From 66fcc33282296a4ae002a58f8baa6d092a74269d Mon Sep 17 00:00:00 2001 From: tmferreira-ti <163651394+tmferreira-ti@users.noreply.github.com> Date: Tue, 16 Sep 2025 20:43:33 -0300 Subject: [PATCH] . --- .gitattributes | 2 + Confs/Comandos SSL.txt | 11 ++++ Confs/checkP2.sh | 77 ++++++++++++++++++++++++++++ Confs/checkP2_WEB.sh | 53 +++++++++++++++++++ Confs/srv1/dhcpd.conf | 41 +++++++++++++++ Confs/srv1/dns/db.0.17.172 | 17 ++++++ Confs/srv1/dns/db.fatecseg.edu.br | 24 +++++++++ Confs/srv1/dns/named.conf.local | 15 ++++++ Confs/srv1/dns/named.conf.options | 34 ++++++++++++ Confs/srv1/interfaces | 24 +++++++++ Confs/srv1/isc-dhcp-server | 18 +++++++ Confs/srv1/nftables.conf | 24 +++++++++ Confs/srv1/sysctl.conf | 68 ++++++++++++++++++++++++ Confs/srv2/Apache/fatecseg.conf | 14 +++++ Confs/srv2/Apache/fatecseg_ssl.conf | 27 ++++++++++ Confs/srv2/dns/named.conf.local | 13 +++++ Confs/srv2/dns/named.conf.options | 24 +++++++++ Confs/srv2/interfaces | 14 +++++ Workgroups.png | Bin 0 -> 25592 bytes update_srv1.sh | 36 +++++++++++++ update_srv2.sh | 44 ++++++++++++++++ 21 files changed, 580 insertions(+) create mode 100644 .gitattributes create mode 100644 Confs/Comandos SSL.txt create mode 100644 Confs/checkP2.sh create mode 100644 Confs/checkP2_WEB.sh create mode 100644 Confs/srv1/dhcpd.conf create mode 100644 Confs/srv1/dns/db.0.17.172 create mode 100644 Confs/srv1/dns/db.fatecseg.edu.br create mode 100644 Confs/srv1/dns/named.conf.local create mode 100644 Confs/srv1/dns/named.conf.options create mode 100644 Confs/srv1/interfaces create mode 100644 Confs/srv1/isc-dhcp-server create mode 100644 Confs/srv1/nftables.conf create mode 100644 Confs/srv1/sysctl.conf create mode 100644 Confs/srv2/Apache/fatecseg.conf create mode 100644 Confs/srv2/Apache/fatecseg_ssl.conf create mode 100644 Confs/srv2/dns/named.conf.local create mode 100644 Confs/srv2/dns/named.conf.options create mode 100644 Confs/srv2/interfaces create mode 100644 Workgroups.png create mode 100644 update_srv1.sh create mode 100644 update_srv2.sh diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 0000000..dfe0770 --- /dev/null +++ b/.gitattributes @@ -0,0 +1,2 @@ +# Auto detect text files and perform LF normalization +* text=auto diff --git a/Confs/Comandos SSL.txt b/Confs/Comandos SSL.txt new file mode 100644 index 0000000..6c8c0ef --- /dev/null +++ b/Confs/Comandos SSL.txt @@ -0,0 +1,11 @@ +mkdir -p /etc/apache2/ssl/fatecseg + +openssl req -new -x509 -days 365 -nodes -out /etc/apache2/ssl/fatecseg/apache.csr -keyout /etc/apache2/ssl/fatecseg/apache.key + +ls /etc/apache2/ssl/fatecseg + +wget bit.ly/fatecseg-ssl -O /etc/apache2/sites-available/site.conf + +a2enmod ssl + +systemctl restart apache2 \ No newline at end of file diff --git a/Confs/checkP2.sh b/Confs/checkP2.sh new file mode 100644 index 0000000..3b1d560 --- /dev/null +++ b/Confs/checkP2.sh @@ -0,0 +1,77 @@ +#!/bin/bash + +# Definição de cores para formatação +GREEN="\e[32m" +RED="\e[31m" +CYAN="\e[36m" +YELLOW="\e[33m" +RESET="\e[0m" +BOLD="\e[1m" + +clear +echo -e "${BOLD}${CYAN}####### Script de Diagnóstico de Configuração #######${RESET}" + +read -e -p "Digite os três primeiros octetos do seu IP [192.168.]: " -i "192.168." IP +read -e -p "Digite o seu domínio: " DOMAIN +clear + +echo -e "${BOLD}${CYAN}####### Data de Instalação NS1 #######${RESET}" +echo -e "${YELLOW}$(tune2fs -l /dev/sda1 | grep created | awk '{print $5"/"$4"/"$7" "$6}')${RESET}" +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Configuração de Rede #######${RESET}" +ip -br addr | egrep -v ^lo +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Conectividade com a Máquina Web #######${RESET}" +if ping -c1 "$IP.2" > /dev/null; then + echo -e "${GREEN}Conectividade Ok${RESET}" +else + echo -e "${RED}Conectividade não Ok${RESET}" +fi +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Conectividade com a Internet #######${RESET}" +for server in 8.8.8.8 1.1.1.1; do + if ping -c1 "$server" > /dev/null; then + echo -e "${GREEN}Conectividade $server: Ok${RESET}" + else + echo -e "${RED}Conectividade $server: Não Ok${RESET}" + fi +done +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Configuração DHCP #######${RESET}" +systemctl status isc-dhcp-server --no-pager +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Arquivo de Configuração DHCP #######${RESET}" +cat /etc/dhcp/dhcpd.conf +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Configuração DNS Master #######${RESET}" +for sub in www revista blog; do + if nslookup "$sub.$DOMAIN.com.br" "$IP.1" > /dev/null; then + echo -e "${sub}.${DOMAIN}.com.br: ${GREEN}OK${RESET}" + else + echo -e "${sub}.${DOMAIN}.com.br: ${RED}Não OK${RESET}" + fi +done +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Configuração DNS Slave #######${RESET}" +for sub in www revista blog; do + if nslookup "$sub.$DOMAIN.com.br" "$IP.2" > /dev/null; then + echo -e "${sub}.${DOMAIN}.com.br: ${GREEN}OK${RESET}" + else + echo -e "${sub}.${DOMAIN}.com.br: ${RED}Não OK${RESET}" + fi +done + diff --git a/Confs/checkP2_WEB.sh b/Confs/checkP2_WEB.sh new file mode 100644 index 0000000..d6bc85b --- /dev/null +++ b/Confs/checkP2_WEB.sh @@ -0,0 +1,53 @@ +#!/bin/bash + +# Definição de cores para formatação +GREEN="\e[32m" +RED="\e[31m" +CYAN="\e[36m" +YELLOW="\e[33m" +RESET="\e[0m" +BOLD="\e[1m" + +clear +echo -e "${BOLD}${CYAN}####### Script de Diagnóstico de Configuração #######${RESET}" + +read -e -p "Digite os três primeiros octetos do seu IP [192.168.]: " -i "192.168." IP +#read -e -p "Digite o seu domínio: " DOMAIN +clear + +echo -e "${BOLD}${CYAN}####### Data de Instalação WEB #######${RESET}" +echo -e "${YELLOW}$(tune2fs -l /dev/sda1 | grep created | awk '{print $5"/"$4"/"$7" "$6}')${RESET}" +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Configuração de Rede #######${RESET}" +ip -br addr | egrep -v ^lo +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Conectividade com a Máquina NS1 #######${RESET}" +if ping -c1 "$IP.1" > /dev/null; then + echo -e "${GREEN}Conectividade Ok${RESET}" +else + echo -e "${RED}Conectividade não Ok${RESET}" +fi +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Conectividade com a Internet #######${RESET}" +for server in 8.8.8.8 1.1.1.1; do + if ping -c1 "$server" > /dev/null; then + echo -e "${GREEN}Conectividade $server: Ok${RESET}" + else + echo -e "${RED}Conectividade $server: Não Ok${RESET}" + fi +done +read -p "Pressione para continuar..." + +clear +echo -e "${BOLD}${CYAN}####### Serviço Apache #######${RESET}" +systemctl status apache2 --no-pager +read -p "Pressione para continuar..." +clear + + diff --git a/Confs/srv1/dhcpd.conf b/Confs/srv1/dhcpd.conf new file mode 100644 index 0000000..ae004a9 --- /dev/null +++ b/Confs/srv1/dhcpd.conf @@ -0,0 +1,41 @@ +# Arquivo de configuração do servidor DHCP + +# Desabilita as atualizações dinâmicas de DNS +ddns-update-style none; + +# Define o tempo de concessão padrão (default lease time) para 600 segundos (10 minutos) +default-lease-time 600; + +# Define o tempo máximo de concessão (max lease time) para 7200 segundos (2 horas) +max-lease-time 7200; + +# Define que este servidor DHCP é autoritativo (envia respostas de maneira mais agressiva) +authoritative; + +# Definição da rede (subnet) e máscara de rede +subnet 172.17.0.0 netmask 255.255.255.0 { + + # Define o intervalo de endereços IP que o DHCP pode atribuir aos clientes + range 172.17.0.100 172.17.0.199; + + # Define o endereço IP do roteador (gateway) padrão + option routers 172.17.0.1; + + # Define os servidores DNS que serão atribuídos aos clientes + option domain-name-servers 172.17.0.1, 172.17.0.2; + + # Define o endereço de broadcast para a rede + option broadcast-address 172.17.0.255; + + # Impede que clientes não conhecidos (não listados explicitamente) recebam um IP + #deny unknown-clients; +} + +# Definição de um cliente específico (host) com IP fixo +host PC-01 { +# # Endereço MAC da máquina + hardware ethernet 08:00:27:80:FF:2D; + +# # Endereço IP fixo atribuído ao cliente + fixed-address 172.17.0.150; +} diff --git a/Confs/srv1/dns/db.0.17.172 b/Confs/srv1/dns/db.0.17.172 new file mode 100644 index 0000000..43d6963 --- /dev/null +++ b/Confs/srv1/dns/db.0.17.172 @@ -0,0 +1,17 @@ +$TTL 3600 ; Tempo de vida das respostas fornecidas pelo DNS (cache) +@ IN SOA ns1.fatecseg.edu.br. hostmaster.fatecseg.edu.br. ( + 2024020901 ; Serial para controle de atualizações entre master e slave + 28800 ; Tempo de atualizações entre master e slave (refresh) + 7200 ; Tempo de atualizações caso o refresh falhe + 604800 ; Tempo de expiração do slave caso não contate o master + 7200 ) ; Tempo de vida das respostas negativas do servidor + + NS ns1.fatecseg.edu.br. + +1 PTR ns1.fatecseg.edu.br. +2 PTR ns2.fatecseg.edu.br. +2 PTR www.fatecseg.edu.br. +3 PTR smtp.fatecseg.edu.br. +4 PTR smtp2.fatecseg.edu.br. +5 PTR pop3.fatecseg.edu.br. +6 PTR blog.fatecseg.edu.br. diff --git a/Confs/srv1/dns/db.fatecseg.edu.br b/Confs/srv1/dns/db.fatecseg.edu.br new file mode 100644 index 0000000..4425738 --- /dev/null +++ b/Confs/srv1/dns/db.fatecseg.edu.br @@ -0,0 +1,24 @@ +$TTL 3600 ; Tempo de vida das respostas fornecidas pelo DNS (cache) (1H) +@ IN SOA ns1.fatecseg.edu.br. hostmaster.fatecseg.edu.br. ( + 2024020901 ; Serial para controle de atualizações entre master e slave + 28800 ; Tempo de atualizações entre master e slave (refresh) (8H) + 7200 ; Tempo de atualizações caso o refresh falhe (2H) + 604800 ; Tempo de expiração do slave caso não contate o master (7 dias) + 7200 ) ; Tempo de vida das repostas negativas do servidor (2H) + + NS ns1.fatecseg.edu.br. + NS ns2.fatecseg.edu.br. + IN MX 10 smtp.fatecseg.edu.br. + IN MX 20 smtp2.fatecseg.edu.br. + +fatecseg.edu.br. A 172.17.0.2 +ns1 A 172.17.0.1 +ns2 A 172.17.0.2 +www A 172.17.0.2 +smtp A 172.17.0.3 +smtp2 A 172.17.0.4 +pop3 A 172.17.0.5 +blog A 172.17.0.6 +ftp A 172.17.0.3 +webmail CNAME pop3 +zabbix CNAME www diff --git a/Confs/srv1/dns/named.conf.local b/Confs/srv1/dns/named.conf.local new file mode 100644 index 0000000..d5f1a79 --- /dev/null +++ b/Confs/srv1/dns/named.conf.local @@ -0,0 +1,15 @@ +// DNS +zone "fatecseg.edu.br" IN { + type master; + file "/etc/bind/domains/fatecseg/db.fatecseg.edu.br"; + allow-transfer { 172.17.0.2; }; // Permite a transferência de zona para o IP especificado + also-notify { 172.17.0.2; }; // Notifica este IP sobre alterações na zona +}; + +// DNS Reverso +zone "0.17.172.in-addr.arpa" { + type master; + file "/etc/bind/domains/fatecseg/db.0.17.172"; + allow-transfer { 172.17.0.2; }; // Permite a transferência de zona reversa para o IP especificado + also-notify { 172.17.0.2; }; // Notifica este IP sobre alterações na zona reversa +}; diff --git a/Confs/srv1/dns/named.conf.options b/Confs/srv1/dns/named.conf.options new file mode 100644 index 0000000..dad5a60 --- /dev/null +++ b/Confs/srv1/dns/named.conf.options @@ -0,0 +1,34 @@ +acl "rede_interna" { + 172.17.0.0/24; // Definição de uma ACL (Access Control List) chamada "rede_interna", permitindo o intervalo de IPs 172.17.0.0/24. +}; + +options { + directory "/var/cache/bind"; // Diretório onde o BIND armazena arquivos de cache. + + // If there is a firewall between you and nameservers you want + // to talk to, you may need to fix the firewall to allow multiple + // ports to talk. See http://www.kb.cert.org/vuls/id/800113 + + // If your ISP provided one or more IP addresses for stable + // nameservers, you probably want to use them as forwarders. + // Uncomment the following block, and insert the addresses replacing + // the all-0's placeholder. + + forwarders { // Configuração de servidores de encaminhamento para resolver consultas DNS. + 8.8.8.8; // Google Public DNS (primário). + 8.8.4.4; // Google Public DNS (secundário). + }; + + //======================================================================== + // If BIND logs error messages about the root key being expired, + // you will need to update your keys. See https://www.isc.org/bind-keys + //======================================================================== + + dnssec-validation no; // Desativa a validação DNSSEC. + minimal-responses yes; // Respostas mínimas, enviando apenas os dados necessários na resposta DNS. + version "Empresa FatecSeg"; // Define uma string personalizada para a versão do BIND que será exibida. + allow-query-cache { rede_interna; }; // Permite cache de consultas para a ACL "rede_interna". + allow-query { any; }; // Permite consultas DNS de qualquer origem. + allow-recursion { rede_interna; }; // Permite recursão DNS apenas para a ACL "rede_interna". + listen-on-v6 { any; }; // Escuta requisições em qualquer interface IPv6. +}; diff --git a/Confs/srv1/interfaces b/Confs/srv1/interfaces new file mode 100644 index 0000000..e5b5e95 --- /dev/null +++ b/Confs/srv1/interfaces @@ -0,0 +1,24 @@ +# This file describes the network interfaces available on your system +# and how to activate them. For more information, see interfaces(5). + +source /etc/network/interfaces.d/* + +# The loopback network interface +auto lo +iface lo inet loopback + +auto enp0s8 +iface enp0s8 inet static + address 172.17.0.1 + netmask 255.255.255.0 + network 172.17.0.0 + broadcast 172.17.0.255 + + +auto enp0s3 +iface enp0s3 inet dhcp + + +auto enp0s9 +iface enp0s9 inet static + address 192.168.56.102/24 diff --git a/Confs/srv1/isc-dhcp-server b/Confs/srv1/isc-dhcp-server new file mode 100644 index 0000000..35a4bf9 --- /dev/null +++ b/Confs/srv1/isc-dhcp-server @@ -0,0 +1,18 @@ +# Defaults for isc-dhcp-server (sourced by /etc/init.d/isc-dhcp-server) + +# Path to dhcpd's config file (default: /etc/dhcp/dhcpd.conf). +#DHCPDv4_CONF=/etc/dhcp/dhcpd.conf +#DHCPDv6_CONF=/etc/dhcp/dhcpd6.conf + +# Path to dhcpd's PID file (default: /var/run/dhcpd.pid). +#DHCPDv4_PID=/var/run/dhcpd.pid +#DHCPDv6_PID=/var/run/dhcpd6.pid + +# Additional options to start dhcpd with. +# Don't use options -cf or -pf here; use DHCPD_CONF/ DHCPD_PID instead +#OPTIONS="" + +# On what interfaces should the DHCP server (dhcpd) serve DHCP requests? +# Separate multiple interfaces with spaces, e.g. "eth0 eth1". +INTERFACESv4="enp0s3" +INTERFACESv6="" diff --git a/Confs/srv1/nftables.conf b/Confs/srv1/nftables.conf new file mode 100644 index 0000000..d11dfe0 --- /dev/null +++ b/Confs/srv1/nftables.conf @@ -0,0 +1,24 @@ +table inet filter { + chain input { + type filter hook input priority filter; policy accept; + } + + chain forward { + type filter hook forward priority filter; policy accept; + } + + chain output { + type filter hook output priority filter; policy accept; + } +} +table ip nat { + chain POSTROUTING { + type nat hook postrouting priority srcnat; policy accept; + oifname "enp0s3" counter packets 0 bytes 0 masquerade + } + + chain PREROUTING { + type nat hook prerouting priority dstnat; policy accept; + ip saddr 192.168.56.1 ip daddr 192.168.56.200 tcp dport 10001 counter packets 0 bytes 0 dnat to 172.17.0.2:22 + } +} diff --git a/Confs/srv1/sysctl.conf b/Confs/srv1/sysctl.conf new file mode 100644 index 0000000..1fa03b9 --- /dev/null +++ b/Confs/srv1/sysctl.conf @@ -0,0 +1,68 @@ +# +# /etc/sysctl.conf - Configuration file for setting system variables +# See /etc/sysctl.d/ for additional system variables. +# See sysctl.conf (5) for information. +# + +#kernel.domainname = example.com + +# Uncomment the following to stop low-level messages on console +#kernel.printk = 3 4 1 3 + +################################################################### +# Functions previously found in netbase +# + +# Uncomment the next two lines to enable Spoof protection (reverse-path filter) +# Turn on Source Address Verification in all interfaces to +# prevent some spoofing attacks +#net.ipv4.conf.default.rp_filter=1 +#net.ipv4.conf.all.rp_filter=1 + +# Uncomment the next line to enable TCP/IP SYN cookies +# See http://lwn.net/Articles/277146/ +# Note: This may impact IPv6 TCP sessions too +#net.ipv4.tcp_syncookies=1 + +# Uncomment the next line to enable packet forwarding for IPv4 +net.ipv4.ip_forward=1 + +# Uncomment the next line to enable packet forwarding for IPv6 +# Enabling this option disables Stateless Address Autoconfiguration +# based on Router Advertisements for this host +#net.ipv6.conf.all.forwarding=1 + + +################################################################### +# Additional settings - these settings can improve the network +# security of the host and prevent against some network attacks +# including spoofing attacks and man in the middle attacks through +# redirection. Some network environments, however, require that these +# settings are disabled so review and enable them as needed. +# +# Do not accept ICMP redirects (prevent MITM attacks) +#net.ipv4.conf.all.accept_redirects = 0 +#net.ipv6.conf.all.accept_redirects = 0 +# _or_ +# Accept ICMP redirects only for gateways listed in our default +# gateway list (enabled by default) +# net.ipv4.conf.all.secure_redirects = 1 +# +# Do not send ICMP redirects (we are not a router) +#net.ipv4.conf.all.send_redirects = 0 +# +# Do not accept IP source route packets (we are not a router) +#net.ipv4.conf.all.accept_source_route = 0 +#net.ipv6.conf.all.accept_source_route = 0 +# +# Log Martian Packets +#net.ipv4.conf.all.log_martians = 1 +# + +################################################################### +# Magic system request Key +# 0=disable, 1=enable all, >1 bitmask of sysrq functions +# See https://www.kernel.org/doc/html/latest/admin-guide/sysrq.html +# for what other values do +#kernel.sysrq=438 + diff --git a/Confs/srv2/Apache/fatecseg.conf b/Confs/srv2/Apache/fatecseg.conf new file mode 100644 index 0000000..5da8243 --- /dev/null +++ b/Confs/srv2/Apache/fatecseg.conf @@ -0,0 +1,14 @@ + +ServerAdmin tiago@fatecourinhos.edu.br +ServerName www.fatecseg.edu.br +DocumentRoot /dados/paginas/fatecseg + + + Options -Indexes + AllowOverRide All + Require all granted + + +ErrorLog /var/log/apache2/error-fatecseg.log +CustomLog /var/log/apache2/access-fatecseg.log combined + diff --git a/Confs/srv2/Apache/fatecseg_ssl.conf b/Confs/srv2/Apache/fatecseg_ssl.conf new file mode 100644 index 0000000..e5aedac --- /dev/null +++ b/Confs/srv2/Apache/fatecseg_ssl.conf @@ -0,0 +1,27 @@ + + ServerAdmin webmaster@fatecseg.edu.br + ServerName www.fatecseg.edu.br + ServerAlias fatecseg.edu.br + Redirect permanent / https://www.fatecseg.edu.br/ + + + + ServerAdmin webmaster@fatecseg.edu.br + ServerName www.fatecseg.edu.br + ServerAlias fatecseg.edu.br + DocumentRoot /dados/paginas/fatecseg/ + + + Options -Indexes + AllowOverride All + Require all granted + + + ErrorLog /var/log/apache2/error_fatecseg_ssl.log + LogLevel warn + CustomLog /var/log/apache2/access_fatecseg_ssl.log combined + + SSLEngine on + SSLCertificateFile /etc/apache2/ssl/fatecseg/apache.csr + SSLCertificateKeyFile /etc/apache2/ssl/fatecseg/apache.key + diff --git a/Confs/srv2/dns/named.conf.local b/Confs/srv2/dns/named.conf.local new file mode 100644 index 0000000..c1592df --- /dev/null +++ b/Confs/srv2/dns/named.conf.local @@ -0,0 +1,13 @@ +// DNS +zone "fatecseg.edu.br" IN { + type slave; + file "/var/lib/bind/db.fatecseg.edu.br"; + masters { 172.17.0.1; }; +}; + +// DNS Reverso +zone "0.17.172.in-addr.arpa" { + type slave; + file "/var/lib/bind/db.0.17.172"; + masters { 172.17.0.1; }; +}; \ No newline at end of file diff --git a/Confs/srv2/dns/named.conf.options b/Confs/srv2/dns/named.conf.options new file mode 100644 index 0000000..4778d18 --- /dev/null +++ b/Confs/srv2/dns/named.conf.options @@ -0,0 +1,24 @@ +options { + directory "/var/cache/bind"; + + // If there is a firewall between you and nameservers you want + // to talk to, you may need to fix the firewall to allow multiple + // ports to talk. See http://www.kb.cert.org/vuls/id/800113 + + // If your ISP provided one or more IP addresses for stable + // nameservers, you probably want to use them as forwarders. + // Uncomment the following block, and insert the addresses replacing + // the all-0's placeholder. + + // forwarders { + // 0.0.0.0; + // }; + + //======================================================================== + // If BIND logs error messages about the root key being expired, + // you will need to update your keys. See https://www.isc.org/bind-keys + //======================================================================== + dnssec-validation auto; + + listen-on-v6 { any; }; +}; diff --git a/Confs/srv2/interfaces b/Confs/srv2/interfaces new file mode 100644 index 0000000..42cdcd7 --- /dev/null +++ b/Confs/srv2/interfaces @@ -0,0 +1,14 @@ +# This file describes the network interfaces available on your system +# and how to activate them. For more information, see interfaces(5). + +source /etc/network/interfaces.d/* + +# The loopback network interface +auto lo +iface lo inet loopback + +auto enp0s3 +iface enp0s3 inet static + address 172.17.0.2 + netmask 255.255.255.0 + gateway 172.17.0.1 diff --git a/Workgroups.png b/Workgroups.png new file mode 100644 index 0000000000000000000000000000000000000000..e796325774318995195fd66a03d2c76893fbd865 GIT binary patch literal 25592 zcmeFY1z1(xwm%G;O(R{>-Q6IuX^<3<66x;l?nXdDMWjI_RZ2RQ?hXl&E=kF6ZH4!| z_ndprjqk>}|L6K3tTl7YF@IysF~=AyN>y3*9tsf(3=GUYc{wRH7#P?g;CUJe0r>rl z*2ow51M8wDD*;nBK(YY?L(S?ct?g>(X>Mg}21Cm&`TL2Mi^I~v#g&#@ik6GZ$kCC_ z)XK=h*~rd?&ECuvC<5w@EX?e08z?z=TiMzg(Q?V~vT*=a3|dz9rVbu1z@xGT@QafJ zDCU*`o`4EIp5Kq2d_0UmiMXSqt(lgYv4Ryat_&|XKN~k6P|Tnpr=g@s%Owds+gjO} z0e@u8Ol%yWT_i1?9qfP-8BQ)fHel#qbE+Ge8#!D3c?cC%HE0`7uDdo+s@=_;U924J ze=m%ShmD^NmDTT(sQMv>f6l7keXs znqQn!rIqBS73Z|DvNvMA9mUG@ca^oa@?$GmYiTba4y(q5~-L`dz}$E%2LG3+KCeZl{G7s9Sm8t?0I&g`1VBnak~H zzk9kmIM}*cIsVf^69;>HGn3ohy&ciW*%`W}zt(wMWbR;lySm!~M*tN6qy@A<{cku6 zE!DCzb+!E6R)CBDH!aX|IWsE@%e$F5`2>I0*csh5zFmonr4fLz-~E3T{dseK^YMvqd>Ne4SeH&=iy&cHHmNpNxXxP`-|4?Q2;S+( zKk36el>S*C-gW!O(TBW$1HpfCINu`l{{Z>#2c)f$<8K4yzXOn*clP!zAh~#Mb>zPS z$bY;8n)B8k{L=~jH%igW-c%fF;{!I)twHrC%gx!r&EC`uYVAW!Ho*3B_R@yFunF+q zz3cpX|Kn8(YUTXVSPII*Ki*W$oUH(3=-2J)SD~ks>+j*9R-zg31|96~`7a{@6@M8B zc=_vbey_>Q^lxqeoN`?F8*_h?%zVfUkFikumUdce^{d2cbfJV z=scXaK);*mH@j|o{oAa}-;@1|Q}W!&((RPocb4wml)pLuADEIG@EHK+?H|1U`<%IL z{maVz*INGDjA72dwTAz5WbHpe(EbMm|l0P=>pIn0OgyDZsK=^Kt^joxY z-o4+U^*>)gxb9YcJ0%zYEeUs1{_ho#zqQcS&79q>etRxVp}szGXD2r+cL$fh5uE?? zV%YrQI{Uj`3>Sc-zx*-3S@>V;$>6!e<{ehKZn65WoN{;e)g7e&=RFymJh%M%i(l<; zF!&!bl>T=rZ_Zz$`hVK{&&JH(K0{5rzp|+QAJ*QtqWzzJmH1`tL+=$j(3=9=f9M|Z zTU7sB?f?I%5BOivjCY6sf0O-xXU^Q2H+T1eJH`B;Z{G0S>HfPZdH^&{3kg64G8}u7R^7HzUI7@x_{MS^Z&+uRNyvk;m+XZ_^)@^{Ix{<11s!bPMv=t z?tkYV`b&nzpUvA}wRfo64&t5-+7Act1&(PS?sq zrp|CFK*tf-e#+1~7)neha3qA<9;Eh*4p@nnSR~A#m&4Y1+_$|uuqZ%rwa9X}l)`dT zLBQ5B?-B=q&d~9(WP#b1=_ufDDea4djNw>Xb0gSe- z^5f1}nf~A+N`Opl1X%B8?XKr==rq>I8s$N~iR7MLYpkW|Zo)zZ_u`U(JwT8MTwovO z6gztVLEkcr75h;ZoNVX&@HYVy0(K_?U&#E)kQBAsVA&mBZiYqdIvWSEBGY`S*hP5; zk)S}q%sN%TCA<#yty=t{7}EfATz9m1J>45w7XJ;!z=PFZ9$m9 z7>BMuuzuqT8*elaNdqoucdiLJL%Gn3PR_}RlP2HPGJ3?}rFc?KXkZW~QaEJe%9uj( z{1NRYGLNcyHexhRL)GJp?s>=sTJ?2D6iyT*1U_*F2Lww&fny1y)KProkBnRSWg@{F zG+%RI=Xm0NUL~PuOBI{$PO9YCEcXZ=!0I#P=L_r;nW&FcvaC;eQhc($1?gTWi04v+ zgQY2^X!UfLP$oc2R^(M+@3ob^wF6~Y5iCnjI-+9@qR6#jYEbFp$0JK2)B_(hQ)wYq^us*0bn&S76!}GwGW<3 zm1<}`eS_zr1O*hU;aJ;9?$Y3gV4~Iy*{3+538_G&v6t@0BzQnypuH;*EhVN50P=Pu zcW^xwFiG6vQEnMBtPK>%%Jo!~2sw45t6yM!=F&V#M;PFfGXp3A#! z9h;6)Rpgk{(Z_e21R|OM*{Y9|!5yK}u$K*x-e%tY;?q5Slp7`hnk@z~1St z$q7CmmT&kf^q}Jy+{b`E0rUaTx~z@^GiYLRvc1yeGtWH+c6N+#G~{*PqyqnMGKI>o zgTH?_ZwXLWQ={PK#^K`P8c4d&6QsuRGizH4*aL|cR1jCt$VI2#XgdmcW_lXAs;X+y zRcL;Zo{p~VOCmKT9bLg2aaYQr5X2LRi3#<$Z{HyH_GMZz>O$Nuepqr(Bq)-Q7@&Ab z{3vDUhar`P9zo4vL{=rz&CFl~$0Nh`!1rulhZhAEm6DlRApn$e=u?oNAH}j$svQI& z|M@eOc7 z72Gagxog@ea|#OR1YFmLbiT&tX;)p;VHU+<(peLW zoZ2i2xAWyTF+tauhOtj6u+~yw_DQZiZU!gmdc=lucdm@TLs&H_hE7i06Cw4VKFz5U zU|{3n;zA@OKv+f1>>t#?$)Y;Coib`4 z;rELTMM0=<;w)`!aI_vD7zjf`-@V(|*sx$M=*71Gcq3sN>qiRX4}xi@rMi0htq{fv zf<%Y|+cm`!C4fphqWAqRBUTZo-I@wBvuDf)DKZ0`C)MM;K zx+OBk&rW+_W3*xgB<=e^cQ zz=0g~u0xsH11|68BIzFO<4DNknGm|#hgmRzoSIBn8wgQy%^F`{T4RI0iwAOsXY1}W zpI1a=d5 z`38{WaU>uQK(UoP@J{}~K3V9}j$BAHJ15%7f{U>ON^ve1Q>{}(Jj=}!q9Q`aG6Kz9 zt9S!Phe;hDn1vW6e+T;wzu?5D_saFOKE;cY8;mE$dtNY>j){Z;j42H7bp42Gz^?T~ zc`wZnD^}45AgR{o#bPd7LwAfT`f?HiEXUMmr@0sFjiSef?gRMhbMyWZs&AP(=q-Nq ztxh3k$y~RnnRs4viR=P|b9@v_Vn8r`mP_==6H+CU?~Nr5)4szPsovCHr^24Uew9Oz zw3H$V5WWYYuVt_NAwuNiJ2$jO-td0G;53Nn3+vY`%J+mO@Ysn950_xCbl!+2@PK+8 zeWDi;XPh640M3Yl>h0@o+RO=SKsL=8dMx4PPxgbZ`~40ynS$uNBH z^)}?|Ag5C|hgVmEMBy`;?k6|bBuB1iUmtPDBR&Mr434RJLgvU>bM^y?n&HP3xk1)# zJ68B*Ih0sMD9_NeX;ne}EW!lg@t=^YOME6ca$oqa!a3UReIBa#dPC_H`*l;qhgsBv^{^QtJE}F0-D2a07}@37GB|LSlMz}oRc;n* z*!#iWhw3)TNuRt`_O34N&|!ykw*gX}XKLVsoES+kX!};rL)YvGnYl}(G4)<&^z-?7 zO=qwg?P!}>;F77*s%j|VfOG+RH|5Nz0oa0j497u~st7Qn<|1f5VgWe1#HU2&G#i4s zFi}@A<6?+(wFqMh+(9{G_4wu9GaK8Dc%Eb-h0Lh!K8)I)@oCpWhnyzSvcc~@+b8(d zF%Rfq&33x;l27v;bu6)Bz7jy%=JYgEYo9B9Dm{8yk2yW!%Sa<2gkgwiutkrk)XE)w%!6YV*q16bDZsh{ zyALB(y2C}@TrZT8Bw7DhG+KJ3IjrDwC~o<{spSeB)mWH&AKm_mi7)7>s*Yb;?}n%M zY=pwHcl}Hodgh#wtprnS^LD2Gf_-y<*YsRImO4#fJfpB7jG?sGj4oRdcO3_U9=A-Zu^Q$pNs7mF5Oni0{^hUmmL(d?5Q)Ws~2~ zPcD2<{;i;@^U_T%;b$e@P5&Z#1Y9zXDIKGolWde43xqMi+|_691{YUP+TCb_=6Cw7 z-$j(_`#RGp)^6L6UrC2T9DJOmqZ=iQM5<2>1dn;i>r#{k7+^AM-f4jM+Zl35rf#6g-tB9HF2%=D>_ zpM2lXU%mI2LUQ&0S#P8KM%edYH=y}tmL{x2W^TDvFmX%O8zWzvubrc_^Yu&jECu!9 zOq$NG%ASkEle3mLeBazxXtV=FCfa3c**nl)g<9BVGk@yPw!c=qcX z1vDCkX#Tu z^YhZ>hfAVpr^MWK^a+Q9WMeiO#F~(*fI2FeU`CmX_?+uNfb; zfh`_)3M*pU&PXi5D%l7u9-GA<}dT^^BWvF zG?&Wz_!;j@@@Jcl-Ng06es8cIn`}9S!2EPG+ES1VN|xnrS{s~h?|CA6jRh-@6;HMV z46+8}E4ba0iLS;Er@rS8UR}=N<6y{JrR(y&m(~w@UPXA7vR9|Z9Z_yXa+;&|A(DMb z2ESl^_jMcG%h_ugZ9JvNc!%#1 zM`*WwvJw%(&k1se^qBKix1OEIeWllnjR_oX+qqA`IMP>y^juU^1Xs_oqi9k~*eSXE z!;~?$O!NMSUcYc!DiH5xENX~80BJM|#Nn{S_8oXm7Hgs~q~~m9O|#Q(=V`A*J$1hd zlu~y5n0x0xLQMSTGC4oS{HNl5NidNFT)H$5aCXG!=WxztIt|e)NrbgrMte;1jr%#R zw%WbxWW!c-p`hd2u9Lh(SMdtTwOnTTLd0kG^l>Mz)|s^&c#~jc{Vik(mfB*=@?H&r zV8`1vM@q-1olh!5D4R?MEdnZfr?n)o4)qca7)+2B-BObd9bEY&Jw|5nCQrSSRlvoF zoA^oMOR()WeU|7o1p0YzYvd>^vVJtayKlk_>|e%d8Xb$8kTR| z)4Bn&Fr+a#eC}s#v7CT#N%%Kd7^vRy(fWF$Q!ysDstsB za8$BfoNxAF4>=v;px>LMT))T)lO7d!KV&}2$+4R_&E+2D*mU{2Lz#Im7@=OXZ#nbu ziB7TOicsq4G~CvX@Z9OZ_?&Llj_>$rj%0wTC?|KhLmm>lqw?r@y-4zacBKRYYGLGO%z?_a!KM+HNiY?@2d8 zQykWCM5DU>2KG4@f*4Y0htkD8%mCraVVHdi7*$Wmz3@CopM~z=1$GO^7d6rIF*gx= zxIeFY2}^hnAAB!+Q%=05E;&{$3*~ZH=9d7*Q+RBf{<} z+AcgoX-jL|dR@-insMNL4Q{jL15Fh=3x}&I0nY)(7Rz|J18vS8`KtEbhwM5(-}Os2 zkH@wmO~a*}r|yY;3fPFc0x5onVLPIcTTMXO7E@)P>NxydDg+!QebKn~gAeqN`~@$r zmZNa7nLf9oF?(hQ`PuZT&(a4`B`$K9?v2hqqfsfryf??#GWm?+HCwIl0D2u8!X9-t z-H&}vY?35`B$IMDx?X*j>$qdn9JP~;7)WAP${WU6PwyA{M>uYqPHj&0_a>$VYUL+X zu4zkbxraug@Y$z?N86eUaLF7EV;SZaTF!p>=5t)Kikr#gww<>=Pk&xqOI=)aGR&H7mfUZw;_=B^ zIKf?IhsQ2T%0i%0H4|Y4N81g(>c}^mj$JqF>S{4x&8A!>P}442^~L)KfA)uPnfKvhmj2 zJNP}~rkxeOShCwQ{+Z(+knwFh>>%$q1;hAc&j51=pzTLR&eauFT!45UhPCwv>!T`^ zGu*OwPdS<6j%4K6}sToq?+N9j2H`pKYe z;msX##|lnk9_4Z3udMsAeu6V2aG* za6(wBAxyY!Y2h;TA0!#vL&u-@ZSX#kQ9sPeCdQXXCjjNAFyq67JX}0usq!<=qiw?* zm4%qNAo|uW1LrmyLXBk^h!a|TN~!wEv$L+{jNPN8Jb0jbr62;n+i5UU zWLZEajtHKSk#U!kvaY(?4Wi&ejTF4-pP7=35p}@#rOy?yHMnC;kI+M&5r$szEz_%- z?xU6=7^EN=%>C-nci)9fD6lrZ9ld<7>*2v2^n*Nyq0 zhvq~cOw{r%tJnfl6??t1op)%+kxtsy*H;)9AHS_TnLhjN+wOS=N=jH16qKyGI-N@u zw(jn34%07~m2B0Cs7c!T`k4&%RmXis^B+I*eCh5EGWi@2i~U9q;T{oKM@Pr;X#LUp zx;0>v$FX5+8p9U}uHSrCJ>oNqKBretEBkk<$IEwat8Hf(?&ORIX!_&v_ z5Ny!^m+u$+T9D6g>81|$COiE**QBzJc%zKLAF+#GM!II|uRu61g!*X2RH|DOIJ%== z%6Vt%IDLVOTShLM97+LuJAUN@+%M0bxEdQ%Ww;CoQXP;AI)9%)#HRB0I6gk6`q>SS z?DXwRqVZE&EDKZ9mi?vnrN!0|isV;{j_u+1Lf{b5AqomHPtcRB{ryF^=j&_8m#C1b z#d9Ox(&&}M*!kkk5$xb6QP@mL$tm@QSErg(I9(AB&5k1D6dJ&7ypV)A3S`$Akt31H z!UO;kw8`5p7k?jX=wX)g37Z4f#`DCb=caT%i7*v?v@NpEN!W^tRC__^-etxZW2Ewf zPu>V4Zgs=)uAuQo4m<>jIQcev!XV0Hbz`1l49D0wI1of_pB=2^6h^$srjMivA53IP zq&X10j#(fRb+EO?-CA<7jTlrFO=9Sg{&{xa`yKHA!}Rp@GWT4Xlv?N789O$OsO*m} z?=zCw)$iYSd}UHCKP%*SF&*kVMY<7qk$5^5hf518)ewgY{ySF-UXb)2ep+euL(_xG;ac6X4u|ZwFVLZnsgkWK0 z+;We_R?^J1d4;SZmR)LhclXTWhQdPG2K3;a=k)r1B73{L)J%itKU@k&8F$5d;4x6M zSsLt@cf1r86`NO|*wXJc_gv)EetV*&g(&~_1;=sH9%L&jSGC?v#MR?<_@iXDu(l+t zij5U9$(_(&}j6G;&CEhwDC*v5TPKFhNW@09HzZ)d8~WIiMn<9tzn zC7sh`ZqUZsx&ecn^l~x=e)nMW*)r;Z${Y?Ur*Y_$_)9%~i4=MFt%*`& zQen~<`ryhez2^z=r-}zs`w)2fvyN`%FU*-Jb?_!x{x_OaCpuMArX98A68;CK2e`YH zk`E|{7g#qH!Pfmhm2;`U4U`b@!$S!iK%MD6dBRKvYC{sul}&J${V`o-leQkTJdRJJ z`l_Gqq{eQRZ}>rq%688~+nJB@4K`8w)IA3@sw!5MS0z?f3|2X(z^g_v^WQjKLXO%H&a1 zz+c}22TP^;68k0QnSUqq!GW*&MdIr%+t1cw6Ey8|anA@>v(RcAw&Y{2-TIk-5`9Z( zoEvA&kn^uv*2EJW8hcpa4MfEZc>oN@nPcH>d~iJIDFk=55uG3&mf=4N3bk{uNR|JV2 zMkwEEJ~3nqLXI_pTOez9p(rr-dRy!}@VYomRT|o#73g2U``QWD;Oq=B8NP4@M2zT^ zqe=3u9=!B9qNdq_gw|~$&+ziG;mXg#z#ziy$1ZmIrPkF^m+ zS`k_@`>XGD72j8Mry85t8($1c2#WQa>W-vf4v_*}ou`b`4~nf+fLV+hB^7x}ZYNx8 zIxglh`2s8M!r_Hz4THmwU1Q^b2(dfK)y}L<&E5$w`oouYGN?ePF;En$s6$LN6pUhx z#)59(0=I66Irk{zSM)!CC}JxSuZagvEnxQfU@kLOYPscAN;x1za6kkR90uS*b^nn` z*HqlP8>q!PO87}>D2fRh^%!-OXedpz$*Mrv{6mwxN@%Ex4_JNG68>>1p-DS!`3EqJ ze~;4~q9#HZC!ZqKhz%{a-%QU+ekB&rGyrINWg^8Z48#TI*%Q}RNItX1(*+WmsM9#O z=1Aq0%Z#2`l>lgPM1UgdUNM$otWsL4jT17?snCUUxU`W`>{B+cy!3GRQ`w6j8ILG| zaB`725Mr`cEcMHZ<&0$tjR>^|dKiqb_3N_UH{l0D2--j7ZtP02Ml7LFB>?t-@oeywVhmDNviqTLVdmV@ELqpLvK&;OC-h)k1l&&e&D1pJ0NSFNG z*V>8{CTJhRR;->1SJmt3&g7Gm;D6x07lHWsi?GTeud0*Y#Y;n4`RQAH-!O+ zkMcZ>9Ux?e3yjG38!(XVu2AAuWYiXEifmSD-3;NLeZ3ms)jm8g>N8jvAh&COnv5$F zS+<v z0qZ2{CKB3gBUDH}5wv*NTjj9MkSP^L2#cagPS{c-b~(V2X<;*?yv;sSzodk=Pd>r* zPhGR~QaG#j~GKaLA?daFsG>P4N}2KYpg|_g-3h*AyFxJ!Yj1K=>Z>T=q^ZC!elv zS$}e>&16KiY!Vq8lozzGf z)F*ZdlM8wVV2Vi1vzS=yk10#6&>jLz{Ke9U^oRAadV`KWogk#K z40pILLbB&AisX|D7a8R*Tp9AJWxzSS+E;Cz?=l?)KJC7{+KxLL?RO&@M)mvfyj5D& zxixOy-Dj>mEoHEkTv&r893Tn#UJqgYBdWo1Y_IBlQJ8?-m{5`~6S?F9GI~vGlR7tx^Ilob@ph+X9+>>0 zMkm;!bahE#nGxPK+Z+@>$YA^ILgIjWL8{XD9Ti9Ksr!?@M)v3Z=W+U6^2(;bM#r&S z`}l{{Qk?rXFh~=1hT?BAd z>dS1rR(Ye$tKc@~$zg%G(QGoa8n%x~;Y+L`eLB}hZN4pT>a797cGM+L(p7h>x)WOJ zErn0_abTIj@0tsZ-HJn8s{HHDksSpGOZ5f~A%u}!XK3!3tBcc^fVH(XNo8eah)m7&ieXP*1V#At2m_ujWaxhNdvmC-8!#6*SW_8e z`tf}ZP!syj3b9fwVxKa5y)GhO*s|ry$;?ak!sKwN@HPO?jE#XK(2oVjrKP1gJogO` z_UvY>#T^{jr*_=ad90GoN~)^xPIl*+uSHzfRloH2XHuEh-~wM(QY>pqFbGIhyMI zV4-H?&IhFQ3BFtFyBOmqW|7`Nkm?b^LMW=<*D|IzHbpcev6b0LlU`-t+{$>smU*FO zm>echlA}W-JBnzUcX#ap^E<+_ysuA@kk2;#?6frmaj7G!sgGr)D=y^h%+s+>ufnVs zfB1otl2TX_w(u)N$L%T3qVjTr8!|y>nmiy&!L5R=y0x02T}ymK*l`giL&)u6Nm6<` zLr;{79B>8U`kL1iWJx#lfLZgh^mwYQ_td^)2hSzt@Vh3=%3|uOnTtMu^!LAgtPqPu|OI^%K6L zW1Y-ls@1FK91(hSGaM3lKX}}ST6NXmR9qa^)WRZ0X139X-__Oih+6D2z&9TLl-215 z8+F$rhlHheFzVuU)5&9}H@K$?m5bMmySe8~581WLLKb$iVp*tEWBjT<;#hV@?+@p%KWm7lMD_?8eyoOe(Y$HLCz?ZL4m zP=4jCMUv6rdx>F-C?4@tX01h$G2kD`t&;y-K*w9c-V$8Ppq@B(EBZ3qR9t>PWP#bc zvPS~A2JLBafIr=wHK~M?PuD5ym9?0m=B80fhC}rA$rLjWR`h**msfgwzsr0Rr8Tjw z{-{?kPc_)YOV1Pv0b_AkS9q&{9`DN1(a^L2aFQN#OaKhBN(KzPrA!9zuqJf8?mc*0 zttU@V0r!U}1|H+-W4{+DjoQM2;9&s+sM(6xF3dHNt!Lj%y z3(1g_i^Q`KLS)PsXIeCsF)E{FE4?GK%02#95z&|ZV46oq z-cIHCX>kXOSg+fTBVPU#om9-q$79yT*wah%_Weq~{FeVR%;G5cg62%Y@iO1zn6AK- z%|KK1bir|>kFcFt%(MK^ta}T$ZJhsD63J4$g`ss*1X-hwJW8Rw7W__FBUDSq@hv{; z0;047W=st*w@>CD6ntEiho*g*)C?`4Dy$7#4eUZx&IEKNJo`Q-@=Gxg5TE@k3-51jl=O z*81*+0jOjK&I;Wq;eO&4Zd{l|MRjWEQ27|ms~4bx)<>n@m)=4wmX5^m#hG-Vr`nZF zT8p73Rd24abmMozm0s<0ygi5^u`}&>?$ElJjWeP3xUW$|rS!gu6@YU^;HbDKvYN~y z(ISTw%B?Npl_m3Dc!P>MD+)rOQ9{xxP+k5#c`|F&v-Dy&W!NYsM2<2Mt~u;gZ&1=uuy^8$8O9m@`D)+QE)$RjQ6#6a=a?L{ zplmcvm1%87LE0P%t5UEx>|m%$O~4r_!&Yb;eZkhXV|jVm@bc{7S-=245K=$SCSWe# zh~X)%{dy#=yp#n+mLX{F& z@}9rzv6*t~@hNM-1#gD%qrG_U`%JXQNz7k=5^-%(5el6r;Q;Z?^Bh@3Z9lftsL3f@rdY}O);^$G?4L$^(=T?EYz!vHsR=NP#a`g z8zddO8G#C`1e{Or&k@iURfx4jQ3{o-YjMWI6|73H40UrD)e9gK6>m9wM@Woxev-V> z)rsY7;EwLCdPn<%$N$K;DkRrC6cUMrM5ircW`bPlB-daL=D}JI?%8~Dzr{f;pj<)` zG1MxkPi;WtRPPH@2AXHe>S6A2r9p$hSI%dR1ak((kNRu_%y^-~VmXdoA6`Gw06H{RE61>(JY zj;`IbFNaR?D^y8!ooMMv@u3h3Brs7)=KD%;Fx&V&dXO&i5q;Uh?&l`G!vM~nORpsj zJsX4c2OJLqSf1;7;!M5ZIQkjwb({&L7menx>h=wX>suHIAu<71*(_p^^)IsKDd@$8 zZoyo#yDO6i@2D!tnJt{aikk@?yRprW2Y%$z2FTXYf<(D}bu~_NF3mTC zcq9((hI9oiijHp6cATe8s(f4g1tc(xe)yo5NFP7GKfeMJn7L2ve4n7@49!?)rh@=G z@7ar#d!y#;AcXCD;6PIA;XF6S1R=-+U+Vild$eYgqp9^ph*z(~6F7G6A{CwG{2=c`BiZ4$doYg2+ z3lGLjzZ!b*m<_gf57Pk7(!n9(<;&~)=!p<+1Ph#?;_6R=Ox83*c=QR|=RW5LjW-Cu zikWLOxR!`dkLYMEL~bOeOAz}C#5NS5ncuDECXcXbyg$Q!x2J~pT(&(_W$>|zI_b*jfGdh``NdE* zuM-fVOvjIRA{g|bDa7#evYIY|FCYaoDkDk3Lgz{>pJ5bvsFyU~;Ps(aHcFwSmOZ+2 zGMmaPzu&$l#wQ;RPmf84T~h}L+6q46#kS;qFs=$mTG)rvHaO}#-Cls?guKygpv$*~ zZ}T!$MjFUM4Kn-ygdbShR+vN{Hh4#9?N@wRquSq_nbC!2+NRkx0@0GbzEC3|u!O|o zT?yRSoW3T=Ce&nQ!6YS(eu1m%dhVJ)WeBW5uMQ@VwF-nDTZx|;@+viD@Tp1I!4M%5 zEHf3RA|HM}e^En0PHYyR`?j{6oE#yL~z={X_c}C67}h48tJZ`er)k8Z{9M!Ii$u@DnbE#rBX1k(NeguLvIzDk&5Vs z>dBvSPcjNnC(|AK&JFkIp8CI`rV~9L1a3LaHp|)1HbVpRF^8y$W4Iha zGFWYv650Sm@(UhLA#zjDr)oBNa1S1oJKR_bx@K&mmSu>YILmdf_bMBv1XCibkd+4= zZ6^YWhf0QPJ87cL>zl`#_sQczFgdtE-lisx5R_ZArw9k}6^hM;Y1E6a9rE# z>5nlijJ8B6c^%!y$>9Jq+L zQC(O+|AgcA%LQYS!Z{*<1p9$1OO_AcY!Td-7aVj?A|);#2(rvr3 zp8(QwfFqjS?Zkbd(ruobldaI}eJR+6%0~}dvFTEj-Xg{;n5zmLLkE2C6D&(HWy?|& zL?Qs|;%UsL!jj$7m800enn0FIN?Vwx&d|JA7?MrnNeh7N!tkZS`h3OdVNGr7`Lzx_ zTE1W8^VWBQ(#dPJ0?LFnw!;nAUQrTb^ii|`H1?3duj2A^bK%_g7Fba}S9t&Y`E&Uz zba)zbFRApMupdFX4&lHpx9p>F=SlVVPmh3n&)ufO`+Y+=qs~TCp)Xn^2`lUzw1~Ga zmIpue02h|m@f~9sO1;eGbr7vqnpi-;f+V2i%O;TFt&AAo7xCsX6lzyBH))lcxj5O` z;_m`3_L9bGOkP>AItynhgH%KCDdQfTbiy@19R~N~cln;mV7^L6e*vHDmbj`ExwsA6 zSU$B#I*FV%Ps-o@~gm4WfbE8 zkqLApaB>_x#t%b)?;(g7;XriuU{BS;q?LsO@QWCJn5JN7SGfdIy(78}Ik2t(tKmnZ z7+2a#xCrre2V8EXyC?t0Zw0Rf#Nrt~6gsKUYqBpe9i9Pgk)V=Tnb*qbNV5@T$iF8U#S6eM?K zo5xb3MHoqy5C3qAX@&>*h=?y{)DsytnbNS!mW5C;yRPm&SUfN`7LD^93lOF04)ts{ zXpZ`Cg@_LO!OY~hr^rxFj3p{6io^Mv9Pr&x9V71hOdum2ffc%oup*coPxw-SZ$OIP zZoCNrA@i6x@^!Y2n@AAKg}?es`XFX*6E{LV&dOpEKie7=k>1j)chg)!tz~#0YS+e= z-Tx+aPX zh>q*!+;#A0+cUhj;p%}FR7yFCRH`J+EsI1QlI#-IQ*+r%m>?tZ7TalU4)oo!r}aRv zo$CSBY?NG9(-$>){Y@cQz6ueFnME-Fu9cd)w;_tbUWywUo*S-jy?4WD#r`B zTGffsG{KLUUZzS4jllO_5GWBO=n;eg1c$-K@_-2y91N0ss7#G9Mx;I>f|3YHB-uBZ zzBuBOu@d}%iTqAIu$)p{=&7Su2C4H?v;|oSrEg0nGy*j2G@tbm6;m6vFNwFhrSi8& z34*A^nZ?wr4~|e8*XcLMRzg?YiAz2>IVP99*|uVyr9i%T&+3(h|LT~BMEw^KO&rX#$lcOJMR{GEaKGwS8 zkW_1E{E!R^N)c6>``Hjk3gTuzTyoSsATF;8hgI}G6Cc#cx3082Qh|ox{i2eyLdVNe zPQGk}Yai_e#P4_uLoZ5h-uZI8a1i+33nB&vZan_lNiUZe>}QdMh89zIq1ki9d=*;Ddr5pR9*|aVDZ8 zp@6~$qM;OONTICQiN0~tbTe}I($ArX1#py8fRBLB_A~&tAOH#js!7HuG5J7oLZ((N zfVzMdrOE(b9*%s^Zw0mmS`vx^r0uCvDmVkog$}?H2WXu9eua?RuX>T7G4O1O)Nj}z ze3_P&Xo4@NmB)nd%W*DxFmt@~@zLl8s`3g6arByY3qPMdLZB@lLhT;vp#6i7_fn3-@(VqmCXvbc_`W6#pU$h5`^5X+jbiGHkl0+gTf;FHi zh#gy{Uq>mRCqaWTScKS-Tx2yw=`T(qhRXRsOw|Q7jz;v*VWu_b9gw$gKXzq5i-cz(3#utqs$=S@i! z;xA5ZW+I;G3y;l<)v6DJBM8kk?gasvwXa@_P%H=cc4X4@!VEm*v|3p*7DQuQo*74N zR*DRpeYP0Km)2K?fmJlkDtC?p!h&QOoGCGWq)U3cmYKt~0av`ioE`d{U7JRUF}3Q< zqaM}&ZLAinkNGvW9>c|>wiRYx>TvYqzB!&n{Sq8~XOw-KB%%o%LcNfc)1#rQrKLf* z$6YX5@zYu;vWnF~E04Pl;#-a)U$OybN!J*UsssfO5`(b>t5)PJccDX>M|2X3K-46`FV32)AYSv^E;O6y7mR zCZ|1K)n4e~q?-1=&f1sF0y1Ls3)|rzJNuhysJ>`>6cyL@fW33gn`|GYAC0SA14yu% ziRYmQx5WpR(~AG3B_~J4>!Fp+4_*)!vhq4aGT~6(81C-K8Ham}txiE!L^Rm{#GK9` z(+PN1E33&P0i?$mjZM}2(}J2J69$hLw&xUmZ07?SP*rV^m1k(+0+J_oq#`y?kPk>UEmtf_d(9SPkkPJ z!EH2uF=aY9WKynHhsd-$UO?00bj0xgt&;DWa-J7cs2o>N)#QEO8m8W}dE5BP_V@48 z%CHQf!Zh!@!&G(K+PO?$pEXuZ(rHm& /etc/resolv.conf +#echo "search fatecseg.edu.br" >> /etc/resolv.conf +#echo "nameserver 172.17.0.1" >> /etc/resolv.conf +#echo "nameserver 172.17.0.2" >> /etc/resolv.conf + +#chattr +i /etc/resolv.conf + +#systemctl restart named +reboot diff --git a/update_srv2.sh b/update_srv2.sh new file mode 100644 index 0000000..5565fe9 --- /dev/null +++ b/update_srv2.sh @@ -0,0 +1,44 @@ +#!/bin/bash +wget https://raw.githubusercontent.com/tmferreira-ti/ASOR/main/Confs/srv2/interfaces -O /etc/network/interfaces --no-check-certificate --no-cache +#wget https://raw.githubusercontent.com/tmferreira-ti/SSORI/refs/heads/main/configs/sshd_config -O /etc/ssh/sshd_config --no-check-certificate --no-cache + +#apt install bind9 -y + +#wget https://github.com/tmferreira-ti/ASOR/raw/refs/heads/main/Confs/srv2/dns/named.conf.options -O /etc/bind/named.conf.options + +#wget https://github.com/tmferreira-ti/ASOR/raw/refs/heads/main/Confs/srv2/dns/named.conf.local -O /etc/bind/named.conf.local --no-check-certificate --no-cache + +#apt update + +#apt install apache2 -y + +#apt install mariadb-server -y + +#apt install php php-mysql libapache2-mod-php php-curl php-gd php-mbstring php-mcrypt php-xml php-xmlrpc -y + +#wget https://github.com/tmferreira-ti/ASOR/raw/refs/heads/main/Confs/srv2/Apache/fatecseg.conf -O /etc/apache2/sites-available/site.conf --no-check-certificate --no-cache + +#mkdir /dados/paginas/fatecseg -p + +#a2ensite site.conf + +#a2dissite 000-default.conf + +#mysql -u root -p -e "CREATE DATABASE wordpress;" +#mysql -u root -p -e "GRANT ALL PRIVILEGES ON wordpress.* TO 'wordpressuser'@'localhost' IDENTIFIED BY 'password';" +#mysql -u root -p -e "FLUSH PRIVILEGES;" + + +#cd /dados/paginas/fatecseg/ + +#rm -f index.html + +#wget wordpress.org/latest.tar.gz + +#tar --strip-components=1 -xzvf latest.tar.gz + +#rm -f latest.tar.gz + +#chown www-data: -R /dados/paginas/fatecseg/ + +reboot