Protocoles avancés |
| Top Level Aggregator | grands opérateurs internationaux |
| Next Level Aggregator | opérateurs de moindre importance |
| Site Level Aggregator | gestionnaire du site |
| Code | Nom |
| 0 | Proche en proche |
| 43 | Routage |
| 44 | Fragmentation |
| 50 | Identification |
| 51 | Confidentialité |
| 59 | Fin des entêtes |
| 60 | Destination |
| Code | Nom |
| 6 | TCP |
| 17 | UDP |
| 41 | IPv6 |
| 58 | ICMPv6 |
| Type | Description |
| 1 | destination inaccessible |
| 2 | paquet trop grand |
| 3 | paquet trop vieux |
| 4 | erreur de paramétre |
| Code | Description |
| 0 | Réseau inaccessible |
| 1 | Interdiction administrative |
| 2 | Pas un voisin |
| 3 | Adresse inaccessible |
| 4 | Port inaccessible |
| Type | Description |
| 128 | demande d’écho |
| 129 | réponse d’écho |
| 130 | demande de gestion multicast |
| 131 | rapport de gestion multicast |
| 132 | réduction d’un groupe multicast |
| Type | Description |
| 133 | sollicitation du routeur |
| 134 | annonce du routeur |
| 135 | sollicitation d’un voisin |
| 136 | annonce d’un voisin |
| 137 | redirection |
33:33:FF:ww:xx:yy
$ cat /etc/mdadm/mdadm.conf DEVICE /dev/sd[ab]1 ARRAY /dev/md0 devices=/dev/sda1,/dev/sdb1
DEVICE /dev/sd[abc]1 ARRAY /dev/md0 devices=/dev/sda1,/dev/sdb1,/dev/sdc1
$ mdadm --create /dev/md0 --level=5 \
--raid-devices 3 /dev/sda1 /dev/sdb1 /dev/sdc1 \
$ mkfs /dev/md0
$ mount /dev/md0 /mnt
$ cat /proc/mdstat
$ cp /vmlinuz /mnt $ mdadm --set-faulty /dev/md0 /dev/sdb1 $ cat /proc/mdstat $ diff /vmlinuz /mnt/vmlinuz $ umount /mnt $ mdadm --remove /dev/md0 /dev/sdb1 $ mdadm --add /dev/md0 /dev/sdb1 $ cat /proc/mdstat
$ pvcreate /dev/hda5 $ pvcreate /dev/sdb
$ vgcreate volume /dev/hda5 /dev/sdb $ vgdisplay
$ lvcreate -L1G -nroot volume ; mke2fs /dev/volume/root $ lvcreate -L500M -nvar volume ; mke2fs /dev/volume/var $ lvcreate -L500M -ntmp volume ; mke2fs /dev/volume/tmp
$ pvcreate /dev/sdc $ vgextend volume /dev/sdc $ umount /dev/volume/root $ lvextend -L+1G /dev/volume/root $ resize2fs /dev/volume/root $ mount /dev/volume/root
$ pvmove /dev/hda5 /dev/sdc $ vgreduce volume /dev/hda5
qemu-img create <chemin du disque> <taille>
kvm -net nic,model=ne2k_pci -net user -hda <chemin du disque> -cdrom <chemin de l'image ISO>
kernel = '/usr/lib/xen-default/boot/hvmloader'
builder = 'hvm'
memory = '1024'
disk = [
'file:/usr/local/src/debian-testing-i386-netinst.iso,hdc:cdrom,r',
'file:/usr/local/xen/domains/simplet/simplet_disk.img,ioemu:sda,w',
]
boot = 'd'
name = 'scratch'
vif = [ 'bridge=eth1' ]
vnc = 1
vnclisten = "0.0.0.0"
... (network-script 'network-bridge netdev=eth0') ...
kernel = '/boot/vmlinuz-2.6.32-5-xen-686'
ramdisk = '/boot/initrd.img-2.6.32-5-xen-686'
memory = '1024'
root = '/dev/xvda1 ro'
disk = [
'file:/usr/local1/xen/domains/fourmies/fourmies_root.img,xvda1,w',
'file:/usr/local1/xen/domains/fourmies/fourmies_swap.img,xvda2,w',
'file:/usr/local1/xen/domains/fourmies/fourmies_tmp.img,xvda5,w',
'file:/usr/local1/xen/domains/fourmies/fourmies_var.img,xvda6,w',
'file:/usr/local1/xen/domains/fourmies/fourmies_home.img,xvda7,w',
'file:/usr/local1/xen/domains/fourmies/fourmies_log.img,xvda8,w',
'phy:/dev/spool1/mail-spool,xvdb1,w',
'phy:/dev/spool2/mail-backup,xvdc1,w'
]
name = 'fourmies'
dhcp = 'dhcp'
vif = [ 'mac=00:16:3E:52:80:93, bridge=bridge2' ]
on_poweroff = 'destroy'
on_reboot = 'restart'
on_crash = 'restart'
xm list xm create fourmies.cfg xm console fourmies xm shutdown fourmies ...
echo "proc /proc proc defaults 0 0" >> rootfs/etc/fstab
# mkdir /sys/fs/cgroup/cpuset/model1 # echo "2-3" > /sys/fs/cgroup/cpuset/model1/cpus # echo $pid > /sys/fs/cgroup/cpuset/model1/tasks
# mkdir /sys/fs/cgroup/memory/model1 # echo "128M" > /sys/fs/cgroup/memory/model1/memory.limit_in_bytes # echo $pid > /sys/fs/cgroup/memory/model1/tasks
# mkdir /sys/fs/cgroup/blkio/model1 # echo "8:0 10485760" > /sys/fs/cgroup/blkio/model1/blkio.throttle.write_bps_device # echo $pid > /sys/fs/cgroup/blkio/model1/tasks
# mkdir /sys/fs/cgroup/devices/model1 # echo "b 8:0 rmw" > /sys/fs/cgroup/devices/model1/devices.deny # echo $pid > /sys/fs/cgroup/devices/model1/tasks
# docker images REPOSITORY TAG IMAGE ID CREATED SIZE debian jessie e5599115b6a6 4 weeks ago 123 MB .... # docker tag e5599115b6a6 docker.mondomaine.org:5000/my-debian # docker push docker.mondomaine.org:5000/my-debian
# cat Dockerfile FROM debian MAINTAINER Moi RUN apt-get update RUN apt-get -y install apache2 EXPOSE 80 CMD /usr/sbin/apache2ctl -D FOREGROUND # docker build -t apache .
# docker commit 814b74435ace my-apache sha256:ea17999b6621fcb62b4999fbd0e23e54aef72a9418c4d0d37d411c8737bd4f8d # docker images REPOSITORY TAG IMAGE ID CREATED SIZE my-apache jessie ea17999b6621 4 weeks ago 123 MB ... # docker tag ea17999b6621 docker.mondomaine.org:5000/my-apache # docker push docker.mondomaine.org:5000/my-apache
# docker run --privileged -i -t debian /bin/bash
# docker run --cpus=0.5 -i -t debian /bin/bash # docker run --cpu-count=2 -i -t debian /bin/bash
# docker run --memory=128m --memory-swap=256m -i -t debian /bin/bash
# docker run --device-write-bps=/dev/sda:10mb -i -t debian /bin/bash
# # rwm -> read, write and mknod # docker run --device=/dev/sdb:rwm -i -t debian /bin/bash
# man docker run
# docker networks ls NETWORK ID NAME DRIVER SCOPE 422a25c7e8cf bridge bridge local 3e0f696af22b host host local b00b2e188cb6 none null local
# docker network create mybridge
# docker run -i --net=mybridge -t my-apache /bin/bash
# docker network connect bridge 9ae343fe5609
# docker run -i -p 80:80 -t my-apache /bin/bash
# ssh-keygen -t rsa
# cat .ssh/id_rsa.pub | ssh cible "cat >> /root/.ssh/authorized_keys2"
# for m in machine01 machine02 machine03 ; do # scp /etc/ntp.conf $m:/etc/ # done
---
- élément1 # commentaire inutile
- champ1: valeur1
champ2: valeur2
- élément2
...
# Le code ci-dessus est équivalent à
# [élément1,{champ1: valeur1, champ2: valeur2},élément2]
# cat /etc/ansible/hosts
all:
hosts:
test:
ansible_host: 192.168.0.1
rpi:
ansible_host: 192.168.100.1
children:
serveurs-prod:
hosts:
sandbox.insecserv.deule.net:
brisban.insecserv.deule.net:
serveurs-tp:
hosts:
chassiron.insecserv.deule.net:
cordouan.insecserv.deule.net:
stations:
hosts:
zabeth[02:22].plil.info:
# cat /etc/ansible/hosts test ansible_host=192.168.0.1 rpi ansible_host=192.168.100.1 [serveurs-prod] sandbox.insecserv.deule.net brisban.insecserv.deule.net [serveurs-tp] chassiron.insecserv.deule.net cordouan.insecserv.deule.net [stations] zabeth[02:22].plil.info
# ansible ungrouped -a "uname -a" ... # ansible stations -a "lsb_release -d" ...
# ansible-playbook jeu.yml
---
- hosts: stations
tasks:
- name: configuration files
copy:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
owner: root
group: root
mode: '0644'
with_items:
- { src: '/etc/resolv.conf', dest: '/etc/resolv.conf'}
- { src: '/etc/apt/sources.list', dest: '/etc/apt/sources.list'}
- { src: '/etc/default/ntpdate', dest: '/etc/default/ntpdate'}
- { src: '/etc/ntp.conf', dest: '/etc/ntp.conf'}
- name: network interfaces
template:
src: '/etc/ansible/templates/interfaces'
dest: '/etc/network/interfaces'
owner: root
group: root
mode: '0644'
vars:
num: "{{ inventory_hostname | regex_replace('^[^0-9]*([0-9]*).*$','\\1') }}"
ip4: "{{ num | int + 50 }}"
ip6: "00{{ num }}"
- name: packages to be installed
apt:
update_cache: yes
name: "{{ packages }}"
vars:
packages:
- linux-image-4.19.0-0.bpo.5-amd64
- linux-compiler-gcc-6-x86=4.19.67-2+deb10u1~bpo9+1
- linux-headers-4.19.0-0.bpo.5-amd64
- ntpdate
- ntp
- name: packages to be removed
apt:
name: "{{ packages }}"
state: absent
autoremove: yes
vars:
packages:
- wicd
--- - hosts: ... tasks: - hosts: ... tasks:
---
- hosts: serveur web
tasks:
- name: configuration files
copy:
src: web/monsite
dest: /etc/apache2/site-enables/monsite
owner: root
group: root
mode: '0644'
notify: restart apache
handlers:
- name: restart apache
service:
name: apache2
state: restarted
---
- hosts: stations
roles:
- ntp
- dnsresolver
vars:
ntp_timezone: Europe/Paris
dnsserveur: 8.8.8.8
ansible-galaxy install geerlingguy.docker
oleron# ip link show
1: lo: <LOOPBACK,UP> mtu 16144 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0: <BROADCAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:10:b5:03:88:44 brd ff:ff:ff:ff:ff:ff
oleron# ip link set eth0 down
oleron# ip link set eth0 address 00:10:b5:03:88:44
oleron# ip address add dev eth0 193.48.64.200/24 broadcast +
oleron# ip address show eth0
5: eth0: <BROADCAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:10:b5:03:88:44 brd ff:ff:ff:ff:ff:ff
inet 193.48.64.39/24 brd 193.48.64.255 scope global eth0
inet 193.48.64.200/24 brd 193.48.64.255 scope global secondary eth0
inet6 fe80::210:b5ff:fe03:8844/10 scope link
oleron# ip neighbour show dev eth0 193.48.64.1 lladdr 00:d0:bc:bf:6c:38 nud reachable 193.48.64.47 lladdr 00:10:b5:07:36:82 nud stale 193.48.64.45 lladdr 00:10:b5:07:34:97 nud reachable oleron# ip neighbour add 193.48.64.250 lladdr 00:10:b5:03:88:44 dev eth0
oleron# ip route add 10.0.0.0/8 via 193.48.64.200 oleron# ip route show 193.48.64.0/24 dev eth0 proto kernel scope link src 193.48.64.39 10.0.0.0/8 via 193.48.64.200 dev eth0 default via 193.48.64.1 dev eth0
pevele# ip route add default nexthop via 193.48.57.33
nexthop via 193.48.57.62
artois# ip route add prohibit 207.46.0.0/16 gayant08$ ping -v www.microsoft.com PING microsoft.com (207.46.130.45): 56 data bytes 112 bytes from artois.escaut.net (172.26.16.7): Packet Filtered
artois# ip route add nat 193.48.57.48/29 via 172.26.17.136
artois# ip route add 193.48.57.32/27 dev eth0 table 100 artois# ip route add 172.26.16.0/20 dev eth1 table 100 artois# ip route show table 100 193.48.57.32/27 dev eth0 scope link 172.26.16.0/20 dev eth1 scope link artois# ip rule add priority 310 from 172.26.17.128/29 lookup table 100 0: from all lookup local 310: from 172.26.17.128/29 lookup 100 32766: from all lookup main 32767: from all lookup default artois# ip rule add priority 320 from 172.26.17.136/29 nat 193.48.57.48 artois# ip rule show 0: from all lookup local 310: from 172.26.17.128/29 lookup 100 320: from 172.26.17.136/29 lookup main map-to 193.48.57.48 32766: from all lookup main 32767: from all lookup default
artois# ip tunnel show tunl0: ip/ip remote any local any ttl inherit nopmtudisc gre0: gre/ip remote any local any ttl inherit nopmtudisc sit0: ipv6/ip remote any local any ttl 64 nopmtudisc sit1: ipv6/ip remote 206.123.31.102 local any ttl 64
vconfig add eth0 2 # Obsolète ip link add name vlan2 link eth0 type vlan id 2 # Courant
vconfig rem vlan2 # Obsolète ip link del dev vlan2 # Courant
iface vlan2 inet dhcp vlan-raw-device eth0
brctl addbr monpont # Obsolète ip link add montpont type bridge # Courant
brctl addif monpont eth0 # Obsolète brctl addif monpont eth1 # Obsolète ip link set eth0 master monpont # Courant ip link set eth1 master monpont # Courant
ifconfig eth0 up # Obsolète ifconfig eth1 up # Obsolète ip link set eth0 up # Courant ip link set eth1 up # Courant
ifconfig monpont up # Obsolète ifconfig monpont 192.168.0.1 netmask 255.255.255.0 # Obsolète ip address add dev monpont 192.168.0.1/24 # Courant
auto eth0 eth1 monpont iface eth0 inet manual up ip link set $IFACE up iface eth1 inet manual up ip link set $IFACE up iface monpont inet static bridge_ports eth0 eth1 address 192.168.0.1 netmask 255.255.255.0
ip link add vif1 type veth peer name eth0@vif1
ip link set eth0@vif1 netns /proc/<PID>/ns/net name eth0
nsenter -t <PID> -n ip address add dev eth0 192.168.0.100/24 nsenter -t <PID> -n ip route add default gw 192.168.0.1
artois# /sbin/route add default gw 172.26.16.7
artois# /sbin/ipfwadm -F -p deny artois# /sbin/ipfwadm -F -a masquerade -S 172.26.16.0/20
artois# ipchains -P forward DENY artois# ipchains -A forward -j MASQ -s 172.26.16.0/20
artois# iptables -P FORWARD DROP artois# iptables -A FORWARD -j ACCEPT -s 172.26.16.0/20 artois# iptables -A FORWARD -j ACCEPT -d 172.26.16.0/20 artois# iptables -t nat -A POSTROUTING -j MASQUERADE -s 172.26.16.0/20
# /sbin/ipfwadm -F -p accept # /sbin/ipfwadm -F -a deny -P tcp -S 193.48.57.32/27 -D 0.0.0.0/0 21 # /sbin/ipfwadm -I -p accept # /sbin/ipfwadm -I -a deny -P tcp -S 0.0.0.0/0 -D 134.206.3.60/32 23
# ipchains -P forward ACCEPT # ipchains -A forward -j DENY -p tcp -s 193.48.57.32/27 -d 0/0 ftp # ipchains -P input ACCEPT # ipchains -A input -j DENY -p tcp -d 134.206.3.60/32 telnet
# iptables -P FORWARD ACCEPT # iptables -A FORWARD -j DROP -p tcp -s 193.48.57.32/27 --dport ftp # iptables -P INPUT ACCEPT # iptables -A INPUT -j DROP -p tcp -d 134.206.3.60 --dport telnet
RG20-3640#show running-config interface tunnel0
interface Tunnel0
no ip address
ipv6 address 2001:660:3000:1104:140::/64
ipv6 enable
ipv6 rip T0 enable
tunnel source FastEthernet3/0.2
tunnel destination 193.51.178.140
tunnel mode ipv6ip
end
RG20-3640#show ip route
172.26.0.0/20 is subnetted, 2 subnets
C 172.26.224.0 is directly connected, FastEthernet3/0
C 172.26.16.0 is directly connected, FastEthernet3/0.4
193.48.57.0/27 is subnetted, 1 subnets
C 193.48.57.32 is directly connected, FastEthernet3/0.2
S* 0.0.0.0/0 [1/0] via 193.48.57.33
[1/0] via 172.26.224.1
RG20-3640#show ipv6 route
...
S ::/0 [1/0] via ::, Tunnel0
RG20-3640#
$ /sbin/ifconfig tunl 134.206.60.149 \
pointopoint 134.206.60.148
$ /sbin/ifconfig tunl netmask 255.255.0.0
$ /sbin/route add 134.206.60.148 dev eth0
$ /sbin/route add -net 134.206.0.0 dev tunl
$ /sbin/ifconfig tunl 134.206.60.148 \
pointopoint 193.51.25.73
$ /sbin/ifconfig tunl netmask 255.255.255.0
$ /sbin/route add 134.206.60.149 dev tunl
# /sbin/arp -s 134.206.60.149 x:x:x:x:x:x pub
albanie# ip tunnel add ustl mode ipip remote 134.206.85.135 albanie# ip link set ustl up albanie# ip address add 134.206.85.136/16 broadcast + dev ustl albanie# ip tunnel show ustl ustl: ip/ip remote 134.206.85.135 local any ttl inherit albanie# ip route add 134.206.85.135 dev eth0 albanie# ip route add 134.206.0.0/16 dev ustl albanie# ip route show 134.206.85.135 dev eth0 scope link 193.48.57.224/27 dev eth0 proto kernel scope link src 193.48.57.226 134.206.0.0/16 dev ustl proto kernel scope link src 134.206.85.136 default via 193.48.57.225 dev eth0 metric 1
statpc6# echo 1 > /proc/sys/net/ipv4/conf/all/proxy_arp statpc6# echo 1 > /proc/sys/net/ipv4/conf/all/forwarding statpc6# ip tunnel add epul mode ipip remote 193.48.57.226 statpc6# ip address add 134.206.85.135/32 broadcast + dev epul statpc6# ip link set epul up statpc6# ip tunnel show epul epul: ip/ip remote 193.48.57.226 local any ttl inherit statpc6# ip neighbour add 134.206.85.136 lladdr 00:b0:d0:8c:91:10 dev eth0 statpc6# ip route add 134.206.85.136 dev epul
~ WPA-PSK.
~ WPA-EAP;
| Code | Identifier | Length | Data |
| 1 byte | 2 bytes | 4 bytes | n bytes |
| Ethernet type | EAP Version | EAPOL Type | Length | EAP Packet |
| 2 bytes | 1 byte | 1 byte | 2 bytes | n bytes |
| Code | Identifier | Length | Authenticator | Attribute/value pairs |
| 1 byte | 1 byte | 2 bytes | 16 bytes |
PMK = PBKDF2(PSK, SSID, 4096, 256)
| Control | Duration | Addr 1 | Addr 2 | Addr 3 | Seq | Addr 4 | Data | Check sum |
| 2 bytes | 2 bytes | 6 bytes | 6 bytes | 6 bytes | 2 bytes | 6 bytes | 0-2312 bytes | 4 bytes |
| 2 bits | 2 bits | 4 bits | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit |
| Version | Type | Subtype | To DS | From DS | MF | Retry | Pwr | More | W | O |
| 24 bits | 6 bits | 2 bits | 0-2304 bytes | 32 bits |
| Initialization Vector | Padding | Key number | Data | Integrity Check Value (CRC32) |
| LLC | SNAP | ARP header | ARP opcode | ARP MAC source |
| 0xAAAA03 | 0x0000000806 | 0x000108000604 | 0x0001 | 0x010203040506 |
| ARP IP source | ARP MAC cible | ARP IP cible |
| ... | ... | ... |
| 1 byte | 1 byte | 1 byte | 5 bits | 1 bit | 2 bits |
| TSC 1 | Seed | TSC 0 | Reserved | Extended ? | Key number |
| 1 byte | 1 byte | 1 byte | 1 byte | 0-2292 bytes | 8 bytes | 4 bytes |
| TSC 2 | TSC 3 | TSC 4 | TSC 5 | Data | MIC | ICV |
| 1 byte | 1 byte | 1 byte | 5 bits | 1 bit | 2 bits |
| PN0 | PN1 | Reserved | Reserved | Extended ? | Key Number |
| 1 byte | 1 byte | 1 byte | 1 byte | 0-2292 bytes | 8 bytes | 4 bytes |
| PN2 | PN3 | PN4 | PN5 | Data | MIC | ICV |
options {
directory "/etc/bind";
listen-on-v6 { any; };
allow-transfer { "allowed_to_transfer"; };
};
acl "allowed_to_transfer" {
193.48.57.0/24 ;
...
};
controls {
inet 127.0.0.1 allow {localhost;} keys {dnskey;} ;
};
key dnskey {
algorithm HMAC-MD5;
secret dfqsfFFcYyyyU999xcsdqs==;
};
zone "." {
type hint;
file "root.cache";
};
zone "polytech-lille.fr" {
type master;
file "polytech-lille.fr/polytech-lille";
};
zone "private.direct.deule.net" {
type master;
file "dynamic/deule.direct.private/deule";
allow-update { key dnskey; };
};
zone "57.48.193.in-addr.arpa" {
type master;
file "escaut/escaut-c57.rev";
};
zone "EUDIL.68.48.193.in-addr.arpa" {
type master;
file "yser/yser-c68.rev";
};
zone "univ-poitiers.fr" {
type slave;
file "bak/poitiers";
masters { 195.220.223.1; };
};
zone "campus.univ-poitiers.fr" {
type slave;
file "bak/poitiers.campus";
masters { 195.220.223.1; };
};
zone "186.48.193.in-addr.arpa" {
type slave;
file "bak/48.193.lifl";
masters { 134.206.10.18; };
};
zone "68.51.193.in-addr.arpa" {
type slave;
file "bak/68.51.193.poitiers";
masters { 195.220.223.1; };
};
zone "TP.57.48.193.in-addr.arpa" {
type slave;
file "bak/tp.rev";
masters { 193.48.57.162; };
};
zone "tp.eudil.fr" {
type slave;
file "bak/tp";
masters { 193.48.57.162; };
};
tp IN NS ns.tp.eudil.fr.
ftp://FTP.RS.INTERNIC.NET/domain/named.root
. 3600000 IN NS A.ROOT-SERVERS.NET. A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 . 3600000 NS B.ROOT-SERVERS.NET. B.ROOT-SERVERS.NET. 3600000 A 128.9.0.107 . 3600000 NS C.ROOT-SERVERS.NET. C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12 ...
$TTL 259200
@ IN SOA douaisis.escaut.net. postmaster.douaisis.escaut.net. (
3298267243 ; Version
7200 ; Refresh (2h)
3600 ; Retry (1h)
1209600 ; Expire (14j)
259200 ) ; Minimum TTL (3j)
IN NS douaisis.escaut.net.
IN NS albanie.ilot.org.
IN NS calimero.escaut.net.
IN MX 100 douaisis.escaut.net.
pevele IN A 193.48.57.34
IN MX 100 douaisis.escaut.net.
douaisis IN A 193.48.57.36
IN MX 100 douaisis.escaut.net.
@ IN SOA douaisis.escaut.net. postmaster.douaisis.escaut.net. (
3298267243 ; Version
7200 ; Refresh (2h)
3600 ; Retry (1h)
1209600 ; Expire (14j)
259200 ) ; Minimum TTL (3j)
IN NS douaisis.escaut.net.
IN NS albanie.ilot.org.
IN NS calimero.escaut.net.
34 IN PTR pevele.escaut.net.
36 IN PTR douaisis.escaut.net.
# nsupdate > update add toto.eudil.fr. 3600 IN A 193.48.64.221 > #
ddns-update-style interim;
key dnskey {
algorithm HMAC-MD5;
secret dfqsfFFcYyyyU999xcsdqs==;
}
zone private.direct.deule.net. {
primary douaisis.escaut.net;
key dnskey;
}
subnet 172.26.16.0 netmask 255.255.240.0 {
option domain-name "students.deule.net ...";
option subnet-mask 255.255.240.0;
option broadcast-address 172.26.31.255;
option static-routes ...
option routers artegau.studserv.deule.net;
range 172.26.17.0 172.26.28.255;
ddns-domainname "students.private.direct.deule.net";
ddns-rev-domainname "private.reverse.deule.net";
ddns-ptr-domainname "students.deule.net";
}
# Simple identification par fichiers d'utilisateurs AuthType Basic AuthName "Squid statistics" AuthUserFile "/etc/passwd.web" AuthGroupFile "/etc/group.web" <Limit GET POST> require valid-user </Limit> # Identification par LDAP AuthType Basic AuthName "Site IMA" AuthBasicProvider ldap AuthzLDAPAuthoritative off AuthLDAPURL ldap://ldap.polytech-lille.fr:389/ou=People,dc=polytech-lille.fr?cn <Files "*"> require valid-user </Files>
artois:/etc/apache2# cat ports.conf Listen *:80 Listen *:443
artois:/etc/apache2# ls -l mods-enabled/ssl* lrwxrwxrwx 1 root root 27 Feb 28 2007 ssl.conf -> ../mods-available/ssl.conf lrwxrwxrwx 1 root root 27 Feb 28 2007 ssl.load -> ../mods-available/ssl.load
artois:/etc/apache2# ls -l sites-enabled/ lrwxrwxrwx 1 root root 27 Feb 23 2007 000-default -> ../sites-available/_default lrwxrwxrwx 1 root root 27 Feb 23 2007 010-internal -> ../sites-available/internal lrwxrwxrwx 1 root root 27 Feb 23 2007 010-polytech -> ../sites-available/polytech lrwxrwxrwx 1 root root 26 Feb 23 2007 020-certifs -> ../sites-available/certifs lrwxrwxrwx 1 root root 27 Feb 23 2007 020-intranet -> ../sites-available/intranet lrwxrwxrwx 1 root root 26 Feb 23 2007 020-webmail -> ../sites-available/webmail lrwxrwxrwx 1 root root 29 Feb 23 2007 021-oldwebmail -> ../sites-available/oldwebmail lrwxrwxrwx 1 root root 22 Feb 23 2007 030-bde -> ../sites-available/bde lrwxrwxrwx 1 root root 28 Feb 23 2007 030-reseiffel -> ../sites-available/reseiffel lrwxrwxrwx 1 root root 25 Feb 23 2007 050-eiffel -> ../sites-available/eiffel lrwxrwxrwx 1 root root 34 Feb 23 2007 050-reseau-polytech -> ../sites-available/reseau-polytech lrwxrwxrwx 1 root root 40 Feb 23 2007 050-reseau-polytech-tools -> ../sites-available/reseau-polytech-tools lrwxrwxrwx 1 root root 38 Feb 23 2007 090-annuaire-ingenieurs -> ../sites-available/annuaire-ingenieurs
artois:/etc/apache2# cat sites-enabled/020-webmail <VirtualHost artois.escaut.net:443> ServerName webmail.polytech-lille.fr ServerAlias webmail.polytech-reseau.org ServerAdmin postmaster@polytech-lille.fr SSLEngine on SSLCertificateFile /etc/ssl/certs/webmail.pem SSLCertificateKeyFile /etc/ssl/private/webmail.pem Options Indexes FollowSymLinks DocumentRoot /var/www/htdocs-ssl/webmail ScriptAlias /cgi-bin/ /var/www/cgi-bin/webmail </VirtualHost> <VirtualHost artois.escaut.net:80> ServerName webmail.polytech-lille.fr ServerAdmin postmaster@polytech-lille.fr DocumentRoot /var/www/htdocs/webmail ScriptAlias /cgi-bin/ /var/www/cgi-bin/webmail </VirtualHost>
Ce document a été traduit de LATEX par HEVEA