03-15-2011
Some sort of localhost listening service suggests itself to me, so there is only one actor modifying things, serving connections and accepting in rotation. Tight limits on types of modification, modification requests very structured, update not insert/delete, send warning email to user for every change. That is a start, at least.
6 More Discussions You Might Find Interesting
1. Solaris
I just need to know what should be done on a login user so that no one can access it except through sudo
i.e.
telnet server
login: user
NO ACCESS
telnet server
login: mylogin
sudo - user <any command>
ACCESS GRANTED
thanks (0 Replies)
Discussion started by: melanie_pfefer
0 Replies
2. UNIX for Dummies Questions & Answers
I was curious how to tell which programs are accessing a file (libobjc.A.dylib) in /usr/lib
This file seems to be the culprit in a bunch of Safari crashes, and I just wanted to know if and what other programs use it.
Also, I was curious what a good way to find out what files are being written... (4 Replies)
Discussion started by: glev2005
4 Replies
3. Shell Programming and Scripting
Hie Friends,
I need your help once again.
I have 77 “password protected” winzip files in linux/unix server. I want to decrypt it through an automated script. Password of every file is same and it is mhd*tt.
Please help me.
Usually I unzip it as follows, manually one by one.
unzip <file name> ... (6 Replies)
Discussion started by: anushree.a
6 Replies
4. Debian
I want to setup ftp on my home server running debian 5.0
I found this guide and have read it carefully.
Virtual Hosting With PureFTPd And MySQL (Incl. Quota And Bandwidth Management) On Debian Lenny | HowtoForge - Linux Howtos and Tutorials
Before I install/config it I want to know if its... (1 Reply)
Discussion started by: chipmunken
1 Replies
5. UNIX for Dummies Questions & Answers
Hi all,
I wrote a couple noobie programs and had them compiled over Putty (using gcc), but I don't know what command I should use to run them.
Please assume that I'm a complete noob when it comes to programming and putty commands.
Thank you for your help! (1 Reply)
Discussion started by: Recycalable
1 Replies
6. Programming
Hello forum,
I am siva working as programmer .I was blocked with the below issue so please help any of the forum memebers.
testve.h
class cv
{
protected :
struct state;
state& m_state;
};
testVe.cpp
struct state
{
m_size;
}
the above are 2 files which have the... (3 Replies)
Discussion started by: workforsiva
3 Replies
LEARN ABOUT DEBIAN
racoon
RACOON(8) BSD System Manager's Manual RACOON(8)
NAME
racoon -- IKE (ISAKMP/Oakley) key management daemon
SYNOPSIS
racoon [-46BdFLVv] [-f configfile] [-l logfile] [-P isakmp-natt-port] [-p isakmp-port]
DESCRIPTION
racoon speaks the IKE (ISAKMP/Oakley) key management protocol, to establish security associations with other hosts. The SPD (Security Policy
Database) in the kernel usually triggers racoon. racoon usually sends all informational messages, warnings and error messages to syslogd(8)
with the facility LOG_DAEMON and the priority LOG_INFO. Debugging messages are sent with the priority LOG_DEBUG. You should configure
syslog.conf(5) appropriately to see these messages.
-4
-6 Specify the default address family for the sockets.
-B Install SA(s) from the file which is specified in racoon.conf(5).
-d Increase the debug level. Multiple -d arguments will increase the debug level even more.
-F Run racoon in the foreground.
-f configfile
Use configfile as the configuration file instead of the default.
-L Include file_name:line_number:function_name in all messages.
-l logfile
Use logfile as the logging file instead of syslogd(8).
-P isakmp-natt-port
Use isakmp-natt-port for NAT-Traversal port-floating. The default is 4500.
-p isakmp-port
Listen to the ISAKMP key exchange on port isakmp-port instead of the default port number, 500.
-V Print racoon version and compilation options and exit.
-v This flag causes the packet dump be more verbose, with higher debugging level.
racoon assumes the presence of the kernel random number device rnd(4) at /dev/urandom.
RETURN VALUES
The command exits with 0 on success, and non-zero on errors.
FILES
/etc/racoon.conf default configuration file.
SEE ALSO
ipsec(4), racoon.conf(5), syslog.conf(5), setkey(8), syslogd(8)
HISTORY
The racoon command first appeared in the ``YIPS'' Yokogawa IPsec implementation.
SECURITY CONSIDERATIONS
The use of IKE phase 1 aggressive mode is not recommended, as described in http://www.kb.cert.org/vuls/id/886601.
BSD
January 23, 2009 BSD