iStat – Sys Monitoring, Battery – Bjango
昨日 OpenSolaris 0811をインストールしたわけですが、正直 重くて使い物になりません。いろいろ手を加えるとそれなりに使えるようにはなると思われますが、そこまで時間をかけて設定する気はありません。
今回は、Ubuntuを選択。
インストールしたのは、Ubuntu 9.0.4 日本語 Remixです。
正直言って、無茶苦茶いいです。
まず、
インストール直後、ここまで使える状態だともの凄く快適に使えます。
dmesgを見ると、
Memory: 2043324k/2087872k available (4126k kernel code, 42536k reserved, 2208k data, 532k init, 1182028k highmem)
CPU0: Intel(R) Atom(TM) CPU Z540 @ 1.86GHz stepping 02
CPU1: Intel(R) Atom(TM) CPU Z540 @ 1.86GHz stepping 02Bluetooth: Core ver 2.13
NET: Registered protocol family 31
Bluetooth: HCI device and connection manager initialized
Bluetooth: HCI socket layer initializedACPI: AC Adapter [AC] (on-line)
ACPI: Battery Slot [BAT0] (battery present)ACPI: Thermal Zone [ATF0] (67 C)
ata1.00: ATA-7: SAMSUNG MMCRE64GFMPP-MVA, VAM05S1Q, max UDMA/100
Bluetooth: L2CAP ver 2.11
sky2 driver version 1.22
sky2 0000:01:00.0: PCI INT A -> GSI 16 (level, low) -> IRQ 16
sky2 0000:01:00.0: setting latency timer to 64
sky2 0000:01:00.0: Yukon-2 (chip 0xba) chip revision 0
sky2 0000:01:00.0: Marvell Yukon 88E8057 Gigabit Ethernet Controller
Part Number: Yukon 88Exxxx
Engineering Level: Rev. 1.2
Manufacturer: Marvellath9k: 0.1
ath9k 0000:02:00.0: PCI INT A -> GSI 17 (level, low) -> IRQ 17
ath9k 0000:02:00.0: setting latency timer to 64
phy0: Selected rate control algorithm ‘ath9k_rate_control’
Registered led device: ath9k-phy0:radio
Registered led device: ath9k-phy0:assoc
Registered led device: ath9k-phy0:tx
Registered led device: ath9k-phy0:rx
dmesgを抜粋してみた。
日本語Remix版や本家Desktop版は、ssh-serverがインストールされていないのですね。
# apt-get update
# apt-get upgrade
# apt-get install openssh-server
sshでログインしてみると、
#42-Ubuntu SMP Fri Apr 17 01:57:59 UTC 2009 i686
The programs included with the Ubuntu system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.Ubuntu comes with ABSOLUTELY NO WARRANTY, to the extent permitted by
applicable law.To access official Ubuntu documentation, please visit:
http://help.ubuntu.com/0 packages can be updated.
0 updates are security updates.~$
のように、screen関連のprofileが入っているためupdate等の情報が表示されます。これは便利ですね。Server版にも同様の物が入ったとか。
続いて、X server関連
Ubuntu Weekly Recipe:第57回を参考に、インストールする予定。
久しぶりにワクワクするなー
Mac上 VMware FusionにUbuntu 9.0.4をインストールしてみた。
今回の確認は、ext4ファイルシステム。
結論から言うと、全く問題ない模様です。
インストール後、vmware-install.plを動かし、モジュール類をコンパイル、リブートして完了。
ATOMでもそろそろ問題が出なくなることを願う。
仮想マシン上ですが、ファイルアクセスが高速になっているんじゃないでしょうか。
ProftpdをTLS対応すべく、鍵の作成
$ locate CA.sh
/usr/lib/ssl/misc/CA.sh
# cp /usr/lib/ssl/misc/CA.sh /etc/proftpd/certs# vi CA.sh
CATOP=./hoge#./CA.sh -newca
CA certificate filename (or enter to create) <-enterMaking CA certificate …
Generating a 1024 bit RSA private key
…………++++++
……………..++++++
writing new private key to ‘./demoCA/private/./cakey.pem’
Enter PEM pass phrase: <-passphrase
Verifying – Enter PEM pass phrase: <-passphrase
—–
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter ‘.’, the field will be left blank.
—–
Country Name (2 letter code) [AU]:JP
State or Province Name (full name) [Some-State]:KYOTO
Locality Name (eg, city) []:
Organization Name (eg, company) [Internet Widgits Pty Ltd]:HOGE
Organizational Unit Name (eg, section) []:
Common Name (eg, YOUR name) []:サーバーのFQDN
Email Address []:Please enter the following ‘extra’ attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
Using configuration from /usr/lib/ssl/openssl.cnf
Enter pass phrase for ./demoCA/private/./cakey.pem: <-passphrase
Check that the request matches the signature
Signature ok
Certificate Details:
Serial Number: 0 (0x0)
Validity
Not Before: Apr 24 05:32:33 2009 GMT
Not After : Apr 23 05:32:33 2012 GMT
Subject:
countryName = JP
stateOrProvinceName = KYOTO
organizationName = HOGE
commonName = FQDN
X509v3 extensions:
X509v3 Subject Key Identifier:
46:40:88:3D:40:E0:3E:83:7E:C1:38:73:8D:38:06:C7:E6:76:49:41
X509v3 Authority Key Identifier:
keyid:46:40:88:3D:40:E0:3E:83:7E:C1:38:73:8D:38:06:C7:E6:76:49:41
DirName:/C=JP/ST=KYOTO/O=HOGE/CN=FQDN
serial:00X509v3 Basic Constraints:
CA:TRUE
Certificate is to be certified until Apr 23 05:32:33 2012 GMT (1095 days)Write out database with 1 new entries
Data Base Updated# mkdir /etc/proftpd/certs/hoge
# cd /etc/proftpd/certs/hoge
# cp /etc/proftpd/certs/demoCA/cacert.pem .
# cp /etc/proftpd/certs/demoCA/private/cakey.pem
# chmod 600 -R /etc/proftpd/certs/hoge
# openssl genrsa -des3 -out hoge.key 1024
Generating RSA private key, 1024 bit long modulus
………………..++++++
…++++++
e is 65537 (0x10001)
Enter pass phrase for hoge.key: <-passphrase
Verifying – Enter pass phrase for hoge.key: <-passphrase# openssl rsa -in hoge.key -out hoge_nopass.key
Enter pass phrase for hoge.key: <-passphrase
writing RSA key# openssl req -new -days 3650 -key hoge.key -out csr.pem
Enter pass phrase for hoge.key: <-passphrase
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter ‘.’, the field will be left blank.
—–
Country Name (2 letter code) [AU]:JP
State or Province Name (full name) [Some-State]:KYOTO
Locality Name (eg, city) []:
Organization Name (eg, company) [Internet Widgits Pty Ltd]:HOGE
Organizational Unit Name (eg, section) []:
Common Name (eg, YOUR name) []:サーバーのFQDN
Email Address []:Please enter the following ‘extra’ attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:# locate openssl.cnf
/etc/ssl/openssl.cnf
/usr/lib/ssl/openssl.cnf
/usr/share/webmin/acl/openssl.cnf
# cp /usr/lib/ssl/openssl.cnf /etc/proftpd/certs
# vi openssl.cnf
[usr_cert]
nsCertType = server <-コメントを外す# pwd
/etc/proftpd/certs/
# ls hoge
csr.pem hoge.key hoge_nopass.key# openssl ca -config /etc/proftpd/certs/openssl.cnf -in hoge/csr.pem -keyfile /etc/proftpd/certs/demoCA/private/cakey.pem -cert /etc/proftpd/certs/demoCA/cacert.pem -out hoge/cert.pem
うまくいかなければ、openssl.cnfの設定やcsr.pem/caket.pem/cacert.pemのパスなどを確認。