Transmission can’t download on Raspberry Pi

apt-get remove transmission-daemon
apt-get remove transmission
apt-get install transmission-daemon
apt-get install transmission
Advertisements

The configuration file now needs a secret passphrase (blowfish_secret)

PhpMyAdmin error

Solution: Change the owner of /etc/phpMyAdmin to admin

Tested on Centos 6.9 + VestaCP

Secure HTTP/HTTPS using Fail2ban

/etc/fail2ban/jail.local

[http-get-dos]
enabled = true
port = http,https
filter = http-get-dos
logpath = /var/log/apache2/YOUR_WEB_SERVER_ACCESS_LOG
# maxretry is how many GETs we can have in the findtime period before getting narky
maxretry = 300
# findtime is the time period in seconds in which we're counting "retries" (300 seconds = 5 mins)
findtime = 300
# bantime is how long we should drop incoming GET requests for a given IP for, in this case it's 5 minutes
bantime = 300
action = iptables[name=HTTP, port=http, protocol=tcp]

Create new file /etc/fail2ban/filters.d/http-get-dos.conf

[Definition]

# Option: failregex
# Note: This regex will match any GET entry in your logs, so basically all valid and not valid entries are a match.
# You should set up in the jail.conf file, the maxretry and findtime carefully in order to avoid false positives.

failregex = ^ -.*"(GET|POST).*

# Option: ignoreregex
# Notes.: regex to ignore. If this regex matches, the line is ignored.
# Values: TEXT
#
ignoreregex =

Restart fail2ban

Login SSH without Password

Create private and public SSH keys:

ssh-keygen -t rsa
For a more secure 4096-bit key, run: ssh-keygen -t rsa -b 4096
chmod 700 ~/.ssh
chmod 600 ~/.ssh/id_rsa
cat id_rsa.pub >> ~/.ssh/authorized_keys

Note: once you’ve imported the public key, you can delete it from the server.

and finally set file permissions on the server:

$ chmod 700 ~/.ssh
$ chmod 600 ~/.ssh/authorized_keys

/etc/ssh/sshd_config file:

# Disable password authentication forcing use of keys
PasswordAuthentication no

Create ppk file using PuttyGen

  1. Click Conversions from the PuTTY Key Generator menu and select Import key.
  2. Navigate to the OpenSSH private key and click Open.
  3. Under Actions / Save the generated key, select Save private key.
  4. Choose an optional passphrase to protect the private key.
  5. Save the private key to the desktop as id_rsa.ppk.

Connect to server using Putty and Private Key

  1. Enter the remote server Host Name or IP address under Session.
  2. Navigate to Connection > SSH > Auth.
  3. Click Browse... under Authentication parameters / Private key file for authentication.
  4. Locate the id_rsa.ppk private key and click Open.
  5. Finally, click Open again to log into the remote server with key pair authentication.

Tested on CentOS6 i386