7 More Discussions You Might Find Interesting
1. Solaris
Hello
I am copying a tar from windows7 to Solaris with filezilla i could see, some characters in the name of the file get deleted.
I could see only substring of the filename
eg: original filename :abcdefghijklmnopqrstu.h
i can see like abcdefghijklm
solution to this problem is highly... (2 Replies)
Discussion started by: Revathi R
2 Replies
2. Red Hat
Lets say for example I want to restrict a users access, for example if they FTP in I want to lock them down to a certain directory. What is the best way of doing this? I'm planning to implement LDAP accounts, so I'd need this to be done automatically. Just not sure how I would go about this task. (3 Replies)
Discussion started by: Printf
3 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I am setting up a new Suse server and I'm very happy with it . So far Apache2, SVN, PHP5 and MySQL are up and running. Now I want to create and delete users (for coders for our projects) but they aren't allowed to do anything so there must be some restrictions. I want access restriction so... (1 Reply)
Discussion started by: kever
1 Replies
4. Shell Programming and Scripting
Hi,
I am setting up a new Suse server and I'm very happy with it :). So far Apache2, SVN, PHP5 and MySQL are up and running. Now I want to create and delete users (for coders for our projects) but they aren't allowed to do anything so there must be some restrictions. I want access restriction so... (0 Replies)
Discussion started by: kever
0 Replies
5. Shell Programming and Scripting
Hi,
Can we join two fixed length files in Unix using JOIN command? Is there any other command to accomplish the same?
Thanks,
G.Harikrishnan (6 Replies)
Discussion started by: gharikrishnan
6 Replies
6. UNIX for Dummies Questions & Answers
Hi Guys,
Could anyone shed some light on the length of a Unix filepath max length pls ?
thanks !
Wilson (3 Replies)
Discussion started by: wilsontan
3 Replies
7. UNIX for Dummies Questions & Answers
-rw-r--r-- 1 fxpbftp fusion 368 Jun 10 08:34 FX_1.11840235236594E12.111234236809956
If I have a long list of files that look like this (they al begni with FX_1.#######.####) Sometimes, there may be less numbers or more in the filename, that varies.
I wish to isolate just the... (8 Replies)
Discussion started by: yongho
8 Replies
BLD(8) System Manager's Manual BLD(8)
NAME
bld - A black list daemon
SYNOPSIS
bld -h | [option]
OPTIONS
-v Output version information and exit
-n Do not fork to become a daemon
-a address
Address to bind to
-p port
Port to listen to
-l number
Log verbosity (between 0 and 3)
-t number
Minimum time interval before blacklisting
-m number
Maximum submissions in time interval
-i number
IP list size
-b number
Blacklist size
-e number
Blacklist expiration
-P filename
Filename where to save PID
-T number
Timeout for client connections
-u user
User to run as
-g group
Group to run as
-f filename
Use a specific configuration file
-A filename
Filename where to find ACLs
-W filename
Filename where to find whitelist
-B filename
Filename where to store blacklist
-I filename
Filename where to store whole IP list
DESCRIPTION
By default, the bld daemon listens to requests on port 2905. Requests are either IP addresses submissions or checks against the black
list.
bld uses a very simple algorithm to decide whether to add IP addresses to the blacklist or not. The first time an IP address is submitted,
it is added to an internal list with a timestamp and all further requests increment a counter for this IP. As soon as the minimum time
interval is elapsed (default: 30 seconds), and if a maximum requests ratio is reached (default: 10 submissions in the 30 seconds interval),
the IP is put in the blacklist. It is then blacklisted for a configurable time (default: 900 seconds).
PROTOCOL
Requests sent to bld are rather simple. Each request or reply is followed by a linefeed and a carriage return. A client may only send one
request per TCP session. As of now, two commands may be used: ip (address submission) and ip? (ask if address is blacklisted).
ip=a.b.c.d submits an IP address. The server acknowledges either with a 200 code if the address is not blacklisted or a 421 if it is.
ipdecr=a.b.c.d decrements the internal counter for an IP address. The lowest value for the counter is zero. The server always acknowl-
edges with a 200 code.
ip?=a.b.c.d asks if address is blacklisted. The server reply may be 421 if it is or 200 if it's not.
ipbl=a.b.c.d forces the insertion in the blacklist. The server acknowledges with a 200 code.
If using IP based restrictions, the server reply may be 600 if the client is not in the correct ACL to perform a request. Any other error
will generate a reply with a 500 error code.
NOTES
bld binds to localhost by default and accepts any local request, so please make sure that only trusted users can establish a connection to
the daemon. Please check that all authorized hosts meet the minimal security requirements before changing this parameter even if using an
access control list (see bld_acl.conf(5)).
bld will log some statistics if it receives the SIGUSR1 signal. SIGUSR2 is used to force a dump of both lists in bld working directory.
FILES
/etc/bld/bld.conf /etc/bld/bld_acl.conf /etc/bld/bld_whitelist.conf /var/run/bld/bld.pid /var/run/bld/bld_iplist.dump
/var/run/bld/bld_blacklist.dump
SEE ALSO
bld.conf(5) bld_acl.conf(5) bld_whitelist.conf(5) bldread(8) bldquery(8) bldsubmit(8) blddecr(8)
AUTHOR
Olivier Beyssac <obld@r14.freenix.org>
August 2004 BLD(8)