Sponsored Content
Operating Systems AIX Migrating a NIM Server to AIX 6.1 Post 302425857 by kkeng808 on Sunday 30th of May 2010 11:16:59 PM
Old 05-31-2010
Hi Guys,

It all went fine.. There is no dependency since it has a special role as NIM server.

To be on safer side.. I took a cloning of 5.3 rootvg using alt_disk_copy and did my upgrade on the cloned disk.. The NIM is also working fine after the migration Smilie
This User Gave Thanks to kkeng808 For This Post:
 

10 More Discussions You Might Find Interesting

1. AIX

Problem with migrating from AIX 5.1 to 5.3

I'am migrating from AIX 5.1 to 5.3 during migration installation a receive message enough space for dir /usr. My question is : how i can resolve this problem ? i can't reboot my server i hope that there is a command to obtain a spece without go out from installation procedure pannel... I'am... (0 Replies)
Discussion started by: tt155
0 Replies

2. AIX

NIM server setup (AIX 5.3)

Hi, I'a a new member here. My company just bought p570 with 8 LPAR (previously we have p650 with 4 LPAR). Did anyone have procedure how to setup NIM server (NIM LPAR) and how to install other new LPAR to use the NIM server (as client). Appreciate your help and thank you very much. Rgds, David (0 Replies)
Discussion started by: dshg
0 Replies

3. AIX

migrate NIM server through NIM installation

I try to migrate a NIM server from one server to another. I try to do a mksysb on NIM server restore the NIM server's mksysb to a client through NIM installation shutdown NIM server start newly installed client as NIM server Does anyone do this before? who can give me some suggestion? (1 Reply)
Discussion started by: yanzhang
1 Replies

4. AIX

Migrating AIX users to Linux

Hi all, I was wondering if anyone out there knew if it was possible to migrate users from AIX to Linux. What we want to do is install OpenLDAP on a Linux machine and port all the users over to LDAP. I've googled around and could only find a few things, such as mrgpwd - but that only comes... (0 Replies)
Discussion started by: djcronos
0 Replies

5. AIX

migrating easytrieve from Z/OS to AIX platform

Hi, my requirement is to migrate easytrieve running on Z/OS to AIX platform. can anyone let me know what changes should be made if we do such a migration. (0 Replies)
Discussion started by: rohit510
0 Replies

6. AIX

How will do migration through NIM server in AIX

Can any one help..... How will do migration through NIM server? (4 Replies)
Discussion started by: AIXlearner
4 Replies

7. AIX

NIM thread error in AIX 5.3 server !

Friends , In our production server , we are using oracle10g in IBM AIX 5.3 unix server. From last 7 days , I got the below error : ------------------------------ LABEL: TS_NIM_ERROR_STUCK_ IDENTIFIER: 864D2CE3 Date/Time: Mon Sep 7 19:34:38 NOVST 2009 Sequence Number:... (1 Reply)
Discussion started by: shipon_97
1 Replies

8. AIX

Nim on AIX 7.1 used to migrate AIX 5.3 to AIX 6.1...is possible?

Using nimadm: nimadm -j nimadmvg -c sap024 -s spot_6100 -l lpp_6100 -d "hdisk1" -Y Initializing the NIM master. Initializing NIM client sap024. 0505-205 nimadm: The level of bos.alt_disk_install.rte installed in SPOT spot_6100 (6.1.3.4) does not match the NIM master's level (7.1.1.2).... (2 Replies)
Discussion started by: sciacca75
2 Replies

9. AIX

Upgrading to AIX 7 vs migrating

Hi all, I have this weird notion that upgrading the TL does not cause the machine to wipe, but upgrading a major version (from aix 6 to 7) means it's actually a fresh install and will wipe the date and i have to install the software again (TSM server, for instance). Trying to google it, i came... (3 Replies)
Discussion started by: tde3000
3 Replies

10. AIX

Migrating NFSv3 to NFSv4 in AIX

Hello, I worked on setting up NFSv3 and NFSv4 (novice) shares separately. I was trying to find a way to migrate existing NFSv3 fileshares to NFSv4 as is. I found a redbook online called "Securing NFS in AIX". It has good info. I am able to create a new NFSv4 share, do not know how to... (4 Replies)
Discussion started by: System Admin 77
4 Replies
IO::Socket::SSL::Intercept(3)				User Contributed Perl Documentation			     IO::Socket::SSL::Intercept(3)

NAME
IO::Socket::SSL::Intercept -- SSL interception (man in the middle) SYNOPSIS
use IO::Socket::SSL::Intercept; # create interceptor with proxy certificates my $mitm = IO::Socket::SSL::Intercept->new( proxy_cert_file => 'proxy_cert.pem', proxy_key_file => 'proxy_key.pem', ... ); my $listen = IO::Socket::INET->new( LocalAddr => .., Listen => .. ); while (1) { # TCP accept new client my $client = $listen->accept or next; # SSL connect to server my $server = IO::Socket::SSL->new( PeerAddr => .., SSL_verify_mode => ..., ... ) or die "ssl connect failed: $!,$SSL_ERROR"; # clone server certificate my ($cert,$key) = $mitm->clone_cert( $server->peer_certificate ); # and upgrade client side to SSL with cloned certificate IO::Socket::SSL->start_SSL($client, SSL_server => 1, SSL_cert => $cert, SSL_key => $key ) or die "upgrade failed: $SSL_ERROR"; # now transfer data between $client and $server and analyze # the unencrypted data ... } DESCRIPTION
This module provides functionality to clone certificates and sign them with a proxy certificate, thus making it easy to intercept SSL connections (man in the middle). It also manages a cache of the generated certificates. How Intercepting SSL Works Intercepting SSL connections is useful for analyzing encrypted traffic for security reasons or for testing. It does not break the end-to- end security of SSL, e.g. a properly written client will notice the interception unless you explicitly configure the client to trust your interceptor. Intercepting SSL works the following way: o Create a new CA certificate, which will be used to sign the cloned certificates. This proxy CA certificate should be trusted by the client, or (a properly written client) will throw error messages or deny the connections because it detected a man in the middle attack. Due to the way the interception works there no support for client side certificates is possible. Using openssl such a proxy CA certificate and private key can be created with: openssl genrsa -out proxy_key.pem 1024 openssl req -new -x509 -extensions v3_ca -key proxy_key.pem -out proxy_cert.pem # export as PKCS12 for import into browser openssl pkcs12 -export -in proxy_cert.pem -inkey proxy_key.pem -out proxy_cert.p12 o Configure client to connect to use intercepting proxy or somehow redirect connections from client to the proxy (e.g. packet filter redirects, ARP or DNS spoofing etc). o Accept the TCP connection from the client, e.g. don't do any SSL handshakes with the client yet. o Establish the SSL connection to the server and verify the servers certificate as usually. Then create a new certificate based on the original servers certificate, but signed by your proxy CA. This a the step where IO::Socket::SSL::Intercept helps. o Upgrade the TCP connection to the client to SSL using the cloned certificate from the server. If the client trusts your proxy CA it will accept the upgrade to SSL. o Transfer data between client and server. While the connections to client and server are both encrypted with SSL you will read/write the unencrypted data in your proxy application. METHODS
IO::Socket::SSL::Intercept helps creating the cloned certificate with the following methods: $mitm = IO::Socket::SSL::Intercept->new(%args) This creates a new interceptor object. %args should be proxy_cert X509 | proxy_cert_file filename This is the proxy certificate. It can be either given by an X509 object from Net::SSLeays internal representation, or using a file in PEM format. proxy_key EVP_PKEY | proxy_key_file filename This is the key for the proxy certificate. It can be either given by an EVP_PKEY object from Net::SSLeays internal representation, or using a file in PEM format. The key should not have a passphrase. pubkey EVP_PKEY | pubkey_file filename This optional argument specifies the public key used for the cloned certificate. It can be either given by an EVP_PKEY object from Net::SSLeays internal representation, or using a file in PEM format. If not given it will create a new public key on each call of "new". serial INTEGER This optional argument gives the starting point for the serial numbers of the newly created certificates. Default to 1. cache HASH | SUBROUTINE This optional argument gives a way to cache created certificates, so that they don't get recreated on future accesses to the same host. If the argument ist not given an internal HASH ist used. If the argument is a hash it will store for each generated certificate a hash reference with "cert" and "atime" in the hash, where "atime" is the time of last access (to expire unused entries) and "cert" is the certificate. Please note, that the certificate is in Net::SSLeays internal X509 format and can thus not be simply dumped and restored. The key for the hash is an "ident" either given to "clone_cert" or generated from the original certificate. If the argument is a subroutine it will be called as "$cache->(ident)" to get an existing certificate and with "$cache->(ident,cert)" to cache the newly created certificate. ($clone_cert,$key) = $mitm->clone_cert($original_cert,[ $ident ]) This clones the given certificate. An ident as the key into the cache can be given (like "host:port"), if not it will be created from the properties of the original certificate. It returns the cloned certificate and its key (which is the same for alle created certificates). $string = $mitm->serialize This creates a serialized version of the object (e.g. a string) which can then be used to persistantly store created certificates over restarts of the application. The cache will only be serialized if it is a HASH. To work together with Storable the "STORABLE_freeze" function is defined to call "serialize". $mitm = IO::Socket::SSL::Intercept->unserialize($string) This restores an Intercept object from a serialized string. To work together with Storable the "STORABLE_thaw" function is defined to call "unserialize". AUTHOR
Steffen Ullrich perl v5.16.3 2013-05-31 IO::Socket::SSL::Intercept(3)
All times are GMT -4. The time now is 10:57 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy