<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.alpinelinux.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jjamesjohnson</id>
	<title>Alpine Linux - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.alpinelinux.org/w/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jjamesjohnson"/>
	<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/wiki/Special:Contributions/Jjamesjohnson"/>
	<updated>2026-04-27T08:11:55Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.40.0</generator>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=Generating_SSL_certs_with_ACF&amp;diff=5192</id>
		<title>Generating SSL certs with ACF</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=Generating_SSL_certs_with_ACF&amp;diff=5192"/>
		<updated>2011-06-08T17:35:59Z</updated>

		<summary type="html">&lt;p&gt;Jjamesjohnson: /* Acf-openssl */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creating SSL certs using ACF=&lt;br /&gt;
You are in need of creating certificate for remote persons. You might use something like openvpn or racoon for your VPN services. But wouldn&#039;t it be nice to have some sort of way to manage and view all the certs you have given to everyone? Revoke the certs? Review the certificate before you issue it?&lt;br /&gt;
Alpine, via ACF, has a nice web interface to use for this sort of job...&lt;br /&gt;
&lt;br /&gt;
==Installation Process==&lt;br /&gt;
This will somewhat guide you through the process of creating this type of server. It is suggested to not host this on your VPN gateway, but use another machine to generate your certificates. &lt;br /&gt;
&lt;br /&gt;
===Install Alpine ===&lt;br /&gt;
Link below to the standard document...&lt;br /&gt;
&lt;br /&gt;
[[Installing_Alpine]]&lt;br /&gt;
&lt;br /&gt;
=== Install and Configure ACF ===&lt;br /&gt;
Run the following command:&lt;br /&gt;
This will install the web front end to Alpine Linux, called ACF.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;/sbin/setup-acf&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Install acf-openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;apk add acf-openssl&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Browse to your computer https://ipaddr/&lt;br /&gt;
&lt;br /&gt;
Login as root.&lt;br /&gt;
&lt;br /&gt;
Click on the User Management tab and create yourself an account.&lt;br /&gt;
&lt;br /&gt;
=== Acf-openssl ===&lt;br /&gt;
&lt;br /&gt;
From the navigation bar on the left, under the Applications section, click the Certificate Authority link.&lt;br /&gt;
&lt;br /&gt;
If you already have a CA that you would like to have the web interface manage you can upload it from the Status page (as a pfx).&lt;br /&gt;
&lt;br /&gt;
From the Status tab, Click Configure(to remove most of the error messages).&lt;br /&gt;
&lt;br /&gt;
If you do not have a CA, To generate a new CA certificate:&lt;br /&gt;
Click the Edit Defaults tab. Input the Items that will be needed for the CA and any other certs generated from it then Click Save. &lt;br /&gt;
Click the Status tab. Input values for the input boxes to generate a CA and click Generate.&lt;br /&gt;
&lt;br /&gt;
=== Generate a certificate with ACF ===&lt;br /&gt;
==== Request Form ====&lt;br /&gt;
Provided Fields:&lt;br /&gt;
* Country Name (2 letter abbreviation)&lt;br /&gt;
* Locality Name (e.g. city)&lt;br /&gt;
* Organization Name&lt;br /&gt;
* Common Name (eg, the certificate CN)&lt;br /&gt;
* Email Address&lt;br /&gt;
* Multiple Organizational Unit Name (eg, division)&lt;br /&gt;
* Certificate Type&lt;br /&gt;
&lt;br /&gt;
A box has been set aside for adding Additional x509 Extensions formatted the same as if you were to fill out a section directly in openssl.cnf. Section would be &lt;br /&gt;
&amp;lt;tt&amp;gt;[v3_req]&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You could put in here:&lt;br /&gt;
* subjectAltName =&amp;quot;IP:192.168.1.1&amp;quot;&lt;br /&gt;
* subjectAltName =&amp;quot;DNS:192.168.1.10&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is also where you would specify the CRL / OCSP distribution point, from where clients can query information:&lt;br /&gt;
* crlDistributionPoints=URI:http://whatever.com/whatever.crl&lt;br /&gt;
&lt;br /&gt;
Once this form has been filled out and the password entered click submit.&lt;br /&gt;
&lt;br /&gt;
==== View ====&lt;br /&gt;
Go to the View tab after you have the request form submitted. The view tab will show you pending requests for certificates. Also available from this tab are already approved requests (generated certs), revoked certs, and the CRL.&lt;br /&gt;
&lt;br /&gt;
For a Pending request, make sure to review the cert before approving it. Once you have verified that all the information is correct, with no mis-types or spelling mistakes, Approve the request. &lt;br /&gt;
&lt;br /&gt;
The file that will be generated can be downloaded from the ACF. Use the command lines below to extract the pkcs12 file into its part to begin using it.&lt;br /&gt;
&lt;br /&gt;
==== Extract PFX certificate ====&lt;br /&gt;
To get the CA CERT&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl pkcs12 -in PFXFILE -cacerts -nokeys -out cacert.pem&amp;lt;/tt&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
To get the Private Key&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl pkcs12 -in PFXFILE -nocerts -nodes -out mykey.pem&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To get the Certificate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl pkcs12 -in PFXFILE -nokeys -clcerts -out mycert.pem&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Display the cert or key readable/text format&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl x509 -in mycert.pem -noout -text&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OpenSSL command line to create your CA ====&lt;br /&gt;
The following command will need a password. Make sure to remember this.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl genrsa -des3 -out server.key 2048 &amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl req -new -key server.key -out server.csr&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl rsa -in server.key. -out server.pem&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl x509 -req -days 365 -in server.csr -signkey server.pem -out cacert.pem&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;mv server.pem /etc/ssl/private; mv cacert.pem /etc/ssl/&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Edits to /etc/ssl/openssl-ca-acf.cnf ===&lt;br /&gt;
Via the expert tab on ACF edit the openssl-ca-acf.cnf file. Something like subjectAltName can be added to be used by the certificates that you generate.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;3.subjectAltName        = Assigned IP Address &amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;3.subjectAltName_default = 192.168.1.1/32&amp;lt;/tt&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jjamesjohnson</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=Generating_SSL_certs_with_ACF&amp;diff=5191</id>
		<title>Generating SSL certs with ACF</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=Generating_SSL_certs_with_ACF&amp;diff=5191"/>
		<updated>2011-06-08T17:23:09Z</updated>

		<summary type="html">&lt;p&gt;Jjamesjohnson: /* View */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Creating SSL certs using ACF=&lt;br /&gt;
You are in need of creating certificate for remote persons. You might use something like openvpn or racoon for your VPN services. But wouldn&#039;t it be nice to have some sort of way to manage and view all the certs you have given to everyone? Revoke the certs? Review the certificate before you issue it?&lt;br /&gt;
Alpine, via ACF, has a nice web interface to use for this sort of job...&lt;br /&gt;
&lt;br /&gt;
==Installation Process==&lt;br /&gt;
This will somewhat guide you through the process of creating this type of server. It is suggested to not host this on your VPN gateway, but use another machine to generate your certificates. &lt;br /&gt;
&lt;br /&gt;
===Install Alpine ===&lt;br /&gt;
Link below to the standard document...&lt;br /&gt;
&lt;br /&gt;
[[Installing_Alpine]]&lt;br /&gt;
&lt;br /&gt;
=== Install and Configure ACF ===&lt;br /&gt;
Run the following command:&lt;br /&gt;
This will install the web front end to Alpine Linux, called ACF.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;/sbin/setup-acf&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Install acf-openssl&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;apk add acf-openssl&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Browse to your computer https://ipaddr/&lt;br /&gt;
&lt;br /&gt;
Login as root.&lt;br /&gt;
&lt;br /&gt;
Click on the User Management tab and create yourself an account.&lt;br /&gt;
&lt;br /&gt;
=== Acf-openssl ===&lt;br /&gt;
&lt;br /&gt;
Under the Applications section you should now have a Certificate Authority link. Click on this.&lt;br /&gt;
&lt;br /&gt;
It should open with the Status tab. You will see a lot of red error messages. Click Configure to configure the environment (and remove most of the error messages).&lt;br /&gt;
&lt;br /&gt;
If you already have a CA that you would like to have the web interface manage you can upload it from the Status page (as a pfx).&lt;br /&gt;
&lt;br /&gt;
To generate a new CA certificate:&lt;br /&gt;
Go to the Edit Defaults tab. Input the Items that will be needed for the CA and any other certs generated from it. &lt;br /&gt;
Click Save. &lt;br /&gt;
Go back to the Status tab. Input values for the input boxes to generate a CA.&lt;br /&gt;
Click Generate.&lt;br /&gt;
&lt;br /&gt;
=== Generate a certificate with ACF ===&lt;br /&gt;
==== Request Form ====&lt;br /&gt;
Provided Fields:&lt;br /&gt;
* Country Name (2 letter abbreviation)&lt;br /&gt;
* Locality Name (e.g. city)&lt;br /&gt;
* Organization Name&lt;br /&gt;
* Common Name (eg, the certificate CN)&lt;br /&gt;
* Email Address&lt;br /&gt;
* Multiple Organizational Unit Name (eg, division)&lt;br /&gt;
* Certificate Type&lt;br /&gt;
&lt;br /&gt;
A box has been set aside for adding Additional x509 Extensions formatted the same as if you were to fill out a section directly in openssl.cnf. Section would be &lt;br /&gt;
&amp;lt;tt&amp;gt;[v3_req]&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You could put in here:&lt;br /&gt;
* subjectAltName =&amp;quot;IP:192.168.1.1&amp;quot;&lt;br /&gt;
* subjectAltName =&amp;quot;DNS:192.168.1.10&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Here is also where you would specify the CRL / OCSP distribution point, from where clients can query information:&lt;br /&gt;
* crlDistributionPoints=URI:http://whatever.com/whatever.crl&lt;br /&gt;
&lt;br /&gt;
Once this form has been filled out and the password entered click submit.&lt;br /&gt;
&lt;br /&gt;
==== View ====&lt;br /&gt;
Go to the View tab after you have the request form submitted. The view tab will show you pending requests for certificates. Also available from this tab are already approved requests (generated certs), revoked certs, and the CRL.&lt;br /&gt;
&lt;br /&gt;
For a Pending request, make sure to review the cert before approving it. Once you have verified that all the information is correct, with no mis-types or spelling mistakes, Approve the request. &lt;br /&gt;
&lt;br /&gt;
The file that will be generated can be downloaded from the ACF. Use the command lines below to extract the pkcs12 file into its part to begin using it.&lt;br /&gt;
&lt;br /&gt;
==== Extract PFX certificate ====&lt;br /&gt;
To get the CA CERT&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl pkcs12 -in PFXFILE -cacerts -nokeys -out cacert.pem&amp;lt;/tt&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
To get the Private Key&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl pkcs12 -in PFXFILE -nocerts -nodes -out mykey.pem&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
To get the Certificate&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl pkcs12 -in PFXFILE -nokeys -clcerts -out mycert.pem&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Display the cert or key readable/text format&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl x509 -in mycert.pem -noout -text&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====OpenSSL command line to create your CA ====&lt;br /&gt;
The following command will need a password. Make sure to remember this.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl genrsa -des3 -out server.key 2048 &amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl req -new -key server.key -out server.csr&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl rsa -in server.key. -out server.pem&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;openssl x509 -req -days 365 -in server.csr -signkey server.pem -out cacert.pem&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;mv server.pem /etc/ssl/private; mv cacert.pem /etc/ssl/&amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Edits to /etc/ssl/openssl-ca-acf.cnf ===&lt;br /&gt;
Via the expert tab on ACF edit the openssl-ca-acf.cnf file. Something like subjectAltName can be added to be used by the certificates that you generate.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;3.subjectAltName        = Assigned IP Address &amp;lt;/tt&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tt&amp;gt;3.subjectAltName_default = 192.168.1.1/32&amp;lt;/tt&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jjamesjohnson</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=Pllua&amp;diff=5182</id>
		<title>Pllua</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=Pllua&amp;diff=5182"/>
		<updated>2011-06-02T14:16:15Z</updated>

		<summary type="html">&lt;p&gt;Jjamesjohnson: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;PL/Lua is an implementation of Lua as a loadable procedural language for PostgreSQL: with PL/Lua you can use PostgreSQL functions and triggers written in the Lua programming language.&lt;br /&gt;
&lt;br /&gt;
= How to Install and Use PL/Lua =&lt;br /&gt;
&lt;br /&gt;
# Install PL/Lua&lt;br /&gt;
 apk add pllua&lt;br /&gt;
# Install PL/Lua on your database.&lt;br /&gt;
 psql -U postgres -f /usr/share/postgresql/contrib/pllua.sql &amp;lt;DBNAME&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Official Documentation ==&lt;br /&gt;
&lt;br /&gt;
Official documentation is found at http://pllua.projects.postgresql.org/.&lt;br /&gt;
&lt;br /&gt;
== Additional Functions ==&lt;br /&gt;
&lt;br /&gt;
These functions may not be listed in other documentation, but were found by printing entries in _G in a PL/Lua trigger.&lt;br /&gt;
 _PLVERSION PL/Lua&lt;br /&gt;
 fromstring function:&lt;br /&gt;
 info function:&lt;br /&gt;
 log function:&lt;br /&gt;
 notice function:&lt;br /&gt;
 server table:&lt;br /&gt;
 setshared function:&lt;br /&gt;
 shared table:&lt;br /&gt;
 trigger table:&lt;br /&gt;
 warning function:&lt;/div&gt;</summary>
		<author><name>Jjamesjohnson</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=Pllua&amp;diff=5181</id>
		<title>Pllua</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=Pllua&amp;diff=5181"/>
		<updated>2011-06-02T14:14:42Z</updated>

		<summary type="html">&lt;p&gt;Jjamesjohnson: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= How to Install and Use PL/Lua =&lt;br /&gt;
PL/Lua is an implementation of Lua as a loadable procedural language for PostgreSQL: with PL/Lua you can use PostgreSQL functions and triggers written in the Lua programming language.&lt;br /&gt;
&lt;br /&gt;
# Install PL/Lua&lt;br /&gt;
 apk add pllua&lt;br /&gt;
# Install PL/Lua on your database.&lt;br /&gt;
 psql -U postgres -f /usr/share/postgresql/contrib/pllua.sql &amp;lt;DBNAME&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Official Documentation ==&lt;br /&gt;
&lt;br /&gt;
Official documentation is found at http://pllua.projects.postgresql.org/.&lt;br /&gt;
&lt;br /&gt;
== Additional Functions ==&lt;br /&gt;
&lt;br /&gt;
These functions may not be listed in other documentation, but were found by printing entries in _G in a PL/Lua trigger.&lt;br /&gt;
 _PLVERSION PL/Lua&lt;br /&gt;
 fromstring function:&lt;br /&gt;
 info function:&lt;br /&gt;
 log function:&lt;br /&gt;
 notice function:&lt;br /&gt;
 server table:&lt;br /&gt;
 setshared function:&lt;br /&gt;
 shared table:&lt;br /&gt;
 trigger table:&lt;br /&gt;
 warning function:&lt;/div&gt;</summary>
		<author><name>Jjamesjohnson</name></author>
	</entry>
	<entry>
		<id>https://wiki.alpinelinux.org/w/index.php?title=IGMPproxy&amp;diff=5180</id>
		<title>IGMPproxy</title>
		<link rel="alternate" type="text/html" href="https://wiki.alpinelinux.org/w/index.php?title=IGMPproxy&amp;diff=5180"/>
		<updated>2011-06-02T14:13:21Z</updated>

		<summary type="html">&lt;p&gt;Jjamesjohnson: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=IPTV How to=&lt;br /&gt;
Internet Protocol television (IPTV) is a system through which Internet television services are delivered using the architecture and networking methods of the Internet Protocol Suite over a packet-switched network infrastructure, e.g., the Internet and broadband Internet access networks, instead of being delivered through traditional radio frequency broadcast, satellite signal, and cable television (CATV) formats.&lt;br /&gt;
&lt;br /&gt;
==Installing tools==&lt;br /&gt;
Add alpine http repository to /etc/apk/repositories &lt;br /&gt;
 echo http://alpine.nethq.org/alpine/v1.9/packages/testing/ &amp;gt;&amp;gt; /etc/apk/repositories&lt;br /&gt;
Install igmpproxy&lt;br /&gt;
 apk add igmpproxy&lt;br /&gt;
Install iptables (optional, see troubleshooting)&lt;br /&gt;
 apk add iptables&lt;br /&gt;
==Setup igmpproxy==&lt;br /&gt;
Open /etc/igmpproxy.conf in your favorite editor&lt;br /&gt;
 nano /etc/igmpproxy.conf&lt;br /&gt;
&lt;br /&gt;
Set upstream interface to your WAN interface. In my case eth0&lt;br /&gt;
 phyint eth0 upstream  ratelimit 0  threshold 1&lt;br /&gt;
&lt;br /&gt;
If you know your ISPs multicast sources you should add them here. If not don&#039;t worry we&#039;ll come back here later.&lt;br /&gt;
 altnet 88.222.0.0/16&lt;br /&gt;
 altnet 10.0.0.0/8&lt;br /&gt;
&lt;br /&gt;
Set downstream interface to your LAN interface. In my case eth1&lt;br /&gt;
 phyint eth1 downstream  ratelimit 0  threshold 1&lt;br /&gt;
&lt;br /&gt;
Disable other unused interfaces&lt;br /&gt;
 phyint lo disabled&lt;br /&gt;
&lt;br /&gt;
If you haven&#039;t added multicast sources yet your igmpproxy.conf should look like this&lt;br /&gt;
 quickleave&lt;br /&gt;
 phyint eth0 upstream  ratelimit 0  threshold 1&lt;br /&gt;
 phyint eth1 downstream  ratelimit 0  threshold 1&lt;br /&gt;
 phyint lo disabled&lt;br /&gt;
&lt;br /&gt;
Launch igmpproxy in debug mode&lt;br /&gt;
 igmpproxy -d -v /etc/igmpproxy.conf&lt;br /&gt;
You should see output similar to this&lt;br /&gt;
 RECV Membership query   from 10.253.88.1     to 224.0.0.1&lt;br /&gt;
 RECV Membership query   from 10.254.88.1     to 224.0.0.1&lt;br /&gt;
 RECV V2 member report   from 88.222.27.35    to 239.255.255.250&lt;br /&gt;
Now we know that ISPs multicast sources are 10.x.x.x (10.0.0.0/8) and 88.222.x.x(88.222.0.0/16). We need to specify them in /etc/igmpproxy.conf right after upstream interface declaration like this&lt;br /&gt;
 phyint eth0 upstream  ratelimit 0  threshold 1&lt;br /&gt;
       altnet 88.222.0.0/16&lt;br /&gt;
       altnet 10.0.0.0/8&lt;br /&gt;
&lt;br /&gt;
Your complete igmpproxy.conf should look like this&lt;br /&gt;
 quickleave&lt;br /&gt;
 phyint eth0 upstream  ratelimit 0  threshold 1&lt;br /&gt;
         altnet 88.222.0.0/16&lt;br /&gt;
         altnet 10.0.0.0/8&lt;br /&gt;
 phyint eth1 downstream  ratelimit 0  threshold 1&lt;br /&gt;
 phyint lo disabled&lt;br /&gt;
&lt;br /&gt;
Launch igmpproxy and enjoy IPTV :)&lt;br /&gt;
 igmpproxy /etc/igmpproxy.conf&lt;br /&gt;
&lt;br /&gt;
==Troubleshooting==&lt;br /&gt;
* Make sure your local subnet is not same as your ISP&#039;s multicast source. 192.168.0.0/24 is probably safe bet.&lt;br /&gt;
* You might need to add forwarding rules to iptables&lt;br /&gt;
 iptables -I FORWARD -s 88.222.0.0/16 -d 224.0.0.0/4 -j ACCEPT&lt;br /&gt;
 iptables -I FORWARD -s 10.0.0.0/8 -d 224.0.0.0/4 -j ACCEPT&lt;br /&gt;
 iptables -I INPUT -d 224.0.0.0/4 -j ACCEPT&lt;br /&gt;
* If you&#039;re using shorewall modify /etc/shorewall/shorewall.conf&lt;br /&gt;
 MULTICAST=Yes&lt;br /&gt;
Add following rules to /etc/shorewall/rules&lt;br /&gt;
 ACCEPT		all		fw:224.0.0.0/4&lt;br /&gt;
 ACCEPT		all		net:224.0.0.0/4&lt;br /&gt;
 ACCEPT		all		loc:224.0.0.0/4&lt;/div&gt;</summary>
		<author><name>Jjamesjohnson</name></author>
	</entry>
</feed>