8 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi,
I have made a snake game on below bash version. But it is not backward compatible. Can someone suggest a version which is most commonly used and
is backward compatible so that i can change my code and share again?
I have attached the game script. If someone can run it please also suggest... (5 Replies)
Discussion started by: amit14august
5 Replies
2. Shell Programming and Scripting
Hi all.
I'm in the process of migrating existing script on UNIX server to the LINUX platform.
One of the script that have issues is this one:
cd /home/edwh_test/S13018/EDWH-DMT03/stgdata/RPT/
# GIANT #
rm -f INPUT_GIANT.csv
filename=INPUT_GIANT_*csv
GIANT_MONYYYY=$(echo $filename | awk... (9 Replies)
Discussion started by: aimy
9 Replies
3. UNIX for Dummies Questions & Answers
Hi,
I have created a bonding bond1 interface with 6 Eth , mode=4. Recently i have changed my old ipv6 to new one and tried to restart as well as reload network service. Post which i can see old as well as changed ipv6 in ifconfig command output. Below are few files and command output for your... (1 Reply)
Discussion started by: omkar.jadhav
1 Replies
4. Solaris
Sorry, if this isn't the right forum for this question. I would like to compile an executable with gcc/g++ under Solaris 10 on the following OLDER SPARC-machine and then run this executable on the NEW SPARC-machine (see description down in this post). I'm wondering if it would be possible or if... (4 Replies)
Discussion started by: sunfire
4 Replies
5. SCO
Hi
I'm going to buy C-ISAM 7.25 under sco unixware 7 to install in sco openserver 5.0.7.
I'm wondering sco unixware 7 and sco openserver 5.0.6 are binary compatibles ?
tnx (1 Reply)
Discussion started by: javad1_maroofi
1 Replies
6. Shell Programming and Scripting
Hi All,
The below code works perfectly on AIX machine but doesnt give the desired o/p on HP UX.
Can someone please generalise the code so that it becomes platform independent.
awk 'NR == FNR {
/^*\47name/ && c++ # get the field number
if (/^*\47size/) {
split($0, t, ":") ... (2 Replies)
Discussion started by: subhrap.das
2 Replies
7. Solaris
Hi all,
I am trying to isntall veritas replicator on 2 DA 3000 storage , But with little luck . I am running a solaris 10 and vsf 4.1, Veritas Volume Replicator Option 4.1
My question is that :
when i got the array i had 2 disks missing , So we had to replace them , but I found out that... (0 Replies)
Discussion started by: ppass
0 Replies
8. Filesystems, Disks and Memory
I really Hate the Monopoly Microsoft has over Software, but the fact remains it exists... so I wonder if there was a way to enable Programs Made for Windows and Mac to be Run in Unix as if it was in the Specified OS. Like a Compatibility Wizard. Or in a dual boot computer, for Unix to be able to... (4 Replies)
Discussion started by: Elliandr
4 Replies
sckmd(1M) System Administration Commands sckmd(1M)
NAME
sckmd - Sun Fire High-End system key management daemon
SYNOPSIS
/usr/platform/SUNW,Sun-Fire-15000/lib/sckmd
DESCRIPTION
sckmd is a server process that resides on a Sun Fire high-end system domain. sckmd maintains the Internet Protocol Security (IPsec) Secu-
rity Associations (SAs) needed to secure the communication between the Sun Fire 15K System Controller (SC) and the cvcd(1M) and dcs(1M)
daemons running on a Sun Fire 15K domain. See ipsec(7P) for a description of Security Associations.
sckmd receives SAs from the SC and provides these SAs to the Security Association Databases (SADBs) using pf_key(7P).
sckmd normally starts up at system boot time. Each domain supports only one running sckmd process at a time.
FILES
/etc/inet/ipsecinit.conf Configuration file for default system-wide IPsec policies
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+------------------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+------------------------------------+
|Architecture |Sun Fire High-End systems |
+-----------------------------+------------------------------------+
|Availability |SUNWsckmx.u, SUNWsckmu.u, SUNWsckmr |
+-----------------------------+------------------------------------+
SEE ALSO
cvcd(1M), dcs(1M), ipsecconf(1M), ipsecalgs(1M), attributes(5), ipsec(7P), ipsecah(7P), ipsecesp(7P), pf_key(7P)
Sun Enterprise 10000 SSP Reference Manual
System Management Services (SMS) Reference Manual
NOTES
IPsec is used by Sun Fire high-end systems such as a Sun Fire 15K, to secure the communication between the SC, and the cvcd(1M) and dcs(1M)
daemons running on a domain. System-wide IPsec policies for these daemons are configured on a domain with ipsecconf(1M). Default policies
are defined when the SUNWsckmr package is installed on a Sun Fire high-end system domain at OS install time.
Package SUNWsckmr configures default system-wide policies for cvcd(1M) and dcs(1M) by adding the following entries in
/etc/inet/ipsecinit.conf:
{ dport sun-dr ulp tcp } permit
{ auth_alg md5 }
{ sport sun-dr ulp tcp } apply
{ auth_alg md5 sa unique }
{ dport cvc_hostd ulp tcp } permit
{ auth_alg md5 }
{ sport cvc_hostd ulp tcp } apply
{ auth_alg md5 sa unique }
The cvc_hostd service represents cvcd(1M) and the sun-dr service represents dcs(1M) in the preceding entries.
These policies conform to the format defined by ipsec(7P) and require and require IPsec AH protection using the HMAC-MD5 algorithm. See
ipsecah(7P).
System-wide policies for cvcd(1M) and dcs(1M) configured on a domain using ipsecconf(1M) must match the IPsec policies defined for these
services on the SC. On an SC, IPsec policies for these services are defined by the SMS key management daemon. Refer to thekmd(1M) man page
in the System Management Services (SMS) Reference Manual.
IPsec encryption or authentication with encryption can be enabled on the domain using the encr_algs and encr_auth_algs properties, as
described in the ipsecconf(1M) manual page. For example, the following ipsecconf(1M) entries require IPsec ESP protection using the Triple-
DES encryption algorithm and the HMAC-MD5 authentication algorithm.
{ dport cvc_hostd ulp tcp } permit
{ encr_algs 3des encr_auth_algs md5 }
{ sport cvc_hostd ulp tcp } apply
{ encr_algs 3des encr_auth_algs md5 sa unique }
See ipsecesp(7P) for more information on the IPsec ESP protocol. You can obtain a list of authentication and encryption algorithms and
their properties by using the ipsecalgs(1M) command.
SunOS 5.10 23 Oct 2003 sckmd(1M)