Friday, June 19, 2020

Simple guide to create a self hosted SWG server on Ubuntu 18 using SWGEmu (update 2020)

If you want to set up your own Star Wars Galaxies dev environment on SWGEmu, it's pretty straightforward. There's a lot of info out there, and this doesn't cover all of it, but it's a simple how-to that allows you to log in and play around.


We're going to use Virtualbox and Ubuntu 18 Server. You will need to install SWGEmu beforehand. We will also create a shared folder with the host in order to copy needed game world, so Virtualbox Guest Additions is required

Install Ubuntu 18 Server with a static IP and at least 4 CPU cores and 4GB RAM (the more, the better).


Find the SWGEmu Folder location by going to SWGEmu Launchpad > Settings > Options and note the location.


 For this install, the location is C:/Program Files/SWGEmu

Create a shared folder in Virtualbox with that location.


Check "Read-Only" "Auto-Mount" "Make Permanent" and set the mount point to /var/swgtre
This is where we will set the map world location. (alternatively you can just copy the TRE files to the server)

Now we're ready to power on the VM and set up the server.

Install Virtualbox Guest Additions

sudo apt install -y build-essential dkms linux-headers-$(uname -r)
sudo mkdir -p /mnt/cdrom && sudo mount /dev/cdrom /mnt/cdrom 2> /dev/null
cd /mnt/cdrom && sudo sh ./VBoxLinuxAdditions.run --nox11
sudo usermod -G vboxsf -a $USER
sudo reboot

Verify you have access to the share
ls /var/swgtre

  Install dependencies


sudo apt-get update && sudo apt install -y build-essential libmysqlclient-dev liblua5.3-dev libdb5.3-dev libssl-dev cmake git default-jre mariadb-server-10.1 mariadb-server-core-10.1

Create the working environment


mkdir ~/swg && cd ~/swg
git clone http://review.swgemu.com/Core3
cd ~/swg/Core3/MMOCoreORB
GETC=$(cat /proc/cpuinfo | grep processor | wc -l) && make -j$GETC
(This will take a long time to finish)

 

Point the world maps to the share

sed -i 's/TrePath \= \"\/home\/swgemu\/Desktop\/SWGEmu\"\,/TrePath \= \"\/var\/swgtre\"\,/g' $HOME/swg/Core3/MMOCoreORB/bin/conf/config.lua

 

Set up the database

cd ~/swg && sudo mysql_secure_installation
Existing password blank, enter 123456 for the new password.

echo 'CREATE DATABASE swgemu;' | sudo mysql -uroot -p123456
echo 'GRANT ALL ON *.* TO 'swgemu'@'localhost' IDENTIFIED BY "123456";' | sudo mysql -uroot -p123456
sudo mysql -p123456 -e source -e ~/swg/Core3/MMOCoreORB/sql/swgemu.sql;
sudo mysql -p123456 swgemu -e source -e ~/swg/Core3/MMOCoreORB/sql/datatables.sql;
sudo mysql -p123456 swgemu -e source -e ~/swg/Core3/MMOCoreORB/sql/mantis.sql;
ips=$(ip -o addr show up primary scope global | while read -r num dev fam addr rest; do echo ${addr%/*}; done) && echo $ips
sudo mysql -p123456 swgemu -v -e "update galaxy set address='$ips'"

Run the server


cd ~/swg/Core3/MMOCoreORB/bin
./core3

Create a SWGEmu Launchpad 

Add the IP to your server

Log into the server as an admin 

Use the username:

swgadmin/testing

Create a player, then disconnect, log out and close the game. Also, kill the process for the server in the terminal with ctrl-c.

Update the admin user



sudo mysql -p123456 swgemu -v -e "UPDATE swgemu.accounts SET admin_level='15' WHERE username='swgadmin'"

Run the server again

cd ~/swg/Core3/MMOCoreORB/bin
./core3



That's it. You should have a test environment to play around in. This guide is nowhere near ready for you to host this outside of your network but should be fine for testing. Further information can be found at the official SWGEmu site.

Thursday, December 19, 2019

Stream a looping video to Twitch using FFmpeg for testing

If you want to stream from Linux or a Raspberry Pi for testing quality, you can use FFmpeg to stream to Twitch.



It works on Windows with VMs, like Virtualbox, where OBS and Streamlabs doesn't work.

You will need your stream key, ffmpeg and a local rtmp twitch url:


Find an MP4 video around 720p in size if you're going to use a raspberry pi. Anything larger will get dropped frames. In Windows/Linux it shouldn't matter.


ffmpeg -stream_loop -1 -i VIDEO.mp4 -c:v libx264 -s 852x480 -r 30 -f flv "rtmp://YOUR_URL/STREAM_KEY?bandwidthtest=true"

The command basically takes a video and loops it over and over so you can do long term testing. It is also a low resource task (compared to X11 streaming).

The last bit, the "bandwidthtest=true", is for Twitch Inspector. You can see how the stream is without actually going live.

https://inspector.twitch.tv/

Twitch inspector will let you know how well your stream is doing, and it's more accurate than your live dashboard.


If you actually want to go live with and see the results firsthand, remove: "?bandwidthtest=true"

There are probably better flags for ffmpeg to manage keyframes and other parameters, but for testing this is stable enough.

With different platform ingest points, you can stream to Mixer/Youtube/Facebook Live and others. You should be able to stream multiple services, at the same time, if you have enough resources.

Friday, May 24, 2019

Use TorGuard OpenVPN servers in OPNsense firewall

This is how to use multiple Torguard OpenVPN servers in an OPNsense server. Adapted from pfSense instructions here.

DNS

System > General > DNS Servers
Add the following:
104.223.91.194
104.223.91.210

Create trust certificate

System > Trust > Certificates > Add
Select "Import an existing Certificate Authority"
Descriptive name: TG-CA
Certificate data: (get the latest key from here, copy the entire file)
Private key data: <leave blank>

Certificate authority

System > Trust > Authorities > Add
Descriptive Name: TG-internal-CA
Method: Create an internal Certificate Authority
Key length: 2048
Digest Algorithm: SHA1
Lifetime: 3650
Country Code: <put anything>
State or Province: <put anything>
City: <put anything>
Organization: <put anything>
Email Address: <put anything>
Common Name: internal-ca

Certificate manager

System > Trust > Certificates > Add
Descriptive Name: TG-Certificate
Method: Create an internal Certificate Authority
Key length: 2048
Digest Algorithm: SHA1
Lifetime: 3650
Country Code: <put anything>
State or Province: <put anything>
City: <put anything>
Organization: <put anything>
Email Address: <put anything>
Common Name: TG-Certificate

OpenVPN Client settings

VPN > OpenVPN > Clients > Add

Description: TG OpenVPN
Server Mode: Peer To Peer (SSL/TLS)
Protocol: UDP
Device Mode: tun
Interface: WAN
Local Port: <leave blank>

Remote server(s):
atl.east.usa.torguardvpnaccess.com
chi.central.usa.torguardvpnaccess.com
dal.central.usa.torguardvpnaccess.com
fl.east.usa.torguardvpnaccess.com
la.west.usa.torguardvpnaccess.com
lv.west.usa.torguardvpnaccess.com
nj.east.usa.torguardvpnaccess.com
ny.east.usa.torguardvpnaccess.com
sa.west.usa.torguardvpnaccess.com
sf.west.usa.torguardvpnaccess.com

Server Port(s): 443

Select server at random: Checked
Infinitely resolve server: Checked

Username: YOURTGUSERNAME
Password: YOURTGPASSWORD

Peer Certificate Authority: TG-CA
Client Certificate: Web GUI SSL certificate
Encryption algorithm: BF-CBC (128-bit, 64 bit block)
Auth Digest Algorithm: SHA1 (160-bit)
Hardware Crypto: No Hardware Crypto Acceleration
Compression: Enabled with Adaptive Compression
Disable IPv6: Check
Verbosity level: 1 default

Create OpenVPN interface

Interfaces > Assignments > Click add to the right of TG OpenVPN
You should now see OPT1 on the left. Click OPT1.

Enable interface
Description: TGInterface

(leave everything else blank)

You should have a new interface called TGInterface

Firewall / NAT settings

Firewall > NAT > Outbound

Select: Manual outbound NAT rule generation (no automatic rules are being generated)
Click Save

Change every rule (if you have more than one) to the interface TGInterface. No other settings should change in each rule.

Check VPN status

VPN > OpenVPN > Connection Status

The status should say up

Visit https://ipleak.net/ 


Install BlackArch from scratch on fresh Arch with Gnome GUI

(Using release: 2019.05.02 on Virtualbox 6.0)

Download Arch (or use a mirror)

BlackArch is a great pentest tool, comparable to Kali Linux, but with a steeper learning curve. The biggest issue for most new users is the lack of out-of-the-box gnome support.

I put together a combo of guides to get this working to make a comparable look and feel to Kali, but with Arch.

Specs

8GB RAM
128MB VGA
100GB thin provisioned HD
Network: bridged



Load the ISO and boot the machine. Once it comes up, verify network connectivity.

Disk creation

Type fdisk -l and you should see the 100GB drive.

The first partition we will create is the boot partition.

fdisk /dev/sda

p for the primary partition.

n for new 

1 for the first partition (sda1)

2048 (or enter for the default)

+500M for the space


Now we will create a swap partition.

n for create a new partition

p for primary

2 for the 2nd partition (sda2)

enter for the default sector

+8G for the swap file size

t to select the type

2 for the second, swap, partition

82 to make it a swap partition


Creating the 3rd partition

n to create the final partition using the rest of the space

p for primary

3 for the 3rd partition

enter to select the default drive sector start position

enter to select the last sector

w to write the changes

Finalize the filesystem

mkfs.ext2 /dev/sda1
mkswap /dev/sda2
mkfs.ext4 /dev/sda3


Mount the filesystem

mount /dev/sda3 /mnt
swapon /dev/sda2

Install the Base and Base-Devel repositories

pacstrap /mnt/ base base-devel

Generate the fstab and mount it to the temporary filesystem

genfstab /mnt >> /mnt/etc/fstab

Remount root to the mount

arch-chroot /mnt

Set System Language

echo "LANG=en_US.UTF-8"  > /etc/locale.conf
sed -i 's/#en_US.UTF-8 UTF-8/en_US.UTF-8 UTF-8/g' /etc/locale.gen

Or use text editor of choice and remove the comment from your language of choice.

vi /etc/locale.gen
en_US.UTF-8 UTF-8

then run
locale-gen

Set the timezone

ln -sf /usr/share/zoneinfo/US/Central /etc/localtime
hwclock --systohc --utc

Create unique hostname

echo "systemname.host.local" > /etc/hostname

Change Root Password

passwd

Set up GRUB Bootloader

pacman -S grub
grub-install /dev/sda
grub-mkconfig -o /boot/grub/grub.cfg

Update repositories

pacman -Syu

Enable dhcpcd service

systemctl enable dhcpcd

Create superuser account

useradd -m -G wheel yourname
passwd yourname

Enable sudo for the “wheel” group

sed -i 's/# %wheel ALL=(ALL) ALL/%wheel ALL=(ALL) ALL/g' /etc/sudoers

Or edit the file manually
vi /etc/sudoers
uncomment out the following line
%wheel ALL=(ALL) ALL

Eject the ISO and reboot

Once the system comes back up, now would be a good time to shut down the system and create a snapshot.

Adding Gnome and lxdm

Using your superuser account,

update the system
sudo pacman -Syu

Install the pre-requisites
sudo pacman -S xorg

Install Gnome and extras
sudo pacman -S gnome gnome-extra

Once that's complete, you need to install a display manager.
pacman -S lxdm

Enable the service to start on boot
systemctl enable lxdm.service

Once you restart, lxdm will allow you to choose to log in with Gnome.

Once you've verified everything works, turn the system off, remove the snapshot and create a new one.



Adding BlackArch software

curl -O https://blackarch.org/strap.sh
chmod +x strap.sh
sudo ./strap.sh

Download the master package list and synchronize
sudo pacman -Syyu

To install all of the tools (very large download), run
pacman -S blackarch

To see the blackarch categories, run
pacman -Sg | grep blackarch

You should now have Black Arch Linux apps installed on a fresh install of Arch using Gnome.




Sources: