From 5e3e5ce2865dbc72dddc51610a94094faf2285ef Mon Sep 17 00:00:00 2001 From: Maxim Devaev Date: Fri, 31 Jul 2020 14:12:30 +0300 Subject: [PATCH] Update README.md --- README.md | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index fe5f7e39..78f1dc66 100644 --- a/README.md +++ b/README.md @@ -273,7 +273,7 @@ The Pi-KVM OS is based on Arch Linux ARM and contains all the required packages ``` 8. **Only for v0**. Now you need to flash the Arduino. This can be done using your RPi. **Before starting this operation, disconnect the RESET wire from the Arduino board, otherwise the firmware will not be uploaded.** Connect the Arduino and RPi with a suitable USB cable. Log in to the RPi and upload the firmware. Then connect the RESET wire, disconnect the USB cable, and reboot the RPi. - ``` + ```shell [user@localhost os]$ ssh root@ [root@pikvm ~]# rw [root@pikvm ~]# systemctl stop kvmd @@ -285,13 +285,16 @@ The Pi-KVM OS is based on Arch Linux ARM and contains all the required packages ``` 9. Congratulations! Your Pi-KVM will be available via SSH (`ssh root@` with user `root` and password `root` by default) and HTTPS (try to open it in a browser at `https://` with user `admin` and password `admin`). For HTTPS a self-signed certificate is used by default. -10. **Common security note**: To change root password use command `passwd` via ssh or webterm. To change Pi-KVM web password use `kvmd-htpasswd set admin`. +10. **Common security note**: To change root password use command `passwd` via SSH or webterm. To change Pi-KVM web password use `kvmd-htpasswd set admin`. 11. **Security note for v2**: Immediately after installation, Pi-KVM will be available via USB OTG from the managed server via the virtual serial console port. This is very helpful if SSH is unavailable (and you don't have a UART cable), so you can login to the device using something like mingetty or PuTTY and find out what's wrong. The login is protected by the same password that is used for the root login. In some cases (if different networks are used for servers and KVM for security reasons), you may want to disable this feature. To do this: + * Switch device to RW-mode: + ```shell + [root@pikvm ~]# rw + ``` * Edit file `/etc/securetty` and remove line `ttyGS0`. * Run: - ```bash - [root@pikvm ~]# rw + ```shell [root@pikvm ~]# systemctl enable getty@ttyGS0.service [root@pikvm ~]# rm -rf /etc/systemd/system/getty@ttyGS0.service.d [root@pikvm ~]# reboot