<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Fedora on Apuntes de root</title>
    <link>https://blog.099c.org/tags/fedora/</link>
    <description>Recent content in Fedora on Apuntes de root</description>
    <generator>Hugo</generator>
    <language>en-US</language>
    <managingEditor>jorti@pm.me (Juan Orti Alcaine)</managingEditor>
    <webMaster>jorti@pm.me (Juan Orti Alcaine)</webMaster>
    <lastBuildDate>Wed, 29 Jul 2015 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://blog.099c.org/tags/fedora/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Tips for running Fedora in a Raspberry Pi 2</title>
      <link>https://blog.099c.org/posts/tips-for-running-fedora-in-a-raspberry-pi-2/</link>
      <pubDate>Wed, 29 Jul 2015 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/tips-for-running-fedora-in-a-raspberry-pi-2/</guid>
      <description>&lt;p&gt;This is a list of tips I&amp;rsquo;m using while running Fedora in my Raspberry Pi 2.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Modoboa for Fedora</title>
      <link>https://blog.099c.org/posts/modoboa-for-fedora/</link>
      <pubDate>Wed, 03 Dec 2014 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/modoboa-for-fedora/</guid>
      <description>&lt;p&gt;I&amp;rsquo;ve recently discovered &lt;a href=&#34;http://modoboa.org&#34; title=&#34;modoboa&#34;&gt;modoboa&lt;/a&gt;, a mail hosting and management platform which looks very promising. It uses Django and can be a frontend of postfix, amavisd-new, radicale, etc.&lt;/p&gt;&#xA;&lt;p&gt;I&amp;rsquo;ve submitted some &lt;a href=&#34;https://bugzilla.redhat.com/show_bug.cgi?id=1170213&#34; title=&#34;modoboa review request&#34;&gt;RPM packages&lt;/a&gt; based on the previous work of &lt;a href=&#34;https://github.com/didier13150/rpm&#34; title=&#34;Didier rpm packages&#34;&gt;Didier&lt;/a&gt;, and will begin to do some tests in a couple of days to see how everything plays together.&lt;/p&gt;&#xA;&lt;p&gt;Any help/suggestion is welcomed.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Restore EFI boot entry</title>
      <link>https://blog.099c.org/posts/restore-efi-boot-entry/</link>
      <pubDate>Wed, 10 Sep 2014 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/restore-efi-boot-entry/</guid>
      <description>&lt;p&gt;After clearing the CMOS in a computer, the EFI boot entry of my Fedora installation disappeared. To restore it, I booted a Live CD and registered it again:&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;# efibootmgr -c -w -d /dev/sda -l &#39;EFIfedorashim.efi&#39; -L &amp;quot;Fedora&amp;quot;&lt;/code&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>fail2ban 0.9</title>
      <link>https://blog.099c.org/posts/fail2ban-0-9/</link>
      <pubDate>Tue, 25 Mar 2014 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/fail2ban-0-9/</guid>
      <description>&lt;p&gt;With the recent release of &lt;a href=&#34;https://github.com/fail2ban/fail2ban/releases/tag/0.9.0&#34; title=&#34;fail2ban 0.9&#34;&gt;fail2ban 0.9&lt;/a&gt; there are very important improvements to the journal and firewalld integration. With these simple configurations, I get fail2ban working in Fedora 20 without a syslog daemon and avoiding being &lt;a href=&#34;http://www.fail2ban.org/wiki/index.php/MANUAL_0_8#Possibility_of_DOS_attack_by_a_local_user&#34; title=&#34;DOSed by a local user&#34;&gt;DOSed  by a local user&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;/etc/fail2ban/fail2ban.local&lt;/code&gt;&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;[Definition]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;loglevel = INFO&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;logtarget = SYSLOG&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;In &lt;code&gt;/etc/fail2ban/jail.local&lt;/code&gt; we set the backend to &lt;code&gt;systemd&lt;/code&gt;, so we monitor directly the journal, we also choose as default action &lt;code&gt;firewallcmd-ipset&lt;/code&gt;, so the rules are inserted with firewall-cmd and use the ipset facility. Finally, all the jails needed are enabled.&lt;/p&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-fallback&#34; data-lang=&#34;fallback&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;[DEFAULT]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;backend = systemd&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;banaction = firewallcmd-ipset&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;bantime = 3600&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;[sshd]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;enabled = true&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;[postfix]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;enabled = true&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;[dovecot]&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;enabled = true&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description>
    </item>
    <item>
      <title>Configure fail2ban in Fedora 20 to use firewall-cmd and ipset</title>
      <link>https://blog.099c.org/posts/configure-fail2ban-in-fedora-20-to-use-firewall-cmd-and-ipset/</link>
      <pubDate>Thu, 27 Feb 2014 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/configure-fail2ban-in-fedora-20-to-use-firewall-cmd-and-ipset/</guid>
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;Note (October 20 2014):&lt;/strong&gt; This post is outdated, please, refer to the post &lt;a href=&#34;https://blog.099c.org/posts/fail2ban-0-9/&#34;&gt;fail2ban 0.9&lt;/a&gt; for more up to date information.&lt;/em&gt;&lt;/p&gt;&#xA;&lt;p&gt;fail2ban is a handy daemon that monitors the log files to identify connection attempts and other kind of attacks and ban those IPs for a certain period of time.&lt;/p&gt;&#xA;&lt;p&gt;Currently, fail2ban upstream is adding support to firewalld and the use of ipset, so some modifications are needed at the stock config.&lt;/p&gt;&#xA;&lt;p&gt;First of all, install the needed packages, I add rsyslog because it&amp;rsquo;s not included in the default Fedora 20 installation and it&amp;rsquo;s needed to generate &lt;code&gt;/var/log/secure&lt;/code&gt;. I hope fail2ban will support some day querying the journal directly.&lt;/p&gt;</description>
    </item>
    <item>
      <title>dnssec-tools and bind authoritative name server in Fedora</title>
      <link>https://blog.099c.org/posts/dnssec-tools-and-bind-authoritative-name-server-in-fedora/</link>
      <pubDate>Mon, 30 Sep 2013 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/dnssec-tools-and-bind-authoritative-name-server-in-fedora/</guid>
      <description>&lt;p&gt;Some time ago, I wrote a &lt;a href=&#34;https://blog.099c.org/posts/bind-authoritative-name-server-with-dnssec-in-centos-6/&#34;&gt;post&lt;/a&gt; about using dnssec-tools for managing an authoritative name server in CentOS, now I&amp;rsquo;m going to extend it to cover their usage in a Fedora system.&lt;/p&gt;&#xA;&lt;p&gt;First of all, I&amp;rsquo;m going to use the latest versions which currently is not in the repositories. Download the source rpm, recompile and install the rpms: &lt;code&gt;$ mock -r fedora-19-x86_64 dnssec-tools-2.0-1.fc18.src.rpm # yum install /var/lib/mock/fedora-19-x86_64/result/*rpm&lt;/code&gt;&lt;/p&gt;&#xA;&lt;p&gt;The configuration of bind as authoritative name server &lt;code&gt;/etc/named.conf&lt;/code&gt;:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Enabling ECC in Fedora and CentOS</title>
      <link>https://blog.099c.org/posts/enabling-ecc-in-fedora-and-centos/</link>
      <pubDate>Tue, 27 Aug 2013 00:00:00 +0000</pubDate><author>jorti@pm.me (Juan Orti Alcaine)</author>
      <guid>https://blog.099c.org/posts/enabling-ecc-in-fedora-and-centos/</guid>
      <description>&lt;p&gt;Because the recent revelations about PRISM, it feels that everybody is revisiting their security infrastructure.&lt;/p&gt;&#xA;&lt;p&gt;After testing during many hours the available ciphers in the Apache web server, I realized that it&amp;rsquo;s impossible to get Perfect Forward Secrecy with Red Hat and its derivatives. See bug &lt;a href=&#34;https://bugzilla.redhat.com/show_bug.cgi?id=319901&#34;&gt;#319901&lt;/a&gt;&lt;/p&gt;&#xA;&lt;p&gt;I have decided to recompile openssl and apache for the servers I manage, I have uploaded the scripts I use to this repository: &lt;a href=&#34;https://github.com/jorti/fedora-compile-with-ecc&#34; title=&#34;Scripts to compile Fedora packages with ECC enabled&#34;&gt;https://github.com/jorti/fedora-compile-with-ecc&lt;/a&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
