01-14-2008
10 More Discussions You Might Find Interesting
1. Cybersecurity
On AIX 4.3.3 , how telnet access will be allowed to few users only whereas other will not be able to telnet the server? (6 Replies)
Discussion started by: amit
6 Replies
2. UNIX for Dummies Questions & Answers
How do i determen (what command) the max. number of users allowed
Thanks in advance (10 Replies)
Discussion started by: siza
10 Replies
3. UNIX for Advanced & Expert Users
We used to have a ftp user id with no telnet session allowed in server side.
We used this ftp user id in script by transferring file from client to Server.
Currently we need to implement sftp to replace ftp.
We have tested few round and working fine by using sftp with normal user id (allow... (2 Replies)
Discussion started by: superdougl
2 Replies
4. UNIX for Dummies Questions & Answers
we moved to new server this weekend.
npty nstrpty nstrtel all set to 700
now this AM, users are getting on and after 60 (which was the default for those parms) users - everyone else gets a telnet msg.
I urgently need to know what is causing this and how to fix.
thank you.
Lisa (3 Replies)
Discussion started by: LisaS
3 Replies
5. Solaris
I am trying to find the following information regarding the logging of telnet sessions within a Solaris 10 environment:
(1) How can I tell if the logging of telnet sessions is enabled on a Solaris 10 machine?
(2) Assuming that the logging of telnet sessions is not enabled, what is the... (1 Reply)
Discussion started by: RobSand
1 Replies
6. UNIX for Advanced & Expert Users
Hi Users,
Kindly help me with below query of mine.
Using Red Hat Linux Enterprise Edition as the client how many simultaneous
1) Maximum FTP sessions are allowed
2) Maximum Telnet sessions are allowed
3) any special settings need to be enabled for maximum telnet and ftp sessions on... (2 Replies)
Discussion started by: newbie07
2 Replies
7. AIX
Looking at /etc/services on AIX 6.1, I noticed some bizarre port numbers which exceed the 16-bit maximum port number for TCP (i.e. they are higher than 65535.)
sco_printer 70000/tcp sco_spooler # For System V print IPC
sco_s5_port 70001/tcp lpNet_s5_port ... (5 Replies)
Discussion started by: garethr
5 Replies
8. HP-UX
Currenly my hp-ux server can take the default of 60 telnet connections,
i want to know how i can increase this. and also can i effect such changes without doing a reboot.
My server is HP-UX B.11.23 (1 Reply)
Discussion started by: tomjones
1 Replies
9. Solaris
hello guys, Does anybody know how I can log all the telnet sessions for a specific IP.
For instance, anybody who make a telnet to IP x.x.x.x this session will be logged. the purpose of it is that I need to know every command that people are running on this node.
Any help ?
Thanks. (1 Reply)
Discussion started by: cerioni
1 Replies
10. Red Hat
I am being pushed from AIX onto RHEL 6 and after our first 'chuck it on' install, I have a problem. Where is the old (okay insecure) telnet & ftp server? I know that they are probably regarded as archaic now, but the source servers do not have the SSH tools, so I've got to somehow transfer the... (4 Replies)
Discussion started by: rbatte1
4 Replies
LEARN ABOUT OPENDARWIN
ssl_ctx_flush_sessions
SSL_CTX_flush_sessions(3) OpenSSL SSL_CTX_flush_sessions(3)
NAME
SSL_CTX_flush_sessions, SSL_flush_sessions - remove expired sessions
SYNOPSIS
#include <openssl/ssl.h>
void SSL_CTX_flush_sessions(SSL_CTX *ctx, long tm);
void SSL_flush_sessions(SSL_CTX *ctx, long tm);
DESCRIPTION
SSL_CTX_flush_sessions() causes a run through the session cache of ctx to remove sessions expired at time tm.
SSL_flush_sessions() is a synonym for SSL_CTX_flush_sessions().
NOTES
If enabled, the internal session cache will collect all sessions established up to the specified maximum number (see
SSL_CTX_sess_set_cache_size()). As sessions will not be reused ones they are expired, they should be removed from the cache to save
resources. This can either be done
automatically whenever 255 new sessions were established (see SSL_CTX_set_session_cache_mode(3)) or manually by calling SSL_CTX_flush_ses-
sions().
The parameter tm specifies the time which should be used for the expiration test, in most cases the actual time given by time(0) will be
used.
SSL_CTX_flush_sessions() will only check sessions stored in the internal cache. When a session is found and removed, the remove_session_cb
is however called to synchronize with the external cache (see SSL_CTX_sess_set_get_cb(3)).
RETURN VALUES
SEE ALSO
ssl(3), SSL_CTX_set_session_cache_mode(3), SSL_CTX_set_timeout(3), SSL_CTX_sess_set_get_cb(3)
0.9.7d 2002-04-30 SSL_CTX_flush_sessions(3)