I had a requirement for a Serial Bridge, eg: serial->Network->serial, I found a nice page with some options, Â socat to be good enough for what I needed.
Server (ListeningÂ Side connected to end device)
socat -v -d -d tcp-l:54321,reuseaddr,fork file:/dev/ttyS0,nonblock,raw,echo=0,waitlock=/tmp/ttyS0.lock
Client (connecting to server)
socat -v -d -d tcp:22.214.171.124:54321 file:/dev/ttyS0,nonblock,raw,echo=0,lockfile=/tmp/ttyS0.lock
Alternative using Virtual PTY and SSH remote exec
socat PTY,link=$HOME/dev/vmodem0,raw,echo=0,wait-slave EXEC:'"ssh modemserver.us.org socat - /dev/ttyS0,nonblock,raw,echo=0"'
I always forget how to get the driver info out of windbg
!analyze -v;r;kv;lmtn;lmtsmn;.bugcheck;!sysinfo cpuinfo;!sysinfo machineid; !sysinfo cpuspeed; !sysinfo smbios .logclose
If your getting errors about symbols, use !symfixÂ remember to restart windbg afterwards.
Yet another faulty disk with bad blocks has me wondering how to check the MD array for consistancy, found a good post about it.
sudo bash -c "echo check > /sys/block/md0/md/sync_action"
sudo bash -c "echo repair >/sys/block/md0/md/sync_action"
Went for a Bash with Joffa today, nice jump, got some good air time. Joffa’s done a top job on the Vid as usual.
Finally found a way to dump packets on a Cisco Router for tracing.
Router (config)# logging buffered 15000 (this creates a large enough buffer to look at locally on the router,or you can configure the router to log the ACL matches to a Syslog Server).
Router (config)# access-list 101 permit tcp any gt 0 any gt 0 log
Router (config)# access-list 101 permit udp any gt 0 any gt 0 log
Router (config)# access-list 101 permit icmp any any
Router (config)# access-list 101 permit ip any any log (this entry is a â€œcatch-allâ€)
Router (config)# interface interfaceRouter (config-if)# ip access-group 101 in
Look at the log by using the show log command from the exec prompt. You should see IP addresses (source and destination), along with the used TCP or UDP ports (in parentheses):
One of the issues with the above is rate limiting on access-list’s, another way to trace packets is with debug, while this can be dangous, it can be usefull to. No need to use log in the access list.
no ip cef
!disable route cache
no ip route-cache
debug ip packet detail 101
Ordered a new flying wing for myself, the Teksumo looks like it will be a goodÂ versatileÂ wing, a bit cheaper than the Swift II, and easier to handle than theÂ Ritewing Zephyr II.
Look like i’ll need to check out how to use kerberos auth in squid rather than ntlm
[2012/03/06 15:25:47.488709, 1] libsmb/ntlmssp.c:342(ntlmssp_update)
got NTLMSSP command 3, expected 1
“The “3” and “1” have been explained as the difference between NTLM vsÂ Kerberos.Â
As far as I can tell “3” means Kerberos is being used. “1” is NTLM.Â
The ntlm_auth helper only checks NTLM and the squid_kerb_auth helper isÂ needed instead for Kerberos.Â
Looks to me like the client is broken and using Kerberos when offeredÂ NTLM as the only available auth option. “
Nice Article about Kerberos may help