Pages

Wednesday, April 23, 2014

“Shop Talk” with Eric Sink, Zumero for SQL Server founder

In my last blog post I introduced you to Zumero, an Enterprise solution, that allow you to replicate and sync SQL Server data across all your team's mobile devices.

I had the pleasure of meeting up with Zumero founder, Eric Sink, @eric_sink at the recent SQL Saturday event in Copenhagen.

image

We agreed to do a short interview by mail, so I could share my Zumero questions with my blog readers. So without further ado, let’s get started.

I know you have been involved with other software products (SourceGear). What is the story behind Zumero?

We think of Zumero as a new start-up that is incubating inside SourceGear, so there is much shared history.

We started SourceGear in 1997, initially as a contracting shop building custom software for mobile devices.  We did a lot of work with Blackberry devices and some very early Motorola smart phones.

Then we got into version control tools, which has been a great business for us over the last 15 years.  We are still serving a large customer base with on-going active development of SourceGear Vault.

But in the last few years, the world of mobile has been drawing us back in.  :-)

And from a certain point of view, our work on version control means that we have been doing "sync" for 15 years.

And SourceGear Vault has always been built on SQL Server.

So that's how we got the three main ingredients of Zumero:  SQL Server, mobile, and sync.

Some of the features that Merge Replication provide are: - Minimal client code, secure, compressed transfer over https, server side filtering, read-only tables, conflict handling. How does Zumero stack up?

I /think/ we stack up pretty well, although we still have many ideas for how to make our product better.

"minimal client code"  -- The Zumero Client SDK tries to make everything easy.  Just call the Zumero sync function and Zumero will synchronize changes in both directions.

"secure" -- Zumero is designed to work over SSL/https.  The protocol includes authentication.  And on the client, Zumero is compatible with bulk encryption libraries such as SQLCipher.

"compressed transfer over https" -- All packages exchanged between Zumero client and server are compressed.  In fact, the packages from server to client are often "deltified" to make them very small indeed.

"server side filtering" -- Zumero does support the ability to exclude tables, or columns from tables, or to filter rows on a custom WHERE clause.

"read only tables" -- This can be accomplished with Zumero's authentication and permissions.

"conflict handling" -- Zumero handle conflict resolution on the server.  The default rules seem to be appropriate for most cases, but those rules can be customized to do whatever is needed for a given situation.

In addition, Zumero adds a few things that SQL CE merge replication does not, most notably, support for iOS and Android devices.

OTOH, Zumero is built on SQLite, which does not resemble SQL Server as closely as SQL CE does.  We are constantly working to provide Zumero customers with a smooth experience by improving features, tooling and documentation.  My blog series on the differences between SQL Server and SQLite is a part of those efforts:

Rob Tiffany has demonstrated scaling Merge Replication. How does Zumero scale?

This is one area where Zumero's youth is evident, and I shall not pretend.  There is much more experiential knowledge about scaling with merge replication.  Rob Tiffany's "cheat sheet" is a gold mine of information:

And some of his advice would be applicable to Zumero as well.

However, we are quite happy with the scalability results we have achieved so far and we continue to push further.

(a)  We do a lot of "crowd testing", using lots of clients to abuse the Zumero server so we can tune it for reliability and performance.

(b) We are currently working with some customers who are integrating Zumero into an environment where merge replication is already in use (as a scaling solution for the SQL Server backend, not as a mobile sync solution).  We have some additional testing to do here, but we hope to able to publish some guidelines about the compatibility of Zumero with this kind of situation.

(c) Finally, we have tested and verified another way of scaling out, by having multiple Zumero servers talking to a single instance of SQL Server.  This can make a significant difference and is not difficult to set up behind a round robin DNS.

You are using Triggers and tracking tables on SQL Server, and not the built-in Change Tracking. Why?

The real reason is that Zumero's core sync code existed before we made the decision to make SQL Server the primary focus of the product.

That said, the documentation for Change Tracking raises questions for us.  We wonder if it would require changes to our sync algorithm.  We wonder if our support for tracking schema changes would still work.  We wonder about the apparent dependence on snapshot isolation.

We may explore this further in the future, but right now, we've got a solution which is robust, so we don't feel much pressure to change it.

Do you provide a Windows Mobile (.NET Compact Framework) client library?

Currently, no, but we are planning to do so.  The implementation work for Windows Mobile 6 support is done, but it has not yet been released as part of the product.  If a Zumero customer needs this, we would be ready to discuss and coordinate making it available.

What do you recommend for use as data access API towards SQLite on Windows platforms?

Right now, there is no API we can recommend without caveats.  Or rather, there are several good choices, but no clear winner.

For desktop Windows only, the core SQLite team products System.Data.SQLite, an ADO.NET provider which is fully compatible with EF6.  If you're not using mobile, this is almost certainly the best choice.

Frank Krueger's sqlite-net wrapper is quite popular, and for some very good reasons.  But last I knew, none of the various PCL forks have been folded back in, and that has been an issue for some.  Nonetheless, this is the wrapper we encounter most often.

WinRT without System.Data is a story with a big hole in it.  We remain hopeful that Microsoft has some more good stuff in the pipeline.  

Looking beyond Windows to include iOS and Android as well, things can get complicated.  Both of these other platforms include a [different] version of SQLite as part of the mobile OS.  Many apps use those.  Some bundle their own.  Some replace SQLite with SQLCipher.  Things can get tricky.  In addressing this set of problems with our customers, we've built some stuff that we are planning to make available to the community as open source (to be announced on my blog, soon, I hope). [Ed: Available as source code on Github, and NuGet packages coming soon]

READ MORE - “Shop Talk” with Eric Sink, Zumero for SQL Server founder

Monday, April 21, 2014

Free vps 21 April


Halo mas bos saya mau ngasih media buat peratek instal vps untuk ssh dan vps ini centos 6 64 bit cuman 1 hari aja silahkan di ambil satu aja ya biar yang lain bisa ikut mencoba

server1
server2
server3
server4
server5
server6

 bantu sebar via FB ya klik ke sini

READ MORE - Free vps 21 April

INJEK ISAT 21 APRIL VC



 SS TKP JABAR




2 JAM LEBIH NONTON youtube LANCAR KLO DOWNLOAD LIMIT 500 MB

SILAHKAN

https://www.facebook.com/groups/1484134131813070/

READ MORE - INJEK ISAT 21 APRIL VC

Sunday, April 20, 2014

Proxy port 80 dan 8080 21 april 2014


Akhir ini keluhan xl harus pakai proxy port 80 nah saya bikin proxy dari vps free 1 hari sekarang lumayan untuk mempermudah nyarinya. Apa bedanya proxy yang saya bikin heee ya sama aja kaya proxy yg free lain nya cuman yg saya shear ini sedikit yg mengunakan jadi speed nya lumayan dari pada yg free di pakai seluruh dunia ini hehehe langsung aja silahkan pakai


SS Port 80 sudah saya cek work

SS Port 8080 sudah saya cek juga 

111.68.20.83 = Port 80 dan 8080

SS Port 80 work
SS Port 8080 juga work
111.68.20.85 = Port 80 dan 8080

Klo saya ngak posting baru silahkan gabung di Facebook 
https://www.facebook.com/groups/1484134131813070/
READ MORE - Proxy port 80 dan 8080 21 april 2014

ISAT RA popo



akhirnya isat no dc no limit juragan silahkan di comot
Dowload

NB: ikuti sama percis kaya gambar di atas
READ MORE - ISAT RA popo

Thursday, April 10, 2014

An alternative to Merge Replication with SQL Server and SQL Server Compact – Zumero for SQL Server

While looking for a migration path for a customer currently using Merge Replication with SQL Server and Windows Mobile, I came across the recently released solution from Zumero, Zumero for SQL Server. As mentioned in my previous blog post, Merge Replication between SQL Server Compact and SQL Server 2014 is no longer possible, and in addition, SQL Server Compact 3.5 SP2 only supports a limited number of client platforms (Windows Mobile/CE and Windows desktop). Microsoft is promoting Azure Mobile Services with Offline support, but for obvious reasons, this solution does not work for on premise databases.

Zumero for SQL Server enables you to synchronize any mobile device with tables on a central SQL Server, using essentially the same components that we know from Merge Replication:

1: Configuration of tables to be synchronized, and added metadata/tracking to those. Before: Using SQL Server Management Studio to create a Merge Publication with articles (tables)
Now: Using ZSS Manager to create a DBFile with Tables

2: An IIS based agent, that exposes a http(s) endpoint for performing the sync process.
Before: Configure Web Synchronization Wizard
Now: ZSS Server

3: Client library for performing sync.
Before: System.Data.SqlServerCe.SqlCeReplication class, part of the SQL Server Compact ADO.NET provider
Now: Zumero Client SDK and SQLite.

using Zumero;

ZumeroClient.Sync(
"/path/to/sqlite.db", // full path to local db file
null,
"http://MY_ZUMERO_SERVER:8080",
"test", // remote DBFile name
null,
null,
null);



To get started testing out Zumero, simply follow the instructions here: http://zumero.com/get-started/ or start by watching the short, introductory videos here: http://zumero.com/howto/

Notice that Zumero works with any edition of SQL Server 2008 R2 Express or higher/later. Zumero Server is not free, but works with the free SQL Server Express for small scale solutions.

On the client side, the following impressive list client Operating Systems are supported:

Android (native and PhoneGap)
iOS (native and PhoneGap)
Xamarin
Windows, WinRT and Windows Phone 8
Mac OS X
Linux (Ubuntu 12.04+, Fedora 17+)

In my next blog post, I will be doing an interview:  “Hard Talk” with Eric Sink, Zumero founder.

Disclaimer: I am simply a Zumero user, and not affiliated in any way.

READ MORE - An alternative to Merge Replication with SQL Server and SQL Server Compact – Zumero for SQL Server

Tuesday, April 8, 2014

Free VPS 08 April 15:45


klo udah dapat satu jangan abil lg yaa... kasian yang lain ...
klo udah dapet comen dibawah sertakan IP nya yang agan udah ambil

langsung aja vps nya cepat di seduh ya :

server1
server2
server3
server4
server5
server6
server7
server8

Semoga membantu agan" semua untuk shear geratisan biar ngak Reupload :D

READ MORE - Free VPS 08 April 15:45

CARA LIMIT dan MONITORING USER DROPBEAR

langsung aja, login ke vps anda melalui putty / bitvise , gunakan root access
kemudian buka terminal dan ketikan :

cd /usr/sbin/

wget http://drop.groundworlds.tk/usermon

chmod 755 usermon


wget http://drop.groundworlds.tk/file/userlmt


chmod 755 userlmt


atau

chmod 777 userlmt

==================================
MEMBUAT AUTO SCRIPT supaya berjalan otomatis setiap 10 detik !!
---------------------------------------------------------------------------------------
ketikan berikut :

A. masuk ke /usr/sbin

cd /usr/sbin

1. membuat file autokill.sh

nano autokill.sh

2. paste kan script berikut :
------------------
while : do userlmt 1 sleep 10 done
---------------------
ctrl+x , y (untuk disave)
3. merubah hak eksekusi file autokill.sh

chmod +x autokill.sh

4. jalankan autokill supaya running otomatis

screen -AmdS check /usr/sbin/autokill.sh

5.  edit rc.local supaya auto run apabila di restart
nano /etc/rc.local
masukan baris berikut tepat di atas script: touch /var/lock/subsys/local
screen -AmdS check /usr/sbin/autokill.sh
6. DONE !!

CARA PENGGUNAAN MANUAL
-------------------------------------------
1.  untuk monitoring user dropbear, silahkan ketikan diterminal :
usermon -dp

2. untuk monitoring user openssh, silahkan ketikan diterminal :

usermon -op

3. untuk melimit user yang login lebih dari 1 atau 2 , ketikan :
userlmt 1
script diatas akan melimit login user dropbear menjadi 1 login saja
semua user yang login lebih dari 1 akan ter-kick dari server dan 
menyisakan 1 user yang terakhir login.
angka 1 dapat disesuaikan dengan kebutuhan, menjadi 2 , dst
 
READ MORE - CARA LIMIT dan MONITORING USER DROPBEAR

CARA INSTALL OPEN VPN PADA CENTOS 5 DAN 6 32Bit atau 64Bit

Karena Banyak request yang minta TUTORIAL ini maka saya buatkan

mudah mudah an bermanfaat :
====================
1. masuk via bitvise buka terminal (xterm), atau via putty
2. harus dengan root access
---
pastikan TUN TAP sudah aktif
masukkan :
cat /dev/net/tun
pastikan balasannya : file descriptor in bad state
---------------------------------
3. masukan perintah berikut :
CENTOS 5 32bit

wget http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.2-2.el5.rf.i386.rpm
CENTOS 5 64bit
wget http://packages.sw.be/rpmforge-release/rpmforge-release-0.5.2-2.el5.rf.x86_64.rpm
CENTOS 6 32 bit
wget http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.3-1.el6.rf.i686.rpm
CENTOS 6 64bit
wget http://pkgs.repoforge.org/rpmforge-release/rpmforge-release-0.5.3-1.el6.rf.x86_64.rpm

ALL CENTOS 5


rpm --import http://apt.sw.be/RPM-GPG-KEY.dag.txt
rpm -K rpmforge-release-0.5.2-2.el5.rf.*.rpm
rpm -i rpmforge-release-0.5.2-2.el5.rf.*.rpm
ALL CENTOS 6 
rpm --import http://apt.sw.be/RPM-GPG-KEY.dag.txt (abaikan jika gagal)
rpm -K rpmforge-release-0.5.3-1.el6.rf.*.rpm
rpm -i rpmforge-release-0.5.3-1.el6.rf.*.rpm
yum install openvpn -y
cp -r /usr/share/doc/openvpn-2.2.2/easy-rsa/ /etc/openvpn/
PERHATIKAN CENTOS 6
butuh sedikit perubahan
yum -y install nano
nano /etc/openvpn/easy-rsa/2.0/vars
kemudian EDIT baris berikut : 

export KEY_CONFIG=`$EASY_RSA/whichopensslcnf $EASY_RSA`


MENJADI :

export KEY_CONFIG=/etc/openvpn/easy-rsa/2.0/openssl-1.0.0.cnf

kemudian SAVE (Ctrl+x) (Y) (ENTER)


cd /etc/openvpn/easy-rsa/2.0/
chmod +x *
source ./vars
./vars
./clean-all
./build-ca
cukup Enter Semua KECUALI COMMON NAME (isi sesuai keinginan)
kemudian :
./build-key-server server
Perhatikan dan Ikuti Langkahnya Baik-baik
saat muncul notifikasi (ada dua kali) pilih Y (y)
----------------------------------------
./build-dh
tunggu hingga proses selesai
 jika sudah masukkan berikut :


cp -r /etc/openvpn/easy-rsa/2.0/keys/ /etc/openvpn/keys/
cp /etc/openvpn/keys/ca.crt /etc/openvpn/ 


cd /etc/openvpn/

Membuat Response ke TUN driver
cat > server.conf <
dev tun*
END 

MembuatConfigurasi server :


cat > groundworld.conf <
port 443
proto tcp
dev tun
ca /etc/openvpn/keys/ca.crt
cert /etc/openvpn/keys/server.crt
key /etc/openvpn/keys/server.key
dh /etc/openvpn/keys/dh1024.pem
plugin /usr/share/openvpn/plugin/lib/openvpn-auth-pam.so /etc/pam.d/login
client-cert-not-required
username-as-common-name
server 10.9.8.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "redirect-gateway def1"
push "dhcp-option DNS 8.8.8.8"
push "dhcp-option DNS 8.8.4.4"
keepalive 5 30
comp-lzo
persist-key
persist-tun
status server-tcp.log
verb 3
END

 Forwarding Port
echo 1 > /proc/sys/net/ipv4/ip_forward

Iptables Route rules
iptables -t nat -A POSTROUTING -s 10.9.8.0/24 -o venet0 -j SNAT --to xxx.xxx.xxx.xxx

xxx.xxx.xxx.xxx diatas ganti dengan IP VPS anda
 Jalankan VPN di server :
service openvpn start

Buat Client Config :
cat > groundworld.ovpn <
client
dev tun
proto tcp
remote xxx.xxx.xxx.xxx 443
resolv-retry infinite
route-method exe
resolv-retry infinite
nobind
persist-key
persist-tun
ca ca.crt
auth-user-pass
comp-lzo
verb 3
END

INGAT, ganti xxx.xxx dengan IP VPS anda
==============================
sekarang kita bungkus makanan kita :
tar -czvf config.tar.gz ca.crt groundworld.ovpn



cp config.tar.gz /root
config.tar.gz di download via sftp windows di directory /root, jika kesulitan, kalo sudah ada httpd bisa dicopy ke sini :
 
cp config.tar.gz /var/www/html/
 silahkan file di download di http://IpVPSkamu/
ex : http://212.112.11.123/



=========================
sekarang di terminal (masih)
bikin user untuk ngetest


adduser -m -s /bin/false trial
passwd trial 

masukkan 2x autentikasi pass nya 

cmiww, DONE !!!
------------------------
Tinggal Pindahkan Downloadan Config tadi, ekstrak menggunakan 7-Zip
dan pindahkan ke C > program files > openvpn > config
=============
CARA MUDAH 
============= 
download openvpn portable disini :
----------------------
http://sourceforge.net/projects/ovpnp/files/latest/download
-----------------------
kemudian install di folder yang kamu suka 
----------------------
setelah itu masuk ke folder OpenVPNPortable > data > config
------------------
ekstrak file config.tar.gz disini, pastikan setelah ter-ekstrak terdapat 2 FILE :
-------------------
1. groundworld.ovpn
dan
2. ca.crt
================
DONE !! silahkan jalankan openVPNPortable, di Icon Tray Kanan Bawah PC anda klik kanan 
Connect groundworld dan masukan user dan pass yang telah dibuat diatas
----------------------------------
jika masih belum mau, gunakan Contoh Config dibawah :
copykan ke groundworld.ovpn atau buka notepad dan save as type ALLFILES dan PADA file name di isi ekstensi .ovpn ex : hostingindo.ovpn
-------------------------
client
dev tun
proto tcp
remote xxx.xxx.xxx.xxx 443
route 0.0.0.0 0.0.0.0
resolv-retry infinite
route-method exe
resolv-retry infinite
nobind
persist-key
persist-tun
auth-user-pass pass.txt
comp-lzo
verb 3
ca ca.crt

---------------------------
PERHATIAN !!

UNTUK MENGGUNAKAN CONFIG DIATAS BUAT FILE PASS.TXT 
GUNAKAN NOTEPAD
FORMAT :
username
password
==>contoh
trial
trial
simpan di folder OpenVPNPortabel > data > config
===================================
UNTUK OPENVPN listen INJEK gunakan config :
------------------------------------
client
dev tun
proto tcp
remote xxx.xxx.xxx.xxx 443

http-proxy 127.0.0.1 xxxx
route 0.0.0.0 0.0.0.0
resolv-retry infinite
route-method exe
resolv-retry infinite
nobind
persist-key
persist-tun
auth-user-pass pass.txt
comp-lzo
verb 3
ca ca.crt

==================================================
http-proxy 127.0.0.1 xxxx (xxxx diisi dengan PORT INJECT !)
==================================================
untuk yang bermasalah dengan route dan terbiasa menggunakan route manual
masukan config :
-------------------------
client
dev tun
proto tcp
remote xxx.xxx.xxx.xxx 443

http-proxy 127.0.0.1 xxxx
route 0.0.0.0 0.0.0.0
resolv-retry infinite
route-method adaptive
resolv-retry infinite
nobind
persist-key
persist-tun
auth-user-pass pass.txt
comp-lzo
verb 3
ca ca.crt

-------------
DONE !! silahkan jalankan openVPNPortable, di Icon Tray Kanan Bawah PC anda klik kanan 

sumber dari groundmans
READ MORE - CARA INSTALL OPEN VPN PADA CENTOS 5 DAN 6 32Bit atau 64Bit

Test kecepatan server dengan speedtest.net CLI

Speedtest.net menggunakan flash player untuk melakukan test kecepatan upload dan upload, sayangnya sangat repot jika ingin melakukan test pada vps atau server non gui.
Namun kita bisa menggunakan script python buatan Matt Martz yang bernama speedtest-cli untuk menjalakan test speedtest.net dari command line.
Untuk menjalankan script ini dibutuhkan software python yang telah di install pada vps / server.
Anda bisa menginstall python dengan perintah sebagai berikut:
Untuk OS Redhat/Centos:
Untuk OS Debian/Ubuntu:
Download file speedtest-cli dari url:
Anda dapat melihat informasi penggunaan dengan perintah:
Contoh perintah untuk melakukan testing dan generate url hasil test
Sebelum melakukan test, disarankan untuk melihat daftar server yang akan ditest
READ MORE - Test kecepatan server dengan speedtest.net CLI

Saturday, April 5, 2014

Instalasi OpenVPN Pada Debian & Ubuntu

Instalasi OpenVPN ini dikerjakan pada mesin Debian. Harusnya juga bisa untuk turunan Debian lainnya seperti Ubuntu, Mint, dll.
Tujuan saya menggunakan OpenVPN biasanya untuk tunneling aja, menggunakan IP address luar, mem-bypass restriksi oleh ISP, dll. Fitur enkripsi dan login menggunakan certificate akan saya disable supaya koneksi semakin ringan dan stabil, lalu sebagai gantinya proses login nanti akan menggunakan username & password. Enkripsi cuma akan menambah overhead di trafik.
Cek dulu TUN / TAP sudah enabled apa belum;

root@starscream:~# cat /dev/net/tun
cat: /dev/net/tun: File descriptor in bad state
Kalau outputnya seperti di atas, berarti TUN / TAP sudah enabled. Jadi kita bisa lanjut ke proses instalasi.
apt-get install openvpn pam-devel
Pada beberapa instalasi Debian terbaru, mungkin akan muncul error seperti ini:
E: Unable to locate package pam-devel
Kalau kasusnya seperti itu, paket pam-devel ngga perlu diinstall.
Copy contoh file konfigurasi yang udah ada ke /etc/openvpn untuk selanjutnya kita edit;
cp -/usr/share/doc/openvpn/examples/easy-rsa/ /etc/openvpn/
chmod -R 755 /etc/openvpn/
cd /etc/openvpn/easy-rsa/2.0/
Lalu kita edit file vars (optional). Biasanya saya edit jadi seperti ini;
vi vars
# Increase this to 2048 if you
# are paranoid. This will slow
# down TLS negotiation performance
# as well as the one-time DH parms
# generation process.
export KEY_SIZE=384
 
# In how many days should the root CA key expire?
export CA_EXPIRE=3650
 
# In how many days should certificates expire?
export KEY_EXPIRE=3650
 
# These are the default values for fields
# which will be placed in the certificate.
# Don't leave any of these fields blank.
export KEY_COUNTRY="ID"
export KEY_PROVINCE="JKT"
export KEY_CITY="Jakarta"
export KEY_ORG="andia.me"
export KEY_EMAIL="scylla@andia.me"
export KEY_CN=vpn.andia.me
export KEY_NAME=andia.me
export KEY_OU=andia.me
export PKCS11_MODULE_PATH=changeme
export PKCS11_PIN=666666
setelah di-edit dan save, lalu;

source ./vars
./vars
./clean-all
./build-ca
Generating a 384 bit RSA private key
.++++++++++++++++++
................++++++++++++++++++
writing new private key to 'ca.key'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [ID]:
State or Province Name (full name) [JKT]:
Locality Name (eg, city) [Jakarta]:
Organization Name (eg, company) [andia.me]:
Organizational Unit Name (eg, section) [andia.me]:
Common Name (eg, your name or your server's hostname) [vpn.andia.me]:
Name [andia.me]:
Email Address [scylla@andia.me]:
./build-key-server vpn.andia.me
Perhatikan ketika execute perintah build-key-server di atas, value nya harus sama dengan Common Name, atau KEY_CN yaitu vpn.andia.me
Generating a 384 bit RSA private key
............++++++++++++++++++
..++++++++++++++++++
writing new private key to 'vpn.andia.me.key'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [ID]:
State or Province Name (full name) [JKT]:
Locality Name (eg, city) [Jakarta]:
Organization Name (eg, company) [andia.me]:
Organizational Unit Name (eg, section) [andia.me]:
Common Name (eg, your name or your server's hostname) [vpn.andia.me]:
Name [andia.me]:
Email Address [scylla@andia.me]:
 
Please enter the following '
extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
Using configuration from /etc/openvpn/easy-rsa/2.0/openssl-1.0.0.cnf
Check that the request matches the signature
Signature ok
The Subject'
s Distinguished Name is as follows
countryName :PRINTABLE:'ID'
stateOrProvinceName :PRINTABLE:'JKT'
localityName :PRINTABLE:'Jakarta'
organizationName :PRINTABLE:'andia.me'
organizationalUnitName:PRINTABLE:'andia.me'
commonName :PRINTABLE:'vpn.andia.me'
name :PRINTABLE:'andia.me'
emailAddress :IA5STRING:'scylla@andia.me'
Certificate is to be certified until Jan 4 06:27:10 2022 GMT (3650 days)
Sign the certificate? [y/n]:y
 
1 out of 1 certificate requests certified, commit? [y/n]y
Write out database with 1 new entries
Data Base Updated
./build-dh
Selanjutnya kita buat file konfigurasi server;
cd /etc/openvpn
vi udp53.conf
Pada konfigurasi server saya isinya kurang lebih seperti ini;
port 53
proto udp
dev tun
ca easy-rsa/2.0/keys/ca.crt
cert easy-rsa/2.0/keys/vpn.andia.me.crt
key easy-rsa/2.0/keys/vpn.andia.me.key
dh easy-rsa/2.0/keys/dh384.pem
plugin /usr/lib/openvpn/openvpn-auth-pam.so /etc/pam.d/login
client-cert-not-required
username-as-common-name
server 10.53.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
push "redirect-gateway def1"
push "dhcp-option DNS 8.8.4.4"
push "dhcp-option DNS 208.67.220.220"
keepalive 2 30
comp-lzo
cipher none
persist-key
persist-tun
status udp53.log
verb 3
Setelah di-edit dan save, restart service openvpn;
/etc/init.d/openvpn restart
Sampai sini service OpenVPN udah start dan client bisa login, tapi belum bisa melakukan koneksi ke internet karena belum diforward. Untuk itu edit file /etc/rc.local;
vi /etc/rc.local
dan tambahkan script ini;
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -F
iptables -X
iptables -t nat -F
iptables -t nat -A POSTROUTING -s 10.53.0.0/24 -j SNAT --to 209.141.55.165
10.53.0.0/24 adalah alamat jaringan local VPN yang saya masukkan di konfigurasi udp53.conf tadi, sedangkan 209.141.55.165 adalah IP public server saya. Setelah di-edit dan save, lalu;
sh /etc/rc.local
Langkah selanjutnya kita buat user untuk login ke VPN;
useradd -m -s /bin/false scylla
Konfigurasi di sisi server udah selesai, sekarang lakukan konfigurasi client. Karena aplikasi client untuk konek ke OpenVPN server ada beberapa macam (OpenVPN, Viscosity, dll) dan beda platform (Linux, Windows, Mac OSX) maka saya cuma akan menampilkan konfigurasinya secara general aja. Gimana cara install, konfigurasinya di mana, dll, cari dan coba2 sendiri ya. Atau bisa juga ditanyakan di kolom komentar di bawah.
## Contoh konfigurasi OpenVPN client (*.ovpn) ##
client
dev tun
proto udp #protocol
remote 209.141.55.165 53 #IP address server dan port
resolv-retry infinite
route-method exe
nobind
persist-key
persist-tun
ca ca.crt #file ini yang kita download dari server, dan diletakkan di folder yang sama.
auth-user-pass
comp-lzo
cipher none #disable enkripsi
verb 3
Di sisi client, yang kita butuhkan cuma file ca.crt yang ada di server tadi, jadi jangan lupa untuk dicopy / download dulu ke client.
READ MORE - Instalasi OpenVPN Pada Debian & Ubuntu

Friday, April 4, 2014

Cara Install Squid Di VPS Debian

Cara Install Squid Di VPS Debian

sudah pasti dan jelas pertama-tama masukan command di terminal


Code:
apt-get update

2.
Code:
wget http://esteh.info/raw/setup-squid.sh


3. Jalankan script

Code:
bash setup-squid.sh

3. Skrip akan meminta port yang anda gunakan untuk proxy. Anda bisa menggunakan port yang anda inginkan dan tidak terbatas, misalnya di sini saya menggunakan 3 port: 8080, 3128 & 1080. jika ingin melanjutkan install ketik “n”.

contoh:
Quote:Masukkan port untuk squid: 8080
Masukkan port lain untuk squid atau Ketik "n" untuk melanjutkan: 3128
Masukkan port lain untuk squid atau Ketik "n" untuk melanjutkan: 1080
Masukkan port lain untuk squid atau Ketik "n" untuk melanjutkan: n

Untuk cek proxy anda sudah bisa dipakai bisa di cek disni


http://ping.eu/proxy/

Note :
Pastikan anda menginstall squid di vps yang firewallnya menerima semua port atau disetting port proxy ke port yang diterima firewall vps anda ..
atau jika anda bisa ubah aja firewall vps anda
READ MORE - Cara Install Squid Di VPS Debian

Cara Install Webmin di Debian 6 Dan 7

Step 1

- Lakukan Update repository terlebih dahulu
 #nano /etc/apt/sources.list
- Kemudian tambahkan repository berikut pada akhir file diatas
 deb http://download.webmin.com/download/repository sarge contrib
deb http://webmin.mirror.somersettechsolutions.co.uk/repository sarge contrib
cara Install Webmin di Debian 6 Dan 7
Update Repository

Step 2


- Download dan Instal kunci GPG dengan repository
 #cd /root
#wget http://www.webmin.com/jcameron-key.asc
#apt-key add jcameron-key.asc

 Step 3


- Lakukan Perintah update
 #apt-get update
- Install Webmin perintahnya
 #apt-get install webmin

Apabila install webmin selesai, silahkan anda buka webmin pada browser anda dengan menggunakan url https://ip-address:10000. Kemudian login menggunakan user dan password root anda.

NB: ip-address : isi dengan IP/Host Server VPS.
READ MORE - Cara Install Webmin di Debian 6 Dan 7

Cara Install Badvpn Di VPS Debian

Ok langsung mulai saja Tutorial Install Badvpn Di VPS Debian
  1. Anda harus akses VPS via ROOT
  2. Buka terminal XTREM
  3. Ikuti langkah2 berikut
Update dulu:
apt-get update && apt-get upgrade
Install make, cmake & gcc:
apt-get install cmake make gcc -y
Download paket badvpn:
wget http://badvpn.googlecode.com/files/badvpn-1.999.128.tar.bz2
Extract paketnya :
tar xf badvpn-1.999.128.tar.bz2
Bikin folder badvpn-build:
mkdir badvpn-build
Masuk ke directory badvpn-build:
cd badvpn-build
Kemudian ketik command:
cmake ~/badvpn-1.999.128 -DBUILD_NOTHING_BY_DEFAULT=1 -DBUILD_UDPGW=1
make install
badvpn-udpgw --listen-addr 127.0.0.1:7300 > /dev/null &
Kemudian edit rc.local untuk membuat Auto startup:
nano /etc/rc.local
Masukan script berikut tepat diatas exit 0:
badvpn-udpgw --listen-addr 127.0.0.1:7300 > /dev/nul &
Cara Install Badvpn Di VPS Debian
simpan dengan  CRTL+X - Y dan SAVE (ENTER)

Terakhir Reboot Servernya:
shutdown -r now
Done...
Sudah selesai Tutorial Install Badvpn Di VPS Debian
READ MORE - Cara Install Badvpn Di VPS Debian

Cara Install Dropbear Di VPS Debian

Sekarang kita mencoba install dropbear pada Debian
Langsung mulai saja Tutorial Install Dropbear Di VPS Debian

  1. Anda harus akses VPS via ROOT
  2. Buka terminal XTREM
  3. Ikuti langkah2 berikut
Update dulu:
apt-get update
Install dropbear:
apt-get install dropbear
Install nano:
Jika sebelumnya sudah pernah install nano maka lewati saja langkah berikut:
apt-get install nano
Lanjut ke langkah selanjutnya
Edit config dropbear:
nano /etc/default/dropbear
Cari dan ubah:
NO_START=1
DROPBEAR_PORT=22
DROPBEAR_EXTRA_ARGS=
Menjadi:
NO_START=0
# DROPBEAR_PORT=22
DROPBEAR_EXTRA_ARGS="-p 443 -p 143 -p 109"
Tutorial Install Dropbear Di VPS Debian
Simpan dengan  CRTL+X - Y dan SAVE (ENTER)
Langkah Terakhir Restart Dropbearnya:
/etc/init.d/dropbear restart
Sudah selesai Tutorial Install Dropbear Di VPS Debian
READ MORE - Cara Install Dropbear Di VPS Debian