Home Blog Page 931

Google Chrome to Block SHA-1 Certificates in 2016

Google is pushing for the early removal of support for SHA-1 certificates, now deemed unsafe.

From next year, websites with new SHA-1 certificates will not be supported by Google Chrome in the interest of security. Last September, Google announced plansto slowly sunset support for the SHA-1 algorithm used within online certificates, used to validate websites.

Despite resistance from some certificate authorities (CAs), the tech giant has now joined the likes of Mozilla and Microsoft…

Read more at ZDNet News

Adafruit’s Best Open Source Wearables of 2015

osdc-open-source-yearbook-lead9 copyWearable electronics have exploded in the past year. Countless small devices are now on the market for not only fitness tracking, but posture improvement, sunscreen reminders, muscle-sensing gesture control, and much more. As technology on the body becomes more pervasive than ever, having open source tools for developing wearable technology is more important than ever, so that we can create the future of fashion tech while maintaining data privacy of biometric sensor data.

Adafruit makes open source hardware parts, tutorials, and source code for creating your own DIY electronics projects. Here are our favorite open source wearable products and projects from 2015.

Read more at OpenSource.com

NetApp Steps Up Flash Storage by Acquiring SolidFire

The acquisition immediately puts NetApp on the map in the new-gen storage market.

NetApp might be the No. 2 enterprise storage provider in the world behind only EMC, but even companies high up in the market’s food chain need a spark once in awhile.The Sunnyvale, Calif.-based company may have obtained something along those lines Dec. 21 with the acquisition of solid-state storage maker SolidFire for $870 million in cash.Six-year-old SolidFire makes all-flash storage systems for next-generation data centers…

Read more at eWeek

Introducing Ubuntu Pi Flavour Maker, a Tool to Port Ubuntu Linux for Raspberry Pi 2

pi-flavour-makerWe’ve just been informed by Martin Wimpress, the main developer and leader of Ubuntu MATE, about the general availability of a spin off project from Ubuntu MATE, called Ubuntu Pi Flavour Maker.

As its name might suggest, Ubuntu Pi Flavour Maker is an open source tool, a shell script that lets anyone to port any of the official or unofficial Ubuntu Linux flavors for the Raspberry Pi 2 single-board computer (SBC).

Laying the Groundwork for the Internet of Things: AllSeen Alliance’s Noah Harlan

AllSeen-logoThe Linux Foundation hosts numerous Collaborative Projects — independently funded software projects that harness the power of collaborative development in an effort to drive innovation. For these projects, the Linux Foundation provides the essential collaborative and organizational framework so that participants can focus on innovation and results.

To provide greater insight into these projects, we are talking with key contributors about what they do, what motivates them, and how they got involved. In this feature, we talk with Noah Harlan, co-founder of Two Bulls and board member of AllSeen Alliance, a cross-industry consortium that is dedicated to enabling the interoperability of devices, services, and apps that make up the Internet of Things (IoT).

The AllSeen Alliance, which was formed as a collaborative project in 2013, grew out of Qualcomm’s work with a nascent technology called AllJoyn, a framework that allows devices and apps to discover and communicate with each other. Noah explains, “Qualcomm saw that a future of connected devices was going to stagnate if there wasn’t interoperability between players who were traditional rivals and competitors. Consumers — retail or commercial or industrial — were going to be locked into single product ecosystems and the only way to solve this was through a protocol that no one party held the keys to. Furthermore, the protocol couldn’t be encumbered by patents that would ultimately come to haunt participants. Lastly, the protocol needed adoption and support by major participants in the industry representing different pieces of the puzzle.”

Qualcomm open-sourced AllJoyn and contributed it to the AllSeen Alliance. Now competitors are “working jointly to define protocols that, if the protocol were owned by either party, they would never do,” states Noah. “Everyone will benefit — consumers, developers, OEMs — when the barriers to interoperability are reduced and competitors will compete on their products, not their protocols.”

noahharlanNoah and his long-time friend, James Kane, first became interested in developing around these emerging capabilities in 2008. The following year, they founded Two Bulls, a digital creation studio that, according to Noah, is focused on building great experiences with advanced consumer technologies. Previously, he had not really been involved in any open source projects. “Many of the open source projects I was familiar with were either already very mature or in areas that were more distant tangents to Two Bulls, and my own, areas of interest and expertise. The AllSeen Alliance is a place where it was obvious we could play a vital role in developing something for which the opportunity and demand was large and the community was still young,” Noah says.

As a member of AllSeen Alliance, Two Bulls supports the Alliance’s goals and mission and uses the technology in its work. Personally, says Noah, his largest role and impact is now as an Alliance board member representing the community. He attends the Alliance’s monthly board meetings and has been actively involved in outreach to other projects, including the ULE and EnOcean Alliances. He also helps support Philip Des Autels and his team in explaining the value of AllJoyn and the mission of the Alliance.

Building Infrastructure

When describing the motivation behind his work, Noah quotes the saying that those who ignore the past are condemned to repeat it. He says, “There is a huge body of history that tells us what succeeds, and what fails, when trying to create technological standards. We stand right now looking at a future where the decisions we make today will decide if we are to be condemned to years — even decades — of frustration and pain with interoperability or, if we make smart decisions and work together well, we can avoid that and lay the groundwork for innovation and a successful marketplace of products and ideas.”

He compares the work to other major infrastructure efforts, such as the laying of the railroad, the interstate highway system, or telephone lines, saying, “frameworks for transport (be it physical or electronic) are what have driven our economy and our society forward. We have a new category of transportation that is needed and now is the time to build something that works for everyone and will stand the test of time.”

Noah’s father was an engineer at Cornell in the 1950s and worked on a bridge project that is now a key approach to the Holland Tunnel in New York. Noah remembers once while driving into the city, his father pointed to one of the stanchions holding up the bridge and said, “I remember working with the team that laid that there.” Noah says, “I was amazed that decades later it was still there and holding up every car that drove into the tunnel. Being a part of something that will provide infrastructure that will last decades is something very, very special.”

Noah encourages others to be a part of these efforts as well. To those interested in participating the project, he advises, “Simple: get involved. If you’re a developer, download the code and start building. Look for an open issue and fix it. If you’re an OEM, put it in your products or call someone from the community to help you plan and implement adding AllJoyn to your products.”

Currently, the issues and challenges that face the project are “myriad and non-trivial,” Noah says. A major challenge involves simply defining and explaining the benefit of AllJoyn not only to those who use it but also to those who will see the AllJoyn Certified mark and need to understand the value and utility of that claim. According to Noah, the board is “thinking very hard about how to market and merchandise the AllJoyn brand in 2016.”

Despite the challenges, however, the work of building an infrastructure for the future is important and changing rapidly. Noah says, “AllJoyn is just a couple years old; imagine what the next five years has to hold. For us, the hard problem we are trying to solve is that of the infrastructure that underlies innovation. Plugging systems together, providing coordination, configuration, and logic to organize all the devices and services that will be connecting is really challenging and something we’re committed to doing for the benefit of our customers and partners.”

Noah’s enthusiasm for the AllSeen Alliance project is clear as he says, “The Alliance is young and moving very fast. It is thrilling to see this coming together and to know that it will likely be the backbone on which developers and OEMs will be relying in the years to come. It is akin to being around when HTML or USB were being defined. The work we are doing today will leave a lasting imprint on technology for years to come and I, hopefully, will be able to look back and recognize that I was able to contribute and play a role.”

A Leap of Faith — Replacing Ubuntu Server with openSUSE Leap

swap-meerkat-top copyI run a local file and media server, which is a very important part of my digital life — it hosts all of my files. Everything. I have been using an Ubuntu 14.04 server running on a self-assembled PC. But, it’s a big, noisy system and generates too much heat. So, I planned to move to smaller form factor, such as System76’s Meerkat.

Because I was moving to a new hardware, I decided to give openSUSE Leap a shot at running my servers. I have nothing against Ubuntu: I love Ubuntu on servers. But, I wanted to try Leap because this is the distro that runs on my main system.

I was skeptical of investing in Intel-powered Meerkat, but System76 were kind enough to send me a review unit which allowed me to test it. And, after I used it for a while, it had my trust (Figure 1).

Meerkat came with Ubuntu, but I wiped it and installed openSUSE Leap instead. The company made it clear that doing so does not void the warranty. There are two ways of installing Leap on a system — through net-install image or with the regular DVD image. Despite being an Arch Linux user, I faced some issues with net-install and I recommend the DVD image to keep things simple. I downloaded the openSUSE DVD from this page and then created a bootable USB drive using the dd command:

sudo dd if=/path_to_opensuse_iso of=/dev/device_block bs=1M

If you don’t know the device name, plug in the USB drive that you want to use as the installation image and run the lsblk command in the terminal. There you will see the name of the device.

Next, go ahead and install openSUSE on the system in the regular way. You can choose either the Plasma or Gnome desktop environment.

Let’s Get Started

One difference between openSUSE and Ubuntu is that you have to do some extra work on openSUSE to get things right. Once openSUSE is installed and you have booted into your new system, the first thing you need to do is get the network to work.

swap-ethernet
Open YaST and go to Network Settings. If you are using the Ethernet cable (Figure 2), then select the Ethernet Connection, and click on the Edit button. Then, select Dynamic Address (DHCP) option. Click next, and you are all set. 

swap-wireless
If you are using Wireless (Figure 3), then follow the same steps. In this case, after clicking Next, you will see a window showing Wireless Device Settings. Click on the Scan Network button and choose your WiFi from the list. Then, provide the password for the network in the Encryption Key box. Click Next, and you are all set.

While you are still in Network Settings window, go to the Hostnames/DNS tab and change the Hostname to something more friendly (Figure 4).

swap-hostname
Once the network is connected, you should run system update:

sudo zypper up

Because this machine is going to be a server, I am refraining from installing any additional packages or enabling any repositories. To keep it robust and lean, I will install only what I need.

Configure Firewall

The next thing to do is open some ports in the firewall and allow some services that we are going to need. Go to YaST and open Firewall settings (Figure 5). Then, go to Allowed Services and add these services: Samba Client, Samba Server, Secure Shell Server.swap-firewall

If you are going to install the Plex Media Server, then you need to open the port used by Plex — click on the Advanced button and add port 32400 to both TCP and UDP (Figure 6). Click on OK and then Next. Your firewall is all set.swapnil-tcp-udp

Configure SSH and Remote Login

I will be using this system as a headless server so that I can manage it from other devices through SSH. Before you do that, I will also suggest using Zsh shell instead of Bash, because it has better autocompletion than Bash. Open the terminal app and install Zsh, if it’s not already installed (I am also installing nano editor as I prefer it over vi and vim):

sudo zypper install zsh nano
sudo zypper install nano

Then, open the passwd file:

sudo nano /etc/passwd

There, you can change entries for root and your user from Bash to Zsh (Figure 7).

swapnil-zshNow it’s time to get SSH to work. Open the sshd_config file:

sudo nano /etc/sshd_config

You will see that the port 22 is commented out; un-comment it. Because it’s a local server, I don’t care about adding extra layers of security, which I will do on my live server. If you are interested in adding security your local machine, check out this article.

Save and close the file and then restart sshd by running this command:

sudo rcsshd restart

Next, you can ssh into the system from any machine on the local network, which also means that you can now unplug the monitor, keyboard, and the mouse and use it as headless server. You will need the IP address of this machine so that you can manage it remotely. To find the IP address of your Leap machine, run this command:

sudo ifconfig

swap-ip-address
Take note of the IP address for the connected network (Figure 8). As you can see in the screenshot, my Meerkat system is connected via Ethernet and the system IP is:

inet addr: 10.0.0.217

If you want to ssh into the system from a remote machine, run the following command:

ssh user_name@system_IP>

Example:

ssh 
 This e-mail address is being protected from spambots. You need JavaScript enabled to view it
 

Provide it with the user password, and now you can manage your system remotely.

Mount Hard Drives

Because am using Meerkat, which doesn’t have space for more than one 2.5” SSD, I have to use external drives connected via 3.0 USB. First of all, I need the universally unique identifiers (UUIDs) for hardware that I wanted to mount. Run the blkid command as root and note the UUID for the devices.

Here is the output of blkid on my system:

[root@leapoffaith]# blkid
/dev/sda2: UUID="5ef7869b-ec30-450b-ba2a-78ba83f5e8d9" TYPE="ext4" PARTUUID="40fd9e79-301e-4aa6-a5f0-3ab29e09db63"
/dev/sdb1: LABEL="drive1" UUID="a40e4d9b-6032-48df-883c-6112297f531c" TYPE="ext4" PARTUUID="000b8c27-01"
/dev/sdc1: LABEL="drive2" UUID="1d766512-0daa-47c1-999c-3bacbd2e9432" TYPE="ext4" PARTLABEL="primary" PARTUUID="b2ffa5c5-9497-4fb6-aadd-29efc49eb576"
/dev/sdd1: LABEL="Internal" UUID="1d17fde4-0448-4529-b27f-e0ecdb629dce" TYPE="ext4" PARTUUID="000e2f6d-01"

Here I am going to mount two partitions: drive1 and drive2, so I noted their UUID. Next, you have to create mount points for these devices using the following command:

mkdir -p /media/device_name

The device name should be a simple name in lowercase. Create unique mount point of each device that you are going to mount. In my case, I used:

mkdir -p /media/drive1
mkdir -p /media/drive2

Next, mount the drive with this command:

mount /dev/sdb1 /media/drive1
mount /dev/sdc1 /media/drive2

Here /dev/sdb1 is the block device — from the blkid command — and mount point is unique for each device. Repeat the procedure for every drive that you want to mount.

To make this persistent between reboots, edit the fstab file and add an entry for each device using UUID. This is how entries looked on my fstab file. Just keep in mind that these are ext4 filesystems, if you are using NTFS or another filesystem, please change it accordingly.

UUID=a40e4d9b-6032-48df-883c-6112297f531c       /media/drive1        ext4    defaults,noatime        0       2
UUID=1d766512-0daa-47c1-999c-3bacbd2e9432       /media/drive2        ext4    defaults,noatime        0       2

Create a File Server with Samba

There are many ways to set up a file server; you can use NFS or Samba. I prefer Samba because it allows me to access my files from any device, whether it’s a Windows system, Mac OS X machine, iOS device, Chromebook, or Android device. It’s also much easier to set up.

Now it’s time to set up Samba share to make these drives — or directories on these drives — available over the network. You need to create a Samba group in openSUSE and add the user to that group (you can create more users if you want to restrict access to certain directories).

sudo groupadd smbgroup
sudo usermod -a -G smbgroup name_of_user
sudo smbpasswd -a name_of_user

Next, edit the Samba configuration files to tell Samba which directories are shared.

sudo nano /etc/samba/smb.conf

In this file, leave the entire [global] section intact and comment everything below it. Right after the end of the [global] section, add a few lines using the following pattern:

[Drive 1] -> The name of the shared directory
path = /media/drive1/ -> The path of the shared directory
read only = No -> Ensures that it's not read only
browsable = yes -> Ensures that the subfolder of the directory are browsable
writeable = yes -> Ensures that user can write to it from networked device
valid users = swapnil -> The system user

In my case, it looks something like this:

[Drive 1]
path = /media/drive1/
read only = No
browsable = yes
writeable = yes
valid users = swapnil

Add a new section for each directory that you want to share over the network. If you share your file server with other users and want to restrict access, then you can create entries for those users and provide a path to the directories that these user can access. 

Our file server has been successfully created. Now it’s time to set up private Netflix — aka the Plex Media Server.

Plex Media Server

Unfortunately, Plex Media Server is not available through OBS or the main repositories of openSUSE, so visit the download page of Plex and grab the .rpm files for either Fedora or CentOS. Then, install the .rpm file from the command line:

sudo zypper install PATH_TO_PLEX.rpm

Once installed, open the terminal and configure Plex to start automatically when the system boots up:

sudo systemctl start plexmediaserver.service
sudo systemctl enable plexmediaserver.service

Next, open the web browser and visit this address, if you are on the same machine:

localhost:32400/web/index.html

If you are working from a different machine, via ssh then replace localhost with the machine IP of your openSUSE server. In my case, it was 10.0.0.217, so I will use this address:

10.0.0.217:32400/web/index.html

You will see the Plex Media Server interface (Figure 9). Click on the + button to add Libraries, such as movies, music, images, etc. Remember to use the correct library type for your media type, meaning you need to create a Movies/Home Videos library for videos, Music library for audio, Photo library for images, and so on.

swap-plex
Once the library is created, browse the directory where the media is saved. Plex will scan all the files stored in those directories.

That’s all; your Plex Media Server is all set up. If you want to access Plex from outside your local network, you can subscribe to the Plex Pass service.

Conclusion

I have been running openSUSE Leap on my Meerkat for more than a week now and have not faced any issue other than being stuck at boot because I made a mistake in the fstab file. I must admit that openSUSE does need a bit more work than Ubuntu server, but I am taking a leap of faith, and that’s what Linux is all about. Isn’t it?

How to convert packages between .deb and .rpm

Unfortunately, and after years of development in every part of the free software that we enjoy, there are still two primary types of software package available in GNU/Linux systems. The one is the .deb type which is used by Debian and Debian-based distributions like Ubuntu, Mint, and Elementary, and the other is the .rpm type which is used by Fedora, openSUSE, Mageia, and CentOS. Fortunately, there’s a workaround for this as we can try to transform the one type to the other.

Read more at HowtoForge

Consider This Operational Challenge Before Implementing Containers

containerContainers allow for rapid deployment of applications. Keith Townsend highlights monitoring as an operational challenge to consider prior to deployment.

The desire to quickly take a concept from the idea phase to the product phase has driven the adoption of cloud-native development tools. The container trend is an example of a technology that allows for fast development.

With a platform such as Docker, a developer deploys the same Docker image on their laptop to a production host. What’s the impact of containers and microservices on managing production applications? Can organizations leverage their same tools, or is a new approach required?

Read more at TechRepublic

Android on the Desktop: Not Really “Good,” But Better Than You’d Think

android-desktop-980x653Android is the most popular mobile OS on the planet, and Google has brought the OS to carswatches, and televisions. And, according to a report from The Wall Street JournalGoogle will soon be bringing Android to yet another form factor: desktop and laptop computers.

Re-architecting Android for a mouse and keyboard is going to require major changes to the smartphone operating system, but Android is actually much farther along that path today than most people realize.

Read more at Ars Technica

Linux: Use smartctl To Check Disk Behind Adaptec RAID Controllers

I can use the “smartctl -d ata -a /dev/sdb” command to read hard disk health status directly connected to my system. But, how do I read smartctl command to check SAS or SCSI disk behind Adaptec RAID controller from the shell prompt on Linux operating system?

Read more…