User Tools

Site Tools


berkeleylug:digital_resources

Digital Resources

(assets) of:
BerkeleyLUG

Domains:
berkeleylug.com (primary) registrant/owner: Michael Paoli - (transferred 2019-03-04) Registry Expiry Date: 2020-01-20T05:05:36Z
berkeleylug.org (alternate (& non-essential - redirects to primary) registrant/owner: Michael Paoli - (transferred 2019-03-04) Registry Expiry Date: 2020-05-17T04:39:28Z

DNS:
berkeleylug.com (canonical) and berkelelylug.org - data is publicly accessible via AXFR from one or more of the public authoritative nameservers.

WordPress.com hosted - per earlier communcations, intending to migrate of the WordPress.com hosted by 2019-08-27T09:53:17Z (that would be 6 months after Michael Paoli was notified of having been granted admin access for the BerkeleyLUG site on its WordPress.com hosting).

.org not primary, redirector in place:
$ (for protocol_port in 'http 80' 'https 443'; do set -- $protocol_port; protocol="$1"; port="$2"; for host in www.berkeleylug.org berkeleylug.org; do for path in '' / /// /foo/bar/baz; do t="$protocol://$host$path"; echo "$t"; curl -s -I "$t" | grep -e '^HTTP/' -e '^[Ll]ocation: '; done; done done)
http://www.berkeleylug.org
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
http://www.berkeleylug.org/
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
http://www.berkeleylug.org///
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
http://www.berkeleylug.org/foo/bar/baz
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/foo/bar/baz
http://berkeleylug.org
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
http://berkeleylug.org/
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
http://berkeleylug.org///
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
http://berkeleylug.org/foo/bar/baz
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/foo/bar/baz
https://www.berkeleylug.org
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
https://www.berkeleylug.org/
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
https://www.berkeleylug.org///
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
https://www.berkeleylug.org/foo/bar/baz
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/foo/bar/baz
https://berkeleylug.org
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
https://berkeleylug.org/
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
https://berkeleylug.org///
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
https://berkeleylug.org/foo/bar/baz
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/foo/bar/baz
$ 
@berkeleylug.org neither accepts nor sends email (no MX, A/AAAA on TCP port 25 rejects connection or rejects SMTP attempts to domain, SPF - none sends, hard fail all:
berkeleylug.org. IN SPF "v=spf1 -all"
berkeleylug.org. IN TXT "v=spf1 -all"
)

canonical/primary is: https://berkeleylug.com/
$ curl -I http://berkeleylug.com/ 2>&1 | grep -i -e '^HTTP/' -e '^Location: ' -e '^curl:'
HTTP/1.1 301 Moved Permanently
Location: https://berkeleylug.com/
$ curl -I http://www.berkeleylug.com/ 2>&1 | grep -i -e '^HTTP/' -e '^Location: ' -e '^curl:'
HTTP/1.1 301 Moved Permanently
Location: https://www.berkeleylug.com/
$ curl -I https://www.berkeleylug.com/ 2>&1 | grep -i -e '^HTTP/' -e '^Location: ' -e '^curl:'
HTTP/2 301 
location: https://berkeleylug.com/
$ curl -I https://berkeleylug.com/ 2>&1 | grep -i -e '^HTTP/' -e '^Location: ' -e '^curl:'
HTTP/2 200 
$ 

TLS(/"SSL") - Web - handful of (separate) Web certs only*:
$ nmap -Pn -r -sT -p 443 --script=ssl-cert berkeleylug.com calendar.berkeleylug.com docs.berkeleylug.com mail.berkeleylug.com sites.berkeleylug.com www.berkeleylug.com  perl -e 'while(<>){print if /Not valid after: /o; if(/^\| Subject Alternative Name: /){chomp; s/DNS:(?:(?i)(?![^, ]*berkeleylug\.))[^, ]+(?:, |$)//go; s/, ?$//o; print "$_\n";};};'
| Subject Alternative Name: DNS:berkeleylug.com
| Not valid after:  2019-04-28T02:29:40
| Subject Alternative Name: DNS:www.berkeleylug.com
| Not valid after:  2019-06-01T14:37:18
$ 
*ignoring domains that WordPress.com lumps in there that aren't at all BerkeleyLUG

########################################################################
various bits to test on temp.berkeleylug.com - to presumably later be
berkeleylug.com, cert also for [www.]berkeleylug.org
Created key and obtained (non-Google) CA signed cert also covering:
*.berkeleylug.com,berkeleylug.com,*.berkeleylug.org,berkeleylug.org expires: 2019-06-07T02:07:58Z
... install the newer cert for SMTP (will likely end up needed for at
least postmaster@berkeleylug.com, for WordPress site to, e.g. send
user password resets, etc.
# pwd -P
/etc/exim4/eximconfig/config
# ls -ld tls_c*.pem
lrwxrwxrwx 1 root root 53 Sep 17  2017 tls_certificate_private.pem -> ../../../letsencrypt/live/lists.balug.org/privkey.pem
lrwxrwxrwx 1 root root 55 Sep 17  2017 tls_certificate_public.pem -> ../../../letsencrypt/live/lists.balug.org/fullchain.pem
# ln -sf ../../../letsencrypt/live/berkeleylug.com/privkey.pem tls_certificate_private.pem
# ln -sf ../../../letsencrypt/live/berkeleylug.com/fullchain.pem tls_certificate_public.pem
# ls -lLd tls_c*.pem
-r--r----- 1 root Debian-exim 3272 Mar  8 19:03 tls_certificate_private.pem
-r--r--r-- 1 root root        4033 Mar  8 19:08 tls_certificate_public.pem
# systemctl reload exim4.service
# 
$ </dev/null openssl s_client -servername temp.berkeleylug.com -starttls smtp -connect 198.144.194.238:25 2>>/dev/null | sed -ne '/^-----BEGIN CERTIFICATE-----$/,/^-----END CERTIFICATE-----$/p' | openssl x509 -text -noout | sed -ne '/Not After : /p;/Subject Alternative Name:/{N;p;q;}'
            Not After : Jun  7 02:07:58 2019 GMT
            X509v3 Subject Alternative Name:
                DNS:*.balug.org, DNS:*.berkeleylug.com, DNS:*.berkeleylug.org, DNS:*.lists.balug.org, DNS:balug.org, DNS:berkeleylug.com, DNS:berkeleylug.org
$ 
Also installed on https://[www.]berkeleylug.org/:
$ (TZ=GMT0 export TZ; hosts='www.berkeleylug.org berkeleylug.org'; { nmap -Pn -r -sT -p 443 --script=ssl-cert $hosts; nmap -6 -Pn -r -sT -p 443 --script=ssl-cert $hosts; } | grep -e '^Nmap scan report for ' -e '^PORT ' -e '^[0-9]*/tcp open' -e '^| Subject Alternative Name: ' -e '^| Not valid after: ')
Nmap scan report for www.berkeleylug.org (198.144.194.238)
PORT    STATE SERVICE
443/tcp open  https
| Subject Alternative Name: DNS:*.balug.org, DNS:*.berkeleylug.com, DNS:*.berkeleylug.org, DNS:*.lists.balug.org, DNS:balug.org, DNS:berkeleylug.com, DNS:berkeleylug.org
| Not valid after:  2019-06-07T02:07:58
Nmap scan report for berkeleylug.org (198.144.194.238)
PORT    STATE SERVICE
443/tcp open  https
| Subject Alternative Name: DNS:*.balug.org, DNS:*.berkeleylug.com, DNS:*.berkeleylug.org, DNS:*.lists.balug.org, DNS:balug.org, DNS:berkeleylug.com, DNS:berkeleylug.org
| Not valid after:  2019-06-07T02:07:58
Nmap scan report for www.berkeleylug.org (2001:470:1f05:19e::4)
PORT    STATE SERVICE
443/tcp open  https
| Subject Alternative Name: DNS:*.balug.org, DNS:*.berkeleylug.com, DNS:*.berkeleylug.org, DNS:*.lists.balug.org, DNS:balug.org, DNS:berkeleylug.com, DNS:berkeleylug.org
| Not valid after:  2019-06-07T02:07:58
Nmap scan report for berkeleylug.org (2001:470:1f05:19e::4)
PORT    STATE SERVICE
443/tcp open  https
| Subject Alternative Name: DNS:*.balug.org, DNS:*.berkeleylug.com, DNS:*.berkeleylug.org, DNS:*.lists.balug.org, DNS:balug.org, DNS:berkeleylug.com, DNS:berkeleylug.org
| Not valid after:  2019-06-07T02:07:58
$ 
########################################################################

robots.txt:
$ TZ=GMT0 date -Iseconds && curl -s https://berkeleylug.com/robots.txt
2019-03-05T15:54:12+00:00
# If you are regularly crawling WordPress.com sites, please use our firehose to receive real-time push updates instead.
# Please see https://developer.wordpress.com/docs/firehose/ for more details.

Sitemap: https://berkeleylug.com/sitemap.xml
Sitemap: https://berkeleylug.com/news-sitemap.xml

User-agent: *
Disallow: /wp-admin/
Allow: /wp-admin/admin-ajax.php
Disallow: /wp-login.php
Disallow: /wp-signup.php
Disallow: /press-this.php
Disallow: /remote-login.php
Disallow: /activate/
Disallow: /cgi-bin/
Disallow: /mshots/v1/
Disallow: /next/
Disallow: /public.api/

# This file was generated on Mon, 19 Nov 2018 07:12:09 +0000
$ 

web site managed via: http://berkeleylug.wordpress.com/
Looks like the WordPress.com hosting is likely presently the $4.00/month billed yearly plan, notably includes:
custom domain
Remove WordPress.com Ads
Whereas the free tier doesn't include those "features"
See: https://wordpress.com/pricing/
export/import, see: https://move.wordpress.com/exportimport-content/ (2019-02-28 - Michael Paoli verified his access to export, and exported and saved (backup!))

"List" / Google Group: https://groups.google.com/forum/#!forum/berkeleylug
Owners: Jack Deslippe, admin@berkeleylug.com, Michael Paoli, Aaron Cohen, Grant Bowman (@gmail.com)
Managers: Grant Bowman (@berkeleylug.com)

IRC: freenode.net:6697 #berkeleylug ChanServ: grantbow (Grant Bowman)

BerkeleyLUG calendar on Google calendars:
https://calendar.google.com/calendar/embed?src=0eeqsdloeuvb2vbc2k0gk3ij9s%40group.calendar.google.com&ctz=America%2FLos_Angeles
Acccess: Make changes and manage sharing:
Jack Deslippe
Michael Paoli
Grant Bowman
Not that this calendar mostly only exists for historical purposes, and has mostly been superseded by:
SF Bay Area Open Source/Linux Events https://calendar.google.com/calendar/embed?src=caj9iea2ol69b7n2uqdek4ocso%40group.calendar.google.com&ctz=America%2FLos_Angeles
Which Michael Paoli (and many other folks) have access to Make changes to events.

Fosstodon instance on Mastodon
https://fosstodon.org/@berkeleylug
Creator and owner: Aaron Cohen

Twitter(?):
https://twitter.com/berkeleylug
https://berkeleylug.com/2013/08/23/wordpress/#comment-1884
(likely Grant Bowman has access/control on the Twitter bits)

Facebook (Jack and/or Grant)
berkeleylug/digital_resources.txt · Last modified: 2019-06-09T21:22:48+0000 by michael_paoli