search for: aclname

Displaying 7 results from an estimated 7 matches for "aclname".

2007 Jan 06
1
Re: [nut-commits] svn commit r710 - in trunk: . clients server
...y) { > case AF_INET: > return((((struct sockaddr_in*)ip_addr)->sin_addr.s_addr & htonl(prefix)) == ((struct sockaddr_in*)net_addr)->sin_addr.s_addr); > @@ -72,8 +73,31 @@ > return(0); > } > } > +#endif > > /* see if <addr> matches the acl <aclname> */ > +#ifndef HAVE_IPV6 > +int acl_check(const char *aclname, const struct sockaddr_in *addr) > +{ > + struct acl_t *tmp; > + int aclchk, addrchk; > + > + tmp = acl_head; > + while (tmp != NULL) { > + if (!strcmp(tmp->name, aclname)) { > + aclchk = tmp->ad...
2007 Jan 06
3
Re: [nut-commits] svn commit r708 - in trunk: . clients server
...r32[1] == 0) && (ip6->s6_addr32[0] == 0)) > + return(1); > + else > + return(0); > + } > + default: > + fatal_with_errno("mask_cmp: Unknown address family"); > + return(0); > + } > +} > > /* see if <addr> matches the acl <aclname> */ > -int acl_check(const char *aclname, const struct sockaddr_in *addr) > +int acl_check(const char *aclname, const struct sockaddr_storage *addr) > { > struct acl_t *tmp; > - int aclchk, addrchk; > > tmp = acl_head; > while (tmp != NULL) { > - if (!strcmp(...
2017 Mar 01
3
fail2ban Asterisk 13.13.1
...,LocalAddress="IPV [46]/(UDP|TCP|WS)/[\da-fA-F:.]+/\d+",RemoteAddress="IPV[46]/(UDP|TCP|WS)/<HO ST>/\d+"(,Challenge="[\w/]+")?(,ReceivedChallenge="\w+")?(,Response="\w+",Ex pectedResponse="\w*")?(,ReceivedHash="[\da-f]+")?(,ACLName="\w+")?$ ^%(__prefix_line)s%(log_prefix)s "Rejecting unknown SIP connection from <HOST>"$ ^%(__prefix_line)s%(log_prefix)s Request (?:'[^']*' )?from '[^'] *' failed for '<HOST>(?::\d+)?'\s\(callid: [^\)]*\) -...
2017 Jan 09
2
NUT Client shuts down when performing runtime calibration on APC UPS
...control data, you should keep it secure. # # It should only be readable by the user that upsd becomes. See the FAQ. # ======================================================================= # Access Control Lists (ACLs) # # ACL <name> <ipblock> # ACL myhost 10.0.0.1/32 # # ACCEPT <aclname> [<aclname>...] # REJECT <aclname> [<aclname>...] # # Define lists of hosts or networks with ACL definitions. # # ACCEPT and REJECT use ACL definitions to control whether a host is # allowed to connect to upsd. # # This default configuration only gives access to localhost. To...
2017 Mar 02
3
fail2ban Asterisk 13.13.1
...,LocalAddress="IPV [46]/(UDP|TCP|WS)/[\da-fA-F:.]+/\d+",RemoteAddress="IPV[46]/(UDP|TCP|WS)/<HO ST>/\d+"(,Challenge="[\w/]+")?(,ReceivedChallenge="\w+")?(,Response="\w+",Ex pectedResponse="\w*")?(,ReceivedHash="[\da-f]+")?(,ACLName="\w+")?$ ^%(__prefix_line)s%(log_prefix)s "Rejecting unknown SIP connection from <HOST>"$ ^%(__prefix_line)s%(log_prefix)s Request (?:'[^']*' )?from '[^']*' failed for '<HOST>(?::\d+)?'\s\(callid: [^\)]*\) - (...
2009 Aug 25
3
Extending virtio_console to support multiple ports
Hello all, Here is a new iteration of the patch series that implements a transport for guest and host communications. The code has been updated to reuse the virtio-console device instead of creating a new virtio-serial device. I've tested for compatibility (old qemu & new kernel, new qemu & old kernel, new qemu & new kernel) and it all works fine. There are a few items on my
2009 Aug 25
3
Extending virtio_console to support multiple ports
Hello all, Here is a new iteration of the patch series that implements a transport for guest and host communications. The code has been updated to reuse the virtio-console device instead of creating a new virtio-serial device. I've tested for compatibility (old qemu & new kernel, new qemu & old kernel, new qemu & new kernel) and it all works fine. There are a few items on my