Sponsored Content
Full Discussion: FreeBSD Postsnap via https
Operating Systems BSD FreeBSD Postsnap via https Post 302333380 by KaneCitizen on Monday 13th of July 2009 12:46:40 AM
Old 07-13-2009
FreeBSD Postsnap via https

Hello,

I was wondering if there are any https servers available for freebsd
portsnap ? I would like to use portsnap behind my companies proxy servers.

But alas they will not allow large compressed files through the proxy, which have alot of small files contained within the file. Obviously they download the file and then decompress it to scan it for virus/malware/bad stuff etc.

Except for obviously for ssl connections they are passed straight through.

Are there any portsnap servers that are accessible by https ?
I do a similar thing for gentoo when using portage.
 

8 More Discussions You Might Find Interesting

1. Programming

Application crashes in FreeBSD 7.1 while working ok in FreeBSD 6.3

Hello there, My mulithreaded application (which is too large to represent the source code here) is crashing after installing FreeBSD 7.1-RELEASE/amd64. It worked properly on others machines (Dual Cores with 4GB of RAM - FreeBSD 6.2-RELEASE/i386). The current machine has 2x Core 2 Duo... (1 Reply)
Discussion started by: Seenquev
1 Replies

2. Shell Programming and Scripting

http and https

Hi friends, I have a local host http://ss3/cgi-bin/page/page_list.cgi running on apache webserver perfectly well. But suddenly, it stopped working and gave an error "Internet explorer Explorer cannot display the webpage". But when i added https, as https://ss3/cgi-bin/page/page_list.cgi the... (2 Replies)
Discussion started by: nmattam
2 Replies

3. AIX

wget https

Hello, can someone tell me where the certificate store on aix 6.1 is. If I want to use wget with a https site Iam getting an error that the issuer is untrusted. Thats right because its an self sign certificate. (3 Replies)
Discussion started by: ralphk
3 Replies

4. Red Hat

Configure HTTPS

HI My system is already configured with HTTP setup and I am able to see all the contents using web browser (IE) that is http:// <ip address> But when entered https://<ipaddress> it fails to return any contents. Can anyone please tell how to configure for HTTPs, like which files to edit... (2 Replies)
Discussion started by: tannu
2 Replies

5. Cybersecurity

Snort HTTPS

Is it possible to rule out in alert all HTTPS traffic or rule out all the HTTPS trafic from the alerts on snort ? (3 Replies)
Discussion started by: drd0spt
3 Replies

6. Web Development

Mod_rewrite http to https

Hi Team, I have a question on the apache mod_rewrite module. I have a requirement of rewriting only specific url's to https. Requirement below:- want to match a word (test) on the url and if matches then it should rewrite to https. example:- ... (1 Reply)
Discussion started by: arumon
1 Replies

7. Red Hat

SSL over https

Hi guys, I'm trying to generate a key using the genkey command in centos 6.4 and RHEL6.4, Every thing seems to go cool but I get this error message bad certificate request error -8016 and no key/cert is generated. I don't want use the many openssl(s) commands instead since genkey is a shourtcut... (3 Replies)
Discussion started by: leo_ultra_leo
3 Replies

8. Solaris

Need suggestion:- Failed HTTPS transfer to https://supportfiles.sun.com/curl

Hi Guys, I have recently started reciving below Error message Failed HTTPS transfer to https://supportfiles.sun.com/curl whenever I run /usr/local/bin/sudo /opt/SUNWexplo/bin/explorer -P -q -v from all Servers. Looks like the SSL certificate as Expired. Whenever I type... (4 Replies)
Discussion started by: manalisharmabe
4 Replies
scanssh(1)						    BSD General Commands Manual 						scanssh(1)

NAME
scanssh -- scans the Internet for open proxies and SSH servers SYNOPSIS
scanssh [-VIERph] [-s scanners,...] [-n ports,...] [-e excludefile] addresses... DESCRIPTION
ScanSSH scans the given addresses and networks for running services. It mainly allows the detection of open proxies and Internet services. For known services, ScanSSH will query their version number and displays the results in a list. The adresses can be either specified as an IPv4 address or an CIDR like IP prefix, ipaddress/masklength. Ports can be appended by adding a colon at the end of address specification. Additionally, the following two commands can be prefixed to the address: random(n[,seed])/ The random command selects random address from the address range specified. The arguments are as follows: n is the number of address to randomly create in the given network and seed is a seed for the pseudo random number generator. split(s,e)/ The split command is used to split the address range in several unique components. This can be use to scan from serveral hosts in parallel. The arguments are as follows: e specifies the number of hosts scanning in parallel and s is the number of the host this particular scan runs on. The options are as follows: -V Causes scanssh to print its version number. -I Does not send a SSH identification string. -E Exit the program, if the file containing the addresses for exclusion can not be found. -R If addresses are generated at random, this flag causes the program to ignore excluded addresses from the exclude file. The default behaviour is to always exclude addresses. -p Specifies that ScanSSH should operate as a proxy detector. This flag sets the default modes and default scanners to detect open proxies. -h Displays the usage of the program. -n ports,... Specifies the port numbers to scan. Ports are separated by commas. Each specified scanner is run for each port in this list. The default is 22. -s scanners Specifies a number of scanners should be executed for each open port. Multiple scanners are separated by commas. The fol- lowing scanners are currently supported: ssh Finds versions for SSH, Web and SMTP servers. socks5 Detects if a SOCKS V5 proxy is running on the port. socks4 Detects if a SOCKS V4 proxy is running on the port. http-proxy Detects a HTTP get proxy. http-connect Detects a HTTP connect proxy. telnet-proxy Detects telnet based proxy servers. -e excludefile Specifies the file that contains the addresses to be excluded from the scan. The syntax is the same as for the addresses on the command line. The output from scanssh contains only IP addresses. However, the IP addresses can be converted to names with the logresolve(8) tool included in the Apache webserver. EXAMPLES
The following command scans the class C network 10.0.0.0 - 10.0.0.255 for open proxies: scanssh -p 10.0.0.0/24 The next command scans for ssh servers on port 22 only: scanssh -n 22 -s ssh 192.168.0.0/16 The following command can be used in a parallel scan. Two hosts scan the specified networks randomly, where this is the first host: scanssh 'random(0,rsd)/split(1,2)/(192.168.0.0/16 10.1.0.0/24):22,80' BUGS
At the moment, scanssh leaves a one line entry in the log file of the ssh server. It is probably not possible to avoid that. BSD
July 17, 2000 BSD
All times are GMT -4. The time now is 07:58 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy