<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>zeitgeist.se</title>
    <link>https://www.zeitgeist.se/</link>
    <description>Recent content on zeitgeist.se</description>
    <generator>Hugo -- 0.154.5</generator>
    <language>en-US</language>
    <lastBuildDate>Wed, 14 Jan 2026 12:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.zeitgeist.se/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>A Linux way to disable the Virtual CD on WD disks</title>
      <link>https://www.zeitgeist.se/2017/09/01/linux-way-to-disable-the-virtual-cd-on-wd-disks/</link>
      <pubDate>Fri, 01 Sep 2017 19:32:58 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=1037</guid> 
      <description>&lt;p&gt;According to Western Digital, there is &lt;a href=&#34;http://wdc.custhelp.com/app/answers/detail/a_id/3835/session/L2F2LzEvdGltZS8xNDM5OTgwMTg4L3NpZC9sSjdFcml1bQ%3D%3D#linux&#34;&gt;no known way&lt;/a&gt; under Linux to disable (and hide) the &amp;ldquo;Virtual CD&amp;rdquo; (VCD) partition that can often be found on their external hard disks (such as the popular &lt;em&gt;My Passport&lt;/em&gt; series).&lt;/p&gt;
&lt;p&gt;No results with Google either, so I had to dig a little further. Please keep in mind that the following solution worked well for me, but that it could, potentially, brick your hard disk. You&amp;rsquo;ve been warned.&lt;/p&gt;
</description>
    </item>
    <item>
      <title>Mount an iPhone inside a KVM guest by disabling usbmuxd</title>
      <link>https://www.zeitgeist.se/2015/06/28/mount-an-iphone-inside-a-kvm-guest-by-disabling-usbmuxd/</link>
      <pubDate>Sun, 28 Jun 2015 21:03:43 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=1028</guid> 
      <description>&lt;p&gt;Today I wanted to mount an iPhone inside a KVM-based VM. My host is Ubuntu 15.04, the guest is Windows XP. Well, it didn&amp;rsquo;t quite work at first because the host kept stealing back the phone&amp;rsquo;s USB connection. The culprit was &lt;a href=&#34;https://github.com/libimobiledevice/usbmuxd/&#34;&gt;usbmuxd&lt;/a&gt;, a &amp;ldquo;USB multiplexing daemon&amp;rdquo; that handles communications with iOS devices and Linux. To temporarily overwrite its behavior I added an empty udev rules file:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ sudo touch /etc/udev/rules.d/39-usbmuxd.rules
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;This rule file (which does nothing) takes precedence over the original rules in /lib/udev/rules.d, with the result that it would no longer trigger the usbmuxd daemon whenever an iPhone is detected on the USB host.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Arial from Windows 10 doesn&#39;t play nice with Linux</title>
      <link>https://www.zeitgeist.se/2015/06/01/arial-from-windows-10-doesnt-play-nice-with-linux/</link>
      <pubDate>Mon, 01 Jun 2015 19:11:28 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=1012</guid> 
      <description>I was fiddling with the fonts on my Linux notebook today, and I thought, why not upgrade all the Windows-based fonts with the latest fonts from Windows 10 (preview version)? Well, something definitely got changed and I don&amp;rsquo;t think I like it.</description>
    </item>
    <item>
      <title>Google Domains invites up for grabs</title>
      <link>https://www.zeitgeist.se/2014/10/10/google-domains-invites-up-for-grabs/</link>
      <pubDate>Fri, 10 Oct 2014 10:35:17 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=996</guid> 
      <description>&lt;p&gt;I have five invites for &lt;a href=&#34;https://domains.google.com&#34; title=&#34;Google Domains&#34;&gt;Google Domains&lt;/a&gt; available. The first five users to reply to this post will get one (make sure to enter a valid e-mail or I won&amp;rsquo;t be able to send it to you).&lt;/p&gt;
&lt;p&gt;Keep in mind Google Domains is currently only availble for users in the US; your location is determined by the billing address for the credit card you use with Google Wallet to purchase or transfer a domain.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Enabling ATA Security on a Self-Encrypting SSD</title>
      <link>https://www.zeitgeist.se/2014/09/07/enabling-ata-security-on-a-self-encrypting-ssd/</link>
      <pubDate>Sun, 07 Sep 2014 11:20:12 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=940</guid> 
      <description>&lt;p&gt;Recently I purchased a Samsung 840 Pro SSD for my frayed old notebook (a Thinkpad X200s). It&amp;rsquo;s a self-encrypting drive where data is always stored with AES-256 encryption. But first, to benefit from the encryption, I needed to encrypt the underlying encryption keys. One way of doing that is to set an ATA user password for the drive, which is supported by the BIOS of most notebooks.&lt;/p&gt;
&lt;p&gt;But there is a problem.&lt;/p&gt;
</description>
    </item>
    <item>
      <title>Optimize AES and ChaCha20 usage with BoringSSL</title>
      <link>https://www.zeitgeist.se/2014/08/23/optimize-aes-and-chacha20-usage-with-boringssl/</link>
      <pubDate>Sat, 23 Aug 2014 11:49:02 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=871</guid> 
      <description>&lt;p&gt;&lt;a href=&#34;https://boringssl.googlesource.com/boringssl/&#34; title=&#34;boringssl git repository&#34;&gt;BoringSSL&lt;/a&gt; is a &lt;a href=&#34;https://www.imperialviolet.org/2014/06/20/boringssl.html&#34; title=&#34;Google announces BoringSSL&#34;&gt;Google fork&lt;/a&gt; of OpenSSL. It includes various interesting patches, including an implementation of the &lt;a href=&#34;https://www.zeitgeist.se/2014/04/26/openssl-with-chacha20-poly1305-support/&#34; title=&#34;ChaCha20-Poly1305&#34;&gt;ChaCha20&lt;/a&gt; cipher. In addition, BoringSSL allows you to &lt;strong&gt;group cipher suites of equal preference&lt;/strong&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Equal preference cipher groups. This change implements equal-preference groups of cipher suites. This allows, for example, a server to prefer one of AES-GCM or ChaCha20 ciphers, but to allow the client to pick which one. When coupled with clients that will boost AES-GCM in their preferences when AES-NI is present, this allows us to use AES-GCM when the hardware exists and ChaCha20 otherwise.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;&lt;a href=&#34;https://boringssl.googlesource.com/boringssl/+/858a88daf27975f67d9f63e18f95645be2886bfb%5E!/&#34; title=&#34;BoringSSl patch adding equal preference cipher groups&#34;&gt;Source&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;In this article I show you how you can tweak your nginx configuration to take advantage of this feature.&lt;/p&gt;
</description>
    </item>
    <item>
      <title>Debug Memcached with tcpdump</title>
      <link>https://www.zeitgeist.se/2014/05/03/debug-memcached-with-tcpdump/</link>
      <pubDate>Sat, 03 May 2014 16:44:22 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=861</guid> 
      <description>&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;tcpdump -i lo -s &lt;span style=&#34;color:#ae81ff&#34;&gt;65535&lt;/span&gt; -A -ttt port 11211| cut -c 9- | grep -i &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#39;^get\|set&amp;#39;&lt;/span&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</description>
    </item>
    <item>
      <title>Google Cloud DNS: How-to Guide</title>
      <link>https://www.zeitgeist.se/2014/05/01/google-cloud-dns-how-to/</link>
      <pubDate>Thu, 01 May 2014 18:38:08 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=800</guid> 
      <description>&lt;p&gt;In this article I will walk you through setting up a domain DNS zone using the &lt;a href=&#34;https://developers.google.com/cloud-dns/&#34; title=&#34;Google Cloud DNS&#34;&gt;Google Cloud DNS&lt;/a&gt; service.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Google Cloud DNS is a high performance, resilient, and global DNS service, which allows you to easily publish and manage DNS records.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;To keep this short and sweet, I assume that you know the basics of &lt;a href=&#34;http://en.wikipedia.org/wiki/Domain_Name_System&#34; title=&#34;Domain Name System (DNS)&#34;&gt;DNS&lt;/a&gt;.&lt;/p&gt;
</description>
    </item>
    <item>
      <title>OpenSSL with ChaCha20-Poly1305 support</title>
      <link>https://www.zeitgeist.se/2014/04/26/openssl-with-chacha20-poly1305-support/</link>
      <pubDate>Sat, 26 Apr 2014 07:44:39 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=796</guid> 
      <description>&lt;p&gt;Update: Meanwhile you could also switch to the &lt;a href=&#34;https://www.zeitgeist.se/2014/08/23/optimize-aes-and-chacha20-usage-with-boringssl/&#34; title=&#34;Optimize AES and ChaCha20 usage with BoringSSL&#34;&gt;BoringSSL fork&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;D. J. Bernstein&amp;rsquo;s &lt;a href=&#34;http://cr.yp.to/chacha.html&#34; title=&#34;The ChaCha family&#34;&gt;ChaCha20-Poly1305&lt;/a&gt; has not been merged into the OpenSSL master branch yet (ETA, anyone?). If you are curious to test it with nginx or any other application relying on the OpenSSL libraries with support for TLS 1.2, you can check it out via the 1.0.2-aead branch:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ git clone https://github.com/openssl/openssl.git
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ cd openssl
&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;$ git checkout 1.0.2-aead
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;Then follow the usual instruction from the INSTALL file on how to compile OpenSSL.&lt;/p&gt;</description>
    </item>
    <item>
      <title>IPSec Fail: Perfect Forward Secrecy, Where Art Thou?</title>
      <link>https://www.zeitgeist.se/2014/04/18/ipsec-fail-perfect-forward-secrecy-where-art-thou/</link>
      <pubDate>Fri, 18 Apr 2014 14:28:29 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=704</guid> 
      <description>&lt;p&gt;Perfect Forward Secrecy (PFS) has garnered &lt;a href=&#34;https://lwn.net/Articles/572926/&#34; title=&#34;Let&#39;s talk about perfect forward secrecy&#34;&gt;widespread publicity&lt;/a&gt; in recent months thanks to Snowden and the NSA. As a result, an increasing number of websites and email service providers have been pushing for PFS to provide better security to their users.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;PFS protects previous key exchanges even if the current one is compromised.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Unfortunately the same cannot be said about current popular IPSec VPN clients. Neither of the ones I tested - all of them from recent distributions including Windows and OS X - offered PFS out of the box, meaning previous IPSec key exchanges could be decrypted by an attacker if the current one is compromised.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;NSOC-2012&#34; loading=&#34;lazy&#34; src=&#34;https://www.zeitgeist.se/wp-content/uploads/2014/04/NSOC-2012-1024x682.jpg&#34;&gt;&lt;/p&gt;
</description>
    </item>
    <item>
      <title>Despite Heartbleed bug: certification revocation refused (Updated)</title>
      <link>https://www.zeitgeist.se/2014/04/12/despite-heartbleed-certification-revocation-refused/</link>
      <pubDate>Sat, 12 Apr 2014 08:27:22 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=625</guid> 
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;Note&lt;/strong&gt;: [04/14/14] Today I was contacted by GlobalSign representative Gregory who stumbled over this blog post, and he was so kind to revoke the affected certs free of charge. He also added, in response to my summary below, that there is an option in the Chrome settings to enable revocation checking, and that beginning April 1, 2015, GlobalSign &lt;a href=&#34;https://support.globalsign.com/customer/portal/articles/1464693&#34; title=&#34;GlobalSign 39 Month Maxium Validity&#34;&gt;will restrict&lt;/a&gt; the maximum validity of then-issued certs to 39 months.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;So the &lt;a href=&#34;http://heartbleed.com/&#34; title=&#34;Heartbleed Bug&#34;&gt;Heartbleed bug&lt;/a&gt; ( &lt;a href=&#34;https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160&#34; title=&#34;CVE-2014-0160 vulnerability &#34;&gt;CVE-2014-0160&lt;/a&gt;) is out, and every administrator using SSL to protect his infrastructure has been wondering the same thing: should I absolutely, positively, without a doubt, replace all certificates and associates keys?&lt;/p&gt;
&lt;p&gt;The only reasonable answer is: yes - if you used certificates on a vulnerable machine. Even those &lt;a href=&#34;http://blog.cloudflare.com/answering-the-critical-question-can-you-get-private-ssl-keys-using-heartbleed&#34; title=&#34;Can You Get Private SSL Keys Using Heartbleed?&#34;&gt;in disbelief&lt;/a&gt; were quickly &lt;a href=&#34;https://twitter.com/indutny/status/454773820822679552&#34; title=&#34;Cloudflare challenge cracked&#34;&gt;proven wrong&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;The first thing I did was to patch all impacted OpenSSL instances and restart the services that depend on the OpenSSL library (that includes not only HTTP but also MTA and IMAP, among others). That was the easy part.&lt;/p&gt;
&lt;p&gt;What followed was a major pain with my certificate authority and one of its partners.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Heartbleed&#34; loading=&#34;lazy&#34; src=&#34;https://www.zeitgeist.se/wp-content/uploads/2014/04/heartbleed.png&#34;&gt;&lt;/p&gt;
</description>
    </item>
    <item>
      <title>A list of helpful JavaScript resources (free)</title>
      <link>https://www.zeitgeist.se/2014/03/26/list-of-helpful-javascript-resources/</link>
      <pubDate>Wed, 26 Mar 2014 09:03:23 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=571</guid> 
      <description>&lt;p&gt;Recently I&amp;rsquo;ve been refreshing my rudimentary JavaScript skills. Listening to a Mr. Crockford makes me all humble and sentimental. Did you know that he was &lt;a href=&#34;http://www.crockford.com/wrrrld/maniac.html&#34; title=&#34;Expurgation of Maniac Mansion on Nintendo&#34;&gt;somewhat involved&lt;/a&gt; in the development of &lt;a href=&#34;http://en.wikipedia.org/wiki/Maniac_Mansion&#34; title=&#34;Maniac Mansion on Wikipedia&#34;&gt;Maniac Mansion&lt;/a&gt; - mainly in porting the Lucasfilm Games SCUMM engine for Nintendo?&lt;/p&gt;
&lt;p&gt;&lt;a href=&#34;http://en.wikipedia.org/wiki/Maniac_Mansion&#34;&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.zeitgeist.se/wp-content/uploads/2014/03/Maniac_Mansion_artwork.jpg&#34;&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Anyhow, here is my list of free online JavaScript resources that I&amp;rsquo;ve found extremely helpful. Not all of them are necessary for beginners, but I am sure the list contains something for everyone.&lt;/p&gt;
</description>
    </item>
    <item>
      <title>Reconnect VPN upon resume from sleep (Windows)</title>
      <link>https://www.zeitgeist.se/2013/12/11/reconnect-vpn-upon-resume-from-sleep-windows/</link>
      <pubDate>Wed, 11 Dec 2013 02:47:37 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=535</guid> 
      <description>Windows doesn&amp;rsquo;t automatically reconnect VPN connections when you resume from standby mode. Sometimes this can be annoying - for instance when you are using someone else&amp;rsquo;s Internet and want to make sure that your connection is always secured through the VPN. To fix this, I &lt;a href=&#34;https://www.zeitgeist.se/wp-content/uploads/2013/12/Reenable-VPN.xml&#34;&gt;created a task&lt;/a&gt; that automatically connects to a predefined VPN whenever you resume Windows.</description>
    </item>
    <item>
      <title>120&#43; Live Webcams not requiring Flash</title>
      <link>https://www.zeitgeist.se/2013/12/05/120-live-webcams-not-requiring-flash/</link>
      <pubDate>Thu, 05 Dec 2013 14:50:48 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?p=419</guid> 
      <description>&lt;p&gt;It&amp;rsquo;s raining outside. It has been cold and gloomy in the last couple days. Since I cannot afford going to a sunny, remote beach right now, the best I can do is load one of the below webcams and watch ocean waves crash onto the sand. Pathetic I know.&lt;/p&gt;
&lt;p&gt;The following live streams are from the &lt;a href=&#34;http://www.earthcam.com/&#34;&gt;Earthcam Network&lt;/a&gt;. They are pretty well known, and there are quite a few other blogs listing at least some of these streams. With one big difference: All the lists I&amp;rsquo;ve seen link to them using the &lt;em&gt;Real Time Messaging Protocol&lt;/em&gt; (RTMP) protocol. The biggest drawback is that RTMP only works in Flash. But who wants to do Flash these days? Fortunately, Earthcam streams are powered by the &lt;a href=&#34;http://www.wowza.com/&#34;&gt;Wowza Media Server&lt;/a&gt;, which includes support for other protocols as well. So after some food for thought I was able to find the following links which all point to the AVC/H.264 streams using standard HTTP. This means they should be compatible with a wide range of popular video players (I am using &lt;a href=&#34;http://www.mplayerhq.hu/&#34; title=&#34;MPlayer&#34;&gt;MPlayer&lt;/a&gt;).&lt;/p&gt;
</description>
    </item>
    <item>
      <title>Privacy Policy</title>
      <link>https://www.zeitgeist.se/privacy-policy/</link>
      <pubDate>Wed, 04 Dec 2013 21:40:35 +0000</pubDate>
       <guid isPermaLink="false">https://www.zeitgeist.se/?page_id=412</guid> 
      <description>&lt;p&gt;Your privacy is important to us. To better protect your privacy we provide this notice explaining our online information practices and the choices you can make about the way your information is collected and used.&lt;/p&gt;
&lt;h3 id=&#34;collection-of-personal-information&#34;&gt;Collection of Personal Information&lt;/h3&gt;
&lt;p&gt;When visiting zeitgeist.se, the IP address used to access the site will be logged along with the dates and times of access. This information is used to analyze trends, administer the site, track users movement and gather broad demographic information for internal use. Most importantly, any recorded IP addresses are not linked to personally identifiable information.&lt;/p&gt;</description>
    </item>
    <item>
      <title>strongSwan 5 not autostarting on Debian</title>
      <link>https://www.zeitgeist.se/2013/11/27/strongswan-5-not-autostarting-on-debian/</link>
      <pubDate>Wed, 27 Nov 2013 16:51:12 +0000</pubDate>
       <guid isPermaLink="false">http://www.zeitgeist.se/?p=353</guid> 
      <description>Did you follow the guide &lt;a href=&#34;https://www.zeitgeist.se/2013/11/22/strongswan-howto-create-your-own-vpn/&#34; title=&#34;strongSwan 5: How to create your own private VPN&#34;&gt;how to install strongSwan 5&lt;/a&gt; on Debian Wheezy? You may have noticed that strongSwan doesn&amp;rsquo;t automatically start when you reboot the server (tested with 5.1.0-3~bpo70+1). The fix requires a small modification to &lt;code&gt;/etc/init.d/ipsec&lt;/code&gt;.</description>
    </item>
    <item>
      <title>Finding the optimal NAT Keepalive interval</title>
      <link>https://www.zeitgeist.se/2013/11/27/the-optimal-nat-keepalive-interval/</link>
      <pubDate>Wed, 27 Nov 2013 15:59:12 +0000</pubDate>
       <guid isPermaLink="false">http://www.zeitgeist.se/?p=241</guid> 
      <description>&lt;a href=&#34;https://github.com/jsharkey/android-tools/tree/master/udpnat&#34;&gt;udpnat&lt;/a&gt; is a useful tool to figure out the optimal interval for sending out UDP keepalive packets in a specific environment. From the description:</description>
    </item>
    <item>
      <title>MTU woes in IPsec tunnels and how you can fix it</title>
      <link>https://www.zeitgeist.se/2013/11/26/mtu-woes-in-ipsec-tunnels-how-to-fix/</link>
      <pubDate>Tue, 26 Nov 2013 15:55:55 +0000</pubDate>
       <guid isPermaLink="false">http://www.zeitgeist.se/?p=260</guid> 
      <description>Today I ran into a problem with IPsec Xauth PSK and the built-in Android VPN client (Android 4.1.2), resulting in some sites (such as &lt;a href=&#34;https://www.yahoo.com&#34;&gt;www.yahoo.com&lt;/a&gt;) not loading through &lt;a href=&#34;https://www.zeitgeist.se/2013/11/22/strongswan-5-how-to-create-your-own-private-vpn/&#34; title=&#34;strongSwan 5: How to create your own private VPN&#34;&gt;the VPN tunnel&lt;/a&gt;. Turns out I was dealing with MTU issues. When the Android VPN is started, it sets the MTU to 1500 on the tun0 interface:</description>
    </item>
    <item>
      <title>Contact</title>
      <link>https://www.zeitgeist.se/contact/</link>
      <pubDate>Fri, 22 Nov 2013 15:49:35 +0000</pubDate>
       <guid isPermaLink="false">http://www.zeitgeist.se/?page_id=14</guid> 
      <description>&lt;p&gt;Hi there!&lt;/p&gt;
&lt;p&gt;You can reach me at &lt;a href=&#34;mailto:alexander@zeitgeist.se&#34;&gt;alexander@zeitgeist.se&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>strongSwan 5: How to create your own private VPN</title>
      <link>https://www.zeitgeist.se/2013/11/22/strongswan-howto-create-your-own-vpn/</link>
      <pubDate>Fri, 22 Nov 2013 15:41:41 +0000</pubDate>
       <guid isPermaLink="false">http://www.zeitgeist.se/?p=4</guid> 
      <description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;Update 04/20/2014:&lt;/strong&gt; Adjusted to take into account the modular configuration layout introduced in strongSwan 5.1.2. Tweaked cipher settings to provide perfect forward secrecy if &lt;a href=&#34;https://www.zeitgeist.se/2014/04/18/ipsec-fail-perfect-forward-secrecy-where-art-thou/&#34; title=&#34;IPSec Fail: Perfect Forward Secrecy, Where Art Thou?&#34;&gt;supported by the client&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;This article is a step by step guide on how to prepare strongSwan 5 to run your own private VPN, allowing you to stop snoopers from spying on your online activities, to bypass geo-restrictions, and to circumvent overzealous firewalls.&lt;/p&gt;
</description>
    </item>
  </channel>
</rss>
