diff options
author | Stefan Kreutz <mail@skreutz.com> | 2024-05-06 11:16:49 +0200 |
---|---|---|
committer | Stefan Kreutz <mail@skreutz.com> | 2024-05-06 11:16:49 +0200 |
commit | d3dd280d5525c516d0bf13be711a293dbd5c9feb (patch) | |
tree | 7a9f4ae0362d2a0f3bd77dd23948a1fb00d7ec7b | |
parent | b978aa861c290f1b3f4dab5ce5e6768ebd1874ef (diff) | |
download | blog-main.tar |
-rw-r--r-- | lychee.toml | 1 | ||||
-rw-r--r-- | posts/autoinstall-openbsd-on-qemu.md | 4 | ||||
-rw-r--r-- | posts/readable-random-passwords-with-jot.md | 2 | ||||
-rw-r--r-- | posts/unix-domain-socket-forwarding-with-openssh.md | 2 |
4 files changed, 5 insertions, 4 deletions
diff --git a/lychee.toml b/lychee.toml index b80d4e9..d62295f 100644 --- a/lychee.toml +++ b/lychee.toml @@ -2,3 +2,4 @@ exclude_loopback = true exclude_private = true require_https = true format = "Detailed" +max_redirects = 0 diff --git a/posts/autoinstall-openbsd-on-qemu.md b/posts/autoinstall-openbsd-on-qemu.md index 578bd24..8e682c2 100644 --- a/posts/autoinstall-openbsd-on-qemu.md +++ b/posts/autoinstall-openbsd-on-qemu.md @@ -199,10 +199,10 @@ Then, we start a virtual machine --- and thus the unattended installation of Ope -nographic Let's break this last command down. -The `-enable-kvm` option enables the Linux [Kernel-based Virtual Machine (KVM)](https://www.linux-kvm.org/) support. +The `-enable-kvm` option enables the Linux [Kernel-based Virtual Machine (KVM)](https://linux-kvm.org/page/Main_Page) support. The `-smp` option instructs QEMU to simulate a [symmetric multiprocessing (SMP)](https://en.wikipedia.org/w/index.php?title=Symmetric_multiprocessing&oldid=951686602) system. The `-m` option sets the amount of virtual memory. -The `-drive` option attaches the previously created copy-on-write disk image as a [Virtio](https://wiki.libvirt.org/page/Virtio) disk drive. +The `-drive` option attaches the previously created copy-on-write disk image as a [Virtio](https://wiki.libvirt.org/Virtio.html) disk drive. The `-device` option attaches a standard network adapter. The `-netdev` option configures a virtual network `10.0.2.0/24` where `10.0.2.2` and `10.0.2.15` point to the QEMU host and guest respectively. Moreover, we instruct QEMU to (a) run an embedded TFTP server at `10.0.2.1`, (b) redirect port 2222 on the host to port 22 on the guest, and (c) redirect port 80 on the virtual host address `10.0.2.1` to port 8080 on the host. diff --git a/posts/readable-random-passwords-with-jot.md b/posts/readable-random-passwords-with-jot.md index 2a1e220..ddf8840 100644 --- a/posts/readable-random-passwords-with-jot.md +++ b/posts/readable-random-passwords-with-jot.md @@ -9,7 +9,7 @@ Without the context of words, several pairs of characters are almost indistguish Yet, I sometimes need to come up with and write down strong passwords to be deciphered by my future self, or some unlucky other person. That's why I created a small script to generate random passwords specifically intended for handwriting. -I called the script `jotpass` because it wraps the `jot(1)` utility shipped with [OpenBSD](https://man.openbsd.org/OpenBSD-6.9/jot), [NetBSD](https://man.netbsd.org/NetBSD-9.2/jot.1), [FreeBSD](https://www.freebsd.org/cgi/man.cgi?query=jot&apropos=0&sektion=0&manpath=FreeBSD+13.0-RELEASE&arch=default&format=html), and others. +I called the script `jotpass` because it wraps the `jot(1)` utility shipped with [OpenBSD](https://man.openbsd.org/OpenBSD-6.9/jot), [NetBSD](https://man.netbsd.org/NetBSD-9.2/jot.1), [FreeBSD](https://man.freebsd.org/cgi/man.cgi?query=jot&apropos=0&sektion=0&manpath=FreeBSD+13.0-RELEASE&arch=default&format=html), and others. By default, it prints a random sequence of 12 dash-separated groups of four unambiguous ASCII letters and digits each. However, you can change the alphabet, the number and width of groups, and the separator as described in the [man page](/files/jotpass.1-0.1.0.html). For example: diff --git a/posts/unix-domain-socket-forwarding-with-openssh.md b/posts/unix-domain-socket-forwarding-with-openssh.md index f06846b..5902f5a 100644 --- a/posts/unix-domain-socket-forwarding-with-openssh.md +++ b/posts/unix-domain-socket-forwarding-with-openssh.md @@ -153,7 +153,7 @@ You can restrict the socket's file name by forcing a special command instead of Besides, I'm referring to the man pages at the time of writing. [^windows]: - Notably, the OpenSSH version shipped with Windows 10 does not support Unix domain socket forwarding, see [here](https://docs.microsoft.com/en-us/windows-server/administration/openssh/openssh_server_configuration). + Notably, the OpenSSH version shipped with Windows 10 does not support Unix domain socket forwarding, see [here](https://learn.microsoft.com/en-us/windows-server/administration/openssh/openssh_server_configuration). [^unlink]: There is no system call to re-bind an existing Unix domain socket. |