Monthly Archives: November 2018

lxc Error creating container test

sudo lxc-create -t download -n test
Error creating container test

sudo lxc-create -t download -n test -o aaa.log
lxc-create: test: confile.c: set_config_net: 258 lxc.net must not have a value
lxc-create: test: parse.c: lxc_file_for_each_line_mmap: 103 Failed to parse config: lxc.network.type = veth

vi /etc/lxc/default.conf
#lxc.network.type = veth
lxc.net.0.type = vet

#lxc.network.link = virbr0
lxc.net.0.link = virbr0

lxc.net.0.flags = up
lxc.net.0.hwaddr = 00:16:3e:xx:xx:xx

acme no root


useradd -m -d /var/lib/acme -s /usr/sbin/nologin acme
chmod 700 /var/lib/acme

mkdir -p /var/www/EXAMPLE.com/.well-known/acme-challenge
chown acme.acme /var/www/EXAMPLE.com/.well-known/acme-challenge
chmod 755 /var/www/EXAMPLE.com/.well-known/acme-challenge

location ~ /.well-known {
allow all;
root /var/www/EXAMPLE.com;
}

visudo
acme ALL=(ALL) NOPASSWD: /usr/sbin/service nginx reload

su - acme -s /bin/bash
export HOME=/var/lib/acme
cd /var/lib/acme

git clone https://github.com/acmesh-official/acme.sh.git
cd acme.sh
./acme.sh --install

cd /var/lib/acme
.acme.sh/acme.sh --issue -d EXAMPLE.com -w /var/www/EXAMPLE.com

./acme.sh --issue -w /var/www/EXAMPLE.com -d EXAMPLE.com -d www.EXAMPLE.com

ssl_certificate /etc/nginx/auth-acme/EXAMPLE.com.crt;
ssl_certificate_key /etc/nginx/auth-acme/EXAMPLE.com.key;
ssl_trusted_certificate /etc/nginx/auth-acme/EXAMPLE.com.ca;

service nginx reload

lvm change cache mode

lvs -o+cache_mode,cache_settings /dev/centos/data
LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert CacheMode CacheSettings
data centos Cwi-aoC— <2.54t [lv_cache] [data_corig] 3.16 0.09 0.00 writethrough

lvchange –cachemode writeback centos/data
Logical volume centos/data changed

lvs -o+cache_mode,cache_settings /dev/centos/data
LV VG Attr LSize Pool Origin Data% Meta% Move Log Cpy%Sync Convert CacheMode CacheSettings
data centos Cwi-aoC— <2.54t [lv_cache] [data_corig] 3.72 0.09 0.00 writeback

linux protect directory with password

yum install fuse-encfs
encfs /root/encryptdir /root/decryptdir

he directory “/root/encryptdir/” does not exist. Should it be created? (y,N) y
The directory “/root/decryptdir/” does not exist. Should it be created? (y,N) y
Creating new encrypted volume.
Please choose from one of the following options:
enter “x” for expert configuration mode,
enter “p” for pre-configured paranoia mode,
anything else, or an empty line will select standard mode.
?> p

Paranoia configuration selected.

Configuration finished. The filesystem to be created has
the following properties:
Filesystem cipher: “ssl/aes”, version 3:0:2
Filename encoding: “nameio/block”, version 4:0:2
Key Size: 256 bits
Block Size: 1024 bytes, including 8 byte MAC header
Each file contains 8 byte header with unique IV data.
Filenames encoded using IV chaining mode.
File data IV is chained to filename IV.
File holes passed through to ciphertext.

————————– WARNING ————————–
The external initialization-vector chaining option has been
enabled. This option disables the use of hard links on the
filesystem. Without hard links, some programs may not work.
The programs ‘mutt’ and ‘procmail’ are known to fail. For
more information, please see the encfs mailing list.
If you would like to choose another configuration setting,
please press CTRL-C now to abort and start over.

Now you will need to enter a password for your filesystem.
You will need to remember this password, as there is absolutely
no recovery mechanism. However, the password can be changed
later using encfsctl.

New Encfs Password:
Verify Encfs Password:

mount
encfs on /root/decryptdir type fuse.encfs (rw,nosuid,nodev,relatime,user_id=0,group_id=0,default_permissions)

mv -v /root/secret.tar.gz /root/decryptdir
fusermount -u /root/decryptdir

To access data:
encfs ~/encryptdir/ ~/decryptdir/
EncFS Password: