Fix internal links that pointed to medium.com

This commit is contained in:
Ian Gulliver
2019-04-15 02:04:21 +00:00
parent 82c87fd800
commit 3118ce324f
10 changed files with 14 additions and 14 deletions

View File

@@ -3,7 +3,7 @@
<!--# include file="include/top.html" --> <!--# include file="include/top.html" -->
<p>Ive still got two devices in my home that cant do WiFi natively, but that I dont have a good wiring solution for (one is an RPi that has a strange device on the USB bus that panics if anything else is on the USB bus, and the other is a FireTV with <a href="https://medium.com/where-the-flamingcow-roams/hall-of-2-4-ghz-shame-2016-edition-97781b48cdb5#.1bt4sd207">issues</a>). This is a great opportunity to use another Raspberry Pi as a WiFi client &lt;-> wired connection, providing a wired drop wherever I want it.</p> <p>Ive still got two devices in my home that cant do WiFi natively, but that I dont have a good wiring solution for (one is an RPi that has a strange device on the USB bus that panics if anything else is on the USB bus, and the other is a FireTV with <a href="2016-02-01-hall-of-2-4-ghz-shame-2016-edition.html">issues</a>). This is a great opportunity to use another Raspberry Pi as a WiFi client &lt;-> wired connection, providing a wired drop wherever I want it.</p>
<p>If you search for this on the Internets, you discover a problem. While 802.11 looks like Ethernet, theres a critical difference in this case. Most access points wont let clients speak with anything other than their own MAC address. If youre two or more devices (the client and the devices wired to it), you have a problem, with a few ugly solutions:</p> <p>If you search for this on the Internets, you discover a problem. While 802.11 looks like Ethernet, theres a critical difference in this case. Most access points wont let clients speak with anything other than their own MAC address. If youre two or more devices (the client and the devices wired to it), you have a problem, with a few ugly solutions:</p>
@@ -27,7 +27,7 @@
<p><img src="data:image/webp;base64,<!--# include file="images/wifi-router.webp.base64" -->" alt=""></p> <p><img src="data:image/webp;base64,<!--# include file="images/wifi-router.webp.base64" -->" alt=""></p>
<p><a href="https://medium.com/where-the-flamingcow-roams/streaming-netflix-from-android-to-os-x-4486cbc7eb9e#.kvnxuy3c5">Install and configure Raspbian Lite</a>. <a href="https://wiki.archlinux.org/index.php/WPA_supplicant">Get your device connected via WiFi</a>. (Side note: the ArchLinux wiki is really great).</p> <p><a href="https://dev.firestuff.org/firestuff/2016-03-13-raspbian-setup-notes.html">Install and configure Raspbian Lite</a>. <a href="https://wiki.archlinux.org/index.php/WPA_supplicant">Get your device connected via WiFi</a>. (Side note: the ArchLinux wiki is really great).</p>
<h3>Assign a static IPv4 address</h3> <h3>Assign a static IPv4 address</h3>

View File

@@ -7,7 +7,7 @@
<p>Turns out some winner in Piland re-used GPIO pins necessary to make serial work for Bluetooth. I guess they figured that no one used serial console?</p> <p>Turns out some winner in Piland re-used GPIO pins necessary to make serial work for Bluetooth. I guess they figured that no one used serial console?</p>
<p>To fix, youll need a monitor &amp; keyboard. First follow the instructions <a href="https://medium.com/where-the-flamingcow-roams/raspbian-setup-notes-677a71de5b9f#.xm7jhawwi">here</a> up through “Update firmware” (rpi-update). Then edit /boot/config.txt and add the line:</p> <p>To fix, youll need a monitor &amp; keyboard. First follow the instructions <a href="2016-03-13-raspbian-setup-notes.html">here</a> up through “Update firmware” (rpi-update). Then edit /boot/config.txt and add the line:</p>
<pre><code>dtoverlay=pi3-disable-bt <pre><code>dtoverlay=pi3-disable-bt
</code></pre> </code></pre>

View File

@@ -3,7 +3,7 @@
<!--# include file="include/top.html" --> <!--# include file="include/top.html" -->
<p>Following up from my previous writeup on <a href="https://medium.com/where-the-flamingcow-roams/elliptic-curve-certificate-authority-bbdb9c3855f7#.wv19mvxse">creating an EC CA</a>, lets talk about key security.</p> <p>Following up from my previous writeup on <a href="2016-03-21-elliptic-curve-certificate-authority.html">creating an EC CA</a>, lets talk about key security.</p>
<p><a href="https://en.wikipedia.org/wiki/Hardware_security_module">Hardware security modules</a> are physical devices that manage keys. Generally, the rule is that they let you use the keys for operations (e.g. signing) given correct authentication, but dont let you extract the raw key material. This means that if youre holding the HSM, you know that no one else is currently abusing your key (though they may have done so in the past).</p> <p><a href="https://en.wikipedia.org/wiki/Hardware_security_module">Hardware security modules</a> are physical devices that manage keys. Generally, the rule is that they let you use the keys for operations (e.g. signing) given correct authentication, but dont let you extract the raw key material. This means that if youre holding the HSM, you know that no one else is currently abusing your key (though they may have done so in the past).</p>
@@ -100,6 +100,6 @@ OpenSSL&gt; req -engine pkcs11 -new -keyform engine -out cert.pem -text -x509 -d
<p>More instructions on various Nitrokey HSM operations can be found <a href="https://github.com/OpenSC/OpenSC/wiki/SmartCardHSM#init">here</a>.</p> <p>More instructions on various Nitrokey HSM operations can be found <a href="https://github.com/OpenSC/OpenSC/wiki/SmartCardHSM#init">here</a>.</p>
<p>Instructions for running a complete certificate authority (CA) with your Nitrokey are <a href="https://medium.com/where-the-flamingcow-roams/ec-ca-redux-now-with-more-nitrokey-729061e1b7c9#.d7igz5dhv">here</a>.</p> <p>Instructions for running a complete certificate authority (CA) with your Nitrokey are <a href="2016-03-27-ec-ca-redux-now-with-more-nitrokey.html">here</a>.</p>
<!--# include file="include/bottom.html" --> <!--# include file="include/bottom.html" -->

View File

@@ -3,7 +3,7 @@
<!--# include file="include/top.html" --> <!--# include file="include/top.html" -->
<p>This is a revisit on my doc on <a href="https://medium.com/where-the-flamingcow-roams/elliptic-curve-certificate-authority-bbdb9c3855f7#.4z3bzvz6e">how to set up an EC CA</a>. In this version, were using the <a href="https://shop.nitrokey.com/shop/product/nitrokey-hsm-7">Nitrokey HSM</a> for key generation, storage, and operations. Youll need two Nitrokey HSMs. You can get away with one, but theres not a lot of point to splitting root and intermediate certs if you then keep them on the same device. Youll also need a <a href="https://medium.com/where-the-flamingcow-roams/nitrokey-hsm-ec-setup-6ed9b9e43c36#.pgal18rvh">system set up</a> to talk to the Nitrokey, which is a bit tricky.</p> <p>This is a revisit on my doc on <a href="2016-03-21-elliptic-curve-certificate-authority.html">how to set up an EC CA</a>. In this version, were using the <a href="https://shop.nitrokey.com/shop/product/nitrokey-hsm-7">Nitrokey HSM</a> for key generation, storage, and operations. Youll need two Nitrokey HSMs. You can get away with one, but theres not a lot of point to splitting root and intermediate certs if you then keep them on the same device. Youll also need a <a href="2016-03-26-nitrokey-hsm-ec-setup.html">system set up</a> to talk to the Nitrokey, which is a bit tricky.</p>
<p>If you do this right, you can set up a CA where the keys never touched computer that youre using to host the CA; they only ever reside protected in the Nitrokey.</p> <p>If you do this right, you can set up a CA where the keys never touched computer that youre using to host the CA; they only ever reside protected in the Nitrokey.</p>

View File

@@ -3,7 +3,7 @@
<!--# include file="include/top.html" --> <!--# include file="include/top.html" -->
<p>I previously wrote about building <a href="https://medium.com/where-the-flamingcow-roams/wifi-client-router-setup-9712a5f943e4#.z3wzhlub9">WiFi client routers</a> instead of bridges; they get you broadcast domain isolation and a degree of conceptual simplicity (no L2 tricks). I finally ran into a requirement on a different project to build an actual bridge; heres how I did it.</p> <p>I previously wrote about building <a href="2016-03-13-wifi-client-router-setup.html">WiFi client routers</a> instead of bridges; they get you broadcast domain isolation and a degree of conceptual simplicity (no L2 tricks). I finally ran into a requirement on a different project to build an actual bridge; heres how I did it.</p>
<p>You can copy the hardware from the router post, or use what youve got; I dont believe this is driver-specific.</p> <p>You can copy the hardware from the router post, or use what youve got; I dont believe this is driver-specific.</p>

View File

@@ -3,7 +3,7 @@
<!--# include file="include/top.html" --> <!--# include file="include/top.html" -->
Ive still got two devices in my home that cant do WiFi natively, but that I dont have a good wiring solution for (one is an RPi that has a strange device on the USB bus that panics if anything else is on the USB bus, and the other is a FireTV with [issues](https://medium.com/where-the-flamingcow-roams/hall-of-2-4-ghz-shame-2016-edition-97781b48cdb5#.1bt4sd207)). This is a great opportunity to use another Raspberry Pi as a WiFi client <-> wired connection, providing a wired drop wherever I want it. Ive still got two devices in my home that cant do WiFi natively, but that I dont have a good wiring solution for (one is an RPi that has a strange device on the USB bus that panics if anything else is on the USB bus, and the other is a FireTV with [issues](2016-02-01-hall-of-2-4-ghz-shame-2016-edition.html)). This is a great opportunity to use another Raspberry Pi as a WiFi client <-> wired connection, providing a wired drop wherever I want it.
If you search for this on the Internets, you discover a problem. While 802.11 looks like Ethernet, theres a critical difference in this case. Most access points wont let clients speak with anything other than their own MAC address. If youre two or more devices (the client and the devices wired to it), you have a problem, with a few ugly solutions: If you search for this on the Internets, you discover a problem. While 802.11 looks like Ethernet, theres a critical difference in this case. Most access points wont let clients speak with anything other than their own MAC address. If youre two or more devices (the client and the devices wired to it), you have a problem, with a few ugly solutions:
@@ -23,7 +23,7 @@ If youve got a router at the front of your network that supports static route
<img src="data:image/webp;base64,<!--# include file="images/wifi-router.webp.base64" -->" alt=""> <img src="data:image/webp;base64,<!--# include file="images/wifi-router.webp.base64" -->" alt="">
[Install and configure Raspbian Lite](https://medium.com/where-the-flamingcow-roams/streaming-netflix-from-android-to-os-x-4486cbc7eb9e#.kvnxuy3c5). [Get your device connected via WiFi](https://wiki.archlinux.org/index.php/WPA_supplicant). (Side note: the ArchLinux wiki is really great). [Install and configure Raspbian Lite](https://dev.firestuff.org/firestuff/2016-03-13-raspbian-setup-notes.html). [Get your device connected via WiFi](https://wiki.archlinux.org/index.php/WPA_supplicant). (Side note: the ArchLinux wiki is really great).
### Assign a static IPv4 address ### Assign a static IPv4 address

View File

@@ -7,7 +7,7 @@ Got my new RPi 3s. So exciting! Connect to my [serial cable](https://www.adafrui
Turns out some winner in Piland re-used GPIO pins necessary to make serial work for Bluetooth. I guess they figured that no one used serial console? Turns out some winner in Piland re-used GPIO pins necessary to make serial work for Bluetooth. I guess they figured that no one used serial console?
To fix, youll need a monitor & keyboard. First follow the instructions [here](https://medium.com/where-the-flamingcow-roams/raspbian-setup-notes-677a71de5b9f#.xm7jhawwi) up through “Update firmware” (rpi-update). Then edit /boot/config.txt and add the line: To fix, youll need a monitor & keyboard. First follow the instructions [here](2016-03-13-raspbian-setup-notes.html) up through “Update firmware” (rpi-update). Then edit /boot/config.txt and add the line:
dtoverlay=pi3-disable-bt dtoverlay=pi3-disable-bt

View File

@@ -3,7 +3,7 @@
<!--# include file="include/top.html" --> <!--# include file="include/top.html" -->
Following up from my previous writeup on [creating an EC CA](https://medium.com/where-the-flamingcow-roams/elliptic-curve-certificate-authority-bbdb9c3855f7#.wv19mvxse), lets talk about key security. Following up from my previous writeup on [creating an EC CA](2016-03-21-elliptic-curve-certificate-authority.html), lets talk about key security.
[Hardware security modules](https://en.wikipedia.org/wiki/Hardware_security_module) are physical devices that manage keys. Generally, the rule is that they let you use the keys for operations (e.g. signing) given correct authentication, but dont let you extract the raw key material. This means that if youre holding the HSM, you know that no one else is currently abusing your key (though they may have done so in the past). [Hardware security modules](https://en.wikipedia.org/wiki/Hardware_security_module) are physical devices that manage keys. Generally, the rule is that they let you use the keys for operations (e.g. signing) given correct authentication, but dont let you extract the raw key material. This means that if youre holding the HSM, you know that no one else is currently abusing your key (though they may have done so in the past).
@@ -91,6 +91,6 @@ Now, delete the file, re-initialize the device, and youre good to go.
More instructions on various Nitrokey HSM operations can be found [here](https://github.com/OpenSC/OpenSC/wiki/SmartCardHSM#init). More instructions on various Nitrokey HSM operations can be found [here](https://github.com/OpenSC/OpenSC/wiki/SmartCardHSM#init).
Instructions for running a complete certificate authority (CA) with your Nitrokey are [here](https://medium.com/where-the-flamingcow-roams/ec-ca-redux-now-with-more-nitrokey-729061e1b7c9#.d7igz5dhv). Instructions for running a complete certificate authority (CA) with your Nitrokey are [here](2016-03-27-ec-ca-redux-now-with-more-nitrokey.html).
<!--# include file="include/bottom.html" --> <!--# include file="include/bottom.html" -->

View File

@@ -3,7 +3,7 @@
<!--# include file="include/top.html" --> <!--# include file="include/top.html" -->
This is a revisit on my doc on [how to set up an EC CA](https://medium.com/where-the-flamingcow-roams/elliptic-curve-certificate-authority-bbdb9c3855f7#.4z3bzvz6e). In this version, were using the [Nitrokey HSM](https://shop.nitrokey.com/shop/product/nitrokey-hsm-7) for key generation, storage, and operations. Youll need two Nitrokey HSMs. You can get away with one, but theres not a lot of point to splitting root and intermediate certs if you then keep them on the same device. Youll also need a [system set up](https://medium.com/where-the-flamingcow-roams/nitrokey-hsm-ec-setup-6ed9b9e43c36#.pgal18rvh) to talk to the Nitrokey, which is a bit tricky. This is a revisit on my doc on [how to set up an EC CA](2016-03-21-elliptic-curve-certificate-authority.html). In this version, were using the [Nitrokey HSM](https://shop.nitrokey.com/shop/product/nitrokey-hsm-7) for key generation, storage, and operations. Youll need two Nitrokey HSMs. You can get away with one, but theres not a lot of point to splitting root and intermediate certs if you then keep them on the same device. Youll also need a [system set up](2016-03-26-nitrokey-hsm-ec-setup.html) to talk to the Nitrokey, which is a bit tricky.
If you do this right, you can set up a CA where the keys never touched computer that youre using to host the CA; they only ever reside protected in the Nitrokey. If you do this right, you can set up a CA where the keys never touched computer that youre using to host the CA; they only ever reside protected in the Nitrokey.

View File

@@ -3,7 +3,7 @@
<!--# include file="include/top.html" --> <!--# include file="include/top.html" -->
I previously wrote about building [WiFi client routers](https://medium.com/where-the-flamingcow-roams/wifi-client-router-setup-9712a5f943e4#.z3wzhlub9) instead of bridges; they get you broadcast domain isolation and a degree of conceptual simplicity (no L2 tricks). I finally ran into a requirement on a different project to build an actual bridge; heres how I did it. I previously wrote about building [WiFi client routers](2016-03-13-wifi-client-router-setup.html) instead of bridges; they get you broadcast domain isolation and a degree of conceptual simplicity (no L2 tricks). I finally ran into a requirement on a different project to build an actual bridge; heres how I did it.
You can copy the hardware from the router post, or use what youve got; I dont believe this is driver-specific. You can copy the hardware from the router post, or use what youve got; I dont believe this is driver-specific.