Afficher/masquer le menu
Liens Ecyseo
  • Tags cloud
  • Daily
  • Pictures wall
  • Search
  • Display options
    • Links per page :
    • 20 links
    • 50 links
    • 100 links
  • RSS Feed
  • Login

J'ai besoin d'intimité. Non pas parce que mes actions sont douteuses, mais parce que votre jugement et vos intentions le sont.

5167 links 

page 7 / 9

Liste des liens

170 results tagged Raspberry x
Installation d’une solution DNS locale antipub et gérant DoH
2019-10-6 22:55 - permalink -

Le but de ce tutoriel est de créer un environnement DNS pour votre réseau local, vous permettant de supprimer la publicité à l’aide de PiHole, de disposer de votre propre serveur DoH afin de ne pas envoyer vos données à CloudFlare et d’un système de supervision de vos services DNS.

dns Doh PiHole Raspberry vie-privée
- https://git.hostux.net/valere/DNS_at_Home/
RetroPie Docs
2019-09-2 0:50 - permalink -

La documentation pour une retropie

arcade emulation jeux_vidéo Raspberry Retropie
- https://retropie.org.uk/docs/
Pi 4×4 : Une tablette tout-terrain pour la recherche
2019-08-30 16:51 - permalink -

Une tablette à base de Raspberry.

Raspberry
- http://www.pi4x4.cnrs.fr/
Touchscreen Internet Radio, Raspberry: 8 Steps (with Pictures)
2019-08-27 2:1 - permalink -
bricolage Musique Raspberry
- https://www.instructables.com/id/Touchscreen-Internet-Radio-Raspberry/
Changer un mot de passe oublié sur Raspberry Pi en 5 étapes
2019-08-22 20:31 - permalink -

Pour utiliser le clavier AZERTY, il suffit de taper : loadkeys fr après avoir monté la racine

C'est bon à savoir. Par contre, mon problème de /bin/sh : 0 can’t access tty n'est pas résolu...

Raspberry retrogaming
- https://raspberry-pi.fr/changer-mot-passe-oublie-raspberry-pi/#comment-57127
Pi Projector from MickMake on Tindie
2019-07-29 2:56 - permalink -

Pour fabriquer un projecteur à base de RPI

DIY projecteur Raspberry
- https://www.tindie.com/products/mickmake/pi-projector/
Tbao T15 Moniteur d'Ecran Tactile Portable IPS Full HD de 15,6 pouces | Gearbest France
2019-07-28 2:27 - permalink -

En le couplant à un RPI, on a une tablette pour pas cher...

portable Raspberry écran
- https://fr.gearbest.com/desktop-computer---monitor/pp_009619288025.html?wid=1433363&lkid=40342170
Un Raspberry Pi comme machine de bureau. - Liens en vrac de sebsauvage
2019-07-1 21:57 - permalink -

Oui. Triste constat.
J'espère que l'on pourra choisir le navigateur que l'on veut sur la version 4 du Rpi (Firefox normal en l’occurrence).

Raspberry
- https://sebsauvage.net/links/?znTFrA
Installing operating system images on Linux - Raspberry Pi Documentation
2019-06-28 1:43 - permalink -

En alternative à Etcher qui envoie des données à Google et autres lors de son utilisation.

Installing operating system images on Linux

Etcher is typically the easiest option for most users to write images to SD cards, so it is a good place to start. If you're looking for more advanced options on Linux, you can use the standard command line tools below.

Note: use of the dd tool can overwrite any partition of your machine. If you specify the wrong device in the instructions below, you could delete your primary Linux partition. Please be careful.

Discovering the SD card mountpoint and unmounting it

  • Run lsblk to see which devices are currently connected to your machine.

  • If your computer has a slot for SD cards, insert the card. If not, insert the card into an SD card reader, then connect the reader to your computer.

  • Run lsblk again. The new device that has appeared is your SD card (you can also usually tell from the listed device size). The naming of the device will follow the format described in the next paragraph.

  • The left column of the results from the lsblk command gives the device name of your SD card and the names of any paritions on it (usually only one, but there may be several if the card was previously used). It will be listed as something like /dev/mmcblk0 or /dev/sdX (with partition names /dev/mmcblk0p1 or /dev/sdX1 respectively), where X is a lower-case letter indicating the device (eg. /dev/sdb1). The right column shows where the partitions have been mounted (if they haven't been, it will be blank).

  • If any partitions on the SD card have been mounted, unmount them all with umount, for example umount /dev/sdX1 (replace sdX1 with your SD card's device name, and change the number for any other partitions).

Copying the image to the SD card

  • In a terminal window, write the image to the card with the command below, making sure you replace the input file if= argument with the path to your .img file, and the /dev/sdX in the output file of= argument with the correct device name. This is very important, as you will lose all the data on the hard drive if you provide the wrong device name. Make sure the device name is the name of the whole SD card as described above, not just a partition. For example: sdd, not sdds1 or sddp1; mmcblk0, not mmcblk0p1.
    dd bs=4M if=2018-11-13-raspbian-stretch.img of=/dev/sdX conv=fsync
  • Please note that block size set to 4M will work most of the time. If not, try 1M, although this will take considerably longer.
  • Also note that if you are not logged in as root you will need to prefix this with sudo.

Copying a zipped image to the SD card

In Linux it is possible to combine the unzip and SD copying process into one command, which avoids any issues that might occur when the unzipped image is larger than 4GB. This can happen on certain filesystems that do not support files larger than 4GB (e.g. FAT), although it should be noted that most Linux installations do not use FAT and therefore do not have this limitation.

The following command unzips the zip file (replace 2018-11-13-raspbian-stretch.zip with the appropriate zip filename), and pipes the output directly to the dd command. This in turn copies it to the SD card, as described in the previous section.

+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
ATTENTION NE PAS OUBLIER L'OPTION -p POUR TRANSFÉRER LES FICHIERS, SANS LES CONVERTIR, AU PIPE (stdout)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

unzip -p 2018-11-13-raspbian-stretch.zip | sudo dd of=/dev/sdX bs=4M conv=fsync

Checking the image copy progress

  • By default, the dd command does not give any information about its progress, so it may appear to have frozen. It can take more than five minutes to finish writing to the card. If your card reader has an LED, it may blink during the write process.
  • To see the progress of the copy operation, you can run the dd command with the status option.
    dd bs=4M if=2018-11-13-raspbian-stretch.img of=/dev/sdX status=progress conv=fsync
  • If you are using an older version of dd, the status option may not be available. You may be able to use the dcfldd command instead, which will give a progress report showing how much has been written. Another method is to send a USR1 signal to dd, which will let it print status information. Find out the PID of dd by using pgrep -l dd or ps a | grep dd. Then use kill -USR1 PID to send the USR1 signal to dd.

Optional: checking whether the image was correctly written to the SD card

  • After dd has finished copying, you can check what has been written to the SD card by dd-ing from the card back to another image on your hard disk, truncating the new image to the same size as the original, and then running diff (or md5sum) on those two images.

  • If the SD card is much larger than the image, you don't want to read back the whole SD card, since it will be mostly empty. So you need to check the number of blocks that were written to the card by the dd command. At the end of its run, dd will have displayed the number of blocks written as follow:

    xxx+0 records in
    yyy+0 records out
    yyyyyyyyyy bytes (yyy kB, yyy KiB) copied, 0.00144744 s, 283 MB/s

    We need the number xxx, which is the block count. We can ignore the yyy numbers.

  • Copy the SD card content to an image on your hard drive using dd again:
    dd bs=4M if=/dev/sdX of=from-sd-card.img count=xxx

    if is the input file (i.e. the SD card device), of is the output file to which the SD card content is to be copied (called from-sd-card.img in this example), and xxx is the number of blocks written by the original dd operation.

  • In case the SD card image is still larger than the original image, truncate the new image to the size of the original image using the following command (replace the input file reference argument with the original image name):
    truncate --reference 2018-11-13-raspbian-stretch.img from-sd-card.img
  • Compare the two images: diff should report that the files are identical.
    diff -s from-sd-card.img 2018-11-13-raspbian-stretch.img
  • Run sync. This will ensure that the write cache is flushed and that it is safe to unmount your SD card.
  • Remove the SD card from the card reader.
carte-sd dd flash formatage Raspberry
- https://www.raspberrypi.org/documentation/installation/installing-images/linux.md
[Résolu] Carte micro sd "protégée en écriture" / Autres types de matériel / Forum Ubuntu-fr.org
2019-06-21 1:8 - permalink -

Dans le cas où ça résiste à ce point, tu peux recourir à l'écrasement physique qui devrait tout effacer sans état d'âme :

sudo dd if=/dev/zero of=/dev/sdg count=64

En prenant bien garde de ne pas te gourer de sens...
Après ça, tu débranches / rebranche la carte et tu devrais pouvoir refaire le partitionnement avec Gparted, en commençant par une nouvelle table de partitions MSDOS.

carte-sd Linux partionnement Raspberry
- https://forum.ubuntu-fr.org/viewtopic.php?id=1992634
Meet MODEP - MOD DUO Emulator for Raspberry Pi
2019-06-20 11:36 - permalink -

MODEP is an open-source, MOD DUO emulator that lets you play around with hundreds of LV2 audio plugins ranging from a simple reverb to a complex FM synth using your Raspberry Pi and Pisound or any other Raspberry Pi supported sound card!

Musique Raspberry
- https://blokas.io/modep/
Securing your Raspberry Pi - Raspberry Pi Documentation
2019-06-19 2:48 - permalink -

Securing your Raspberry Pi

The security of your Raspberry Pi is important. Gaps in security leave your Raspberry Pi open to hackers who can then use it without your permission.

What level of security you need depends on how you wish to use your Raspberry Pi. For example, if you are simply using your Raspberry Pi on your home network, behind a router with a firewall, then it is already quite secure by default.

However, if you wish to expose your Raspberry Pi directly to the internet, either with a direct connection (unlikely) or by letting certain protocols through your router firewall (e.g. SSH), then you need to make some basic security changes.

Even if you are hidden behind a firewall, it is sensible to take security seriously. This documentation will describe some ways of improving the security of your Raspberry Pi. Please note, though, that it is not exhaustive.

Change your default password

The default username and password is used for every single Raspberry Pi running Raspbian. So, if you can get access to a Raspberry Pi, and these settings have not been changed, you have root access to that Raspberry Pi.

So the first thing to do is change the password. This can be done via the raspi-config application, or from the command line.

sudo raspi-config

Select option 2, and follow the instructions to change the password.

In fact, all raspi-config does is start up the command line passwd application, which you can do from the command line. Simply type in your new password and confirm it.

passwd

Changing your username

You can, of course, make your Raspberry Pi even more secure by also changing your username. All Raspberry Pis come with the default username pi, so changing this will immediately make your Raspberry Pi more secure.

To add a new user, enter:

sudo adduser alice

You will be prompted to create a password for the new user.

The new user will have a home directory at /home/alice/.

To add them to the sudo group to give them sudo permissions:

sudo adduser alice sudo

You can check your permissions are in place (i.e. you can use sudo) by trying the following:

sudo su

If it runs successfully, then you can be sure that the new account is in the sudo group.

Once you have confirmed that the new account is working, you can delete the pi user. Please note, though, that with the current Raspbian distribution, there are some aspects that require the pi user to be present. If you are unsure whether you will be affected by this, then leave the pi user in place. Work is being done to reduce the dependency on the pi user.

To delete the pi user, type the following:

sudo deluser pi

This command will delete the pi user but will leave the /home/pi folder. If necessary, you can use the command below to remove the home folder for the pi user at the same time. Note the data in this folder will be permanently deleted, so make sure any required data is stored elsewhere.

sudo deluser -remove-home pi

Make sudo require a password

Placing sudo in front of a command runs it as a superuser, and by default, that does not need a password. In general, this is not a problem. However, if your Pi is exposed to the internet and somehow becomes exploited (perhaps via a webpage exploit for example), the attacker will be able to change things that require superuser credential, unless you have set sudo to require a password.

To force sudo to require a password, enter:

sudo nano /etc/sudoers.d/010_pi-nopasswd

and change the pi entry (or whichever usernames have superuser rights) to:

pi ALL=(ALL) PASSWD: ALL

Now save the file.

Ensure you have the latest security fixes

This can be as simple as ensuring your version of Raspbian is up-to-date, as an up-to-date distribution contains all the latest security fixes. Full instructions can be found here.

If you are using SSH to connect to your Raspberry Pi, it can be worthwhile to add a cron job that specifically updates the ssh-server. The following command, perhaps as a daily cron job, will ensure you have the latest SSH security fixes promptly, independent of your normal update process. More information on setting up cron can be found here

apt install openssh-server

Improving SSH security

SSH is a common way of accessing a Raspberry Pi remotely. By default, logging in with SSH requires a username/password pair, and there are ways to make this more secure. An even more secure method is to use key based authentication.

Improving username/password security

The most important thing to do is ensure you have a very robust password. If your Raspberry Pi is exposed to the internet, the password needs to be very secure. This will help to avoid dictionary attacks or the like.

You can also allow or deny specific users by altering the sshd configuration.

sudo nano /etc/ssh/sshd_config

Add, edit, or append to the end of the file the following line, which contains the usernames you wish to allow to log in:

AllowUsers edward andrew charles anne

You can also use DenyUsers to specifically stop some usernames from logging in:

DenyUsers harry william

After the change you will need to restart the sshd service using sudo systemctl restart ssh or reboot so the changes take effect.

Using key-based authentication.

Key pairs are two cryptographically secure keys. One is private, and one is public. They can be used to authenticate a client to an SSH server (in this case the Raspberry Pi).

The client generates two keys, which are cryptographically linked to each other. The private key should never be released, but the public key can be freely shared. The SSH server takes a copy of the public key, and, when a link is requested, uses this key to send the client a challenge message, which the client will encrypt using the private key. If the server can use the public key to decrypt this message back to the original challenge message, then the identity of the client can be confirmed.

Generating a key pair in Linux is done using the ssh-keygen command on the client; the keys are stored by default in the .ssh folder in the user's home directory. The private key will be called id_rsa and the associated public key will be called id_rsa.pub. The key will be 2048 bits long: breaking the encryption on a key of that length would take an extremely long time, so it is very secure. You can make longer keys if the situation demands it. Note that you should only do the generation process once: if repeated, it will overwrite any previous generated keys. Anything relying on those old keys will need to be updated to the new keys.

You will be prompted for a passphrase during key generation: this is an extra level of security. For the moment, leave this blank.

The public key now needs to be moved on to the server. This can be done by email, or cut and paste, or file copying. Once on the server it needs to be added to the SSH systems authorised keys. It should be emphasised that the id_rsa file is the private key and SHOULD NOT LEAVE THE CLIENT, whilst the public key file is id_rsa.pub.

Add the new public key to the authorisation file as follows:

cat id_rsa.pub >> ~/.ssh/authorized_keys

Alternatively, you can edit the file sudo nano ~/.ssh/authorized_keys and copy/paste the key in. It is perfectly acceptable to have multiple entries in the authorized_keys file, so SSH can support multiple clients.

Note that the authorized_keys file needs the correct permissions to be read correctly by the ssh system.

sudo chmod 644 ~/.ssh/authorized_keys

Finally, we need to disable password logins, so that all authentication is done by the key pairs.

sudo nano /etc/ssh/sshd_config

There are three lines that need to be changed to no, if they are not set that way already:

ChallengeResponseAuthentication no
PasswordAuthentication no
UsePAM no

Save the file and either restart the ssh system with sudo service ssh reload or reboot.

Install a firewall

There are many firewall solutions available for Linux. Most use the underlying iptables project to provide packet filtering. This project sits over the Linux netfiltering system. iptables is installed by default on Raspbian, but is not set up. Setting it up can be a complicated task, and one project that provides a simpler interface than iptables is ufw, which stands for 'Uncomplicated Fire Wall'. This is the default firewall tool in Ubuntu, and can be easily installed on your Raspberry Pi:

sudo apt install ufw

ufw is a fairly straightforward command line tool, although there are some GUIs available for it. This document will describe a few of the basic command line options. Note that ufw needs to be run with superuser privileges, so all commands are preceded with sudo. It is also possible to use the option --dry-run any ufw commands, which indicates the results of the command without actually making any changes.

To enable the firewall, which will also ensure it starts up on boot, use:

sudo ufw enable

To disable the firewall, and disable start up on boot, use:

sudo ufw disable

Allow a particular port to have access (we have used port 22 in our example):

sudo ufw allow 22

Denying access on a port is also very simple (again, we have used port 22 as an example):

sudo ufw deny 22

You can also specify which service you are allowing or denying on a port. In this example, we are denying tcp on port 22:

sudo ufw deny 22/tcp

You can specify the service even if you do not know which port it uses. This example allows the ssh service access through the firewall:

sudo ufw allow ssh

The status command lists all current settings for the firewall:

sudo ufw status

The rules can be quite complicated, allowing specific IP addresses to be blocked, specifying in which direction traffic is allowed, or limiting the number of attempts to connect, for example to help defeat a Denial of Service (DoS) attack. You can also specify the device rules are to be applied to (e.g. eth0, wlan0). Please refer to the ufw man page (man ufw) for full details, but here are some examples of more sophisticated commands.

Limit login attempts on ssh port using tcp: this denies connection if an IP address has attempted to connect six or more times in the last 30 seconds:

sudo ufw limit ssh/tcp

Deny access to port 30 from IP address 192.168.2.1

sudo ufw deny from 192.168.2.1 port 30

Installing fail2ban

If you are using your Raspberry Pi as some sort of server, for example an ssh or a webserver, your firewall will have deliberate 'holes' in it to let the server traffic through. In these cases, Fail2ban can be useful. Fail2ban, written in Python, is a scanner that examines the log files produced by the Raspberry Pi, and checks them for suspicious activity. It catches things like multiple brute-force attempts to log in, and can inform any installed firewall to stop further login attempts from suspicious IP addresses. It saves you having to manually check log files for intrusion attempts and then update the firewall (via iptables) to prevent them.

Install fail2ban using the following command:

sudo apt install fail2ban

Note that the version of Fail2ban in the repository (v0.8.13) does not support IPv6 networks. If you use IPv6, you will need to install version v0.10 or higher from source. Please see the Fail2ban website for more information on how to do this.

On installation, Fail2ban creates a folder /etc/fail2ban in which there is a configuration file called jail.conf. This needs to be copied to jail.local to enable it. Inside this configuration file are a set of default options, together with options for checking specific services for abnormalities. Do the following to examine/change the rules that are used for ssh:

sudo cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
sudo nano /etc/fail2ban/jail.local

Look for the section on [ssh]. It will look something like this.

[ssh]
enabled  = true
port     = ssh
filter   = sshd
logpath  = /var/log/auth.log
maxretry = 6

As you can see, this section is named ssh, is enabled, examines the ssh port, filters using the /etc/fail2ban/filter.d/sshd.conf parameters, parses the /var/log/auth.log for malicious activity, and allows six retries before the detection threshold is reached. Checking the default section, we can see that the default banning action is:

# Default banning action (e.g. iptables, iptables-new,
# iptables-multiport, shorewall, etc) It is used to define
# action_* variables. Can be overridden globally or per
# section within jail.local file
banaction = iptables-multiport

iptables-multiport means that the Fail2ban system will run the /etc/fail2ban/action.d/iptables-multiport.conf file when the detection threshold is reached. There are a number of different action configuration files that can be used. Multiport bans all access on all ports.

If you want to permanently ban an IP address after three failed attempts, you can change the maxretry value in the [ssh] section, and set the bantime to a negative number:

[ssh]
enabled  = true
port     = ssh
filter   = sshd
logpath  = /var/log/auth.log
maxretry = 3
bantime = -1

There is a good tutorial on some of the internals of Fail2ban here.

Raspberry sécurité
- https://www.raspberrypi.org/documentation/configuration/security.md
Transmission sur OSMC, installer un client Torrent sur votre Raspberry Pi
2019-06-19 2:18 - permalink -
Raspberry torrents
- https://raspbian-france.fr/transmission-osmc-torrent-raspberry-pi/
RPi SD cards - eLinux.org
2019-06-19 2:15 - permalink -

Comparatif de cartes SD pour Raspberry

Raspberry
- https://elinux.org/RPi_SD_cards
Setting up Syncthing for Raspberry Pi | DNAcoil.com
2019-06-18 15:18 - permalink -

Tutoriel d'installation de syncthing sur Raspberry pie.

Raspberry synchronisation
- http://www.dnacoil.com/tools/setting-up-syncthing-for-raspberry-pi/
Picicle Kit from Picicle on Tindie - Liens en vrac de sebsauvage
2019-06-18 11:19 - permalink -

Attention, la batterie n'est pas livrée avec. Il faut se la procurer ailleurs.

console Raspberry
- https://sebsauvage.net/links/?z8Ds4w
installer un VPN avec Yunohost et OpenVPN sous Debian | memo-linux.com
2019-06-17 23:11 - permalink -

À mettre en place

Raspberry vpn yunohost
- https://memo-linux.com/installer-un-vpn-avec-yunohost-et-openvpn-sous-debian/
Gagner en réactivité avec Zram – c'est pas mon blog
2019-06-11 10:31 - permalink -
Raspberry
- https://blog.velh.fr/2016/03/29/gagner-en-reactivite-avec-zram/
💬1 - Screenly - Screenly Tour
2019-06-6 11:9 - permalink -

Un os pour Raspberry Pie pour gérer des affichages sur écrans distants (salle d'attente, magasin...)

Raspberry vidéos web
- https://www.screenly.io/tour/
Comment installer plusieurs OS sur la Raspberry Pi avec BerryBoot.
2019-06-5 16:27 - permalink -
configuration Raspberry tutoriels
- https://raspbian-france.fr/comment-installer-plusieurs-os-sur-la-raspberry-pi-avec-berryboot/
page 7 / 9


Tags


  • shaarli
  • wikipedia

Tags cloud

Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Help/documentation
Affiches "loi aviva" créées par Geoffrey Dorne le 13 Mai, 2020 - Mastodon 1 - Mastodon 2