diff options
| author | Pjotr Prins | 2025-06-19 09:19:21 +0200 |
|---|---|---|
| committer | Pjotr Prins | 2025-06-19 09:19:21 +0200 |
| commit | 683f49e30503b860df875df857751624bbfb3cc0 (patch) | |
| tree | f286c255e791cd05291f6578464a1c1a64920668 | |
| parent | 2e8c4c7dbde935c0085f566bfa95810f3739821a (diff) | |
| download | gn-ai-683f49e30503b860df875df857751624bbfb3cc0.tar.gz | |
Hide references to UT services
| -rw-r--r-- | issues/gn-auth/email_verification.gmi | 2 | ||||
| -rw-r--r-- | issues/gn-uploader/guix-build-gn-uploader-error.gmi | 2 | ||||
| -rw-r--r-- | tasks/machine-room.gmi | 2 | ||||
| -rw-r--r-- | topics/deploy/uthsc-vpn-with-free-software.gmi | 8 | ||||
| -rw-r--r-- | topics/deploy/uthsc-vpn.scm | 4 | ||||
| -rw-r--r-- | topics/systems/update-production-checklist.gmi | 22 |
6 files changed, 20 insertions, 20 deletions
diff --git a/issues/gn-auth/email_verification.gmi b/issues/gn-auth/email_verification.gmi index fff3d547..07e2b043 100644 --- a/issues/gn-auth/email_verification.gmi +++ b/issues/gn-auth/email_verification.gmi @@ -12,7 +12,7 @@ When setting up e-mail verification, the following configurations should be set for gn-auth: -SMTP_HOST = "smtp.uthsc.edu" +SMTP_HOST = "smtp.uthsc" SMTP_PORT = 25 (not 587, which is what we first tried) SMTP_TIMEOUT = 200 # seconds diff --git a/issues/gn-uploader/guix-build-gn-uploader-error.gmi b/issues/gn-uploader/guix-build-gn-uploader-error.gmi index 44a5c4b5..aeb63081 100644 --- a/issues/gn-uploader/guix-build-gn-uploader-error.gmi +++ b/issues/gn-uploader/guix-build-gn-uploader-error.gmi @@ -86,7 +86,7 @@ Filesystem Size Used Avail Use% Mounted on so we know that's not a problem. -A similar thing had shown up on space.uthsc.edu. +A similar thing had shown up on our space server. ### More Troubleshooting Efforts diff --git a/tasks/machine-room.gmi b/tasks/machine-room.gmi index 77f7b8e6..d656f2f8 100644 --- a/tasks/machine-room.gmi +++ b/tasks/machine-room.gmi @@ -63,7 +63,7 @@ Security: * [X] describe machines with Rick Stripes * [X] get bacchus back on line * [X] fix www.genenetwork.org and gn2.genenetwork.org https -* [-] get data from summer211.uthsc.edu (access machine room) +* [-] get data from summer211 (access machine room) * [X] VPN access and FoUT * [X] lambda: get fiber working * [X] lambda: add to Octopus HPC diff --git a/topics/deploy/uthsc-vpn-with-free-software.gmi b/topics/deploy/uthsc-vpn-with-free-software.gmi index 95fd1cd7..707a28ad 100644 --- a/topics/deploy/uthsc-vpn-with-free-software.gmi +++ b/topics/deploy/uthsc-vpn-with-free-software.gmi @@ -6,7 +6,7 @@ It is possible to connect to the UTHSC VPN using only free software. For this, y To connect, run openconnect-sso as follows. A browser window will pop up for you to complete the Duo authentication. Once done, you will be connected to the VPN. ``` -$ openconnect-sso --server uthscvpn1.uthsc.edu --authgroup UTHSC +$ openconnect-sso --server vpn-server --authgroup UTHSC ``` Note that openconnect-sso should be run as a regular user, not as root. After passing Duo authentication, openconnect-sso will try to gain root priviliges to set up the network routes. At that point, it will prompt you for your password using sudo. @@ -22,7 +22,7 @@ openconnect, by default, tunnels all your traffic through the VPN. This is not g For example, to connect to the UTHSC VPN but only access the hosts tux01 and tux02e through the VPN, run the following command. ``` -$ openconnect-sso --server uthscvpn1.uthsc.edu --authgroup UTHSC -- --script 'vpn-slice tux01 tux02e' +$ openconnect-sso --server vpn-server --authgroup UTHSC -- --script 'vpn-slice tux01 tux02e' ``` The vpn-slice script looks up the hostnames tux01 and tux02e on the VPN DNS and adds /etc/hosts entries and routes to your system. vpn-slice can also set up more complicated routes. To learn more, read the vpn-slice documentation. @@ -52,7 +52,7 @@ Then, run the openconnect-sso client as usual. ## Misconfigured UTHSC TLS certificate The UTHSC TLS certificate does not validate on some systems. You can work around this by downloading the certificate chain and adding it to your system: -* Navigate with browser to https://uthscvpn1.uthsc.edu/. Inspect the certificate in the browser (lock icon next to search bar) and export .pem file +* Navigate with browser to https://vpn-server/. Inspect the certificate in the browser (lock icon next to search bar) and export .pem file * Move it to /usr/local/share/ca-certificates (with .crt extension) or equivalent * On Debian/Ubuntu update the certificate store with update-ca-certificates You should see @@ -65,7 +65,7 @@ Thanks Niklas. See also However, adding certificates to your system manually is not good security practice. It is better to limit the added certificate to the openconnect process. You can do this using the REQUESTS_CA_BUNDLE environment variable like so: ``` -REQUESTS_CA_BUNDLE=/path/to/uthsc/certificate.pem openconnect-sso --server uthscvpn1.uthsc.edu --authgroup UTHSC +REQUESTS_CA_BUNDLE=/path/to/uthsc/certificate.pem openconnect-sso --server vpn-server --authgroup UTHSC ``` ## Putting it all together using Guix G-expressions diff --git a/topics/deploy/uthsc-vpn.scm b/topics/deploy/uthsc-vpn.scm index 82f67f5b..a4106ec6 100644 --- a/topics/deploy/uthsc-vpn.scm +++ b/topics/deploy/uthsc-vpn.scm @@ -9,7 +9,7 @@ ;; Put in the hosts you are interested in here. (define %hosts (list "octopus01" - "spacex.uthsc.edu")) + "spacex")) (define (ini-file name scm) "Return a file-like object representing INI file with @var{name} and @@ -81,7 +81,7 @@ (setenv "REQUESTS_CA_BUNDLE" #$(local-file "uthsc-certificate.pem")) (invoke #$(file-append openconnect-sso-uthsc "/bin/openconnect-sso") - "--server" "uthscvpn1.uthsc.edu" + "--server" "$vpn-server" ; ask us for end-point or see UT docs "--authgroup" "UTHSC" "--" "--script" (string-join (cons #$(file-append vpn-slice "/bin/vpn-slice") diff --git a/topics/systems/update-production-checklist.gmi b/topics/systems/update-production-checklist.gmi index b17077b5..23bf54c7 100644 --- a/topics/systems/update-production-checklist.gmi +++ b/topics/systems/update-production-checklist.gmi @@ -114,12 +114,12 @@ We use borg for backups. First restore the backup on the PCIe. Also a test for o The swaks package is quite useful to test for a valid receive host: ``` -swaks --to testing-my-server@gmail.com --server smtp.uthsc.edu -=== Trying smtp.uthsc.edu:25... -=== Connected to smtp.uthsc.edu. -<- 220 mailrouter8.uthsc.edu ESMTP NO UCE - -> EHLO tux04.uthsc.edu -<- 250-mailrouter8.uthsc.edu +swaks --to testing-my-server@gmail.com --server smtp.network +=== Trying smtp.network:25... +=== Connected to smtp.network. +<- 220 mailrouter8.network ESMTP NO UCE + -> EHLO tux04.network +<- 250-mailrouter8.network <- 250-PIPELINING <- 250-SIZE 26214400 <- 250-VRFY @@ -129,7 +129,7 @@ swaks --to testing-my-server@gmail.com --server smtp.uthsc.edu <- 250-8BITMIME <- 250-DSN <- 250 SMTPUTF8 - -> MAIL FROM:<root@tux04.uthsc.edu> + -> MAIL FROM:<root@tux04.network> <- 250 2.1.0 Ok -> RCPT TO:<pjotr2020@thebird.nl> <- 250 2.1.5 Ok @@ -137,9 +137,9 @@ swaks --to testing-my-server@gmail.com --server smtp.uthsc.edu <- 354 End data with <CR><LF>.<CR><LF> -> Date: Thu, 06 Mar 2025 08:34:24 +0000 -> To: pjotr2020@thebird.nl - -> From: root@tux04.uthsc.edu + -> From: root@tux04.network -> Subject: test Thu, 06 Mar 2025 08:34:24 +0000 - -> Message-Id: <20250306083424.624509@tux04.uthsc.edu> + -> Message-Id: <20250306083424.624509@tux04.network> -> X-Mailer: swaks v20201014.0 jetmore.org/john/code/swaks/ -> -> This is a test mailing @@ -161,7 +161,7 @@ dc_readhost='' dc_relay_domains='' dc_minimaldns='false' dc_relay_nets='' -dc_smarthost='smtp.uthsc.edu' +dc_smarthost='smtp.network' CFILEMODE='644' dc_use_split_config='false' dc_hide_mailname='false' @@ -172,7 +172,7 @@ dc_localdelivery='maildir_home' And this should work: ``` -swaks --to myemailaddress --from john@uthsc.edu --server localhost +swaks --to myemailaddress --from john@network --server localhost ``` # Backups |
