From Hacksburg Wiki
Jump to navigation Jump to search

Ever wanted to learn about cloud computing, but were worried about monthly costs or confusing product options?

Wanted something new to learn that's stay-at-home compatible?

Hacksburg has computing resources on-site which members can use from anywhere.

What Hacksburg Offers

  • Member Virtual Machines
    • 2 cores, 6GiB RAM, 64GiB hard drive space
    • Private IP address on Hacksburg's network. Laptops, Raspberry Pis, etc. can all communicate directly with each other.
    • Public IPv6, so anyone on the Internet can connect to your server (subject to our firewall rules).
    • Gigabit Internet connection
    • *.<name> DNS wildcard
    • HTTP(S) for DNS wildcard to your server(s)
  • Colocation (bring your own server/Pi/etc.)
    • Subject to power limits (please don't blow the breaker)
    • Colocated servers also on Hacksburg network
  • VPN
    • Access your projects on Hacksburg's network from anywhere.

Hacksburg wants all members to explore computational projects using our resources. If there's something you think we can offer that isn't shown here, come to an open meeting or email to discuss.

Want access?

  • To get a virtual machine, make sure you're an active Hacksburg member, then email
    • VPN access will only be given if you are a board member, have a VM, or have some other reason. Email to request VPN access.

Hacksburg Physical Hardware

  • Main Server
    • HP ProLiant DL370 G6
    • 2x Xeon E5530, 8 Core / 16 Thread
    • 48GB of memory
    • 4x Gigabit Ports
    • 2x 10G SFP+ cages
    • Fibre channel
    • 8x 146GB 10K SAS in RAIDZ1 configuration (Total space reported: 1.06TB)
    • Runs ProxMox VM hosting software
  • Second Server
    • IBM System x3650 M3
    • 2x Xeon X5675, 12 Core / 24 Thread
    • 96GB of memory
    • 10x Gigabit Ports
    • 2x Fibre channel
    • Hard Drives TBD
    • Will run ProxMox VM hosting software
  • Sun Servers 1 and 2
    • SunFire X4200
    • Do not turn on the Sun Servers because they are unacceptably loud.
  • Switch
    • tp-link 8-port Gigabit switch, TL-SG108

Hacksburg Network Layout

  • pfSense Router
    • Internet comes in here
  • Main Server
    • ProxMox web interface for the main server. This is where you go to interact with your VMs.
    • How to access:
    • Where it's located:
  • Docker Host
    • Runs NGINX reverse proxy. All HTTP(S) traffic at Hacksburg runs through this NGINX reverse proxy. Members can request forwarding to their containers.
    • Containers:
  • OctoPrint


VPN allows direct access to the Hacksburg network from anywhere else that has access to the public Internet. Email to get your username and password.

Connection Instructions

Windows 10

These instructions may also work for Windows 8.1, 7, Vista, etc.

1. Download the Hacksburg certificate:

2. Right-click and choose "Install certificate".

3. Choose "Local Machine" (second option) and click Next.

4. Choose "Place all certificates in the following store" (second option).

5. In the window that comes up, choose "Trusted Root Certification Authorities" (second option). Click OK.

6. Click Next.

7. Click Finish.

8. It should say that importing the certificate was successful. Click OK.

9. Open an administrator PowerShell and run the following commands:

 Add-VpnConnection -Name "Hacksburg" -ServerAddress "" –TunnelType IKEv2 -EncryptionLevel Required -AuthenticationMethod EAP -SplitTunneling –AllUserConnection
 Add-VpnConnectionRoute -ConnectionName "Hacksburg" -DestinationPrefix -PassThru -AllUserConnection
 Add-VpnConnectionRoute -ConnectionName "Hacksburg" -DestinationPrefix -PassThru -AllUserConnection
 Add-VpnConnectionRoute -ConnectionName "Hacksburg" -DestinationPrefix -PassThru -AllUserConnection

You should now have a VPN named Hacksburg. Click the network icon in taskbar tray, click Hacksburg, and connect with the provided username and password.

Linux (and friends)


Install strongswan. If you use NetworkManager (Ubuntu), you can use these instructions [1] and fill in the following values:

VPN Server IP:

VPN Username: Email to request

VPN Password: Email to request

If you do not use NetworkManager, add the following rows to your ipsec.conf file. On Arch Linux, this file is located at /etc/ipsec.conf:

conn Hacksburg

Where <CACERT> is replaced by the path to this file: and <USERNAME> is replaced by the username issued to you by emailing Then, create the file /etc/ipsec.secrets and include the following line:


Where the username and password are issued to you by emailing Then, run

# ipsec auto --add Hacksburg

Then, make sure /etc/xl2tpd/xl2tpd.conf has the following contents:

lac Hacksburg]
lns =
ppp debug = yes
pppoptfile = /etc/ppp/options.l2tpd.client
length bit = yes

And /etc/ppp/options.l2tpd.client has the following contents:

idle 1800
mtu 1410
mru 1410
connect-delay 5000
password <PASSWORD>

Again using the username and password you received from the board.

Start VPN

You can start the VPN by running:

# systemctl start strongswan
# swanctl -i -c Hacksburg

Software Tools

You can remote in to Hacksblade to use SprutCAM and Lightburn:

1. Install NoMachine ( When proceeding through the instructions, do not install the server. If you already have NoMachine, no need to install it again.

1. Connect to VPN.

2. Open NoMachine.

3. In the search box, connect to "".

4. Use your username and password. You will be prevented from logging in if someone else is using the computer.

5. Important: Make sure to unselect "Change the server resolution to match the client when I connect". If you choose this, you can mess up the remote desktop for other users.

6. You are now presented with the Windows login. Login with the Hacksburg account, not your own.

7. Do your work.

8. Log out of the Hacksburg account using the start menu.

9. Close the NoMachine connection by clicking on the top right corner, choosing the power button, and clicking "Exit the Player".