similar to: Change Source address for port 2022?

Displaying 20 results from an estimated 100 matches similar to: "Change Source address for port 2022?"

2004 Oct 19
6
CPU
Which CPU is best for Shorewall, a PIII-450 Celeron or a PII-266??? ================================== Joakim Hellström Chief System Engineer United Computer Systems Scandinavia AB Klostergatan 56 S-582 23 Linköping, SWEDEN Phone 1: +46 (0)13 13 97 92 Phone 2: +46 (0)13 13 96 00 (recep.) Fax: +46 (0)13 13 97 35 GSM: +46 (0)708 13 97 35 URL: http://www.ucs.se
2004 Aug 16
3
Not sure how to configure Shorewall 2.1.3
I have an access-IProm my isp that I configured my eth0 with. And I also have an IP-range assigned from my ISP that will be used on my servers connected to eth1. The IP-range is routed thru the access-IP. This is how my configfiles look like. Internal everything seems to work but not external. /etc/shorewall/proxyarp #ADDRESS INTERFACE EXTERNAL HAVEROUTE
1999 Apr 24
3
HP Deskjet 1000c
Howdy all - I have Samba 2.0.3 running like a champ on a dual PPro 200, 128 MB RAM, running Slackware 3.6, kernel 2.2.5. Running like a champ as far as file sharing is concerned, that is. I have an HP Deskjet 1000c hanging off the parallel port. I set up a raw printer in /etc/printcap, the line looks like this: dj1000|DeskJet 1000c:sh:lp=/dev/lp0:sd=/var/spool/lpd/dj1000 the printing section
1999 May 18
4
smbpasswd fails on Samba 2.0.3, HPUX 10.20
I have been unable to make smbpasswd work on my new Samba version 2.0.3 (HPUX 10.20). The smb.conf was modified from a working version on Linux (version 1.9.18p8). The relevant (I hope) output from smbpasswd, smb.log and testparms follow below. Are the log messages about "Couldn't set effective gid to -24 currently set to (real=0,eff=0)" and "Can't become connected
2023 Mar 21
2
Bug#1033297: xen: CVE-2022-42331 CVE-2022-42332 CVE-2022-42333 CVE-2022-42334
Source: xen Version: 4.17.0+46-gaaf74a532c-1 Severity: grave Tags: security upstream X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org> Hi, The following vulnerabilities were published for xen. CVE-2022-42331[0]: | x86: speculative vulnerability in 32bit SYSCALL path Due to an | oversight in the very original Spectre/Meltdown security work | (XSA-254),
2012 Jun 29
2
[Bug 2022] ssh segfaults when using ldns, SSHFP, a DNSSEC-enabled resolver and a CNAME
https://bugzilla.mindrot.org/show_bug.cgi?id=2022 --- Comment #2 from Darren Tucker <dtucker at zip.com.au> --- Patch applied, thanks. I still don't understand how it gets into this state since the space should be allocated immediately beforehand: if (rrset->rri_nsigs > 0) { rrset->rri_sigs = calloc(rrset->rri_nsigs,
2015 Aug 11
0
[Bug 2022] ssh segfaults when using ldns, SSHFP, a DNSSEC-enabled resolver and a CNAME
https://bugzilla.mindrot.org/show_bug.cgi?id=2022 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|RESOLVED |CLOSED --- Comment #5 from Damien Miller <djm at mindrot.org> --- Set all RESOLVED bugs to CLOSED with release
2023 Jan 28
1
Bug#1029830: xen: CVE-2022-42330
Source: xen Version: 4.17.0-1 Severity: important Tags: security upstream X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org> Hi, The following vulnerability was published for xen. CVE-2022-42330[0]: | Guests can cause Xenstore crash via soft reset When a guest issues a | "Soft Reset" (e.g. for performing a kexec) the libxl based Xen |
2023 Feb 18
1
Bug#1031567: xen: CVE-2022-27672: XSA-426: x86: Cross-Thread Return Address Predictions
Source: xen Version: 4.17.0+24-g2f8851c37f-2 Severity: grave Tags: security upstream X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org> Hi, The following vulnerability was published for xen, filling with RC severity (for ideally fixed before bookworm release): CVE-2022-27672[0]: | When SMT is enabled, certain AMD processors may speculatively execute |
2024 Oct 03
1
Joining a 2022-schema Active Directory
On Thu, 3 Oct 2024 22:04:11 +0200 Emmanuel Florac <eflorac at intellique.com> wrote: > Le Thu, 3 Oct 2024 16:20:38 +0100 > Rowland Penny via samba <samba at lists.samba.org> ?crivait: > > > > > > > "smbclient" on Linux connects to the share just fine using domain > > > user credentials. Only domain members can't... > > >
2024 Oct 04
1
Joining a 2022-schema Active Directory
Le Fri, 4 Oct 2024 09:27:12 +0100 Rowland Penny via samba <samba at lists.samba.org> ?crivait: > > > > OK, I'll try first the 4.17 version from the backports, and if it's > > not enough I'll upgrade to 4.20. > > I would upgrade to bookworm with Samba from backports, but its your > domain ;-) I've just upgraded to bookworm, I'll check how
2024 Dec 20
1
Problem after join Windows Serwer 2022 DC to Samba AD
I am testing the addition of a Windows Server 2022 DC to an AD based on a Samba DC according to https://samba.tranquil.it/doc/en/samba_advanced_methods/samba_add_windows_active_directory.html#samba-add-windows-active-directory . It seems to be added to the domain correctly. When I check with the command: nslookup -type=SRV _ldap._tcp.wenus.local, it shows all DCs, including the new one.
2025 Feb 07
0
Samba domain controller 2022/2025 emulation
Subject: Samba domain controller 2022/2025 emulation Good day from Singapore, [QUOTE] So right now Samba can run as an Active Directory domain controller. With the newer version it can even run in higher functional levels such as 2012_r2 and 2016. You could technically run your entire organization off of Samba if you felt the need to. [/QUOTE] Source:
2023 May 10
1
Joining Windows Server 2022 to Samba Domain
Hi, I'm attempting to join a Windows Server 2022 to an existing domain Im running into issues as I am trying to migrate away from Samba DCs (:sad:) I've been able to successfully join a Windows Server 2022 to a fresh domain without much trouble after following tranquil.it<https://samba.tranquil.it/doc/en/samba_advanced_methods/samba_add_windows_active_directory.html>'s guide as
2012 Jun 26
2
[Bug 2022] New: ssh segfaults when using ldns, SSHFP, a DNSSEC-enabled resolver and a CNAME
https://bugzilla.mindrot.org/show_bug.cgi?id=2022 Bug #: 2022 Summary: ssh segfaults when using ldns, SSHFP, a DNSSEC-enabled resolver and a CNAME Classification: Unclassified Product: Portable OpenSSH Version: 6.0p1 Platform: All OS/Version: All Status: NEW Severity: normal
2025 Apr 27
1
Fwd: Domain member fails to map SID>*ID after DC migrated from Server 2022 to 2025
On Thu, Apr 24, 2025 at 2:25?AM Rowland Penny via samba <samba at lists.samba.org> wrote: > Try this one instead: > > <snipped> > > Making the obvious change. Thanks. I gave that a shot, but it still results in the same set of errors. > > > map to guest = Bad User > > Why do you have that set ? You do not seem to have 'guest ok' or >
2024 Dec 20
1
Problem after join Windows Serwer 2022 DC to Samba AD
On Fri, 20 Dec 2024 12:18:45 +0100 Programnet via samba <samba at lists.samba.org> wrote: > I am testing the addition of a Windows Server 2022 DC to an AD based > on a Samba DC according to > https://samba.tranquil.it/doc/en/samba_advanced_methods/samba_add_windows_active_directory.html#samba-add-windows-active-directory What version of Samba are you using and on what OS ? Have
2024 Oct 04
2
Joining a 2022-schema Active Directory
Le Thu, 3 Oct 2024 21:35:04 +0100 Rowland Penny via samba <samba at lists.samba.org> ?crivait: > > Yes, I mean Windows 11 or WIndows Server 2022 machines that are > > registered into the AD. A Win11 PC which isn't AD-connected (but in > > the same IP network) can connect just fine using the server IP > > address and credentials from one of the domain user
2024 Oct 03
1
Joining a 2022-schema Active Directory
Hello, I'm trying to connect a Debian 11.x server (running Samba 4.13.13, old version...) to an AD which is controlled by a Windows Server 2022 (21H2) controller. The server joined the domain fine, it's listed among the domain members normally, and user authentication works ("id <some domain user>" works), however I can connect to the server just fine in two cases : *
2022 Jul 06
1
CVE-2022-30550: Privilege escalation possible in dovecot when similar master and non-master passdbs are used
Affected product: Dovecot IMAP Server Internal reference: DOV-5320 Vulnerability type: Improper Access Control (CWE-284) Vulnerable version: 2.2 Vulnerable component: submission Report confidence: Confirmed Solution status: Fixed in main Researcher credits: Julian Brook (julezman) Vendor notification: 2022-05-06 CVE reference: CVE-2022-30550 CVSS: 6.8