9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
we have NCR 3455 system from long time as attached all information for server (images) , so we need your help to assist us to get root password which lost it , really we appreciate your efforts if you can send us the procedure for resting the administrator (root) password which this server... (0 Replies)
Discussion started by: univoip
0 Replies
2. Filesystems, Disks and Memory
let me know to create a new partition on ncr unix with vxfs filesystem (0 Replies)
Discussion started by: venikathir
0 Replies
3. UNIX for Advanced & Expert Users
Dear all
I'm trying to virtualize NCR on UBUNTU host .
I need a help ,I'm new to UNIX world .
If any one ca send me step by step guide , I'll appreciate this very much .
Thanks (3 Replies)
Discussion started by: semerouk
3 Replies
4. Shell Programming and Scripting
Hi,
i created a script to look for the modified files in the last 15 minutes.
But later was told that the server that we need to implement this script is an MP-RAS (NCR Unix) server on which i found mmin option of the find command doesnt work.:wall:
Can anybody please let me know the... (1 Reply)
Discussion started by: utkarsh
1 Replies
5. HP-UX
I am getting the following error when I send mail to any domain say abc123@xyz.com
Not delivered to :due to 11 transfer failure
(mail: Error #22 'Surrogate command failed ', rc =11)
En Route to: xyz.com!abc123
=======surrogate command==========
:/user/bin/uux -username -xyz.com!rmail... (13 Replies)
Discussion started by: rush143
13 Replies
6. IP Networking
Can someone assist please. I am trying to change IP address on NCR UNIX using tcpconfig but the address wont change!! Using ifconfig -a I still see the old address! This is on an NCR S24 server. (3 Replies)
Discussion started by: Vusi Boutu
3 Replies
7. Filesystems, Disks and Memory
Hi all
I have an NCR UNIX hard disk I need to mount it on a Linux box
The FS Type in fdisk on linux is '63' for the partition
How can i mount on my linux box ?
what is kernel module i needed ? (6 Replies)
Discussion started by: yasser202
6 Replies
8. Infrastructure Monitoring
Good Day,
I have requirement to monitor a number of NCR unix server for our unix team. As the System Management product that we use in out company does not have an agent for NCR unix I am investigating the SNMP route. I got the unix guys to enable SNMP however, it seems the default MIB that is... (0 Replies)
Discussion started by: priteshj
0 Replies
9. Filesystems, Disks and Memory
Hi, I am new to the UNIX operating system and would realy appreciate some answers to these problems.
I have a unix box (Actually several of them throughout the different locations) that have NCR MP-RAS 3.02.x.x (with multiuser and possibly security packages installed.)
Originally they had 2gb... (4 Replies)
Discussion started by: ad7_98
4 Replies
ntp.keys(4) Kernel Interfaces Manual ntp.keys(4)
NAME
ntp.keys - Network Time Protocol (NTP) authentication key file
DESCRIPTION
The NTP standard specifies an extension to allow verification of the authenticity of received NTP packets and to provide an indication of
authenticity in outgoing packets. This is implemented in xntpd using the MD5 algorithm to compute the message-digest. The specification
allows any one of possibly 4 billion keys, numbered with 32-bit key identifiers, to be used to authenticate an association. The servers
involved in an association must agree on the key and key identifier used to authenticate their data, though they must each learn the key
and key identifier independently. In MD5, the keys are 64 bits (8 bytes). The xntpd daemon reads its keys from a file specified using the
-k command line option, or the keys statement in the configuration file. While key number 0 is fixed by the NTP standard (as 56 zero bits)
and may not be changed, one or more of the keys numbered 1 through 15 may be arbitrarily set in the keys file.
One of the keys may be chosen, by way of the configuration file requestkey statement, to authenticate run time configuration requests made
using the xntpdc(8) program. The latter program obtains the key from the terminal as a password, so it is generally appropriate to specify
the key chosen to be used for this purpose in ASCII format.
The NTP key file uses the same comment conventions as the configuration file. Key entries use a fixed format of the form: keyno type key
In this format: Is a positive integer. Is a single character that defines the format the key is given in. This is always M, representing
Message Digest (MD5) on Tru64 UNIX systems. Is the key itself. The MD5 algorithm key is a 1-to-8 character ASCII string. Because of the
simple tokenizing routine, you cannot use the following characters in an ASCII key: " " (space), "#" (number sign), "", "0, and " ". Note
that both the keys and the authentication scheme (MD5) must be identical between a set of peers sharing the same key number.
EXAMPLES
The following sample key file shows two defined NTP keys: 2 M RIrop8KPPvQvYotM # MD5 key as a random ASCII string 14 M sundial
# MD5 key as an ASCII string
FILES
Conventional name of the key file
RELATED INFORMATION
Commands: ntpdate(8), ntpq(8), xntpd(8), xntpdc(8)
Files: ntp.conf(4)
Network Administration delim off
ntp.keys(4)