swaywm@fedora, mostly emacs for everything
Go to file
Frieder Schlesier b9871ea63e use apt instead of apt-get, looks nicer 2017-03-07 18:05:01 +01:00
.i3 add cliptit, show tray on lvds 2017-03-07 15:33:21 +01:00
.ssh add ssh config template 2017-03-07 17:30:42 +01:00
.urxvt/ext updates. colors, urxvt, font-size script 2016-05-30 18:00:06 +02:00
bin moar cleanup 2016-04-13 18:09:07 +02:00
etc/ssh add hostwide hardened etc/ssh/ssh_config 2017-03-07 17:48:12 +01:00
.Xdefaults updates. colors, urxvt, font-size script 2016-05-30 18:00:06 +02:00
.Xresources updates. colors, urxvt, font-size script 2016-05-30 18:00:06 +02:00
.aliases add docker volume aliases, stop xhost complaining on servers 2016-11-15 17:30:35 +01:00
.bashrc add docker volume aliases, stop xhost complaining on servers 2016-11-15 17:30:35 +01:00
.dockerfunc add pdflatex command 2017-01-11 16:54:13 +01:00
.gitconfig add gitlab user and merge-log 2017-03-07 18:02:07 +01:00
.gitignore ignore private stuff 2016-09-13 10:33:58 +02:00
.profile more updates 2015-12-26 12:05:14 +01:00
.tmux.conf more updates 2015-12-26 12:05:14 +01:00
.xsessionrc moar cleanup 2016-04-13 18:09:07 +02:00
20-thinkpad.conf more updates 2015-12-26 12:05:14 +01:00
LICENSE.md its not 2016 anymore 2017-01-19 23:18:52 +01:00
Makefile its not 2016 anymore 2017-01-19 23:18:52 +01:00
README.md add hostwide hardened etc/ssh/ssh_config 2017-03-07 17:48:12 +01:00
install.sh use apt instead of apt-get, looks nicer 2017-03-07 18:05:01 +01:00

README.md

fschl dotfiles

some stuff that makes my linux life more portable and comfortable. for debian, or debian-based distros. using i3wm.org on the desktop. also uses containers.

strongly inspired by awesome work by https://github.com/jessfraz

Notes

Security

Hardening ssh

add this to ~/.ssh/config:

# Ensure KnownHosts are unreadable if leaked - it is otherwise easier to know which hosts your keys have access to.
HashKnownHosts yes
# Host keys the client accepts - order here is honored by OpenSSH
HostKeyAlgorithms ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ssh-rsa,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256

KexAlgorithms curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256
MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com
Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr

generating keys

# RSA keys are favored over ECDSA keys when backward compatibility ''is required'',
# thus, newly generated keys are always either ED25519 or RSA (NOT ECDSA or DSA).
$ ssh-keygen -t rsa -b 4096 -f ~/.ssh/id_rsa_host_$(date +%Y-%m-%d) -C "Key to HOST for user-xyz"

# ED25519 keys are favored over RSA keys when backward compatibility ''is not required''.
# This is only compatible with OpenSSH 6.5+ and fixed-size (256 bytes).
$ ssh-keygen -t ed25519 -f ~/.ssh/id_ed25519_host_$(date +%Y-%m-%d) -C "Key to HOST for user-xyz"

GnuPG

~/.gnupg/gpg.conf:

# from https://wiki.mozilla.org/Security/Key_Management
personal-digest-preferences SHA512 SHA384
cert-digest-algo SHA256
default-preference-list SHA512 SHA384 AES256 ZLIB BZIP2 ZIP Uncompressed
keyid-format 0xlong

TODO

  • explain setup, ideas, practises
  • add HOWTO
  • seperate sources.list setup for server/desktop