Updating slackware 13 37
Updating slackware 13 37 - Videos sexy chat with strangers
| ----------------- Generating public/private ecdsa key pair.
See the # GNU General Public License for more details.Slackware-13.37 kernel already supports all you need, so let’s setup our interface, assuming our host eth0 (the primary ethernet interface, in the example) address is 192.168.1.5 and that we are in a 192.168.1.0/24 class C network with 192.168.1.1 as our gateway. Your public key has been saved in /etc/ssh/ssh_host_dsa_ Here are the step to follow in each situation: We have to put the interface down because we are going to add it to the bridge, so if you’are doing this through an ssh connection, I suggest you to run this as a script in a screen session, to avoid being cutted off 😉 /sbin/ifconfig eth0 down /sbin/brctl addbr br0 /sbin/brctl setfd br0 0 /sbin/ifconfig br0 192.168.1.5 netmask 255.255.255.0 promisc up /sbin/brctl addif br0 eth0 ifconfig eth0 0.0.0.0 up route add default gw 192.168.1.1 echo 1 At the end the bridge setup should be ok: you can find a version of the script above (to be included in /etc/rc.d/rc.local) here; I also modify /etc/rc.d/rc.inet1on my nodes where I use this configuration to omit eth0 config (the script is enough to bring up the interface on the host running the containers). The key fingerprint is: dd:37:4d:fb:59:0f:06:da:e:0a:55:3b::d0 [email protected] The key's randomart image is: --[ DSA 1024]---- | . I published the result on github https://github.com/Ponce/lxc-slackware I was getting to it 🙂 If you want to try them you have to decide which kind of networking you want for them: choices are basically between using: – a network bridge on your network interface, with the containers in the same network segment as the host; – a network bridge on a dummy interface used as gateway with NAT: the containers will be in a private network segment. | | | | | ----------------- Generating public/private dsa key pair. If you want to offer services and you have plenty of ips to use (like in an home network), maybe the first solution can be easier, as you don’t have to use iptables to redirect incoming connections to the private network of the containers. Your identification has been saved in /etc/ssh/ssh_host_dsa_key. Grub2's os-prober copies entries from other installs and if somehow that entry is wrong it can cause errors.
# # DO NOT EDIT THIS FILE # # It is automatically generated by grub-mkconfig using templates # from /etc/grub.d and settings from /etc/default/grub # ### BEGIN /etc/grub.d/00_header ### if [ -s $prefix/grubenv ]; then set have_grubenv=true load_env fi set default="0" if [ x"$" = xy ]; then menuentry_id_option="--id" else menuentry_id_option="" fi export menuentry_id_option if [ "$" ]; then set saved_entry="$" save_env saved_entry set prev_saved_entry= save_env prev_saved_entry set boot_once=true fi function savedefault function recordfail function load_video if [ x$feature_default_font_path = xy ] ; then font=unicode else insmod part_msdos insmod ext2 set root='hd1,msdos1' if [ x$feature_platform_search_hint = xy ]; then search --no-floppy --fs-uuid --set=root --hint-bios=hd1,msdos1 --hint-efi=hd1,msdos1 --hint-baremetal=ahci1,msdos1 149ac71c-7444-48aa-bc0c-9fb07bccf74c else search --no-floppy --fs-uuid --set=root 149ac71c-7444-48aa-bc0c-9fb07bccf74c fi font="/usr/share/grub/unicode.pf2" fi if loadfont $font ; then set gfxmode=auto load_video insmod gfxterm set locale_dir=$prefix/locale set lang=pl_PL insmod gettext fi terminal_output gfxterm if [ "$" = 1 ]; then set timeout=-1 else set timeout=5 fi ### END /etc/grub.d/00_header ### ### BEGIN /etc/grub.d/10_linux ### function gfxmode if [ "$" !Next, we create a configuration file, let’s call it chuckd.config, for the chuckd virtual container that we are going to do: decide a custom hardware address (anything valid should do) and ip (as we said, in the same range) /proc/sys/net/ipv4/conf/br0/proxy_arp /usr/sbin/iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE # examples of redirections iptables -t nat -A PREROUTING -p tcp --dport 51 -i eth0 -j DNAT --to 192.168.2. iptables -t nat -A PREROUTING -p tcp --dport 80 -i eth0 -j DNAT --to 192.168.2. at the end of the script you can see some example of redirection of incoming connections toward the containers in the private 192.168.2.0/24 network. also the config file changes (with an ip on the same network) wait some seconds (25, here) and you will have your slackware-13.37 minimal container in /var/lib/lxc/chuckd/rootfs 🙂 But you have to do another step before firing it up, and it’s setting the network parameters in /var/lib/lxc/$container/etc/rc.d/rc.inet1to the one of your network, if you don’t have a dhcp server available INIT: version 2.86 booting INIT: Entering runlevel: 3 Going multiuser... # For full documentation of the options in this file, see: # info -f grub -n 'Simple configuration' GRUB_DEFAULT=0 GRUB_HIDDEN_TIMEOUT=0 GRUB_HIDDEN_TIMEOUT_QUIET=true GRUB_TIMEOUT=10 GRUB_DISTRIBUTOR=`lsb_release -i -s 2 /dev/null