If you don't know what Wireguard is, well, you should. It's fast, easy to setup and highly configurable. We will configure Wireguard for multiple users with various restrictions using iptables.
This should fit most setups (not mine though 😉)
#!/bin/bash | |
# A script to limit the outgoing bandwidth of the consensus and execution layers by port | |
# We do this because the highest cost for running a node in AWS is the outgoing bandwidth | |
# Define your ports and their corresponding rate limits | |
declare -A ports=([30303]="500kbit" [9000]="1mbit") | |
# Define arbitrary class IDs for each port | |
declare -A class_ids=([30303]=1 [9000]=2) |
#!/bin/bash | |
## Create the response FIFO | |
rm -f response | |
mkfifo response | |
function handle_GET_home() { | |
RESPONSE=$(cat home.html | \ | |
sed "s/{{$COOKIE_NAME}}/$COOKIE_VALUE/") | |
} |
# install netctl | |
sudo pacman -S netctl --noconfirm | |
# check network card name | |
ip link | |
### Config Static IP Address ### | |
# Card Name : eth0 | |
sudo cp /etc/netctl/examples/ethernet-static /etc/netctl/eth0 |
#!/bin/bash | |
# Usage: ./minio-upload my-bucket my-file.zip | |
bucket=$1 | |
file=$2 | |
host=minio.example.com | |
s3_key=svc_example_user | |
s3_secret=svc_example_user_password |
$ pkg update | |
$ pkg install nmap |
If you don't know what Wireguard is, well, you should. It's fast, easy to setup and highly configurable. We will configure Wireguard for multiple users with various restrictions using iptables.
This should fit most setups (not mine though 😉)
#!/bin/bash | |
## | |
# Pure BASH interactive CLI/TUI menu (single and multi-select/checkboxes) | |
# | |
# Author: Markus Geiger <[email protected]> | |
# Last revised 2019-09-11 | |
# | |
# ATTENTION! TO BE REFACTORED! FIRST DRAFT! | |
# |
Based on https://busylog.net/telnet-imap-commands-note/