Protocoles avancés |
Top Level Aggregator | grands opérateurs internationaux |
Next Level Aggregator | opérateurs de moindre importance |
Site Level Aggregator | gestionnaire du site |
Code | Nom |
0 | Proche en proche |
43 | Routage |
44 | Fragmentation |
50 | Identification |
51 | Confidentialité |
59 | Fin des entêtes |
60 | Destination |
Code | Nom |
6 | TCP |
17 | UDP |
41 | IPv6 |
58 | ICMPv6 |
Type | Description |
1 | destination inaccessible |
2 | paquet trop grand |
3 | paquet trop vieux |
4 | erreur de paramétre |
Code | Description |
0 | Réseau inaccessible |
1 | Interdiction administrative |
2 | Pas un voisin |
3 | Adresse inaccessible |
4 | Port inaccessible |
Type | Description |
128 | demande d’écho |
129 | réponse d’écho |
130 | demande de gestion multicast |
131 | rapport de gestion multicast |
132 | réduction d’un groupe multicast |
Type | Description |
133 | sollicitation du routeur |
134 | annonce du routeur |
135 | sollicitation d’un voisin |
136 | annonce d’un voisin |
137 | redirection |
33:33:FF:ww:xx:yy
$ cat /etc/mdadm/mdadm.conf DEVICE /dev/sd[ab]1 ARRAY /dev/md0 devices=/dev/sda1,/dev/sdb1
DEVICE /dev/sd[abc]1 ARRAY /dev/md0 devices=/dev/sda1,/dev/sdb1,/dev/sdc1
$ mdadm --create /dev/md0 --level=5 \ --raid-devices 3 /dev/sda1 /dev/sdb1 /dev/sdc1 \ $ mkfs /dev/md0 $ mount /dev/md0 /mnt $ cat /proc/mdstat
$ cp /vmlinuz /mnt $ mdadm --set-faulty /dev/md0 /dev/sdb1 $ cat /proc/mdstat $ diff /vmlinuz /mnt/vmlinuz $ umount /mnt $ mdadm --remove /dev/md0 /dev/sdb1 $ mdadm --add /dev/md0 /dev/sdb1 $ cat /proc/mdstat
$ pvcreate /dev/hda5 $ pvcreate /dev/sdb
$ vgcreate volume /dev/hda5 /dev/sdb $ vgdisplay
$ lvcreate -L1G -nroot volume ; mke2fs /dev/volume/root $ lvcreate -L500M -nvar volume ; mke2fs /dev/volume/var $ lvcreate -L500M -ntmp volume ; mke2fs /dev/volume/tmp
$ pvcreate /dev/sdc $ vgextend volume /dev/sdc $ umount /dev/volume/root $ lvextend -L+1G /dev/volume/root $ resize2fs /dev/volume/root $ mount /dev/volume/root
$ pvmove /dev/hda5 /dev/sdc $ vgreduce volume /dev/hda5
qemu-img create <chemin du disque> <taille>
kvm -net nic,model=ne2k_pci -net user -hda <chemin du disque> -cdrom <chemin de l'image ISO>
kernel = '/usr/lib/xen-default/boot/hvmloader' builder = 'hvm' memory = '1024' disk = [ 'file:/usr/local/src/debian-testing-i386-netinst.iso,hdc:cdrom,r', 'file:/usr/local/xen/domains/simplet/simplet_disk.img,ioemu:sda,w', ] boot = 'd' name = 'scratch' vif = [ 'bridge=eth1' ] vnc = 1 vnclisten = "0.0.0.0"
... (network-script 'network-bridge netdev=eth0') ...
kernel = '/boot/vmlinuz-2.6.32-5-xen-686' ramdisk = '/boot/initrd.img-2.6.32-5-xen-686' memory = '1024' root = '/dev/xvda1 ro' disk = [ 'file:/usr/local1/xen/domains/fourmies/fourmies_root.img,xvda1,w', 'file:/usr/local1/xen/domains/fourmies/fourmies_swap.img,xvda2,w', 'file:/usr/local1/xen/domains/fourmies/fourmies_tmp.img,xvda5,w', 'file:/usr/local1/xen/domains/fourmies/fourmies_var.img,xvda6,w', 'file:/usr/local1/xen/domains/fourmies/fourmies_home.img,xvda7,w', 'file:/usr/local1/xen/domains/fourmies/fourmies_log.img,xvda8,w', 'phy:/dev/spool1/mail-spool,xvdb1,w', 'phy:/dev/spool2/mail-backup,xvdc1,w' ] name = 'fourmies' dhcp = 'dhcp' vif = [ 'mac=00:16:3E:52:80:93, bridge=bridge2' ] on_poweroff = 'destroy' on_reboot = 'restart' on_crash = 'restart'
xm list xm create fourmies.cfg xm console fourmies xm shutdown fourmies ...
echo "proc /proc proc defaults 0 0" >> rootfs/etc/fstab
# mkdir /sys/fs/cgroup/cpuset/model1 # echo "2-3" > /sys/fs/cgroup/cpuset/model1/cpus # echo $pid > /sys/fs/cgroup/cpuset/model1/tasks
# mkdir /sys/fs/cgroup/memory/model1 # echo "128M" > /sys/fs/cgroup/memory/model1/memory.limit_in_bytes # echo $pid > /sys/fs/cgroup/memory/model1/tasks
# mkdir /sys/fs/cgroup/blkio/model1 # echo "8:0 10485760" > /sys/fs/cgroup/blkio/model1/blkio.throttle.write_bps_device # echo $pid > /sys/fs/cgroup/blkio/model1/tasks
# mkdir /sys/fs/cgroup/devices/model1 # echo "b 8:0 rmw" > /sys/fs/cgroup/devices/model1/devices.deny # echo $pid > /sys/fs/cgroup/devices/model1/tasks
# docker images REPOSITORY TAG IMAGE ID CREATED SIZE debian jessie e5599115b6a6 4 weeks ago 123 MB .... # docker tag e5599115b6a6 docker.mondomaine.org:5000/my-debian # docker push docker.mondomaine.org:5000/my-debian
# cat Dockerfile FROM debian MAINTAINER Moi RUN apt-get update RUN apt-get -y install apache2 EXPOSE 80 CMD /usr/sbin/apache2ctl -D FOREGROUND # docker build -t apache .
# docker commit 814b74435ace my-apache sha256:ea17999b6621fcb62b4999fbd0e23e54aef72a9418c4d0d37d411c8737bd4f8d # docker images REPOSITORY TAG IMAGE ID CREATED SIZE my-apache jessie ea17999b6621 4 weeks ago 123 MB ... # docker tag ea17999b6621 docker.mondomaine.org:5000/my-apache # docker push docker.mondomaine.org:5000/my-apache
# docker run --privileged -i -t debian /bin/bash
# docker run --cpus=0.5 -i -t debian /bin/bash # docker run --cpu-count=2 -i -t debian /bin/bash
# docker run --memory=128m --memory-swap=256m -i -t debian /bin/bash
# docker run --device-write-bps=/dev/sda:10mb -i -t debian /bin/bash
# # rwm -> read, write and mknod # docker run --device=/dev/sdb:rwm -i -t debian /bin/bash
# man docker run
# docker networks ls NETWORK ID NAME DRIVER SCOPE 422a25c7e8cf bridge bridge local 3e0f696af22b host host local b00b2e188cb6 none null local
# docker network create mybridge
# docker run -i --net=mybridge -t my-apache /bin/bash
# docker network connect bridge 9ae343fe5609
# docker run -i -p 80:80 -t my-apache /bin/bash
# ssh-keygen -t rsa
# cat .ssh/id_rsa.pub | ssh cible "cat >> /root/.ssh/authorized_keys2"
# for m in machine01 machine02 machine03 ; do # scp /etc/ntp.conf $m:/etc/ # done
--- - élément1 # commentaire inutile - champ1: valeur1 champ2: valeur2 - élément2 ... # Le code ci-dessus est équivalent à # [élément1,{champ1: valeur1, champ2: valeur2},élément2]
# cat /etc/ansible/hosts all: hosts: test: ansible_host: 192.168.0.1 rpi: ansible_host: 192.168.100.1 children: serveurs-prod: hosts: sandbox.insecserv.deule.net: brisban.insecserv.deule.net: serveurs-tp: hosts: chassiron.insecserv.deule.net: cordouan.insecserv.deule.net: stations: hosts: zabeth[02:22].plil.info:
# cat /etc/ansible/hosts test ansible_host=192.168.0.1 rpi ansible_host=192.168.100.1 [serveurs-prod] sandbox.insecserv.deule.net brisban.insecserv.deule.net [serveurs-tp] chassiron.insecserv.deule.net cordouan.insecserv.deule.net [stations] zabeth[02:22].plil.info
# ansible ungrouped -a "uname -a" ... # ansible stations -a "lsb_release -d" ...
# ansible-playbook jeu.yml
--- - hosts: stations tasks: - name: configuration files copy: src: "{{ item.src }}" dest: "{{ item.dest }}" owner: root group: root mode: '0644' with_items: - { src: '/etc/resolv.conf', dest: '/etc/resolv.conf'} - { src: '/etc/apt/sources.list', dest: '/etc/apt/sources.list'} - { src: '/etc/default/ntpdate', dest: '/etc/default/ntpdate'} - { src: '/etc/ntp.conf', dest: '/etc/ntp.conf'} - name: network interfaces template: src: '/etc/ansible/templates/interfaces' dest: '/etc/network/interfaces' owner: root group: root mode: '0644' vars: num: "{{ inventory_hostname | regex_replace('^[^0-9]*([0-9]*).*$','\\1') }}" ip4: "{{ num | int + 50 }}" ip6: "00{{ num }}" - name: packages to be installed apt: update_cache: yes name: "{{ packages }}" vars: packages: - linux-image-4.19.0-0.bpo.5-amd64 - linux-compiler-gcc-6-x86=4.19.67-2+deb10u1~bpo9+1 - linux-headers-4.19.0-0.bpo.5-amd64 - ntpdate - ntp - name: packages to be removed apt: name: "{{ packages }}" state: absent autoremove: yes vars: packages: - wicd
--- - hosts: ... tasks: - hosts: ... tasks:
--- - hosts: serveur web tasks: - name: configuration files copy: src: web/monsite dest: /etc/apache2/site-enables/monsite owner: root group: root mode: '0644' notify: restart apache handlers: - name: restart apache service: name: apache2 state: restarted
--- - hosts: stations roles: - ntp - dnsresolver vars: ntp_timezone: Europe/Paris dnsserveur: 8.8.8.8
ansible-galaxy install geerlingguy.docker
oleron# ip link show 1: lo: <LOOPBACK,UP> mtu 16144 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: <BROADCAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:10:b5:03:88:44 brd ff:ff:ff:ff:ff:ff oleron# ip link set eth0 down oleron# ip link set eth0 address 00:10:b5:03:88:44
oleron# ip address add dev eth0 193.48.64.200/24 broadcast + oleron# ip address show eth0 5: eth0: <BROADCAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:10:b5:03:88:44 brd ff:ff:ff:ff:ff:ff inet 193.48.64.39/24 brd 193.48.64.255 scope global eth0 inet 193.48.64.200/24 brd 193.48.64.255 scope global secondary eth0 inet6 fe80::210:b5ff:fe03:8844/10 scope link
oleron# ip neighbour show dev eth0 193.48.64.1 lladdr 00:d0:bc:bf:6c:38 nud reachable 193.48.64.47 lladdr 00:10:b5:07:36:82 nud stale 193.48.64.45 lladdr 00:10:b5:07:34:97 nud reachable oleron# ip neighbour add 193.48.64.250 lladdr 00:10:b5:03:88:44 dev eth0
oleron# ip route add 10.0.0.0/8 via 193.48.64.200 oleron# ip route show 193.48.64.0/24 dev eth0 proto kernel scope link src 193.48.64.39 10.0.0.0/8 via 193.48.64.200 dev eth0 default via 193.48.64.1 dev eth0
pevele# ip route add default nexthop via 193.48.57.33 nexthop via 193.48.57.62
artois# ip route add prohibit 207.46.0.0/16 gayant08$ ping -v www.microsoft.com PING microsoft.com (207.46.130.45): 56 data bytes 112 bytes from artois.escaut.net (172.26.16.7): Packet Filtered
artois# ip route add nat 193.48.57.48/29 via 172.26.17.136
artois# ip route add 193.48.57.32/27 dev eth0 table 100 artois# ip route add 172.26.16.0/20 dev eth1 table 100 artois# ip route show table 100 193.48.57.32/27 dev eth0 scope link 172.26.16.0/20 dev eth1 scope link artois# ip rule add priority 310 from 172.26.17.128/29 lookup table 100 0: from all lookup local 310: from 172.26.17.128/29 lookup 100 32766: from all lookup main 32767: from all lookup default artois# ip rule add priority 320 from 172.26.17.136/29 nat 193.48.57.48 artois# ip rule show 0: from all lookup local 310: from 172.26.17.128/29 lookup 100 320: from 172.26.17.136/29 lookup main map-to 193.48.57.48 32766: from all lookup main 32767: from all lookup default
artois# ip tunnel show tunl0: ip/ip remote any local any ttl inherit nopmtudisc gre0: gre/ip remote any local any ttl inherit nopmtudisc sit0: ipv6/ip remote any local any ttl 64 nopmtudisc sit1: ipv6/ip remote 206.123.31.102 local any ttl 64
vconfig add eth0 2 # Obsolète ip link add name vlan2 link eth0 type vlan id 2 # Courant
vconfig rem vlan2 # Obsolète ip link del dev vlan2 # Courant
iface vlan2 inet dhcp vlan-raw-device eth0
brctl addbr monpont # Obsolète ip link add montpont type bridge # Courant
brctl addif monpont eth0 # Obsolète brctl addif monpont eth1 # Obsolète ip link set eth0 master monpont # Courant ip link set eth1 master monpont # Courant
ifconfig eth0 up # Obsolète ifconfig eth1 up # Obsolète ip link set eth0 up # Courant ip link set eth1 up # Courant
ifconfig monpont up # Obsolète ifconfig monpont 192.168.0.1 netmask 255.255.255.0 # Obsolète ip address add dev monpont 192.168.0.1/24 # Courant
auto eth0 eth1 monpont iface eth0 inet manual up ip link set $IFACE up iface eth1 inet manual up ip link set $IFACE up iface monpont inet static bridge_ports eth0 eth1 address 192.168.0.1 netmask 255.255.255.0
ip link add vif1 type veth peer name eth0@vif1
ip link set eth0@vif1 netns /proc/<PID>/ns/net name eth0
nsenter -t <PID> -n ip address add dev eth0 192.168.0.100/24 nsenter -t <PID> -n ip route add default gw 192.168.0.1
artois# /sbin/route add default gw 172.26.16.7
artois# /sbin/ipfwadm -F -p deny artois# /sbin/ipfwadm -F -a masquerade -S 172.26.16.0/20
artois# ipchains -P forward DENY artois# ipchains -A forward -j MASQ -s 172.26.16.0/20
artois# iptables -P FORWARD DROP artois# iptables -A FORWARD -j ACCEPT -s 172.26.16.0/20 artois# iptables -A FORWARD -j ACCEPT -d 172.26.16.0/20 artois# iptables -t nat -A POSTROUTING -j MASQUERADE -s 172.26.16.0/20
# /sbin/ipfwadm -F -p accept # /sbin/ipfwadm -F -a deny -P tcp -S 193.48.57.32/27 -D 0.0.0.0/0 21 # /sbin/ipfwadm -I -p accept # /sbin/ipfwadm -I -a deny -P tcp -S 0.0.0.0/0 -D 134.206.3.60/32 23
# ipchains -P forward ACCEPT # ipchains -A forward -j DENY -p tcp -s 193.48.57.32/27 -d 0/0 ftp # ipchains -P input ACCEPT # ipchains -A input -j DENY -p tcp -d 134.206.3.60/32 telnet
# iptables -P FORWARD ACCEPT # iptables -A FORWARD -j DROP -p tcp -s 193.48.57.32/27 --dport ftp # iptables -P INPUT ACCEPT # iptables -A INPUT -j DROP -p tcp -d 134.206.3.60 --dport telnet
RG20-3640#show running-config interface tunnel0 interface Tunnel0 no ip address ipv6 address 2001:660:3000:1104:140::/64 ipv6 enable ipv6 rip T0 enable tunnel source FastEthernet3/0.2 tunnel destination 193.51.178.140 tunnel mode ipv6ip end RG20-3640#show ip route 172.26.0.0/20 is subnetted, 2 subnets C 172.26.224.0 is directly connected, FastEthernet3/0 C 172.26.16.0 is directly connected, FastEthernet3/0.4 193.48.57.0/27 is subnetted, 1 subnets C 193.48.57.32 is directly connected, FastEthernet3/0.2 S* 0.0.0.0/0 [1/0] via 193.48.57.33 [1/0] via 172.26.224.1 RG20-3640#show ipv6 route ... S ::/0 [1/0] via ::, Tunnel0 RG20-3640#
$ /sbin/ifconfig tunl 134.206.60.149 \ pointopoint 134.206.60.148 $ /sbin/ifconfig tunl netmask 255.255.0.0 $ /sbin/route add 134.206.60.148 dev eth0 $ /sbin/route add -net 134.206.0.0 dev tunl
$ /sbin/ifconfig tunl 134.206.60.148 \ pointopoint 193.51.25.73 $ /sbin/ifconfig tunl netmask 255.255.255.0 $ /sbin/route add 134.206.60.149 dev tunl # /sbin/arp -s 134.206.60.149 x:x:x:x:x:x pub
albanie# ip tunnel add ustl mode ipip remote 134.206.85.135 albanie# ip link set ustl up albanie# ip address add 134.206.85.136/16 broadcast + dev ustl albanie# ip tunnel show ustl ustl: ip/ip remote 134.206.85.135 local any ttl inherit albanie# ip route add 134.206.85.135 dev eth0 albanie# ip route add 134.206.0.0/16 dev ustl albanie# ip route show 134.206.85.135 dev eth0 scope link 193.48.57.224/27 dev eth0 proto kernel scope link src 193.48.57.226 134.206.0.0/16 dev ustl proto kernel scope link src 134.206.85.136 default via 193.48.57.225 dev eth0 metric 1
statpc6# echo 1 > /proc/sys/net/ipv4/conf/all/proxy_arp statpc6# echo 1 > /proc/sys/net/ipv4/conf/all/forwarding statpc6# ip tunnel add epul mode ipip remote 193.48.57.226 statpc6# ip address add 134.206.85.135/32 broadcast + dev epul statpc6# ip link set epul up statpc6# ip tunnel show epul epul: ip/ip remote 193.48.57.226 local any ttl inherit statpc6# ip neighbour add 134.206.85.136 lladdr 00:b0:d0:8c:91:10 dev eth0 statpc6# ip route add 134.206.85.136 dev epul
~
WPA-PSK.
~
WPA-EAP;
Code | Identifier | Length | Data |
1 byte | 2 bytes | 4 bytes | n bytes |
Ethernet type | EAP Version | EAPOL Type | Length | EAP Packet |
2 bytes | 1 byte | 1 byte | 2 bytes | n bytes |
Code | Identifier | Length | Authenticator | Attribute/value pairs |
1 byte | 1 byte | 2 bytes | 16 bytes |
PMK = PBKDF2(PSK, SSID, 4096, 256)
Control | Duration | Addr 1 | Addr 2 | Addr 3 | Seq | Addr 4 | Data | Check sum |
2 bytes | 2 bytes | 6 bytes | 6 bytes | 6 bytes | 2 bytes | 6 bytes | 0-2312 bytes | 4 bytes |
2 bits | 2 bits | 4 bits | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit |
Version | Type | Subtype | To DS | From DS | MF | Retry | Pwr | More | W | O |
24 bits | 6 bits | 2 bits | 0-2304 bytes | 32 bits |
Initialization Vector | Padding | Key number | Data | Integrity Check Value (CRC32) |
LLC | SNAP | ARP header | ARP opcode | ARP MAC source |
0xAAAA03 | 0x0000000806 | 0x000108000604 | 0x0001 | 0x010203040506 |
ARP IP source | ARP MAC cible | ARP IP cible |
... | ... | ... |
1 byte | 1 byte | 1 byte | 5 bits | 1 bit | 2 bits |
TSC 1 | Seed | TSC 0 | Reserved | Extended ? | Key number |
1 byte | 1 byte | 1 byte | 1 byte | 0-2292 bytes | 8 bytes | 4 bytes |
TSC 2 | TSC 3 | TSC 4 | TSC 5 | Data | MIC | ICV |
1 byte | 1 byte | 1 byte | 5 bits | 1 bit | 2 bits |
PN0 | PN1 | Reserved | Reserved | Extended ? | Key Number |
1 byte | 1 byte | 1 byte | 1 byte | 0-2292 bytes | 8 bytes | 4 bytes |
PN2 | PN3 | PN4 | PN5 | Data | MIC | ICV |
options { directory "/etc/bind"; listen-on-v6 { any; }; allow-transfer { "allowed_to_transfer"; }; }; acl "allowed_to_transfer" { 193.48.57.0/24 ; ... }; controls { inet 127.0.0.1 allow {localhost;} keys {dnskey;} ; }; key dnskey { algorithm HMAC-MD5; secret dfqsfFFcYyyyU999xcsdqs==; };
zone "." { type hint; file "root.cache"; };
zone "polytech-lille.fr" { type master; file "polytech-lille.fr/polytech-lille"; }; zone "private.direct.deule.net" { type master; file "dynamic/deule.direct.private/deule"; allow-update { key dnskey; }; }; zone "57.48.193.in-addr.arpa" { type master; file "escaut/escaut-c57.rev"; }; zone "EUDIL.68.48.193.in-addr.arpa" { type master; file "yser/yser-c68.rev"; };
zone "univ-poitiers.fr" { type slave; file "bak/poitiers"; masters { 195.220.223.1; }; }; zone "campus.univ-poitiers.fr" { type slave; file "bak/poitiers.campus"; masters { 195.220.223.1; }; }; zone "186.48.193.in-addr.arpa" { type slave; file "bak/48.193.lifl"; masters { 134.206.10.18; }; }; zone "68.51.193.in-addr.arpa" { type slave; file "bak/68.51.193.poitiers"; masters { 195.220.223.1; }; };
zone "TP.57.48.193.in-addr.arpa" { type slave; file "bak/tp.rev"; masters { 193.48.57.162; }; }; zone "tp.eudil.fr" { type slave; file "bak/tp"; masters { 193.48.57.162; }; };
tp IN NS ns.tp.eudil.fr.
ftp://FTP.RS.INTERNIC.NET/domain/named.root
. 3600000 IN NS A.ROOT-SERVERS.NET. A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 . 3600000 NS B.ROOT-SERVERS.NET. B.ROOT-SERVERS.NET. 3600000 A 128.9.0.107 . 3600000 NS C.ROOT-SERVERS.NET. C.ROOT-SERVERS.NET. 3600000 A 192.33.4.12 ...
$TTL 259200 @ IN SOA douaisis.escaut.net. postmaster.douaisis.escaut.net. ( 3298267243 ; Version 7200 ; Refresh (2h) 3600 ; Retry (1h) 1209600 ; Expire (14j) 259200 ) ; Minimum TTL (3j) IN NS douaisis.escaut.net. IN NS albanie.ilot.org. IN NS calimero.escaut.net. IN MX 100 douaisis.escaut.net. pevele IN A 193.48.57.34 IN MX 100 douaisis.escaut.net. douaisis IN A 193.48.57.36 IN MX 100 douaisis.escaut.net.
@ IN SOA douaisis.escaut.net. postmaster.douaisis.escaut.net. ( 3298267243 ; Version 7200 ; Refresh (2h) 3600 ; Retry (1h) 1209600 ; Expire (14j) 259200 ) ; Minimum TTL (3j) IN NS douaisis.escaut.net. IN NS albanie.ilot.org. IN NS calimero.escaut.net. 34 IN PTR pevele.escaut.net. 36 IN PTR douaisis.escaut.net.
# nsupdate > update add toto.eudil.fr. 3600 IN A 193.48.64.221 > #
ddns-update-style interim; key dnskey { algorithm HMAC-MD5; secret dfqsfFFcYyyyU999xcsdqs==; } zone private.direct.deule.net. { primary douaisis.escaut.net; key dnskey; } subnet 172.26.16.0 netmask 255.255.240.0 { option domain-name "students.deule.net ..."; option subnet-mask 255.255.240.0; option broadcast-address 172.26.31.255; option static-routes ... option routers artegau.studserv.deule.net; range 172.26.17.0 172.26.28.255; ddns-domainname "students.private.direct.deule.net"; ddns-rev-domainname "private.reverse.deule.net"; ddns-ptr-domainname "students.deule.net"; }
# Simple identification par fichiers d'utilisateurs AuthType Basic AuthName "Squid statistics" AuthUserFile "/etc/passwd.web" AuthGroupFile "/etc/group.web" <Limit GET POST> require valid-user </Limit> # Identification par LDAP AuthType Basic AuthName "Site IMA" AuthBasicProvider ldap AuthzLDAPAuthoritative off AuthLDAPURL ldap://ldap.polytech-lille.fr:389/ou=People,dc=polytech-lille.fr?cn <Files "*"> require valid-user </Files>
artois:/etc/apache2# cat ports.conf Listen *:80 Listen *:443
artois:/etc/apache2# ls -l mods-enabled/ssl* lrwxrwxrwx 1 root root 27 Feb 28 2007 ssl.conf -> ../mods-available/ssl.conf lrwxrwxrwx 1 root root 27 Feb 28 2007 ssl.load -> ../mods-available/ssl.load
artois:/etc/apache2# ls -l sites-enabled/ lrwxrwxrwx 1 root root 27 Feb 23 2007 000-default -> ../sites-available/_default lrwxrwxrwx 1 root root 27 Feb 23 2007 010-internal -> ../sites-available/internal lrwxrwxrwx 1 root root 27 Feb 23 2007 010-polytech -> ../sites-available/polytech lrwxrwxrwx 1 root root 26 Feb 23 2007 020-certifs -> ../sites-available/certifs lrwxrwxrwx 1 root root 27 Feb 23 2007 020-intranet -> ../sites-available/intranet lrwxrwxrwx 1 root root 26 Feb 23 2007 020-webmail -> ../sites-available/webmail lrwxrwxrwx 1 root root 29 Feb 23 2007 021-oldwebmail -> ../sites-available/oldwebmail lrwxrwxrwx 1 root root 22 Feb 23 2007 030-bde -> ../sites-available/bde lrwxrwxrwx 1 root root 28 Feb 23 2007 030-reseiffel -> ../sites-available/reseiffel lrwxrwxrwx 1 root root 25 Feb 23 2007 050-eiffel -> ../sites-available/eiffel lrwxrwxrwx 1 root root 34 Feb 23 2007 050-reseau-polytech -> ../sites-available/reseau-polytech lrwxrwxrwx 1 root root 40 Feb 23 2007 050-reseau-polytech-tools -> ../sites-available/reseau-polytech-tools lrwxrwxrwx 1 root root 38 Feb 23 2007 090-annuaire-ingenieurs -> ../sites-available/annuaire-ingenieurs
artois:/etc/apache2# cat sites-enabled/020-webmail <VirtualHost artois.escaut.net:443> ServerName webmail.polytech-lille.fr ServerAlias webmail.polytech-reseau.org ServerAdmin postmaster@polytech-lille.fr SSLEngine on SSLCertificateFile /etc/ssl/certs/webmail.pem SSLCertificateKeyFile /etc/ssl/private/webmail.pem Options Indexes FollowSymLinks DocumentRoot /var/www/htdocs-ssl/webmail ScriptAlias /cgi-bin/ /var/www/cgi-bin/webmail </VirtualHost> <VirtualHost artois.escaut.net:80> ServerName webmail.polytech-lille.fr ServerAdmin postmaster@polytech-lille.fr DocumentRoot /var/www/htdocs/webmail ScriptAlias /cgi-bin/ /var/www/cgi-bin/webmail </VirtualHost>
Ce document a été traduit de LATEX par HEVEA