<?xml version="1.0" encoding="UTF-8"?><rss version="2.0">
	<channel>
		<title>워드프레스 KBoard 피드</title>
		<link>http://www.nserver.co.kr/wp-content/plugins/kboard/rss.php</link>
		<description>워드프레스 KBoard 피드</description>
				<item>
			<title><![CDATA[How to remove Web console message on user login in RHEL 8]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=36]]></link>
			<description><![CDATA[How to remove Web console message on user login in RHEL 8

서브스크립션을 활성화 하지 않은 상태에 로그인 창에서 아래와 같이 나오면

Activate the web console with: systemctl enable --now cockpit.socket

Register this system with Red Hat Insights: insights-client --register
Create an account or view all your systems at https://red.ht/insights-dashboard

To disable the Web console message during user login in RHEL 8 make below change to /etc/pam.d/sshd file 에서

session optional pam_motd.so // 주석처리

로그인창에서 메시지가 나오지 않습니다.]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Sun, 15 Jan 2023 03:58:25 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[Fortigate FW Factoryreset]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=35]]></link>
			<description><![CDATA[# exec factoryreset
This operation will reset the system to factory default!
Do you want to continue? (y/n)y

System is resetting to factory default...

The system is going down NOW !!

#
Please stand by while rebooting the system.]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 27 May 2022 00:11:07 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[named query cache denied]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=34]]></link>
			<description><![CDATA[named query cache denied

기존서비스를 하던 도메인이 더이상 서비스를 하지 않는데..

도메인 등록기관에서 네임서버 변경을 안해서 네임서버에 zone 파일 자체가 없는데 아래와 같은 denied 로그가

쌓입니다.

[root@ns1 ~]# tail -f /var/log/messages
Oct 12 11:05:44 ns1 named-sdb[39482]: client 106.241.133.12#44496: query (cache) 'www.xxxxxx.com/A/IN' denied
Oct 12 11:05:44 ns1 named-sdb[39482]: client 106.241.133.55#33843: query (cache) 'www.xxxxxx.com/A/IN' denied
Oct 12 11:05:44 ns1 named-sdb[39482]: client 106.241.133.53#49048: query (cache) 'm.xxxxxx.com/A/IN' denied
Oct 12 11:05:44 ns1 named-sdb[39482]: client 106.241.133.18#60286: query (cache) 'www.xxxxxx.com/A/IN' denied
Oct 12 11:05:44 ns1 named-sdb[39482]: client 106.241.133.51#42116: query (cache) 'www.xxxxxx.com/A/IN' denied
Oct 12 11:05:44 ns1 named-sdb[39482]: client 106.241.133.16#13800: query (cache) 'xxxxxx.com/A/IN' denied
Oct 12 11:05:44 ns1 named-sdb[39482]: client 106.241.133.52#38423: query (cache) 'www.xxxxxx.com/A/IN' denied
Oct 12 11:05:45 ns1 named-sdb[39482]: client 106.241.133.19#4781: query (cache) 'm.xxxxxx.com/A/IN' denied
Oct 12 11:05:45 ns1 named-sdb[39482]: client 106.241.133.111#29213: query (cache) 'm.xxxxxx.com/A/IN' denied
Oct 12 11:05:45 ns1 named-sdb[39482]: client 208.91.112.52#63617: query (cache) 'xxxxxx.com/A/IN' denied
Oct 12 11:05:49 ns1 named-sdb[39482]: client 106.241.133.13#21128: query (cache) 'www.xxxxxx.com/A/IN' denied
Oct 12 11:05:49 ns1 named-sdb[39482]: client 106.241.133.24#52914: query (cache) 'm.xxxxxx.com/A/IN' denied
Oct 12 11:05:49 ns1 named-sdb[39482]: client 106.241.133.55#38376: query (cache) 'xxxxxx.com/A/IN' denied
Oct 12 11:05:49 ns1 named-sdb[39482]: client 106.241.133.21#11279: query (cache) 'm.xxxxxx.com/A/IN' denied
Oct 12 11:05:49 ns1 named-sdb[39482]: client 106.241.133.58#55711: query (cache) 'm.xxxxxx.com/A/IN' denied
Oct 12 11:05:49 ns1 named-sdb[39482]: client 208.91.112.53#45648: query (cache) 'm.xxxxxx.com/A/IN' denied
Oct 12 11:05:49 ns1 named-sdb[39482]: client 106.241.133.16#63674: query (cache) 'xxxxxx.com/A/IN' denied
Oct 12 11:05:49 ns1 named-sdb[39482]: client 106.241.133.11#6421: query (cache) 'm.xxxxxx.com/A/IN' denied
Oct 12 11:05:49 ns1 named-sdb[39482]: client 164.124.101.55#21374: query (cache) 'www.xxxxxx.com/A/IN' denied
Oct 12 11:05:49 ns1 named-sdb[39482]: client 164.124.101.124#20556: query (cache) 'xxxxxx.com/A/IN' denied

위에 로그와 같이 서비스 하지 않는 도메인의 denied 로그가 쌓일때

1. /etc/named.conf  파일에 category security null 옵션을 추가하면 해결됩니다.

logging {
category security { null; }; &lt;-- 추가
channel default_debug {
file "data/named.run";
severity dynamic;
};
};

 ]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Oct 2018 01:46:02 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[HPS Reports Enhanced version]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=33]]></link>
			<description><![CDATA[HPS Reports Enhanced version

http://hpsreports.glb.itcs.hpe.com/HPSreports/

<img src="/wp-content/uploads/kboard_attached/1/201612/58444eb2a4a116919393.jpg" alt="" />]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Mon, 05 Dec 2016 02:12:30 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[KISARBL 참조하여 SENDMAIL 스팸필터링 설정]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=31]]></link>
			<description><![CDATA[KISARBL 참조하여 SENDMAIL 스팸필터링 설정

기존 sendmail.mc 및 sendmail.cf orig 백업후

sendmail.mc 파일 174 라인쪽에 추가합니다.
[root@nserver mail]# cat -n sendmail.mc
1 divert(-1)dnl
2 dnl #
3 dnl # This is the sendmail macro config file for m4. If you make changes to
4 dnl # /etc/mail/sendmail.mc, you will need to regenerate the
5 dnl # /etc/mail/sendmail.cf file by confirming that the sendmail-cf package is
6 dnl # installed and then performing a
7 dnl #
8 dnl # make -C /etc/mail
9 dnl #
10 include(`/usr/share/sendmail-cf/m4/cf.m4')dnl
.
.
155 LOCAL_DOMAIN(`localhost.localdomain')dnl
156 dnl #
157 dnl # The following example makes mail from this host and any additional
158 dnl # specified domains appear to be sent from mydomain.com
159 dnl #
160 dnl MASQUERADE_AS(`mydomain.com')dnl
161 dnl #
162 dnl # masquerade not just the headers, but the envelope as well
163 dnl #
164 dnl FEATURE(masquerade_envelope)dnl
165 dnl #
166 dnl # masquerade not just @mydomainalias.com, but @*.mydomainalias.com as well
167 dnl #
168 dnl FEATURE(masquerade_entire_domain)dnl
169 dnl #
170 dnl MASQUERADE_DOMAIN(localhost)dnl
171 dnl MASQUERADE_DOMAIN(localhost.localdomain)dnl
172 dnl MASQUERADE_DOMAIN(mydomainalias.com)dnl
173 dnl MASQUERADE_DOMAIN(mydomain.lan)dnl
174 FEATURE(dnsbl, `spamlist.or.kr', `Rejected - see http://www.kisarbl.or.kr/')dnl
175 MAILER(smtp)dnl
176 MAILER(procmail)dnl

cf 파일을 만들어 줍니다.
[root@nserver mail]# m4 sendmail.mc &gt; sendmail.cf
변경후 추가된 부분

&lt; # DNS based IP address spam list spamlist.or.kr
&lt; R$* $: $&amp;{client_addr}
&lt; R$-.$-.$-.$- $: &lt;?&gt; $(dnsbl $4.$3.$2.$1.spamlist.or.kr. $: OK $)
&lt; R&lt;?&gt;OK $: OKSOFAR
&lt; R&lt;?&gt;$+&lt;TMP&gt; $: TMPOK
&lt; R&lt;?&gt;$+ $#error $@ 5.7.1 $: Rejected - see http://www.kisarbl.or.kr/

서비스를 재시작 합니다.

service sendmail restart

#스팸메일 #sendmail #KISABRL #스팸메일필터설정]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Tue, 06 Sep 2016 11:50:32 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[CVE-2016-5387 패치]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=30]]></link>
			<description><![CDATA[[root@localhost SOURCES]# cat httpd-2.2.15-CVE-2016-5387.patch
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-5387
--- httpd-2.2.15/server/util_script.c.cve5387
+++ httpd-2.2.15/server/util_script.c
@@ -176,6 +176,10 @@
continue;
}
#endif
+        else if (!strcasecmp(hdrs[i].key, "Proxy")) {
+            /* Don't pass through HTTP_PROXY */
+            continue;
+        }
else {
apr_table_addn(e, http2env(r-&gt;pool, hdrs[i].key), hdrs[i].val);
}

httpd 소스에 패치를 실행합니다.

[root@localhost httpd-2.2.31]# patch -p1 &lt; httpd-2.2.15-CVE-2016-5387.patch
patching file server/util_script.c

아래부분은 패치 적용된 부분입니다.

[root@localhost httpd-2.2.31]# diff server/util_script.c.orig server/util_script.c
178a179,182
&gt;         else if (!strcasecmp(hdrs[i].key, "Proxy")) {
&gt;             /* Don't pass through HTTP_PROXY */
&gt;             continue;
&gt;         }]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:25:28 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[MariaDB - Setting up MariaDB Repositories - MariaDB]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=29]]></link>
			<description><![CDATA[MariaDB - Setting up MariaDB Repositories - MariaDB

https://downloads.mariadb.org/mariadb/repositories/#mirror=kaist

설치된 OS버전에 맞게 선택하면 저장소 파일을 만들어 준다.

Here is your custom MariaDB YUM repository entry for CentOS. Copy and paste it into a file under /etc/yum.repos.d/ (we suggest naming the file MariaDB.repo or something similar). See "Installing MariaDB with yum" for detailed information.
# MariaDB 5.5 CentOS repository list - created 2016-06-09 00:14 UTC
# http://downloads.mariadb.org/mariadb/repositories/
[mariadb]
name = MariaDB
baseurl = http://yum.mariadb.org/5.5/centos6-amd64
gpgkey=https://yum.mariadb.org/RPM-GPG-KEY-MariaDB
gpgcheck=1]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:23:15 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[glibc 취약점 보안 업데이트 권고]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=28]]></link>
			<description><![CDATA[□ 개요
o 구글 온라인 시큐리티 연구팀에서는 리눅스 GNU C 라이브러리(glibc)에서 원격코드 실행이 가능한 취약점(CVE-2015-7547)을 발견함
※ CVE-2015-7547는 glibc의 getaddrinfo 함수에서 발생하는 버퍼오버플로우 취약점
o 영향 받는 버전 사용자는 시스템 임의코드 실행 등에 취약할 수 있으므로 해결방안에 따라 최신버전으로 업데이트 권고

□ 해당 시스템
o 영향을 받는 시스템
- GNU glibc 2.9부터 2.22 이하  버전을 사용하는 시스템(9~22버전)

□ 해결 방안
o 해당 취약점에 대한 보안업데이트가 공개된 OS를 운영하고 있을 경우, 참고사이트의 내용을 참조하여 보안업데이트 수행
- CentOS [1]
- Debian [2]
- Redhat [3]
- Ubuntu [4]
- Suse [5]

□ 용어 설명
o GNU C 라이브러리(glibc) : 리눅스 계열 운영체제에서 C언어로 작성된 실행파일들이 동작하기 위해 공통적으로 사용하는 기능을 쉽게 이용할 수 있도록 묶어 놓은 소프트웨어 집합

□ 기타 문의사항
o 한국인터넷진흥원 인터넷침해대응센터: 국번없이 118

[참고사이트]
[1] https://www.centos.org/forums/viewforum.php?f=17
[2] https://security-tracker.debian.org/tracker/CVE-2015-7547
[3] https://access.redhat.com/security/cve/cve-2015-7547
[4] http://people.canonical.com/~ubuntu-security/cve/2015/CVE-2015-7547.html
[5] https://www.suse.com/security/cve/CVE-2015-7547.html
참조링크 : https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=24023]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:22:41 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[dovecot bruteforce attack 무차별 대입공격]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=27]]></link>
			<description><![CDATA[[root@xxx]# ps -ef|grep pop3 | wc -l
130

많은 메일 사용자가 없는데

[root@xxx]# yum install epel-release // 기본 저장소에서 fail2ban 패키지 설치가 안되서 저장소 추가
[root@xxx]# yum install fail2ban // 설치
[root@xxx]# vi /etc/fail2ban/filter.d/dovecot-pop3imap.conf // 생성후 아래 내용을 입력
[Definition]
failregex = (?: pop3-login|imap-login): (?:Authentication failure|Aborted login (auth failed|Aborted login (tried to use disabled|Disconnected (auth failed).*rip=(?P&lt;host&gt;S*),.*
ignoreregex =

[root@xxx]#vi /etc/fail2ban/jail.conf // 아래내용을 추가

[dovecot-pop3imap]
enabled = true
filter = dovecot-pop3imap
action = iptables-multiport[name=dovecot-pop3imap, port="pop3,imap", protocol=tcp]
logpath = /var/log/maillog
maxretry = 20
findtime = 1200
bantime = 1200

[root@xxx]# /etc/init.d/fail2ban start
Starting fail2ban: [  OK  ]
[root@xxx]#  /etc/init.d/dovecot restart
Stopping Dovecot Imap: [  OK  ]
Starting Dovecot Imap: [  OK  ]

[root@xxx]#  ps -ef|grep pop3| wc -l
4]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:21:55 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[Password expiration policy in MySQL Server 5.7]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=26]]></link>
			<description><![CDATA[Mysql 설치후 기본 패스워드가 없는데 버전이 바뀌고 패스워드를 요구한다.

Password expiration policy in MySQL Server 5.7 때문이다.

최초 기본디비생성후 구동시키면 아래 굵은글자로 표시된 패스워드가 생성된다.

또는 /root/.mysql_secret 생성된 파일을 보면 패스워드가 존재한다

[root@db ~]# adduser mysql -M -s /bin/false -g mysql
[root@db ~]# unzip V97613-01.zip<span class="Apple-converted-space"> </span>
Archive:  V97613-01.zip
extracting: mysql-commercial-common-5.7.9-1.1.el5.x86_64.rpm <span class="Apple-converted-space"> </span>
extracting: mysql-commercial-server-5.7.9-1.1.el5.x86_64.rpm <span class="Apple-converted-space"> </span>
extracting: mysql-commercial-embedded-5.7.9-1.1.el5.x86_64.rpm <span class="Apple-converted-space"> </span>
extracting: mysql-commercial-libs-compat-5.7.9-1.1.el5.x86_64.rpm <span class="Apple-converted-space"> </span>
extracting: mysql-commercial-client-5.7.9-1.1.el5.x86_64.rpm <span class="Apple-converted-space"> </span>
extracting: mysql-commercial-embedded-devel-5.7.9-1.1.el5.x86_64.rpm <span class="Apple-converted-space"> </span>
extracting: mysql-commercial-devel-5.7.9-1.1.el5.x86_64.rpm <span class="Apple-converted-space"> </span>
extracting: mysql-commercial-libs-5.7.9-1.1.el5.x86_64.rpm <span class="Apple-converted-space"> </span>
extracting: mysql-commercial-test-5.7.9-1.1.el5.x86_64.rpm <span class="Apple-converted-space"> </span>
extracting: README.txt             <span class="Apple-converted-space"> </span>
[root@db ~]# rpm -ivh mysql-* --nodeps
경고: mysql-commercial-client-5.7.9-1.1.el5.x86_64.rpm: Header V3 DSA signature: NOKEY, key ID 5072e1f5
준비 중...                  ########################################### [100%]
1:mysql-commercial-common########################################### [ 11%]
2:mysql-commercial-libs  ########################################### [ 22%]
3:mysql-commercial-client########################################### [ 33%]
4:mysql-commercial-server########################################### [ 44%]
5:mysql-commercial-embedd########################################### [ 56%]
6:mysql-commercial-test  ########################################### [ 67%]
7:mysql-commercial-libs-c########################################### [ 78%]
8:mysql-commercial-devel ########################################### [ 89%]
9:mysql-commercial-embedd########################################### [100%]

[root@db log]# tail -F mysqld.log<span class="Apple-converted-space"> </span>
2015-11-17T10:18:57.038907Z 0 [Warning] TIMESTAMP with implicit DEFAULT value is deprecated. Please use --explicit_defaults_for_timestamp server option (see documentation for more details).
2015-11-17T10:18:57.374358Z 0 [Warning] InnoDB: New log files created, LSN=45790
2015-11-17T10:18:57.425622Z 0 [Warning] InnoDB: Creating foreign key constraint system tables.
2015-11-17T10:18:57.469921Z 0 [Warning] No existing UUID has been found, so we assume that this is the first time that this server has been started. Generating a new UUID: 9cd4720c-8d14-11e5-8797-000c29e4d932.
2015-11-17T10:18:57.473337Z 0 [Warning] Gtid table is not ready to be used. Table 'mysql.gtid_executed' cannot be opened.
2015-11-17T10:18:58.337016Z 0 [Warning] CA certificate ca.pem is self signed.
2015-11-17T10:18:58.927604Z 1 [Note] A temporary password is generated for<span class="Apple-converted-space"> </span><a class="con_link" href="mailto:root@localhost" target="_blank">root@localhost</a>:<span class="Apple-converted-space"> </span><strong>rIjw&lt;%ixw5fp
</strong>[root@db log]# mysql -uroot -p
Enter password:<span class="Apple-converted-space"> </span>
Welcome to the MySQL monitor.  Commands end with ; or g.
Your MySQL connection id is 3
Server version: 5.7.9-enterprise-commercial-advanced

Copyright (c) 2000, 2015, Oracle and/or its affiliates. All rights reserved.

Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.

Type 'help;' or 'h' for help. Type 'c' to clear the current input statement.

mysql&gt;
mysql&gt; show databases;
ERROR 1820 (HY000): You must reset your password using ALTER USER statement before executing this statement.
mysql&gt;<span class="Apple-converted-space"> </span>
mysql&gt; SET PASSWORD = PASSWORD(<a class="con_link" href="mailto:'Xxx0000!@#'" target="_blank">'Xxx0000!@#'</a>);
Query OK, 0 rows affected, 1 warning (0.00 sec)

mysql&gt; show databases;
+--------------------+
| Database                |
+--------------------+
| information_schema  |
| mysql                     |
| performance_schema |
| sys                         |
+--------------------+
4 rows in set (0.00 sec)

mysql&gt;]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:19:10 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[Bash History: Display Date And Time For Each Command]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=25]]></link>
			<description><![CDATA[[root@xxx ~]# echo 'export HISTTIMEFORMAT="%d/%m/%y %T "' &gt;&gt; ~/.bash_profile

재로그인

[root@xxx ~]# history

<span style="font-family:'Courier New';">  118  23/10/15 20:29:37 /etc/init.d/httpd restart
119  23/10/15 20:29:37 vi /etc/httpd/conf/httpd.conf<span class="Apple-converted-space"> </span>
120  23/10/15 20:29:37 ls
121  23/10/15 20:29:37 vi /etc/httpd/conf/httpd.conf<span class="Apple-converted-space"> </span>
122  23/10/15 20:29:37 /etc/init.d/httpd restart
123  23/10/15 20:29:37 echo 'export HISTTIMEFORMAT="%d/%m/%y %T "' &gt;&gt; ~/.bash_profile
124  23/10/15 20:29:38 history</span>]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:16:11 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[Active Server Pages 오류 '00000000']]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=24]]></link>
			<description><![CDATA[Active Server Pages 오류 '00000000'
개체 만들기 실패
?
'window' 개체를 만드는 동안 오류가 발생했습니다.

IIS 관리자 -&gt; 응용프로그램폴 -&gt; 해당프로그램 폴 선택 -&gt; 고급설정 (일반) 32Bit 응용프로그램
사용 (True)변경후 IIS재시작]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:15:42 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[No space left on device: mod_rewrite: could not create rewrite_log_lockNo space left on device: mod_rewrite: could not create r]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=23]]></link>
			<description><![CDATA[apache 구동시 아래의 메시지와 프로세서가 정상동작안할때 조치 방법

No space left on device: mod_rewrite: could not create rewrite_log_lockNo space left on device: mod_rewrite: could not create rewrite_log_lock

ipcs -s | grep ryme78 | perl -e 'while (&lt;STDIN&gt;) { @a=split(/s+/); print `ipcrm sem $a[1]`}'

재구동

 ]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:14:01 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[VMWare ESXi: Could not find a trusted signer]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=21]]></link>
			<description><![CDATA[~ # esxcli software vib install -v /tmp/vmware-esx-provider-lsiprovider.vib 
 [InstallationError]
 ('LSI_bootbank_lsiprovider_500.04.V0.32-0003', 'Could not find a trusted signer.')
       vibs = LSI_bootbank_lsiprovider_500.04.V0.32-0003
 Please refer to the log file for more details.
~ # 
~ # esxcli software vib install -v /tmp/vmware-esx-provider-lsiprovider.vib --no-sig-check
Installation Result
   Message: The update completed successfully, but the system needs to be rebooted for the changes to be effective.
   Reboot Required: true
   VIBs Installed: LSI_bootbank_lsiprovider_500.04.V0.32-0003
   VIBs Removed: 
   VIBs Skipped: 
~ #]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:09:48 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[Netmask Quick Reference]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=20]]></link>
			<description><![CDATA[<img src="/wp-content/uploads/kboard_attached/1/201608/57acbf22a50bc4690776.jpg" alt="" />]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:08:39 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[세션쿠키에서 httpOnly 속성누락]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=19]]></link>
			<description><![CDATA[세션쿠키에서 httpOnly 속성누락

Secure cookie with HttpOnly and Secure flag in Apache

아래 mod 가 활성화 되어 있어야 한다.
[root@ conf]# cat httpd.conf |grep mod_headers.so
LoadModule headers_module modules/mod_headers.so

httpd.conf 아래와 같이 추가한다.
[root@conf]# cat httpd.conf |grep Header
Header edit Set-Cookie ^(.*)$ $1;HttpOnly;Secure

적용전
<img src="/wp-content/uploads/kboard_attached/1/201608/57acbe73c5f6d1387354.jpg" alt="" />
적용후
<img src="/wp-content/uploads/kboard_attached/1/201608/57acbe73c5f6d1387354.jpg" alt="" />
check http://geekflare.com/tools/tool.php?id=check-headers]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 03:06:33 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[HP SMART ARRAY Hot-spares 추가]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=18]]></link>
			<description><![CDATA[[root@DB ~]# hpacucli
HP Array Configuration Utility CLI 9.40.12.0
Detecting Controllers...Done.
Type "help" for a list of supported commands.
Type "exit" to close the console.
=&gt; ctrl all show config
Smart Array P410i in Slot 0 (Embedded)    (sn: 5001438006EFBFC0)
   array A (SAS, Unused Space: 0  MB)

      logicaldrive 1 (1.6 TB, RAID 5, OK)
      physicaldrive 1I:1:5 (port 1I:box 1:bay 5, SAS, 300 GB, OK)
      physicaldrive 1I:1:6 (port 1I:box 1:bay 6, SAS, 300 GB, OK)
      physicaldrive 1I:1:7 (port 1I:box 1:bay 7, SAS, 300 GB, OK)
      physicaldrive 2I:1:1 (port 2I:box 1:bay 1, SAS, 300 GB, OK)
      physicaldrive 2I:1:2 (port 2I:box 1:bay 2, SAS, 300 GB, OK)
      physicaldrive 2I:1:3 (port 2I:box 1:bay 3, SAS, 300 GB, OK)
      physicaldrive 2I:1:4 (port 2I:box 1:bay 4, SAS, 300 GB, OK)
   unassigned
      physicaldrive 1I:1:8 (port 1I:box 1:bay 8, SAS, 300 GB, OK)
   SEP (Vendor ID PMCSIERA, Model  SRC 8x6G) 250 (WWID: 5001438006EFBFCF)

=&gt; ctrl slot=0 array all add spares=1I:1:8
=&gt; ctrl all show config
Smart Array P410i in Slot 0 (Embedded)    (sn: 5001438006EFBFC0)
   array A (SAS, Unused Space: 0  MB)

      logicaldrive 1 (1.6 TB, RAID 5, OK)
      physicaldrive 1I:1:5 (port 1I:box 1:bay 5, SAS, 300 GB, OK)
      physicaldrive 1I:1:6 (port 1I:box 1:bay 6, SAS, 300 GB, OK)
      physicaldrive 1I:1:7 (port 1I:box 1:bay 7, SAS, 300 GB, OK)
      physicaldrive 2I:1:1 (port 2I:box 1:bay 1, SAS, 300 GB, OK)
      physicaldrive 2I:1:2 (port 2I:box 1:bay 2, SAS, 300 GB, OK)
      physicaldrive 2I:1:3 (port 2I:box 1:bay 3, SAS, 300 GB, OK)
      physicaldrive 2I:1:4 (port 2I:box 1:bay 4, SAS, 300 GB, OK)
      physicaldrive 1I:1:8 (port 1I:box 1:bay 8, SAS, 300 GB, OK, spare)
   SEP (Vendor ID PMCSIERA, Model  SRC 8x6G) 250 (WWID: 5001438006EFBFCF)
=&gt;]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 02:59:35 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[Generating a new unique MAC address]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=17]]></link>
			<description><![CDATA[vi macgen.py
#!/usr/bin/python
# macgen.py script to generate a MAC address for guests on Xen
#
import random
#
def randomMAC():
mac = [ 0x00, 0x16, 0x3e,
random.randint(0x00, 0x7f),
random.randint(0x00, 0xff),
random.randint(0x00, 0xff) ]
return ':'.join(map(lambda x: "%02x" % x, mac))
#
print randomMAC()

생성후

[root@xen ~]# chmod 755 macgen.py 
[root@xen ~]# ./macgen.py
00:16:3e:56:e7:6b
[root@xen ~]#]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 02:58:39 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[데이타 이전시 soft link 복사 안하기]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=16]]></link>
			<description><![CDATA[데이타 이전시 soft link 복사 안하기

rsync --progress -avhe ssh /data  172.16.20.2:/]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 02:57:49 +0000</pubDate>
			<category>Board</category>
		</item>
				<item>
			<title><![CDATA[mysqld: Lock wait timeout exceeded; try restarting transaction]]></title>
			<link><![CDATA[http://www.nserver.co.kr/?kboard_content_redirect=15]]></link>
			<description><![CDATA[mysqld: Lock wait timeout exceeded; try restarting transaction

150120  6:53:58 [ERROR] /usr/local/mysql/libexec/mysqld: Lock wait timeout exceeded; try restarting transaction
150120  6:53:58 [ERROR] /usr/local/mysql/libexec/mysqld: Sort aborted
150120  7:18:32 [ERROR] /usr/local/mysql/libexec/mysqld: Lock wait timeout exceeded; try restarting transaction
150120  7:18:32 [ERROR] /usr/local/mysql/libexec/mysqld: Sort aborted
150120 10:24:37 [ERROR] /usr/local/mysql/libexec/mysqld: Lock wait timeout exceeded; try restarting transaction
150120 10:24:37 [ERROR] /usr/local/mysql/libexec/mysqld: Sort aborted
150121  8:03:39 [ERROR] /usr/local/mysql/libexec/mysqld: Lock wait timeout exceeded; try restarting transaction
150121  8:03:39 [ERROR] /usr/local/mysql/libexec/mysqld: Sort aborted
150121  8:16:10 [ERROR] /usr/local/mysql/libexec/mysqld: Lock wait timeout exceeded; try restarting transaction
150121  8:16:10 [ERROR] /usr/local/mysql/libexec/mysqld: Sort aborted

[root@ftp ~]# mysql -u root -p
Enter password: 
Welcome to the MySQL monitor.  Commands end with ; or g.
Your MySQL connection id is 134478
Server version: 5.0.95 Source distribution
Copyright (c) 2000, 2011, Oracle and/or its affiliates. All rights reserved.
Oracle is a registered trademark of Oracle Corporation and/or its
affiliates. Other names may be trademarks of their respective
owners.
Type 'help;' or 'h' for help. Type 'c' to clear the current input statement.
mysql&gt; show processlist;
+--------+------+-----------+------+---------+------+-------+------------------+
| Id     | User | Host      | db   | Command | Time | State | Info             |
+--------+------+-----------+------+---------+------+-------+------------------+
| 134478 | test | localhost | NULL | sleep   | 4890 | NULL  |                  | 
+--------+------+-----------+------+---------+------+-------+------------------+
| 134480 | test | localhost | haha | sleep   | 2274 | NULL  |                  | 
+--------+------+-----------+------+---------+------+-------+------------------+
| 134482 | test | localhost | hoho | sleep   | 3455 | NULL  | qyery end        | 
+--------+------+-----------+------+---------+------+-------+------------------+
| 134484 | test | localhost | hihi | sleep   | 3445 | NULL  |                  | 
+--------+------+-----------+------+---------+------+-------+------------------+
4 row in set (0.03 sec)
mysql&gt; kill 134478;
Query OK, 0 rows affected (0.00 sec)
mysql&gt; unlock tables;
Query OK, 0 rows affected (0.00 sec)
쿼리실행시간이 길어지면 락 시간 늘려주는 방법이 있다. 기본 50초
mysql&gt; set innodb_lock_wait_timeout=100
Query OK
mysql&gt; show variables like 'innodb_lock_wait_timeout';
+------------------------------------+-------+
| Variable_name                      | Value |
+------------------------------------+-------+
| innodb_lock_wait_timeout           |  100  | 
+------------------------------------+-------+
1 row in set (0.00 sec)]]></description>
			<author><![CDATA[nstor]]></author>
			<pubDate>Fri, 12 Aug 2016 02:55:37 +0000</pubDate>
			<category>Board</category>
		</item>
			</channel>
</rss>