Example /etc/apt/apt.conf.d/90ipv6only
Put inside the following:
Acquire::ForceIPv4 "true";
and the do apt-get update.This works on Debian Jessie/Devuan Jessie.
Acquire::ForceIPv4 "true";
and the do apt-get update.#!/bin/sh
# clean the working dirs
/bin/rm -fr /usr/local/jboss/server/app1/work
/bin/rm -fr /usr/local/jboss/server/app1/tmp
JBOSS_HOST="10.10.0.25"
# next lines are fix for cyrillic letters inserted in database
# with AMERICAN_AMERICA.WE8ISO8859P1
NLS_LANG="AMERICAN_AMERICA.WE8ISO8859P1"
export LNS_LANG
LANG="bg_BG"
export LANG
exec /usr/bin/chpst -u jboss:jboss -U jboss:jboss /usr/lib/jvm/java-1.7.0-openjdk-i386/bin/java -Xms512m -Xmx1536m -XX:PermSize=256m -XX:MaxPermSize=512 -XX:+CMSClassUnloadingEnabled -XX:StackShadowPages=20 -Dsun.rmi.dgc.client.gcInterval=3600000 -Dsun.rmi.dgc.server.gcInterval=3600000 -Djava.awt.headless=true -Dsun.net.inetaddr.ttl=30 -Djava.net.preferIPv4Stack=true -Djava.endorsed.dirs=/usr/local/jboss/lib/endorsed -classpath /usr/local/jboss/bin/run.jar:/usr/lib/jvm/java-1.7.0-openjdk-i386/lib/tools.jar org.jboss.Main -c app1 -b $JBOSS_HOST
#!/bin/sh
exec setuidgid jboss /usr/bin/svlogd -tt n35 s511048576 /var/log/jboss-app1
# openssl x509 -noout -text -in certificate-file.crt
# openssl x509 -in ca.crt -days 4650 -out ca_new.crt -signkey ca.key
# openssl verify newserver.crt -CAFile ca.crt
# . ./vars
# ./revoke-full name_of_cert_file
openssl crl -text -noout -in /etc/openvpn/crl.pemRegenerate expired CRL file
# openssl ca -gencrl -keyfile ca.key -cert ca.crt -out new-crl.pem -config ./openssl.cnf
# find . -print0 | xargs -0 rm -f2. using rsync with empty directory (so far the fastest way I've found)
# rsync -a --delete /path/to/empty-directory/ /path/to/dir-to-be-deleted/
# tune2fs -l /dev/mapper/vg_server-lv_root |grep -i "mount opt"
Default mount options: user_xattr acl
# tune2fs -o acl /dev/mapper/vg_server-lv_root
# tune2fs -o user_xattr /dev/mapper/vg_server-lv_root
# getfacl /Инсталираме следните пакети: samba, krb5 (Kerberos), OpenLDAP. При Oracle Linux пакетите са както следва:
getfacl: Removing leading '/' from absolute path names
# file: .
# owner: root
# group: root
user::r-x
group::r-x
other::r-x
# rpm -qa|grep krb
pam_krb5-2.3.11-9.el6.x86_64
krb5-libs-1.10.3-15.el6_5.1.x86_64
krb5-libs-1.10.3-15.el6_5.1.i686
krb5-workstation-1.10.3-15.el6_5.1.x86_64
# rpm -qa|grep -i openldap
openldap-2.4.23-34.el6_5.1.i686
openldap-2.4.23-34.el6_5.1.x86_64
# rpm -qa|grep -i sambaВ другите дистрибуции имената на пакетите са аналогични.
samba-client-3.6.9-169.el6_5.x86_64
samba-common-3.6.9-169.el6_5.x86_64
samba-winbind-clients-3.6.9-169.el6_5.x86_64
samba-3.6.9-169.el6_5.x86_64
samba-winbind-3.6.9-169.el6_5.x86_64
# smbd -b | grep LDAPНастройваме и тестваме Kerberos. Нека домейна да се казва HORIZON9.LOCAL и домейн сървъра се намира на адрес ad-dc-01.horizon9.local
HAVE_LDAP_H
HAVE_LDAP
HAVE_LDAP_DOMAIN2HOSTLIST
# smbd -b | grep KRB
HAVE_KRB5_H
HAVE_ADDRTYPE_IN_KRB5_ADDRESS
HAVE_KRB5 # smbd -b | grep ADS
WITH_ADS
WITH_ADS
# smbd -b | grep WINBIND
WITH_WINBIND
WITH_WINBIN
[libdefaults]
default_realm = HORIZON9.LOCAL
dns_lookup_realm = true
dns_lookup_kdc = true
ticket_lifetime = 24h
renew_lifetime = 7d
forwardable = true
[realms]
HORIZON9.LOCAL = {
kdc = AD-DC-01.HORIZON9.LOCAL
admin_server = AD-DC-01.HORIZON9.LOCAL
default_domain = HORIZON9.LOCAL
}
[domain_realm]
.horizon9.local = HORIZON9.LOCAL
horizon9.local = HORIZON9.LOCAL
# kinit Administrator@HORIZON9.LOCALАко не покаже никакво съобщение, значи работи както трябва.
Password for Administrator@HORIZON9.LOCAL:
#
[global]Файлът /etc/samba/user.map трябва да съдържа следното:
log file = /var/log/samba/log.%m
max log size = 50
security = ads
netbios name = LINUX-SAMBA-AD
realm = HORIZON9.LOCAL
workgroup = HORIZON9
idmap uid = 500-20000000
idmap gid = 500-20000000
winbind enum users = yes
winbind enum groups = yes
winbind use default domain = yes
template homedir = /home/%U
template shell = /bin/bash
client use spnego = yes
domain master = no
vfs objects = acl_xattr
map acl inherit = yes
store dos attributes = yes
username map = /etc/samba/user.map
[share1]
path = /home/samba
comment = Share1
public = yes
browsable = yes
guest ok = yes
writable = yes
!root = HORIZON9\Administrator HORIZON9\Administratorили който и да е потребител с администраторски права в домейна.
# net ads join -U AdministratorГрешката при DNS update се поправя, като се добави на ръка запис в Windows DNS-а.
Enter Administrator's password:
Using short domain name -- HORIZON9
Joined 'LINUX-SAMBA-AD' to dns domain 'horizon9.local'
No DNS domain configured for linux-samba-ad. Unable to perform DNS Update.
DNS update failed!
#
passwd: filesги заменяме с:
shadow: files
group: files
passwd: compat winbindРестартираме winbind и samba:
shadow: files
group: compat winbind
# service winbind restartДобавяме групата 'Domain Admins' към ACL на файловата система, където ще се намират споделените директории (примерно /home/samba):
# service smb restart
# setfacl -Rm g:'Domain Admins':rwx /home/sambaАко някоя от тези команди ви дава грешка, че не може да намери такава група, най-вероятно е да не се виждат потребителите/групите от домейна. Може да проверите дали потребителите и групите се виждат с помощта на следната команда:
# chown -R nobody:"domain admins" /home/samba
# wbinfo -gДобавяме winbind в методите за автентикация в /etc/pam.d/. В Oracle Linux това се прави с командата authconfig-tui (за конзола) или authconfig-gtk (графичен интерфейс). Ето промените, които прави authconfig-tui:
# wbinfo -u
# grep -nri winb /etc/pam.d/
/etc/pam.d/system-auth-ac:7:auth sufficient pam_winbind.so use_first_passАко всичко е наред, можете вече да си раздавате права за samba shares от windows машина. След като сте раздали права от Windows машината, може да проверите дали всичко е наред със споделената директория (/home/samba):
/etc/pam.d/system-auth-ac:12:account [default=bad success=ok user_unknown=ignore] pam_winbind.so
/etc/pam.d/system-auth-ac:17:password sufficient pam_winbind.so use_authtok
/etc/pam.d/smartcard-auth-ac:10:account [default=bad success=ok user_unknown=ignore] pam_winbind.so
/etc/pam.d/password-auth-ac:7:auth sufficient pam_winbind.so use_first_pass
/etc/pam.d/password-auth-ac:12:account [default=bad success=ok user_unknown=ignore] pam_winbind.so
/etc/pam.d/password-auth-ac:17:password sufficient pam_winbind.so use_authtok
/etc/pam.d/smartcard-auth:10:account [default=bad success=ok user_unknown=ignore] pam_winbind.so
/etc/pam.d/fingerprint-auth-ac:10:account [default=bad success=ok user_unknown=ignore] pam_winbind.so
/etc/pam.d/fingerprint-auth:10:account [default=bad success=ok user_unknown=ignore] pam_winbind.so
/etc/pam.d/system-auth:7:auth sufficient pam_winbind.so use_first_pass
/etc/pam.d/system-auth:12:account [default=bad success=ok user_unknown=ignore] pam_winbind.so
/etc/pam.d/system-auth:17:password sufficient pam_winbind.so use_authtok
/etc/pam.d/password-auth:7:auth sufficient pam_winbind.so use_first_pass
/etc/pam.d/password-auth:12:account [default=bad success=ok user_unknown=ignore] pam_winbind.so
/etc/pam.d/password-auth:17:password sufficient pam_winbind.so use_authtok
# getfacl /home/sambaТук се виждат и добавените права за достъп от АD потребители и групи.
getfacl: Removing leading '/' from absolute path names
# file: home/samba
# owner: administrator
# group: domain\040admins
user::rwx
user:root:rwx
user:nobody:rwx
group::rwx
group:domain\040users:r-x
mask::rwx
other::r-x
default:user::rwx
default:group::rwx
default:group:domain\040users:r-x
default:group:domain\040admins:rwx
default:mask::rwx
default:other::r-x
!root = HORIZON9\guest HORIZON9\guestОт компютъра, който не е в домейна, при опит за достъпване на samba share ще ви поиска потребител и парола. Пишете за потребител: HORIZON9\guest без да въвеждате парола, и вече имате достъп до този share.
geroy@newsrv:~$ telnet localhost 25The solution: Default installation of OpenBSD 5.7 makes /var directory mounted with nosuid option. Remove it from /etc/fstab and then reboot.
Trying 127.0.0.1...
Connected to 127.0.0.1.
Escape character is '^]'.
220 mx1.polycomp.bg ESMTP
helo
250 mx1.polycomp.bg
mail from: test@mail.bg
250 ok
rcpt to: testovacc@gmail.com
250 ok
data
354 go ahead
test test 1 2 3
.
451 qq trouble creating files in queue (#4.3.0)
# cat /etc/fstabremove nosuid to look like this:
f292a8d8eba5b8dc.b none swap sw
f292a8d8eba5b8dc.a / ffs rw 1 1
f292a8d8eba5b8dc.k /home ffs rw,nodev,nosuid 1 2
f292a8d8eba5b8dc.d /tmp ffs rw,nodev,nosuid 1 2
f292a8d8eba5b8dc.f /usr ffs rw,nodev 1 2
f292a8d8eba5b8dc.g /usr/X11R6 ffs rw,nodev 1 2
f292a8d8eba5b8dc.h /usr/local ffs rw,nodev 1 2
f292a8d8eba5b8dc.j /usr/obj ffs rw,nodev,nosuid 1 2
f292a8d8eba5b8dc.i /usr/src ffs rw,nodev,nosuid 1 2
f292a8d8eba5b8dc.e /var ffs rw,nodev,nosuid 1 2
f292a8d8eba5b8dc.e /var ffs rw,nodev 1 2Save and reboot.
C:> pip install setuptools
set INCLUDE=%INCLUDE%C:\work\libsodium-1.0.2-msvc\include
set LIB=%LIB%C:\work\libsodium-1.0.2-msvc\Win32\Release\v120\dynamic
set SODIUM_INSTALL=system
on 64bit Windows change:
set LIB=%LIB%C:\work\libsodium-1.0.2-msvc\Win32\Release\v120\dynamic
to:
set LIB=%LIB%C:\work\libsodium-1.0.2-msvc\x64\Release\v120\dynamic
http://msinttypes.googlecode.com/svn/trunk/stdint.h
http://msinttypes.googlecode.com/svn/trunk/inttypes.h
C:\>cd C:\work\PyNaCl-0.3.0
C:\work\PyNaCl-0.3.0>python setup.py build
C:\work\PyNaCl-0.3.0>python setup.py install
C:>copy C:\work\libsodium-1.0.2-msvc\Win32\Release\v120\dynamic\libsodium.dll C:\Python27\Lib\site-packages\PyNaCl-0.3.0-py2.7-win32.egg\nacl\_lib
import nacl.utils
from nacl.public import PrivateKey, Box
skbob = PrivateKey.generate()
pkbob = skbob.public_key
skalice = PrivateKey.generate()
pkalice = skalice.public_key
bob_box = Box(skbob, pkalice)
message = b"Kill all humans"
nonce = nacl.utils.random(Box.NONCE_SIZE)
encrypted = bob_box.encrypt(message, nonce)
print "Encrypted Message:", encrypted
alice_box = Box(skalice, pkbob)
plaintext = alice_box.decrypt(encrypted)
print "Plaintext Message:", plaintext
C:\work>python nacltest.py
Encrypted Message: ₧╫fαIé├l(α▀W¬½♥↔≈‼╟ üRδD≈é☻'^∞v√oòΣls╣8,ƒ ↓ü↓╓+ô╓è╣=§╣
Plaintext Message: Kill all humans
C:\work>