Configurando un dispositivo bluetooth en Fedora

Comprobamos que el modulo de bluetooth está activo.

$ lsmod | grep btusb
btusb 32376 0
bluetooth 486188 6 bnep,btusb

Instalamos el software correspondiente. He visto que deberían estar instalados estos paquetes: bluez, gnome-bluetooth-libs, bluez-hcidump, bluez-hid2hci, pulseaudio-module-bluetooth.

Usamos la aplicación bluetooth-wizard para realizar la configuración de los dispositivos bluetooth.

Vamos si está activo o no bluetooth por linea de comandos:

$ rfkill list
0: Toshiba Bluetooth: Bluetooth
Soft blocked: yes
Hard blocked: no
1: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no

¡Bingo! “Soft blocked” de Bluetooth está bloquado. Procedemos a desbloquearlo usando rfkill (Herramienta que hace justo eso, habilitar y deshabilitar dispositivos)

rfkill unblock 0

$ rfkill list
0: Toshiba Bluetooth: Bluetooth
Soft blocked: no
Hard blocked: no
1: phy0: Wireless LAN
Soft blocked: no
Hard blocked: no
6: hci0: Bluetooth
Soft blocked: yes
Hard blocked: no

$ rfkill unblock 6

Y ahora ya sí que podemos proceder a la configuración de mi altavoz bluetooth.

Nota: He tenido que desmarcar la opción de gestión de pin a la hora de vincular el dispositivo.

Summary of the Outreach Program for Women

I’ve just finished my Outreach Program for Women in a Linux kernel project. The last months were amazing. I’ve learnt about development, network, security network, network protocols and more things. I’ve enjoyed it!

I did my OPW into the Netfilter Project. I’m working in Nftable project. Nftables is the project that aims to replace the existing iptables framework.

These are my accomplishments:

* I did the automated regression testing of nftables. This let us check the input of rules of nft-tool from the command-line and the output from nft-tool of this rule. Then, It compares if the rule input matches the rule output automatically. And, the most important thing: It does it automatically. Also, I found a lot of bugs that I reported in the Netfilter project’s bugzilla.

tests: Add Automated regression testing.
tests: Add ip6 folder with test files.
tests: Add inet folder with test files.
tests: Add any folder with test files.
tests: Add arp folder with test files.
tests: Add bridge folder with test files.

* Refactoring and adding some improvements in the libnftnl (libnftnl is a userspace library providing a low-level netlink programming interface (API) to the in-kernel nf_tables subsystem. The library libnftnl has been previously known as libnftables).
[In this blog: XML and JSON in nftables] [All patchs were accepted in libnftnl]

* Add support in nftables tool (and in libnftnl and in kernel) to the following iptables-extension: pkttype, cpu, groupdev and phydev. (Some of these are still finishing)

[and more]

* I made my first talk in English, in The 2014 Netfilter Workshop.

* I was the first girl in a Netfilter workshop.

Plans for the future:
I’d like continue contributing to Open Source (in Netfilter project and other open-source projects) and help other women into free software development.

Thanks a lot Marina Zhurakhinskaya, Karen Sandler and Sarah Sharp for this chance. These days were amazing and I’ve learnt a lot! 🙂 I’m so happy. ….and Thanks Pablo Neira for being my mentor during this intership

The Netfilter User’s day in the 2014 Netfilter Workshop in Twitter

Amazing days in the 2014 Netfilter Workshop

It finished the 2014 Netfilter Workshop. It was amazing and very interesting for me. I’d been in Lyon before this was my first visit to Montpellier in France. This meeting was co-hosted by 15èmes Rencontres Mondiales du Logiciel Libre, the biggest event of free software in France with more than 300 conferences and workshops.

I arrived on Sunday 6th of July, one day before the workshop, and I visited some stands of Open source projects in the “Esplanade Charles-de-Gaulle” of the 15èmes Rencontres Mondiales du Logiciel Libre. There was a conference of Richard Stallman about the history of Free Software.

On monday, It was the Netfilter’s User day. There were a set of talks about DDoS protection using Netfilter/iptables, nft-sync, Nftables and IPS, Netfilter logging at the nftables age, Suricata IDS/IPS, Zorp and kzorp and Vuurmuur. In my opinion, the most important and interesting talk that day was “nftables: a new packet classification framework for Linux” by Pablo Neira, the maintainer of Netfilter project. Nftables is the new packet classification framework that intends to replace the existing {ip,ip6,arp,eb}_tables infrastructure. It’s the future. 🙂

Tuesday and Wednesday were the first days of the Netfilter’s developers days. They passed with interesting talks, an important debates and decision making about the Netfilter project, their projects and related technologies. Those days, we spoke about netfilter updates with a short summary on the Netfilter kernel changes since the last workshop, achievement unlocked, OVS MPLS, nftables quick hacking HOWTO, the switch-o-pocalypse, NIC’s and external switches, the challenge of 10Gbit/s wirespeed and the lessons learned from DPDK, qdisc updates and lockless FIFO, Open vSwitch with conntrack and Use of nftables from OVS. Moreover, there were time to speak about nftables project: “Nftables kernel” and “Nft from userspace” by Patrick McHardy and Pablo Neira, two of the most relevant developers of nftables project. At that time, They spoke and was a debate about what is done, what needs to be fixed/done and future things coming in nftables (in kernel space) and nft (user-space)

In the OPW, I’m working with nft, libnftln and nftables in the kernel space, so, It was the most interesting moment. I heard a very good explanation about these projects.

On Thursday, It was more talk and debates about ipset and ulogd2. Morever, It was the time for the students of Google Summer of Code and me. Arturo Borrero speak about his project nft-sync, a new userspace tool to distribute a nftables ruleset across the network. Alvaro Neira spoke about XML/JSON support for libnftnl and Giussepe Longo spoke about the compatibility layer in nft. Their talks were very good and very interesting. They were about their work around “Google Summer Of Code” period.

I spoke about one of my tasks during the OPW period: “nftables automated tests” I spoke about the motivation to do it, what is checking, options are available to run this test, the structure of the test file and the test folders. Also, I spoke about the future of the testing in nft and the next tasks to do. I was very nervous: It was my first talk in the Netfilter Workshop and in English language. It was an important challenge to me, I did it the best I could. 🙂

During these days, I talked with the developers and they gave me feedback on the importance of the test system and the expectation of the creation of this task. It hasn’t been any test system in nft tools yet.

They were amazing days. I learned a lot about development, network, linux, the kernel, hardware… and it was a landmark in Netfilter Workshop history: It was the first time that a girl are invited to this meeting and also she gave a talk.

Thanks to The Outreach Program for Women. They sponsored me the travel and the hotel during these days. Without their help, I wouldn’t have been to do it.

Here’s the group picture of the 10th Netfilter workshop which is held from July 7th to July 11th in Montpellier, France. By Eric Leblond
Netfilter workshop group picture 2014

Netfilter workshop group of 2014

Netfilter workshop group picture 2014

Netfilter workshop group picture

Here’s the group picture of the 10th Netfilter workshop which is held from July 7th to July 11th in Montpellier, France.

Thanks a lot to #rmll2014 for hosting us!

For left to right:
* First row: Daniel Borkmann, Pabloe Neira Ayuso, Simon Horman, Thomas Graf, Patrick Mchardy, Jozsef Kadlecsik, Martin Topholm
* Second row: +Ana Rey, Florian Westphal, +Eric Dumazet, Hannes Frederic Sowa, +Jesper Dangaard Brouer, Jesper Sander Lindgren, Jesse Gross, Balazs Scheidler, Holger Eitzenberger
* Third row: Alvaro Neira, Guiseppe Longo, Arturo Borrero, Victor Julien, Gert Hansen, Ulrich Weber, Chema Gonzalez, John Fastabend, Alexei Stavoroitov, Maciej Żenczykowski
* Photographer: +Eric Leblond” By Eric Leblond

nftables automated tests : My talk in the Netfilter Workshop

Today, I’ve done my first talk in English in The Netfilter Workshop: “The nftables system test”

Here, It’s the pdf file with my talk: nftables automated tests in pdf (Also from netfilter Workshop Wiki)

Netfilter workshop 2014

Today It starts the 10th Netfilter Workshop until 11th July, in Montpellier, France. This is my first event of the Netfilter project.

This meeting is co-hosted by 15èmes Rencontres Mondiales du Logiciel Libre the biggest event of free software in France.
Pingu of Netfilter

This meeting started yesterday with a big dinner and today is the first day of conferences.

XML and JSON in nftables

libnftnl is an userspace library providing a low-level netlink programming interface (API) to the in-kernel nf_tables subsystem. The library libnftnl has been previously known as libnftables. This library is currently used by nftables.

To use libnftnl, We require the following software:

How to install the library:

./configure --with-xml-parsing --with-json-parsing
sudo make install
make check // To "generate" the tests and examples.

Also we use the library with nftables, We can do some task like run test and example.

Run the tests to check all change in this library:

sudo ./nft-parsing-test [options]
-d/--dir Check test files from .
-u/--update Update test files from .
-f/--file Check test file

Or we can run all test with the following script:


Others things we can do:

Renover el certificado digital FNMT-RCM con firefox/iceweasel en Linux

Si, va de nota, renover el certificado digital con icewasel en Debian. Va, seguro que es lo mismo “de difícil” que en cualquier Firefox o chromiun.

Trucos/recomendaciones a la hora de renovar el certificado digital. Aquí las dejo, que seguramente que la próxima vez me vuelve a pasar.

  •  Configurar la clave maestra del navegador.
  • Instalar las entidades certificadoras, como bien comentan en la web-
  • Una vez instaladas las entidades certificadoras, búscala en la lista de entidades, edita los permisos de ella y activa todas los campos. (NOTA IMPORTANTE: hacer esta operación sobre “FNMT Clase 2 CA-FNMT”, “AC RAIZ FNMT-RCM” y AC Administración Pública)
  • Y cuando te pida claves, mira bien cual es la que te está pidiendo, Seguramente te esté pidiendo la clave maestra de Firefoz y no la del certificado digital 😛
  • Reiniciar el firefox de vez en cuando… 😉

Código de errores visualizados mientras conseguía hacer la renovación:

  • “You have asked Iceweasel to connect securely to, but we can’t confirm that your connection is secure.”
  • “sec_error_unknown_issuer”

Configuración de VIM: Línea roja vertical y resaltado de espacios innecesarios.

Aquí dejo mi configuración de VIM. Mi .vimrc

syntax on
set number
set pastetoggle=

highlight ExtraWhiteSpace ctermbg=red guibg=red
match ExtraWhiteSpace /s+$/
autocmd BufWinEnter * match ExtraWhiteSpace /s+$/
autocmd InsertEnter * match ExtraWhiteSpace /s+%#@

Con muchos colorines! una bonita línea roja horizontal para controlar no pasarme de los 80 caracteres (cosa muy importante en algunos proyectos), resaltar espacios innecesarios en rojo, resaltar los resultados de las búsquedas, y la opción de pegar texto con F2 (eliminando indentaciones innecesarias), numeración de líneas, pero nada de autoindentado para evitar que haga de las suyas...