OpenConnect is the Open Source alternative for the proprietary Cisco AnyConnect client. Our company is using the Cisco AnyConnect client along with PIN protected RSA Software Tokens for the authentication.
Looks like a complicated solution if you don’t have your corporate Windows client around; there’s no Cisco AnyConnect client for Linux with RSA Software Token support and the RSA application itself it’s only for Windows.
Guess what? It is not complicated at all and does not require WINE or any other tool to run the Windows app. It does not require the broken Cisco AnyConnect client either.
Update 10th June 2014: New instructions for new RSA Token Converter 3.0.
Update 10th October 2014: RSA Token Converter no longer needed.
Install the required software to import the token and the OpenConnect client itself:
# yum -y install NetworkManager-openconnect stoken-cli stoken-gui
If you’re using RHEL or CentOS up to 6.3 please reboot your system as the bundled NetworkManager is not able to reload plugins through dbus; otherwise if you’re running Fedora or RHEL/CentOS 6.4 or later you can directly proceed.
Use stoken to import your token, choosing between the various options:
$ stoken import --token 2000123456... $ stoken import --token com.rsa.securid.iphone://ctf?ctfData=2000123456... $ stoken import --file mytoken.sdtid
Leave blank for the password request if you don’t want to password protect your token. Launch the command line program or the graphical program to get the passcode. The pin must be identical to the one you’ve set when first connecting to the VPN; otherwise the generated passcode will not match with the one generated on the VPN server:
$ stoken Enter PIN: 1234 32031342
Alternatively you can use the GTK based
Remove token PIN
To further speed up things; you can issue the following command to remove the pin request when opening the token (both command line and graphical):
$ stoken setpin Enter new PIN: 1234 Confirm new PIN: 1234 $ stoken 32031342
Create a new OpenConnect VPN through the VPN wizard of NetworkManager; the only required parameter is the server name.
If you have at least Fedora 20 or (probably) RHEL 7 with NetworkManager-openconnect 0.9.8 you can also paste the RSA Soft Token in the text box or use the Stoken file for passcode generation.
Upon connection, you will be asked your username and RSA passcode. If you have enabled Soft Token integration with the PIN saved in
~/.stokenrc you will be asked only the username.
Initiating the connection from the command line can be used as well. This method also enables you to avoid entering the PIN; offering the same functionality as NetworkManager-openconnect 9.8.0 on all Fedora releases and CentOS/RHEL 6:
sudo cp ~/.stokenrc /root sudo openconnect --token-mode=rsa vpn.example.com
Pretty easy, huh?
I’ve updated the Steam repository with Fedora 20 packages and removed Fedora 17 bits from the SPEC files since it has now gone EOL.
Fedora 19 and up now have SDL 2 in the main repositories; though the Steam client it’s shipping it’s own library that cannot be deleted or it will get downloaded again upon the client startup.
Enabling Cisco WebEx on a Fedora system is actually a lot easier than it looks by searching on Google. Pretty usual uh? Every time you look for something Linux related, a plethora of posts tell you that you need to compile, download, hack and modify.
This was probably true 10 years ago, but now setting up everything is much more easier than it sounds and usually involves a couple of settings and a couple of packages.
These are the steps required to setup Cisco WebEx on a Fedora 19 system; whether it be x86_64 or i686:
# yum install icedtea-web java-1.8.0-openjdk \ pangox-compat.i686 libXmu.i686 libgcj.i686 mesa-libEGL.i686 \ gtk2.i686 libpng2.i686 # setsebool -P unconfined_mozilla_plugin_transition=off mmap_low_allowed=on
The first packages are by good chance already installed on your system and should be the same of your system architecture; while the others need always to be the i686 variant as the WebEx program is compiled for 32 bit processors.
30th October 2013:
Updated information with additional packages for latest WebEX update.
8th January 2014:
As reported in the comments, due to recent Mesa updates, if you don’t have Mesa’s libEGL installed you have to add it. Added to the list of packages required for installation.
I was notified I can not use Fedora Koji builders for doing personal builds of Fedora forbidden items. This means I have to drop the following architectures from the repositories:
- CentOS/RHEL 5 – ppc
- CentOS/RHEL 5 – ppc64
- Fedora 20 – armv7hl
I don’t have any hardware (or access) to any system like those; so my only chance is to drop support for them. All those architectures are bound to disappear from the repositories with the next round of updates.
New version 3.01a17 has been released. Starting from this version packages are built with all architectures enabled; this means that Fedora 20 has inherited
armv7hl support and CentOS/RHEL 6 and CentOS/RHEL 5 have now respectively
Along with the update, all Fedora 17 packages have been removed now that the distribution has gone EOL.
Nvidia repository has finally received the armv7hl builds and patches for kernel 3.10. I’ve added a new table that depicts the supported functionalities by distribution.
|Operating system||el6 / el7||f29 / f30||f31|
|Driver branch||Long Lived||Short Lived|
|Video Codec SDK||9.0.20||9.0.20||9.0.20|
|Basic nvidia driver:|
|CUDA libraries and tools:|
|OpenGL Framebuffer Capture:|
|32 bit compatibility on x86_64:|
Rooting the Zopo C2/ZP980 device requires the execution of a local executable that grants you root access to the phone.
The procedure here depicts using Fedora for rooting the phone; to do the same on Windows or on another platform make sure to have appropriate drivers and adb (Android Debug Bridge) installed. The procedure is much more simple than most people try to do and it does not involve shitty Windows graphical programs and a plethora of different tools installed on the phone.
Install Android tools on the system
Super easy task for Fedora:
yum -y install android-tools
Enable USB debugging on the system
To enable the development menu, go to System Settings, About Phone and tap repeatedly the Android version field. A new menu under System Settings called Developer Options should appear.
Under Developer Options flag USB debugging.
Download the hack
Getting root access.
Connect the phone to the USB cable, make sure the phone is NOT in USB mass storage mode (MTP or CDROM work fine) and launch the following commands from the folder where you unpacked the previous archive:
adb push su /data/local/tmp/ adb push pwn /data/local/tmp/
Then launch a shell on the phone:
And then these commands:
cd /data/local/tmp chmod 0755 ./pwn ./pwn mount -o rw,remount /emmc@android /system cp su /system/bin/ chmod 6755 /system/bin/su cp su /system/xbin/ chmod 6755 /system/xbin/su mount -o ro,remount /emmc@android /system
Voilà, the phone is rooted. Make sure to install any Superuser app from the Play Store. My preference is for the Superuser app from the Clockworkmod / RomManager developer.
Now you can replace the super ugly boot animation and logo. Just make sure to delete or replace the following files:
I’ve prepared a custom boot animation that only prints the Zopo logo without the stupid music and the animation. It takes less time to boot and is much more sober. You can download it here.
Installing ClockWorkMod Recovery
Again this does not involve Windows graphical programs, a plethora of different tools, etc. you just need to download the file and overwrite a specific partition on the flash. Too simple, huh?
First of all download the custom ClockWorkMod recovery from here and unpack it somewhere; then push the recover image file to the SD card:
adb push recovery.img /storage/sdcard0/
After this launch a shell on the phone:
And then flash the recovery partition:
shell@android:/ $ su shell@android:/ # dd if=/storage/sdcard0/recovery.img of=/dev/recovery shell@android:/ # exit shell@android:/ $ exit
After this, just reboot into your new recovery image.
adb reboot recovery
Plase note, that after flashing a custom recovery image you can not apply Off the Air (OTA) updates anymore. The wireless update creates files that are not compatible with the custom recovery image, even if you attempt to manually flash them.
To revert back to the original custom recovery image, download your original firmware from the Zopo website and use the above procedure to flash the original
Guacamole is an HTML5 remote desktop gateway. Guacamole provides access to desktop environments using remote desktop protocols like VNC and RDP. A centralized server acts as a tunnel and proxy, allowing access to multiple desktops through a web browser.
No browser plugins are needed, and no client software needs to be installed. The client requires nothing more than a web browser supporting HTML5 and AJAX.
More information at the Guacamole homepage.
There are two parts of which the Guacamole suite is made of; the native server components that should go on the system making the connections to the target machines and the client component (the web interface) that can reside on the same system of the server components or on a separate system.
The proxy required by the web application,
guacd, is part of
guacamole-server and built along with
libguac and all protocol support by the
guacamole-client must be installed for Guacamole to work. No software needs to be installed on any client machine.
RHEL/CentOS and Fedora package status
All Guacamole components are already available in the main Fedora repositories and can be easily installed without any additional repository.
RHEL/CentOS needs the EPEL repository to be enabled and only contain the server components as the full Maven stack required to build the web application is not available in Fedora. For this reason, installing on RHEL/CentOS requires you to put the war package in the appropriate folder on the system.
Supported disitribution summary:
- Proxy daemon (CentOS/RHEL 6 and Fedora)
- SSH plugin (CentOS/RHEL 6 and Fedora)
- RDP plugin with sound and printing support (CentOS/RHEL 6 and Fedora)
- VNC plugin (CentOS/RHEL 6) with VNC repeater support (Fedora)
- Web application (CentOS/RHEL 6 from the upstream provided war file, Fedora from the repositories)
All supported desktop protocols can be installed all together or separate from each other. Examples below assume you want to install all Guacamole software (client & server) on the same system with all the protocols available.
Installing the server components
This applies to both Fedora and CentOS/RHEL. Launch the following commands to install the server components; this will pull in all server components:
yum -y install guacd libguac-client-*
Do not forget to enable the services. On Fedora:
systemctl enable guacd
chkconfig guacd on
Installing the client components (web application)
In Fedora, launch the following commands to install the main Guacamole web application. This will pull in Tomcat and all the required Java dependencies:
yum -y install guacamole
Enable it at boot:
systemctl enable tomcat
And then configure it. In Fedora, all configuration files are stored in the
/etc/guacamole/ path. Just edit those files following the explanation in the configuring Guacamole manual section.
Launch the following commands to install Tomcat. This will pull in all the required Java dependencies:
yum -y install tomcat6
Enable it at boot:
chkconfig tomcat6 on
Then you need to download the main Guacamole web application archive from the Guacamole homepage. Place the downloaded war file in
/var/libt/tomcat6/webapps for Tomcat consumption.
mv guacamole-0.8.3.war /var/lib/tomcat6/webapps/guacamole.war
Then you need to find a place to put the configuration files according to the configuring Guacamole manual section. This can be time consuming and quite tricky until you get the configuration right; but after a while it’s very easy.
My personal preference would be to put the files
/etc/guacamole/ like in Fedora and make sure that the Tomcat service can find the files according to the manual. To do so; issue the following commands:
mkdir -p /etc/guacamole echo "export GUACAMOLE_HOME=/etc/guacamole" > /etc/profile.d/guacamole.sh echo "setenv GUACAMOLE_HOME /etc/guacamole" > /etc/profile.d/guacamole.csh chcon system_u:object_r:bin_t:s0 /etc/profile.d/guacamole.*
Once all it’s configured, running it it’s pretty simple. First of all, start all the services.
systemctl start guacd systemctl start tomcat
service guacd start service tomcat6 start
Then point your browser to the Tomcat deployed application. If you’ve not modified Tomcat default configuration the URL is:
Try to login; if you get an “Invalid user” error just look at the Tomcat logs. From my experience it’s usually a configuration problem.