Aufruf eines Webservice, das über SSL und SelfSigned Certificates abgesichert ist


Imports System.Net
Imports System.Net.Security
Imports System.Security.Cryptography.X509Certificates

' Dummy function to skip validation and return OK
Public Function NoSSLValidation(ByVal sender As Object, _
ByVal certificate As X509Certificate, _
ByVal chain As X509Chain, _
ByVal sslPolicyErrors As SslPolicyErrors) As Boolean
NoSSLValidation = True
End Function

Public Function Main

' Set our dummy function as function for the validation
ServicePointManager.ServerCertificateValidationCallback = New RemoteCertificateValidationCallback(AddressOf NoSSLValidation)

End Function

VMWare Server 1.x unter Linux 2.6.29++

Der Post ist nicht von mir – ich will ihn nur sichern, für den Fall, dass dem VMWare Forum etwas passiert

Original Post: http://communities.vmware.com/thread/205686;jsessionid=C50117EC1C1CE84BC340CCD7C13FC4EA?start=15&tstart=0

For those who may stumble into this thread by a search and wonder what the „final“ state of affairs was:

1) Yes, you can run VMware Server v1.0.9 on kernels 2.6.29 and 2.6.30 (at least to 2.6.30.6).
2) Yes, if you are running 2.6.29 or 2.6.30 your kernel MUST have the „export-init_mm“ patch.
3) No, the patch doesn’t work on 2.6.31.
4) Make sure „Enable unused/obsolete exported symbols“ is turned on under the kernel’s „Kernel hacking“ section.
5) Yes, you must apply a 3rd party (non-VMware) patch to VMware Server. I used http://www.insecure.ws/warehouse/vmware-update-2.6.29-5.5.9-3.tar.bz2 (MD5 8b5da10ece0ecbe5e0227ca081e65ec1, attached). It includes the kernel patch BUT DOES NOT apply it, that is YOUR job.

cd /opt/vmware
tar xjvf vmware-update-2.6.29-5.5.9-3.tar.bz2
cd $KERNELSOURCE
patch -p1 < /opt/vmware/vmware-update-2.6.29-5.5.9-3/2.6.29-export-init_mm.patch
make
cd vmware-update-2.6.29-5.5.9
./runme.pl

I am not affiliated with VMware. It seems that VMware has largely abandoned Server v1.0.x. I remain hopeful that some bright person with some C and kernel experience will sit down with the v1.0.9 module code and develop a PROPER patch, one that does not require any kernel modifications and that uses the newer kernel interfaces as appropriate.

o Daniel Johnson

helpdesk@chguernsey.com / progman2000@usa.net / djohnson@progman.us

Interessante Commands auf dem Gateway

Capturing

im expert Mode:

fw monitor -e 'accept interface=eth2 or interface=eth0;' -o capture.cap
fw momitor -e 'accept src=1.2.3.4 or src=2.3.4.5;' -o capture.cap

Policy

Command Auswirkung
fw unload local Entlädt die Policy, gesamter Traffic zum und vom Gateway erlaubt, kein Forwarding
fw fetch localhost Lädt die letzte aktuelle Policy vom Localhost
fw fetch <SCS-Server> Lädt die letzte aktuelle Policy vom Smart Center Server

Cluster

Command Bedeutung
cphaprob state Cluster Status
cphaprob -a if Interface Status
cphaprob -d fwd -s problem report „manuelles“ relocaten des aktiven ClusterNodes