aboutsummaryrefslogtreecommitdiff
path: root/content/docs/freebsd
diff options
context:
space:
mode:
authorJulien Dessaux2022-04-30 23:05:01 +0200
committerJulien Dessaux2022-04-30 23:05:01 +0200
commitfd5e65b5c346907478b1e0c6431a3a3b79b37519 (patch)
tree51eec269d183a0d9b5ead0f3a8813e3d82d830bc /content/docs/freebsd
parentAdded the kite runner book article (diff)
downloadwww-fd5e65b5c346907478b1e0c6431a3a3b79b37519.tar.gz
www-fd5e65b5c346907478b1e0c6431a3a3b79b37519.tar.bz2
www-fd5e65b5c346907478b1e0c6431a3a3b79b37519.zip
Updated old docs articles
Diffstat (limited to 'content/docs/freebsd')
-rw-r--r--content/docs/freebsd/remote_install.md2
-rw-r--r--content/docs/freebsd/wireguard.md2
2 files changed, 2 insertions, 2 deletions
diff --git a/content/docs/freebsd/remote_install.md b/content/docs/freebsd/remote_install.md
index 7bc9f63..7fbf8fd 100644
--- a/content/docs/freebsd/remote_install.md
+++ b/content/docs/freebsd/remote_install.md
@@ -18,7 +18,7 @@ wget https://download.freebsd.org/ftp/releases/VM-IMAGES/13.0-RELEASE/amd64/Late
```
When all is done, force a reboot of your machine and connect to the remote console. Your FreeBSD system should boot and leave you with an authentication prompt. Just type in root (it will not ask for a password) and go through this post installation checklist :
-- run `freebsd-update fetch install`
+- run `freebsd-update fetch install` then reboot
- set a root password with `passwd`
- add a user account with `adduser`, put it in the `wheel` group
- add a ssh authorized_keys for your new user
diff --git a/content/docs/freebsd/wireguard.md b/content/docs/freebsd/wireguard.md
index f4e09fe..62bb7df 100644
--- a/content/docs/freebsd/wireguard.md
+++ b/content/docs/freebsd/wireguard.md
@@ -42,7 +42,7 @@ AllowedIPs = 10.1.2.9/32
PersistentKeepalive = 60
```
-To implement this example you will need to generate two sets of keys. The configuration for the first server will feature the first server's private key in the `[Interface]` section and the second server's public key in the `[Peer]` section, and vice versa.
+To implement this example you will need to generate two sets of keys. The configuration for the first server will feature the first server's private key in the `[Interface]` section and the second server's public key in the `[Peer]` section, and vice versa for the configuration of the second server.
This example is from a machine that can be hidden behind nat therefore I configure a `PersistentKeepalive`. If your host has a public IP this line is not needed.