sv up <services>
sv down <services>
sv restart <services>
sv status <services>
To remove a submodule you need to:
- Delete the relevant section from the .gitmodules file.
- Stage the .gitmodules changes git add .gitmodules
- Delete the relevant section from .git/config.
- Run git rm --cached path_to_submodule (no trailing slash).
- Run rm -rf .git/modules/path_to_submodule (no trailing slash).
- Commit git commit -m "Removed submodule "
- Delete the now untracked submodule files rm -rf path_to_submodule
#### General PFCTL Commands #### | |
$ pfctl -d disable # packet-filtering | |
$ pfctl -e enable # packet-filtering | |
$ pfctl -q # run quiet | |
$ pfctl -v -v # run even more verbose | |
#### Loading PF Rules #### | |
$ pfctl -f /etc/pf.conf # load /etc/pf.conf | |
$ pfctl -n -f /etc/pf.conf # parse /etc/pf.conf, but dont load it | |
$ pfctl -R -f /etc/pf.conf # load only the FILTER rules | |
$ pfctl -N -f /etc/pf.conf # load only the NAT rules |
No, seriously, don't. You're probably reading this because you've asked what VPN service to use, and this is the answer.
Note: The content in this post does not apply to using VPN for their intended purpose; that is, as a virtual private (internal) network. It only applies to using it as a glorified proxy, which is what every third-party "VPN provider" does.
- A Russian translation of this article can be found here, contributed by Timur Demin.
- A Turkish translation can be found here, contributed by agyild.
- There's also this article about VPN services, which is honestly better written (and has more cat pictures!) than my article.
- Use the present tense ("Add feature" not "Added feature")
- Use the imperative mood ("Move cursor to..." not "Moves cursor to...")
- Limit the first line to 72 characters or less
- Reference issues and pull requests liberally after the first line
- When only changing documentation, include
[ci skip]
in the commit title - Consider starting the commit message with an applicable emoji
#!/bin/sh | |
# This is an attempt at an ipfw config for a cluster with a master node and many | |
# compute nodes. The master node is acting as a gateway for the compute nodes | |
# in the LAN (192.168.0.0/24). | |
# | |
# A jail running on one of the compute nodes with address 192.168.0.118 is to be | |
# accessible from the outside (using redirect_addr 192.168.0.118 | |
# 129.173.118.118). The address 129.173.118.118 is an alias for the WAN | |
# interface that will only be used to direct traffic to this jail. |
# FreeBSD 10.2 -- /etc/sysctl.conf version 0.47 | |
# https://calomel.org/freebsd_network_tuning.html | |
# | |
# low latency is important so we highly recommend that you disable hyper | |
# threading on Intel CPUs as it has an unpredictable affect on latency, cpu | |
# cache misses and load. | |
# | |
# These settings are specifically tuned for a "low" latency FIOS (300/300) and | |
# gigabit LAN connections. If you have 10gig or 40gig you will need to increase | |
# the network buffers as proposed. "man tuning" for more information. |
#!/usr/bin/bash | |
# | |
# Set/check SHA256 file checksum stored in the file's extended attributes | |
# | |
csum_attr="user.sha256sum" | |
check_path="." | |
action="" | |
usage() { |
This is a quick guide for setting up a kill switch using UFW (Uncomplicated FireWall). It is assumed you are using OpenVPN and optionally Network-Manager with network-manager-openvpn.
Before we can start we're going to need the IP address (or the IP addresses) of your VPN so that we can whitelist those later on, write them down. They are obviously going to be different for every VPN and VPNs with multiple servers, so I'll leave this up to you.
On some systems UFW is installed and enabled by default (Ubuntu, for example). Installation procedure is going to be different for every distribution of GNU/Linux, but it's usually something like