Sponsored Content
Full Discussion: Critical lib renamed
Top Forums UNIX for Advanced & Expert Users Critical lib renamed Post 302460956 by jlliagre on Friday 8th of October 2010 04:46:22 AM
Old 10-08-2010
Quote:
Originally Posted by methyl
@jlliagre
This is verifiable fact.
You misunderstood my reply. I was more commenting the "but not ksh" part of your sentence. Bash has indeed a character by character read feature, but as far as I know isn't "raw" in the sense it cannot read or store binary data (specifically nulls) so wouldn't be suitable for the expected task.
Quote:
The O/P states that bash is still working. I picked up the bash "read" idea from the IBM website after googling the library filename (which we finally got accurately in post #15). Found a thread where they were responding to someone in a similar situation. Renaming this library is a technique to get certain software such as Apache running on AIX when a replacement library is installed further down the library search path. However you have to do things in precisely the right order or you are in a mess.
Unfortunately the promising thread petered out when that O/P rebooted the computer and an unrelated can of worms opened due to having two system discs at different releases of AIX with the wrong one as the default boot.
Can you post a link to that thread ?
Quote:
I picked on "ftp" and "rcp" as ideas because they were not on a list I found of dependencies for the high level library. This does not mean that it will work, but it is worth a try. Given access to the O/S we could find out what libraries each binary requires and look for a loophole.
Either they bundle libc (i.e. are statically linked) or they are dynamically linked and obviously need libc.a which itself demand libcrypt.a. The OP stated there was no statically linked executables on that AIX release. This lead me to conclude that way can't work (just like mounting a removable media fails).
Quote:
On the permissions front we won't need execute permissions but we could need world read.
May be. That depends on AIX implementation. On Solaris shared libraries are required to be executable, on Gnu/Linux, they aren't.
Quote:
Depends on what the default umask is in the first place.
If setting the x bit is required with AIX, the umask won't help. "umask" allows to remove bits that otherwise would have been set, not the other way around. A shell do not create executable files.
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

what is Critical section is all about?

what is a critical section?why multipleprocesses or multiplethreads cant be given a chance to access the critical section? please explain me with an example. thanks (3 Replies)
Discussion started by: compbug
3 Replies

2. Shell Programming and Scripting

Very Critical

We have a batch job which runs and checks for certain files on a server and retrieves them to our server. But from last few hours the job is not running correctly. It gives msg file now found when there are files present on the server.. Nothing has been changed.................. (1 Reply)
Discussion started by: shikhakaul
1 Replies

3. Shell Programming and Scripting

duplicate index names renamed

Hello everyone ! Please have a minute and see if you know how to script this I have a file like this: "create table .... ... create index n112 on ... ... create table ... .... create index n113 on... ... create table ... create index n112 on ...! duplicate ... (1 Reply)
Discussion started by: sotoc79
1 Replies

4. Shell Programming and Scripting

rsync - update file on backup when file renamed on source

hi all, Please help me with rsync. I configured rsync to preserve timestamps using the -a option. When i renamed fileA to fileB on source machine I have to copies at the backup server. The aim is to keep the most recent file. fileA & fileB has same contents. When i renamed fileB to... (2 Replies)
Discussion started by: coolatt
2 Replies

5. Red Hat

ls: /lib/libattr.so.1: no version information available (required by /lib/libacl.so.1)

Hello, I'm experimenting a problem on my rh server. Red Hat Enterprise Linux AS release 3 (Taroon Update 8) 2.4.21-47.ELsmp #1 SMP i686 i686 i386 GNU/Linux It started with a segmentation fault on #id root To resolve it, I've installed coreutils-4.5.3-28.4.i386.rpm But, I... (6 Replies)
Discussion started by: gogol_bordello
6 Replies

6. Solaris

Renamed lib directory by mistake

Let's say someone accidentally renamed the lib directory in Solaris 8, and now they cannot get into the terminal or even rename the folder via file manager.What would one do? (37 Replies)
Discussion started by: jetjaguar
37 Replies

7. UNIX for Advanced & Expert Users

Mistakenly renamed libdl.so: system got corrupted

Hi, I am using Ubuntu 8.04 64-bit (Hardy Heron LTS Desktop edition) OS on a 64-bit intel hardware (x86_64). I have wrongly renamed the /lib64/libdl-2.7.so shared library file and now hardly few commands are working. My Gnome UI display has gone and I could not establish any new connection via... (12 Replies)
Discussion started by: royalibrahim
12 Replies

8. Shell Programming and Scripting

who renamed my executable

Hi All, I connected via rlogin in testing environment (ksh ) and placed an executable with -rwxr-xr-x permission. eg: from my own unix box used : rlogin host -l user But the exe was renamed by somebody. since it's only renaming none of the access time , modification time etc is altered.... (2 Replies)
Discussion started by: blackcat
2 Replies

9. Shell Programming and Scripting

Renaming file and check for the renamed file existence

Hi Am trying to move a file from one name to another When I do "ls" to check for the moved filename I can see the file but when I try the same with a script am unable.. I think am doing some pretty silly error.. please help.. toMove=`ls | grep -E "partition.+"` mv $toMove partition._org... (7 Replies)
Discussion started by: Priya Amaresh
7 Replies

10. Ubuntu

Renamed Volume Group name on Webmin while running samba server (oops)

Hi...I'm new to Linux and was working on a home server. I have it operational with Samba Share as my NAS system. Unfortunately, while I was on Webmin I changed the Logical Volume Group Name and now I can't find the data I had saved on my Samba Server. Can anyone help me recover those files? ... (0 Replies)
Discussion started by: pangil
0 Replies
TPM QUOTE 
TOOLS(8) TPM QUOTE TOOLS(8) NAME
TPM Quote Tools PROGRAMS
tpm_mkuuid, tpm_mkaik, tpm_loadkey, tpm_unloadkey, tpm_getpcrhash, tpm_updatepcrhash, tpm_getquote, tpm_verifyquote DESCRIPTION
TPM Quote Tools is a collection of programs that provide support for TPM based attestation using the TPM quote operation. A TPM contains a set of Platform Configuration Registers (PCRs). In a well configured machine, some of these registers are set to known values during the boot up process or at other times. For example, a PCR might contain the hash of a boot loader in memory before it is run. The TPM quote operation is used to authoritatively verify the contents of a TPM's Platform Configuration Registers (PCRs). During provi- sioning, a composite hash of a selected set of PCRs is computed. The TPM quote operation produces a composite hash that can be compared with the one computed while provisioning. To use the TPM quote operation, keys must be generated. During provisioning, an Attestation Identity Key (AIK) is generated for each TPM, and the public part of the key is made available to entities that validate quotes. The TPM quote operation returns signed data and a signature. The data that is signed contains the PCRs selected for the operation, the composite hash for the selected PCRs, and a nonce provided as input, and used to prevent replay attacks. At provisioning time, the data that is signed is stored, not just the composite hash. The signature is discarded. An entity that wishes to evaluate a machine generates a nonce, and sends it along with the set of PCR used to generate the composite PCR hash at provisioning time. For this use of the TPM quote operation, the signed data is ignored, and the signature returned is used to val- idate the state of the TPM's PCRs. Given the signature, the evaluating entity replaces the nonce in the signed data generated at provi- sioning time, and checks to see if the signature is valid for the data. If so, this check ensures the selected PCRs contain values that match the ones measured during provisioning. A typical scenario for an enterprise using these tools follows. The tools expect AIKs to be referenced via one enterprise-wide Universally Unique Identifier (UUID). The program tpm_mkuuid creates one. For each machine being checked, an AIK is created using tpm_mkaik. The key blob produced is bound to the UUID on its machine using tpm_loadkey. The public key associated with the AIK is sent to the entities that verify quotes. Finally, the expected PCR composite hash is obtained using tpm_getpcrhash. When the expected PCR values change, a new hash can be generated with tpm_updatepcrhash. The program to obtain a quote, and thus measure the current state of the PCRs is tpm_getquote. The program that verifies the quote describes the same PCR composite hash as was measured initially is tpm_verifyquote. SEE ALSO
tpm_mkuuid(8), tpm_mkaik(8), tpm_loadkey(8), tpm_unloadkey(8), tpm_getpcrhash(8), tpm_updatepcrhash(8), tpm_getquote(8), tpm_verifyquote(8) Oct 2010 TPM QUOTE TOOLS(8)
All times are GMT -4. The time now is 01:28 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy