<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.alpinelinux.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ianu</id>
	<title>Alpine Linux - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.alpinelinux.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ianu"/>
	<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/wiki/Special:Contributions/Ianu"/>
	<updated>2026-04-27T04:02:24Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.40.0</generator>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=DNSCrypt-Proxy&amp;diff=19992</id>
		<title>DNSCrypt-Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=DNSCrypt-Proxy&amp;diff=19992"/>
		<updated>2021-08-02T19:37:13Z</updated>

		<summary type="html">&lt;p&gt;Ianu: Updated configuration options for some existing and new features&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{TOC right}}&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
&lt;br /&gt;
This article provides a short guide to setting up a DNSCrypt-Proxy server on Alpine Linux.&lt;br /&gt;
&lt;br /&gt;
Also see [https://dnscrypt.info dnscrypt.info].  Source code on [https://github.com/jedisct1/dnscrypt-proxy github.com/jedisct1/dnscrypt-proxy]&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
* DNS traffic encryption and authentication. &lt;br /&gt;
* Supports DNSCrypt, DNS-over-HTTPS (DoH) using TLS 1.3, Anonymized DNS and Oblivious DoH (ODoH).&lt;br /&gt;
* Local DOH Server&lt;br /&gt;
* DNS query monitoring, with separate log files for regular and suspicious queries&lt;br /&gt;
* Filtering: block ads, malware, and other unwanted content. Compatible with all DNS services&lt;br /&gt;
* Time-based filtering, with a flexible weekly schedule&lt;br /&gt;
* Transparent redirection of specific domains to specific resolvers&lt;br /&gt;
* DNS caching, to reduce latency and improve privacy&lt;br /&gt;
and more... &lt;br /&gt;
&lt;br /&gt;
Both the dnscrypt and DoH protocols achieve the same goal of encrypting DNS traffic, keeping the data private from your ISP, or the owners of a public HotSpot.&lt;br /&gt;
It can be run on local machines, or setup as the DNS Resolver for a house, office, or any other size group; it scales well and uses minimal resources.&lt;br /&gt;
The user need not be concerned about &#039;choosing&#039; services with either dnscrypt or DoH protocols - dnscrypt-proxy can pick the fastest resolvers that meet criteria for logging and filtering.&lt;br /&gt;
Additionally, it supports protocols for tunneling requests using either Anonymized DNS or ODoH.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
Install the {{Pkg|dnscrypt-proxy}} package:&lt;br /&gt;
{{Cmd|apk add dnscrypt-proxy dnscrypt-proxy-openrc}}&lt;br /&gt;
&lt;br /&gt;
Also see [https://wiki.alpinelinux.org/wiki/Alpine_Linux_package_management Alpine Linux package management ].&lt;br /&gt;
&lt;br /&gt;
== Service commands ==&lt;br /&gt;
Enable the dnscrypt-proxy service so that it starts at boot:&lt;br /&gt;
{{Cmd|rc-update add dnscrypt-proxy}}&lt;br /&gt;
&lt;br /&gt;
Start the dnscrypt-proxy service immediately:&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy start}}&lt;br /&gt;
&lt;br /&gt;
{{Note|If you are running from RAM, ensure you save your settings using the &#039;lbu ci&#039; command as necessary. See [https://wiki.alpinelinux.org/wiki/Alpine_local_backup Alpine local backup].}}&lt;br /&gt;
{{Note|Configuration options are shown in &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. The file includes comments that explain many of the options.}}&lt;br /&gt;
Also see [https://wiki.alpinelinux.org/wiki/Alpine_Linux_Init_System Alpine Linux Init System].&lt;br /&gt;
&lt;br /&gt;
== Exposing the service on the local network ==&lt;br /&gt;
The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. Any line starting with &amp;quot;#&amp;quot; will be ignored by &#039;&#039;dnscrypt-proxy&#039;&#039;.&lt;br /&gt;
Replace&lt;br /&gt;
 listen_addresses = [&#039;127.0.0.1:53&#039;, &#039;[::1]:53&#039;]&lt;br /&gt;
With&lt;br /&gt;
 listen_addresses = [&#039;:53&#039;]&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
== Enable local DOH Server ==&lt;br /&gt;
This feature is available from version 2.0.34 onwards.&lt;br /&gt;
Firefox can be configured to use dnscrypt-proxy as a local DOH server.  To do this, a certifcate needs to be generated with&lt;br /&gt;
&lt;br /&gt;
{{Cmd|openssl req -x509 -nodes -newkey rsa:2048 -days 5000 -sha256 -keyout \&lt;br /&gt;
  localhost.pem -out localhost.pem}}&lt;br /&gt;
Then copy to the dnscrypt-proxy folder&lt;br /&gt;
{{Cmd|sudo cp localhost.pem /etc/dnscrypt-proxy}}&lt;br /&gt;
&lt;br /&gt;
Next, edit the main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. &lt;br /&gt;
Remove the &amp;quot;#&amp;quot; from the beginning of the following lines&lt;br /&gt;
&lt;br /&gt;
 [local_doh]&lt;br /&gt;
 listen_addresses = [&#039;:3000&#039;]&lt;br /&gt;
 path = &amp;quot;/dns-query&amp;quot;&lt;br /&gt;
 cert_file = &amp;quot;localhost.pem&amp;quot;&lt;br /&gt;
 cert_key_file = &amp;quot;localhost.pem&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In this example, the URL of the local DoH server will be &#039;&#039;&#039;https://&amp;lt;host ip address&amp;gt;:3000/dns-query&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Start by trying to open this full URL as a regular website with Firefox. The first time, Firefox will notice that the certificate is self-signed and complain about it. This is expected. Click &amp;quot;Advanced&amp;quot; and &amp;quot;I accept the risks&amp;quot;. This is okay, you are only going to connect to your own machine.&lt;br /&gt;
Next, type about:config in the URL bar, search for trr and make the following changes:&lt;br /&gt;
 Set network.trr.custom_uri and network.trr.uri to https://127.0.0.1:3000/dns-query&lt;br /&gt;
 Set network.trr.mode to 2&lt;br /&gt;
&lt;br /&gt;
Search for esni and make the following change:&lt;br /&gt;
 Set network.security.esni.enabled to true&lt;br /&gt;
&lt;br /&gt;
The ESNI specification and implementations in Firefox (and Chrome/Brave/Chromium) are still experimental, so it might break some websites.  Test if its working here https://www.cloudflare.com/ssl/encrypted-sni/  &lt;br /&gt;
(don&#039;t pay attention to the &amp;quot;Secure DNS&amp;quot; column, the green mark will only be shown when using Cloudflare).&lt;br /&gt;
&lt;br /&gt;
To disable, make the following changes:&lt;br /&gt;
 Set network.trr.mode to 0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Forwarding internal traffic to a local DNS server ==&lt;br /&gt;
You&#039;d want to do this if you use hostnames on your local network - normally this is managed by your home router.&lt;br /&gt;
The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. &lt;br /&gt;
Remove the &amp;quot;#&amp;quot; from the beginning of this line&lt;br /&gt;
 # forwarding_rules = &#039;/etc/dnscrypt-proxy/forwarding-rules.txt&#039;&lt;br /&gt;
 forwarding_rules = &#039;/etc/dnscrypt-proxy/forwarding-rules.txt&#039;&lt;br /&gt;
&lt;br /&gt;
The copy the example file &lt;br /&gt;
{{Cmd|cp /usr/share/dnscrypt-proxy/example-forwarding-rules.txt /etc/dnscrypt-proxy/forwarding-rules.txt}}&lt;br /&gt;
Then edit the file, and add a line for your local network.  If your network is configured as &amp;quot;.home&amp;quot;, and your home router is at 192.168.1.1 then add&lt;br /&gt;
 home 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Creating a Family Friendly DNS Service ==&lt;br /&gt;
Some providers have their own adult content blocking filters.  They don&#039;t all use the same system, so researching may be worthwhile.  The list of providers can be found here [https://dnscrypt.info/public-servers public-servers].&lt;br /&gt;
It might be unwise to select only one service in case it becomes unavailable. Edit &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039; and make an adjustment like this in the Global Settings&lt;br /&gt;
 # server_names = [&#039;scaleway-fr&#039;, &#039;google&#039;, &#039;yandex&#039;, &#039;cloudflare&#039;]&lt;br /&gt;
 server_names = [&#039;cleanbrowsing-family&#039;]&lt;br /&gt;
&lt;br /&gt;
Cloaking rules can also be used to mask certain URIs. For instance to redirect google to enforce safe search.  The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. &lt;br /&gt;
Remove the &amp;quot;#&amp;quot; from the beginning of this line&lt;br /&gt;
# cloaking_rules = &#039;cloaking-rules.txt&#039;&lt;br /&gt;
cloaking_rules = &#039;cloaking-rules.txt&#039;&lt;br /&gt;
&lt;br /&gt;
Then copy the example file &lt;br /&gt;
{{Cmd|cp /usr/share/dnscrypt-proxy/example-cloaking-rules.txt /etc/dnscrypt-proxy/cloaking-rules.txt}}&lt;br /&gt;
Then edit the file, and add the lines you like&lt;br /&gt;
 www.google.*             forcesafesearch.google.com&lt;br /&gt;
 www.youtube.com          restrictmoderate.youtube.com&lt;br /&gt;
 m.youtube.com            restrictmoderate.youtube.com&lt;br /&gt;
 youtubei.googleapis.com  restrictmoderate.youtube.com&lt;br /&gt;
 youtube.googleapis.com   restrictmoderate.youtube.com&lt;br /&gt;
 www.youtube-nocookie.com restrictmoderate.youtube.com&lt;br /&gt;
&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
== More General Filtering ==&lt;br /&gt;
More general filtering can be made based on properties of the server, for instance only choosing servers that don&#039;t log; google will log queries made to their servers, even encrypted ones.&lt;br /&gt;
This is explained here: [https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Configuration-Sources].&lt;br /&gt;
&lt;br /&gt;
A selection can be made on the following properties:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 # Use servers reachable over IPv4&lt;br /&gt;
 ipv4_servers = true&lt;br /&gt;
 &lt;br /&gt;
 # Use servers reachable over IPv6 -- Do not enable if you don&#039;t have IPv6 connectivity&lt;br /&gt;
 ipv6_servers = false&lt;br /&gt;
 &lt;br /&gt;
 # Use servers implementing the DNSCrypt protocol&lt;br /&gt;
 dnscrypt_servers = true &lt;br /&gt;
 &lt;br /&gt;
 # Use servers implementing the DNS-over-HTTPS protocol&lt;br /&gt;
 doh_servers = true&lt;br /&gt;
 &lt;br /&gt;
 # Do not use servers implementing the Oblivious DNS-over-HTTPS protocol&lt;br /&gt;
 odoh_servers = false&lt;br /&gt;
 &lt;br /&gt;
 # Server must support DNS security extensions (DNSSEC)&lt;br /&gt;
 require_dnssec = false&lt;br /&gt;
 &lt;br /&gt;
 # Server must not log user queries (declarative)&lt;br /&gt;
 require_nolog = true&lt;br /&gt;
 &lt;br /&gt;
 # Server must not enforce its own blacklist (for parental control, ads blocking...)&lt;br /&gt;
 require_nofilter = true&lt;br /&gt;
 &lt;br /&gt;
 # Skip resolvers incompatible with anonymization instead of using them directly&lt;br /&gt;
 skip_incompatible = false&lt;br /&gt;
&lt;br /&gt;
== Anonymized DNS and Oblivious DoH ==&lt;br /&gt;
Anonymized DNS is specified for the dnscrypt protocol; configuration is detailed here: [https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Anonymized-DNS]&lt;br /&gt;
&lt;br /&gt;
Anonymized DNS uses &#039;relays&#039; to pass on requests.  The request is encrypted first for the target resolver, and then for a &#039;relay&#039; node.  The relay has no knowledge of the request (since it&#039;s encrypted for the eventual resolver).  The resolver has no idea of the source of the request (since the source is the &#039;relay&#039;).  The response is similarly encrypted, so neither the relay nor the resolver are able to map queries to clients.&lt;br /&gt;
&lt;br /&gt;
Oblivious DoH achieves the same end for a variant of the DoH protocol and it&#039;s configuration is explained here: [https://github.com/DNSCrypt/dnscrypt-proxy/wiki/Oblivious-DoH]&lt;br /&gt;
&lt;br /&gt;
The referenced links are kept up to date with compliant servers and configuration options.&lt;br /&gt;
&lt;br /&gt;
[[Category:Networking]]&lt;/div&gt;</summary>
		<author><name>Ianu</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=DNSCrypt-Proxy&amp;diff=16706</id>
		<title>DNSCrypt-Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=DNSCrypt-Proxy&amp;diff=16706"/>
		<updated>2019-12-03T18:14:23Z</updated>

		<summary type="html">&lt;p&gt;Ianu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{TOC right}}&lt;br /&gt;
&lt;br /&gt;
= Overview =&lt;br /&gt;
&lt;br /&gt;
This article provides a short guide to setting up a DNSCrypt-Proxy server on Alpine Linux.&lt;br /&gt;
&lt;br /&gt;
Also see [https://dnscrypt.info dnscrypt.info].  Source code on [https://github.com/jedisct1/dnscrypt-proxy github.com/jedisct1/dnscrypt-proxy]&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
* DNS traffic encryption and authentication. Supports DNS-over-HTTPS (DoH) using TLS 1.3, and DNSCrypt.&lt;br /&gt;
* Local DOH Server&lt;br /&gt;
* DNS query monitoring, with separate log files for regular and suspicious queries&lt;br /&gt;
* Filtering: block ads, malware, and other unwanted content. Compatible with all DNS services&lt;br /&gt;
* Time-based filtering, with a flexible weekly schedule&lt;br /&gt;
* Transparent redirection of specific domains to specific resolvers&lt;br /&gt;
* DNS caching, to reduce latency and improve privacy&lt;br /&gt;
and more... &lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
Install the {{Pkg|dnscrypt-proxy}} package:&lt;br /&gt;
{{Cmd|apk add dnscrypt-proxy dnscrypt-proxy-openrc}}&lt;br /&gt;
&lt;br /&gt;
Also see [https://wiki.alpinelinux.org/wiki/Alpine_Linux_package_management Alpine Linux package management ].&lt;br /&gt;
&lt;br /&gt;
== Service commands ==&lt;br /&gt;
Enable the dnscrypt-proxy service so that it starts at boot:&lt;br /&gt;
{{Cmd|rc-update add dnscrypt-proxy}}&lt;br /&gt;
&lt;br /&gt;
Start the dnscrypt-proxy service immediately:&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy start}}&lt;br /&gt;
&lt;br /&gt;
{{Note|If you are running from RAM, ensure you save your settings using the &#039;lbu ci&#039; command as necessary. See [https://wiki.alpinelinux.org/wiki/Alpine_local_backup Alpine local backup].}}&lt;br /&gt;
{{Note|Configuration options are shown in &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. The file includes comments that explain many of the options.}}&lt;br /&gt;
Also see [https://wiki.alpinelinux.org/wiki/Alpine_Linux_Init_System Alpine Linux Init System].&lt;br /&gt;
&lt;br /&gt;
== Exposing the service on the local network ==&lt;br /&gt;
The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. Any line starting with &amp;quot;#&amp;quot; will be ignored by &#039;&#039;dnscrypt-proxy&#039;&#039;.&lt;br /&gt;
Replace&lt;br /&gt;
 listen_addresses = [&#039;127.0.0.1:53&#039;, &#039;[::1]:53&#039;]&lt;br /&gt;
With&lt;br /&gt;
 listen_addresses = [&#039;:53&#039;]&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
== Enable local DOH Server ==&lt;br /&gt;
This feature is available from version 2.0.34 onwards.&lt;br /&gt;
Firefox can be configured to use dnscrypt-proxy as a local DOH server.  To do this, a certifcate needs to be generated with&lt;br /&gt;
&lt;br /&gt;
{{Cmd|openssl req -x509 -nodes -newkey rsa:2048 -days 5000 -sha256 -keyout \&lt;br /&gt;
  localhost.pem -out localhost.pem}}&lt;br /&gt;
Then copy to the dnscrypt-proxy folder&lt;br /&gt;
{{Cmd|sudo cp localhost.pem /etc/dnscrypt-proxy}}&lt;br /&gt;
&lt;br /&gt;
Next, edit the main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. &lt;br /&gt;
Remove the &amp;quot;#&amp;quot; from the beginning of the following lines&lt;br /&gt;
&lt;br /&gt;
 [local_doh]&lt;br /&gt;
 listen_addresses = [&#039;:3000&#039;]&lt;br /&gt;
 path = &amp;quot;/dns-query&amp;quot;&lt;br /&gt;
 cert_file = &amp;quot;localhost.pem&amp;quot;&lt;br /&gt;
 cert_key_file = &amp;quot;localhost.pem&amp;quot;&lt;br /&gt;
&lt;br /&gt;
In this example, the URL of the local DoH server will be &#039;&#039;&#039;https://&amp;lt;host ip address&amp;gt;:3000/dns-query&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Start by trying to open this full URL as a regular website with Firefox. The first time, Firefox will notice that the certificate is self-signed and complain about it. This is expected. Click &amp;quot;Advanced&amp;quot; and &amp;quot;I accept the risks&amp;quot;. This is okay, you are only going to connect to your own machine.&lt;br /&gt;
Next, type about:config in the URL bar, search for trr and make the following changes:&lt;br /&gt;
 Set network.trr.custom_uri and network.trr.uri to https://127.0.0.1:3000/dns-query&lt;br /&gt;
 Set network.trr.mode to 2&lt;br /&gt;
&lt;br /&gt;
Search for esni and make the following change:&lt;br /&gt;
 Set network.security.esni.enabled to true&lt;br /&gt;
&lt;br /&gt;
The ESNI specification and implementations in Firefox (and Chrome/Brave/Chromium) are still experimental, so it might break some websites.  Test if its working here https://www.cloudflare.com/ssl/encrypted-sni/  &lt;br /&gt;
(don&#039;t pay attention to the &amp;quot;Secure DNS&amp;quot; column, the green mark will only be shown when using Cloudflare).&lt;br /&gt;
&lt;br /&gt;
To disable, make the following changes:&lt;br /&gt;
 Set network.trr.mode to 0&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Forwarding internal traffic to a local DNS server ==&lt;br /&gt;
You&#039;d want to do this if you use hostnames on your local network - normally this is managed by your home router.&lt;br /&gt;
The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. &lt;br /&gt;
Remove the &amp;quot;#&amp;quot; from the beginning of this line&lt;br /&gt;
 # forwarding_rules = &#039;/etc/dnscrypt-proxy/forwarding-rules.txt&#039;&lt;br /&gt;
 forwarding_rules = &#039;/etc/dnscrypt-proxy/forwarding-rules.txt&#039;&lt;br /&gt;
&lt;br /&gt;
The copy the example file &lt;br /&gt;
{{Cmd|cp /usr/share/dnscrypt-proxy/example-forwarding-rules.txt /etc/dnscrypt-proxy/forwarding-rules.txt}}&lt;br /&gt;
Then edit the file, and add a line for your local network.  If your network is configured as &amp;quot;.home&amp;quot;, and your home router is at 192.168.1.1 then add&lt;br /&gt;
 home 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Creating a Family Friendly DNS Service ==&lt;br /&gt;
Some providers have their own adult content blocking filters.  They don&#039;t all use the same system, so researching may be worthwhile.  The list of providers can be found here [https://dnscrypt.info/public-servers public-servers].&lt;br /&gt;
It might be unwise to select only one service in case it becomes unavailable. Edit &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039; and make an adjustment like this in the Global Settings&lt;br /&gt;
 # server_names = [&#039;scaleway-fr&#039;, &#039;google&#039;, &#039;yandex&#039;, &#039;cloudflare&#039;]&lt;br /&gt;
 server_names = [&#039;cleanbrowsing-family&#039;]&lt;br /&gt;
&lt;br /&gt;
Cloaking rules can also be used to mask certain URIs. For instance to redirect google to enforce safe search.  The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. &lt;br /&gt;
Remove the &amp;quot;#&amp;quot; from the beginning of this line&lt;br /&gt;
# cloaking_rules = &#039;cloaking-rules.txt&#039;&lt;br /&gt;
cloaking_rules = &#039;cloaking-rules.txt&#039;&lt;br /&gt;
&lt;br /&gt;
Then copy the example file &lt;br /&gt;
{{Cmd|cp /usr/share/dnscrypt-proxy/example-cloaking-rules.txt /etc/dnscrypt-proxy/cloaking-rules.txt}}&lt;br /&gt;
Then edit the file, and add the lines you like&lt;br /&gt;
 www.google.*             forcesafesearch.google.com&lt;br /&gt;
 www.youtube.com          restrictmoderate.youtube.com&lt;br /&gt;
 m.youtube.com            restrictmoderate.youtube.com&lt;br /&gt;
 youtubei.googleapis.com  restrictmoderate.youtube.com&lt;br /&gt;
 youtube.googleapis.com   restrictmoderate.youtube.com&lt;br /&gt;
 www.youtube-nocookie.com restrictmoderate.youtube.com&lt;br /&gt;
&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Networking]]&lt;/div&gt;</summary>
		<author><name>Ianu</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=DNSCrypt-Proxy&amp;diff=15857</id>
		<title>DNSCrypt-Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=DNSCrypt-Proxy&amp;diff=15857"/>
		<updated>2019-03-28T22:55:56Z</updated>

		<summary type="html">&lt;p&gt;Ianu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Overview =&lt;br /&gt;
&lt;br /&gt;
This article provides a short guide to setting up a DNSCrypt-Proxy server on Alpine Linux.&lt;br /&gt;
&lt;br /&gt;
Also see [https://dnscrypt.info dnscrypt.info].  Source code on [https://github.com/jedisct1/dnscrypt-proxy github.com/jedisct1/dnscrypt-proxy]&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
* DNS traffic encryption and authentication. Supports DNS-over-HTTPS (DoH) using TLS 1.3, and DNSCrypt.&lt;br /&gt;
* DNS query monitoring, with separate log files for regular and suspicious queries&lt;br /&gt;
* Filtering: block ads, malware, and other unwanted content. Compatible with all DNS services&lt;br /&gt;
* Time-based filtering, with a flexible weekly schedule&lt;br /&gt;
* Transparent redirection of specific domains to specific resolvers&lt;br /&gt;
* DNS caching, to reduce latency and improve privacy&lt;br /&gt;
and more... &lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
Install the {{Pkg|dnscrypt-proxy}} package:&lt;br /&gt;
{{Cmd|apk add dnscrypt-proxy dnscrypt-proxy-openrc}}&lt;br /&gt;
&lt;br /&gt;
Also see [https://wiki.alpinelinux.org/wiki/Alpine_Linux_package_management Alpine Linux package management ].&lt;br /&gt;
&lt;br /&gt;
== Service commands ==&lt;br /&gt;
Enable the dnscrypt-proxy service so that it starts at boot:&lt;br /&gt;
{{Cmd|rc-update add dnscrypt-proxy}}&lt;br /&gt;
&lt;br /&gt;
Start the dnscrypt-proxy service immediately:&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy start}}&lt;br /&gt;
&lt;br /&gt;
{{Note|If you are running from RAM, ensure you save your settings using the &#039;lbu ci&#039; command as necessary. See [https://wiki.alpinelinux.org/wiki/Alpine_local_backup Alpine local backup].}}&lt;br /&gt;
{{Note|Configuration options are shown in &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. The file includes comments that explain many of the options.}}&lt;br /&gt;
Also see [https://wiki.alpinelinux.org/wiki/Alpine_Linux_Init_System Alpine Linux Init System].&lt;br /&gt;
&lt;br /&gt;
== Exposing the service on the local network ==&lt;br /&gt;
The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. Any line starting with &amp;quot;#&amp;quot; will be ignored by &#039;&#039;dnscrypt-proxy&#039;&#039;.&lt;br /&gt;
Replace&lt;br /&gt;
 listen_addresses = [&#039;127.0.0.1:53&#039;, &#039;[::1]:53&#039;]&lt;br /&gt;
With&lt;br /&gt;
 listen_addresses = [&#039;:53&#039;]&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
== Forwarding internal traffic to a local DNS server ==&lt;br /&gt;
You&#039;d want to do this if you use hostnames on your local network - normally this is managed by your home router.&lt;br /&gt;
The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. &lt;br /&gt;
Remove the &amp;quot;#&amp;quot; from the beginning of this line&lt;br /&gt;
 # forwarding_rules = &#039;/etc/dnscrypt-proxy/forwarding-rules.txt&#039;&lt;br /&gt;
 forwarding_rules = &#039;/etc/dnscrypt-proxy/forwarding-rules.txt&#039;&lt;br /&gt;
&lt;br /&gt;
The copy the example file &lt;br /&gt;
{{Cmd|cp /usr/share/dnscrypt-proxy/example-forwarding-rules.txt /etc/dnscrypt-proxy/forwarding-rules.txt}}&lt;br /&gt;
Then edit the file, and add a line for your local network.  If your network is configured as &amp;quot;.home&amp;quot;, and your home router is at 192.168.1.1 then add&lt;br /&gt;
 home 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
== Creating a Family Friendly DNS Service ==&lt;br /&gt;
Some providers have their own adult content blocking filters.  They don&#039;t all use the same system, so researching may be worthwhile.  The list of providers can be found here [https://dnscrypt.info/public-servers public-servers].&lt;br /&gt;
It might be unwise to select only one service in case it becomes unavailable. Edit &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039; and make an adjustment like this in the Global Settings&lt;br /&gt;
 # server_names = [&#039;scaleway-fr&#039;, &#039;google&#039;, &#039;yandex&#039;, &#039;cloudflare&#039;]&lt;br /&gt;
 server_names = [&#039;cleanbrowsing-family&#039;]&lt;br /&gt;
&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;/div&gt;</summary>
		<author><name>Ianu</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=DNSCrypt-Proxy&amp;diff=15856</id>
		<title>DNSCrypt-Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=DNSCrypt-Proxy&amp;diff=15856"/>
		<updated>2019-03-28T22:53:02Z</updated>

		<summary type="html">&lt;p&gt;Ianu: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Overview =&lt;br /&gt;
&lt;br /&gt;
This article provides a short guide to setting up a DNSCrypt-Proxy server on Alpine Linux.&lt;br /&gt;
&lt;br /&gt;
Also see [https://dnscrypt.info dnscrypt.info].  Source code on [https://github.com/jedisct1/dnscrypt-proxy github.com/jedisct1/dnscrypt-proxy]&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
* DNS traffic encryption and authentication. Supports DNS-over-HTTPS (DoH) using TLS 1.3, and DNSCrypt.&lt;br /&gt;
* DNS query monitoring, with separate log files for regular and suspicious queries&lt;br /&gt;
* Filtering: block ads, malware, and other unwanted content. Compatible with all DNS services&lt;br /&gt;
* Time-based filtering, with a flexible weekly schedule&lt;br /&gt;
* Transparent redirection of specific domains to specific resolvers&lt;br /&gt;
* DNS caching, to reduce latency and improve privacy&lt;br /&gt;
and more... &lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
Install the {{Pkg|dnscrypt-proxy}} package:&lt;br /&gt;
{{Cmd|apk add dnscrypt-proxy dnscrypt-proxy-openrc}}&lt;br /&gt;
&lt;br /&gt;
Also see [https://wiki.alpinelinux.org/wiki/Alpine_Linux_package_management Alpine Linux package management ].&lt;br /&gt;
&lt;br /&gt;
== Service commands ==&lt;br /&gt;
Enable the dnscrypt-proxy service so that it starts at boot:&lt;br /&gt;
{{Cmd|rc-update add dnscrypt-proxy}}&lt;br /&gt;
&lt;br /&gt;
Start the dnscrypt-proxy service immediately:&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy start}}&lt;br /&gt;
&lt;br /&gt;
{{Note|If you are running from RAM, ensure you save your settings using the &#039;lbu ci&#039; command as necessary. See [https://wiki.alpinelinux.org/wiki/Alpine_local_backup Alpine local backup].}}&lt;br /&gt;
{{Note|Configuration options are shown in &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. The file includes comments that explain many of the options.}}&lt;br /&gt;
Also see [https://wiki.alpinelinux.org/wiki/Alpine_Linux_Init_System Alpine Linux Init System].&lt;br /&gt;
&lt;br /&gt;
== Exposing the service on the local network ==&lt;br /&gt;
The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. Any line starting with &amp;quot;#&amp;quot; will be ignored by &#039;&#039;dnscrypt-proxy&#039;&#039;.&lt;br /&gt;
Replace&lt;br /&gt;
 listen_addresses = [&#039;127.0.0.1:53&#039;, &#039;[::1]:53&#039;]&lt;br /&gt;
With&lt;br /&gt;
 listen_addresses = [&#039;:53&#039;]&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
== Forwarding internal traffic to a local DNS server ==&lt;br /&gt;
The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. Any line starting with &amp;quot;#&amp;quot; will be ignored by &#039;&#039;dnscrypt-proxy&#039;&#039;.&lt;br /&gt;
Remove the &amp;quot;#&amp;quot; from the beginning of this line&lt;br /&gt;
 # forwarding_rules = &#039;/etc/dnscrypt-proxy/forwarding-rules.txt&#039;&lt;br /&gt;
 forwarding_rules = &#039;/etc/dnscrypt-proxy/forwarding-rules.txt&#039;&lt;br /&gt;
&lt;br /&gt;
The copy the example file &lt;br /&gt;
{{Cmd|cp /usr/share/dnscrypt-proxy/example-forwarding-rules.txt /etc/dnscrypt-proxy/forwarding-rules.txt}}&lt;br /&gt;
Then edit the file, and add a line for your local network.  If your network is configured as &amp;quot;.home&amp;quot;, and your home router is at 192.168.1.1 then add&lt;br /&gt;
 home 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
== Creating a Family Friendly DNS Service ==&lt;br /&gt;
Some providers have their own adult content blocking filters.  They don&#039;t all use the same system, so researching may be worthwhile.  The list of providers can be found here [https://dnscrypt.info/public-servers public-servers].&lt;br /&gt;
It might be unwise to select only one service in case it becomes unavailable. Edit &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039; and make an adjustment like this in the Global Settings&lt;br /&gt;
 # server_names = [&#039;scaleway-fr&#039;, &#039;google&#039;, &#039;yandex&#039;, &#039;cloudflare&#039;]&lt;br /&gt;
 server_names = [&#039;cleanbrowsing-family&#039;]&lt;br /&gt;
&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;/div&gt;</summary>
		<author><name>Ianu</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=DNSCrypt-Proxy&amp;diff=15855</id>
		<title>DNSCrypt-Proxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=DNSCrypt-Proxy&amp;diff=15855"/>
		<updated>2019-03-28T22:52:10Z</updated>

		<summary type="html">&lt;p&gt;Ianu: Created page with &amp;quot;= Overview =  This article provides a short guide to setting up a DNSCrypt-Proxy server on Alpine Linux.  Also see [https://dnscrypt.info dnscrypt.info].  Source code on [http...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Overview =&lt;br /&gt;
&lt;br /&gt;
This article provides a short guide to setting up a DNSCrypt-Proxy server on Alpine Linux.&lt;br /&gt;
&lt;br /&gt;
Also see [https://dnscrypt.info dnscrypt.info].  Source code on [https://github.com/jedisct1/dnscrypt-proxy github.com/jedisct1/dnscrypt-proxy]&lt;br /&gt;
&lt;br /&gt;
= Features =&lt;br /&gt;
* DNS traffic encryption and authentication. Supports DNS-over-HTTPS (DoH) using TLS 1.3, and DNSCrypt.&lt;br /&gt;
* DNS query monitoring, with separate log files for regular and suspicious queries&lt;br /&gt;
* Filtering: block ads, malware, and other unwanted content. Compatible with all DNS services&lt;br /&gt;
* Time-based filtering, with a flexible weekly schedule&lt;br /&gt;
* Transparent redirection of specific domains to specific resolvers&lt;br /&gt;
* DNS caching, to reduce latency and improve privacy&lt;br /&gt;
and more... &lt;br /&gt;
&lt;br /&gt;
== Installation ==&lt;br /&gt;
Install the {{Pkg|dnscrypt-proxy}} package:&lt;br /&gt;
{{Cmd|apk add dnscrypt-proxy dnscrypt-proxy-openrc}}&lt;br /&gt;
&lt;br /&gt;
Also see [https://wiki.alpinelinux.org/wiki/Alpine_Linux_package_management Alpine Linux package management ].&lt;br /&gt;
&lt;br /&gt;
== Service commands ==&lt;br /&gt;
Enable the dnscrypt-proxy service so that it starts at boot:&lt;br /&gt;
{{Cmd|rc-update add dnscrypt-proxy}}&lt;br /&gt;
&lt;br /&gt;
List services to verify sshd is enabled:&lt;br /&gt;
{{Cmd|rc-status}}&lt;br /&gt;
&lt;br /&gt;
Start the dnscrypt-proxy service immediately:&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy start}}&lt;br /&gt;
&lt;br /&gt;
{{Note|If you are running from RAM, ensure you save your settings using the &#039;lbu ci&#039; command as necessary. See [https://wiki.alpinelinux.org/wiki/Alpine_local_backup Alpine local backup].}}&lt;br /&gt;
{{Note|Configuration options are shown in &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. The file includes comments that explain many of the options.}}&lt;br /&gt;
Also see [https://wiki.alpinelinux.org/wiki/Alpine_Linux_Init_System Alpine Linux Init System].&lt;br /&gt;
&lt;br /&gt;
== Exposing the service on the local network ==&lt;br /&gt;
The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. Any line starting with &amp;quot;#&amp;quot; will be ignored by &#039;&#039;dnscrypt-proxy&#039;&#039;.&lt;br /&gt;
Replace&lt;br /&gt;
 listen_addresses = [&#039;127.0.0.1:53&#039;, &#039;[::1]:53&#039;]&lt;br /&gt;
With&lt;br /&gt;
 listen_addresses = [&#039;:53&#039;]&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
== Forwarding internal traffic to a local DNS server ==&lt;br /&gt;
The main configuration file is &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039;. Any line starting with &amp;quot;#&amp;quot; will be ignored by &#039;&#039;dnscrypt-proxy&#039;&#039;.&lt;br /&gt;
Remove the &amp;quot;#&amp;quot; from the beginning of this line&lt;br /&gt;
 # forwarding_rules = &#039;/etc/dnscrypt-proxy/forwarding-rules.txt&#039;&lt;br /&gt;
 forwarding_rules = &#039;/etc/dnscrypt-proxy/forwarding-rules.txt&#039;&lt;br /&gt;
&lt;br /&gt;
The copy the example file &lt;br /&gt;
{{Cmd|cp /usr/share/dnscrypt-proxy/example-forwarding-rules.txt /etc/dnscrypt-proxy/forwarding-rules.txt}}&lt;br /&gt;
Then edit the file, and add a line for your local network.  If your network is configured as &amp;quot;.home&amp;quot;, and your home router is at 192.168.1.1 then add&lt;br /&gt;
 home 192.168.1.1&lt;br /&gt;
&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;br /&gt;
&lt;br /&gt;
== Creating a Family Friendly DNS Service ==&lt;br /&gt;
Some providers have their own adult content blocking filters.  They don&#039;t all use the same system, so researching may be worthwhile.  The list of providers can be found here [https://dnscrypt.info/public-servers public-servers].&lt;br /&gt;
It might be unwise to select only one service in case it becomes unavailable. Edit &#039;&#039;&#039;/etc/dnscrypt-proxy/dnscrypt-proxy.toml&#039;&#039;&#039; and make an adjustment like this in the Global Settings&lt;br /&gt;
 # server_names = [&#039;scaleway-fr&#039;, &#039;google&#039;, &#039;yandex&#039;, &#039;cloudflare&#039;]&lt;br /&gt;
 server_names = [&#039;cleanbrowsing-family&#039;]&lt;br /&gt;
&lt;br /&gt;
Then restart the service with&lt;br /&gt;
{{Cmd|/etc/init.d/dnscrypt-proxy restart}}&lt;/div&gt;</summary>
		<author><name>Ianu</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=Tutorials_and_Howtos&amp;diff=15854</id>
		<title>Tutorials and Howtos</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=Tutorials_and_Howtos&amp;diff=15854"/>
		<updated>2019-03-28T21:38:57Z</updated>

		<summary type="html">&lt;p&gt;Ianu: Added link for dnscrypt-proxy in &amp;#039;Other Servers&amp;#039;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:package_edutainment.svg|right|link=]]&lt;br /&gt;
{{TOC left}}&lt;br /&gt;
&#039;&#039;&#039;Welcome to Tutorials and Howtos, a place of basic and advanced configuration tasks for your Alpine Linux.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The tutorials are hands-on and the reader is expected to try and achieve the goals described in each step, possibly with the help of a good example. The output in one step is the starting point for the following step.&lt;br /&gt;
&lt;br /&gt;
Howtos are smaller articles explaining how to perform a particular task with Alpine Linux.&lt;br /&gt;
&lt;br /&gt;
We encourage people to send in both complete articles as well as requesting topics to be covered. If you think you have the skills and knowledge to write an Alpine Linux related article please do so on this Wiki. If you want to request a topic, please add your request in this page&#039;s [[Talk:Tutorials_and_Howtos|Discussion]].&lt;br /&gt;
&lt;br /&gt;
{{Clear}}&lt;br /&gt;
== Storage ==&lt;br /&gt;
&lt;br /&gt;
* [[Alpine local backup|Alpine local backup (lbu)]] &#039;&#039;(Permanently store your modifications in case your box needs reboot)&#039;&#039; &amp;lt;!-- Installation and Storage --&amp;gt;&lt;br /&gt;
** [[Back Up a Flash Memory Installation]] &amp;lt;!-- Installation and Storage --&amp;gt;&lt;br /&gt;
** [[Manually editing a existing apkovl]]&lt;br /&gt;
&lt;br /&gt;
* [[Setting up disks manually]] &amp;lt;!-- Installation and Storage --&amp;gt;&lt;br /&gt;
* [[Setting up a software RAID array]]&lt;br /&gt;
&amp;lt;!-- ** [[Setting up a /var partition on software IDE raid1]]  Obsolete, Installation and Storage --&amp;gt; &lt;br /&gt;
* [[Raid Administration]]&lt;br /&gt;
* [[Setting up encrypted volumes with LUKS]]&lt;br /&gt;
* [[Setting up LVM on LUKS]]&lt;br /&gt;
* [[Setting up Logical Volumes with LVM]]&lt;br /&gt;
** [[Setting up LVM on GPT-labeled disks]]&lt;br /&gt;
** [[Installing on GPT LVM]]&lt;br /&gt;
* [[Filesystems|Formatting HD/Floppy/Other]] &amp;lt;!-- just a stub --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Setting up iSCSI]]&lt;br /&gt;
** [[iSCSI Raid and Clustered File Systems]]&lt;br /&gt;
* [[Setting up NBD]]&lt;br /&gt;
* [[Setting up ZFS on LUKS]]&lt;br /&gt;
* [[High performance SCST iSCSI Target on Linux software Raid]] &#039;&#039;(deprecated)&#039;&#039; &amp;lt;!-- solution --&amp;gt;&lt;br /&gt;
* [[Linux iSCSI Target (TCM)]]&lt;br /&gt;
* [[Disk Replication with DRBD]] &amp;lt;!-- draft --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Burning ISOs]] &amp;lt;!-- just some links now --&amp;gt;&lt;br /&gt;
* [[Partitioning and Bootmanagers]]&lt;br /&gt;
* [[Migrating data]]&lt;br /&gt;
* [[Create a bootable SDHC from a Mac]]&lt;br /&gt;
* [[Alpine on ARM]]&lt;br /&gt;
&lt;br /&gt;
== Networking ==&lt;br /&gt;
&lt;br /&gt;
* [[Configure Networking]]&lt;br /&gt;
* [[Connecting to a wireless access point]]&lt;br /&gt;
* [[Bonding]]&lt;br /&gt;
* [[Vlan]]&lt;br /&gt;
* [[Bridge]]&lt;br /&gt;
* [[OpenVSwitch]]&lt;br /&gt;
* [[How to configure static routes]]&lt;br /&gt;
* [[Configure a Wireguard interface (wg)]]&lt;br /&gt;
&lt;br /&gt;
* [[Alpine Wall]] - [[How-To Alpine Wall]] - [[Alpine Wall User&#039;s Guide]] &#039;&#039;(a new firewall management framework)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [[PXE boot]]&lt;br /&gt;
&lt;br /&gt;
* [[Using serial modem]]&lt;br /&gt;
* [[Using HSDPA modem]]&lt;br /&gt;
* [[Setting up Satellite Internet Connection]]&lt;br /&gt;
* [[Using Alpine on Windows domain with IPSEC isolation]]&lt;br /&gt;
&lt;br /&gt;
* [[Setting up a ssh-server]] &#039;&#039;(Using ssh is a good way to administer your box remotely)&#039;&#039; &amp;lt;!-- Server and Networking --&amp;gt;&lt;br /&gt;
* [[How to setup a wireless access point]] &#039;&#039;(Setting up Secure Wireless AP w/ WPA encryption with bridge to wired network)&#039;&#039;&lt;br /&gt;
* [[Setting up a OpenVPN server with Alpine]] &#039;&#039;(Allowing single users or devices to remotely connect to your network)&#039;&#039;&lt;br /&gt;
&amp;lt;!-- [[Using Racoon for Remote Sites]] is a different VPN tunnelling method, but that article is just a stub --&amp;gt;&lt;br /&gt;
* [[Experiences with OpenVPN-client on ALIX.2D3]]  &amp;lt;!-- solution --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Generating SSL certs with ACF]] &amp;lt;!-- Generating SSL certs with ACF 1.9 --&amp;gt;&lt;br /&gt;
* [[Setting up unbound DNS server]]&lt;br /&gt;
* [[Setting up nsd DNS server]]&lt;br /&gt;
* [[TinyDNS Format]]&lt;br /&gt;
* [[Fault Tolerant Routing with Alpine Linux]] &amp;lt;!-- solution --&amp;gt;&lt;br /&gt;
* [[Freeradius Active Directory Integration]]&lt;br /&gt;
* [[Multi_ISP]] &#039;&#039;(Dual-ISP setup with load-balancing and automatic failover)&#039;&#039;&lt;br /&gt;
* [[OwnCloud]] &#039;&#039;(Installing OwnCloud)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [[Seafile: setting up your own private cloud]]&lt;br /&gt;
&lt;br /&gt;
== Post-Install ==&lt;br /&gt;
&amp;lt;!-- If you edit this, please coordinate with Installation#Post-Install and Developer_Documentation#Package_management.  Note that these three sections are not exact duplicates. --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Alpine Linux package management|Package Management (apk)]] &#039;&#039;(How to add/remove packages on your Alpine)&#039;&#039;&lt;br /&gt;
   &amp;lt;!-- [[Alpine Linux package management#Local_Cache|How to enable APK caching]] --&amp;gt;&lt;br /&gt;
** [[Comparison with other distros]]&lt;br /&gt;
* [[Alpine local backup|Alpine local backup (lbu)]] &#039;&#039;(Permanently store your modifications in case your box needs reboot)&#039;&#039;&lt;br /&gt;
** [[Back Up a Flash Memory Installation]] &amp;lt;!-- new --&amp;gt;&lt;br /&gt;
** [[Manually editing a existing apkovl]]&lt;br /&gt;
* [[Alpine Linux Init System|Init System (OpenRC)]] &#039;&#039;(Configure a service to automatically boot at next reboot)&#039;&#039;&lt;br /&gt;
** [[Multiple Instances of Services]]&lt;br /&gt;
   &amp;lt;!-- [[Writing Init Scripts]] --&amp;gt;&lt;br /&gt;
* [[Alpine setup scripts#setup-xorg-base|Setting up Xorg]]&lt;br /&gt;
* [[Upgrading Alpine]]&lt;br /&gt;
&amp;lt;!-- Obsolete&lt;br /&gt;
 [[Upgrading Alpine - v1.9.x]]&lt;br /&gt;
 [[Upgrading Alpine - CD v1.8.x]]&lt;br /&gt;
 [[Upgrading Alpine - HD v1.8.x]]&lt;br /&gt;
 [[Upgrade to repository main|Upgrading to signed repositories]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Setting up a ssh-server]] &#039;&#039;(Using ssh is a good way to administer your box remotely)&#039;&#039;&lt;br /&gt;
* [[setup-acf]] &#039;&#039;(Configures ACF (webconfiguration) so you can manage your box through https)&#039;&#039;&lt;br /&gt;
* [[Changing passwords for ACF|Changing passwords]]&lt;br /&gt;
* [[Ansible]] &#039;&#039;(Configuration management)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [[Enable Serial Console on Boot]]&lt;br /&gt;
&amp;lt;!-- Obsolete?&lt;br /&gt;
* [[Error message on boot: Address space collision: host bridge window conflicts with Adaptor ROM]]&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
* [[How to get regular stuff working]] &#039;&#039;some notes on need-to-know topics&#039;&#039;&lt;br /&gt;
* [[Installing Oracle Java]]&lt;br /&gt;
* [[Rsnapshot|Setting up periodic backups with &amp;lt;samp&amp;gt;rsnapshot&amp;lt;/samp&amp;gt;]]&lt;br /&gt;
&lt;br /&gt;
== Virtualization==&lt;br /&gt;
&lt;br /&gt;
* [[Xen Dom0]] &#039;&#039;(Setting up Alpine as a dom0 for Xen hypervisor)&#039;&#039;&lt;br /&gt;
* [[Xen Dom0 on USB or SD]]&lt;br /&gt;
* [[Create Alpine Linux PV DomU]]&lt;br /&gt;
* [[Xen PCI Passthrough]]&lt;br /&gt;
* [[Xen LiveCD]]&lt;br /&gt;
* [[qemu]]&lt;br /&gt;
* [[KVM]] &#039;&#039;(Setting up Alpine as a KVM hypervisor)&#039;&#039;&lt;br /&gt;
* [[LXC]] &#039;&#039;(Setting up a Linux container in Alpine Linux)&#039;&#039;&lt;br /&gt;
* [[Docker]]&lt;br /&gt;
* [[Install_Alpine_on_VirtualBox]]&lt;br /&gt;
&lt;br /&gt;
== Desktop Environment ==&lt;br /&gt;
&lt;br /&gt;
* [[Awesome(wm) Setup]]&lt;br /&gt;
* [[dwm]] &#039;&#039;(dynamic window manager for X)&#039;&#039;&lt;br /&gt;
* [[EyeOS]] &#039;&#039;(Cloud Computing Desktop)&#039;&#039;&lt;br /&gt;
* [[Gnome Setup]]&lt;br /&gt;
* [[MATE|MATE Setup]]&lt;br /&gt;
* [[Oneye]] &#039;&#039;(Cloud Computing Desktop - Dropbox Alternative)&#039;&#039;&lt;br /&gt;
* [[Owncloud]] &#039;&#039;(Cloud Computing Desktop - Dropbox Alternative)&#039;&#039;&lt;br /&gt;
** (to be merged with [[OwnCloud]] &#039;&#039;(Your personal Cloud for storing and sharing your data on-line)&#039;&#039;)&lt;br /&gt;
* [[Remote Desktop Server]]&lt;br /&gt;
* [[Suspend on LID close]]&lt;br /&gt;
* [[Sway]]&lt;br /&gt;
* [[XFCE Setup]] and [[Xfce Desktop|Desktop Ideas]]&lt;br /&gt;
* [[Installing Adobe flash player for Firefox]]&lt;br /&gt;
* [[Sound Setup]]&lt;br /&gt;
* [[Printer Setup]]&lt;br /&gt;
* [[Default applications]]&lt;br /&gt;
&lt;br /&gt;
== Raspberry Pi ==&lt;br /&gt;
&lt;br /&gt;
* [[Raspberry Pi|Raspberry Pi (Installation)]]&lt;br /&gt;
* [[Classic install or sys mode on Raspberry Pi]]&lt;br /&gt;
* [[RPI Video Receiver]] &#039;&#039;(network video decoder using Rasperry Pi and omxplayer)&#039;&#039;&lt;br /&gt;
* [[Linux Router with VPN on a Raspberry Pi]]&lt;br /&gt;
* [[Linux Router with VPN on a Raspberry Pi (IPv6)]]&lt;br /&gt;
* [[Raspberry Pi 3 - Configuring it as wireless access point -AP Mode]]&lt;br /&gt;
* [[Raspberry Pi 3 - Setting Up Bluetooth]]&lt;br /&gt;
* [[Raspberry Pi Zero W - Installation]]&lt;br /&gt;
&lt;br /&gt;
== PowerPC ==&lt;br /&gt;
&lt;br /&gt;
* [[Ppc64le|Powepc64le (Installation)]]&lt;br /&gt;
&lt;br /&gt;
== IBM Z (IBM z Systems) ==&lt;br /&gt;
&lt;br /&gt;
* [[s390x|s390x (Installation)]]&lt;br /&gt;
&lt;br /&gt;
== Applications ==&lt;br /&gt;
&lt;br /&gt;
=== Telephony ===&lt;br /&gt;
* [[Setting up Zaptel/Asterisk on Alpine]]&lt;br /&gt;
** [[Setting up Streaming an Asterisk Channel]]&lt;br /&gt;
* [[Freepbx on Alpine Linux]]&lt;br /&gt;
* [[FreePBX_V3]] &#039;&#039;(FreeSWITCH, Asterisk GUI web acces tool)&#039;&#039;&lt;br /&gt;
* [[2600hz]] &#039;&#039;(FreeSWITCH, Asterisk GUI web access tool)&#039;&#039;&lt;br /&gt;
* [[Kamailio]] &#039;&#039;(SIP Server, formerly OpenSER)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Mail ===&lt;br /&gt;
* [[Hosting services on Alpine]] &#039;&#039;(Hosting mail, webservices and other services)&#039;&#039;&lt;br /&gt;
** [[Hosting Web/Email services on Alpine]]&lt;br /&gt;
* [[ISP Mail Server HowTo]] &amp;lt;!-- solution, Mail --&amp;gt;&lt;br /&gt;
** [[ISP Mail Server Upgrade 2.x]]&lt;br /&gt;
** [[ISP Mail Server 2.x HowTo]] &#039;&#039;(Beta, please test)&#039;&#039;&lt;br /&gt;
** [[ISP Mail Server 3.x HowTo]]&lt;br /&gt;
* [[Roundcube]] &#039;&#039;(Webmail system)&#039;&#039;&lt;br /&gt;
* [[Setting up postfix with virtual domains]]&lt;br /&gt;
* [[Protecting your email server with Alpine]]&lt;br /&gt;
* [[Setting up clamsmtp]]&lt;br /&gt;
* [[Setting up dovecot with imap and ssl]]&lt;br /&gt;
* [[relay email to gmail (msmtp, mailx, sendmail]]&lt;br /&gt;
&lt;br /&gt;
=== HTTP ===&lt;br /&gt;
* [[Lighttpd]]&lt;br /&gt;
** [[Lighttpd Https access]]&lt;br /&gt;
** [[Setting Up Lighttpd with PHP]]&lt;br /&gt;
** [[Setting Up Lighttpd With FastCGI]]&lt;br /&gt;
* [[Cherokee]]&lt;br /&gt;
* [[Nginx]]&lt;br /&gt;
** [[Nginx_with_PHP#Nginx_with_PHP|Nginx with PHP]]&lt;br /&gt;
** [[Nginx as reverse proxy with acme (letsencrypt)]]&lt;br /&gt;
* [[Apache]]&lt;br /&gt;
** [[Apache with php-fpm]]&lt;br /&gt;
** [[Setting Up Apache with PHP]]&lt;br /&gt;
** [[Apache authentication: NTLM Single Signon]]&lt;br /&gt;
&lt;br /&gt;
* [[High Availability High Performance Web Cache]] &#039;&#039;(uCarp + HAProxy for High Availability Services such as Squid web proxy)&#039;&#039; &amp;lt;!-- solution, Server --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[Setting up Transparent Squid Proxy]] &amp;lt;!-- draft --&amp;gt;&lt;br /&gt;
** [[SqStat]] &#039;&#039;(Script to look at active squid users connections)&#039;&#039;&lt;br /&gt;
** [[Obtaining user information via SNMP]] &#039;&#039;(Using squark-auth-snmp as a Squid authentication helper)&#039;&#039; &amp;lt;!-- Networking and Server, &amp;lt;== Using squark-auth-snmp --&amp;gt;&lt;br /&gt;
* [[Setting up Explicit Squid Proxy]]&lt;br /&gt;
&lt;br /&gt;
* [[Drupal]] &#039;&#039;(Content Management System (CMS) written in PHP)&#039;&#039;&lt;br /&gt;
* [[WordPress]] &#039;&#039;(Web software to create website or blog)&#039;&#039;&lt;br /&gt;
* [[MediaWiki]] &#039;&#039;(Free web-based wiki software application)&#039;&#039;&lt;br /&gt;
* [[DokuWiki]]&lt;br /&gt;
* [[Darkhttpd]]&lt;br /&gt;
* [[Tomcat]]&lt;br /&gt;
&lt;br /&gt;
=== Other Servers ===&lt;br /&gt;
* [[Setting up a ssh-server]] &#039;&#039;(Using ssh is a good way to administer your box remotely)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [[Setting up a nfs-server]]&lt;br /&gt;
* [[Setting up a samba-server]] &#039;&#039;(standard file sharing)&#039;&#039;&lt;br /&gt;
* [[Setting up a samba-ad-dc]] &#039;&#039;(Active Directory compatible domain controller)&#039;&#039;&lt;br /&gt;
* [[Phpizabi]] &#039;&#039;(Social Networking Platform)&#039;&#039;&lt;br /&gt;
* [[Statusnet]] &#039;&#039;(Microblogging Platform)&#039;&#039;&lt;br /&gt;
* [[Pastebin]] &#039;&#039;(Pastebin software application)&#039;&#039;&lt;br /&gt;
* [[Setting up Transmission (bittorrent) with Clutch WebUI]]&lt;br /&gt;
&lt;br /&gt;
* [[Patchwork]] &#039;&#039;(Patch review management system)&#039;&#039;&lt;br /&gt;
* [[Redmine]] &#039;&#039;(Project management system)&#039;&#039;&lt;br /&gt;
* [[Request-Tracker]] &#039;&#039;(Ticket system)&#039;&#039;&lt;br /&gt;
* [[OsTicket]] &#039;&#039;(Ticket system)&#039;&#039;&lt;br /&gt;
* [[Setting up trac wiki|Trac]] &#039;&#039;(Enhanced wiki and issue tracking system for software development projects)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [[Cgit]]&lt;br /&gt;
** [[Setting up a git repository server with gitolite and cgit]] &amp;lt;!-- doesn&#039;t exist yet --&amp;gt;&lt;br /&gt;
* [[Roundcube]] &#039;&#039;(Webmail system)&#039;&#039;&lt;br /&gt;
* [[Glpi]] &#039;&#039;(Manage inventory of technical resources)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [[How to setup a Alpine Linux mirror]]&lt;br /&gt;
* [[Cups]]&lt;br /&gt;
* [[NgIRCd]] &#039;&#039;(Server for Internet Relay Chat/IRC)&#039;&#039;&lt;br /&gt;
* [[How To Setup Your Own IRC Network]] &#039;&#039;(Using {{Pkg|charybdis}} and {{Pkg|atheme-iris}})&#039;&#039;&lt;br /&gt;
* [[OpenVCP]] &#039;&#039;(VServer Control Panel)&#039;&#039;&lt;br /&gt;
* [[Mahara]] &#039;&#039;(E-portfolio and social networking system)&#039;&#039;&lt;br /&gt;
* [[Chrony and GPSD | Using chrony, gpsd, and a garmin LVC 18 as a Stratum 1 NTP source ]]&lt;br /&gt;
* [[Sending SMS using gnokii]]&lt;br /&gt;
* [[IPTV How To|Internet Protocol television (IPTV)]]&lt;br /&gt;
* [[UniFi_Controller]]&lt;br /&gt;
* [[DNSCrypt-Proxy]] &#039;&#039;Encrypt and authenticate DNS calls from your system&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Monitoring ===&lt;br /&gt;
* Setting up [[collectd]]&lt;br /&gt;
* [[Traffic monitoring]] &amp;lt;!-- Networking and Monitoring --&amp;gt;&lt;br /&gt;
* [[Setting up traffic monitoring using rrdtool (and snmp)]] &amp;lt;!-- Monitoring --&amp;gt;&lt;br /&gt;
* [[Setting up monitoring using rrdtool (and rrdcollect)]]&lt;br /&gt;
* [[Setting up Cacti|Cacti]] &#039;&#039;(Front-end for rrdtool networking monitor)&#039;&#039;&lt;br /&gt;
* [[LTTng]] &#039;&#039;(Kernel and userspace tracing)&#039;&#039;&lt;br /&gt;
* [[Setting up Zabbix|Zabbix]] &#039;&#039;(Monitor and track the status of network services and hardware)&#039;&#039;&lt;br /&gt;
* [[Setting up A Network Monitoring and Inventory System]] &#039;&#039;(Nagios + OpenAudit and related components)&#039;&#039; &amp;lt;!-- draft, solution, Networking and Monitoring and Server --&amp;gt;&lt;br /&gt;
** [[Setting up NRPE daemon]] &#039;&#039;(Performs remote Nagios checks)&#039;&#039; &amp;lt;!-- Networking and Monitoring --&amp;gt;&lt;br /&gt;
* [[Setting up Smokeping|Smokeping]] &#039;&#039;(Network latency monitoring)&#039;&#039; &amp;lt;!-- Networking and Monitoring --&amp;gt;&lt;br /&gt;
** [[Setting up MRTG and Smokeping to Monitor Bandwidth Usage and Network Latency]]&lt;br /&gt;
* [[Setting Up Fprobe And Ntop|Ntop]] &#039;&#039;(NetFlow collection and analysis using a remote fprobe instance)&#039;&#039; &amp;lt;!-- Networking and Monitoring --&amp;gt;&lt;br /&gt;
* [[Cvechecker]] &#039;&#039;(Compare installed packages for Common Vulnerabilities Exposure)&#039;&#039; &amp;lt;!-- Monitoring and Security --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [[IP Accounting]] &amp;lt;!-- Networking and Monitoring --&amp;gt;&lt;br /&gt;
* [[Obtaining user information via SNMP]] &#039;&#039;(Using squark-auth-snmp as a Squid authentication helper)&#039;&#039; &amp;lt;!-- Networking and Server, &amp;lt;== Using squark-auth-snmp --&amp;gt;&lt;br /&gt;
* [[SqStat]] &#039;&#039;(Script to look at active squid users connections)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [[Piwik]] &#039;&#039;(A real time web analytics software program)&#039;&#039;&lt;br /&gt;
* [[Awstats]] &#039;&#039;(Free log file analyzer)&#039;&#039;&lt;br /&gt;
* [[Intrusion Detection using Snort]]&lt;br /&gt;
** [[Intrusion Detection using Snort, Sguil, Barnyard and more]]&lt;br /&gt;
* [[Dglog]] &#039;&#039;(Log analyzer for the web content filter DansGuardian)&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* [[Webmin]] &#039;&#039;(A web-based interface for Linux system)&#039;&#039;&lt;br /&gt;
* [[PhpPgAdmin]] &#039;&#039;(Web-based administration tool for PostgreSQL)&#039;&#039;&lt;br /&gt;
* [[PhpMyAdmin]] &#039;&#039;(Web-based administration tool for MYSQL)&#039;&#039;&lt;br /&gt;
* [[PhpSysInfo]] &#039;&#039;(A simple application that displays information about the host it&#039;s running on)&#039;&#039;&lt;br /&gt;
* [[Linfo]]&lt;br /&gt;
&lt;br /&gt;
* [[Setting up lm_sensors]]&lt;br /&gt;
&lt;br /&gt;
* [[ZoneMinder video camera security and surveillance]]&lt;br /&gt;
&lt;br /&gt;
== Misc ==&lt;br /&gt;
&lt;br /&gt;
* [[:Category:Shell]]&lt;br /&gt;
* [[:Category:Programming]]&lt;br /&gt;
* [[Running glibc programs]]&lt;br /&gt;
* [[:Category:Drivers]]&lt;br /&gt;
* [[:Category:Multimedia]]&lt;br /&gt;
* [[Kernel Modesetting]]&lt;br /&gt;
* [[CPU frequency scaling]]&lt;br /&gt;
&lt;br /&gt;
== Complete Solutions ==&lt;br /&gt;
* [[DIY Fully working Alpine Linux for Allwinner and Other ARM SOCs]]&lt;br /&gt;
* [[Replacing non-Alpine Linux with Alpine remotely]]&lt;br /&gt;
* [[High performance SCST iSCSI Target on Linux software Raid]]&lt;br /&gt;
* [[Fault Tolerant Routing with Alpine Linux]]&lt;br /&gt;
* [[Experiences with OpenVPN-client on ALIX.2D3]]&lt;br /&gt;
* [[Building a cloud with Alpine Linux]]&lt;br /&gt;
&lt;br /&gt;
* [[ISP Mail Server HowTo]] &#039;&#039;(Postfix+PostfixAdmin+DoveCot+Roundcube+ClamAV+Spamd - A full-serivce ISP mail server)&#039;&#039;&lt;br /&gt;
** [[ISP Mail Server Upgrade 2.x]]&lt;br /&gt;
** [[ISP Mail Server 2.x HowTo]] &#039;&#039;(Beta, please test)&#039;&#039;&lt;br /&gt;
* [[High Availability High Performance Web Cache]] &#039;&#039;(uCarp + HAProxy for High Availability Services such as Squid web proxy)&#039;&#039;&lt;br /&gt;
* [[Setting up A Network Monitoring and Inventory System]] &#039;&#039;(Nagios + OpenAudit and related components)&#039;&#039; &amp;lt;!-- draft --&amp;gt;&lt;br /&gt;
* [[Streaming Security Camera Video with VLC]]&lt;br /&gt;
* [[Dynamic Multipoint VPN (DMVPN)]] combined with [[Small_Office_Services]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
This does not attempt to be complete. Is it useful to have these listed here? I find them more accessible if grouped with their topics; also, an up-to-date list of all Draft or Obsolete pages can be found at [[Project:Wiki maintenance]].&lt;br /&gt;
&lt;br /&gt;
== Drafts ==&lt;br /&gt;
Currently unfinished/works-in-progress.&lt;br /&gt;
* [[Using Racoon for Remote Sites]]&lt;br /&gt;
* [[Setting up Transparent Squid Proxy]] &#039;&#039;(Covers Squid proxy and URL Filtering system)&#039;&#039;&lt;br /&gt;
** [[Obtaining user information via SNMP]] &#039;&#039;(Using the Squark Squid authentication helper)&#039;&#039; [!-- no longer a draft --]&lt;br /&gt;
* [[Setting up Streaming an Asterisk Channel]]&lt;br /&gt;
* [[Setting up A Network Monitoring and Inventory System]] &#039;&#039;(Nagios + OpenAudit and related components)&#039;&#039;&lt;br /&gt;
* [[Intrusion Detection using Snort]] &#039;&#039;(Installing and configuring Snort and related applications on Alpine 2.0.x)&#039;&#039;&lt;br /&gt;
* [[IP Accounting]] &#039;&#039;(Installing and configuring pmacct for IP Accounting, Netflow/sFlow collector)&#039;&#039;&lt;br /&gt;
* [[Disk Replication with DRBD]]&lt;br /&gt;
--&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ianu</name></author>
	</entry>
</feed>