Difference between revisions of "Networkwishlist"

From ENTS
Jump to: navigation, search
m
 
(19 intermediate revisions by one user not shown)
Line 1: Line 1:
  
  
task list
 
---------
 
  
5 - log onto each machine and tell me what the ip addresses are for each interface and make a simple network map
+
* on the file server, make a new partition and mount it as /usr/pkgsrc/ . fetch the latest pkgsrc and put it there. make the other machines mount this /usr/pkgsrc instead of having a local repo
 +
 +
* create a new partition on the file server, not on the OS drive, using 100GB or so. create a new folder for each machine n the network, and move a complete mirror of that systems filesystem (use rsync plz) to these new folders.
  
5 - create/install rc.d script to start/stop the BIRD BGP routing daemon on the router
+
* create/install rc.d script to start/stop the BIRD BGP routing daemon on the router
  
10 - create rc.d script to start/stop the anonet vpn connection (stopped by default), reference: [https://wiki.hamburg.ccc.de/ChaosVPN:Tims_NetBSD_chaosvpn_rc.d]
+
* create rc.d script to start/stop the anonet vpn connection (stopped by default), reference: [https://wiki.hamburg.ccc.de/ChaosVPN:Tims_NetBSD_chaosvpn_rc.d]
  
10 - fix this script to send signals other than "kill -9" first, then verify that the daemon is dead, if not, send kill -9.: [https://wiki.hamburg.ccc.de/ChaosVPN:Tims_NetBSD_chaosvpn_rc.d]
+
* fix this script to send signals other than "kill -9" first, then verify that the daemon is dead, if not, send kill -9.: [https://wiki.hamburg.ccc.de/ChaosVPN:Tims_NetBSD_chaosvpn_rc.d]
  
5 - fix my "block outgoing" tun0 firewall rules to work, ref: [https://wiki.hamburg.ccc.de/ChaosVPN:Tims_ipf_conf]
+
* fix my "block outgoing" tun0 firewall rules to work, ref: [https://wiki.hamburg.ccc.de/ChaosVPN:Tims_ipf_conf]
  
2 - run this script to every machine, restart,  and verify ssh no longer times out: [https://wiki.hamburg.ccc.de/ChaosVPN:Tims_random_router_configs]
+
* fix the ugly routes hack script to properly parse routes and add them to default configs: [https://wiki.hamburg.ccc.de/ChaosVPN:Tims_netbsd_route_hack_attempt]
  
20 - fix the ugly routes hack script to properly parse routes and add them to default configs: [https://wiki.hamburg.ccc.de/ChaosVPN:Tims_netbsd_route_hack_attempt]
+
* setup CARP on the routers. its already compiled into the kernel, just needs configuration.
  
20 - setup CARP on the routers. its already compiled into the kernel, just needs configuration.
+
* using ALTQ set up bandwidth limits on the various router interfaces to limit them to no more than 1Mbps
  
10 - using ALTQ set up bandwidth limits on the various router interfaces to limit them to no more than 1Mbps
+
* backup a copy of /usr and /etc to some offsite location, for each machine, and send a zipped copy to my gmail
  
10 - backup a copy of /usr and /etc to some offsite location, for each machine, and send a zipped copy to my gmail
+
* install DNSmasq on the router for the chaosvpn connection and configure it to use the chaosvpn DNS for their ip range, and the DN42 ip ranges for DN42
  
10 - install DNSmasq on the router for the chaosvpn connection and configure it to use the chaosvpn DNS for their ip range, and the DN42 ip ranges for DN42
+
reduce the frequency of service lister log backups in the cron entry. also make a cron entry to tar the folder once a week
 
+
10 - log onto the cvpn "service lister" server and reduce the frequency of log backups in the cron entry. also make a cron entry to tar the folder once a week
+

Latest revision as of 17:55, 8 April 2014


  • on the file server, make a new partition and mount it as /usr/pkgsrc/ . fetch the latest pkgsrc and put it there. make the other machines mount this /usr/pkgsrc instead of having a local repo
  • create a new partition on the file server, not on the OS drive, using 100GB or so. create a new folder for each machine n the network, and move a complete mirror of that systems filesystem (use rsync plz) to these new folders.
  • create/install rc.d script to start/stop the BIRD BGP routing daemon on the router
  • create rc.d script to start/stop the anonet vpn connection (stopped by default), reference: [1]
  • fix this script to send signals other than "kill -9" first, then verify that the daemon is dead, if not, send kill -9.: [2]
  • fix my "block outgoing" tun0 firewall rules to work, ref: [3]
  • fix the ugly routes hack script to properly parse routes and add them to default configs: [4]
  • setup CARP on the routers. its already compiled into the kernel, just needs configuration.
  • using ALTQ set up bandwidth limits on the various router interfaces to limit them to no more than 1Mbps
  • backup a copy of /usr and /etc to some offsite location, for each machine, and send a zipped copy to my gmail
  • install DNSmasq on the router for the chaosvpn connection and configure it to use the chaosvpn DNS for their ip range, and the DN42 ip ranges for DN42
  • reduce the frequency of service lister log backups in the cron entry. also make a cron entry to tar the folder once a week
Personal tools
Namespaces

Variants
Actions
Navigation
Members
Toolbox