Latests posts

GnuPG Notes

Create new key

Create or edit the file ~/.gnupg/gpg.conf and add the following lines to use the cryptographically stronger SHA512 hashing algorithm for signatures in preference to SHA1 algorithm.

personal-digest-preferences SHA512
cert-digest-algo SHA512
default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed

Now we can generate the keys:

gpg --gen-key

The system will prompt us to generate some entropy, we can just run this in other terminal. Any expensive operation over the file system, like find would we also ok.

ls -R ~

Arch Linux, quick installation guide

iPXE

Install from a USB using iPXE.

Download image from http://boot.ipxe.org/ipxe.iso and copy to an USB stick.

Using the KDE Wallet to store ssh keys with passphrases

I have read an article about SSH passphrases (github:help), but they only explain how to use ssh-agent with msysgit and Mac OSX, no word about Linux.

This guide is about how to use KDE Wallet with ssh-agent. This way, we can use SSH keys with passphrases, but we don't need to enter a passphrase every time we use the key, KDE Wallet does the job. I assume you are using KDE.

Autofs configuration

Autofs uses /etc/autofs/auto.master as its default primary configuration file. We can define two kind of maps in this file, direct and indirect. An example:

# mount point   config file        options
/-              /etc/autofs/auto.direct   --ghost
/media/cifs     /etc/autofs/auto.cifs     --timeout=60 --ghost
/media/sshfs    /etc/autofs/auto.sshfs    --timeout=60 --ghost
+auto.master

Using public keys with openSSH