在BBS瞎逛,收到一个Mail,问怎么配squid的认证,我说没用过Squid,不熟悉。后来他说可以给我机器的密码,就让他把密码发给我。ssh登录上去,看了一下,用的是RedHat自带的Squid,于是直接编辑/etc/squid/squid.conf。增加了
acl authuser proxy_auth REQUIRED
http_access allow authuser
auth_param basic program /usr/lib/ncsa_auth /etc/squid/passwd
然后htpasswd /etc/squid/passwd user增加用户
/etc/init.d/squid restart
完成;-)
配了一下Squid
写文档,写文档:(
最近有个任务,写一个文档,要写几十页吧。关于Snort的那部分,看了一下列出的要点,各点和《Snort 2.0入侵检测》这本书里面的章节完全一样。ft了,为嘛不直接用这本书~~~~感觉这本书翻译的还可以,至少我是没能力翻译,哈哈。英文能看懂并不说明你能把它的意思用中文写出来,感觉做翻译,中文要很好:)嗯,有兴趣看这本书的英文版,搜索《Snort 2.1 Intrusion Detection, Second Edition》下载。
Python ping
#!/usr/bin/env python # -*- coding: iso-8859-1 -*- """ping.py ping.py uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. Copyright (C) 2004 - Lars Strand (lars strand at gnist org) This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. Must be running as root, or write a suid-wrapper. Since newer *nix variants, the kernel ignores the set[ug]id flags on #! scripts for security reasons RFC792, echo/reply message: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Code | Checksum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Identifier | Sequence Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data ... +-+-+-+-+- TODO: - do not create socket inside 'while' (but if not: ipv6 won't work) - add support for broadcast/multicast - add support for own payload string CHANGELOG: DONE --> bugfix from Filip Van Raemdonck mechanix debian org DONE --> add more support for modules (raise instead of sys.exit) DONE --> locale func names DONE --> package def DONE --> some code cleanup """ import sys import os import struct import array import time import select import binascii import math import getopt import string import socket # total size of data (payload) ICMP_DATA_STR = 56 # initial values of header variables ICMP_TYPE = 8 ICMP_TYPE_IP6 = 128 ICMP_CODE = 0 ICMP_CHECKSUM = 0 ICMP_ID = 0 ICMP_SEQ_NR = 0 # Package definitions. __program__ = 'ping' __version__ = '0.5a' __date__ = '2004/15/12' __author__ = 'Lars Strand <lars at unik no>' __licence__ = 'GPL' __copyright__ = 'Copyright (C) 2004 Lars Strand' def _construct(id, size, ipv6): """Constructs a ICMP echo packet of variable size """ # size must be big enough to contain time sent if size < int(struct.calcsize("d")): _error("packetsize to small, must be at least %d" % int(struct.calcsize("d"))) # construct header if ipv6: header = struct.pack('BbHHh', ICMP_TYPE_IP6, ICMP_CODE, ICMP_CHECKSUM, \ ICMP_ID, ICMP_SEQ_NR+id) else: header = struct.pack('bbHHh', ICMP_TYPE, ICMP_CODE, ICMP_CHECKSUM, \ ICMP_ID, ICMP_SEQ_NR+id) # if size big enough, embed this payload load = "-- IF YOU ARE READING THIS YOU ARE A NERD! --" # space for time size -= struct.calcsize("d") # construct payload based on size, may be omitted :) rest = "" if size > len(load): rest = load size -= len(load) # pad the rest of payload rest += size * "X" # pack data = struct.pack("d", time.time()) + rest packet = header + data # ping packet without checksum checksum = _in_cksum(packet) # make checksum # construct header with correct checksum if ipv6: header = struct.pack('BbHHh', ICMP_TYPE_IP6, ICMP_CODE, checksum, \ ICMP_ID, ICMP_SEQ_NR+id) else: header = struct.pack('bbHHh', ICMP_TYPE, ICMP_CODE, checksum, ICMP_ID, \ ICMP_SEQ_NR+id) # ping packet *with* checksum packet = header + data # a perfectly formatted ICMP echo packet return packet def _in_cksum(packet): """THE RFC792 states: 'The 16 bit one's complement of the one's complement sum of all 16 bit words in the header.' Generates a checksum of a (ICMP) packet. Based on in_chksum found in ping.c on FreeBSD. """ # add byte if not dividable by 2 if len(packet) & 1: packet = packet + '\0' # split into 16-bit word and insert into a binary array words = array.array('h', packet) sum = 0 # perform ones complement arithmetic on 16-bit words for word in words: sum += (word & 0xffff) hi = sum >> 16 lo = sum & 0xffff sum = hi + lo sum = sum + (sum >> 16) return (~sum) & 0xffff # return ones complement def pingNode(alive=0, timeout=1.0, ipv6=0, number=sys.maxint, node=None, \ flood=0, size=ICMP_DATA_STR): """Pings a node based on input given to the function. """ # if no node, exit if not node: _error("") # if not a valid host, exit if ipv6: if socket.has_ipv6: try: info, port = socket.getaddrinfo(node, None) host = info[4][0] # do not print ipv6 twice if ipv6 address given as node if host == node: noPrintIPv6adr = 1 except: _error("cannot resolve %s: Unknow host" % node) else: _error("No support for IPv6 on this plattform") else: # IPv4 try: host = socket.gethostbyname(node) except: _error("cannot resolve %s: Unknow host" % node) # trying to ping a network? if not ipv6: if int(string.split(host, ".")[-1]) == 0: _error("no support for network ping") # do some sanity check if number == 0: _error("invalid count of packets to transmit: '%s'" % str(a)) if alive: number = 1 # Send the ping(s) start = 1; mint = 999; maxt = 0.0; avg = 0.0 lost = 0; tsum = 0.0; tsumsq = 0.0 # tell the user what we do if not alive: if ipv6: # do not print the ipv6 twice if ip adress given as node # (it can be to long in term window) if noPrintIPv6adr == 1: # add 40 (header) + 8 (icmp header) + payload print "PING %s : %d data bytes (40+8+%d)" % (str(node), \ 40+8+size, size) else: # add 40 (header) + 8 (icmp header) + payload print "PING %s (%s): %d data bytes (40+8+%d)" % (str(node), \ str(host), 40+8+size, size) else: # add 20 (header) + 8 (icmp header) + payload print "PING %s (%s): %d data bytes (20+8+%d)" % (str(node), str(host), \ 20+8+size, size) # trap ctrl-d and ctrl-c try: # send the number of ping packets as given while start < = number: lost += 1 # in case user hit ctrl-c # create the IPv6/IPv4 socket if ipv6: # can not create a raw socket if not root or setuid to root try: pingSocket = socket.socket(socket.AF_INET6, socket.SOCK_RAW, \ socket.getprotobyname("ipv6-icmp")) except socket.error, e: print "socket error: %s" % e _error("You must be root (uses raw sockets)" % os.path.basename(sys.argv[0])) # IPv4 else: # can not create a raw socket if not root or setuid to root try: pingSocket = socket.socket(socket.AF_INET, socket.SOCK_RAW, \ socket.getprotobyname("icmp")) except socket.error, e: print "socket error: %s" % e _error("You must be root (%s uses raw sockets)" % os.path.basename(sys.argv[0])) packet = _construct(start, size, ipv6) # make a ping packet # send the ping try: pingSocket.sendto(packet,(node,1)) except socket.error, e: _error("socket error: %s" % e) # reset values pong = ""; iwtd = [] # wait until there is data in the socket while 1: # input, output, exceptional conditions iwtd, owtd, ewtd = select.select([pingSocket], [], [], timeout) break # no data and timout occurred # data on socket - this means we have an answer if iwtd: # ok, data on socket endtime = time.time() # time packet received # read data (we only need the header) pong, address = pingSocket.recvfrom(size+48) lost -= 1 # in case user hit ctrl-c # examine packet # fetch TTL from IP header if ipv6: # since IPv6 header and any extension header are never passed # to a raw socket, we can *not* get hoplimit field.. # I hoped that a socket option would help, but it's not # supported: # pingSocket.setsockopt(IPPROTO_IPV6, IPV6_RECVHOPLIMIT, 1) # so we can't fetch hoplimit.. # fetch hoplimit #rawPongHop = struct.unpack("c", pong[7])[0] # fetch pong header pongHeader = pong[0:8] pongType, pongCode, pongChksum, pongID, pongSeqnr = \ struct.unpack("bbHHh", pongHeader) # fetch starttime from pong starttime = struct.unpack("d", pong[8:16])[0] # IPv4 else: # time to live rawPongHop = struct.unpack("s", pong[8])[0] # convert TTL from 8 bit to 16 bit integer pongHop = int(binascii.hexlify(str(rawPongHop)), 16) # fetch pong header pongHeader = pong[20:28] pongType, pongCode, pongChksum, pongID, pongSeqnr = \ struct.unpack("bbHHh", pongHeader) # fetch starttime from pong starttime = struct.unpack("d", pong[28:36])[0] # valid ping packet received? if not pongSeqnr == start: pong = None # NO data on socket - timeout waiting for answer if not pong: if alive: print "no reply from %s (%s)" % (str(node), str(host)) else: print "ping timeout: %s (icmp_seq=%d) " % (host, start) # do not wait if just sending one packet if number != 1 and start < number: time.sleep(flood ^ 1) start += 1 continue # lost a packet - try again triptime = endtime - starttime # compute RRT tsum += triptime # triptime for all packets (stddev) tsumsq += triptime * triptime # triptime^2 for all packets (stddev) # compute statistic maxt = max ((triptime, maxt)) mint = min ((triptime, mint)) if alive: print str(node) + " (" + str(host) +") is alive" else: if ipv6: # size + 8 = payload + header print "%d bytes from %s: icmp_seq=%d time=%.5f ms" % \ (size+8, host, pongSeqnr, triptime*1000) else: print "%d bytes from %s: icmp_seq=%d ttl=%s time=%.5f ms" % \ (size+8, host, pongSeqnr, pongHop, triptime*1000) # do not wait if just sending one packet if number != 1 and start < number: # if flood = 1; do not sleep - just ping time.sleep(flood ^ 1) # wait before send new packet # the last thing to do is update the counter - else the value # (can) get wrong when computing summary at the end (if user # hit ctrl-c when pinging) start += 1 # end ping send/recv while # if user ctrl-d or ctrl-c except (EOFError, KeyboardInterrupt): # if user disrupts ping, it is most likly done before # the counter get updates - if do not update it here, the # summary get all wrong. start += 1 pass # compute and print som stats # stddev computation based on ping.c from FreeBSD if start != 0 or lost > 0: # do not print stats if 0 packet sent start -= 1 # since while is '< =' avg = tsum / start # avg round trip vari = tsumsq / start - avg * avg # %-packet lost if start == lost: plost = 100 else: plost = (lost/start)*100 if not alive: print "\n--- %s ping statistics ---" % node print "%d packets transmitted, %d packets received, %d%% packet loss" % \ (start, start-lost, plost) # don't display summary if 100% packet-loss if plost != 100: print "round-trip min/avg/max/stddev = %.3f/%.3f/%.3f/%.3f ms" % \ (mint*1000, (tsum/start)*1000, maxt*1000, math.sqrt(vari)*1000) pingSocket.close() def _error(err): """Exit if running standalone, else raise an exception """ if __name__ == '__main__': print "%s: %s" % (os.path.basename(sys.argv[0]), str(err)) print "Try `%s --help' for more information." % os.path.basename(sys.argv[0]) sys.exit(1) else: raise Exception, str(err) def _usage(): """Print usage if run as a standalone program """ print """usage: %s [OPTIONS] HOST Send ICMP ECHO_REQUEST packets to network hosts. Mandatory arguments to long options are mandatory for short options too. -c, --count=N Stop after sending (and receiving) 'N' ECHO_RESPONSE packets. -s, --size=S Specify the number of data bytes to be sent. The default is 56, which translates into 64 ICMP data bytes when combined with the 8 bytes of ICMP header data. -f, --flood Flood ping. Outputs packets as fast as they come back. Use with caution! -6, --ipv6 Ping using IPv6. -t, --timeout=s Specify a timeout, in seconds, before a ping packet is considered 'lost'. -h, --help Display this help and exit Report bugs to lars [at] gnist org""" % os.path.basename(sys.argv[0]) if __name__ == '__main__': """Main loop """ # version control version = string.split(string.split(sys.version)[0][:3], ".") if map(int, version) < [2, 3]: _error("You need Python ver 2.3 or higher to run!") try: # opts = arguments recognized, # args = arguments NOT recognized (leftovers) opts, args = getopt.getopt(sys.argv[1:-1], "hat:6c:fs:", \ ["help", "alive", "timeout=", "ipv6", \ "count=", "flood", "packetsize="]) except getopt.GetoptError: # print help information and exit: _error("illegal option(s) -- " + str(sys.argv[1:])) # test whether any host given if len(sys.argv) >= 2: node = sys.argv[-1:][0] # host to be pinged if node[0] == '-' or node == '-h' or node == '--help' : _usage() else: _error("No arguments given") if args: _error("illegal option -- %s" % str(args)) # default variables alive = 0; timeout = 1.0; ipv6 = 0; count = sys.maxint; flood = 0; size = ICMP_DATA_STR # run through arguments and set variables for o, a in opts: if o == "-h" or o == "--help": # display help and exit _usage() sys.exit(0) if o == "-t" or o == "--timeout": # timeout before "lost" try: timeout = float(a) except: _error("invalid timout: '%s'" % str(a)) if o == "-6" or o == "--ipv6": # ping ipv6 ipv6 = 1 if o == "-c" or o == "--count": # how many pings? try: count = int(a) except: _error("invalid count of packets to transmit: '%s'" % str(a)) if o == "-f" or o == "--flood": # no delay between ping send flood = 1 if o == "-s" or o == "--packetsize": # set the ping payload size try: size = int(a) except: _error("invalid packet size: '%s'" % str(a)) # just send one packet and say "it's alive" if o == "-a" or o == "--alive": alive = 1 # here we send pingNode(alive=alive, timeout=timeout, ipv6=ipv6, number=count, \ node=node, flood=flood, size=size) # if we made it this far, do a clean exit sys.exit(0) ### end
郁闷~~~~
早上到公司,电脑访问不了文件服务器,但是其他同事的机器都没问题,难道是我的rpwt?重启,还是一样,郁闷啊。最后看了一眼本地连接的属性,原来是”Microsoft 网络客户端”前面的小钩没了,不知道什么时候不小心点掉的,寒一个-_-#
把bash覆盖了,咋整?
在一个论坛上面看到有人说他把/bin/bash覆盖了,重启不能正常启动。hoho,启动脚本都是需要bash的,当然不能启动啦-_-#。给他回了个帖子,没有看到他说我的方法行不行。唉!早就料到是这样,所以我一般都不re贴的。
我尝试用Trustix 2.2重现一下他的问题,但是发现Trustix还是能够用root登录的。这也说明了Trustix的开发者考虑到了这个问题,root用户的shell是/sbin/bash,/bin/bash挂了,root还是可以登录。嗯…还是用我贴的那个办法来解决这个问题吧。
启动机器,出现Grub菜单的时候在菜单项上按’e’,然后用方向键选上”kernel …”那一行,再按’e’。在后面加上” init=/bin/ash”(ash这个包一般都是安装了的,估计tcsh也可以吧,如果安装了的话),回车,按’b’启动。一会就可以看到’#’提示符啦。
mount /proc
mount / -o remount,rw
rpm -e bash --nodeps
mount /mnt/cdrom
rpm -ivh /mnt/cdrom/....../bash-xx.rpm
mount / -o remount,ro
/sbin/halt -p
按”Power”键吧,一切正常;-)
Linux机器中病毒,hoho
一台Linux的机器,在上面随意敲几下ps,居然出来一堆帮助信息。nnd,难道是我敲错了参数?再看,没错啊~~~再敲一遍,还是有问题。难道是……ps被替换了?rpm -qf /bin/ps,知道ps是procps包的。于是rpm -V procps,fk!果然是被人替换了,netstat也不能幸免。用find -ctime找了一下,发现/bin、/usr/bin下n多文件被改动过。把那些文件移动到一个新建的目录里面,从RH的ftp下载那些rpm包,rpm2cpio xxx.rpm | cpio -divm 把文件解出来,cp到相应的地方,但是rpm -V发现还是有问题:(。
受不了啦,嗯,机器上装了ClamAV,就用它scan一下吧。netstat: Linux.RST.B FOUND!汗!以前在某个BBS看到有人说装RH Linux的机器中了这个病毒,居然我也碰到了,运气不错啊。cp也染毒了,所以刚才cp过去的文件当然有问题啦。这个…怎么办呢?噢,/bin/mv还是可以用的,哈哈。经过一阵替换,OK。
netstat看一下,有几个陌生的端口。telnet看了一下,有一个是ssh后门吧。ps发现一个”smbd -D”的进程,这是有问题滴。
Google了一下,找到一些相关的东西。唉,日志都被删掉了,没意思啊。接着升级一下软件包、内核,hoho。
“五一”去天津
星期二打电话订票,说没有30号到天津的票了,问有没有到北京的,还是说没有,郁闷!!
昨天QQ上一个同学告诉我一个电话号码,我试着打一下,问能不能买到30号晚上到天津的车票。回答是有,我说要一张卧铺票。下午票送到公司,收30¥服务费,不过能拿到票就不错啦^^。
Linux下怎样连接SQL Server?
昨天晚上在nkbbs看到ML这个马甲发帖说感谢WZ.Pan。问Pan,原来是一个用来连接M$ SQL Server并执行sql命令的Asp文件(用xp_cmdshell存储过程执行系统命令-_-“)。
突然想到要是用Linux,应该怎样连接SQL Server呢。跑到FreeTDS看了一下,下载xx.src.rpm,然后用rpmbuild --rebuild xxx.src.rpm
编译,接着安装,OK。
FreeTDS带了一个叫tsql的程序,在FreeTDS的网站上还看到SQSH(A swiss army knife command line interface to Sybase/SQL Server)的链接,于是把源代码包下载下来,解压。
#export SYBASE=/usr
#./configure --with-readline
#make
^_^
看了一下,感觉sqsh的参数很多,应该很强大,但是没有数据库服务器可以连接,测试不了,郁闷:(
哈哈,第一次写Blog
刚把WordPress装好,nkuer说WordPress很好,就把它装上啦:)不过觉得页面上一大块蓝色的不太好看:P