I'm trying to set up the snmp package included with SuSE in order to get mrtg working (also included with suse.) everything seems fairly straight forward but there seems to be no snmp config file. What I do find is what looks like files related to a config script. However there is no mention of a config script. Has anyone successfully set this up on a SuSE ditru Rowan Reid Job Captain, Systems Administrator STUDIO 3 ARCHITECTS 909 982 1717
* Rowan Reid;
I'm trying to set up the snmp package included with SuSE in order to get mrtg working (also included with suse.) everything seems fairly straight forward but there seems to be no snmp config file. What I do find is what looks like files related to a config script. However there is no mention of a config script. Has anyone successfully set this up on a SuSE ditru
Since 7.1 ( I started getting interested on the MRTG) What is the exact problem ( or config file are you looking for as you need to create the mrtg config file yourself. As another option try ntop it is also providing the same and it could be easier to set it up -- Togan Muftuoglu Unofficial SuSE FAQ Maintainer http://dinamizm.ath.cx
Since 7.1 ( I started getting interested on the MRTG) What is the exact problem ( or config file are you looking for as you need to create the mrtg config file yourself. I use the cfg script. After a little diagnostics it seems my snmp wasn't responding. I also tried snmpwalk no response. My next step was to check it was installed .. It was. After looking in the /usr/share/snmp/ the output reads as follows
<snippet> s3a-www:/usr/share/snmp # l total 49 drwxr-xr-x 4 root root 208 Jun 19 08:29 ./ drwxr-xr-x 64 root root 1624 Oct 31 06:07 ../ -rwxr-xr-x 1 root root 10688 Apr 25 2002 mib2c.conf* -rwxr-xr-x 1 root root 26228 Apr 25 2002 mib2c.storage.conf* -rwxr-xr-x 1 root root 3568 Apr 25 2002 mib2c.vartypes.conf* drwxr-xr-x 2 root root 1736 Jun 21 08:51 mibs/ drwxr-xr-x 5 root root 144 Jun 19 08:29 snmpconf/ s3a-www:/usr/share/snmp # cd snmpconf s3a-www:/usr/share/snmp/snmpconf # l total 3 drwxr-xr-x 5 root root 144 Jun 19 08:29 ./ drwxr-xr-x 4 root root 208 Jun 19 08:29 ../ drwxr-xr-x 2 root root 152 Jun 19 08:29 snmp.conf/ drwxr-xr-x 2 root root 248 Jun 19 08:29 snmpd.conf/ drwxr-xr-x 2 root root 112 Jun 19 08:29 snmptrapd.conf/ s3a-www:/usr/share/snmp/snmpconf # cd snmp.conf s3a-www:/usr/share/snmp/snmpconf/snmp.conf # l total 17 drwxr-xr-x 2 root root 152 Jun 19 08:29 ./ drwxr-xr-x 5 root root 144 Jun 19 08:29 ../ -rwxr-xr-x 1 root root 2786 Apr 25 2002 authopts* -rwxr-xr-x 1 root root 1651 Apr 25 2002 debugging* -rwxr-xr-x 1 root root 2207 Apr 25 2002 mibs* -rwxr-xr-x 1 root root 3023 Apr 25 2002 output* </snippet> The files listed basically have text stating for this enter this much like a txt lib for a setup script. So my problem is is there a setup script for snmp ?
As another option try ntop it is also providing the same and it could be easier to set it up
* Rowan Reid (rreid@studio3arc.com) [021119 10:17]:
I use the cfg script. After a little diagnostics it seems my snmp wasn't responding. I also tried snmpwalk no response. My next step was to check it was installed .. It was. After looking in the /usr/share/snmp/ the output reads as follows
/usr/share/snmp is just for temp configuration of daemon (e.g., setting a variable with snmpset)...you shouldn't edit anything there since it will replaced. Edit /etc/ucdsnmpd.conf or change the argument to -c in the init script's startproc line. -- -ckm
Hello SuSE folkz, I'm going to setup a secure file server. If somebody tries to mount secure filesystem without permission all attempts should fail. In the situation then hard drive is taken from the server all attempts to mirror the hard drive with secure filesystem should fail as well or at least nobody can reach and read that replicated data. Could somebody advise me please what secure filesystem is available for this task or in what direction I should look. Any advises or sources of information are greatly appreciated. Alex
On Tue, Nov 19, 2002 at 11:03:00AM -0800, Alex Daniloff wrote:
Hello SuSE folkz, I'm going to setup a secure file server. If somebody tries to mount secure filesystem without permission all attempts should fail. In the situation then hard drive is taken from the server all attempts to mirror the hard drive with secure filesystem should fail as well or at least nobody can reach and read that replicated data.
Alex, please have a look at this document: http://sdb.suse.de/en/sdb/html/jsj_crypto_filesystem_mini_howto.html Regards, -Kastus
On Tuesday 19 November 2002 11:03, Alex Daniloff wrote:
Hello SuSE folkz, I'm going to setup a secure file server. If somebody tries to mount secure filesystem without permission all attempts should fail.
This is a kind of "correct me if I'm wrong, but..." response: if /etc/fstab doesn't have "user" in the options, only "root" will be able to mount said partition (secure or otherwise) this is also an "all or nothing" response -- offhand I'm not sure how to specify a particular NON-root account can "mount" the partition (i.e., once you specify "user", then ALL users can mount it)
In the situation then hard drive is taken from the server all attempts to mirror the hard drive with secure filesystem should fail as well or at least nobody can reach and read that replicated data.
This is quite a bit harder -- the other response I saw so far (encrypt w/loopback) will probably be your best bet -- the reason for this is that there are hardware-based disk duplicators that don't care one bit about what is actually ON the drive: basically, it is an IDE controller (or several) and a very simple CPU that sends physical "read" commands to the master and "write" commands to all the copies -- this is totally OS and format independant. In the early days of personal computing, there were attempts to "copy protect" floppies by using hacked drivers that wrote "weak bits" or "slightly-off-center" tracks [this was mostly on the Apple computer] For every "protection" scheme devised, there were half a dozen "super copy" programs that would break said protection I even came accross one scheme that used a laser to physically burn a hole in a specific track & sector of the disk -- executable files were then encrypted and a header was added that tried to write & verify that sector -- if the data was readable, the file wasn't on one of these "special" disks. I had to break (*) this because the computer I was using this in had "80-track" drives instead of "40-track" drives -- the software was set to read "track x", but this wasn't in the same place on the 80-track hardware... Tom (*) breaking it was far too trivial: the "encryption" method consisted of XOR'ing a single byte across the rest of the executable; since the byte to be XOR'ed was always in the same place in the "header", and the header was always the same length, it was trivial to write a program that read the byte in question and "decrypt" the part you were interested in.
On Tuesday 19 November 2002 23.20, Tom Emerson wrote:
On Tuesday 19 November 2002 11:03, Alex Daniloff wrote:
Hello SuSE folkz, I'm going to setup a secure file server. If somebody tries to mount secure filesystem without permission all attempts should fail.
This is a kind of "correct me if I'm wrong, but..." response: if /etc/fstab doesn't have "user" in the options, only "root" will be able to mount said
/etc/fstab doesn't control mounts from remote systems. He's talking about a file server.
partition (secure or otherwise) this is also an "all or nothing" response -- offhand I'm not sure how to specify a particular NON-root account can "mount" the partition (i.e., once you specify "user", then ALL users can mount it)
Look at the "owner" option
In the early days of personal computing, there were attempts to "copy protect" floppies by using hacked drivers that wrote "weak bits" or "slightly-off-center" tracks [this was mostly on the Apple computer]
On the C-64, the most popular scheme I saw involved introducing read errors on the floppies, that "normal" copy programs wouldn't touch.
Hello SuSE folkz, Could somebody please give me an example of iptables configuration which allows to pass mail traffic through the firewall and redirect it to the mail server behind the firewall. And the same I'd like to achive for the web server which is a separate host as well. Thank you in advance for any ideas or sources of information. Alex
* Alex Daniloff;
Hello SuSE folkz, Could somebody please give me an example of iptables configuration which allows to pass mail traffic through the firewall and redirect it to the mail server behind the firewall. And the same I'd like to achive for the web server which is a separate host as well. Thank you in advance for any ideas or sources of information.
What stops you using SuSEfirewall2 -- Togan Muftuoglu Unofficial SuSE FAQ Maintainer http://dinamizm.ath.cx
* Rowan Reid (rreid@studio3arc.com) [021119 09:54]:
I'm trying to set up the snmp package included with SuSE in order to get mrtg working (also included with suse.) everything seems fairly straight forward but there seems to be no snmp config file.
In 8.1 and earlier it's /etc/ucdsnmpd.conf. From 8.2 on it will be /etc/snmpd.conf. The default config is fairly useless, you'll want to create an new one. -- -ckm
participants (7)
-
Alex Daniloff
-
Anders Johansson
-
Christopher Mahmood
-
Konstantin (Kastus) Shchuka
-
Rowan Reid
-
Togan Muftuoglu
-
Tom Emerson