Computers

Posted:

[ Categories: ]

  • Using GNOME Keyring in XFCE4 for SSH Connections

    Activate GNOME services for GNOME Keyring.

    To use GNOME Keyring, simply tick the checkbox Launch GNOME services on startup in the Advanced tab of Session and Startup in Xfce’s settings. This will also disable gpg-agent and ssh-agent (gnome-keyring has its own associated ssh-agent).

    https://forum.xfce.org/viewtopic.php?id=14950

    Application Menu > Settings > Session and Startup > Advanced > Launch GNOME services on startup

    Creating a New SSH Key Using SSH Connector

    Creating a New SSH Key Using Commands

    Create a new ssh key by running ssh-keygen.

    ssh-keygen -t rsa -b 4096 -C "hostname" -f ~/.ssh /username-host

    Note: Use a password generator to create a unique string for the password. You can store the password or throw it away after adding the new key to the ‘Login’ keyring (GNOME Keyring). Throwing it away means that you will need to re-create the key if the key ever gets deleted from the Login keyring.

    Copy the public key to the remote computer:

    ssh-copy-id -i ~/.ssh/username-host.pub username@host

    SSH in to the remote computer to permanently add the key to the Login keychain:

    ssh -i ~/.ssh/username@host username@host

    If all is functioning properly, you should get a pop-up from GNOME Keyring asking you to unlock the private key.

    Add Key to GNOME Keyring

    GNOME Keyring will display a GUI password entry dialog each time you need to unlock an SSH key. The dialog includes a checkbox to remember the password you type, which, if selected, will allow fully passwordless use of that key in the future as long as your login keyring is unlocked.

    https://forum.xfce.org/viewtopic.php?id=14950

    Make sure the ‘Automatically unlock this key whenever I’m logged in’ is checked, especially if you are discarding the password that was generated earlier.

    This means all you need is your master password to access all the keys added to the ‘Login’ keyring.

    See the application ‘seahorse’. Click on ‘Login’ and it will list the known keys.

  • Keystreams.IO (Home System)

    For families or home & small business.

    Shell
    Desktop Environment (DE)
    Terminal
    Backups
    Password/Account Management
    Bash, ZSH
    KDE
    Back In Time, Clonezilla
    Konsole
    Bitwarden
    Bash, ZSH
    XFCE4
    Back In Time, Clonezilla
    xfce4-terminal
    Unix Pass/QTPass/Password-store

    LUKS, LVM, Gocryptfs

    fstab, crypttab, pam_mount

    # luks-keyfiles
    UUID=xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx /media/luks-keyfiles auto nosuid,nodev,nofail,x-gvfs-show 0 0
    
    # storage-vol1
    /dev/mapper/storage-vol1-luks /mnt/storage-vol1 ext4 defaults,errors=remount-ro,x-gvfs-show 0 0

    Backup

    Back In Time

    Back In Time is an easy-to-use tool to backup files and folders. It runs on GNU/Linux (not on Windows or OS X/macOS) and provides a command line tool backintime and a GUI backintime-qt both written in Python3. It uses rsync to take manual or scheduled snapshots and stores them locally or remotely through SSH. Each snapshot is in its own folder with copies of the original files, but unchanged files are hard-linked between snapshots to save storage space.

    Clonezilla

    Clonezilla is a partition and disk imaging/cloning program similar to True Image® or Norton Ghost®. It helps you to do system deployment, bare metal backup and recovery. Three types of Clonezilla are available, Clonezilla live, Clonezilla lite server, and Clonezilla SE (server edition). Clonezilla live is suitable for single machine backup and restore. While Clonezilla lite server or SE is for massive deployment, it can clone many (40 plus!) computers simultaneously. Clonezilla saves and restores only used blocks in the hard disk. This increases the clone efficiency. With some high-end hardware in a 42-node cluster, a multicast restoring at rate 8 GB/min was reported.


Articles


[View All]

Scripts


[View All]