├── .bashrc ├── .gitconfig ├── .profile ├── 000-default.conf ├── 001-default-ssl.conf ├── TODO.txt ├── authorized_keys ├── collect.sh ├── crontab ├── ddclient.conf ├── dhcp.conf ├── dns.conf ├── dphys-swapfile ├── flip.pl ├── gitweb.conf ├── hostapd ├── hostapd.conf ├── hosts ├── ifplugd ├── interfaces ├── letsencrypt ├── moduli ├── myapache.local.conf ├── ports.conf ├── profiles.clj ├── security.conf ├── sniff.json ├── sniff.service ├── sources.list ├── sources.list.d ├── collabora.list └── raspi.list ├── squid.conf ├── ssh_config ├── sshd_config ├── ssl.conf ├── ssl.load ├── sysctl.conf ├── torrc └── vimrc /.bashrc: -------------------------------------------------------------------------------- 1 | # ~/.bashrc: executed by bash(1) for non-login shells. 2 | # see /usr/share/doc/bash/examples/startup-files (in the package bash-doc) 3 | # for examples 4 | 5 | # If not running interactively, don't do anything 6 | [ -z "$PS1" ] && return 7 | 8 | # don't put duplicate lines or lines starting with space in the history. 9 | # See bash(1) for more options 10 | HISTCONTROL=ignoreboth 11 | 12 | # append to the history file, don't overwrite it 13 | shopt -s histappend 14 | 15 | # for setting history length see HISTSIZE and HISTFILESIZE in bash(1) 16 | HISTSIZE=1000 17 | HISTFILESIZE=2000 18 | 19 | # check the window size after each command and, if necessary, 20 | # update the values of LINES and COLUMNS. 21 | shopt -s checkwinsize 22 | 23 | # If set, the pattern "**" used in a pathname expansion context will 24 | # match all files and zero or more directories and subdirectories. 25 | #shopt -s globstar 26 | 27 | # make less more friendly for non-text input files, see lesspipe(1) 28 | #[ -x /usr/bin/lesspipe ] && eval "$(SHELL=/bin/sh lesspipe)" 29 | 30 | # set variable identifying the chroot you work in (used in the prompt below) 31 | if [ -z "$debian_chroot" ] && [ -r /etc/debian_chroot ]; then 32 | debian_chroot=$(cat /etc/debian_chroot) 33 | fi 34 | 35 | # set a fancy prompt (non-color, unless we know we "want" color) 36 | case "$TERM" in 37 | xterm-color) color_prompt=yes;; 38 | esac 39 | 40 | # uncomment for a colored prompt, if the terminal has the capability; turned 41 | # off by default to not distract the user: the focus in a terminal window 42 | # should be on the output of commands, not on the prompt 43 | force_color_prompt=yes 44 | 45 | if [ -n "$force_color_prompt" ]; then 46 | if [ -x /usr/bin/tput ] && tput setaf 1 >&/dev/null; then 47 | # We have color support; assume it's compliant with Ecma-48 48 | # (ISO/IEC-6429). (Lack of such support is extremely rare, and such 49 | # a case would tend to support setf rather than setaf.) 50 | color_prompt=yes 51 | else 52 | color_prompt= 53 | fi 54 | fi 55 | 56 | if [ "$color_prompt" = yes ]; then 57 | PS1='${debian_chroot:+($debian_chroot)}\[\033[01;32m\]\u@\h\[\033[00m\] \[\033[01;34m\]\w \$\[\033[00m\] ' 58 | else 59 | PS1='${debian_chroot:+($debian_chroot)}\u@\h:\w\$ ' 60 | fi 61 | unset color_prompt force_color_prompt 62 | 63 | # If this is an xterm set the title to user@host:dir 64 | case "$TERM" in 65 | xterm*|rxvt*) 66 | PS1="\[\e]0;${debian_chroot:+($debian_chroot)}\u@\h: \w\a\]$PS1" 67 | ;; 68 | *) 69 | ;; 70 | esac 71 | 72 | # enable color support of ls and also add handy aliases 73 | if [ -x /usr/bin/dircolors ]; then 74 | test -r ~/.dircolors && eval "$(dircolors -b ~/.dircolors)" || eval "$(dircolors -b)" 75 | alias ls='ls --color=auto' 76 | #alias dir='dir --color=auto' 77 | #alias vdir='vdir --color=auto' 78 | 79 | alias grep='grep --color=auto' 80 | alias fgrep='fgrep --color=auto' 81 | alias egrep='egrep --color=auto' 82 | fi 83 | 84 | # some more ls aliases 85 | #alias ll='ls -l' 86 | #alias la='ls -A' 87 | #alias l='ls -CF' 88 | 89 | # Alias definitions. 90 | # You may want to put all your additions into a separate file like 91 | # ~/.bash_aliases, instead of adding them here directly. 92 | # See /usr/share/doc/bash-doc/examples in the bash-doc package. 93 | 94 | if [ -f ~/.bash_aliases ]; then 95 | . ~/.bash_aliases 96 | fi 97 | 98 | # enable programmable completion features (you don't need to enable 99 | # this, if it's already enabled in /etc/bash.bashrc and /etc/profile 100 | # sources /etc/bash.bashrc). 101 | if [ -f /etc/bash_completion ] && ! shopt -oq posix; then 102 | . /etc/bash_completion 103 | fi 104 | 105 | export ES_JAVA_OPTS="-Xms128m -Xmx128m" 106 | 107 | export GOPATH=$HOME/go 108 | export PATH=$PATH:/home/pi/gosrc/bin:$GOPATH/bin 109 | 110 | # added by travis gem 111 | [ -f /home/pi/.travis/travis.sh ] && source /home/pi/.travis/travis.sh 112 | 113 | export WORKON_HOME=$HOME/.virtualenvs 114 | export PROJECT_HOME=$HOME 115 | source /usr/local/bin/virtualenvwrapper.sh 116 | -------------------------------------------------------------------------------- /.gitconfig: -------------------------------------------------------------------------------- 1 | [user] 2 | email = divergentdave@gmail.com 3 | name = David Cook 4 | [core] 5 | editor = vim 6 | [color] 7 | ui = auto 8 | 9 | [alias] 10 | isclean = !/home/pi/git-isclean/git-isclean 11 | 12 | [diff "asciidiff"] 13 | textconv = ~/bin/img-ascii-diff 14 | 15 | [diff "spaceman-diff"] 16 | command = /usr/local/bin/spaceman-diff 17 | 18 | [push] 19 | default = simple 20 | [secrets] 21 | providers = git secrets --aws-provider 22 | patterns = [A-Z0-9]{20} 23 | patterns = (\"|')?(AWS|aws|Aws)?_?(SECRET|secret|Secret)?_?(ACCESS|access|Access)?_?(KEY|key|Key)(\"|')?\\s*(:|=>|=)\\s*(\"|')?[A-Za-z0-9/\\+=]{40}(\"|')? 24 | patterns = (\"|')?(AWS|aws|Aws)?_?(ACCOUNT|account|Account)_?(ID|id|Id)?(\"|')?\\s*(:|=>|=)\\s*(\"|')?[0-9]{4}\\-?[0-9]{4}\\-?[0-9]{4}(\"|')? 25 | allowed = AKIAIOSFODNN7EXAMPLE 26 | allowed = wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY 27 | -------------------------------------------------------------------------------- /.profile: -------------------------------------------------------------------------------- 1 | # ~/.profile: executed by the command interpreter for login shells. 2 | # This file is not read by bash(1), if ~/.bash_profile or ~/.bash_login 3 | # exists. 4 | # see /usr/share/doc/bash/examples/startup-files for examples. 5 | # the files are located in the bash-doc package. 6 | 7 | # the default umask is set in /etc/profile; for setting the umask 8 | # for ssh logins, install and configure the libpam-umask package. 9 | #umask 022 10 | 11 | # if running bash 12 | if [ -n "$BASH_VERSION" ]; then 13 | # include .bashrc if it exists 14 | if [ -f "$HOME/.bashrc" ]; then 15 | . "$HOME/.bashrc" 16 | fi 17 | fi 18 | 19 | # set PATH so it includes user's private bin if it exists 20 | if [ -d "$HOME/bin" ] ; then 21 | PATH="$HOME/bin:$PATH" 22 | fi 23 | 24 | export PATH="$HOME/.rbenv/bin:$PATH" 25 | eval "$(rbenv init -)" 26 | -------------------------------------------------------------------------------- /000-default.conf: -------------------------------------------------------------------------------- 1 | 2 | ServerAdmin webmaster@localhost 3 | 4 | Alias /images /var/tmp/upsidedownternet 5 | 6 | Require ip 127.0.0.1 7 | 8 | 9 | Alias /git/static /usr/share/gitweb/static 10 | ScriptAliasMatch \ 11 | "(?x)^/git/(.*/(HEAD | \ 12 | info/refs | \ 13 | objects/(info/[^/]+ | \ 14 | [0-9a-f]{2}/[0-9a-f]{38} | \ 15 | pack/pack-[0-9a-f]{40}\.(pack|idx)) | \ 16 | git-upload-pack))$" \ 17 | /usr/lib/git-core/git-http-backend/$1 18 | ScriptAlias /git /usr/share/gitweb/gitweb.cgi 19 | 20 | Options +ExecCGI +FollowSymLinks +SymLinksIfOwnerMatch 21 | Require all granted 22 | AddHandler cgi-script cgi 23 | DirectoryIndex gitweb.cgi 24 | 25 | 26 | Options +ExecCGI 27 | SetEnv GIT_PROJECT_ROOT /var/lib/git 28 | Require all granted 29 | 30 | 31 | RewriteEngine on 32 | RewriteRule ^/images/.* - [L] 33 | RewriteRule .* https://davidsherenowitsa.party%{REQUEST_URI} 34 | 35 | ErrorLog ${APACHE_LOG_DIR}/error.log 36 | 37 | # Possible values include: debug, info, notice, warn, error, crit, 38 | # alert, emerg. 39 | LogLevel warn 40 | 41 | CustomLog ${APACHE_LOG_DIR}/access.log combined 42 | 43 | Header always set X-Frame-Options DENY 44 | 45 | -------------------------------------------------------------------------------- /001-default-ssl.conf: -------------------------------------------------------------------------------- 1 | 2 | 3 | ServerName davidsherenowitsa.party 4 | ServerAlias www.davidsherenowitsa.party 5 | 6 | ServerAdmin david@davidsherenowitsa.party 7 | 8 | DocumentRoot /var/www 9 | 10 | Options FollowSymLinks 11 | AllowOverride None 12 | 13 | 14 | Options Indexes FollowSymLinks MultiViews 15 | AllowOverride None 16 | Require all granted 17 | 18 | 19 | AuthType basic 20 | AuthName "CI files" 21 | AuthUserFile /etc/apache2/.htpasswd 22 | Require user travis-user 23 | 24 | 25 | Alias /git/static /usr/share/gitweb/static 26 | ScriptAliasMatch \ 27 | "(?x)^/git/(.*/(HEAD | \ 28 | info/refs | \ 29 | objects/(info/[^/]+ | \ 30 | [0-9a-f]{2}/[0-9a-f]{38} | \ 31 | pack/pack-[0-9a-f]{40}\.(pack|idx)) | \ 32 | git-upload-pack))$" \ 33 | /usr/lib/git-core/git-http-backend/$1 34 | ScriptAlias /git /usr/share/gitweb/gitweb.cgi 35 | 36 | Options +ExecCGI +FollowSymLinks +SymLinksIfOwnerMatch 37 | Require all granted 38 | AddHandler cgi-script cgi 39 | DirectoryIndex gitweb.cgi 40 | 41 | 42 | Options +ExecCGI 43 | SetEnv GIT_PROJECT_ROOT /var/lib/git 44 | Require all granted 45 | 46 | 47 | ScriptAlias /cgi-bin/ /usr/lib/cgi-bin/ 48 | 49 | AllowOverride None 50 | Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch 51 | Require all granted 52 | 53 | 54 | ErrorLog ${APACHE_LOG_DIR}/error.log 55 | 56 | # Possible values include: debug, info, notice, warn, error, crit, 57 | # alert, emerg. 58 | LogLevel warn 59 | 60 | CustomLog ${APACHE_LOG_DIR}/ssl_access.log combined 61 | 62 | # SSL Engine Switch: 63 | # Enable/Disable SSL for this virtual host. 64 | SSLEngine on 65 | 66 | # A self-signed (snakeoil) certificate can be created by installing 67 | # the ssl-cert package. See 68 | # /usr/share/doc/apache2.2-common/README.Debian.gz for more info. 69 | # If both key and certificate are stored in the same file, only the 70 | # SSLCertificateFile directive is needed. 71 | SSLCertificateFile /etc/letsencrypt/live/davidsherenowitsa.party/fullchain.pem 72 | SSLCertificateKeyFile /etc/letsencrypt/live/davidsherenowitsa.party/privkey.pem 73 | 74 | # Server Certificate Chain: 75 | # Point SSLCertificateChainFile at a file containing the 76 | # concatenation of PEM encoded CA certificates which form the 77 | # certificate chain for the server certificate. Alternatively 78 | # the referenced file can be the same as SSLCertificateFile 79 | # when the CA certificates are directly appended to the server 80 | # certificate for convinience. 81 | #SSLCertificateChainFile /etc/apache2/ssl.crt/server-ca.crt 82 | 83 | # Certificate Authority (CA): 84 | # Set the CA certificate verification path where to find CA 85 | # certificates for client authentication or alternatively one 86 | # huge file containing all of them (file must be PEM encoded) 87 | # Note: Inside SSLCACertificatePath you need hash symlinks 88 | # to point to the certificate files. Use the provided 89 | # Makefile to update the hash symlinks after changes. 90 | #SSLCACertificatePath /etc/ssl/certs/ 91 | #SSLCACertificateFile /etc/apache2/ssl.crt/ca-bundle.crt 92 | SSLCACertificateFile /etc/letsencrypt/live/davidsherenowitsa.party/chain.pem 93 | 94 | # Certificate Revocation Lists (CRL): 95 | # Set the CA revocation path where to find CA CRLs for client 96 | # authentication or alternatively one huge file containing all 97 | # of them (file must be PEM encoded) 98 | # Note: Inside SSLCARevocationPath you need hash symlinks 99 | # to point to the certificate files. Use the provided 100 | # Makefile to update the hash symlinks after changes. 101 | #SSLCARevocationPath /etc/apache2/ssl.crl/ 102 | #SSLCARevocationFile /etc/apache2/ssl.crl/ca-bundle.crl 103 | 104 | # Client Authentication (Type): 105 | # Client certificate verification type and depth. Types are 106 | # none, optional, require and optional_no_ca. Depth is a 107 | # number which specifies how deeply to verify the certificate 108 | # issuer chain before deciding the certificate is not valid. 109 | #SSLVerifyClient require 110 | #SSLVerifyDepth 10 111 | 112 | # Access Control: 113 | # With SSLRequire you can do per-directory access control based 114 | # on arbitrary complex boolean expressions containing server 115 | # variable checks and other lookup directives. The syntax is a 116 | # mixture between C and Perl. See the mod_ssl documentation 117 | # for more details. 118 | # 119 | #SSLRequire ( %{SSL_CIPHER} !~ m/^(EXP|NULL)/ \ 120 | # and %{SSL_CLIENT_S_DN_O} eq "Snake Oil, Ltd." \ 121 | # and %{SSL_CLIENT_S_DN_OU} in {"Staff", "CA", "Dev"} \ 122 | # and %{TIME_WDAY} >= 1 and %{TIME_WDAY} <= 5 \ 123 | # and %{TIME_HOUR} >= 8 and %{TIME_HOUR} <= 20 ) \ 124 | # or %{REMOTE_ADDR} =~ m/^192\.76\.162\.[0-9]+$/ 125 | # 126 | 127 | # SSL Engine Options: 128 | # Set various options for the SSL engine. 129 | # o FakeBasicAuth: 130 | # Translate the client X.509 into a Basic Authorisation. This means that 131 | # the standard Auth/DBMAuth methods can be used for access control. The 132 | # user name is the `one line' version of the client's X.509 certificate. 133 | # Note that no password is obtained from the user. Every entry in the user 134 | # file needs this password: `xxj31ZMTZzkVA'. 135 | # o ExportCertData: 136 | # This exports two additional environment variables: SSL_CLIENT_CERT and 137 | # SSL_SERVER_CERT. These contain the PEM-encoded certificates of the 138 | # server (always existing) and the client (only existing when client 139 | # authentication is used). This can be used to import the certificates 140 | # into CGI scripts. 141 | # o StdEnvVars: 142 | # This exports the standard SSL/TLS related `SSL_*' environment variables. 143 | # Per default this exportation is switched off for performance reasons, 144 | # because the extraction step is an expensive operation and is usually 145 | # useless for serving static content. So one usually enables the 146 | # exportation for CGI and SSI requests only. 147 | # o StrictRequire: 148 | # This denies access when "SSLRequireSSL" or "SSLRequire" applied even 149 | # under a "Satisfy any" situation, i.e. when it applies access is denied 150 | # and no other module can change it. 151 | # o OptRenegotiate: 152 | # This enables optimized SSL connection renegotiation handling when SSL 153 | # directives are used in per-directory context. 154 | #SSLOptions +FakeBasicAuth +ExportCertData +StrictRequire 155 | 156 | SSLOptions +StdEnvVars 157 | 158 | 159 | SSLOptions +StdEnvVars 160 | 161 | 162 | # SSL Protocol Adjustments: 163 | # The safe and default but still SSL/TLS standard compliant shutdown 164 | # approach is that mod_ssl sends the close notify alert but doesn't wait for 165 | # the close notify alert from client. When you need a different shutdown 166 | # approach you can use one of the following variables: 167 | # o ssl-unclean-shutdown: 168 | # This forces an unclean shutdown when the connection is closed, i.e. no 169 | # SSL close notify alert is send or allowed to received. This violates 170 | # the SSL/TLS standard but is needed for some brain-dead browsers. Use 171 | # this when you receive I/O errors because of the standard approach where 172 | # mod_ssl sends the close notify alert. 173 | # o ssl-accurate-shutdown: 174 | # This forces an accurate shutdown when the connection is closed, i.e. a 175 | # SSL close notify alert is send and mod_ssl waits for the close notify 176 | # alert of the client. This is 100% SSL/TLS standard compliant, but in 177 | # practice often causes hanging connections with brain-dead browsers. Use 178 | # this only for browsers where you know that their SSL implementation 179 | # works correctly. 180 | # Notice: Most problems of broken clients are also related to the HTTP 181 | # keep-alive facility, so you usually additionally want to disable 182 | # keep-alive for those clients, too. Use variable "nokeepalive" for this. 183 | # Similarly, one has to force some clients to use HTTP/1.0 to workaround 184 | # their broken HTTP/1.1 implementation. Use variables "downgrade-1.0" and 185 | # "force-response-1.0" for this. 186 | BrowserMatch "MSIE [2-6]" \ 187 | nokeepalive ssl-unclean-shutdown \ 188 | downgrade-1.0 force-response-1.0 189 | # MSIE 7 and newer should be able to use keepalive 190 | BrowserMatch "MSIE [17-9]" ssl-unclean-shutdown 191 | 192 | # Custom options to improve security (breaking old browsers as needed) 193 | SSLCipherSuite EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH 194 | SSLHonorCipherOrder On 195 | SSLCompression Off 196 | SSLUseStapling On 197 | Header always set Strict-Transport-Security "max-age=63072000; includeSubdomains" 198 | Header always set X-Frame-Options DENY 199 | 200 | 201 | 202 | SSLStaplingCache shmcb:${APACHE_RUN_DIR}/ssl_stapling(32768) 203 | 204 | 205 | -------------------------------------------------------------------------------- /TODO.txt: -------------------------------------------------------------------------------- 1 | WebRTCSend w/ OTR 2 | Put Etherpad behind Apache reverse proxy -- needs testing 3 | Backups? 4 | Move upside-down-ternet temporary image directory onto a ramdisk 5 | Figure out how to save a list of manually installed apt packages 6 | -------------------------------------------------------------------------------- /authorized_keys: -------------------------------------------------------------------------------- 1 | ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQEA6Ny3kiNm2Zy77dn+luwN29EiOu27ye0e8idoEi3lavlrH+BmpuUv8cGTynBtGQ2fVdXYp2xXG6iWkusKJ4NwGks4/bLBDpsN8wikHyGIpOiklFHKjUs9Xc5QMTIdUaL7aBP6eTJ6TN2QtwYlQwl2nm/lWlQvH1XacMSBloAj05zYCZ9B+3WpFsduuE5bOP8IN/XFm7KVozT84FaFIZ37DuFq+7dt1TO8+wvxreXCOfL4TcP85npH2uXypm9bsV7imrGMGDbfnYqo+BplINbUaCU5fGtg8CGCIQp0AiiXbYvRhck23KOcRh/B2Wc/Vf59LZBPVykYNMpXVBaS7GLUGw== PuTTY key for RPi (v2) 2 | ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAQBxRMV6WjOmjggJbJJHP7YqRSom8m+OCPTnCGLJWBU9IQsK2dZzxkd7sZygjUqPebxMeabXRMrA7vzOT2JSSXZ4ppBscJT1vjbNNcuCULcfPoSA2GTLEj0FVBuESHM6VMIDeLs7Xkvy59F3v/vk9zxvQGUGCxH3TBBmLBGrgaaOJlRsSZ76XQ2p3xQxSUaQ8U6TrEOFB7WQsDWh6suO/0ryV3LNz+KEgW2/wLkkLVQ3LUbomKzPrYh+HHiGJE/C74d7mo9RZahD1WUwxMyFjcoMvulo9yDqpswB1tB7Aonk4QtAmGy8tuFp03ry7NEm5xYC2X4HPxmfJ1rvn3QzcGej Pi key (PuTTY) 3 | ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAnWpfcDgCgg0iZvtjOCj+3DDTfLazNAYk52Rhu89Wcrp7HnxyEV5JMpACGoMxROeUAsJvYHZIoAodLapYMVdC7pwPzZyJ+1MUYTg25/O2I4X3v9S6SMnvHjHKEidFeJUlZRskD+AKanZJ3YPOOdbjPU7NlVQhxHUuy5fEKf59/7Dt6eNUsSft1/n/oohjleIIw6KysF9RWmPBs85z0dr30HmiMfylkhi6TNhqkaXV1nOz16l7ccVWoHofUNAjPzdeRIfoFr7FkjkwVdsNKvvueSjfNYIAGMFdBqBD4s0X+jAH1LE9bmme5Stdr3K4Mqluw5mV831qVrqDipWTLCBkmw== Git bash key 4 | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCewn5HcGS8pMMBl8IQe3PeLabacLWru7h+jNKgfWINUDc7n0WcmeblYsWHyQxmeXyLCh37fhMo/TpL3kCC6/eMpi32b9Mry69NEk8Hco8LOpyWCVHIOyxfh6fJDYbABGfAbP7oI/2WPa/RHL1w8nDvXd5KQIHAt1TMf+9eOu1PJ6RZD2078r/BdLTjmOn9lv9aux3jcYb1Lx9HdJOwmtkyBLK4hV//g0SBxJaa0iZi78EUbwELktpTm9e7Y31o57HwvJJDjvD42YcCvDJYyEcPb1kpYEGp6j1DTJ3KDz3hCiX30UWFYUwBkh6Bs5L2F0KYGy2ki2DLS9ONyBUKrCsd ES File Explorer SFTP 5 | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDeU5tdzfd94DgooUP8JhvDxb0+Cf97cu/zZlJK8j59FWddxPNAQNwFLLvmuV1fRhKgW0NJmsJ9WEYteYC5ovd9mn4lhgYOY41VjFTfsIaoPBVFxS1JkQa/S33Rtvd0UMsbyW4w30iUnFHV16Yin8gYBZgFvff0hl4j+EM14ai9cOHkXT5PmKeCxNlbP99+8UA2p8otfZNVEnRvamdl/MFNsySDh3bV2qf54B3vUa6c+jtpsP4beKrF+q1fI+NrqJyofLDaIeiLOe+j9osYWClHHz4PryvFuj75U2vAZEvj/hvMGwI5e61Y9WNwqeS6pwv7vMSGEByOKg+6v/M7jmax david@desktop 6 | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCtDckQ63yLuu40OU3HQK8sPw4B+Gm/rSi/a9G/kDhnmyKLUBpn0WZEkdKNy+F3FngS2ger4323HjdndCFiw+0u18vqt9Ra+W/LYMUWRFcspl17WXTQovZH6WEg/v6o+WMnUHVVZTT1HzeukaxoKHK+K/xC6fTpCOdiuY7Dhl/kcTh1RlZbFcRSxzPx9onk7/e1m0JAJCKAMVThDLQw2NhkC7oBGkSICFWq6RuccyK3o11qI5iEwal2Ib9TcdjU7KRzF4ap2q/17YvR556eY/DZz36PK8G6oiLb9oO4oMnSshcVi2DacMZBEuqd14y+TYSrJk/V7IywngLtXD7HE3wx localhost 7 | ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBALxgF6tLQrNvAC7VpzpQJYL7UnuH+OCB1hyfQKQkdm+jivNA8Wzrb2fNCeo16vbCWZq66MDMrsAjnunWYJ/hnWRUEB1nJHCD8RGB/9dI/6L9W8WYm2T1fQGVZHoZJCXkw== JuiceSSH 8 | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDMXcsnJLxHkyMKs0AvpZtagFb4dPJ7mOoaoqTw9ydwXYtbirR58bMV/eqZMOpeNwfUFjnCEoCQqs9/ZfIsKZOuYyF8EUHh/LiVe+iuJ74YjGNMUg+FeUkhkSfWgXRt3gcU/yj4JgFBgH7dWkM622ETbfLtw4XDQNCgKA9H79DEfr4pAumGrIBAeDvfpFpavAu/EzPJCNpg7YJZcjS9Hop10btDFt4LCwIJOfWXXE2YbIZpw/Mwg+qGuCSKPOAUaiC/fS4E5or8TvXSddV2Xs+Fd8lyxu5Qxzm2sZz7Re843xEJ9UeN1blOoFpuO8siuvEbRsZlw17vgsraLl0w+vvN david yubikey 9 | -------------------------------------------------------------------------------- /collect.sh: -------------------------------------------------------------------------------- 1 | #!/bin/sh 2 | cp /etc/hostapd/hostapd.conf . 3 | cp /etc/network/interfaces . 4 | cp /etc/sysctl.conf . 5 | cp /etc/squid/squid.conf . 6 | cp /etc/apache2/conf.d/myapache.local.conf . 7 | cp /etc/tor/torrc . 8 | cp /etc/crontab . 9 | cp /etc/ssh/sshd_config . 10 | cp /home/pi/.ssh/authorized_keys . 11 | cp /etc/apt/sources.list . 12 | cp -r /etc/apt/sources.list.d . 13 | cp /etc/apache2/ports.conf . 14 | cp /etc/apache2/sites-enabled/000-default.conf . 15 | cp /etc/apache2/sites-enabled/001-default-ssl.conf . 16 | cp /etc/apache2/conf-enabled/security.conf . 17 | cp /etc/apache2/mods-enabled/ssl.load . 18 | cp /etc/apache2/mods-enabled/ssl.conf . 19 | cp /etc/dnsmasq.d/dns.conf . 20 | cp /etc/hosts . 21 | cp /etc/dnsmasq.d/dhcp.conf . 22 | cp /etc/default/ifplugd . 23 | cp /etc/default/hostapd . 24 | cp /usr/local/bin/flip.pl . 25 | sudo cat /etc/ddclient.conf | grep -v password > ddclient.conf 26 | cp /etc/dphys-swapfile . 27 | cp /etc/ssh/moduli . 28 | cp ~/.vimrc vimrc 29 | cp /etc/systemd/system/sniff.service . 30 | cp /opt/sniff/sniff.json . 31 | cp ~/.bashrc . 32 | cp ~/.profile . 33 | cp /etc/gitweb.conf . 34 | cp ~/.ssh/config ssh_config 35 | cp ~/.gitconfig . 36 | cp /etc/cron.d/letsencrypt . 37 | cp ~/.lein/profiles.clj . 38 | -------------------------------------------------------------------------------- /crontab: -------------------------------------------------------------------------------- 1 | # /etc/crontab: system-wide crontab 2 | # Unlike any other crontab you don't have to run the `crontab' 3 | # command to install the new version when you edit this file 4 | # and files in /etc/cron.d. These files also have username fields, 5 | # that none of the other crontabs do. 6 | 7 | SHELL=/bin/sh 8 | PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin 9 | 10 | # m h dom mon dow user command 11 | 17 * * * * root cd / && run-parts --report /etc/cron.hourly 12 | 25 6 * * * root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily ) 13 | 47 6 * * 7 root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.weekly ) 14 | 52 6 1 * * root test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.monthly ) 15 | # 16 | */10 * * * * proxy rm /var/tmp/upsidedownternet/* 17 | -------------------------------------------------------------------------------- /ddclient.conf: -------------------------------------------------------------------------------- 1 | # Configuration file for ddclient generated by debconf 2 | # 3 | # /etc/ddclient.conf 4 | 5 | protocol=noip 6 | use=web 7 | server=dynupdate.no-ip.com 8 | login=divergentdave 9 | divergentdave.no-ip.biz 10 | -------------------------------------------------------------------------------- /dhcp.conf: -------------------------------------------------------------------------------- 1 | interface=wlan0 2 | dhcp-range=192.168.100.10,192.168.100.50,12h 3 | dhcp-option=option:netmask,255.255.255.0 4 | dhcp-option=option:router,192.168.100.1 5 | dhcp-option=option:dns-server,192.168.100.1 6 | -------------------------------------------------------------------------------- /dns.conf: -------------------------------------------------------------------------------- 1 | interface=eth0 2 | no-dhcp-interface=eth0 3 | no-resolv 4 | server=192.168.0.1 5 | server=205.171.3.65 6 | address=/divergentdave.no-ip.biz/192.168.0.5 7 | -------------------------------------------------------------------------------- /dphys-swapfile: -------------------------------------------------------------------------------- 1 | CONF_SWAPSIZE=100 2 | -------------------------------------------------------------------------------- /flip.pl: -------------------------------------------------------------------------------- 1 | #!/usr/bin/perl 2 | 3 | # Adapted from http://www.ex-parrot.com/~pete/upside-down-ternet.html 4 | 5 | $directory = "/var/tmp/upsidedownternet"; 6 | umask 0022; 7 | mkdir($directory, 0775) unless(-d $directory); 8 | 9 | $|=1; 10 | $count = 0; 11 | $pid = $$; 12 | while (<>) { 13 | chomp $_; 14 | if ($_ =~ /(.*\.jpg)/i) { 15 | $url = $1; 16 | system("/usr/bin/wget", "-q", "-O", "/var/tmp/upsidedownternet/$pid-$count.jpg", "$url"); 17 | system("/usr/bin/mogrify", "-flip", "/var/tmp/upsidedownternet/$pid-$count.jpg"); 18 | print "http://127.0.0.1/images/$pid-$count.jpg\n"; 19 | } 20 | elsif ($_ =~ /(.*\.gif)/i) { 21 | $url = $1; 22 | system("/usr/bin/wget", "-q", "-O", "/var/tmp/upsidedownternet/$pid-$count.gif", "$url"); 23 | system("/usr/bin/mogrify", "-flip", "/var/tmp/upsidedownternet/$pid-$count.gif"); 24 | print "http://127.0.0.1/images/$pid-$count.gif\n"; 25 | } 26 | elsif ($_ =~ /(.*\.png)/i) { 27 | $url = $1; 28 | system("/usr/bin/wget", "-q", "-O", "/var/tmp/upsidedownternet/$pid-$count.png", "$url"); 29 | system("/usr/bin/mogrify", "-flip", "/var/tmp/upsidedownternet/$pid-$count.png"); 30 | print "http://127.0.0.1/images/$pid-$count.png\n"; 31 | } 32 | else { 33 | print "$_\n"; 34 | } 35 | $count++; 36 | } 37 | -------------------------------------------------------------------------------- /gitweb.conf: -------------------------------------------------------------------------------- 1 | # path to git projects (.git) 2 | $projectroot = "/var/lib/git"; 3 | 4 | # directory to use for temp files 5 | $git_temp = "/tmp"; 6 | 7 | # target of the home link on top of all pages 8 | #$home_link = $my_uri || "/"; 9 | 10 | # html text to include at home page 11 | #$home_text = "indextext.html"; 12 | 13 | # file with project list; by default, simply scan the projectroot dir. 14 | #$projects_list = $projectroot; 15 | 16 | # stylesheet to use 17 | @stylesheets = ("git/static/gitweb.css"); 18 | 19 | # javascript code for gitweb 20 | $javascript = "git/static/gitweb.js"; 21 | 22 | # logo to use 23 | $logo = "git/static/git-logo.png"; 24 | 25 | # the 'favicon' 26 | $favicon = "git/static/git-favicon.png"; 27 | 28 | # git-diff-tree(1) options to use for generated patches 29 | #@diff_opts = ("-M"); 30 | @diff_opts = (); 31 | -------------------------------------------------------------------------------- /hostapd: -------------------------------------------------------------------------------- 1 | # Defaults for hostapd initscript 2 | # 3 | # See /usr/share/doc/hostapd/README.Debian for information about alternative 4 | # methods of managing hostapd. 5 | # 6 | # Uncomment and set DAEMON_CONF to the absolute path of a hostapd configuration 7 | # file and hostapd will be started during system boot. An example configuration 8 | # file can be found at /usr/share/doc/hostapd/examples/hostapd.conf.gz 9 | # 10 | DAEMON_CONF="/etc/hostapd/hostapd.conf" 11 | 12 | # Additional daemon options to be appended to hostapd command:- 13 | # -d show more debug messages (-dd for even more) 14 | # -K include key data in debug messages 15 | # -t include timestamps in some debug messages 16 | # 17 | # Note that -B (daemon mode) and -P (pidfile) options are automatically 18 | # configured by the init.d script and must not be added to DAEMON_OPTS. 19 | # 20 | #DAEMON_OPTS="" 21 | -------------------------------------------------------------------------------- /hostapd.conf: -------------------------------------------------------------------------------- 1 | interface=wlan0 2 | driver=nl80211 3 | ssid=Upside-Down-Ternet 4 | hw_mode=g 5 | channel=6 6 | macaddr_acl=0 7 | auth_algs=1 8 | ignore_broadcast_ssid=0 9 | wpa=0 10 | -------------------------------------------------------------------------------- /hosts: -------------------------------------------------------------------------------- 1 | 127.0.0.1 localhost 2 | 3 | # This is why we can't have nice things: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/868812 4 | #::1 localhost ip6-localhost ip6-loopback 5 | #fe00::0 ip6-localnet 6 | #ff00::0 ip6-mcastprefix 7 | #ff02::1 ip6-allnodes 8 | #ff02::2 ip6-allrouters 9 | 10 | 192.168.0.5 raspberrypi 11 | -------------------------------------------------------------------------------- /ifplugd: -------------------------------------------------------------------------------- 1 | # This file may be changed either manually or by running dpkg-reconfigure. 2 | # 3 | # N.B.: dpkg-reconfigure deletes everything from this file except for 4 | # the assignments to variables INTERFACES, HOTPLUG_INTERFACES, ARGS and 5 | # SUSPEND_ACTION. When run it uses the current values of those variables 6 | # as their default values, thus preserving the administrator's changes. 7 | # 8 | # This file is sourced by both the init script /etc/init.d/ifplugd and 9 | # the udev script /lib/udev/ifplugd.agent to give default values. 10 | # The init script starts ifplugd for all interfaces listed in 11 | # INTERFACES, and the udev script starts ifplugd for all interfaces 12 | # listed in HOTPLUG_INTERFACES. The special value all starts one 13 | # ifplugd for all interfaces being present. 14 | INTERFACES="eth0" 15 | HOTPLUG_INTERFACES="" 16 | ARGS="-q -f -u0 -d10 -w -I" 17 | SUSPEND_ACTION="stop" 18 | -------------------------------------------------------------------------------- /interfaces: -------------------------------------------------------------------------------- 1 | auto lo 2 | 3 | iface lo inet loopback 4 | iface eth0 inet static 5 | address 192.168.0.5 6 | netmask 255.255.255.0 7 | gateway 192.168.0.1 8 | 9 | allow-hotplug wlan0 10 | 11 | # disabled wifi defaults 12 | # iface wlan0 inet manual 13 | # wpa-roam /etc/wpa_supplicant/wpa_supplicant.conf 14 | # iface default inet dhcp 15 | 16 | iface wlan0 inet static 17 | address 192.168.100.1 18 | netmask 255.255.255.0 19 | 20 | # router/NAT 21 | up iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE 22 | up iptables -A FORWARD -i eth0 -o wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT 23 | up iptables -A FORWARD -i wlan0 -o eth0 -j ACCEPT 24 | 25 | # upsidedownternet 26 | up iptables -t nat -A PREROUTING -i wlan0 -p tcp --dport 80 -j REDIRECT --to-port 3128 27 | 28 | # remap privileged port for sniff (to apache or tor bridge) 29 | up iptables -A INPUT -i eth0 -p tcp --dport 443 -j ACCEPT 30 | up iptables -A INPUT -i eth0 -p tcp --dport 4445 -j ACCEPT 31 | up iptables -t nat -A PREROUTING -i eth0 -p tcp --dport 443 -j REDIRECT --to-port 4445 32 | -------------------------------------------------------------------------------- /letsencrypt: -------------------------------------------------------------------------------- 1 | # m h dom mon dow user command 2 | 35 11 * * * root /home/pi/certbot-auto renew --non-interactive >/home/pi/certbot.log 2>&1 3 | -------------------------------------------------------------------------------- /moduli: -------------------------------------------------------------------------------- 1 |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| 20151017021342 2 6 100 2047 2 F50BF4FEE839CC55493AFBA1034BFB8BD8DA514F5FA94F3961532132ACF891717294EABA04F70C4AA148677C9F3A20C6EBE1D364387C95E046F9A2A99E80737EE5091B642E083D627194185A341ACF7688676F17F45EAADEBD2F98597CA5CA7EB972B43E9CE53F5D743B793AEB919EC7CF8E1A31ED3F689151C33A21789AA8794666737E39D6B03F6E61E7C70C5C9ABC961A849D27F1C5B9CA59BC160B60253C6DE8E46A8DA1E7724495B0F3314A209BEFB264247291A01F080CC364ECB9E876DA8BA354F2C58A970CF28431F42E8C9AB06B73B8AC6F11321D8FF93B3D3A1705D200E26B5F19EA488A1A0043AC3627E508D2B8A831DF06A059072CF000D4B4AB 3 |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|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|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|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|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|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|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| 20151017025504 2 6 100 2047 5 F50BF4FEE839CC55493AFBA1034BFB8BD8DA514F5FA94F3961532132ACF891717294EABA04F70C4AA148677C9F3A20C6EBE1D364387C95E046F9A2A99E80737EE5091B642E083D627194185A341ACF7688676F17F45EAADEBD2F98597CA5CA7EB972B43E9CE53F5D743B793AEB919EC7CF8E1A31ED3F689151C33A21789AA8794666737E39D6B03F6E61E7C70C5C9ABC961A849D27F1C5B9CA59BC160B60253C6DE8E46A8DA1E7724495B0F3314A209BEFB264247291A01F080CC364ECB9E876DA8BA354F2C58A970CF28431F42E8C9AB06B73B8AC6F11321D8FF93B3D3A1705D200E26B5F19EA488A1A0043AC3627E508D2B8A831DF06A059072CF0020DDBA7 11 |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|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|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|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| 20151017033459 2 6 100 2047 2 F50BF4FEE839CC55493AFBA1034BFB8BD8DA514F5FA94F3961532132ACF891717294EABA04F70C4AA148677C9F3A20C6EBE1D364387C95E046F9A2A99E80737EE5091B642E083D627194185A341ACF7688676F17F45EAADEBD2F98597CA5CA7EB972B43E9CE53F5D743B793AEB919EC7CF8E1A31ED3F689151C33A21789AA8794666737E39D6B03F6E61E7C70C5C9ABC961A849D27F1C5B9CA59BC160B60253C6DE8E46A8DA1E7724495B0F3314A209BEFB264247291A01F080CC364ECB9E876DA8BA354F2C58A970CF28431F42E8C9AB06B73B8AC6F11321D8FF93B3D3A1705D200E26B5F19EA488A1A0043AC3627E508D2B8A831DF06A059072CF0035DB4FB 16 |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|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|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|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|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|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|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|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|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|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|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|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|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|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|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|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| 20151017052820 2 6 100 2047 2 F50BF4FEE839CC55493AFBA1034BFB8BD8DA514F5FA94F3961532132ACF891717294EABA04F70C4AA148677C9F3A20C6EBE1D364387C95E046F9A2A99E80737EE5091B642E083D627194185A341ACF7688676F17F45EAADEBD2F98597CA5CA7EB972B43E9CE53F5D743B793AEB919EC7CF8E1A31ED3F689151C33A21789AA8794666737E39D6B03F6E61E7C70C5C9ABC961A849D27F1C5B9CA59BC160B60253C6DE8E46A8DA1E7724495B0F3314A209BEFB264247291A01F080CC364ECB9E876DA8BA354F2C58A970CF28431F42E8C9AB06B73B8AC6F11321D8FF93B3D3A1705D200E26B5F19EA488A1A0043AC3627E508D2B8A831DF06A059072CF006EF0783 33 |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| 20151017053054 2 6 100 2047 5 F50BF4FEE839CC55493AFBA1034BFB8BD8DA514F5FA94F3961532132ACF891717294EABA04F70C4AA148677C9F3A20C6EBE1D364387C95E046F9A2A99E80737EE5091B642E083D627194185A341ACF7688676F17F45EAADEBD2F98597CA5CA7EB972B43E9CE53F5D743B793AEB919EC7CF8E1A31ED3F689151C33A21789AA8794666737E39D6B03F6E61E7C70C5C9ABC961A849D27F1C5B9CA59BC160B60253C6DE8E46A8DA1E7724495B0F3314A209BEFB264247291A01F080CC364ECB9E876DA8BA354F2C58A970CF28431F42E8C9AB06B73B8AC6F11321D8FF93B3D3A1705D200E26B5F19EA488A1A0043AC3627E508D2B8A831DF06A059072CF006F5E61F 35 |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|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|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|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| -------------------------------------------------------------------------------- /myapache.local.conf: -------------------------------------------------------------------------------- 1 | # Hide upsidedownternet from HTTP clients other than squid 2 | # This is separately hid from HTTPS clients bouncing off of Pagekite in the default-ssl site 3 | 4 | Order Deny,Allow 5 | Deny from all 6 | Allow from 127.0.0.1 7 | 8 | 9 | # Hide all git metadata from everyone 10 | 11 | Order Deny,Allow 12 | Deny from all 13 | 14 | 15 | Order Deny,Allow 16 | Deny from all 17 | 18 | -------------------------------------------------------------------------------- /ports.conf: -------------------------------------------------------------------------------- 1 | # If you just change the port or add more ports here, you will likely also 2 | # have to change the VirtualHost statement in 3 | # /etc/apache2/sites-enabled/000-default.conf 4 | 5 | Listen 80 6 | 7 | 8 | Listen 4443 9 | 10 | 11 | 12 | Listen 4443 13 | 14 | 15 | ServerName davidsherenowitsa.party 16 | 17 | # vim: syntax=apache ts=4 sw=4 sts=4 sr noet 18 | -------------------------------------------------------------------------------- /profiles.clj: -------------------------------------------------------------------------------- 1 | {:user {:dependencies [[cljfmt "0.5.6"]] 2 | :plugins [[lein-cljfmt "0.5.6"] 3 | [lein-ancient "0.6.10"] 4 | [lein-kibit "0.1.4-SNAPSHOT"] 5 | [jonase/eastwood "0.2.4"]] 6 | :repl-options {:timeout 300000}}} 7 | -------------------------------------------------------------------------------- /security.conf: -------------------------------------------------------------------------------- 1 | # 2 | # Disable access to the entire file system except for the directories that 3 | # are explicitly allowed later. 4 | # 5 | # This currently breaks the configurations that come with some web application 6 | # Debian packages. 7 | # 8 | # 9 | # AllowOverride None 10 | # Order Deny,Allow 11 | # Deny from all 12 | # 13 | 14 | 15 | # Changing the following options will not really affect the security of the 16 | # server, but might make attacks slightly more difficult in some cases. 17 | 18 | # 19 | # ServerTokens 20 | # This directive configures what you return as the Server HTTP response 21 | # Header. The default is 'Full' which sends information about the OS-Type 22 | # and compiled in modules. 23 | # Set to one of: Full | OS | Minimal | Minor | Major | Prod 24 | # where Full conveys the most information, and Prod the least. 25 | #ServerTokens Minimal 26 | ServerTokens OS 27 | #ServerTokens Full 28 | 29 | # 30 | # Optionally add a line containing the server version and virtual host 31 | # name to server-generated pages (internal error documents, FTP directory 32 | # listings, mod_status and mod_info output etc., but not CGI generated 33 | # documents or custom error documents). 34 | # Set to "EMail" to also include a mailto: link to the ServerAdmin. 35 | # Set to one of: On | Off | EMail 36 | #ServerSignature Off 37 | ServerSignature On 38 | 39 | # 40 | # Allow TRACE method 41 | # 42 | # Set to "extended" to also reflect the request body (only for testing and 43 | # diagnostic purposes). 44 | # 45 | # Set to one of: On | Off | extended 46 | TraceEnable Off 47 | #TraceEnable On 48 | 49 | # 50 | # Forbid access to version control directories 51 | # 52 | # If you use version control systems in your document root, you should 53 | # probably deny access to their directories. For example, for subversion: 54 | # 55 | 56 | Require all denied 57 | 58 | 59 | Require all denied 60 | 61 | 62 | # 63 | # Setting this header will prevent MSIE from interpreting files as something 64 | # else than declared by the content type in the HTTP headers. 65 | # Requires mod_headers to be enabled. 66 | # 67 | Header set X-Content-Type-Options: "nosniff" 68 | 69 | # 70 | # Setting this header will prevent other sites from embedding pages from this 71 | # site as frames. This defends against clickjacking attacks. 72 | # Requires mod_headers to be enabled. 73 | # 74 | #Header set X-Frame-Options: "sameorigin" 75 | 76 | # Adding X-XSS-Protection per recommendation of MDN 77 | Header set X-XSS-Protection: "1; mode=block" 78 | 79 | # Adding CSP, still need unsafe-inline for now gitweb timezone handling 80 | Header set Content-Security-Policy: "default-src 'self' 'unsafe-inline'" 81 | 82 | # vim: syntax=apache ts=4 sw=4 sts=4 sr noet 83 | -------------------------------------------------------------------------------- /sniff.json: -------------------------------------------------------------------------------- 1 | { 2 | "bind": { 3 | "host": "0.0.0.0", 4 | "port": 4445 5 | }, 6 | "servers": [ 7 | { 8 | "default": true, 9 | "regexp": true, 10 | "host": "192.168.0.5", 11 | "names": [ 12 | "^davidsherenowitsa\\.party$", 13 | "^www\\.davidsherenowitsa\\.party$", 14 | "^[0-9a-f]{32}\\.[0-9a-f]{32}\\.acme\\.invalid$" 15 | ], 16 | "port": 4443 17 | }, 18 | { 19 | "default": false, 20 | "regexp": true, 21 | "host": "127.0.0.1", 22 | "names": [ 23 | "^www\\.[a-z2-7]{4,25}\\.com$" 24 | ], 25 | "port": 9090 26 | } 27 | ] 28 | } 29 | -------------------------------------------------------------------------------- /sniff.service: -------------------------------------------------------------------------------- 1 | [Unit] 2 | Description=SNIff 3 | 4 | [Service] 5 | ExecStart=/home/pi/go/bin/sniff 6 | WorkingDirectory=/opt/sniff 7 | User=sniff 8 | Group=sniff 9 | PIDFile=/opt/sniff/sniff.pid 10 | 11 | ; Need to run `sudo systemctl enable sniff.service` for this to take effect 12 | [Install] 13 | WantedBy=multi-user.target 14 | -------------------------------------------------------------------------------- /sources.list: -------------------------------------------------------------------------------- 1 | deb tor://mirrordirector.raspbian.org/raspbian/ jessie main contrib non-free rpi 2 | # Uncomment line below then 'apt-get update' to enable 'apt-get source' 3 | #deb-src tor://mirror.ox.ac.uk/sites/archive.raspbian.org/archive/raspbian/ jessie main contrib non-free rpi 4 | deb-src tor://deb.torproject.org/torproject.org jessie main 5 | -------------------------------------------------------------------------------- /sources.list.d/collabora.list: -------------------------------------------------------------------------------- 1 | deb tor://raspberrypi.collabora.com wheezy rpi 2 | -------------------------------------------------------------------------------- /sources.list.d/raspi.list: -------------------------------------------------------------------------------- 1 | deb tor://archive.raspberrypi.org/debian/ jessie main 2 | # Uncomment line below then 'apt-get update' to enable 'apt-get source' 3 | #deb-src tor://archive.raspberrypi.org/debian/ jessie main 4 | -------------------------------------------------------------------------------- /ssh_config: -------------------------------------------------------------------------------- 1 | Host pi 2 | HostName localhost 3 | -------------------------------------------------------------------------------- /sshd_config: -------------------------------------------------------------------------------- 1 | # Package generated configuration file 2 | # See the sshd_config(5) manpage for details 3 | 4 | # What ports, IPs and protocols we listen for 5 | Port 22 6 | Port 2932 7 | # Use these options to restrict which interfaces/protocols sshd will bind to 8 | #ListenAddress :: 9 | #ListenAddress 0.0.0.0 10 | Protocol 2 11 | # HostKeys for protocol version 2 12 | HostKey /etc/ssh/ssh_host_rsa_key 13 | HostKey /etc/ssh/ssh_host_dsa_key 14 | HostKey /etc/ssh/ssh_host_ecdsa_key 15 | #Privilege Separation is turned on for security 16 | UsePrivilegeSeparation yes 17 | 18 | # Lifetime and size of ephemeral version 1 server key 19 | KeyRegenerationInterval 3600 20 | ServerKeyBits 1024 21 | 22 | # Logging 23 | SyslogFacility AUTH 24 | LogLevel INFO 25 | 26 | # Authentication: 27 | LoginGraceTime 120 28 | PermitRootLogin without-password 29 | StrictModes yes 30 | 31 | RSAAuthentication yes 32 | PubkeyAuthentication yes 33 | AuthorizedKeysFile %h/.ssh/authorized_keys 34 | 35 | # Don't read the user's ~/.rhosts and ~/.shosts files 36 | IgnoreRhosts yes 37 | # For this to work you will also need host keys in /etc/ssh_known_hosts 38 | RhostsRSAAuthentication no 39 | # similar for protocol version 2 40 | HostbasedAuthentication no 41 | # Uncomment if you don't trust ~/.ssh/known_hosts for RhostsRSAAuthentication 42 | #IgnoreUserKnownHosts yes 43 | 44 | # To enable empty passwords, change to yes (NOT RECOMMENDED) 45 | PermitEmptyPasswords no 46 | 47 | # Change to yes to enable challenge-response passwords (beware issues with 48 | # some PAM modules and threads) 49 | ChallengeResponseAuthentication no 50 | 51 | # Change to no to disable tunnelled clear text passwords 52 | PasswordAuthentication no 53 | 54 | # Kerberos options 55 | #KerberosAuthentication no 56 | #KerberosGetAFSToken no 57 | #KerberosOrLocalPasswd yes 58 | #KerberosTicketCleanup yes 59 | 60 | # GSSAPI options 61 | #GSSAPIAuthentication no 62 | #GSSAPICleanupCredentials yes 63 | 64 | X11Forwarding yes 65 | X11DisplayOffset 10 66 | PrintMotd no 67 | PrintLastLog yes 68 | TCPKeepAlive yes 69 | #UseLogin no 70 | 71 | #MaxStartups 10:30:60 72 | #Banner /etc/issue.net 73 | 74 | # Allow client to pass locale environment variables 75 | AcceptEnv LANG LC_* 76 | 77 | Subsystem sftp /usr/lib/openssh/sftp-server 78 | 79 | # Set this to 'yes' to enable PAM authentication, account processing, 80 | # and session processing. If this is enabled, PAM authentication will 81 | # be allowed through the ChallengeResponseAuthentication and 82 | # PasswordAuthentication. Depending on your PAM configuration, 83 | # PAM authentication via ChallengeResponseAuthentication may bypass 84 | # the setting of "PermitRootLogin without-password". 85 | # If you just want the PAM account and session checks to run without 86 | # PAM authentication, then enable this but set PasswordAuthentication 87 | # and ChallengeResponseAuthentication to 'no'. 88 | UsePAM yes 89 | 90 | AllowUsers pi 91 | -------------------------------------------------------------------------------- /ssl.conf: -------------------------------------------------------------------------------- 1 | 2 | 3 | # Pseudo Random Number Generator (PRNG): 4 | # Configure one or more sources to seed the PRNG of the SSL library. 5 | # The seed data should be of good random quality. 6 | # WARNING! On some platforms /dev/random blocks if not enough entropy 7 | # is available. This means you then cannot use the /dev/random device 8 | # because it would lead to very long connection times (as long as 9 | # it requires to make more entropy available). But usually those 10 | # platforms additionally provide a /dev/urandom device which doesn't 11 | # block. So, if available, use this one instead. Read the mod_ssl User 12 | # Manual for more details. 13 | # 14 | SSLRandomSeed startup builtin 15 | SSLRandomSeed startup file:/dev/urandom 512 16 | SSLRandomSeed connect builtin 17 | SSLRandomSeed connect file:/dev/urandom 512 18 | 19 | ## 20 | ## SSL Global Context 21 | ## 22 | ## All SSL configuration in this context applies both to 23 | ## the main server and all SSL-enabled virtual hosts. 24 | ## 25 | 26 | # 27 | # Some MIME-types for downloading Certificates and CRLs 28 | # 29 | AddType application/x-x509-ca-cert .crt 30 | AddType application/x-pkcs7-crl .crl 31 | 32 | # Pass Phrase Dialog: 33 | # Configure the pass phrase gathering process. 34 | # The filtering dialog program (`builtin' is a internal 35 | # terminal dialog) has to provide the pass phrase on stdout. 36 | SSLPassPhraseDialog exec:/usr/share/apache2/ask-for-passphrase 37 | 38 | # Inter-Process Session Cache: 39 | # Configure the SSL Session Cache: First the mechanism 40 | # to use and second the expiring timeout (in seconds). 41 | # (The mechanism dbm has known memory leaks and should not be used). 42 | #SSLSessionCache dbm:${APACHE_RUN_DIR}/ssl_scache 43 | SSLSessionCache shmcb:${APACHE_RUN_DIR}/ssl_scache(512000) 44 | SSLSessionCacheTimeout 300 45 | 46 | # Semaphore: 47 | # Configure the path to the mutual exclusion semaphore the 48 | # SSL engine uses internally for inter-process synchronization. 49 | # (Disabled by default, the global Mutex directive consolidates by default 50 | # this) 51 | #Mutex file:${APACHE_LOCK_DIR}/ssl_mutex ssl-cache 52 | 53 | 54 | # SSL Cipher Suite: 55 | # List the ciphers that the client is permitted to negotiate. See the 56 | # ciphers(1) man page from the openssl package for list of all available 57 | # options. 58 | # Enable only secure ciphers: 59 | SSLCipherSuite HIGH:!aNULL 60 | 61 | # SSL server cipher order preference: 62 | # Use server priorities for cipher algorithm choice. 63 | # Clients may prefer lower grade encryption. You should enable this 64 | # option if you want to enforce stronger encryption, and can afford 65 | # the CPU cost, and did not override SSLCipherSuite in a way that puts 66 | # insecure ciphers first. 67 | # Default: Off 68 | #SSLHonorCipherOrder on 69 | 70 | # The protocols to enable. 71 | # Available values: all, SSLv3, TLSv1, TLSv1.1, TLSv1.2 72 | # SSL v2 is no longer supported 73 | SSLProtocol all -SSLv3 74 | 75 | # Allow insecure renegotiation with clients which do not yet support the 76 | # secure renegotiation protocol. Default: Off 77 | #SSLInsecureRenegotiation on 78 | 79 | # Whether to forbid non-SNI clients to access name based virtual hosts. 80 | # Default: Off 81 | #SSLStrictSNIVHostCheck On 82 | 83 | 84 | 85 | # vim: syntax=apache ts=4 sw=4 sts=4 sr noet 86 | -------------------------------------------------------------------------------- /ssl.load: -------------------------------------------------------------------------------- 1 | # Depends: setenvif mime socache_shmcb 2 | LoadModule ssl_module /usr/lib/apache2/modules/mod_ssl.so 3 | -------------------------------------------------------------------------------- /sysctl.conf: -------------------------------------------------------------------------------- 1 | # 2 | # /etc/sysctl.conf - Configuration file for setting system variables 3 | # See /etc/sysctl.d/ for additional system variables. 4 | # See sysctl.conf (5) for information. 5 | # 6 | 7 | #kernel.domainname = example.com 8 | 9 | # Uncomment the following to stop low-level messages on console 10 | kernel.printk = 3 4 1 3 11 | 12 | ##############################################################3 13 | # Functions previously found in netbase 14 | # 15 | 16 | # Uncomment the next two lines to enable Spoof protection (reverse-path filter) 17 | # Turn on Source Address Verification in all interfaces to 18 | # prevent some spoofing attacks 19 | #net.ipv4.conf.default.rp_filter=1 20 | #net.ipv4.conf.all.rp_filter=1 21 | 22 | # Uncomment the next line to enable TCP/IP SYN cookies 23 | # See http://lwn.net/Articles/277146/ 24 | # Note: This may impact IPv6 TCP sessions too 25 | #net.ipv4.tcp_syncookies=1 26 | 27 | # Uncomment the next line to enable packet forwarding for IPv4 28 | net.ipv4.ip_forward=1 29 | 30 | # Uncomment the next line to enable packet forwarding for IPv6 31 | # Enabling this option disables Stateless Address Autoconfiguration 32 | # based on Router Advertisements for this host 33 | #net.ipv6.conf.all.forwarding=1 34 | 35 | 36 | ################################################################### 37 | # Additional settings - these settings can improve the network 38 | # security of the host and prevent against some network attacks 39 | # including spoofing attacks and man in the middle attacks through 40 | # redirection. Some network environments, however, require that these 41 | # settings are disabled so review and enable them as needed. 42 | # 43 | # Do not accept ICMP redirects (prevent MITM attacks) 44 | #net.ipv4.conf.all.accept_redirects = 0 45 | #net.ipv6.conf.all.accept_redirects = 0 46 | # _or_ 47 | # Accept ICMP redirects only for gateways listed in our default 48 | # gateway list (enabled by default) 49 | # net.ipv4.conf.all.secure_redirects = 1 50 | # 51 | # Do not send ICMP redirects (we are not a router) 52 | #net.ipv4.conf.all.send_redirects = 0 53 | # 54 | # Do not accept IP source route packets (we are not a router) 55 | #net.ipv4.conf.all.accept_source_route = 0 56 | #net.ipv6.conf.all.accept_source_route = 0 57 | # 58 | # Log Martian Packets 59 | #net.ipv4.conf.all.log_martians = 1 60 | # 61 | 62 | # rpi tweaks 63 | vm.swappiness=1 64 | vm.min_free_kbytes = 8192 65 | -------------------------------------------------------------------------------- /torrc: -------------------------------------------------------------------------------- 1 | ## Configuration file for a typical Tor user 2 | ## Last updated 22 September 2015 for Tor 0.2.7.3-alpha. 3 | ## (may or may not work for much older or much newer versions of Tor.) 4 | ## 5 | ## Lines that begin with "## " try to explain what's going on. Lines 6 | ## that begin with just "#" are disabled commands: you can enable them 7 | ## by removing the "#" symbol. 8 | ## 9 | ## See 'man tor', or https://www.torproject.org/docs/tor-manual.html, 10 | ## for more options you can use in this file. 11 | ## 12 | ## Tor will look for this file in various places based on your platform: 13 | ## https://www.torproject.org/docs/faq#torrc 14 | 15 | ## Tor opens a SOCKS proxy on port 9050 by default -- even if you don't 16 | ## configure one below. Set "SOCKSPort 0" if you plan to run Tor only 17 | ## as a relay, and not make any local application connections yourself. 18 | #SOCKSPort 9050 # Default: Bind to localhost:9050 for local connections. 19 | #SOCKSPort 192.168.0.1:9100 # Bind to this address:port too. 20 | SOCKSPort 9050 21 | 22 | ## Entry policies to allow/deny SOCKS requests based on IP address. 23 | ## First entry that matches wins. If no SOCKSPolicy is set, we accept 24 | ## all (and only) requests that reach a SOCKSPort. Untrusted users who 25 | ## can access your SOCKSPort may be able to learn about the connections 26 | ## you make. 27 | #SOCKSPolicy accept 192.168.0.0/16 28 | #SOCKSPolicy accept6 FC00::/7 29 | #SOCKSPolicy reject * 30 | 31 | ## Logs go to stdout at level "notice" unless redirected by something 32 | ## else, like one of the below lines. You can have as many Log lines as 33 | ## you want. 34 | ## 35 | ## We advise using "notice" in most cases, since anything more verbose 36 | ## may provide sensitive information to an attacker who obtains the logs. 37 | ## 38 | ## Send all messages of level 'notice' or higher to /var/log/tor/notices.log 39 | Log notice file /var/log/tor/notices.log 40 | ## Send every possible message to /var/log/tor/debug.log 41 | #Log debug file /var/log/tor/debug.log 42 | ## Use the system log instead of Tor's logfiles 43 | #Log notice syslog 44 | ## To send all messages to stderr: 45 | #Log debug stderr 46 | 47 | ## Uncomment this to start the process in the background... or use 48 | ## --runasdaemon 1 on the command line. This is ignored on Windows; 49 | ## see the FAQ entry if you want Tor to run as an NT service. 50 | #RunAsDaemon 1 51 | 52 | ## The directory for keeping all the keys/etc. By default, we store 53 | ## things in $HOME/.tor on Unix, and in Application Data\tor on Windows. 54 | #DataDirectory /var/lib/tor 55 | 56 | ## The port on which Tor will listen for local connections from Tor 57 | ## controller applications, as documented in control-spec.txt. 58 | ControlPort 9051 59 | ## If you enable the controlport, be sure to enable one of these 60 | ## authentication methods, to prevent attackers from accessing it. 61 | #HashedControlPassword 16:872860B76453A77D60CA2BB8C1A7042072093276A3D701AD684053EC4C 62 | CookieAuthentication 1 63 | 64 | ############### This section is just for location-hidden services ### 65 | 66 | ## Once you have configured a hidden service, you can look at the 67 | ## contents of the file ".../hidden_service/hostname" for the address 68 | ## to tell people. 69 | ## 70 | ## HiddenServicePort x y:z says to redirect requests on port x to the 71 | ## address y:z. 72 | 73 | #HiddenServiceDir /var/lib/tor/hidden_service/ 74 | #HiddenServicePort 80 127.0.0.1:80 75 | 76 | #HiddenServiceDir /var/lib/tor/other_hidden_service/ 77 | #HiddenServicePort 80 127.0.0.1:80 78 | #HiddenServicePort 22 127.0.0.1:22 79 | 80 | ################ This section is just for relays ##################### 81 | # 82 | ## See https://www.torproject.org/docs/tor-doc-relay for details. 83 | 84 | ## Required: what port to advertise for incoming Tor connections. 85 | #ORPort 9001 86 | ## If you want to listen on a port other than the one advertised in 87 | ## ORPort (e.g. to advertise 443 but bind to 9090), you can do it as 88 | ## follows. You'll need to do ipchains or other port forwarding 89 | ## yourself to make this work. 90 | ORPort 443 NoListen 91 | ORPort 9090 NoAdvertise 92 | 93 | ## The IP address or full DNS name for incoming connections to your 94 | ## relay. Leave commented out and Tor will guess. 95 | #Address noname.example.com 96 | 97 | ## If you have multiple network interfaces, you can specify one for 98 | ## outgoing traffic to use. 99 | # OutboundBindAddress 10.0.0.5 100 | 101 | ## A handle for your relay, so people don't have to refer to it by key. 102 | Nickname DNCBridgeRPi 103 | 104 | ## Define these to limit how much relayed traffic you will allow. Your 105 | ## own traffic is still unthrottled. Note that RelayBandwidthRate must 106 | ## be at least 75 kilobytes per second. 107 | ## Note that units for these config options are bytes (per second), not 108 | ## bits (per second), and that prefixes are binary prefixes, i.e. 2^10, 109 | ## 2^20, etc. 110 | #RelayBandwidthRate 100 KBytes # Throttle traffic to 100KB/s (800Kbps) 111 | #RelayBandwidthBurst 200 KBytes # But allow bursts up to 200KB (1600Kb) 112 | 113 | ## Use these to restrict the maximum traffic per day, week, or month. 114 | ## Note that this threshold applies separately to sent and received bytes, 115 | ## not to their sum: setting "40 GB" may allow up to 80 GB total before 116 | ## hibernating. 117 | ## 118 | ## Set a maximum of 40 gigabytes each way per period. 119 | #AccountingMax 40 GBytes 120 | ## Each period starts daily at midnight (AccountingMax is per day) 121 | #AccountingStart day 00:00 122 | ## Each period starts on the 3rd of the month at 15:00 (AccountingMax 123 | ## is per month) 124 | #AccountingStart month 3 15:00 125 | 126 | ## Administrative contact information for this relay or bridge. This line 127 | ## can be used to contact you if your relay or bridge is misconfigured or 128 | ## something else goes wrong. Note that we archive and publish all 129 | ## descriptors containing these lines and that Google indexes them, so 130 | ## spammers might also collect them. You may want to obscure the fact that 131 | ## it's an email address and/or generate a new address for this purpose. 132 | #ContactInfo Random Person 133 | ## You might also include your PGP or GPG fingerprint if you have one: 134 | #ContactInfo 0xFFFFFFFF Random Person 135 | ContactInfo 0x81CA2E51 David Cook 136 | 137 | ## Uncomment this to mirror directory information for others. Please do 138 | ## if you have enough bandwidth. 139 | #DirPort 9030 # what port to advertise for directory connections 140 | ## If you want to listen on a port other than the one advertised in 141 | ## DirPort (e.g. to advertise 80 but bind to 9091), you can do it as 142 | ## follows. below too. You'll need to do ipchains or other port 143 | ## forwarding yourself to make this work. 144 | #DirPort 80 NoListen 145 | #DirPort 127.0.0.1:9091 NoAdvertise 146 | ## Uncomment to return an arbitrary blob of html on your DirPort. Now you 147 | ## can explain what Tor is if anybody wonders why your IP address is 148 | ## contacting them. See contrib/tor-exit-notice.html in Tor's source 149 | ## distribution for a sample. 150 | #DirPortFrontPage /etc/tor/tor-exit-notice.html 151 | 152 | DirPort 0 153 | DirReqStatistics 0 154 | 155 | ## Uncomment this if you run more than one Tor relay, and add the identity 156 | ## key fingerprint of each Tor relay you control, even if they're on 157 | ## different networks. You declare it here so Tor clients can avoid 158 | ## using more than one of your relays in a single circuit. See 159 | ## https://www.torproject.org/docs/faq#MultipleRelays 160 | ## However, you should never include a bridge's fingerprint here, as it would 161 | ## break its concealability and potentially reveal its IP/TCP address. 162 | #MyFamily $keyid,$keyid,... 163 | 164 | ## A comma-separated list of exit policies. They're considered first 165 | ## to last, and the first match wins. 166 | ## 167 | ## If you want to allow the same ports on IPv4 and IPv6, write your rules 168 | ## using accept/reject *. If you want to allow different ports on IPv4 and 169 | ## IPv6, write your IPv6 rules using accept6/reject6 *6, and your IPv4 rules 170 | ## using accept/reject *4. 171 | ## 172 | ## If you want to _replace_ the default exit policy, end this with either a 173 | ## reject *:* or an accept *:*. Otherwise, you're _augmenting_ (prepending to) 174 | ## the default exit policy. Leave commented to just use the default, which is 175 | ## described in the man page or at 176 | ## https://www.torproject.org/documentation.html 177 | ## 178 | ## Look at https://www.torproject.org/faq-abuse.html#TypicalAbuses 179 | ## for issues you might encounter if you use the default exit policy. 180 | ## 181 | ## If certain IPs and ports are blocked externally, e.g. by your firewall, 182 | ## you should update your exit policy to reflect this -- otherwise Tor 183 | ## users will be told that those destinations are down. 184 | ## 185 | ## For security, by default Tor rejects connections to private (local) 186 | ## networks, including to the configured primary public IPv4 and IPv6 addresses, 187 | ## and any public IPv4 and IPv6 addresses on any interface on the relay. 188 | ## See the man page entry for ExitPolicyRejectPrivate if you want to allow 189 | ## "exit enclaving". 190 | ## 191 | #ExitPolicy accept *:6660-6667,reject *:* # allow irc ports on IPv4 and IPv6 but no more 192 | #ExitPolicy accept *:119 # accept nntp ports on IPv4 and IPv6 as well as default exit policy 193 | #ExitPolicy accept *4:119 # accept nntp ports on IPv4 only as well as default exit policy 194 | #ExitPolicy accept6 *6:119 # accept nntp ports on IPv6 only as well as default exit policy 195 | ExitPolicy reject *:* # no exits allowed 196 | 197 | ## Bridge relays (or "bridges") are Tor relays that aren't listed in the 198 | ## main directory. Since there is no complete public list of them, even an 199 | ## ISP that filters connections to all the known Tor relays probably 200 | ## won't be able to block all the bridges. Also, websites won't treat you 201 | ## differently because they won't know you're running Tor. If you can 202 | ## be a real relay, please do; but if not, be a bridge! 203 | BridgeRelay 1 204 | ## By default, Tor will advertise your bridge to users through various 205 | ## mechanisms like https://bridges.torproject.org/. If you want to run 206 | ## a private bridge, for example because you'll give out your bridge 207 | ## address manually to your friends, uncomment this line: 208 | #PublishServerDescriptor 0 209 | 210 | AvoidDiskWrites 1 211 | 212 | ServerTransportPlugin obfs3,scramblesuit exec /usr/local/bin/obfsproxy managed 213 | ExtORPort auto 214 | -------------------------------------------------------------------------------- /vimrc: -------------------------------------------------------------------------------- 1 | execute pathogen#infect() 2 | 3 | syntax on 4 | filetype plugin indent on 5 | 6 | " Spaces, not \t 7 | setlocal shiftwidth=4 8 | setlocal tabstop=4 9 | setlocal softtabstop=4 10 | setlocal expandtab 11 | 12 | " Two space indentation for @konklone's projects 13 | autocmd BufRead,BufNewFile,BufEnter /home/pi/inspectors-general/* setlocal shiftwidth=2 tabstop=2 softtabstop=2 14 | autocmd BufRead,BufNewFile,BufEnter /home/pi/oversight.io/* setlocal shiftwidth=2 tabstop=2 softtabstop=2 15 | autocmd BufRead,BufNewFile,BufEnter /home/pi/oversight.garden/* setlocal shiftwidth=2 tabstop=2 softtabstop=2 16 | autocmd BufRead,BufNewFile,BufEnter /home/pi/citation/* setlocal shiftwidth=2 tabstop=2 softtabstop=2 17 | 18 | " Three spaces for michael/github 19 | autocmd BufRead,BufNewFile,BufEnter /home/pi/github/* setlocal shiftwidth=3 tabstop=3 softtabstop=3 20 | 21 | " Tabs for Go projects 22 | autocmd BufRead,BufNewFile,BufEnter /home/pi/go/src/* setlocal expandtab! noexpandtab 23 | 24 | " Tabs for pdf-redactor 25 | autocmd BufRead,BufNewFile,BufEnter /home/pi/pdf-redactor/* setlocal expandtab! noexpandtab shiftwidth=8 tabstop=8 softtabstop=8 26 | 27 | autocmd BufNewFile,BufReadPost *.cljc setfiletype clojure 28 | --------------------------------------------------------------------------------