Re: Cyrillic fonts in X Window. (fwd)
try run xterm -fn koi9x15 -rv -- xorg.conf -- Section InputDevice Identifier keyboard Driver kbd Option CoreKeyboard Option XkbRules xorg Option XkbModel pc105 Option XkbLayout us,ru Option XkbOptions grp:ctrl_shift_toggle Option XkbVariant ,winkeys -- xorg.conf -- I have add string 'FontPath /usr/X11R6/lib/X11/fonts/cyrillic/' into xorg.conf, then I execute fc-cache. However, these fonts unavailable in X. What is going wrong? fc-cache -v Fontconfig error: Cannot load default config file /usr/X11R6/lib/X11/fonts/TTF: skipping, 23 fonts, 0 dirs /usr/X11R6/lib/X11/fonts/Type1: skipping, 29 fonts, 0 dirs /usr/X11R6/lib/X11/fonts/cyrillic: skipping, 0 fonts, 0 dirs
Re: pf table update-daemon? Does it exist?
M. Feenstra ?: Hi List, I'm getting a bit tired of all those web vulnerability scanners. I generate a list of 404 requests to find errors in my websites but this list is mainly filled with these scanners. I have added a table to pf that blocks some of the more persistent attackers but I like to update this table automatically. I was thinking of writing a little script/module for my webserver that after three 404's in a row adds them to the table. Of course my webserver doesn't run as so I can not run pfctl to update the table. Preferably I also don't want to write to a file and schedule a pfctl every minute. Ideally it would be a daemon that listens to localhost only and, after authentication, accepts an IP address from the webserver which is than put in the table. Does something like this exist? Or maybe, is there a better way of dealing with this? Regard, Mark QTFG: pftabled
Re: pf table update-daemon? Does it exist?
M. Feenstra ? QTFG: pftabled Thanks... I did the QTFG-part quite a bit but never ran into pftabled but you are correct. This is exactly what I was looking for.. Looks like a very nice implementation also. Nice readable code. Thanks again.. you are welcome :) i use pftabled in my antispam system for blocking annoying hosts. below you can see my script for manage pftabled. i think it is more simple than code from author. use IO::Socket; use Digest::HMAC_SHA1 qw(hmac_sha1); my($sock, $server_host, $msg, $port, $ipaddr, $hishost, $MAXLEN, $PORTNO, $TIMEOUT); $MAXLEN = 1024; $TIMEOUT = 5; $PFTBLVERSION = 2; $PFTBLCOMMAND = 1; # 0x01 - add, 0x02 - del, 0x03 -flush $PFTBLMASK = 32; $PFTBLNAME = spamzone; $PFTBLPORT = 56789; @servers = ('xxx.xxx.xxx.xxx','xxx.xxx.xxx.xxx'); foreach my $server_host (@servers) { $sock = IO::Socket::INET-new(Proto = 'udp', PeerPort = $PFTBLPORT, PeerAddr = $server_host) or die Creating socket: $!\n; $key = 20bytes_key; my $addr = $ARGV[0]; $addr =~ s/[^0-9.]//g; my $block = pack(C1 S1 C1,$PFTBLVERSION,$PFTBLCOMMAND,$PFTBLMASK).inet_aton($addr).pack(a32 N*,$PFTBLNAME,time()); $digest = hmac_sha1($block, $key); $block .= $digest; $sock-send($block) or die send: $!; }
bsd-airtools and Ralink
Hi ppls. On my EEEPC 1000H i cannot use any program which use direct access to my Ralink 2860 :( i'm not see any devices in /dev named ral0, but many programs, for example: wmwlmon, wmnetload see my card correctly. How i can resolve this problem ? Maybe who know some params for mknod or another way ?
Re: bsd-airtools and Ralink
Vadim Zhukov wrote: On Sunday 10 May 2009 22:40:18 Kaltashkin Eugene wrote: Hi ppls. On my EEEPC 1000H i cannot use any program which use direct access to my Ralink 2860 :( i'm not see any devices in /dev named ral0, but many programs, for example: wmwlmon, wmnetload see my card correctly. How i can resolve this problem ? Maybe who know some params for mknod or another way ? Well, you should start from reading some Unix literature first... Network devices are not presented in filesystem because it creates too much overhead. If you want to do that you should definitely go to Hurd... What programs do you run that require such access? What do you want to do this way? for example dstumbler zhecka:/home/zhecka# /usr/local/sbin/dstumbler usage: /usr/local/sbin/dstumbler device [-d] [-osn] [-m int] [-g gps device] [-l logfile] zhecka:/home/zhecka# /usr/local/sbin/dstumbler /dev/ral0 error: unable to ioctl device socket: Device not configured zhecka:/home/zhecka# /usr/local/sbin/dwepdump -w -s /dev/ral0 123 * dwepdump v0.2 by h1kari h1k...@dachb0den.com * * Copyright (c) Dachb0den Labs 2002 [http://dachb0den.com] * starting pcap capture loop... device: /dev/ral0 error: unable to open device for packet capture: /dev/ral0: Device not configured somebody generate wrong packets on my wifi channel and block access to my ap. i need dump some info from air packets for detect this intruder and block it by mac.
Re: bsd-airtools and Ralink
Nenhum_de_Nos wrote: somebody generate wrong packets on my wifi channel and block access to my ap. i need dump some info from air packets for detect this intruder and block it by mac. you should not use /dev/ral0. use just ral0 instead. dstumbler always print error message :(
Re: bsd-airtools and Ralink
Arnaud Bergeron wrote: 2009/5/10 Kaltashkin Eugene zhe...@gmail.com: Nenhum_de_Nos wrote: somebody generate wrong packets on my wifi channel and block access to my ap. i need dump some info from air packets for detect this intruder and block it by mac. you should not use /dev/ral0. use just ral0 instead. dstumbler always print error message :( You are missing: - dmesg - (in this case) output of ifconfig -a Without these everything you hear is just a shot in the dark. (Or completely useless). ok. dmesg cut ral0 at pci3 dev 0 function 0 Ralink RT2790 rev 0x00: apic 2 int 19 (irq 11), address 00:15:af:cb:b3:22 ral0: MAC/BBP RT2872 (rev 0x0200), RF RT2720 (MIMO 1T2R) dmesg cut pcidump -v 1:0:0: Ralink RT2790 0x: Vendor ID: 1814 Product ID: 0781 0x0004: Command: 0007 Status ID: 0010 0x0008: Class: 02 Subclass: 80 Interface: 00 Revision: 00 0x000c: BIST: 00 Header Type: 00 Latency Timer: 00 Cache Line Size: 08 0x0010: BAR mem 32bit addr: 0xfbef 0x0014: BAR empty () 0x0018: BAR empty () 0x001c: BAR empty () 0x0020: BAR empty () 0x0024: BAR empty () 0x0028: Cardbus CIS: 0x002c: Subsystem Vendor ID: 1814 Product ID: 2790 0x0030: Expansion ROM Base Address: 0x0038: 0x003c: Interrupt Pin: 01 Line: 0b Min Gnt: 00 Max Lat: 00 0x0040: Capability 0x01: Power Management 0x0050: Capability 0x05: Message Signaled Interrupts (MSI) 0x0070: Capability 0x10: PCI Express pcidump -v ifconfig ral0 ral0: flags=8843UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST mtu 1500 lladdr 00:15:af:cb:b3:22 priority: 0 groups: wlan egress media: IEEE802.11 autoselect (OFDM54 mode 11g) status: active ieee80211: nwid home chan 4 bssid 00:1d:7e:43:c6:bc 48dB nwkey 0xXX inet6 fe80::215:afff:fecb:b322%ral0 prefixlen 64 scopeid 0x2 inet 192.168.200.101 netmask 0xff00 broadcast 192.168.200.255 ifconfig ral0