Computer Stuff
BitVise Tunnelier Rules!!
by Brian on Jun.28, 2005, under Windows Info
BitVise Tunnelier is a free-for-home use SSH client for Windows. It has sftp, and an x-term built in. You can also script programs to run after connecting to your favorite SSH daemon. The nicest feature uses SSH tunneling to secure otherwise insecure server connections. (no more cleartext passwords sent across the Internet!) Nice work, BitVise. and thanks!
Check it out here: http://www.bitvise.com/tunnelier.html
Establish an SSH Tunnel Using PuTTY on Windows
by Brian on May.20, 2005, under Windows Info
Creating An SSH Tunnel For VNC Using PuTTY
The first step is to launch PuTTY. The PuTTY Configuration will open. Enter
Enter the hostname in the configuration window
Click on “Tunnels” on the left hand side. The window will change to reflect this new selection.
Enter the tunnel information
From the “Connect” window, click the “New Session” button (third from the left.).
Start by entering the following information:
* Protocol: ssh2
* Hostname: hostname.goes.here
Then click “Port Forwarding” under “Category”.
Click the “Add” button.
To create the tunnel, you must enter the requested information in the following manner:
* Local port: 5900
* Remote port: 5900
If your VNC session number is 0 you would enter 5900 for both Local and Remote port.
When you have finished: click the “Ok” button. The new session window will update to reflect your changes.
Click the “Ok” button to complete the addition of the new session. To use the session you have created: double-click the session name. Authenticate as usual.
The last step is to start your VNC client. When prompted for hostname:
use localhost:5900 instead of hostname.goes.here:5900
Get it?
ClamAV: Project
by Brian on May.19, 2005, under Mac OSX, OpenBSD, Windows Info
ClamAV: Project
Clam is a *very* excellent Open Source antivirus solution. It integrates nicely with most mail servers,
and runs very well on my OpenBSD boxes.
Note: There’s also a Windows version of this awesome freeware available. Get yours at http://www.clamwin.com
Bogus Microsoft Security Update Circulates > May 18, 2005
by Brian on May.18, 2005, under Windows Info
Ok, people…
We don’t install “patches” that arrive via email.
Microsoft does not email support fixes, and they never have.
If it comes in as an email, please read this
before installing it.
Thanks-
Your network administrator(s)
InformationWeek > Yahoo Messenger 7.0 > Yahoo Stresses PC Phoning In IM Beta > May 18, 2005
by Brian on May.18, 2005, under Networking
VoIP for the common folk.. Will PC Phoning prevail?
Yahoo has released a beta that includes PC-to-PC phoning. Read about it here.
Windows XP to OpenBSD VPN Configuration
by Brian on May.13, 2005, under Networking, OpenBSD, Windows Info
Re: OpenBSD VPN
From: Peter Grießl (griesslihs.ac.at)
Date: Thu Feb 17 2005 – 02:29:22 CST
Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
——————————————————————————–
Mark Maxey wrote:
>
> My incoming hosts will be a mixture of Windows XP/2000 and Linux
> clients, but knowledgeable users. Preferably this solution would be
> able to use a free client or use the ipsec/vpn capabilities built into
> MS windows.
>
Hi Mark,
use IPsec – Windows 2000/XP has builtin support for IPsec, no need for any
extra client software.
The only magic is the configuration; in theory one can configure IPsec
using clicksy graphical interfaces (Management Console …), practically
you cannot. But tunnel setup is perfectly possible using a simple
batch file and the MS tools ipsecpol.exe (W2k) or ipseccmd.exe (XP).
for certificates, we use http://www.klake.org/~jt/mkca
The clients only need to install the *.p12 certificate file (double-click
installation does not work, you have to go through MMC – Certificate SnapIn
– right-click Personal – All Tasks – Import – Wizard – browse to the *.p12
file – password – change the certificate store to “Automatically select
the certificate store based on the type of certificate” – next – complete –
finish
XPSP2: start testing with firewall disabled (note: tunnel works ok with
firewall enabled, only problems using icmp – XPSP2-bug)
Personal Firewalls (Norton, McAfee): some work together with IPsec, some
don’t (some have to be completely deinstalled to make IPsec work, disabling
does not help)
Users must have administrative rights to set up the IPsec-tunnel on 2000/XP.
So, here are the batchfiles we use:
START_VPN.BAT (call with Samba-username and Samba-password as arguments)
————-
echo off
set VPNPATH=c:ihsvpn
title please wait …
rem we have two ipsec gateways, one batchfile
set WLANGW=143.130.40.1
set DMZGW=143.130.36.2
set USER=%1
set PASS=%2
rem 2000 or XP ?
ver | findstr 2000
if not errorlevel 1 goto 2000
ver | findstr XP
if not errorlevel 1 goto XP
goto OUT
:2000
set TOOL=ipsecpol
goto OSOK
:XP
set TOOL=ipseccmd
:OSOK
rem disable and delete old ipsec policy (sometimes required,
rem user did not call stop_vpn.bat last time)
%VPNPATH%%TOOL% -w REG -p IHSVPN -r NB2LAN -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -r LAN2NB -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -r NB2DHCP -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -r DHCP2NB -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -o
rem Which gateway is accessible?
ping -n 3 %WLANGW% | find “TTL” > NUL
if not errorlevel 1 goto WLAN
ping -n 3 %DMZGW% | find “TTL” > NUL
if not errorlevel 1 goto DMZ
goto EXIT
:WLAN
set IPSECGW=%WLANGW%
goto DOIT
:DMZ
set IPSECGW=%DMZGW%
:DOIT
REM all traffic to our net should go through the ipsec tunnel
set ROUTE=143.130.32.0/255.255.240.0
REM find client’s ip address
set ipaddr=
for /F “tokens=2 delims=:” %%f in (‘ipconfig ^| findstr dress’) do set
ipaddr=%%f
if “%ipaddr%”==”” goto EXIT
REM trim space
set ipaddr=%ipaddr:~1%
REM DHCP-server?
set dhcp=
for /F “tokens=2 delims=:” %%f in (‘ipconfig /all ^| findstr /C:”DHCP
Server”‘) do set dhcp=%%f
REM trim space
set dhcp=%dhcp:~1%
REM create IPSEC policy and activate tunnel
%VPNPATH%%TOOL% -w REG -p IHSVPN -r NB2LAN -t %ipsecgw% -f 0=%ROUTE% -n
ESP[SHA,3DES]P -a CERT:”C=AT, S=Austria, L=Vienna, O=Institute for Advanced
Studies, OU=IHS, CN=Institute for Advanced Studies”
%VPNPATH%%TOOL% -w REG -p IHSVPN -r LAN2NB -t %ipaddr% -f %ROUTE%=0 -n
ESP[SHA,3DES]P -a CERT:”C=AT, S=Austria, L=Vienna, O=Institute for Advanced
Studies, OU=IHS, CN=Institute for Advanced Studies”
if %dhcp%==~1 goto activate
%VPNPATH%%TOOL% -w REG -p IHSVPN -r NB2DHCP -t %ipsecgw% -f
0:68=%dhcp%:67:UDP -n PASS
%VPNPATH%%TOOL% -w REG -p IHSVPN -r DHCP2NB -t %ipaddr% -f
%dhcp%:67=0:68:UDP -n PASS
:activate
%VPNPATH%%TOOL% -w REG -p IHSVPN -x
REM negotiate and check IPSEC
rem ping the samba server to setup and check the ipsec tunnel
ping -n 4 143.130.45.10 < ======= doesn't work with
XPSP2 FW enabled
nbtstat -A 143.130.45.10
ping -n 2 143.130.45.10 | find "TTL" <======= ................
if not errorlevel 1 goto MOUNT
%VPNPATH%%TOOL% -w REG -p IHSVPN -r NB2LAN -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -r LAN2NB -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -r NB2DHCP -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -r DHCP2NB -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -o
goto EXIT
REM mount network drives (if you need this)
:MOUNT
rem mount your samba shares (net use .... %USER% %PASS%)
goto OUT
:EXIT
echo Something went wrong, sorry!
:OUT
exit
STOP_VPN.BAT
------------
echo off
set VPNPATH=c:ihsvpn
title please wait ...
rem unmount samba shares
rem net use .... /d
rem 2000 or XP ?
ver | findstr 2000
if not errorlevel 1 goto 2000
ver | findstr XP
if not errorlevel 1 goto XP
goto EXIT
:2000
set TOOL=ipsecpol
goto OSOK
:XP
set TOOL=ipseccmd
:OSOK
rem disable and delete ipsec policy
%VPNPATH%%TOOL% -w REG -p IHSVPN -r NB2LAN -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -r LAN2NB -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -r NB2DHCP -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -r DHCP2NB -y
%VPNPATH%%TOOL% -w REG -p IHSVPN -o
:EXIT
exit
here are the OpenBSDs (3.6) config files:
/etc/isakmpd/isakmpd.conf
# --- Global options
[General]
Retransmits= 5
Exchange-max-time= 120
Listen-on= 143.130.40.1
Shared-SADB= Defined
Renegotiate-on-HUP= Defined
# --- X.509 certificate locations
[X509-certificates]
CA-directory= /etc/isakmpd/ca/
Cert-directory= /etc/isakmpd/certs/
Private-key= /etc/isakmpd/private/local.key
# --- IKE Phase 1 & 2
[Phase 1]
Default= Client-phase1
[Phase 2]
Passive-Connections= Client-phase2
[Client-phase1]
Phase= 1
Transport= udp
Local-address= 143.130.40.1
Configuration= Default-main-mode
ID= My-ID
[My-ID]
ID-type= FQDN
Name= ipsecgw.ihs.ac.at
[Client-phase2]
Phase= 2
ISAKMP-peer= Client-phase1
Local-ID= All-networks
Remote-ID= Unknown-address
# --- Network details
[All-networks]
ID-Type= IPV4_ADDR_SUBNET
Network= 0.0.0.0
Netmask= 0.0.0.0
[Unknown-address]
ID-Type= IPV4_ADDR
Address= 0.0.0.0
# --- Main and quick mode transforms
[Default-main-mode]
DOI= IPSEC
EXCHANGE_TYPE= ID_PROT
Transforms= 3DES-SHA-RSA_SIG
[3DES-SHA-RSA_SIG]
ENCRYPTION_ALGORITHM= 3DES_CBC
HASH_ALGORITHM= SHA
AUTHENTICATION_METHOD= RSA_SIG
AUTHENTICATION_ALGORITHM= HMAC_SHA
Life= Phase1-Lifetime
[Phase1-Lifetime]
LIFE_TYPE= SECONDS
LIFE_DURATION= 3600,60:86400
/etc/isakmpd/isakmpd.policy
KeyNote-Version: 2
Authorizer: "POLICY"
Licensees: "DN:/C=AT/ST=Austria/L=Vienna/O=Institute for Advanced
Studies/OU=IHS/CN=Institute for Advanced Studies"
Conditions: app_domain == "IPsec policy" &&
esp_present == "yes" &&
remote_id_type == "ASN1 DN" &&
esp_enc_alg != "null" -> “true”;
Hope that helps!
Greetings from cold Vienna,
Peter Griessl, griesslihs.ac.at
The Cisco Van is coming!!
by Brian on Apr.30, 2005, under Networking
Check it out, It will be in St. Cloud, MN on May 10th.
Here’s the invitation.
Stop by if you can, it’s always a good time.
Browser Cache Spring Cleaning!
by Brian on Apr.24, 2005, under Windows Info
Okay. It’s time to clean out your web browser’s cache. Not sure what that means? Then you desperately need to follow and use this information.
(for your network administrator’s sanity)
No, you don’t need to close anything, just do this:
Open your “Control Panel”
Double-click on “Internet Options”
Click the “Settings” button found on the “General” tab under the heading “Temporary Internet Files”
Click the “View Objects” button
**Or, you can just click “Start”, “Run”, and put this in the box:
explorer “C:WINDOWSDownloaded Program Files” (and click “OK”)
After the Downloaded Programs folder opens, make sure you’re using “Details” mode to view the folder’s contents. To do this, Click on the “View” menu at the top of the Downloaded Programs folder , and select “Details”
Anything you find in this folder listed as “Damaged” or “Unknown” NEEDS TO BE REMOVED. To remove them, right-click on each damaged or unknown item and select “remove”.
If you found anything that needed to be removed, you should now run Lavasoft’s Ad-Aware, previously mentioned on this site. (you could try out the search box top right…)
MajorGeeks Support Forums
by Brian on Apr.24, 2005, under Windows Info
MajorGeeks Support Forums are a great spot to look for Cool Web Search Removal and Home Search Assistant removal info.
Lavasoft Ad-Aware Personal Edition
by Brian on Apr.24, 2005, under Windows Info
Lavasoft Ad-Aware is a must for any Internet-connected Windows computer. It helps to remove almost all malware, spyware, data miners, and other undesirables from your Windows boxen.