01-27-2017
Quote:
Originally Posted by
Corona688
There are far simpler and less hardware-intensive options if you consider that possible - a proxy or VPN, for instance, can be an authorization wall without needing to host what's effectively two thousand video streams.
There is a VPN option already available and used the reason for JMP server is running a security agent for monitoring app behaviour.
What open source pkg should i use?
Quote:
If you really want the brute force way, lots of bandwidth and lots of memory is suggested.
Last edited by RudiC; 01-27-2017 at 04:09 PM..
Reason: Corrected QUOTE tags.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi Guys,
Is there a way I can generate a Diagnostic Report for Unix app server/database server (for sun solaris and aix) similar to the system diagnostic report in Windows NT(winmsd).
Basically I am looking for the following details below in a single comprehensive report. If there is no... (2 Replies)
Discussion started by: neer
2 Replies
2. UNIX for Dummies Questions & Answers
I'm brand spankin new to unix. What software would or could I use to reproduce what windows terminal server and citrix metaframe accomplish? To explain that, how do I create a server-based graphical desktop that can be accessed from a dumb terminal? Specificity is appreciated because I'm clueless... (2 Replies)
Discussion started by: bradoyler
2 Replies
3. Programming
Hi,
Is there any unix equivalents available for the folllowing windows function ?
FindFirstFile
FindNextFile etc.....
Or do i have to write an equivalent api??
Can anybody help me to do the same??
thanks in advance
Ani (2 Replies)
Discussion started by: ani
2 Replies
4. UNIX for Dummies Questions & Answers
My situation is that we have production unix scripts that ftp files over to a windows server. I'm not sure if its a 2000 or 2003 server as I dont work on server, more on the unix side. It turns out that they are changing servers on the network. So they are migrating our data over from say Server 1... (1 Reply)
Discussion started by: NycUnxer
1 Replies
5. Shell Programming and Scripting
In Windows we use cmd.exe \c as the command SHell
What is its equivalent in UNIX ?
Thanx for all your help. (10 Replies)
Discussion started by: simonsimon
10 Replies
6. Linux
Hi,
I've set my Unix User Profile Variables as follows..
export LANG=en_US.UTF-8
export LC_ALL=en_US.UTF-8
I want to set the same codepages in my Windows Vista Environment..
How can i do that..? Whether the variable names remain same ..?
Please help
Regards,
Vikram... (1 Reply)
Discussion started by: vickramshetty
1 Replies
7. Solaris
Hi everyone, I am new to Unix and looking for help here.
we have four terminals connected to our solaris server (x86 based).
the server got an interface card which provide serial port and video port for all chained terminals in a serial way. All these clients have no IP and they all display... (3 Replies)
Discussion started by: Cheong
3 Replies
8. Shell Programming and Scripting
Can anybody please help me on how to code for the below requirement:
I need to write a shell script (on different unix server) to copy files from multiple folders (ex. BRN-000001) from one windows server (\\boldls-mwe-dev4)to a different windows server(\\rrwin-ewhd04.ecomad.int). This shell... (4 Replies)
Discussion started by: SravsJaya
4 Replies
9. Shell Programming and Scripting
Hi,
How to get unix look and feel in windows environment where i can execute basic commands like date and complex usage like awk, sed etc and not much storage space is needed.
Is there any software that i can install to use the same?
Thanks, (3 Replies)
Discussion started by: i.srini89
3 Replies
10. Shell Programming and Scripting
hi guys,
i need a script to sftp the file from windows to unix server ....(before that i have to check whether the file exists in the windows server or not
and again i have to reverse sftp the files from unix to windows server.....
regards,
Vasa Saikumar. (13 Replies)
Discussion started by: hemanthsaikumar
13 Replies
LEARN ABOUT CENTOS
tpm_quote_tools
TPM QUOTE
TOOLS(8) TPM QUOTE TOOLS(8)
NAME
TPM Quote Tools
PROGRAMS
tpm_mkuuid, tpm_mkaik, tpm_loadkey, tpm_unloadkey, tpm_getpcrhash, tpm_updatepcrhash, tpm_getquote, tpm_verifyquote
DESCRIPTION
TPM Quote Tools is a collection of programs that provide support for TPM based attestation using the TPM quote operation.
A TPM contains a set of Platform Configuration Registers (PCRs). In a well configured machine, some of these registers are set to known
values during the boot up process or at other times. For example, a PCR might contain the hash of a boot loader in memory before it is
run.
The TPM quote operation is used to authoritatively verify the contents of a TPM's Platform Configuration Registers (PCRs). During provi-
sioning, a composite hash of a selected set of PCRs is computed. The TPM quote operation produces a composite hash that can be compared
with the one computed while provisioning.
To use the TPM quote operation, keys must be generated. During provisioning, an Attestation Identity Key (AIK) is generated for each TPM,
and the public part of the key is made available to entities that validate quotes.
The TPM quote operation returns signed data and a signature. The data that is signed contains the PCRs selected for the operation, the
composite hash for the selected PCRs, and a nonce provided as input, and used to prevent replay attacks. At provisioning time, the data
that is signed is stored, not just the composite hash. The signature is discarded.
An entity that wishes to evaluate a machine generates a nonce, and sends it along with the set of PCR used to generate the composite PCR
hash at provisioning time. For this use of the TPM quote operation, the signed data is ignored, and the signature returned is used to val-
idate the state of the TPM's PCRs. Given the signature, the evaluating entity replaces the nonce in the signed data generated at provi-
sioning time, and checks to see if the signature is valid for the data. If so, this check ensures the selected PCRs contain values that
match the ones measured during provisioning.
A typical scenario for an enterprise using these tools follows. The tools expect AIKs to be referenced via one enterprise-wide Universally
Unique Identifier (UUID). The program tpm_mkuuid creates one.
For each machine being checked, an AIK is created using tpm_mkaik. The key blob produced is bound to the UUID on its machine using
tpm_loadkey. The public key associated with the AIK is sent to the entities that verify quotes. Finally, the expected PCR composite hash
is obtained using tpm_getpcrhash. When the expected PCR values change, a new hash can be generated with tpm_updatepcrhash.
The program to obtain a quote, and thus measure the current state of the PCRs is tpm_getquote. The program that verifies the quote
describes the same PCR composite hash as was measured initially is tpm_verifyquote.
SEE ALSO
tpm_mkuuid(8), tpm_mkaik(8), tpm_loadkey(8), tpm_unloadkey(8), tpm_getpcrhash(8), tpm_updatepcrhash(8), tpm_getquote(8), tpm_verifyquote(8)
Oct 2010 TPM QUOTE TOOLS(8)