Displaying 4 results from an estimated 4 matches for "dnsext".
Did you mean:
dnsexit
2005 Apr 11
3
Default Firewall Entries
Hello CentOS,
I'm curious... there seems to be a couple of default firewall rules
that I'm not familiar with in the CentOS 4.0
# Firewall configuration written by system-config-securitylevel
# Manual customization of this file is not recommended.
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
:RH-Firewall-1-INPUT - [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A FORWARD
2009 Mar 04
6
1 Server, Multiple Client Setup
Hello,
I have tried for days on end with no success on this, so I thought I would
post it here and see if someone can help me at all.
*Here's the scenario:*
I have 1 PC with a Static IP/Domain (a dyndns.org account -
myserver.homeip.net) connected to a router, which in turn is the gateway to
the internet. It also has a static local IP (192.168.1.2). I will call this
the "server"
2007 Aug 01
0
Hostname DNS update (using nsupdate-gss) to Active Directory DNS using Sites
...--------- next part --------------
--- /usr/src/redhat/SOURCES/nsupdate-gss 2006-01-23 06:35:10.000000000 +0100
+++ /usr/bin/nsupdate-gss 2007-08-01 13:28:39.000000000 +0200
@@ -5,6 +5,9 @@
# jmruiz@animatika.net
# updated, 2004-Enero
+# dag@wieers.com
+# updated, 2007-EMC
+
# See draft-ietf-dnsext-gss-tsig-02, RFC2845 and RFC2930
@@ -20,9 +23,9 @@
# Integrity of the arguments
-if ($#ARGV != 3) {
+if ($#ARGV < 3) {
print "
-Usage: nsupdate-gss.pl HOST DOMAIN IP TTL
+Usage: nsupdate-gss.pl HOST DOMAIN IP TTL [NS]
";
exit 1;
}
@@ -35,6 +38,7 @@
my $ip = $ARGV[2]...
2002 Jan 13
7
Public storage for public keys
This question should be asked before, but I fail to find
the discussion.
What options can be used for storing host/users pubkeys in
a publically available places? I know openssh currently
provide option except if /etc/ssh_known_hosts and ~/.ssh/known_hosts.
But what about many machines?
Think of e.g. pgp keyservers. Note that pgp keyservers isn't
a good solution *always*. The best one