07-30-2008
Any idea on 3 Octet IP address ?
Hi All,
I found my weblog contain entries like 121.23.3 Instead of four octet.
I am quite confused is it possible to have 3 octet ip at all ??
Is it generating by any program and hittng the website ?
Is it a subdomain ?
Please tell me your understanding on it ?
Thanks
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Keeping in mind that I'm relatively comfortable with programming in general but very new to unix and korn/bourne shell scripts..
I'm using awk on a CSV file, and then performing calculations and operations on specific fields within specific records. The CSV file I'm working with has about 600... (2 Replies)
Discussion started by: yongho
2 Replies
2. IP Networking
Hi sir,
i want to make such programe which takes MAC(Ethernet) address of any host & give me its IP address.......
but i'm nt getting that how i can pass the MAC address to Frame........
Please give me an idea for making such program...
Thanks & regards
Krishna (3 Replies)
Discussion started by: krishnacins
3 Replies
3. Programming
Hi all,
Situation is as below.
I would get an IP address and port from eithe r a file or command line. It probably would be as char * or string. So was wondering how I could accept this and increment the last octets?
Incrementing the port is fine. I could get that into an integer by atoi()... (8 Replies)
Discussion started by: Naanu
8 Replies
4. UNIX for Dummies Questions & Answers
:) Firstly Hi all!!, im NEW!! and on here hoping that someone might be able to offer me some help... i have a server that keeps crashing every few days with the error message:
PANIC KERNAL-MODE ADDRESS FAULT ON USER ADDRESS 0X14
KERNAL PAGE FAULT FROM (CS:EIP)=(100:EF71B5BD)
EAX=EF822000... (10 Replies)
Discussion started by: Twix
10 Replies
5. IP Networking
Hi there
I lost connectivity to one of our remote systems and when I checked the messages log I found the following:
Aug 10 23:42:34 host xntpd: time reset (step) 1.681729 s
Aug 16 13:20:51 host ip: WARNING: node "mac address" is using our IP address x.x.x.x on aggr1
Aug 16 13:20:51 host... (9 Replies)
Discussion started by: notreallyhere
9 Replies
6. UNIX for Dummies Questions & Answers
I'm trying to learn as much about GRUB as I can and it's stages are stored in these types of files.
Any info or search terms is appreciated!:wall: (5 Replies)
Discussion started by: theKbStockpiler
5 Replies
7. Shell Programming and Scripting
Hi Experts,
I am trying to print $2 & the IP_address upto 3rd octet only.
But unable to do so, Trying # awk '{print $2, substr($4,1,9)}' file . but not correct
File:
HOST= cmiHOST06 :: 10.26.107.73:/data120 /nbu/cmiHOST06/athpx07/aa1
HOST= cmiHOST05 :: 10.26.12.76:/data120... (5 Replies)
Discussion started by: rveri
5 Replies
8. Shell Programming and Scripting
Experts,
In one example I have seen how to get output upto 3rd octet, when there is a ":" separated with the 4rth octet.
However in this example how to remove 4rth octet and to keep upto 3rd octet with regular expressions and awk sub function:
I have tried with :but not working:
# awk '{... (3 Replies)
Discussion started by: rveri
3 Replies
9. UNIX for Advanced & Expert Users
Hi ,
Could someone let me know how to detect duplicate ip address after assigning ip address to ethernet interface using c program (3 Replies)
Discussion started by: Gopi Krishna P
3 Replies
10. Shell Programming and Scripting
Hello,
Im looking to help out my team by automating a simple search list. The user will look for a peering ip /30. For example 192.168.1.2/30 and gets the result. Im trying to get the entered /30 and subtract the last octet by one.
echo -n "Enter peering ip : "; read peeringip
cat... (3 Replies)
Discussion started by: D'go
3 Replies
LEARN ABOUT FREEBSD
ntp.keys
NTP.KEYS(5) BSD File Formats Manual NTP.KEYS(5)
NAME
ntp.keys -- NTP daemon key file format
SYNOPSIS
/etc/ntp.keys
DESCRIPTION
Following is a description of the format of NTP key files. For a description of the use of these files, see the "Authentication Support"
section of the ntp.conf(5) page.
In the case of DES, the keys are 56 bits long with, depending on type, a parity check on each byte. In the case of MD5, the keys are 64 bits
(8 bytes). ntpd(8) reads its keys from a file specified using the -k command line option or the keys statement in the configuration file.
While key number 0 is fixed by the NTP standard (as 56 zero bits) and may not be changed, one or more of the keys numbered 1 through 15 may
be arbitrarily set in the keys file.
The key file uses the same comment conventions as the configuration file. Key entries use a fixed format of the form
keyno type key
where keyno is a positive integer, type is a single character which defines the key format, and key is the key itself.
The key may be given in one of four different formats, controlled by the type character. The four key types, and corresponding formats, are
listed following.
S The key is a 64-bit hexadecimal number in the format specified in the DES specification; that is, the high order seven bits of each octet
are used to form the 56-bit key while the low order bit of each octet is given a value such that odd parity is maintained for the octet.
Leading zeroes must be specified (i.e., the key must be exactly 16 hex digits long) and odd parity must be maintained. Hence a zero key,
in standard format, would be given as '0101010101010101'.
N The key is a 64-bit hexadecimal number in the format specified in the NTP standard. This is the same as the DES format, except the bits
in each octet have been rotated one bit right so that the parity bit is now the high order bit of the octet. Leading zeroes must be spec-
ified and odd parity must be maintained. A zero key in NTP format would be specified as '8080808080808080'.
A The key is a 1-to-8 character ASCII string. A key is formed from this by using the low order 7 bits of each ASCII character in the
string, with zeroes added on the right when necessary to form a full width 56-bit key, in the same way that encryption keys are formed
from UNIX passwords.
M The key is a 1-to-8 character ASCII string, using the MD5 authentication scheme. Note that both the keys and the authentication schemes
(DES or MD5) must be identical between a set of peers sharing the same key number.
Note that the keys used by the ntpq(8) and ntpdc(8) programs are checked against passwords requested by the programs and entered by hand, so
it is generally appropriate to specify these keys in ASCII format.
FILES
/etc/ntp.keys the default name of the configuration file
SEE ALSO
ntp.conf(5), ntpd(8), ntpdate(8), ntpdc(8)
BUGS
ntpd(8) has gotten rather fat. While not huge, it has gotten larger than might be desirable for an elevated-priority daemon running on a
workstation, particularly since many of the fancy features which consume the space were designed more with a busy primary server, rather than
a high stratum workstation, in mind.
BSD
January 13, 2000 BSD