Displaying 12 results from an estimated 12 matches for "kstart".
Did you mean:
start
2013 Jan 06
0
How to use predict function from R2OpenBUGS results
...osetime[1],units="hours"),difftime(dosetime[3],dosetime[2],units="hours"),difftime(dosetime[4],dosetime[3],units="hours"),difftime(dosetime[5],dosetime[4],units="hours"),difftime(dosetime[6],dosetime[5],units="hours")))
times[ is.na(times) ] <- 0
KSTART <-0.06
dosetotal <-matrix(c(dosetotal[1],dosetotal[2],dosetotal[3],dosetotal[4],dosetotal[5]))
dosetotal[ is.na(dosetotal) ] <- 0
initc <-if (times[1,]==0) 0 else dosetotal[1]*exp(-KSTART*(times[1]+times[2]+times[3]+times[4]+times[5]))+dosetotal[2]*exp(-KSTART*(times[2]+times[3]+times[4...
2024 Feb 26
1
'Scripted' machine account renewal?!
...and keytab for authentication, no
>> hassle with passwords at all...
> Interesting... i supposed that still Kerberos ticket have to be 'upgraded',
> so... there's really a way to generate a 'permanent' kerberos ticket?
>
> Some info on how to do this? Thanks.
kstart do exactly that, it manages and refreshes the ticket for long
running processes. On Debian it is available as a package, the home page
is here https://www.eyrie.org/~eagle/software/kstart/
- Kees.
>
2024 Feb 26
1
'Scripted' machine account renewal?!
Mandi! Kees van Vloten via samba
In chel di` si favelave...
>> For a sake of simplicity i'm thinking to use machine account (-P).
> There is "net changetrustpw" to do this.
Ok, i've missed that. Thanks.
> If you just have a service that does LDAP-queries, I would create an
> ordinary user-account for it (and start it's name e.g. with "svc_").
2020 Jun 22
2
Winbind help - with domain migration.
Hello guys
I need some lights to migrate a Winbind/Samba share to a new AD.
My scenario is:
I have an old AD running on a Debian 9 and Samba 4.5.16 with many
replication issues.
Then I decided to create a new one from the scratch using Debian 10 and
Samba 4.12.2 (and everything is working perfectly). I have migrated all the
accounts/machines/etc from old to new domain without any problem.
Both the
2013 Aug 28
2
nslcd: kerberos vs. simple bind
Hello,
I took this out of the "OpenSSH auth in SAMBA4 LDAP" thread, because it
was drifting away from it's origin question :-)
I played this afternoon a bit with nslcd and kerberos for extending my
Wiki HowTo. But as more as I read, one question comes bigger and bigger:
What are the advantages of kerberos against simple bind with DN and
password?
Simple bind method: Create a
2015 Mar 04
2
Is there a listprincs equivalent?
I joined a machine. net ads testjoin says OK. The join exported a
keytab, which among others contains MACHINE$@REALM. However, trying
k5start I get "Client not found in Kerberos database". Also kinit -t
/etc/krb5.keytab MACHINE\$@REALM claims that the client was not found.
But then, how did it come into the keytab?
Is there a tool to list the principals in AD?
Kind regards,
-
2020 Jun 22
0
Winbind help - with domain migration.
...?? passwd? uid??????????????? sAMAccountName
map???? passwd? homeDirectory????? unixHomeDirectory
map???? passwd? gecos????????????? displayName
# Uncomment the following line to use Domain Users as the users primary
group
#map???? passwd? gidNumber????????? primaryGroupID
I also used to use 'kstart' to keep the kerberos ticket valid.
Rowland
2020 Jun 22
2
Winbind help - with domain migration.
...AccountName
> map passwd homeDirectory unixHomeDirectory
> map passwd gecos displayName
> # Uncomment the following line to use Domain Users as the users primary
> group
> #map passwd gidNumber primaryGroupID
>
> I also used to use 'kstart' to keep the kerberos ticket valid.
>
> Rowland
>
>
>
I will try to correct this line as you pointed me.
Thanks
> --
> To unsubscribe from this list go to the following URL and read the
> instructions: https://lists.samba.org/mailman/options/samba
>
--
Daniel...
2014 Nov 08
7
[Bug 2310] New: functionality to start process before ssh and/or to "wrap" such command around ssh
...on of kerberos credentials,
than all further connections could accidentally inherit the credentials
from the first one, started with k5start wrapped around.
Cheers,
Chris.
[0]
https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-October/033082.html
[1] http://www.eyrie.org/~eagle/software/kstart/
--
You are receiving this mail because:
You are watching the assignee of the bug.
2023 Jun 29
3
[PATCH drm-next v6 02/13] drm: manager to keep track of GPUs VA mappings
...64 end = addr + range;
+ u64 mm_start = mgr->mm_start;
+ u64 mm_end = mm_start + mgr->mm_range;
+
+ return addr >= mm_start && end <= mm_end;
+}
+
+static inline bool
+drm_gpuva_in_kernel_node(struct drm_gpuva_manager *mgr, u64 addr, u64 range)
+{
+ u64 end = addr + range;
+ u64 kstart = mgr->kernel_alloc_node.va.addr;
+ u64 krange = mgr->kernel_alloc_node.va.range;
+ u64 kend = kstart + krange;
+
+ return krange && addr < kend && kstart < end;
+}
+
+static inline bool
+drm_gpuva_range_valid(struct drm_gpuva_manager *mgr,
+ u64 addr, u64 range)...
2023 Jul 13
1
[PATCH drm-next v7 02/13] drm: manager to keep track of GPUs VA mappings
...+{
+ u64 end = addr + range;
+ u64 mm_start = mgr->mm_start;
+ u64 mm_end = mm_start + mgr->mm_range;
+
+ return addr >= mm_start && end <= mm_end;
+}
+
+static bool
+drm_gpuva_in_kernel_node(struct drm_gpuva_manager *mgr, u64 addr, u64 range)
+{
+ u64 end = addr + range;
+ u64 kstart = mgr->kernel_alloc_node.va.addr;
+ u64 krange = mgr->kernel_alloc_node.va.range;
+ u64 kend = kstart + krange;
+
+ return krange && addr < kend && kstart < end;
+}
+
+static bool
+drm_gpuva_range_valid(struct drm_gpuva_manager *mgr,
+ u64 addr, u64 range)
+{
+
+...
2023 Jul 20
2
[PATCH drm-misc-next v8 01/12] drm: manager to keep track of GPUs VA mappings
...+{
+ u64 end = addr + range;
+ u64 mm_start = mgr->mm_start;
+ u64 mm_end = mm_start + mgr->mm_range;
+
+ return addr >= mm_start && end <= mm_end;
+}
+
+static bool
+drm_gpuva_in_kernel_node(struct drm_gpuva_manager *mgr, u64 addr, u64 range)
+{
+ u64 end = addr + range;
+ u64 kstart = mgr->kernel_alloc_node.va.addr;
+ u64 krange = mgr->kernel_alloc_node.va.range;
+ u64 kend = kstart + krange;
+
+ return krange && addr < kend && kstart < end;
+}
+
+static bool
+drm_gpuva_range_valid(struct drm_gpuva_manager *mgr,
+ u64 addr, u64 range)
+{
+
+...