commit 4ab082ee33093aabb9a5772052c3253942d173c9
parent 4b2b5536950d626665f1215bcc1fb87832d4d202
Author: Jake Bauer <jbauer@paritybit.ca>
Date: Fri, 22 May 2020 22:56:10 -0400
Make changes necessary to compile pages with new script
Diffstat:
7 files changed, 46 insertions(+), 33 deletions(-)
diff --git a/pages/about.md b/pages/about.md
@@ -1,6 +1,6 @@
## About Me
-[//]: # "I am a student of computer science with a strong interest in computer security, networking, and low-level stuff. I enjoy programming, figuring out how systems work, and completing hacking challenges when I have/make the time."
+[//]: # "I am a student of computer science with a strong interest in computer security, networking, and low-level stuff. I enjoy programming, figuring out how systems work, and completing hacking challenges when I have the time."
[//]: # "main.min.css"
diff --git a/pages/blog/a-brief-review-of-fedora-32.md b/pages/blog/a-brief-review-of-fedora-32.md
@@ -62,9 +62,10 @@ Mastodon](https://social.paritybit.ca/web/statuses/104153133747326267) informed
me that there is a really easy way to make `dnf` faster. Just add the following
to your `/etc/dnf/dnf.conf`:_
-<pre><code>fastestmirror=true
+```ini
+fastestmirror=true
deltarpm=true
-</code></pre>
+```
_I've done this and it definitely makes it feel way faster; on par with the
other package managers as far as I can tell._
diff --git a/pages/blog/cat-v-considered-harmful.md b/pages/blog/cat-v-considered-harmful.md
@@ -1,6 +1,6 @@
## Cat -v Considered Harmful
-[//]: # "My thoughts after spending a long time looking through harmful.cat-v.org/software."
+[//]: # "My thoughts after spending a long time looking through harmful.cat-v.org."
[//]: # "main.min.css"
diff --git a/pages/blog/refining-my-neomutt-config.md b/pages/blog/refining-my-neomutt-config.md
@@ -27,8 +27,9 @@ One thing that I found annoying were `text/html` emails which relied so much on
image content they had to be viewed in their HTML form. I used to save the body
of these emails and then open them up in Firefox, but just by adding
-<pre><code>text/html; $BROWSER %s;
-</code></pre>
+```bash
+text/html; $BROWSER %s;
+```
to my `mailcap` file, I am able to open these bodies in Firefox from within
NeoMutt.
@@ -39,12 +40,13 @@ used on the command line, designed for use with mutt. This should make storing
and referring to my contacts easier than it used to be. The options that I used
in my `neomuttrc` are:
-<pre><code>set query_command="abook --mutt-query '%s'"
+```bash
+set query_command="abook --mutt-query '%s'"
macro index,pager a \
"<pipe-message>abook --add-email-quiet<return>" \
"Add this sender to abook"
-bind editor <Tab> complete-query
-</code></pre>
+bind editor <Tab> complete-query
+```
Some other minor changes include:
diff --git a/pages/blog/setting-up-gpg-keys-from-scratch.md b/pages/blog/setting-up-gpg-keys-from-scratch.md
@@ -4,7 +4,7 @@
[//]: # "main.min.css"
-[//]: # "Introduction; Generating the Master Key; Generating a Revocation Certificate; Generating Subkeys; Going Backup Crazy; Uploading My Keys to a Keyserver; Configuring GPG and GPG-Agent; Deleting My Master Key; Conclusion;"
+[//]: # "Introduction; Generating the Master Key; Generating a Revocation Certificate; Generating Subkeys; Going Backup Crazy; Uploading My Keys to a Keyserver; Configuring GPG and GPG-Agent; Deleting My Master Key; Conclusion"
<div class="byline">
<b>Written By:</b> Jake Bauer |
@@ -45,8 +45,9 @@ see myself realistically needing to do that.
Generating the master key is pretty straightforward.
-<pre><code>$ gpg --full-gen-key --expert
-</code></pre>
+```bash
+$ gpg --full-gen-key --expert
+```
`--expert` is required because I wanted to use [Elliptic Curve
Cryptography](https://en.wikipedia.org/wiki/Elliptic-curve_cryptography)
@@ -66,8 +67,9 @@ you use or trust this key." Unlike with subkeys, revoking a master key is much
more significant since, once that becomes compromised or lost, one has to start
again from scratch.
-<pre><code>$ gpg --gen-revoke --armor --output=revocation-certificate.asc <user-id>
-</code></pre>
+```bash
+$ gpg --gen-revoke --armor --output=revocation-certificate.asc <user-id>
+```
Where `<user-id>` in this case is the email I specified when generating my key:
`jbauer@paritybit.ca`.
@@ -83,9 +85,10 @@ they become compromised.
I generated one subkey specifically for signing and one subkey specifically for
encryption:
-<pre><code>$ gpg --edit-key --expert jbauer@paritybit.ca
+```bash
+$ gpg --edit-key --expert jbauer@paritybit.ca
>addkey
-</code></pre>
+```
I also set a one month expiry on both of those subkeys. While I think having an
expiring master key is overkill for my uses and would be too much hassle, having
@@ -110,25 +113,28 @@ data. I printed my revocation certificate directly since it's just a short bit
of ascii text and I printed out my master key using `paperkey`. Both of these
pieces of paper went into my fire- and water-proof storage bag.
-<pre><code>$ gpg --export-secret-key jbauer@paritybit.ca > privkey.gpg
+```bash
+$ gpg --export-secret-key jbauer@paritybit.ca > privkey.gpg
$ paperkey --secret-key privkey.gpg --output printed.txt
$ lpr printed.txt
$ rm privkey.gpg printed.txt
-</code></pre>
+```
I also made several digital copies of my private key. First, I exported my
master key using:
-<pre><code>$ gpg --export-secret-keys --armor jbauer@paritybit.ca > master.asc
-</code></pre>
+```bash
+$ gpg --export-secret-keys --armor jbauer@paritybit.ca > master.asc
+```
Then, using GPG's symmetric encryption capabilities, I encrypted both it and my
revocation certificate using a completely new, randomly generated passphrase:
-<pre><code>$ gpg -c master.asc
+```bash
+$ gpg -c master.asc
$ gpg -c revocation-certificate.asc
$ rm master.asc revocation-certificate.asc
-</code></pre>
+```
I then put both of the new encrypted files: `master.asc.gpg` and
`revocation-certificate.asc.gpg` onto two separate CDs—one went into my
@@ -158,7 +164,8 @@ This is pretty simple and straightforward. Taking a few notes from the Arch wiki
and setting options that I wanted to avoid having to type each time I ran `gpg`,
I came up with the following configuration files:
-<pre><code>gpg.conf
+```
+gpg.conf
--------
keyserver hkps://keys.openpgp.org
keyid-format long
@@ -167,16 +174,17 @@ with-subkey-fingerprint
personal-digest-preferences SHA512
cert-digest-algo SHA512
default-preference-list SHA512 SHA384 SHA256 SHA224 AES256 AES192 AES CAST5 ZLIB BZIP2 ZIP Uncompressed
-</code></pre>
+```
-<pre><code>gpg-agent.conf
+```
+gpg-agent.conf
--------------
# Cache for a day
max-cache-ttl 86400
default-cache-ttl 86400
# Use curses-based pinentry program
pinentry-program /usr/bin/pinentry-curses
-</code></pre>
+```
### Deleting My Master Key
@@ -185,15 +193,17 @@ can do daily tasks with just my subkeys. To make this make sense, I have to
delete my master key out of my keyring so it only exists offline until I need to
use it. Since GnuPGv2.1, this is fairly straightforward:
-<pre><code>$ gpg --list-keys --with-keygrip
-$ rm /media/jbauer/keys/gpg/private-keys-v1.d/<keygrip>.key
-</code></pre>
+```bash
+$ gpg --list-keys --with-keygrip
+$ rm /media/jbauer/keys/gpg/private-keys-v1.d/<keygrip>.key
+```
After decrypting it from one of my backups, I can then later restore this key
(which I'll have to do at least once a month) by re-importing it with:
-<pre><code>$ gpg --import master.asc
-</code></pre>
+```bash
+$ gpg --import master.asc
+```
### Conclusion
diff --git a/pages/projects/dnd/initiative.md b/pages/projects/dnd/initiative.md
@@ -1,4 +1,4 @@
-## D&D Initiative Tracker
+## DnD Initiative Tracker
[//]: # "A simple tool for keeping track of combat initiative in Dungeons and Dragons."
diff --git a/pages/projects/dnd/roll.md b/pages/projects/dnd/roll.md
@@ -1,4 +1,4 @@
-## D&D Simple Dice Roller
+## DnD Simple Dice Roller
[//]: # "A super simple dice roller for Dungeons and Dragons with every die from the d4 to the d20 to the dX."