10-08-2010
Quote:
Originally Posted by
methyl
@jlliagre
This is verifiable fact.
You misunderstood my reply. I was more commenting the "but not ksh" part of your sentence. Bash has indeed a character by character read feature, but as far as I know isn't "raw" in the sense it cannot read or store binary data (specifically nulls) so wouldn't be suitable for the expected task.
Quote:
The O/P states that bash is still working. I picked up the bash "read" idea from the IBM website after googling the library filename (which we finally got accurately in post #15). Found a thread where they were responding to someone in a similar situation. Renaming this library is a technique to get certain software such as Apache running on AIX when a replacement library is installed further down the library search path. However you have to do things in precisely the right order or you are in a mess.
Unfortunately the promising thread petered out when that O/P rebooted the computer and an unrelated can of worms opened due to having two system discs at different releases of AIX with the wrong one as the default boot.
Can you post a link to that thread ?
Quote:
I picked on "ftp" and "rcp" as ideas because they were not on a list I found of dependencies for the high level library. This does not mean that it will work, but it is worth a try. Given access to the O/S we could find out what libraries each binary requires and look for a loophole.
Either they bundle libc (i.e. are statically linked) or they are dynamically linked and obviously need libc.a which itself demand libcrypt.a. The OP stated there was no statically linked executables on that AIX release. This lead me to conclude that way can't work (just like mounting a removable media fails).
Quote:
On the permissions front we won't need execute permissions but we could need world read.
May be. That depends on AIX implementation. On Solaris shared libraries are required to be executable, on Gnu/Linux, they aren't.
Quote:
Depends on what the default umask is in the first place.
If setting the x bit is required with AIX, the umask won't help. "umask" allows to remove bits that otherwise would have been set, not the other way around. A shell do not create executable files.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
what is a critical section?why multipleprocesses or multiplethreads cant be given a chance to access the critical section?
please explain me with an example.
thanks (3 Replies)
Discussion started by: compbug
3 Replies
2. Shell Programming and Scripting
We have a batch job which runs and checks for certain files on a server and retrieves them to our server.
But from last few hours the job is not running correctly.
It gives msg file now found when there are files present on the server..
Nothing has been changed.................. (1 Reply)
Discussion started by: shikhakaul
1 Replies
3. Shell Programming and Scripting
Hello everyone !
Please have a minute and see if you know how to script this
I have a file like this:
"create table ....
...
create index n112 on ...
...
create table ...
....
create index n113 on...
...
create table ...
create index n112 on ...! duplicate
... (1 Reply)
Discussion started by: sotoc79
1 Replies
4. Shell Programming and Scripting
hi all,
Please help me with rsync.
I configured rsync to preserve timestamps using the -a option.
When i renamed fileA to fileB on source machine I have to copies at the backup server.
The aim is to keep the most recent file.
fileA & fileB has same contents.
When i renamed fileB to... (2 Replies)
Discussion started by: coolatt
2 Replies
5. Red Hat
Hello,
I'm experimenting a problem on my rh server.
Red Hat Enterprise Linux AS release 3 (Taroon Update 8)
2.4.21-47.ELsmp #1 SMP i686 i686 i386 GNU/Linux
It started with a segmentation fault on
#id root
To resolve it, I've installed
coreutils-4.5.3-28.4.i386.rpm
But, I... (6 Replies)
Discussion started by: gogol_bordello
6 Replies
6. Solaris
Let's say someone accidentally renamed the lib directory in Solaris 8, and now they cannot get into the terminal or even rename the folder via file manager.What would one do? (37 Replies)
Discussion started by: jetjaguar
37 Replies
7. UNIX for Advanced & Expert Users
Hi,
I am using Ubuntu 8.04 64-bit (Hardy Heron LTS Desktop edition) OS on a 64-bit intel hardware (x86_64). I have wrongly renamed the /lib64/libdl-2.7.so shared library file and now hardly few commands are working. My Gnome UI display has gone and I could not establish any new connection via... (12 Replies)
Discussion started by: royalibrahim
12 Replies
8. Shell Programming and Scripting
Hi All,
I connected via rlogin in testing environment (ksh ) and placed an executable with -rwxr-xr-x permission.
eg: from my own unix box used : rlogin host -l user
But the exe was renamed by somebody. since it's only renaming none of the access time , modification time etc is altered.... (2 Replies)
Discussion started by: blackcat
2 Replies
9. Shell Programming and Scripting
Hi
Am trying to move a file from one name to another
When I do "ls" to check for the moved filename
I can see the file but when I try the same with a script am unable..
I think am doing some pretty silly error.. please help..
toMove=`ls | grep -E "partition.+"`
mv $toMove partition._org... (7 Replies)
Discussion started by: Priya Amaresh
7 Replies
10. Ubuntu
Hi...I'm new to Linux and was working on a home server. I have it operational with Samba Share as my NAS system. Unfortunately, while I was on Webmin I changed the Logical Volume Group Name and now I can't find the data I had saved on my Samba Server.
Can anyone help me recover those files?
... (0 Replies)
Discussion started by: pangil
0 Replies
LEARN ABOUT CENTOS
tpm_quote_tools
TPM QUOTE
TOOLS(8) TPM QUOTE TOOLS(8)
NAME
TPM Quote Tools
PROGRAMS
tpm_mkuuid, tpm_mkaik, tpm_loadkey, tpm_unloadkey, tpm_getpcrhash, tpm_updatepcrhash, tpm_getquote, tpm_verifyquote
DESCRIPTION
TPM Quote Tools is a collection of programs that provide support for TPM based attestation using the TPM quote operation.
A TPM contains a set of Platform Configuration Registers (PCRs). In a well configured machine, some of these registers are set to known
values during the boot up process or at other times. For example, a PCR might contain the hash of a boot loader in memory before it is
run.
The TPM quote operation is used to authoritatively verify the contents of a TPM's Platform Configuration Registers (PCRs). During provi-
sioning, a composite hash of a selected set of PCRs is computed. The TPM quote operation produces a composite hash that can be compared
with the one computed while provisioning.
To use the TPM quote operation, keys must be generated. During provisioning, an Attestation Identity Key (AIK) is generated for each TPM,
and the public part of the key is made available to entities that validate quotes.
The TPM quote operation returns signed data and a signature. The data that is signed contains the PCRs selected for the operation, the
composite hash for the selected PCRs, and a nonce provided as input, and used to prevent replay attacks. At provisioning time, the data
that is signed is stored, not just the composite hash. The signature is discarded.
An entity that wishes to evaluate a machine generates a nonce, and sends it along with the set of PCR used to generate the composite PCR
hash at provisioning time. For this use of the TPM quote operation, the signed data is ignored, and the signature returned is used to val-
idate the state of the TPM's PCRs. Given the signature, the evaluating entity replaces the nonce in the signed data generated at provi-
sioning time, and checks to see if the signature is valid for the data. If so, this check ensures the selected PCRs contain values that
match the ones measured during provisioning.
A typical scenario for an enterprise using these tools follows. The tools expect AIKs to be referenced via one enterprise-wide Universally
Unique Identifier (UUID). The program tpm_mkuuid creates one.
For each machine being checked, an AIK is created using tpm_mkaik. The key blob produced is bound to the UUID on its machine using
tpm_loadkey. The public key associated with the AIK is sent to the entities that verify quotes. Finally, the expected PCR composite hash
is obtained using tpm_getpcrhash. When the expected PCR values change, a new hash can be generated with tpm_updatepcrhash.
The program to obtain a quote, and thus measure the current state of the PCRs is tpm_getquote. The program that verifies the quote
describes the same PCR composite hash as was measured initially is tpm_verifyquote.
SEE ALSO
tpm_mkuuid(8), tpm_mkaik(8), tpm_loadkey(8), tpm_unloadkey(8), tpm_getpcrhash(8), tpm_updatepcrhash(8), tpm_getquote(8), tpm_verifyquote(8)
Oct 2010 TPM QUOTE TOOLS(8)