Protocoles avancés |
qemu-img create <chemin du disque> <taille>
kvm -net nic,model=ne2k_pci -net user -hda <chemin du disque> -cdrom <chemin de l'image ISO>
kernel = '/usr/lib/xen-default/boot/hvmloader'
builder = 'hvm'
memory = '1024'
disk = [
'file:/usr/local/src/debian-testing-i386-netinst.iso,hdc:cdrom,r',
'file:/usr/local/xen/domains/simplet/simplet_disk.img,ioemu:sda,w',
]
boot = 'd'
name = 'scratch'
vif = [ 'bridge=eth1' ]
vnc = 1
vnclisten = "0.0.0.0"
... (network-script 'network-bridge netdev=eth0') ...
kernel = '/boot/vmlinuz-2.6.32-5-xen-686'
ramdisk = '/boot/initrd.img-2.6.32-5-xen-686'
memory = '1024'
root = '/dev/xvda1 ro'
disk = [
'file:/usr/local1/xen/domains/fourmies/fourmies_root.img,xvda1,w',
'file:/usr/local1/xen/domains/fourmies/fourmies_swap.img,xvda2,w',
'file:/usr/local1/xen/domains/fourmies/fourmies_tmp.img,xvda5,w',
'file:/usr/local1/xen/domains/fourmies/fourmies_var.img,xvda6,w',
'file:/usr/local1/xen/domains/fourmies/fourmies_home.img,xvda7,w',
'file:/usr/local1/xen/domains/fourmies/fourmies_log.img,xvda8,w',
'phy:/dev/spool1/mail-spool,xvdb1,w',
'phy:/dev/spool2/mail-backup,xvdc1,w'
]
name = 'fourmies'
dhcp = 'dhcp'
vif = [ 'mac=00:16:3E:52:80:93, bridge=bridge2' ]
on_poweroff = 'destroy'
on_reboot = 'restart'
on_crash = 'restart'
xen list xen create fourmies.cfg xen console fourmies xen shutdown fourmies ...
echo "proc /proc proc defaults 0 0" >> rootfs/etc/fstab
# mkdir /sys/fs/cgroup/cpuset/model1 # echo "2-3" > /sys/fs/cgroup/cpuset/model1/cpus # echo $pid > /sys/fs/cgroup/cpuset/model1/tasks
# mkdir /sys/fs/cgroup/memory/model1 # echo "128M" > /sys/fs/cgroup/memory/model1/memory.limit_in_bytes # echo $pid > /sys/fs/cgroup/memory/model1/tasks
# mkdir /sys/fs/cgroup/blkio/model1 # echo "8:0 10485760" > /sys/fs/cgroup/blkio/model1/blkio.throttle.write_bps_device # echo $pid > /sys/fs/cgroup/blkio/model1/tasks
# mkdir /sys/fs/cgroup/devices/model1 # echo "b 8:0 rmw" > /sys/fs/cgroup/devices/model1/devices.deny # echo $pid > /sys/fs/cgroup/devices/model1/tasks
# docker images REPOSITORY TAG IMAGE ID CREATED SIZE debian jessie e5599115b6a6 4 weeks ago 123 MB .... # docker tag e5599115b6a6 docker.mondomaine.org:5000/my-debian # docker push docker.mondomaine.org:5000/my-debian
# cat Dockerfile FROM debian MAINTAINER Moi RUN apt-get update RUN apt-get -y install apache2 EXPOSE 80 CMD /usr/sbin/apache2ctl -D FOREGROUND # docker build -t apache .
# docker commit 814b74435ace my-apache sha256:ea17999b6621fcb62b4999fbd0e23e54aef72a9418c4d0d37d411c8737bd4f8d # docker images REPOSITORY TAG IMAGE ID CREATED SIZE my-apache jessie ea17999b6621 4 weeks ago 123 MB ... # docker tag ea17999b6621 docker.mondomaine.org:5000/my-apache # docker push docker.mondomaine.org:5000/my-apache
# docker run --privileged -i -t debian /bin/bash
# docker run --cpus=0.5 -i -t debian /bin/bash # docker run --cpu-count=2 -i -t debian /bin/bash
# docker run --memory=128m --memory-swap=256m -i -t debian /bin/bash
# docker run --device-write-bps=/dev/sda:10mb -i -t debian /bin/bash
# # rwm -> read, write and mknod # docker run --device=/dev/sdb:rwm -i -t debian /bin/bash
# man docker run
# docker networks ls NETWORK ID NAME DRIVER SCOPE 422a25c7e8cf bridge bridge local 3e0f696af22b host host local b00b2e188cb6 none null local
# docker network create mybridge
# docker run -i --net=mybridge -t my-apache /bin/bash
# docker network connect bridge 9ae343fe5609
# docker run -i -p 80:80 -t my-apache /bin/bash
$ pvcreate /dev/sda $ pvcreate /dev/sdb
$ vgcreate volume /dev/sda $ vgdisplay
$ lvcreate -L10G -nroot volume ; mkfs /dev/volume/root $ lvcreate -L100G -nvar volume ; mkfs /dev/volume/var $ lvcreate -L100G -ntmp volume ; mkfs /dev/volume/tmp
$ pvcreate /dev/sdc $ vgextend volume /dev/sdc $ lvextend -L+10G /dev/volume/root $ resize2fs /dev/volume/root
$ pvmove /dev/sda /dev/sdc $ vgreduce volume /dev/sda
# ssh-keygen -t ed25519
# cat .ssh/id_ed25519.pub | ssh cible "cat >> /root/.ssh/authorized_keys"
# for m in machine01 machine02 machine03 ; do # scp /etc/ntp.conf $m:/etc/ # done
---
- élément1 # commentaire inutile
- champ1: valeur1
champ2: valeur2
- élément2
...
# Le code ci-dessus est équivalent à
# [élément1,{champ1: valeur1, champ2: valeur2},élément2]
# cat /etc/ansible/hosts
all:
hosts:
test:
ansible_host: 192.168.0.1
rpi:
ansible_host: 192.168.100.1
children:
serveurs-prod:
hosts:
sandbox.insecserv.deule.net:
brisban.insecserv.deule.net:
serveurs-tp:
hosts:
chassiron.insecserv.deule.net:
cordouan.insecserv.deule.net:
stations:
hosts:
zabeth[02:22].plil.info:
# cat /etc/ansible/hosts test ansible_host=192.168.0.1 rpi ansible_host=192.168.100.1 [serveurs-prod] sandbox.insecserv.deule.net brisban.insecserv.deule.net [serveurs-tp] chassiron.insecserv.deule.net cordouan.insecserv.deule.net [stations] zabeth[02:22].plil.info
# ansible ungrouped -a "uname -a" ... # ansible stations -a "lsb_release -d" ...
# ansible-playbook jeu.yml
---
- hosts: stations
tasks:
- name: configuration files
copy:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
owner: root
group: root
mode: '0644'
with_items:
- { src: '/etc/resolv.conf', dest: '/etc/resolv.conf'}
- { src: '/etc/apt/sources.list', dest: '/etc/apt/sources.list'}
- { src: '/etc/default/ntpdate', dest: '/etc/default/ntpdate'}
- { src: '/etc/ntp.conf', dest: '/etc/ntp.conf'}
- name: network interfaces
template:
src: '/etc/ansible/templates/interfaces'
dest: '/etc/network/interfaces'
owner: root
group: root
mode: '0644'
vars:
num: "{{ inventory_hostname | regex_replace('^[^0-9]*([0-9]*).*$','\\1') }}"
ip4: "{{ num | int + 50 }}"
ip6: "00{{ num }}"
- name: packages to be installed
apt:
update_cache: yes
name: "{{ packages }}"
vars:
packages:
- linux-image-4.19.0-0.bpo.5-amd64
- linux-compiler-gcc-6-x86=4.19.67-2+deb10u1~bpo9+1
- linux-headers-4.19.0-0.bpo.5-amd64
- ntpdate
- ntp
- name: packages to be removed
apt:
name: "{{ packages }}"
state: absent
autoremove: yes
vars:
packages:
- wicd
--- - hosts: ... tasks: - hosts: ... tasks:
---
- hosts: serveur web
tasks:
- name: configuration files
copy:
src: web/monsite
dest: /etc/apache2/site-enables/monsite
owner: root
group: root
mode: '0644'
notify: restart apache
handlers:
- name: restart apache
service:
name: apache2
state: restarted
---
- hosts: stations
roles:
- ntp
- dnsresolver
vars:
ntp_timezone: Europe/Paris
dnsserveur: 8.8.8.8
ansible-galaxy install geerlingguy.docker
| Top Level Aggregator | grands opérateurs internationaux |
| Next Level Aggregator | opérateurs de moindre importance |
| Site Level Aggregator | gestionnaire du site |
| Code | Nom |
| 0 | Proche en proche |
| 43 | Routage |
| 44 | Fragmentation |
| 50 | Identification |
| 51 | Confidentialité |
| 59 | Fin des entêtes |
| 60 | Destination |
| Code | Nom |
| 6 | TCP |
| 17 | UDP |
| 41 | IPv6 |
| 58 | ICMPv6 |
| Type | Description |
| 1 | destination inaccessible |
| 2 | paquet trop grand |
| 3 | paquet trop vieux |
| 4 | erreur de paramétre |
| Code | Description |
| 0 | Réseau inaccessible |
| 1 | Interdiction administrative |
| 2 | Pas un voisin |
| 3 | Adresse inaccessible |
| 4 | Port inaccessible |
| Type | Description |
| 128 | demande d’écho |
| 129 | réponse d’écho |
| 130 | demande de gestion multicast |
| 131 | rapport de gestion multicast |
| 132 | réduction d’un groupe multicast |
| Type | Description |
| 133 | sollicitation du routeur |
| 134 | annonce du routeur |
| 135 | sollicitation d’un voisin |
| 136 | annonce d’un voisin |
| 137 | redirection |
oleron# ip link show
1: lo: <LOOPBACK,UP> mtu 16144 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
2: eth0: <BROADCAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:10:b5:03:88:44 brd ff:ff:ff:ff:ff:ff
oleron# ip link set eth0 down
oleron# ip link set eth0 address 00:10:b5:03:88:44
oleron# ip address add dev eth0 193.48.64.200/24 broadcast +
oleron# ip address show eth0
5: eth0: <BROADCAST,UP> mtu 1500 qdisc pfifo_fast qlen 100
link/ether 00:10:b5:03:88:44 brd ff:ff:ff:ff:ff:ff
inet 193.48.64.39/24 brd 193.48.64.255 scope global eth0
inet 193.48.64.200/24 brd 193.48.64.255 scope global secondary eth0
inet6 fe80::210:b5ff:fe03:8844/10 scope link
oleron# ip neighbour show dev eth0 193.48.64.1 lladdr 00:d0:bc:bf:6c:38 nud reachable 193.48.64.47 lladdr 00:10:b5:07:36:82 nud stale 193.48.64.45 lladdr 00:10:b5:07:34:97 nud reachable oleron# ip neighbour add 193.48.64.250 lladdr 00:10:b5:03:88:44 dev eth0
oleron# ip route add 10.0.0.0/8 via 193.48.64.200 oleron# ip route show 193.48.64.0/24 dev eth0 proto kernel scope link src 193.48.64.39 10.0.0.0/8 via 193.48.64.200 dev eth0 default via 193.48.64.1 dev eth0
pevele# ip route add default nexthop via 193.48.57.33
nexthop via 193.48.57.62
artois# ip route add prohibit 207.46.0.0/16 gayant08$ ping -v www.microsoft.com PING microsoft.com (207.46.130.45): 56 data bytes 112 bytes from artois.escaut.net (172.26.16.7): Packet Filtered
artois# ip route add nat 193.48.57.48/29 via 172.26.17.136
artois# ip route add 193.48.57.32/27 dev eth0 table 100 artois# ip route add 172.26.16.0/20 dev eth1 table 100 artois# ip route show table 100 193.48.57.32/27 dev eth0 scope link 172.26.16.0/20 dev eth1 scope link artois# ip rule add priority 310 from 172.26.17.128/29 lookup table 100 0: from all lookup local 310: from 172.26.17.128/29 lookup 100 32766: from all lookup main 32767: from all lookup default artois# ip rule add priority 320 from 172.26.17.136/29 nat 193.48.57.48 artois# ip rule show 0: from all lookup local 310: from 172.26.17.128/29 lookup 100 320: from 172.26.17.136/29 lookup main map-to 193.48.57.48 32766: from all lookup main 32767: from all lookup default
artois# ip tunnel show tunl0: ip/ip remote any local any ttl inherit nopmtudisc gre0: gre/ip remote any local any ttl inherit nopmtudisc sit0: ipv6/ip remote any local any ttl 64 nopmtudisc sit1: ipv6/ip remote 206.123.31.102 local any ttl 64
vconfig add eth0 2 # Obsolète ip link add name vlan2 link eth0 type vlan id 2 # Courant
vconfig rem vlan2 # Obsolète ip link del dev vlan2 # Courant
iface vlan2 inet dhcp vlan-raw-device eth0
brctl addbr monpont # Obsolète ip link add monpont type bridge # Courant
brctl addif monpont eth0 # Obsolète brctl addif monpont eth1 # Obsolète ip link set eth0 master monpont # Courant ip link set eth1 master monpont # Courant
ifconfig eth0 up # Obsolète ifconfig eth1 up # Obsolète ip link set eth0 up # Courant ip link set eth1 up # Courant
ifconfig monpont up # Obsolète ifconfig monpont 192.168.0.1 netmask 255.255.255.0 # Obsolète ip address add dev monpont 192.168.0.1/24 # Courant
auto eth0 eth1 monpont iface eth0 inet manual up ip link set $IFACE up iface eth1 inet manual up ip link set $IFACE up iface monpont inet static bridge_ports eth0 eth1 address 192.168.0.1 netmask 255.255.255.0
ip link add vif1 type veth peer name eth0@vif1
ip link set eth0@vif1 netns /proc/<PID>/ns/net name eth0
nsenter -t <PID> -n ip address add dev eth0 192.168.0.100/24 nsenter -t <PID> -n ip route add default via 192.168.0.1
# ls -l /usr/sbin/iptables lrwxrwxrwx 1 root root 26 9 avril 2019 /usr/sbin/iptables -> /etc/alternatives/iptables # ls -l /etc/alternatives/iptables lrwxrwxrwx 1 root root 22 9 avril 2019 /etc/alternatives/iptables -> /usr/sbin/iptables-nft
# nft add table {ip|arp|ip6|bridge|inet|netdev} <nom_table>
# nft add chain <nom_table> <nom_chaine> \
{ type {filter|route|nat} \
hook {prerouting|input|forward|output|postrouting} \
priority <niveau_priorité> \; [ policy {accept|drop} \; ] \
}
# nft add rule <nom_table> <nom_chaîne> <contraintes> {drop|accept|...}
$ cat /proc/sys/net/ipv4/ip_forward 0 # echo 1 > /proc/sys/net/ipv4/ip_forward
# echo "net.ipv4.ip_forward=1" >> /etc/sysctl.conf # sysctl -p net.ipv4.ip_forward = 1
# iptables -P FORWARD ACCEPT # iptables -A FORWARD -j DROP -p tcp -s 193.48.57.32/27 --dport ftp # iptables -P INPUT ACCEPT # iptables -A INPUT -j DROP -p tcp -d 134.206.3.60 --dport telnet
# nft add table ip FILTER
# nft add chain FILTER FORWARD { type filter hook forward priority 0\; policy accept\; }
# nft add rule FILTER FORWARD ip saddr 193.48.57.32/27 tcp dport 21 drop
# iptables -t nat -A PREROUTING -p tcp --dport 2200 -j DNAT --to-destination 192.168.0.42:22
# nft add table ip NAT
# nft add chain NAT PREROUTING { type nat hook prerouting priority 0\; }
# nft add rule NAT PREROUTING tcp dport 2200 dnat to 192.168.0.42:22
artois# iptables -P FORWARD DROP artois# iptables -A FORWARD -j ACCEPT -s 172.26.16.0/20 artois# iptables -A FORWARD -j ACCEPT -d 172.26.16.0/20 artois# iptables -t nat -A POSTROUTING -j MASQUERADE -s 172.26.16.0/20
# nft add table ip FILTER
# nft add chain FILTER FORWARD { type filter hook forward priority 0\; policy drop\; }
# nft add rule FILTER FORWARD ip saddr 172.26.16.0/20 accept
# nft add rule FILTER FORWARD ip daddr 172.26.16.0/20 accept
# nft add table ip NAT
# nft add chain NAT POSTROUTING { type nat hook postrouting priority 100 \; }
# nft add rule nat postrouting ip saddr 172.26.16.0/20 oif eth0 masquerade
RG20-3640#show running-config interface tunnel0
interface Tunnel0
no ip address
ipv6 address 2001:660:3000:1104:140::/64
ipv6 enable
ipv6 rip T0 enable
tunnel source FastEthernet3/0.2
tunnel destination 193.51.178.140
tunnel mode ipv6ip
end
RG20-3640#show ip route
172.26.0.0/20 is subnetted, 2 subnets
C 172.26.224.0 is directly connected, FastEthernet3/0
C 172.26.16.0 is directly connected, FastEthernet3/0.4
193.48.57.0/27 is subnetted, 1 subnets
C 193.48.57.32 is directly connected, FastEthernet3/0.2
S* 0.0.0.0/0 [1/0] via 193.48.57.33
[1/0] via 172.26.224.1
RG20-3640#show ipv6 route
...
S ::/0 [1/0] via ::, Tunnel0
RG20-3640#
albanie# ip tunnel add ustl mode ipip remote 134.206.85.135 albanie# ip link set ustl up albanie# ip address add 134.206.85.136/16 broadcast + dev ustl albanie# ip tunnel show ustl ustl: ip/ip remote 134.206.85.135 local any ttl inherit albanie# ip route add 134.206.85.135 dev eth0 albanie# ip route add 134.206.0.0/16 dev ustl albanie# ip route show 134.206.85.135 dev eth0 scope link 193.48.57.224/27 dev eth0 proto kernel scope link src 193.48.57.226 134.206.0.0/16 dev ustl proto kernel scope link src 134.206.85.136 default via 193.48.57.225 dev eth0 metric 1
statpc6# echo "sysctl net.ipv4.conf.all.proxy_arp=1" >> /etc/sysctl.conf statpc6# sysctl -p statpc6# ip tunnel add epul mode ipip remote 193.48.57.226 statpc6# ip address add 134.206.85.135/32 broadcast + dev epul statpc6# ip link set epul up statpc6# ip tunnel show epul epul: ip/ip remote 193.48.57.226 local any ttl inherit statpc6# ip neighbour add 134.206.85.136 lladdr 00:b0:d0:8c:91:10 dev eth0 statpc6# ip route add 134.206.85.136 dev epul
# ip -6 addrlabel add prefix ...
~ WPA-PSK, WPA2-PSK (Pre-Shared Key) ;
~ WPA3-SAE (Simultaneous Authentication of Equals).
~ WPA-EAP;
| Code | Identifier | Length | Data |
| 1 byte | 2 bytes | 4 bytes | n bytes |
| Ethernet type | EAP Version | EAPOL Type | Length | EAP Packet |
| 2 bytes | 1 byte | 1 byte | 2 bytes | n bytes |
| Code | Identifier | Length | Authenticator | Attribute/value pairs |
| 1 byte | 1 byte | 2 bytes | 16 bytes |
PMK = PBKDF2(PSK, SSID, 4096, 256)
| Control | Duration | Addr 1 | Addr 2 | Addr 3 | Seq | Addr 4 | Data | Check sum |
| 2 bytes | 2 bytes | 6 bytes | 6 bytes | 6 bytes | 2 bytes | 6 bytes | 0-2312 bytes | 4 bytes |
| 2 bits | 2 bits | 4 bits | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit | 1 bit |
| Version | Type | Subtype | To DS | From DS | MF | Retry | Pwr | More | W | O |
| 24 bits | 6 bits | 2 bits | 0-2304 bytes | 32 bits |
| Initialization Vector | Padding | Key number | Data | Integrity Check Value (CRC32) |
| LLC | SNAP | ARP header | ARP opcode | ARP MAC source |
| 0xAAAA03 | 0x0000000806 | 0x000108000604 | 0x0001 | 0x010203040506 |
| ARP IP source | ARP MAC cible | ARP IP cible |
| ... | ... | ... |
| 1 byte | 1 byte | 1 byte | 5 bits | 1 bit | 2 bits |
| TSC 1 | Seed | TSC 0 | Reserved | Extended ? | Key number |
| 1 byte | 1 byte | 1 byte | 1 byte | 0-2292 bytes | 8 bytes | 4 bytes |
| TSC 2 | TSC 3 | TSC 4 | TSC 5 | Data | MIC | ICV |
| 1 byte | 1 byte | 1 byte | 5 bits | 1 bit | 2 bits |
| PN0 | PN1 | Reserved | Reserved | Extended ? | Key Number |
| 1 byte | 1 byte | 1 byte | 1 byte | 0-2292 bytes | 8 bytes | 4 bytes |
| PN2 | PN3 | PN4 | PN5 | Data | MIC | ICV |
controls {
inet 127.0.0.1 allow {localhost;} keys {dnskey;} ;
};
key dnskey {
algorithm HMAC-MD5;
secret dfqsfFFcYyyyU999xcsdqs==;
};
options {
...
allow-query { any; };
allow-query-cache { trusted; };
allow-recursion { trusted; };
allow-transfer{ none; };
version "mine";
...
};
acl "trusted" {
172.26.0.0/16;
2001:660:4401:6000::0/56;
...
};
zone "." {
type hint;
file "root.cache";
};
zone "plil.info" {
type primary; // version politiquement correcte de master
file "/etc/bind/zones/plil.info/plil-dir.zone";
};
zone "145.26.172.in-addr.arpa" {
type primary; // version politiquement correcte de master
file "/etc/bind/zones/plil.info/plil-schoolrooms-rev-IPv4.zone";
};
zone "144-159.204.101.195.in-addr.arpa" {
type primary; // version politiquement correcte de master
file "/etc/bind/zones/plil.fr/plil-fiber-rev-IPv4.zone";
};
zone "8.4.0.6.1.0.4.4.0.6.6.0.1.0.0.2.ip6.arpa" {
type primary; // version politiquement correcte de master
file "/etc/bind/zones/plil.info/plil-schoolserv-rev-IPv6.zone";
};
zone "plil.info" {
type primary;
file "/etc/bind/zones/plil.info/plil-dir.zone";
allow-transfer{secondaries;}; // filtrage des secondaires
also-notify{hiddensecondaries;}; // pour les secondaires vicieux
notify yes; // notification des secondaires
inline-signing yes; // DNSSEC automatique
key-directory "/etc/bind/keys"; // répertoire des clefs, attention aux droits
dnssec-policy "dnssecpolicy"; // politique pour les clefs de chiffrement
};
dnssec-policy "dnssecpolicy" {
keys {
ksk key-directory lifetime unlimited algorithm 13;
zsk key-directory lifetime unlimited algorithm 13;
};
nsec3param;
};
acl "secondaries" {
195.220.223.1; // il était une fois Poitiers
...
};
masters "hiddensecondaries" {
217.70.177.40; // ns6.gandi.net caméléon IPv4
2001:4b98:d:1::40; // ns6.gandi.net caméléon IPv6
};
zone "rex.eudil.fr"{
type secondary; // version politiquement correcte de slave
file "/etc/bind/backup/rex.eudil.fr";
primaries{ 2001:660:4401:60b0:216:3eff:feb0:b140; };
};
$TTL 86400
@ IN SOA ns.plil.fr. postmaster.plil.fr. (
3608 ; Version
21600 ; Refresh secondary (6h)
3600 ; Retry secondary (1h)
2592000 ; Expire if no refresh (30j)
86400 ) ; Negative cache (24h)
IN NS ns.plil.fr.
IN NS ns6.gandi.net.
@ IN MX 100 vervins.plil.fr.
@ IN TXT "v=spf1 mx mx:polytech-lille.fr -all"
ns IN A 195.101.204.145
fourmies IN A 195.101.204.146
vervins IN A 195.101.204.147
ns IN AAAA 2a01:c916:2047:c800:0216:3eff:fe82:8a5c
fourmies IN AAAA 2a01:c916:2047:c800:0216:3Eff:fe52:8093
vervins IN AAAA 2a01:c916:2047:c800:0216:3Eff:fe52:8095
imap IN CNAME fourmies.plil.fr.
mail IN CNAME vervins.plil.fr.
$TTL 86400
@ IN SOA ns.plil.fr. postmaster.plil.fr. (
3608 ; Version
21600 ; Refresh secondary (6h)
3600 ; Retry secondary (1h)
2592000 ; Expire if no refresh (30j)
86400 ) ; Negative cache (24h)
IN NS ns.plil.fr.
IN NS ns6.gandi.net.
145 IN PTR ns.plil.fr.
146 IN PTR fourmies.plil.fr.
147 IN PTR vervins.plil.fr.
https://www.internic.net/domain/named.root
. 3600000 IN NS A.ROOT-SERVERS.NET. A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 . 3600000 NS B.ROOT-SERVERS.NET. B.ROOT-SERVERS.NET. 3600000 A 128.9.0.107 ...
. 3600000 NS A.ROOT-SERVERS.NET. A.ROOT-SERVERS.NET. 3600000 A 198.41.0.4 A.ROOT-SERVERS.NET. 3600000 AAAA 2001:503:ba3e::2:30 . 3600000 NS B.ROOT-SERVERS.NET. B.ROOT-SERVERS.NET. 3600000 A 170.247.170.2 B.ROOT-SERVERS.NET. 3600000 AAAA 2801:1b8:10::b ...
zone "dynamic.eudil.fr" {
type primary;
file "dynamic/eudil.fr";
allow-update { key dnskey; };
};
# nsupdate > update add toto.dynamic.eudil.fr. 3600 IN A 193.48.64.221 > #
ddns-update-style interim;
key dnskey {
algorithm HMAC-MD5;
secret dfqsfFFcYyyyU999xcsdqs==;
}
zone dynamic.eudil.fr. {
primary douaisis.escaut.net; // Il était une fois l'EUDIL
key dnskey;
}
subnet 172.26.16.0 netmask 255.255.240.0 {
option domain-name "students.deule.net ...";
option subnet-mask 255.255.240.0;
option broadcast-address 172.26.31.255;
option static-routes ...
option routers artegau.studserv.deule.net;
range 172.26.17.0 172.26.28.255;
ddns-domainname "eudil.fr";
ddns-rev-domainname "dynamic.eudil.fr";
ddns-ptr-domainname "dynamic.reverse.eudil.fr";
}
# Simple identification par fichiers d'utilisateurs AuthType Basic AuthName "Squid statistics" AuthUserFile "/etc/passwd.web" AuthGroupFile "/etc/group.web" <Limit GET POST> require valid-user </Limit> # Identification par LDAP AuthType Basic AuthName "Site SE" AuthBasicProvider ldap AuthzLDAPAuthoritative off AuthLDAPURL ldap://auth.plil.info:389/ou=People,dc=plil.fr?uid <Files "*"> require valid-user </Files>
artois:/etc/apache2# cat ports.conf
Listen 80
<IfModule ssl_module>
Listen 443
</IfModule>
\item Les modules activés (utilitaires {\tt a2enmod} ou {\tt a2dismod}) :
\begin{verbatim}
root@webhub:/etc/apache2/mods-enabled# ls -l ssl*
lrwxrwxrwx 1 root root 26 oct. 11 2011 ssl.conf -> ../mods-available/ssl.conf
lrwxrwxrwx 1 root root 26 oct. 11 2011 ssl.load -> ../mods-available/ssl.load
root@webhub:/etc/apache2/mods-enabled# ls -l proxy*
lrwxrwxrwx 1 root root 28 oct. 3 2015 proxy.conf -> ../mods-available/proxy.conf
lrwxrwxrwx 1 root root 33 oct. 3 2015 proxy_http.load -> ../mods-available/proxy_http.load
root@webhub:/etc/apache2/sites-enabled# ls -l lrwxrwxrwx 1 root root 28 avril 21 2023 auth.conf -> ../sites-available/auth.conf lrwxrwxrwx 1 root root 34 sept. 17 2018 cambraisis.conf -> ../sites-available/cambraisis.conf lrwxrwxrwx 1 root root 28 mars 11 2020 chat.conf -> ../sites-available/chat.conf lrwxrwxrwx 1 root root 32 sept. 17 2018 clubinfo.conf -> ../sites-available/clubinfo.conf lrwxrwxrwx 1 root root 27 nov. 22 2019 ctf.conf -> ../sites-available/ctf.conf lrwxrwxrwx 1 root root 27 nov. 20 2017 rex.conf -> ../sites-available/rex.conf lrwxrwxrwx 1 root root 33 sept. 17 2018 tvantroys.conf -> ../sites-available/tvantroys.conf lrwxrwxrwx 1 root root 33 juin 26 2023 wiki-PEIP.conf -> ../sites-available/wiki-PEIP.conf lrwxrwxrwx 1 root root 33 juin 7 2017 wiki-PLIL.conf -> ../sites-available/wiki-PLIL.conf lrwxrwxrwx 1 root root 31 févr. 5 2023 wiki-SE.conf -> ../sites-available/wiki-SE.conf ...
root@webhub:/etc/apache2/sites-enabled# cat ninja.conf <VirtualHost *:80> ServerName ninja.bzh ServerAlias www.ninja.bzh ServerAdmin Xavier.Redon@polytech-lille.fr ErrorLog /var/log/apache2/ninja-error.log LogLevel warn CustomLog /var/log/apache2/ninja-access.log combined Header set X-DS-Systeme "Question 3.2 : réponse 42" DocumentRoot /var/www/html/ninja </VirtualHost>
root@webhub:/etc/apache2/sites-enabled# cat ninja-ssl.conf <VirtualHost *:443> ServerName ninja.bzh ServerAlias www.ninja.bzh ServerAdmin Xavier.Redon@polytech-lille.fr ErrorLog /var/log/apache2/ninja-error.log LogLevel warn CustomLog /var/log/apache2/ninja-access.log combined Header set X-DS-Systeme "Question 3.2 : réponse 42" DocumentRoot /var/www/html/ninja SSLEngine On SSLCertificateFile /etc/letsencrypt/live/ninja.bzh/fullchain.pem SSLCertificateKeyFile /etc/letsencrypt/live/ninja.bzh/privkey.pem </VirtualHost>
root@webhub:/etc/apache2/sites-enabled# cat rex.conf <VirtualHost *:80> ServerName rex.plil.fr ServerAlias rex.plil.net Redirect permanent / https://rex.plil.fr/ </VirtualHost> <VirtualHost *:443> ServerName rex.plil.fr ServerAdmin Xavier.Redon@polytech-lille.fr ErrorLog /var/log/apache2/rex-error.log LogLevel warn CustomLog /var/log/apache2/rex-access.log combined SSLEngine On SSLCertificateFile /etc/letsencrypt/live/rex.plil.fr/fullchain.pem SSLCertificateKeyFile /etc/letsencrypt/live/rex.plil.fr/privkey.pem ProxyRequests Off ProxyPreserveHost On ProxyPass / http://172.26.189.7/ ProxyPassReverse / http://172.26.189.7/ </VirtualHost>
<VirtualHost *:443> ServerName rex.plil.fr ServerAdmin Xavier.Redon@polytech-lille.fr ErrorLog /var/log/apache2/rex-error.log LogLevel warn CustomLog /var/log/apache2/rex-access.log combined SSLProxyEngine On SSLCertificateFile /etc/letsencrypt/live/rex.plil.fr/fullchain.pem SSLCertificateKeyFile /etc/letsencrypt/live/rex.plil.fr/privkey.pem ProxyRequests Off ProxyPreserveHost On ProxyPass / https://www.rex.plil.fr/ ProxyPassReverse / https://www.rex.plil.fr/ </VirtualHost>
Ce document a été traduit de LATEX par HEVEA