Displaying 20 results from an estimated 20000 matches similar to: "Two MACs for one IP"
2018 Jun 08
2
C7, encryption, and clevis
Valeri Galtsev wrote:
>
>
> On 06/08/18 10:27, m.roth at 5-cent.us wrote:
>> John Hodrien wrote:
>>> On Fri, 8 Jun 2018, m.roth at 5-cent.us wrote:
>>>
>>>> We've been required to encrypt h/ds, and so have been rolling that out
>>>> over the last year or so. Thing is, you need to put in a password, of
>>>> course, to boot the
2018 Jun 08
0
C7, encryption, and clevis
On 06/08/18 12:01, m.roth at 5-cent.us wrote:
> Valeri Galtsev wrote:
>>
>>
>> On 06/08/18 10:27, m.roth at 5-cent.us wrote:
>>> John Hodrien wrote:
>>>> On Fri, 8 Jun 2018, m.roth at 5-cent.us wrote:
>>>>
>>>>> We've been required to encrypt h/ds, and so have been rolling that out
>>>>> over the last year or
2018 Jun 08
0
C7, encryption, and clevis
On 06/08/18 10:27, m.roth at 5-cent.us wrote:
> John Hodrien wrote:
>> On Fri, 8 Jun 2018, m.roth at 5-cent.us wrote:
>>
>>> We've been required to encrypt h/ds, and so have been rolling that out
>>> over the last year or so. Thing is, you need to put in a password, of
>>> course, to boot the system. My manager found a way to allow us to reboot
2018 Jun 08
3
C7, encryption, and clevis
John Hodrien wrote:
> On Fri, 8 Jun 2018, m.roth at 5-cent.us wrote:
>
>> We've been required to encrypt h/ds, and so have been rolling that out
>> over the last year or so. Thing is, you need to put in a password, of
>> course, to boot the system. My manager found a way to allow us to reboot
>> without being at the system's keyboard, a package called clevis.
2018 Jun 08
2
C7, encryption, and clevis
We've been required to encrypt h/ds, and so have been rolling that out
over the last year or so. Thing is, you need to put in a password, of
course, to boot the system. My manager found a way to allow us to reboot
without being at the system's keyboard, a package called clevis. Works
fine... except in a couple of very special cases.
Those systems, the problem is that, due to older
2018 Jun 08
0
C7, encryption, and clevis
On Fri, 8 Jun 2018, m.roth at 5-cent.us wrote:
> We've been required to encrypt h/ds, and so have been rolling that out
> over the last year or so. Thing is, you need to put in a password, of
> course, to boot the system. My manager found a way to allow us to reboot
> without being at the system's keyboard, a package called clevis. Works
> fine... except in a couple of very
2018 Jun 08
0
C7, encryption, and clevis
Valeri Galtsev wrote:
> On 06/08/18 13:48, m.roth at 5-cent.us wrote:
>> Frank Cox wrote:
>>>>> so if it would work, replace shortname with short and short1?
>>>
>>> With all of this hokey-pokey surrounding licensing and mac addresses, I
>>> wonder if this outfit is actually still in compliance with the terms of
>>> their license for this
2018 Jun 08
5
C7, encryption, and clevis
On 06/08/18 13:48, m.roth at 5-cent.us wrote:
> Frank Cox wrote:
>>>> so if it would work, replace shortname with short and short1?
>>
>> With all of this hokey-pokey surrounding licensing and mac addresses, I
>> wonder if this outfit is actually still in compliance with the terms of
>> their license for this software, whatever it may be?
>>
>> If
2018 Jun 10
0
C7, encryption, and clevis
On 2018-06-08, Valeri Galtsev <galtsev at kicp.uchicago.edu> wrote:
>
> Frank, I 100% agree with you. The only case with spoofed MAC address and
> license that may have chance to stand in court will be if all below are
> true:
>
> 1. the company issued perpetual license.
> 2. the company does not exist
Based on what's written below, it seems like the company does
2019 Jul 29
0
initramfs annoyances (I think)
Leon Fauster via CentOS wrote:
>
>> Am 29.07.2019 um 22:37 schrieb J Martin Rushton via CentOS
>> <centos at centos.org>:
>> On 29/07/2019 20:58, mark wrote:
>>
>>> Moved a server from the datacenter to our secure room. I've changed
>>> the DNS, and our dhcpd... and yet, every time it boots, it comes up
>>> with the IP it had in the
2018 Jun 08
2
C7, encryption, and clevis
On 06/08/18 15:26, m.roth at 5-cent.us wrote:
> Valeri Galtsev wrote:
>> On 06/08/18 13:48, m.roth at 5-cent.us wrote:
>>> Frank Cox wrote:
>>>>>> so if it would work, replace shortname with short and short1?
>>>>
>>>> With all of this hokey-pokey surrounding licensing and mac addresses, I
>>>> wonder if this outfit is
2018 Jun 08
2
C7, encryption, and clevis
> > so if it would work, replace shortname with short and short1?
With all of this hokey-pokey surrounding licensing and mac addresses, I wonder if this outfit is actually still in compliance with the terms of their license for this software, whatever it may be?
If the software licensed to run only on Machine X and Machine X has now been junked and replace by Machine Y, then isn't the
2019 Apr 01
1
dracut ipv6 fixed ip
hi,
we have successfully implemented at tang/clevis environment for
automatically entering luks keys and booting hosts without operator
intervention.
Now we would like to use this as well on ipv6 networks, but I do not seem
to get it to work.
I have already posted this issue to the dracut devs github issue tracker (
https://github.com/dracutdevs/dracut/issues/554) but no response so far.
Maybe
2017 May 18
0
Centos 7 and MAC address munging
Subject: Re: [CentOS] Centos 7 and MAC address munging
Date: Thu, 18 May 2017 06:22:21 +0100
From: James Hogarth <james.hogarth at gmail.com>
>
> On 17 May 2017 8:53 pm, <m.roth at 5-cent.us> wrote:
>
>> Odd situation: I've mentioned before that I have several users for whom I
>< have to spoof the MAC address, due to a software license. Now, I've got
2017 Jul 07
0
C7 and spoofed MAC address
On 30 June 2017 at 18:58, <m.roth at 5-cent.us> wrote:
> Got a problem: a user's workstation froze. He wound up rebooting, without
> calling me in first, so I dunno. But, and this is a show-stopper, when it
> came up, it came up with the firmware MAC, not the spoofed one. In
> /etc/sysconfig/network-scripts/ifcg-eth0, I've got the spoofed MAC
> address, and a UUID. In
2017 May 17
1
Centos 7 and MAC address munging
Odd situation: I've mentioned before that I have several users for whom I
have to spoof the MAC address, due to a software license. Now, I've got
net.ifnames=0 biosdevname=0 on the grub2 command line, and I've got the
spoofed MAC address in /etc/sysconfig/network-sctipts/ifcfg-eth0.
But he had a serious problem - X froze, and he thought to reboot, rather
than call me. It came up with
1996 Sep 19
0
CERT Advisory CA-96.21 - TCP SYN Flooding and IP Spoofing Attacks
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
CERT(sm) Advisory CA-96.21
Original issue date: September 19, 1996
Last revised: --
Topic: TCP SYN Flooding and IP Spoofing Attacks
- -----------------------------------------------------------------------------
*** This advisory supersedes CA-95:01. ***
Two
2007 May 31
0
Custom CLI (spoofing) ?
I'm trying to have a go at CLI spoofing.
My outbound calls may go out over various VoIP providers, using least cost routing to determine which provider for call destination and time of day.
No matter which provider I go out over, i'd like the called party to only see only one of my numbers - that number will be the only number i'll want people to call back on.
To test, i've
2018 Jun 08
0
C7, encryption, and clevis
Frank Cox wrote:
>> > so if it would work, replace shortname with short and short1?
>
> With all of this hokey-pokey surrounding licensing and mac addresses, I
> wonder if this outfit is actually still in compliance with the terms of
> their license for this software, whatever it may be?
>
> If the software licensed to run only on Machine X and Machine X has now
>
2019 Oct 17
0
Using Clevis/Tang (NBDE) to automatically decrypt volumes from within libguestfs
This is about Network-Bound Disk Encryption (NBDE) not to be confused
of course with NBD! NBDE is where you use disk encryption in your
virtual machines. But instead of having to type a passphrase when the
guest boots, there is a network server which gives out tokens, so as
long as the guest is booted from the trusted network it is able to
boot unattended.
In RHEL[1] we have three pieces of