04-27-2019
I #'d that line.
It's okay with installation
Thank you
Boris
8 More Discussions You Might Find Interesting
1. Red Hat
Hello,
Our production linux server have multiple network interface.
Recently we installed and started NFS. Now the client server cannot mount to the server running NFS.
Later it was discovered that the port being used for NFS is only bound to one IP address, which is not the IP address I... (0 Replies)
Discussion started by: hemangjani
0 Replies
2. Cybersecurity
Hi All
*
Need some help on testing if a server supports weak ciphers .
Here is the command I ran :
openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP
result :
Connected : err num=110
openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP
result :
Connected : err... (0 Replies)
Discussion started by: noufel
0 Replies
3. OS X (Apple)
Hi All
*
Need some help on testing if a server supports weak ciphers .
Here is the command I ran :
openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP
result :
Connected : err num=110
openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP
result :
Connected : err... (1 Reply)
Discussion started by: noufel
1 Replies
4. Cybersecurity
Hello,
I recently had a Retina scan of my system and there are some findings I do not understand.
SSL Week Cipher Strength Supported - Retina has detected that the targeted SSL Service supports a cryptographically weak cipher strength... Disable ciphers that support less than 128-bit... (4 Replies)
Discussion started by: stringman
4 Replies
5. Cybersecurity
Hello,
One of my co-worker changed our the ssh ciphers that we currently use.
We made a change to /etc/ssh/ssh_config on our Solaris 10 servers. Security said that we have to use aes128-ctr or higher, but not aes128-cbc.
The issue is that many of the ssh clients (Tectia) on Windows will not... (0 Replies)
Discussion started by: bitlord
0 Replies
6. UNIX for Dummies Questions & Answers
When you get the message can't bind to ip already in use.
is there a command to search to see everything that is using that IP?
I've already check the host and hostname files (2 Replies)
Discussion started by: mchelle_99
2 Replies
7. Linux
I try to enable only secure high ciphers.
With those
smtpd_tls_auth_only = yes
smtpd_tls_mandatory_ciphers = high
smtpd_tls_protocols = SSLv3, TLSv1, !SSLv2
smtpd_tls_mandatory_exclude_ciphers = aNULL
Disable sslv2 but nessus say weak and medium ciphers
still enabled,how to enable only... (0 Replies)
Discussion started by: Linusolaradm1
0 Replies
8. UNIX for Advanced & Expert Users
Hi All
I need to do bind of exiting filesystem to new storage allocated
mount --bind /prod/OpenCSS /var/lib/test
echo "/prod/OpenCSS /var/lib/pgsql bind bind 0 0" >> /etc/fstab
will this command just work ? (2 Replies)
Discussion started by: anil529
2 Replies
LEARN ABOUT DEBIAN
approx
APPROX(8) System Manager's Manual APPROX(8)
NAME
approx - proxy server for Debian archive files
SYNOPSIS
approx [OPTION]...
DESCRIPTION
approx responds to HTTP requests made by apt-get(8). It maintains a cache of Debian archive files that have been previously downloaded, so
that it can respond with a local copy when possible. If a file not in the cache is requested, approx will download it from a remote Debian
repository and deliver the contents to the client, simultaneously caching it for future use.
Over time, the approx server cache will grow to contain multiple, unneeded versions of Debian packages. The approx-gc(8) program removes
these from the cache.
OPTIONS
-c file, --config file
Specify an additional configuration file. May be used multiple times.
USAGE
approx is invoked by inetd(8).
EXAMPLES
Suppose that a client machine's /etc/apt/sources.list file contains the following lines:
deb http://apt:9999/debian testing main
deb http://apt:9999/security testing/updates main
deb-src http://apt:9999/debian unstable main
In this example, apt is the hostname of the approx server machine on the local network. Each distribution, such as "debian" or "security",
is mapped to a remote repository in the approx server's configuration file.
For example, the approx.conf file on the approx server might contain the lines
debian http://ftp.debian.org/debian
security http://security.debian.org
The mapping scheme is very simple. If the approx.conf file contains the line
repository http://remote-host/initial/path
then any request to the approx server of the form
http://approx-server/repository/rest/of/URL
is rewritten to
http://remote-host/initial/path/rest/of/URL
when there is a "cache miss", and that file is cached as
/var/cache/approx/repository/rest/of/URL
(Note that the repository name on the left-hand side is not included in the rewritten URL unless it is explicitly mentioned in the right-
hand side's initial path.)
FILES
/etc/approx/approx.conf
Configuration file for approx and related programs.
/var/cache/approx
Default cache directory for archive files.
SEE ALSO
approx.conf(5), inetd(8), approx-import(8), approx-gc(8), apt-get(8), sources.list(5)
AUTHOR
Eric Cooper <ecc@cmu.edu>
May 2011 APPROX(8)