Posted by jpluimers on 2014/11/21
The dig (domain information groper) command under unix/Linux is a great way to help verify that a DNS host like BIND is working properly.
A few of my servers are Linux, but most of my desktops usually are Windows, so I was happy to find the Using the dig dns tool on Windows 7 article by Dan Esparza explaining there is a Windows version.
- Downloaded the Windows version of BIND (I took the BIND 9.9.2-P1 ZIP file)
- Unzipped that into my C:\BIN\BIND directory
- Ran this command, just like I would on a Linux box:
dig @192.168.171.214 pluimers.com
- Checked the below output to the zone configuration on the openSUSE box serving the DNS for my domain
; <<>> DiG 9.9.2-P1 <<>> @192.168.171.214 pluimers.com
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12911
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 5, ADDITIONAL: 6
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;pluimers.com. IN A
;; ANSWER SECTION:
pluimers.com. 172800 IN A 22.214.171.124
;; AUTHORITY SECTION:
pluimers.com. 172800 IN NS ns7.4delphi.com.
pluimers.com. 172800 IN NS ns6.4delphi.com.
pluimers.com. 172800 IN NS ns2.4delphi.com.
pluimers.com. 172800 IN NS ns1.4delphi.com.
pluimers.com. 172800 IN NS ns3.4delphi.com.
;; ADDITIONAL SECTION:
ns1.4delphi.com. 172800 IN A 126.96.36.199
ns2.4delphi.com. 172800 IN A 188.8.131.52
ns3.4delphi.com. 172800 IN A 184.108.40.206
ns6.4delphi.com. 172800 IN A 220.127.116.11
ns7.4delphi.com. 172800 IN A 18.104.22.168
;; Query time: 15 msec
;; SERVER: 192.168.171.214#53(192.168.171.214)
;; WHEN: Wed Jan 02 16:07:58 2013
;; MSG SIZE rcvd: 235
via Dig (command) – Wikipedia, the free encyclopedia.
Posted in *nix, Linux, Power User, SuSE Linux, Windows, Windows 7 | Leave a Comment »
Posted by jpluimers on 2014/11/07
Great! And it is open source at https://github.com/google/nogotofail:
The Android Security Team has built a tool, called nogotofail, that provides an easy way to confirm that the devices or applications you are using are safe against known TLS/SSL vulnerabilities and misconfigurations. Nogotofail works for Android, iOS, Linux, Windows, Chrome OS, OSX, in fact any device you use to connect to the Internet.
There’s an easy-to-use client to configure the settings and get notifications on Android and Linux, as well as the attack engine itself which can be deployed as a router, VPN server, or proxy.
via Google Online Security Blog: Introducing nogotofail—a network traffic security testing tool.
Posted in *nix, Android, Chrome, Google, iOS, OpenSSL, OS X, Power User, Security, Windows | Leave a Comment »
Posted by jpluimers on 2014/11/05
I just learned (thanks Chris Wahl!) about the dcui command: often easier to configure basic parameters than the other UIs.
The DCUI is normally available from the console after you login, for instance to enable SSH.
This was new to me:
DCUI is available over SSH.
Even more embarrassing: duic has been actually there since ESXi 4.1 (:
via: Accessing the ESXi Direct Console User Interface DCUI via SSH – Wahl Network.
Posted in *nix, ESXi4, ESXi5, ESXi5.1, ESXi5.5, Power User, Virtualization, VMware, VMware ESXi | Leave a Comment »
Posted by jpluimers on 2014/10/03
Had to download a bunch of stuff over the command-line from an IIS server that was using authentication. Not basic authentication, but NTLM authentication.
wget kept failing, even wget 1.10 that usually does NTLM quite OK (but up to 1.10.2 has a security vulnerability so you should not use wget 1.10 any more).
So I installed a Windows x86 cURL binary, and downloaded+copied the root certificates, then did some reading on the command-line switches.
Without any, cURL does http basic authentication. But a Windows server usually expects NTLM authentication (hardly documented, but it uses the Negotiate protocol).
When not using NTLM, both would show (wget -d, or curl -v) this in the output, indicating you should use NTLM authentication: Read the rest of this entry »
Posted in *nix, *nix-tools, cURL, Linux, Power User, SuSE Linux, wget, Windows, Windows Server 2000, Windows Server 2003, Windows Server 2003 R2, Windows Server 2008, Windows Server 2008 R2 | Leave a Comment »