linux – Duvida ao abrir o localhost no Ubuntu

galera estou com uma duvida,eu não consigo abrir o localhost. Aparece essa pagina que diz que deu sucesso Apache2 Ubuntu Default Page. Porém não sei oque fazer.

“This is the default welcome page used to test the correct operation of the Apache2 server after installation on Ubuntu systems. It is based on the equivalent page on Debian, from which the Ubuntu Apache packaging is derived. If you can read this page, it means that the Apache HTTP server installed at this site is working properly. You should replace this file (located at /var/www/html/index.html) before continuing to operate your HTTP server.”

não sei resolver isso, me ajudem porfavor.

linux – How to read a root file without escalating privileges?

With a friend, we prepare ctf style machines and well, there is a file called flag_ctf in the root folder (root/flag_ctf.txt). However, he told me that there was no need to launch exploits or try to escalate privileges, but that it was due to bad configuration.

I tried to search for suid files but found nothing unusual. What else could I do?

Command: find / -user root -perm -4000 -print 2>/dev/null

/usr/lib/snapd/snap-confine
/usr/lib/openssh/ssh-keysign
/usr/lib/eject/dmcrypt-get-device
/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/usr/lib/policykit-1/polkit-agent-helper-1
/usr/lib/x86_64-linux-gnu/lxc/lxc-user-nic
/usr/bin/sudo
/usr/bin/gpasswd
/usr/bin/newuidmap
/usr/bin/pkexec
/usr/bin/chfn
/usr/bin/newgrp
/usr/bin/passwd
/usr/bin/newgidmap
/usr/bin/chsh
/bin/ping6
/bin/ping
/bin/fusermount
/bin/umount
/bin/mount
/bin/su

Command: find / ( -perm -2000 -o -perm -4000 ) -exec ls -ld {} ; 2>/dev/null

-rwsr-xr-x 1 root root 110792 Sep  8 09:01 /usr/lib/snapd/snap-confine
-rwsr-xr-x 1 root root 428240 May 26 23:17 /usr/lib/openssh/ssh-keysign
-rwsr-xr-x 1 root root 10232 Mar 27  2017 /usr/lib/eject/dmcrypt-get-device
-rwsr-xr-- 1 root messagebus 42992 Jun 11 20:06 /usr/lib/dbus-1.0/dbus-daemon-launch-helper
-rwsr-xr-x 1 root root 14864 Mar 27  2019 /usr/lib/policykit-1/polkit-agent-helper-1
-rwxr-sr-x 1 root utmp 10232 Mar 11  2016 /usr/lib/x86_64-linux-gnu/utempter/utempter
-rwsr-xr-x 1 root root 84120 Apr  9  2019 /usr/lib/x86_64-linux-gnu/lxc/lxc-user-nic
drwxrwsr-x 3 root staff 4096 Oct 14 03:23 /usr/local/lib/python3.5
drwxrwsr-x 2 root staff 4096 Oct 14 03:23 /usr/local/lib/python3.5/dist-packages
drwxrwsr-x 6 root staff 4096 Oct 14 03:27 /usr/local/share/xml
drwxrwsr-x 2 root staff 4096 Oct 14 03:27 /usr/local/share/xml/entities
drwxrwsr-x 2 root staff 4096 Oct 14 03:27 /usr/local/share/xml/misc
drwxrwsr-x 2 root staff 4096 Oct 14 03:27 /usr/local/share/xml/schema
drwxrwsr-x 2 root staff 4096 Oct 14 03:27 /usr/local/share/xml/declaration
drwxrwsr-x 2 root staff 4096 Oct 21 19:35 /usr/local/share/fonts
drwxrwsr-x 7 root staff 4096 Oct 14 03:26 /usr/local/share/sgml
drwxrwsr-x 2 root staff 4096 Oct 14 03:26 /usr/local/share/sgml/entities
drwxrwsr-x 2 root staff 4096 Oct 14 03:26 /usr/local/share/sgml/dtd
drwxrwsr-x 2 root staff 4096 Oct 14 03:26 /usr/local/share/sgml/misc
drwxrwsr-x 2 root staff 4096 Oct 14 03:26 /usr/local/share/sgml/stylesheet
drwxrwsr-x 2 root staff 4096 Oct 14 03:26 /usr/local/share/sgml/declaration
-rwsr-xr-x 1 root root 136808 Jan 31  2020 /usr/bin/sudo
-rwsr-xr-x 1 root root 75304 Mar 26  2019 /usr/bin/gpasswd
-rwxr-sr-x 1 root ssh 358624 May 26 23:17 /usr/bin/ssh-agent
-rwxr-sr-x 1 root shadow 22768 Mar 26  2019 /usr/bin/expiry
-rwxr-sr-x 1 root utmp 434216 Feb  7  2016 /usr/bin/screen
-rwxr-sr-x 1 root tty 27368 Jan 27  2020 /usr/bin/wall
-rwsr-xr-x 1 root root 32944 Mar 26  2019 /usr/bin/newuidmap
-rwxr-sr-x 1 root tty 14752 Mar  1  2016 /usr/bin/bsd-write
-rwsr-xr-x 1 root root 23376 Mar 27  2019 /usr/bin/pkexec
-rwsr-xr-x 1 root root 71824 Mar 26  2019 /usr/bin/chfn
-rwxr-sr-x 1 root shadow 62336 Mar 26  2019 /usr/bin/chage
-rwsr-xr-x 1 root root 39904 Mar 26  2019 /usr/bin/newgrp
-rwxr-sr-x 1 root crontab 36080 Apr  5  2016 /usr/bin/crontab
-rwxr-sr-x 1 root mlocate 39520 Nov 18  2014 /usr/bin/mlocate
-rwsr-xr-x 1 root root 54256 Mar 26  2019 /usr/bin/passwd
-rwsr-xr-x 1 root root 32944 Mar 26  2019 /usr/bin/newgidmap
-rwsr-xr-x 1 root root 40432 Mar 26  2019 /usr/bin/chsh
-rwsr-sr-x 1 daemon daemon 51464 Jan 14  2016 /usr/bin/at
-rwxr-sr-x 1 root shadow 35632 Oct  1 00:36 /sbin/pam_extrausers_chkpwd
-rwxr-sr-x 1 root shadow 35600 Oct  1 00:36 /sbin/unix_chkpwd
drwxr-sr-x 3 root systemd-journal 60 Oct 24 18:13 /run/log/journal
drwxr-s---+ 2 root systemd-journal 180 Oct 25 19:38 /run/log/journal/4a4677a06c6b47b0a82c2b4a1557b3d2
drwxrwsr-x 2 root staff 4096 Apr 12  2016 /var/local
drwxrwsr-x 2 root mail 4096 Oct 14 03:23 /var/mail
drwxr-sr-x 32 man root 4096 Oct 25 06:47 /var/cache/man
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/ja
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/ja/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/ja/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/ja/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/es
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/es/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/es/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/es/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/da
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/da/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/da/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/da/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/fr
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/fr/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/fr/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/fr/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/pt_BR
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/pt_BR/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/pt_BR/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/pt_BR/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/cs
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cs/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cs/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cs/cat8
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cat5
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/sv
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/sv/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/sv/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/sv/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/ru
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/ru/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/ru/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/ru/cat8
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cat7
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/zh_TW
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/zh_TW/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/zh_TW/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/zh_TW/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/ko
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/ko/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/ko/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/ko/cat8
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cat9
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/de
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/de/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/de/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/de/cat8
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cat6
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/hu
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/hu/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/hu/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/hu/cat8
drwxr-sr-x 4 man root 4096 Oct 25 06:47 /var/cache/man/sl
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/sl/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/sl/cat8
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cat3
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/id
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/id/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/id/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/id/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/it
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/it/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/it/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/it/cat8
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cat4
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cat8
drwxr-sr-x 3 man root 4096 Oct 25 06:47 /var/cache/man/fi
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/fi/cat1
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/pt
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/pt/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/pt/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/pt/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/zh_CN
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/zh_CN/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/zh_CN/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/zh_CN/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/pl
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/pl/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/pl/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/pl/cat8
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/tr
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/tr/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/tr/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/tr/cat8
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/cat2
drwxr-sr-x 5 man root 4096 Oct 25 06:47 /var/cache/man/nl
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/nl/cat5
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/nl/cat1
drwxr-sr-x 2 man root 4096 Oct 21 19:31 /var/cache/man/nl/cat8
-rwsr-xr-x 1 root root 44680 May  7  2014 /bin/ping6
-rwsr-xr-x 1 root root 44168 May  7  2014 /bin/ping
-rwsr-xr-x 1 root root 30800 Jul 12  2016 /bin/fusermount
-rwsr-xr-x 1 root root 27608 Jan 27  2020 /bin/umount
-rwsr-xr-x 1 root root 40152 Jan 27  2020 /bin/mount
-rwsr-xr-x 1 root root 40128 Mar 26  2019 /bin/su

Thank you very much.

linux – How to SSH from server A to B with port forwarding and transparent proxy – Ubuntu 20.04

I have two servers, A and B. These are pros and cons of both:

Server A pros:

if I use A to get access the internet, my cost is reduce by half
it is near my local internet provider and it has high speed

Server A cons:

limited access to internet, it can ping and sees some specific IPs, like server B and very limited IPs

Server B pros:

Full internet access

Server B cons:

if I user server B as proxy, my internet costs double

What I have tried so far

I started OpenVPN server on server A, and now my mobile (as client) can connect to server A with OpenVPN and when I check my IP it’s fine.

I started a screen in server A with this command:

ssh root@serverB_ip -p1994 -D 1994

Now when I check my mobile to see if it works and I can ping website like twitter.com, it returns me IP 10.10.10.10 that it shows I have not yet got full internet access unfortunately.

Someone told me this way is correct, but I should use something like transparent proxy and adding some rules to iptables, and I searched for it a little but they did not work. The websites I searched and checked resulted my server A not being accessible anymore so I did reinstall the OS.

What I want to reach

I want to connect server A to server B, so that server A can have full internet access. And as server A is an OpenVPN server, my mobile can full internet access with half cost too.

linux – MIT Kerberos: getting keytabs onto hosts securely

When setting up a host (… or updating its keytab if it needs new entries), what’s the standard way to set up keytabs?

Looks like the MIT Kerberos docs themselves recommend using ktadmin on the host itself (… sadly, I can’t find the exact page anymore to link though). However… I’d presume this involves getting an admin-level ticket onto the new host (… e.g. by logging in using an admin password).

That is, if the host has been compromised, the attacker now has admin powers.

Alternatively, you could create the keytab somewhere else (e.g. on the KDC or your own, secure-enough machine) and copy it over to the new host. However, scp won’t work if root ssh is disabled on the target; you can either copy it over to an unprivileged user’s home (… an user account that’s hopefully not used for anything else?), and make another copy as sudo root…

… or my personal solution is exporting a keytab, base64-ing it, and then running base64 -d | sudo tee /etc/krb5.keytab on the target. Which… works, but I presume there are more elegant solutions to this?

Or is “keylogger on host” a risk that everyone just accepts?

linux – mdadm – Attempted to move raid array to new system, superblocks gone?

I attempted to move a mdadm raid 1 array to a different system this evening.

I took the 2 SSDs out of one system and put them in another, then booted that system.

I opened gparted to check what the disks appeared as. They showed up as being blank (unallocated) drives.

I then shut down this system and moved the drives back to the original system, and booted.

sudo mdadm --assemble --scan --verbose

reported that no raid superblocks were found on sdg or sgh, which is where I would expect the data to be.

I thought this should be a fairly trivial process, but I’m now not sure what to do.

Any help would be appreciated, it’s kind of important I don’t loose the data on these drives…

linux – DD-WRT not routing clients over OpenVPN

I have a Linux router and OpenVPN client at home (running dd-wrt) which is connected to my office network via OpenVPN. From the router itself, I can access my office LAN and its hosts. However, from my home LAN, I can access the internet via my dd-wrt router, but not the Office LAN.

My setup goes like this:

.--------------.       .--------.          .----------------.
| Home network |------>| dd-wrt |---vpn--->| Office network |
'--------------'       '--------'          '----------------'
 172.18.20.0/24        172.18.20.1           172.18.11.0/24             
     
                             `-----works--------´  /
                                                  /
        `--------doesn't work---------------------´
 
root@ix1:~# ping 172.18.11.1
PING 172.18.11.1 (172.18.11.1): 56 data bytes
64 bytes from 172.18.11.1: seq=0 ttl=64 time=63.372 ms
 
root@ix1:~# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.0.1     0.0.0.0         UG    0      0        0 eth1
127.0.0.0       0.0.0.0         255.0.0.0       U     0      0        0 lo
169.254.0.0     0.0.0.0         255.255.0.0     U     0      0        0 br0
172.16.0.0      172.18.11.9     255.255.0.0     UG    0      0        0 tun1
172.18.11.0     172.18.11.9     255.255.255.0   UG    0      0        0 tun1
172.18.11.9     0.0.0.0         255.255.255.255 UH    0      0        0 tun1
172.18.20.0     0.0.0.0         255.255.255.0   U     0      0        0 br0
192.168.0.0     0.0.0.0         255.255.255.0   U     0      0        0 eth1
 
root@ix1:~# cat /tmp/openvpncl/route-up.sh
#!/bin/sh
iptables -D INPUT -i tun1 -j ACCEPT
iptables -D FORWARD -i tun1 -j ACCEPT
iptables -D FORWARD -o tun1 -j ACCEPT
iptables -I INPUT -i tun1 -j ACCEPT
iptables -I FORWARD -i tun1 -j ACCEPT
iptables -I FORWARD -o tun1 -j ACCEPT
 
root@ix1:~# ip a|grep tun1
9: tun1: <POINTOPOINT,MULTICAST,NOARP,UP,10000> mtu 1500 qdisc pfifo_fast qlen 100
    inet 172.18.11.10 peer 172.18.11.9/32 scope global tun1
 
root@ix1:~# iptables --list
Chain INPUT (policy ACCEPT)
target     prot opt source               destination
ACCEPT     0    --  anywhere             anywhere
ACCEPT     0    --  anywhere             anywhere            state RELATED,ESTABLISHED
ACCEPT     udp  --  anywhere             anywhere            udp spt:bootps dpt:bootpc
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:www
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:https
DROP       udp  --  anywhere             anywhere            udp dpt:route
DROP       udp  --  anywhere             anywhere            udp dpt:route
ACCEPT     udp  --  anywhere             anywhere            udp dpt:route
ACCEPT     tcp  --  anywhere             ix1                 tcp dpt:www
logbrute   tcp  --  anywhere             ix1                 tcp dpt:telnet
ACCEPT     tcp  --  anywhere             ix1                 tcp dpt:telnet
DROP       icmp --  anywhere             anywhere
DROP       igmp --  anywhere             anywhere
ACCEPT     0    --  anywhere             anywhere            state NEW
ACCEPT     0    --  anywhere             anywhere            state NEW
DROP       0    --  anywhere             anywhere
 
Chain FORWARD (policy ACCEPT)
target     prot opt source               destination
ACCEPT     0    --  anywhere             anywhere
ACCEPT     0    --  anywhere             anywhere
ACCEPT     gre  --  172.18.20.0/24       anywhere
ACCEPT     tcp  --  172.18.20.0/24       anywhere            tcp dpt:1723
lan2wan    0    --  anywhere             anywhere
ACCEPT     0    --  anywhere             anywhere            state RELATED,ESTABLISHED
ACCEPT     0    --  anywhere             anywhere
TRIGGER    0    --  anywhere             anywhere            TRIGGER type:in match:0 relate:0
trigger_out  0    --  anywhere             anywhere
ACCEPT     0    --  anywhere             anywhere            state NEW
DROP       0    --  anywhere             anywhere
 
Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
 
Chain advgrp_1 (0 references)
target     prot opt source               destination
 
Chain advgrp_10 (0 references)
target     prot opt source               destination
 
Chain advgrp_2 (0 references)
target     prot opt source               destination
 
Chain advgrp_3 (0 references)
target     prot opt source               destination
 
Chain advgrp_4 (0 references)
target     prot opt source               destination
 
Chain advgrp_5 (0 references)
target     prot opt source               destination
 
Chain advgrp_6 (0 references)
target     prot opt source               destination
 
Chain advgrp_7 (0 references)
target     prot opt source               destination
 
Chain advgrp_8 (0 references)
target     prot opt source               destination
 
Chain advgrp_9 (0 references)
target     prot opt source               destination
 
Chain grp_1 (1 references)
target     prot opt source               destination
 
Chain grp_10 (0 references)
target     prot opt source               destination
 
Chain grp_2 (0 references)
target     prot opt source               destination
 
Chain grp_3 (0 references)
target     prot opt source               destination
 
Chain grp_4 (0 references)
target     prot opt source               destination
 
Chain grp_5 (0 references)
target     prot opt source               destination
 
Chain grp_6 (0 references)
target     prot opt source               destination
 
Chain grp_7 (0 references)
target     prot opt source               destination
 
Chain grp_8 (0 references)
target     prot opt source               destination
 
Chain grp_9 (0 references)
target     prot opt source               destination
 
Chain lan2wan (1 references)
target     prot opt source               destination
grp_1      0    --  anywhere             anywhere
 
Chain logaccept (0 references)
target     prot opt source               destination
ACCEPT     0    --  anywhere             anywhere
 
Chain logbrute (1 references)
target     prot opt source               destination
           0    --  anywhere             anywhere            recent: SET name: BRUTEFORCE side: source
RETURN     0    --  anywhere             anywhere            !recent: UPDATE seconds: 60 hit_count: 4 name: BRUTEFORCE side: source
RETURN     0    --  anywhere             anywhere            limit: avg 1/min burst 1
DROP       0    --  anywhere             anywhere
 
Chain logdrop (0 references)
target     prot opt source               destination
DROP       0    --  anywhere             anywhere
 
Chain logreject (0 references)
target     prot opt source               destination
REJECT     tcp  --  anywhere             anywhere            reject-with tcp-reset
 
Chain trigger_out (1 references)
target     prot opt source               destination

linux – Looking for alternative to quota for limit of users disk usage on NFS

Our fileserver dosnt support quota.

I am looking for an application which can run on the client side and
help us to limit (or at least control) the usage on the filesystem.

All my searchs lead me to the “how to … quota” answers, but,
not how to go arount the problem.

(The clients are Centos(67))

–udi

linux – Can’t record or share my screen

hi guys I face a problem, I can’t share my entire screen on discord or any platform ! it just goes black and no one can see any thing except my mouse pointer ! the problem is not on discord only but I can’t record my entire screen with any application except built-in gnome-shell extension to record my screen !
m facing this problem since using gnome shell ! is there any fix except turning back to mate

ps : I can share windows only on discord and stuff !
I’m using parrot os with gnome extension to customize it !

How to resolve single-name (no dot) domain names with upstream DNS server on Linux workstations

We are using dnsmasq on our firewall machine and have set up the machine with the hosts file for all our printers and other shared resource machines. This should let us use this as a distributed hosts file, as dnsmasq will respond to queries that it sees in the local machine’s hosts.

This is working well from Windows machines. A NAS device, “tusker”, for example, is set up as 192.168.42.4. I can “ping tusker” from any windows machine and it will correctly resolve that to 192.168.42.4. We also have some Linux workstations, however, and none of them will resolve any single-name domain name. They are a mix of mostly Debian-based distros (Debian, Ubuntu, Mint, Arch) and universally the response to “ping tusker” on any of them is “temporary failure in name resolution”. They don’t seem to be passing on any single-name domain name queries to the DNS server. It sees there are no entries in its local hosts file and stops there without sending the query up.

I’ve tried “options ndots:0” in resolv.conf to no effect. Is there a way to tell the Linux resolver to always send names up to resolve regardless of how many levels are in the host name?

server – New to Linux and need a little help

So I have two hdds on my server, one for the os and the necessities, the other to kinda just mess around in and teach myself. Anyway I want to know how I can keep my main, root user on the hdd with the os, and the other on one of the two partitions on the spare drive. That way anything I wget, or install anything, it goes two that specific partition. That way down the road if I want to start fresh I can just wipe the drive.

Here’s the two articles I’ve found, but not sure if there what I’m going for

need help with hard drive

How to Move Home Directory to New Partition or Disk in Linux