Protocoles avancés |
qemu-img create <chemin du disque> <taille>
kvm -net nic,model=ne2k_pci -net user -hda <chemin du disque> -cdrom <chemin de l'image ISO>
kernel = '/usr/lib/xen-default/boot/hvmloader' builder = 'hvm' memory = '1024' disk = [ 'file:/usr/local/src/debian-testing-i386-netinst.iso,hdc:cdrom,r', 'file:/usr/local/xen/domains/simplet/simplet_disk.img,ioemu:sda,w', ] boot = 'd' name = 'scratch' vif = [ 'bridge=eth1' ] vnc = 1 vnclisten = "0.0.0.0"
... (network-script 'network-bridge netdev=eth0') ...
kernel = '/boot/vmlinuz-2.6.32-5-xen-686' ramdisk = '/boot/initrd.img-2.6.32-5-xen-686' memory = '1024' root = '/dev/xvda1 ro' disk = [ 'file:/usr/local1/xen/domains/fourmies/fourmies_root.img,xvda1,w', 'file:/usr/local1/xen/domains/fourmies/fourmies_swap.img,xvda2,w', 'file:/usr/local1/xen/domains/fourmies/fourmies_tmp.img,xvda5,w', 'file:/usr/local1/xen/domains/fourmies/fourmies_var.img,xvda6,w', 'file:/usr/local1/xen/domains/fourmies/fourmies_home.img,xvda7,w', 'file:/usr/local1/xen/domains/fourmies/fourmies_log.img,xvda8,w', 'phy:/dev/spool1/mail-spool,xvdb1,w', 'phy:/dev/spool2/mail-backup,xvdc1,w' ] name = 'fourmies' dhcp = 'dhcp' vif = [ 'mac=00:16:3E:52:80:93, bridge=bridge2' ] on_poweroff = 'destroy' on_reboot = 'restart' on_crash = 'restart'
xen list xen create fourmies.cfg xen console fourmies xen shutdown fourmies ...
echo "proc /proc proc defaults 0 0" >> rootfs/etc/fstab
# mkdir /sys/fs/cgroup/cpuset/model1 # echo "2-3" > /sys/fs/cgroup/cpuset/model1/cpus # echo $pid > /sys/fs/cgroup/cpuset/model1/tasks
# mkdir /sys/fs/cgroup/memory/model1 # echo "128M" > /sys/fs/cgroup/memory/model1/memory.limit_in_bytes # echo $pid > /sys/fs/cgroup/memory/model1/tasks
# mkdir /sys/fs/cgroup/blkio/model1 # echo "8:0 10485760" > /sys/fs/cgroup/blkio/model1/blkio.throttle.write_bps_device # echo $pid > /sys/fs/cgroup/blkio/model1/tasks
# mkdir /sys/fs/cgroup/devices/model1 # echo "b 8:0 rmw" > /sys/fs/cgroup/devices/model1/devices.deny # echo $pid > /sys/fs/cgroup/devices/model1/tasks
# docker images REPOSITORY TAG IMAGE ID CREATED SIZE debian jessie e5599115b6a6 4 weeks ago 123 MB .... # docker tag e5599115b6a6 docker.mondomaine.org:5000/my-debian # docker push docker.mondomaine.org:5000/my-debian
# cat Dockerfile FROM debian MAINTAINER Moi RUN apt-get update RUN apt-get -y install apache2 EXPOSE 80 CMD /usr/sbin/apache2ctl -D FOREGROUND # docker build -t apache .
# docker commit 814b74435ace my-apache sha256:ea17999b6621fcb62b4999fbd0e23e54aef72a9418c4d0d37d411c8737bd4f8d # docker images REPOSITORY TAG IMAGE ID CREATED SIZE my-apache jessie ea17999b6621 4 weeks ago 123 MB ... # docker tag ea17999b6621 docker.mondomaine.org:5000/my-apache # docker push docker.mondomaine.org:5000/my-apache
# docker run --privileged -i -t debian /bin/bash
# docker run --cpus=0.5 -i -t debian /bin/bash # docker run --cpu-count=2 -i -t debian /bin/bash
# docker run --memory=128m --memory-swap=256m -i -t debian /bin/bash
# docker run --device-write-bps=/dev/sda:10mb -i -t debian /bin/bash
# # rwm -> read, write and mknod # docker run --device=/dev/sdb:rwm -i -t debian /bin/bash
# man docker run
# docker networks ls NETWORK ID NAME DRIVER SCOPE 422a25c7e8cf bridge bridge local 3e0f696af22b host host local b00b2e188cb6 none null local
# docker network create mybridge
# docker run -i --net=mybridge -t my-apache /bin/bash
# docker network connect bridge 9ae343fe5609
# docker run -i -p 80:80 -t my-apache /bin/bash
$ pvcreate /dev/sda $ pvcreate /dev/sdb
$ vgcreate volume /dev/sda $ vgdisplay
$ lvcreate -L10G -nroot volume ; mkfs /dev/volume/root $ lvcreate -L100G -nvar volume ; mkfs /dev/volume/var $ lvcreate -L100G -ntmp volume ; mkfs /dev/volume/tmp
$ pvcreate /dev/sdc $ vgextend volume /dev/sdc $ lvextend -L+10G /dev/volume/root $ resize2fs /dev/volume/root
$ pvmove /dev/sda /dev/sdc $ vgreduce volume /dev/sda
# ssh-keygen -t ed25519
# cat .ssh/id_ed25519.pub | ssh cible "cat >> /root/.ssh/authorized_keys"
# for m in machine01 machine02 machine03 ; do # scp /etc/ntp.conf $m:/etc/ # done
--- - élément1 # commentaire inutile - champ1: valeur1 champ2: valeur2 - élément2 ... # Le code ci-dessus est équivalent à # [élément1,{champ1: valeur1, champ2: valeur2},élément2]
# cat /etc/ansible/hosts all: hosts: test: ansible_host: 192.168.0.1 rpi: ansible_host: 192.168.100.1 children: serveurs-prod: hosts: sandbox.insecserv.deule.net: brisban.insecserv.deule.net: serveurs-tp: hosts: chassiron.insecserv.deule.net: cordouan.insecserv.deule.net: stations: hosts: zabeth[02:22].plil.info:
# cat /etc/ansible/hosts test ansible_host=192.168.0.1 rpi ansible_host=192.168.100.1 [serveurs-prod] sandbox.insecserv.deule.net brisban.insecserv.deule.net [serveurs-tp] chassiron.insecserv.deule.net cordouan.insecserv.deule.net [stations] zabeth[02:22].plil.info
# ansible ungrouped -a "uname -a" ... # ansible stations -a "lsb_release -d" ...
# ansible-playbook jeu.yml
--- - hosts: stations tasks: - name: configuration files copy: src: "{{ item.src }}" dest: "{{ item.dest }}" owner: root group: root mode: '0644' with_items: - { src: '/etc/resolv.conf', dest: '/etc/resolv.conf'} - { src: '/etc/apt/sources.list', dest: '/etc/apt/sources.list'} - { src: '/etc/default/ntpdate', dest: '/etc/default/ntpdate'} - { src: '/etc/ntp.conf', dest: '/etc/ntp.conf'} - name: network interfaces template: src: '/etc/ansible/templates/interfaces' dest: '/etc/network/interfaces' owner: root group: root mode: '0644' vars: num: "{{ inventory_hostname | regex_replace('^[^0-9]*([0-9]*).*$','\\1') }}" ip4: "{{ num | int + 50 }}" ip6: "00{{ num }}" - name: packages to be installed apt: update_cache: yes name: "{{ packages }}" vars: packages: - linux-image-4.19.0-0.bpo.5-amd64 - linux-compiler-gcc-6-x86=4.19.67-2+deb10u1~bpo9+1 - linux-headers-4.19.0-0.bpo.5-amd64 - ntpdate - ntp - name: packages to be removed apt: name: "{{ packages }}" state: absent autoremove: yes vars: packages: - wicd
--- - hosts: ... tasks: - hosts: ... tasks:
--- - hosts: serveur web tasks: - name: configuration files copy: src: web/monsite dest: /etc/apache2/site-enables/monsite owner: root group: root mode: '0644' notify: restart apache handlers: - name: restart apache service: name: apache2 state: restarted
--- - hosts: stations roles: - ntp - dnsresolver vars: ntp_timezone: Europe/Paris dnsserveur: 8.8.8.8
ansible-galaxy install geerlingguy.docker
Top Level Aggregator | grands opérateurs internationaux |
Next Level Aggregator | opérateurs de moindre importance |
Site Level Aggregator | gestionnaire du site |
Code | Nom |
0 | Proche en proche |
43 | Routage |
44 | Fragmentation |
50 | Identification |
51 | Confidentialité |
59 | Fin des entêtes |
60 | Destination |
Code | Nom |
6 | TCP |
17 | UDP |
41 | IPv6 |
58 | ICMPv6 |
Type | Description |
1 | destination inaccessible |
2 | paquet trop grand |
3 | paquet trop vieux |
4 | erreur de paramétre |
Code | Description |
0 | Réseau inaccessible |
1 | Interdiction administrative |
2 | Pas un voisin |
3 | Adresse inaccessible |
4 | Port inaccessible |
Type | Description |
128 | demande d’écho |
129 | réponse d’écho |
130 | demande de gestion multicast |
131 | rapport de gestion multicast |
132 | réduction d’un groupe multicast |
Type | Description |
133 | sollicitation du routeur |
134 | annonce du routeur |
135 | sollicitation d’un voisin |
136 | annonce d’un voisin |
137 | redirection |
oleron# ip link show 1: lo: <LOOPBACK,UP> mtu 16144 qdisc noqueue link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: eth0: <BROADCAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:10:b5:03:88:44 brd ff:ff:ff:ff:ff:ff oleron# ip link set eth0 down oleron# ip link set eth0 address 00:10:b5:03:88:44
oleron# ip address add dev eth0 193.48.64.200/24 broadcast + oleron# ip address show eth0 5: eth0: <BROADCAST,UP> mtu 1500 qdisc pfifo_fast qlen 100 link/ether 00:10:b5:03:88:44 brd ff:ff:ff:ff:ff:ff inet 193.48.64.39/24 brd 193.48.64.255 scope global eth0 inet 193.48.64.200/24 brd 193.48.64.255 scope global secondary eth0 inet6 fe80::210:b5ff:fe03:8844/10 scope link
oleron# ip neighbour show dev eth0 193.48.64.1 lladdr 00:d0:bc:bf:6c:38 nud reachable 193.48.64.47 lladdr 00:10:b5:07:36:82 nud stale 193.48.64.45 lladdr 00:10:b5:07:34:97 nud reachable oleron# ip neighbour add 193.48.64.250 lladdr 00:10:b5:03:88:44 dev eth0
oleron# ip route add 10.0.0.0/8 via 193.48.64.200 oleron# ip route show 193.48.64.0/24 dev eth0 proto kernel scope link src 193.48.64.39 10.0.0.0/8 via 193.48.64.200 dev eth0 default via 193.48.64.1 dev eth0
pevele# ip route add default nexthop via 193.48.57.33 nexthop via 193.48.57.62
artois# ip route add prohibit 207.46.0.0/16 gayant08$ ping -v www.microsoft.com PING microsoft.com (207.46.130.45): 56 data bytes 112 bytes from artois.escaut.net (172.26.16.7): Packet Filtered
artois# ip route add nat 193.48.57.48/29 via 172.26.17.136
artois# ip route add 193.48.57.32/27 dev eth0 table 100 artois# ip route add 172.26.16.0/20 dev eth1 table 100 artois# ip route show table 100 193.48.57.32/27 dev eth0 scope link 172.26.16.0/20 dev eth1 scope link artois# ip rule add priority 310 from 172.26.17.128/29 lookup table 100 0: from all lookup local 310: from 172.26.17.128/29 lookup 100 32766: from all lookup main 32767: from all lookup default artois# ip rule add priority 320 from 172.26.17.136/29 nat 193.48.57.48 artois# ip rule show 0: from all lookup local 310: from 172.26.17.128/29 lookup 100 320: from 172.26.17.136/29 lookup main map-to 193.48.57.48 32766: from all lookup main 32767: from all lookup default
artois# ip tunnel show tunl0: ip/ip remote any local any ttl inherit nopmtudisc gre0: gre/ip remote any local any ttl inherit nopmtudisc sit0: ipv6/ip remote any local any ttl 64 nopmtudisc sit1: ipv6/ip remote 206.123.31.102 local any ttl 64
vconfig add eth0 2 # Obsolète ip link add name vlan2 link eth0 type vlan id 2 # Courant
vconfig rem vlan2 # Obsolète ip link del dev vlan2 # Courant
iface vlan2 inet dhcp vlan-raw-device eth0
brctl addbr monpont # Obsolète ip link add monpont type bridge # Courant
brctl addif monpont eth0 # Obsolète brctl addif monpont eth1 # Obsolète ip link set eth0 master monpont # Courant ip link set eth1 master monpont # Courant
ifconfig eth0 up # Obsolète ifconfig eth1 up # Obsolète ip link set eth0 up # Courant ip link set eth1 up # Courant
ifconfig monpont up # Obsolète ifconfig monpont 192.168.0.1 netmask 255.255.255.0 # Obsolète ip address add dev monpont 192.168.0.1/24 # Courant
auto eth0 eth1 monpont iface eth0 inet manual up ip link set $IFACE up iface eth1 inet manual up ip link set $IFACE up iface monpont inet static bridge_ports eth0 eth1 address 192.168.0.1 netmask 255.255.255.0
ip link add vif1 type veth peer name eth0@vif1
ip link set eth0@vif1 netns /proc/<PID>/ns/net name eth0
nsenter -t <PID> -n ip address add dev eth0 192.168.0.100/24 nsenter -t <PID> -n ip route add default gw 192.168.0.1
# ls -l /usr/sbin/iptables lrwxrwxrwx 1 root root 26 9 avril 2019 /usr/sbin/iptables -> /etc/alternatives/iptables # ls -l /etc/alternatives/iptables lrwxrwxrwx 1 root root 22 9 avril 2019 /etc/alternatives/iptables -> /usr/sbin/iptables-nft
# nft add table {ip|arp|ip6|bridge|inet|netdev} <nom_table>
# nft add chain <nom_table> <nom_chaine> \ { type {filter|route|nat} \ hook {prerouting|input|forward|output|postrouting} \ priority <niveau_priorité> \; [ policy {accept|drop} \; ] \ }
# nft add rule <nom_table> <nom_chaîne> <contraintes> {drop|accept|...}
$ cat /proc/sys/net/ipv4/ip_forward 0 # echo 1 > /proc/sys/net/ipv4/ip_forward
# echo "net.ipv4.ip_forward=1" >> /etc/sysctl.conf # sysctl -p net.ipv4.ip_forward = 1
# iptables -P FORWARD ACCEPT # iptables -A FORWARD -j DROP -p tcp -s 193.48.57.32/27 --dport ftp # iptables -P INPUT ACCEPT # iptables -A INPUT -j DROP -p tcp -d 134.206.3.60 --dport telnet
# nft add table ip FILTER # nft add chain FILTER FORWARD { type filter hook forward priority 0\; policy accept\; } # nft add rule FILTER FORWARD ip saddr 193.48.57.32/27 tcp dport 21 drop
# iptables -t nat -A PREROUTING -p tcp --dport 2200 -j DNAT --to-destination 192.168.0.42:22
# nft add table ip NAT # nft add chain NAT PREROUTING { type nat hook prerouting priority 0\; } # nft add rule NAT PREROUTING tcp dport 2200 dnat to 192.168.0.42:22
artois# iptables -P FORWARD DROP artois# iptables -A FORWARD -j ACCEPT -s 172.26.16.0/20 artois# iptables -A FORWARD -j ACCEPT -d 172.26.16.0/20 artois# iptables -t nat -A POSTROUTING -j MASQUERADE -s 172.26.16.0/20
# nft add table ip FILTER # nft add chain FILTER FORWARD { type filter hook forward priority 0\; policy drop\; } # nft add rule FILTER FORWARD ip saddr 172.26.16.0/20 accept # nft add rule FILTER FORWARD ip daddr 172.26.16.0/20 accept # nft add table ip NAT # nft add chain NAT POSTROUTING { type nat hook postrouting priority 100 \; } # nft add rule nat postrouting ip saddr 172.26.16.0/20 oif eth0 masquerade
RG20-3640#show running-config interface tunnel0 interface Tunnel0 no ip address ipv6 address 2001:660:3000:1104:140::/64 ipv6 enable ipv6 rip T0 enable tunnel source FastEthernet3/0.2 tunnel destination 193.51.178.140 tunnel mode ipv6ip end RG20-3640#show ip route 172.26.0.0/20 is subnetted, 2 subnets C 172.26.224.0 is directly connected, FastEthernet3/0 C 172.26.16.0 is directly connected, FastEthernet3/0.4 193.48.57.0/27 is subnetted, 1 subnets C 193.48.57.32 is directly connected, FastEthernet3/0.2 S* 0.0.0.0/0 [1/0] via 193.48.57.33 [1/0] via 172.26.224.1 RG20-3640#show ipv6 route ... S ::/0 [1/0] via ::, Tunnel0 RG20-3640#
albanie# ip tunnel add ustl mode ipip remote 134.206.85.135 albanie# ip link set ustl up albanie# ip address add 134.206.85.136/16 broadcast + dev ustl albanie# ip tunnel show ustl ustl: ip/ip remote 134.206.85.135 local any ttl inherit albanie# ip route add 134.206.85.135 dev eth0 albanie# ip route add 134.206.0.0/16 dev ustl albanie# ip route show 134.206.85.135 dev eth0 scope link 193.48.57.224/27 dev eth0 proto kernel scope link src 193.48.57.226 134.206.0.0/16 dev ustl proto kernel scope link src 134.206.85.136 default via 193.48.57.225 dev eth0 metric 1
statpc6# echo "sysctl net.ipv4.conf.all.proxy_arp=1" >> /etc/sysctl.conf statpc6# sysctl -p statpc6# ip tunnel add epul mode ipip remote 193.48.57.226 statpc6# ip address add 134.206.85.135/32 broadcast + dev epul statpc6# ip link set epul up statpc6# ip tunnel show epul epul: ip/ip remote 193.48.57.226 local any ttl inherit statpc6# ip neighbour add 134.206.85.136 lladdr 00:b0:d0:8c:91:10 dev eth0 statpc6# ip route add 134.206.85.136 dev epul
~
WPA-PSK, WPA2-PSK (Pre-Shared Key) ;
~
WPA3-SAE (Simultaneous Authentication of Equals).
~
WPA-EAP;
Code | Identifier | Length | Data |
1 byte | 2 bytes | 4 bytes | n bytes |
Ethernet type | EAP Version | EAPOL Type | Length | EAP Packet |
2 bytes | 1 byte | 1 byte | 2 bytes | n bytes |
Code | Identifier | Length | Authenticator | Attribute/value pairs |
1 byte | 1 byte | 2 bytes | 16 bytes |
PMK = PBKDF2(PSK, SSID, 4096, 256)
Control | Duration | Addr 1 | Addr 2 | Addr 3 | Seq | Addr 4 | Data | Check sum |
2 bytes | 2 bytes | 6 bytes | 6 bytes | 6 bytes | 2 bytes | 6 bytes | 0-2312 bytes | 4 bytes |
2 bits | 2 bits | 4 bits | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit |
Version | Type | Subtype | To DS | From DS | MF | Retry | Pwr | More | W | O |
24 bits | 6 bits | 2 bits | 0-2304 bytes | 32 bits |
Initialization Vector | Padding | Key number | Data | Integrity Check Value (CRC32) |
LLC | SNAP | ARP header | ARP opcode | ARP MAC source |
0xAAAA03 | 0x0000000806 | 0x000108000604 | 0x0001 | 0x010203040506 |
ARP IP source | ARP MAC cible | ARP IP cible |
... | ... | ... |
1 byte | 1 byte | 1 byte | 5 bits | 1 bit | 2 bits |
TSC 1 | Seed | TSC 0 | Reserved | Extended ? | Key number |
1 byte | 1 byte | 1 byte | 1 byte | 0-2292 bytes | 8 bytes | 4 bytes |
TSC 2 | TSC 3 | TSC 4 | TSC 5 | Data | MIC | ICV |
1 byte | 1 byte | 1 byte | 5 bits | 1 bit | 2 bits |
PN0 | PN1 | Reserved | Reserved | Extended ? | Key Number |
1 byte | 1 byte | 1 byte | 1 byte | 0-2292 bytes | 8 bytes | 4 bytes |
PN2 | PN3 | PN4 | PN5 | Data | MIC | ICV |
controls { inet 127.0.0.1 allow {localhost;} keys {dnskey;} ; }; key dnskey { algorithm HMAC-MD5; secret dfqsfFFcYyyyU999xcsdqs==; };
options { ... allow-query { any; }; allow-query-cache { trusted; }; allow-recursion { trusted; }; allow-transfer{ none; }; version "mine"; ... }; acl "trusted" { 172.26.0.0/16; 2001:660:4401:6000::0/56; ... };
zone "." { type hint; file "root.cache"; };
zone "plil.info" { type primary; // version politiquement correcte de master file "/etc/bind/zones/plil.info/plil-dir.zone"; }; zone "145.26.172.in-addr.arpa" { type primary; // version politiquement correcte de master file "/etc/bind/zones/plil.info/plil-schoolrooms-rev-IPv4.zone"; }; zone "144-159.204.101.195.in-addr.arpa" { type primary; // version politiquement correcte de master file "/etc/bind/zones/plil.fr/plil-fiber-rev-IPv4.zone"; }; zone "8.4.0.6.1.0.4.4.0.6.6.0.1.0.0.2.ip6.arpa" { type primary; // version politiquement correcte de master file "/etc/bind/zones/plil.info/plil-schoolserv-rev-IPv6.zone"; };
zone "plil.info" { type primary; file "/etc/bind/zones/plil.info/plil-dir.zone"; allow-transfer{secondaries;}; // filtrage des secondaires also-notify{hiddensecondaries;}; // pour les secondaires vicieux notify yes; // notification des secondaires inline-signing yes; // DNSSEC automatique key-directory "/etc/bind/keys"; // répertoire des clefs, attention aux droits dnssec-policy "dnssecpolicy"; // politique pour les clefs de chiffrement }; dnssec-policy "dnssecpolicy" { keys { ksk key-directory lifetime unlimited algorithm 13; zsk key-directory lifetime unlimited algorithm 13; }; nsec3param; }; acl "secondaries" { 195.220.223.1; // il était une fois Poitiers ... }; masters "hiddensecondaries" { 217.70.177.40; // ns6.gandi.net caméléon IPv4 2001:4b98:d:1::40; // ns6.gandi.net caméléon IPv6 };
zone "rex.eudil.fr"{ type secondary; // version politiquement correcte de slave file "/etc/bind/backup/rex.eudil.fr"; primaries{ 2001:660:4401:60b0:216:3eff:feb0:b140; }; };
$TTL 86400 @ IN SOA ns.plil.fr. postmaster.plil.fr. ( 3608 ; Version 21600 ; Refresh secondary (6h) 3600 ; Retry secondary (1h) 2592000 ; Expire if no refresh (30j) 86400 ) ; Negative cache (24h) IN NS ns.plil.fr. IN NS ns6.gandi.net. @ IN MX 100 vervins.plil.fr. @ IN TXT "v=spf1 mx mx:polytech-lille.fr -all" ns IN A 195.101.204.145 fourmies IN A 195.101.204.146 vervins IN A 195.101.204.147 ns IN AAAA 2a01:c916:2047:c800:0216:3eff:fe82:8a5c fourmies IN AAAA 2a01:c916:2047:c800:0216:3Eff:fe52:8093 vervins IN AAAA 2a01:c916:2047:c800:0216:3Eff:fe52:8095 imap IN CNAME fourmies.plil.fr. mail IN CNAME vervins.plil.fr.
$TTL 86400 @ IN SOA ns.plil.fr. postmaster.plil.fr. ( 3608 ; Version 21600 ; Refresh secondary (6h) 3600 ; Retry secondary (1h) 2592000 ; Expire if no refresh (30j) 86400 ) ; Negative cache (24h) IN NS ns.plil.fr. IN NS ns6.gandi.net. 145 IN PTR ns.plil.fr. 146 IN PTR fourmies.plil.fr. 147 IN PTR vervins.plil.fr.
https://www.internic.net/domain/named.root
. 3600000 IN NS A.ROOT-SERVERS.NET. A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 . 3600000 NS B.ROOT-SERVERS.NET. B.ROOT-SERVERS.NET. 3600000 A 128.9.0.107 ...
. 3600000 NS A.ROOT-SERVERS.NET. A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 A.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:ba3e::2:30 . 3600000 NS B.ROOT-SERVERS.NET. B.ROOT-SERVERS.NET. 3600000 A 170.247.170.2 B.ROOT-SERVERS.NET. 3600000 AAAA 2801:1b8:10::b ...
zone "dynamic.eudil.fr" { type primary; file "dynamic/eudil.fr"; allow-update { key dnskey; }; };
# nsupdate > update add toto.dynamic.eudil.fr. 3600 IN A 193.48.64.221 > #
ddns-update-style interim; key dnskey { algorithm HMAC-MD5; secret dfqsfFFcYyyyU999xcsdqs==; } zone dynamic.eudil.fr. { primary douaisis.escaut.net; // Il était une fois l'EUDIL key dnskey; } subnet 172.26.16.0 netmask 255.255.240.0 { option domain-name "students.deule.net ..."; option subnet-mask 255.255.240.0; option broadcast-address 172.26.31.255; option static-routes ... option routers artegau.studserv.deule.net; range 172.26.17.0 172.26.28.255; ddns-domainname "eudil.fr"; ddns-rev-domainname "dynamic.eudil.fr"; ddns-ptr-domainname "dynamic.reverse.eudil.fr"; }
# Simple identification par fichiers d'utilisateurs AuthType Basic AuthName "Squid statistics" AuthUserFile "/etc/passwd.web" AuthGroupFile "/etc/group.web" <Limit GET POST> require valid-user </Limit> # Identification par LDAP AuthType Basic AuthName "Site SE" AuthBasicProvider ldap AuthzLDAPAuthoritative off AuthLDAPURL ldap://auth.plil.info:389/ou=People,dc=plil.fr?uid <Files "*"> require valid-user </Files>
artois:/etc/apache2# cat ports.conf Listen 80 <IfModule ssl_module> Listen 443 </IfModule> \item Les modules activés (utilitaires {\tt a2enmod} ou {\tt a2dismod}) : \begin{verbatim} root@webhub:/etc/apache2/mods-enabled# ls -l ssl* lrwxrwxrwx 1 root root 26 oct. 11 2011 ssl.conf -> ../mods-available/ssl.conf lrwxrwxrwx 1 root root 26 oct. 11 2011 ssl.load -> ../mods-available/ssl.load root@webhub:/etc/apache2/mods-enabled# ls -l proxy* lrwxrwxrwx 1 root root 28 oct. 3 2015 proxy.conf -> ../mods-available/proxy.conf lrwxrwxrwx 1 root root 33 oct. 3 2015 proxy_http.load -> ../mods-available/proxy_http.load
root@webhub:/etc/apache2/sites-enabled# ls -l lrwxrwxrwx 1 root root 28 avril 21 2023 auth.conf -> ../sites-available/auth.conf lrwxrwxrwx 1 root root 34 sept. 17 2018 cambraisis.conf -> ../sites-available/cambraisis.conf lrwxrwxrwx 1 root root 28 mars 11 2020 chat.conf -> ../sites-available/chat.conf lrwxrwxrwx 1 root root 32 sept. 17 2018 clubinfo.conf -> ../sites-available/clubinfo.conf lrwxrwxrwx 1 root root 27 nov. 22 2019 ctf.conf -> ../sites-available/ctf.conf lrwxrwxrwx 1 root root 27 nov. 20 2017 rex.conf -> ../sites-available/rex.conf lrwxrwxrwx 1 root root 33 sept. 17 2018 tvantroys.conf -> ../sites-available/tvantroys.conf lrwxrwxrwx 1 root root 33 juin 26 2023 wiki-PEIP.conf -> ../sites-available/wiki-PEIP.conf lrwxrwxrwx 1 root root 33 juin 7 2017 wiki-PLIL.conf -> ../sites-available/wiki-PLIL.conf lrwxrwxrwx 1 root root 31 févr. 5 2023 wiki-SE.conf -> ../sites-available/wiki-SE.conf ...
root@webhub:/etc/apache2/sites-enabled# cat ninja.conf <VirtualHost *:80> ServerName ninja.bzh ServerAlias www.ninja.bzh ServerAdmin Xavier.Redon@polytech-lille.fr ErrorLog /var/log/apache2/ninja-error.log LogLevel warn CustomLog /var/log/apache2/ninja-access.log combined Header set X-DS-Systeme "Question 3.2 : réponse 42" DocumentRoot /var/www/html/ninja </VirtualHost>
root@webhub:/etc/apache2/sites-enabled# cat ninja-ssl.conf <VirtualHost *:443> ServerName ninja.bzh ServerAlias www.ninja.bzh ServerAdmin Xavier.Redon@polytech-lille.fr ErrorLog /var/log/apache2/ninja-error.log LogLevel warn CustomLog /var/log/apache2/ninja-access.log combined Header set X-DS-Systeme "Question 3.2 : réponse 42" DocumentRoot /var/www/html/ninja SSLEngine On SSLCertificateFile /etc/letsencrypt/live/ninja.bzh/fullchain.pem SSLCertificateKeyFile /etc/letsencrypt/live/ninja.bzh/privkey.pem </VirtualHost>
root@webhub:/etc/apache2/sites-enabled# cat rex.conf <VirtualHost *:80> ServerName rex.plil.fr ServerAlias rex.plil.net Redirect permanent / https://rex.plil.fr/ </VirtualHost> <VirtualHost *:443> ServerName rex.plil.fr ServerAdmin Xavier.Redon@polytech-lille.fr ErrorLog /var/log/apache2/rex-error.log LogLevel warn CustomLog /var/log/apache2/rex-access.log combined SSLEngine On SSLCertificateFile /etc/letsencrypt/live/rex.plil.fr/fullchain.pem SSLCertificateKeyFile /etc/letsencrypt/live/rex.plil.fr/privkey.pem ProxyRequests Off ProxyPreserveHost On ProxyPass / http://172.26.189.7/ ProxyPassReverse / http://172.26.189.7/ </VirtualHost>
<VirtualHost *:443> ServerName rex.plil.fr ServerAdmin Xavier.Redon@polytech-lille.fr ErrorLog /var/log/apache2/rex-error.log LogLevel warn CustomLog /var/log/apache2/rex-access.log combined SSLProxyEngine On SSLCertificateFile /etc/letsencrypt/live/rex.plil.fr/fullchain.pem SSLCertificateKeyFile /etc/letsencrypt/live/rex.plil.fr/privkey.pem ProxyRequests Off ProxyPreserveHost On ProxyPass / http://www.rex.plil.fr/ ProxyPassReverse / http://www.rex.plil.fr/ </VirtualHost>
Ce document a été traduit de LATEX par HEVEA