkdir www-ssl
cd www-ssl
mkdir htdocs
cd htdocs
echo “ssl index page”>index.html
mime negotiation setenvif status userdir asis imap php4 ssl”
DocumentRoot “/srv/www-ssl/htdocs”
ServerName xxx.xxx.xxx.xxx:443
ServerAdmin youremail@yoursite.org
Just before the </VirtualHost> directive is closed, add the following, making tweaks as necessary for your environment. If you don’t make a directory directive, the SSL instance won’t know where to look for the doc root.
AllowOverride None
Order allow,deny
Allow from all
</Directory>
Make sure that HTTP and HTTPS are enabled for the External Zone. Note that this mechanism assumes port 80 and port 443 respectively. If you want to set up HTTP or HTTPS on a different port (for instance, 8080 or 444) you need to go to the Advanced screen and manually type in the port number under “TCP Ports” and describe the protocol you’re adding (for example, HTTP or HTTPS) in the last line under “IP Protocols.” If you have a router, it probably carries additional firewall rules. You’ll need to open up the appropriate port(s) there as well. That’s beyond the scope of this document, but should be in the docs that pertain to your hardware.
./apache2 restart
Creating a bootable live USB Drive in Linux
Sunday, August 12th, 2012First, you need to download the LiveCD iso image of your choice. After inserting your USB stick, you can find out what device it is
~> su # grep -Ff <(hwinfo --disk --short) <(hwinfo --usb --short)
Finally, once you’ve found your block device, write the image to it. Point ‘dd’ to the full path such as ‘/home/user/Downloads/openSUSE-12.1-KDE-LiveCD-x86_64.iso’ or change directory (example: cd ./Downloads) to where the image is contained.
# umount /dev/sdX
# dd if=/path/to/downloaded.iso of=/dev/sdX