Imports System.Net Imports System.Net.Security Imports System.Security.Cryptography.X509Certificates ' Dummy function to skip validation and return OK Public Function NoSSLValidation(ByVal sender As Object, _ ByVal certificate As X509Certificate, _ ByVal chain As X509Chain, _ ByVal sslPolicyErrors As SslPolicyErrors) As Boolean NoSSLValidation = True End Function Public Function Main ' Set our dummy function as function for the validation ServicePointManager.ServerCertificateValidationCallback = New RemoteCertificateValidationCallback(AddressOf NoSSLValidation) End Function
Archiv der Kategorie: IT
OpenSSL Certificates for IIS
VMWare Server 1.x unter Linux 2.6.29++
Der Post ist nicht von mir – ich will ihn nur sichern, für den Fall, dass dem VMWare Forum etwas passiert
Original Post: http://communities.vmware.com/thread/205686;jsessionid=C50117EC1C1CE84BC340CCD7C13FC4EA?start=15&tstart=0
For those who may stumble into this thread by a search and wonder what the „final“ state of affairs was:
1) Yes, you can run VMware Server v1.0.9 on kernels 2.6.29 and 2.6.30 (at least to 2.6.30.6).
2) Yes, if you are running 2.6.29 or 2.6.30 your kernel MUST have the „export-init_mm“ patch.
3) No, the patch doesn’t work on 2.6.31.
4) Make sure „Enable unused/obsolete exported symbols“ is turned on under the kernel’s „Kernel hacking“ section.
5) Yes, you must apply a 3rd party (non-VMware) patch to VMware Server. I used http://www.insecure.ws/warehouse/vmware-update-2.6.29-5.5.9-3.tar.bz2 (MD5 8b5da10ece0ecbe5e0227ca081e65ec1, attached). It includes the kernel patch BUT DOES NOT apply it, that is YOUR job.
cd /opt/vmware tar xjvf vmware-update-2.6.29-5.5.9-3.tar.bz2 cd $KERNELSOURCE patch -p1 < /opt/vmware/vmware-update-2.6.29-5.5.9-3/2.6.29-export-init_mm.patch make cd vmware-update-2.6.29-5.5.9 ./runme.pl
I am not affiliated with VMware. It seems that VMware has largely abandoned Server v1.0.x. I remain hopeful that some bright person with some C and kernel experience will sit down with the v1.0.9 module code and develop a PROPER patch, one that does not require any kernel modifications and that uses the newer kernel interfaces as appropriate.
o Daniel Johnson
helpdesk@chguernsey.com / progman2000@usa.net / djohnson@progman.us
Interessante Commands auf dem Gateway
Capturing
im expert Mode:
fw monitor -e 'accept interface=eth2 or interface=eth0;' -o capture.cap fw momitor -e 'accept src=1.2.3.4 or src=2.3.4.5;' -o capture.cap
Policy
Command | Auswirkung |
---|---|
fw unload local | Entlädt die Policy, gesamter Traffic zum und vom Gateway erlaubt, kein Forwarding |
fw fetch localhost | Lädt die letzte aktuelle Policy vom Localhost |
fw fetch <SCS-Server> | Lädt die letzte aktuelle Policy vom Smart Center Server |
Cluster
Command | Bedeutung |
---|---|
cphaprob state | Cluster Status |
cphaprob -a if | Interface Status |
cphaprob -d fwd -s problem report | „manuelles“ relocaten des aktiven ClusterNodes |
Interessante Command auf dem Smart Center Server
$FW1DIR\bin\upgrade_tools\upgrade_export <Filename> | Backup der Konfiguration |
$FW1DIR\bin\upgrade_tools\upgrade_import <Filename> | Restore der Konfiguration |
fwm sic_reset | Setzt die Internal Certificate Authority (ICA) zurück danach cpconfig und neue ICA bauen und cpstart |