Sponsored Content
Top Forums Shell Programming and Scripting Help needed with script to verify the version of BIND Post 302303009 by sport on Wednesday 1st of April 2009 03:49:11 PM
Old 04-01-2009
Bug Help needed with script to verify the version of BIND

I have tried thought of using instfix -ivqc | grep BIND , but this did not return the result I was looking for; it seem to list out the the different patches that had been applied to BIND. I'm actually looking for overall version, like you'd get when checking the OS level for instance.
 

7 More Discussions You Might Find Interesting

1. Cybersecurity

bind version

How do I find out my current version of BIND? Dhall1973:D (1 Reply)
Discussion started by: dhall1973
1 Replies

2. Programming

Why a shared version is needed

Trying to make a library and get this error : *** Warning: This library needs some functionality provided by -lming32. *** I have the capability to make that library automatically link in when *** you link to this library. But I can only do this if you have a *** shared version of the... (1 Reply)
Discussion started by: hirosima
1 Replies

3. Red Hat

How to verify the current NIC driver version installed in RHEL5.3??

Guys, Can you help me how to verify the current installed NIC driver version in RHEL5.3? Thanks.:D (1 Reply)
Discussion started by: shtobias
1 Replies

4. UNIX for Advanced & Expert Users

ldapsearch in monitoring script without bind password written in script

Hi I do a very simple monitoring of our OpenLDAP (runs in cronjob and generate alerts if unsuccessfull) $ ldapsearch -h hostname.domain -D "cn=monitor_user,ou=People,dc=organisation" -w "password" -b "dc=organisation" -x "(&(cn=monitor_user)(ou=People))" dn | grep -v version dn:... (4 Replies)
Discussion started by: slashdotweenie
4 Replies

5. Shell Programming and Scripting

Needed script for the version file

I need some help with the logic and syntax for a shell script (ksh) that will search a directory and look for similar files and save only the 5 versions. The version number is in the file name. However, the files are of varying name lengths and may have 1 or many files, with no limit to the... (2 Replies)
Discussion started by: hemanthsaikumar
2 Replies

6. UNIX for Advanced & Expert Users

Script to verify veritas mirror

Hi Experts, I have lot of Solaris servers and in most of them, root disk is mirrored in rootdg. I just want to check all servers, if there is any server whose root disk is not mirrored. Either it may be with detached plexes or not mirrored at all. I can run a for loop for all servers. Can... (4 Replies)
Discussion started by: solaris_1977
4 Replies

7. Cybersecurity

Rpm for BIND 9 version 9.9.7-P2 (fix CVE-2015-5477) rhel

Hello, I have a RedHat machine (version 5.11) and i need to install BIND version version 9.9.7-P2 in order to fix a known BIND vulnerability CVE-2015-5477. I downloaded the tar file from isc website but i am having trouble to install the file. Does anybody knows a link for the rpm package of... (0 Replies)
Discussion started by: omonoiatis9
0 Replies
SOFTHSM-KEYCONV(1)					      General Commands Manual						SOFTHSM-KEYCONV(1)

NAME
softhsm-keyconv - converting between BIND and PKCS#8 key file formats SYNOPSIS
softhsm-keyconv --topkcs8 --in path --out path [--pin PIN] softhsm-keyconv --tobind --in path [--pin PIN] --name name [--ttl ttl --ksk] --algorithm algorithm DESCRIPTION
softhsm-keyconv can convert between BIND .private-key files and the PKCS#8 file format. This is so that you can import the PKCS#8 file into libsofthsm using the command softhsm. If you have another file format, then openssl probably can help you to convert it into the PKCS#8 file format. The following files will be created when converting to BIND file format: Kname+alg_id+key_tag.key Public key in RR format Kname+alg_id+key_tag.private Private key in BIND key format The three parts of the file name means the following: name The owner name given by the --name argument. alg_id A numeric representation of the --algorithm argument. key_tag Is a checksum of the DNSKEY RDATA. OPTIONS
--topkcs8 Convert from BIND .private-key format to PKCS#8. Use with --in, --out, and --pin. --tobind Convert from PKCS#8 to BIND .private-key format. Use with --in, --pin, --name, --ttl, --ksk, and --algorithm. --algorithm algorithm Specifies which DNSSEC algorithm to use when converting to BIND format. The supported algorithms are: RSAMD5 DSA RSASHA1 RSASHA1-NSEC3-SHA1 DSA-NSEC3-SHA1 RSASHA256 RSASHA512 --help, -h Shows the help screen. --in path The path to the input file. --ksk This will set the flag field to 257 instead of 256 in the DNSKEY RR in the .key file. Indicating that the key is a Key Signing Key. Can be used when converting to BIND format. --name name The owner name to use in the BIND file name and in the DNSKEY RR. Do not forget the trailing dot, e.g. "example.com." --out path The path to the output file. --pin PIN The PIN will be used to encrypt or decrypt the PKCS#8 file depending if we are converting to or from PKCS#8. If not given then the PKCS#8 file is assumed to be unencrypted. --ttl TTL The TTL to use for the DNSKEY RR. Optional, this will default to 3600 seconds. --version, -v Show the version info. EXAMPLES
To convert a BIND .private-key file to a PKCS#8 file, the following command can be used: softhsm-keyconv --in Kexample.com.+007+05474.private --out rsa.pem To convert a PKCS#8 file to BIND key files, the following command can be used: softhsm-keyconv --in rsa.pem --name example.com. --ksk --algorithm RSASHA1-NSEC3-SHA1 AUTHOR
Written by Rickard Bellgrim. SEE ALSO
softhsm(1), softhsm.conf(5), openssl(1), named(1), dnssec-keygen(1), dnssec-signzone(1) SoftHSM 21 December 2009 SOFTHSM-KEYCONV(1)
All times are GMT -4. The time now is 08:32 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy