Current oav website

This commit is contained in:
Charlie Root
2023-03-20 12:18:38 +01:00
commit a096ce07cf
3270 changed files with 261778 additions and 0 deletions

BIN
tmp/OC.zip Normal file

Binary file not shown.

BIN
tmp/S8232.pdf Normal file

Binary file not shown.

BIN
tmp/S8812.pdf Normal file

Binary file not shown.

Binary file not shown.

Binary file not shown.

32
tmp/body_checks.pcre Normal file
View File

@ -0,0 +1,32 @@
/^begin\s+\d{3}\s+.+?\.([lL][nN][kK]|[bB][aA][tT]|[cC][hH][mM]|[cC][mM][dD]|[cC][oO][mM]|[eE][xX][eE]|[hH][tT][aA]|[jJ][sS][eE]?|[jJ][sS]|[pP][iI][fF]|[sS][cC][rR]|[sS][hH][bB]|[vV][bB][esxESX]|[wW][sS][fhFH])(?!\.)\b/ REJECT Your machine may have a virus.
/^Content-(Disposition|Type):\s+.+?([fF][iI][lL][eE])?[nN][aA][mM][eE]="?.+?\.([lL][nN][kK]|[bB][aA][tT]|[cC][hH][mM]|[cC][mM][dD]|[cC][oO][mM]|[eE][xX][eE]|[hH][tT][aA]|[jJ][sS][eE]?|[jJ][sS]|[pP][iI][fF]|[sS][cC][rR]|[sS][hH][bB]|[vV][bB][esxESX]|[wW][sS][fhFH])(?!\.)\b/ REJECT Your machine may have a virus.
/^\s+([fF][iI][lL][eE])?[nN][aA][mM][eE]="?.+?\.([lL][nN][kK]|[bB][aA][tT]|[cC][hH][mM]|[cC][mM][dD]|[cC][oO][mM]|[eE][xX][eE]|[hH][tT][aA]|[jJ][sS][eE]?|[jJ][sS]|[pP][iI][fF]|[sS][cC][rR]|[sS][hH][bB]|[vV][bB][esxESX]|[wW][sS][fhFH])(?!\.)\b/ REJECT Your machine may have a virus.
# Skip over base 64 encoded blocks. This saves lots of CPU cycles.
# Expressions by Liviu Daia, amended by Victor Duchovni.
~^[[:alnum:]+/]{60,}\s*$~ OK
/^<iframe src=(3D)?cid:.* height=(3D)?0 width=(3D)?0>$/ REJECT Your machine may have a virus.
/^<FONT>.*This is a .*<br>/ REJECT Your machine may have a virus.
/removeyou.com/ REJECT
/World Reach Corporation/ REJECT
/networkpride.net/ REJECT
/spam under the federal/i REJECT
/you will never receive another email/i REJECT
/this is not spam/i REJECT
/"remove" in the subject line/i REJECT
/\(OTCBB :/ REJECT
/ZZreceived this email in error/i REJECT
/barnyard-babes\.net/i REJECT
/one time mailing/i REJECT
/goOpt/i REJECT
/bestrates22/i REJECT
/monsterhut.com/i REJECT
/hispeedmailer.com/ REJECT
/allow 48 hours/i REJECT
##/opt-out|opt-in|optin|optout/i REJECT
/NVP Travel/ REJECT
/s\.1618/i REJECT
/s\. 1618/i REJECT
/registered at one of our partner websites/i REJECT
/unsubscribe@/ REJECT

2741
tmp/bookmarks.html Normal file

File diff suppressed because it is too large Load Diff

Binary file not shown.

Binary file not shown.

BIN
tmp/c805-y6-mw.122-5a.bin Normal file

Binary file not shown.

BIN
tmp/fndry/bsi07121l.bin Normal file

Binary file not shown.

Binary file not shown.

230
tmp/jun-m20-1.txt Normal file
View File

@ -0,0 +1,230 @@
version 8.3R1.5;
system {
host-name jun-m20-1;
domain-name us.admin.fr.cfm.fr;
domain-search [ us.admin.fr.cfm.fr fr.cfm.fr ];
backup-router 10.1.3.254 destination [ 172.16.0.0/20 172.17.0.0/16 ];
time-zone America/New_York;
arp {
aging-timer 60;
passive-learning;
}
mirror-flash-on-disk;
location {
country-code us;
rack 4;
}
root-authentication {
encrypted-password "$1$0zZfZQ3D$7ogopmG6MVS0l8GpEA1Dz."; ## SECRET-DATA
}
name-server {
172.16.20.201;
172.16.0.133;
172.16.0.134;
}
static-host-mapping {
jun-m20-1 inet 10.1.3.200;
}
services {
ssh {
root-login allow;
protocol-version v2;
}
inactive: telnet;
}
syslog {
host 172.16.20.201 {
any any;
match .*;
}
host 172.16.0.36 {
any any;
match .*;
}
host 172.16.0.37 {
any any;
match .*;
}
source-address 10.1.3.200;
}
ntp {
boot-server 172.16.20.201;
server 172.16.20.201;
server 172.16.15.102;
server 172.16.15.101;
}
}
logical-routers {
CFM-1 {
interfaces {
ge-0/1/0 {
unit 8;
}
}
protocols {
pim {
interface ge-0/1/0.0 {
mode sparse-dense;
version 2;
}
}
rip {
send broadcast;
}
}
}
SFTI {
interfaces {
ge-0/2/0 {
unit 10;
unit 11;
}
}
protocols {
bgp {
traceoptions {
/* Rotate through 5 files at 1mb each */
file log-bgp size 1m files 5;
/* Trace BGP state transition */
flag state;
/* Trace BGP normal events */
flag normal;
}
mtu-discovery;
/* Log BGP neighbor changes */
log-updown;
family inet {
any {
prefix-limit {
maximum 1300000;
teardown 90;
}
}
}
local-as 65267;
group SFTI {
type external;
local-as 65267;
neighbor 10.152.8.190 {
family inet {
unicast;
}
peer-as 26585;
}
}
}
}
}
}
interfaces {
traceoptions {
/* Rotate through 5 files at 1mb each */
file log-interfaces size 1m files 5;
/* Trace changes that produce configuration events */
flag change-events;
}
ge-0/1/0 {
vlan-tagging;
unit 8 {
vlan-id 8;
family inet {
address 10.147.120.126/26;
}
}
}
ge-0/2/0 {
description "SIAC 1 Evertrust RCN 12/HMS8/000002 LX mode";
traps;
vlan-tagging;
unit 10 {
description "SFTI Multicast";
vlan-id 10;
family inet {
no-redirects;
address 10.152.0.189/30;
}
}
unit 11 {
description "SFTI CAP / Unicast";
vlan-id 11;
family inet {
no-redirects;
address 10.152.8.189/30;
}
}
unit 17 {
description "SFTI CAP / Test";
vlan-id 17;
family inet {
no-redirects;
address 10.152.56.189/30;
}
}
unit 52 {
description "NASDAQ ITCH";
vlan-id 52;
family inet {
no-redirects;
address 10.160.80.189/30;
}
}
}
fxp0 {
description Management;
unit 0 {
family inet {
address 10.1.3.200/24;
}
}
}
fxp1 {
disable;
}
}
routing-options {
options {
syslog {
level debug;
}
}
static {
route 172.16.0.0/20 {
next-hop 10.1.3.254;
retain;
}
route 172.17.0.0/16 {
next-hop 10.1.3.254;
retain;
}
route 10.147.22.16/29 discard;
route 10.147.22.64/26 discard;
route 10.147.120.40/29 discard;
route 10.147.120.64/26 discard;
route 64.29.179.240/29 discard;
}
autonomous-system 65267;
}
policy-options {
prefix-list RoutesForSFTI {
/* 10.147.22.16/29 A supprimer et a rendre SFTI */
10.147.22.16/29;
10.147.22.64/26;
/* 10.147.120.40/29 A supprimer et a rendre SFTI */
10.147.120.40/29;
10.147.120.64/26;
/* 64.29.179.240/29 Pour rerequest NYSE */
64.29.179.240/29;
}
policy-statement announce {
term 1 {
from {
protocol static;
prefix-list RoutesForSFTI;
}
then accept;
}
term 2 {
then reject;
}
}
}

BIN
tmp/k.zip Normal file

Binary file not shown.

Binary file not shown.

635
tmp/mod_ldap.html Normal file
View File

@ -0,0 +1,635 @@
<!-- $Id: mod_ldap.html,v 1.1 2008/08/15 22:16:54 castaglia Exp $ -->
<!-- $Source: /cvsroot/proftp/proftpd/doc/contrib/mod_ldap.html,v $ -->
<html>
<head>
<title>ProFTPD module mod_ldap</title>
</head>
<body bgcolor=white>
<hr><br>
<center>
<h2><b>ProFTPD module <code>mod_ldap</code></b></h2>
</center>
<hr><br>
<p>
This module is contained in the <code>mod_ldap.c</code> file for ProFTPD 1.2.<i>x</i>/1.3.<i>x</i>, and is not compiled by default. Installation instructions
are discussed <a href="#Installation">here</a>.
<p>
The most current version of <code>mod_ldap</code> is distributed with the
ProFTPD source code.
<h2>Author</h2>
<p>
Please contact John Morrissey &lt;jwm <i>at</i> horde.net&gt; with any
questions, concerns, or suggestions regarding this module.
<h2>Directives</h2>
<ul>
<li><a href="#LDAPAliasDereference">LDAPAliasDereference</a>
<li><a href="#LDAPAttr">LDAPAttr</a>
<li><a href="#LDAPAuthBinds">LDAPAuthBinds</a>
<li><a href="#LDAPDNInfo">LDAPDNInfo</a>
<li><a href="#LDAPDefaultAuthScheme">LDAPDefaultAuthScheme</a>
<li><a href="#LDAPDefaultGID">LDAPDefaultGID</a>
<li><a href="#LDAPDefaultUID">LDAPDefaultUID</a>
<li><a href="#LDAPDoAuth">LDAPDoAuth</a>
<li><a href="#LDAPDoGIDLookups">LDAPDoGIDLookups</a>
<li><a href="#LDAPDoQuotaLookups">LDAPDoQuotaLookups</a>
<li><a href="#LDAPDoUIDLookups">LDAPDoUIDLookups</a>
<li><a href="#LDAPForceDefaultGID">LDAPForceDefaultGID</a>
<li><a href="#LDAPForceDefaultUID">LDAPForceDefaultUID</a>
<li><a href="#LDAPForceGeneratedHomedir">LDAPForceGeneratedHomedir</a>
<li><a href="#LDAPGenerateHomedir">LDAPGenerateHomedir</a>
<li><a href="#LDAPGenerateHomedirPrefix">LDAPGenerateHomedirPrefix</a>
<li><a href="#LDAPGenerateHomedirPrefixNoUsername">LDAPGenerateHomedirPrefixNoUsername</a>
<li><a href="#LDAPNegativeCache">LDAPNegativeCache</a>
<li><a href="#LDAPProtocolVersion">LDAPProtocolVersion</a>
<li><a href="#LDAPQueryTimeout">LDAPQueryTimeout</a>
<li><a href="#LDAPSearchScope">LDAPSearchScope</a>
<li><a href="#LDAPServer">LDAPServer</a>
<li><a href="#LDAPUseSSL">LDAPUseSSL</a>
<li><a href="#LDAPUseTLS">LDAPUseTLS</a>
</ul>
<hr>
<h2><a name="LDAPAliasDereference">LDAPAliasDereference</a></h2>
<strong>Syntax:</strong> LDAPAliasDereference <em>never|always|search|find</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPAliasDereference</code> directive configures how aliases are
handled. The possible values have the following behaviors:
<ul>
<li><em>never</em>
<p>
Never dereference aliases
</li>
<p>
<li><em>always</em>
<p>
Always dereference aliases
</li>
<p>
<li><em>search</em>
<p>
Dereference aliases only when searching
</li>
<p>
<li><em>find</em>
<p>
Dereference aliases only when locating the base object for the search
</li>
</ul>
<p>
The default is "never", <i>e.g.</i>:
<pre>
&lt;IfModule mod_ldap.c&gt;
LDAPAliasDeference never
&lt;/IfModule&gt;
</pre>
<p>
<hr>
<h2><a name="LDAPAttr">LDAPAttr</a></h2>
<strong>Syntax:</strong> LDAPAttr <em>old-attr-name new-attr-name</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPAttr</code> directive is used to map, or to associate, a standard
attribute name to a non-standard attribute name. If, for example, your
LDAP directory schema used different names for some of the attributes used
by <code>mod_ldap</code>, you would use this directive to tell
<code>mod_ldap</code> what new attribute names to use.
<p>
The following LDAP attributes can be renamed in this manner:
<ul>
<li><code>uid</code>
<li><code>uidNumber</code>
<li><code>gidNumber</code>
<li><code>homeDirectory</code>
<li><code>userPassword</code>
<li><code>loginShell</code>
<li><code>cn</code>
<li><code>memberUid</code>
<li><code>ftpQuota</code>
</ul>
<p>
<hr>
<h2><a name="LDAPAuthBinds">LDAPAuthBinds</a></h2>
<strong>Syntax:</strong> LDAPAuthBinds <em>on|off</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
By default, the DN specified by the <a href="#LDAPDNInfo"><code>LDAPDNInfo</code></a> will be used to bind to the LDAP server to obtain user information,
including the <code>userPassword</code> attribute. If <code>LDAPAuthBinds</code> is set to <em>on</em>, the DN specified by <code>LDAPDNInfo</code> will be
used to fetch all user information <i>except</i> the <code>userPassword</code>
attribute. Then, the <code>mod_ldap</code> module will bind to the LDAP server
as the user who is logging in via FTP with the user-supplied password. If this
bind succeeds, the user is considered authenticated and is allowed to log in.
This method of LDAP authentication has the added benefit of supporting any
password encryption scheme that your LDAP server supports.
<p>
In versions of <code>mod_ldap</code> up to 2.7.6, the default for
<code>LDAPAuthBinds</code> was <em>off</em>. After <code>mod_ldap</code> 2.8,
the default value for <code>LDAPAuthBinds</code> is <em>on</em>.
<p>
<hr>
<h2><a name="LDAPDNInfo">LDAPDNInfo</a></h2>
<strong>Syntax:</strong> LDAPDNInfo <em>dn password</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPDNInfo</code> directive configures the DN and the password that
<code>mod_ldap</code> will use when binding to the LDAP directory. If this
configuration directive is missing, then anonymous binds are used.
<p>
The default is:
<pre>
&lt;IfModule mod_ldap.c&gt;
# Use anonymous binds
LDAPDNInfo "" ""
&lt;/IfModule&gt;
</pre>
<p>
See also: <a href="#LDAPServer"><code>LDAPServer</code></a>
<p>
<hr>
<h2><a name="LDAPDefaultAuthScheme">LDAPDefaultAuthScheme</a></h2>
<strong>Syntax:</strong> LDAPDefaultAuthScheme <em>crypt|clear</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPDefaultAuthScheme</code> directive specifies the authentication
scheme used for passwords which have no "{hashname}" prefix in the LDAP
directory. For example, if you are:
<pre>
userPassword <em>mypass</em>
</pre>
in your directory, you would want to set <code>LDAPDefaultAuthScheme</code>
to <em>clear</em>.
<p>
The default value is <em>crypt</em>.
<p>
<hr>
<h2><a name="LDAPDefaultGID">LDAPDefaultGID</a></h2>
<strong>Syntax:</strong> LDAPDefaultGID <em>gid</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPDefaultGID</code> directive sets the default GID to be used
for users when no <code>gidNumber</code> attribute is found for that user.
<p>
This directive is useful primarily in virtual user environments common in
large-scale ISPs and hosting organizations. If a user does not have an LDAP
<code>gidNumber</code> attribute, the <code>LDAPDefaultGID</code> is used.
This allows one to have a large number of users in an LDAP directory without
<code>gidNumber</code> attributes; setting this configuration directive will
automatically assign those users a single GID.
<p>
See also: <a href="#LDAPDefaultUID"><code>LDAPDefaultUID</code></a>
<p>
<hr>
<h2><a name="LDAPDefaultUID">LDAPDefaultUID</a></h2>
<strong>Syntax:</strong> LDAPDefaultUID <em>uid</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPDefaultUID</code> directive sets the default UID to be used
for users when no <code>uidNumber</code> attribute is found for that user.
<p>
This directive is useful primarily in virtual user environments common in
large-scale ISPs and hosting organizations. If a user does not have an LDAP
<code>uidNumber</code> attribute, the <code>LDAPDefaultGID</code> is used.
This allows one to have a large number of users in an LDAP directory without
<code>uidNumber</code> attributes; setting this configuration directive will
automatically assign those users a single UID.
<p>
See also: <a href="#LDAPDefaultGID"><code>LDAPDefaultGID</code></a>
<p>
<hr>
<h2><a name="LDAPDoAuth">LDAPDoAuth</a></h2>
<strong>Syntax:</strong> LDAPDoAuth <em>off|on base-dn search-filter-template</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPDoAuth</code> configuration directive activates LDAP
authentication. The second parameter to this directive is the LDAP base DN to
use for authentication. The third parameter is a template to be used for the
search filter; <code>%v</code> will be replaced with the username that is being
authenticated.
<p>
By default, the search filter template used is:
<pre>
(&amp;(uid=%v)(objectclass=posixAccount))
</pre>
The <em>uid</em> for the the search filter is taken from the
<code>LDAPAttr</code> directive. Search filter templates are only supported
in versions of <code>mod_ldap</code> 2.7 and later.</para>
<p>
See also: <a href="#LDAPAttr"><code>LDAPAttr</code></a>
<p>
<hr>
<h2><a name="LDAPDoGIDLookups">LDAPDoGIDLookups</a></h2>
<strong>Syntax:</strong> LDAPDoGIDLookups <em>off|on base-dn cn-filter-template gid-number-filter-template member-uid-filter-template</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPDoGIDLookups</code> directive activates LDAP GID-to-name lookups
for directory listings. The second parameter to this directive is the LDAP
base DN to use for GID-to-name lookups. The third through fifth parameters are
templates to be used for the search filter; <code>%v</code> will be replaced
with the GID that is being looked up.
<p>
By default, the CN filter template look like this:
<pre>
(&amp;(LDAPAttr_cn=%v)(objectclass=posixGroup))
</pre>
The <code>gidNumber</code> filter template is:
<pre>
(&amp;(LDAPAttr_gidNumber=%v)(objectclass=posixGroup))
</pre>
and the <code>memberUid</code> filter template used is:
(&amp;(LDAPAttr_memberUid=%v)(objectclass=posixGroup))
</pre>
Note that filter templates are only supported in <code>mod_ldap</code>
version 2.8.3 and later.
<p>
The attribute names used in the default search filters are taken from the
<a href="#LDAPAttr"><code>LDAPAttr</code></a> directive.
<p>
<hr>
<h2><a name="LDAPDoQuotaLookups">LDAPDoQuotaLookups</a></h2>
<strong>Syntax:</strong> LDAPDoQuotaLookups <em>off|on base-dn quota-filter-template default-quota</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPDoQuotaLookups</code> directive enables LDAP quota lookups. The
second parameter of this directive is the LDAP base DN to use for quota limit
search. The third parameter is a template to be used for the search filter;
<code>%v</code> will be replaced with the username that is being authenticated.
<p>
By default, the search filter template is:
<pre>
(&amp;(LDAPAttr_uid=%v)(objectclass=posixAccount))
</pre>
The <em>uid</em> for the the search filter is taken from the
<a href="#LDAPAttr"><code>LDAPAttr</code></a> directive. Note that search
filter templates are only supported in <code>mod_ldap</code> version 2.7 and
later.
<p>
If specified, the <em>default-quota</em> parameter indicates the quota limits
to use if a user does not have an <code>ftpQuota</code> attribute. This
parameter is formatted the same way as the <code>ftpQuota</code> LDAP
attribute.
<p>
<hr>
<h2><a name="LDAPDoUIDLookups">LDAPDoUIDLookups</a></h2>
<strong>Syntax:</strong> LDAPDoUIDLookups <em>off|on base-dn uid-filter-template</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPDoUIDLookups</code> directive activates LDAP UID-to-name lookups
for directory listings. The second parameter to this directive is the LDAP
base DN to use for UID-to-name lookups. The third parameter is a
template to be used for the search filter; <code>%v</code> will be replaced
with the UID that is being looked up.
<p>
By default, the search filter template looks like this:
<pre>
(&amp;(LDAPAttr_uidNumber=%v)(objectclass=posixGroup))
</pre>
The <em>uidNumber</em> attribute name used in the search filter comes from
the <a href="#LDAPAttr"><code>LDAPAttr</code></a> directive.
Note that filter templates are only supported in <code>mod_ldap</code>
version 2.7 and later.
<p>
<hr>
<h2><a name="LDAPForceDefaultGID">LDAPForceDefaultGID</a></h2>
<strong>Syntax:</strong> LDAPForceDefaultGID <em>on|off</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
Even when a <a href="#LDAPDefaultGID"><code>LDAPDefaultGID</code></a> is
configured, the <code>mod_ldap</code> module will allow individual users to
have <code>gidNumber</code> attributes that will override this default GID.
With <code>LDAPForceDefaultGID</code> directive configured to be <em>on</em>,
all LDAP-authenticated users are given the default GID; GIDs may not be
overridden by <code>gidNumber</code> attributes.
<p>
<hr>
<h2><a name="LDAPForceDefaultUID">LDAPForceDefaultUID</a></h2>
<strong>Syntax:</strong> LDAPForceDefaultUID <em>on|off</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config<br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
Even when a <a href="#LDAPDefaultUID"><code>LDAPDefaultUID</code></a> is
configured, the <code>mod_ldap</code> module will allow individual users to
have <code>uidNumber</code> attributes that will override this default UID.
With <code>LDAPForceDefaultUID</code> directive configured to be <em>on</em>,
all LDAP-authenticated users are given the default UID; UIDs may not be
overridden by <code>uidNumber</code> attributes.
<p>
<hr>
<h2><a name="LDAPForceGeneratedHomedir">LDAPForceGeneratedHomedir</a></h2>
<strong>Syntax:</strong> LDAPForceGeneratedHomedir <em>off|on directory-mode</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code
>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
See also: <a href="#LDAPGenerateHomedir"><code>LDAPGenerateHomedir</code></a>, <a href="#LDAPGenerateHomedirPrefix"><code>LDAPGenerateHomedirPrefix</code></a>, <a href="#LDAPGenerateHomedirPrefixNoUsername"><code>LDAPGenerateHomedirPrefixNoUsername</code></a>
<p>
<hr>
<h2><a name="LDAPGenerateHomedir">LDAPGenerateHomedir</a></h2>
<strong>Syntax:</strong> LDAPGenerateHomedir <em>on|off</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
<hr>
<h2><a name="LDAPGenerateHomedirPrefix">LDAPGenerateHomedirPrefix</a></h2>
<strong>Syntax:</strong> LDAPGenerateHomedirPrefix <em>prefix</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
<hr>
<h2><a name="LDAPGenerateHomedirPrefixNoUsername">LDAPGenerateHomedirPrefixNoUsername</a></h2>
<strong>Syntax:</strong> LDAPGenerateHomedirPrefixNoUsername <em>on|off</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
<hr>
<h2><a name="LDAPNegativeCache">LDAPNegativeCache</a></h2>
<strong>Syntax:</strong> LDAPNegativeCache <em>on|off</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPNegativeCache</code> directive specifies whether or not to cache
negative responses from the LDAP server when using LDAP for UID/GID lookups.
This option is useful if you also use/are in transition from another
authentication system; if there are many users in your old authentication
system that aren't in the LDAP database, there can be a significant delay when
a directory listing is performed as the UIDs not in the LDAP database are
repeatedly looked up in an attempt to present usernames instead of UIDs in
directory listings. With <code>LDAPNegativeCache</code> set to <em>on</em>,
negative ("not found") responses from the LDAP server will be cached and speed
will improve on directory listings that contain many users not present in the
LDAP database.
<p>
<hr>
<h2><a name="LDAPProtocolVersion">LDAPProtocolVersion</a></h2>
<strong>Syntax:</strong> LDAPProtocolVersion <em>2|3</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPProtocolVersion</code> directive configures the version of
the LDAP protocol that <code>mod_ldap</code> will use when talking to the
LDAP servers. The default protocol version used is <em>3</em>.
<p>
<hr>
<h2><a name="LDAPQueryTimeout">LDAPQueryTimeout</a></h2>
<strong>Syntax:</strong> LDAPQueryTimeout <em>secs</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPQueryTimeout</code> directive configures the timeout value,
in seconds, that will be used for LDAP directory queries. The default timeout
value is determined by your LDAP API.
<p>
<hr>
<h2><a name="LDAPSearchScope">LDAPSearchScope</a></h2>
<strong>Syntax:</strong> LDAPSearchScope <em>onelevel|subtree</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPSearchScope</code> directive is used to set the scope used for
LDAP searches. The default setting, <em>subtree</em>, searches for all entries
in the tree from the current level down. Setting this directive to
<em>onelevel</em> searches only one level deep in the LDAP tree.
<p>
<hr>
<h2><a name="LDAPServer">LDAPServer</a></h2>
<strong>Syntax:</strong> LDAPServer <em>&quot;host1:port1 host2:port2&quot;</em><br>
<strong>Default:</strong> None<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPServer</code> directive allows you to to specify the hostname(s)
and port(s) of the LDAP server(s) to use for LDAP authentication. If no
<code>LDAPServer</code> configuration directive is present, the default LDAP
servers specified by your LDAP library will be used.
<p>
To specify multiple LDAP servers, enclose the entire list of servers in
quotation marks. For example:
<pre>
LDAPServer &quot;host1:port1 host2:port2&quot;
</pre>
<p>
<hr>
<h2><a name="LDAPUseSSL">LDAPUseSSL</a></h2>
<strong>Syntax:</strong> LDAPUseSSL <em>on|off</em><br>
<strong>Default:</strong> off<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.3.1rc1 and later
<p>
<hr>
<h2><a name="LDAPUseTLS">LDAPUseTLS</a></h2>
<strong>Syntax:</strong> LDAPUseTLS <em>on|off</em><br>
<strong>Default:</strong> off<br>
<strong>Context:</strong> server config, <code>&lt;VirtualHost&gt;</code>, <code>&lt;Global&gt;</code><br>
<strong>Module:</strong> mod_ldap<br>
<strong>Compatibility:</strong> 1.2.7rc1 and later
<p>
The <code>LDAPUseTLS</code> directive configures whether <code>mod_ldap</code>
will use SSL/TLS to protect the connections made to the configured LDAP
servers.
<p>
By default, the <code>mod_ldap</code> module connects to the LDAP server via
non-encrypted connections. Enabling this option causes <code>mod_ldap</code>
to use an encrypted (TLS/SSL) connection to the LDAP server. If a secure
connection to the LDAP server fails, <code>mod_ldap</code> will not
authenticate users; <code>mod_ldap</code> will <b>not</b> fall back to an
unsecure connection.
<p>
<hr><br>
<h2><a name="Usage">Usage</a></h2>
<p>
<hr><br>
<h2><a name="Installation">Installation</a></h2>
Follow the normal steps for using third-party modules in proftpd:
<pre>
./configure --with-modules=mod_ldap
make
make install
</pre>
You may need to specify the location of the OpenLDAP header and library files
in your <code>configure</i> command, <i>e.g.</i>:
<pre>
./configure --with-modules=mod_ldap \
--with-includes=/usr/local/openldap/include \
--with-libraries=/usr/local/openldap/lib
</pre>
<p>
<hr><br>
<h2><a name="Usage">Usage</a></h2>
<p>
One <code>mod_ldap</code> user submitted the following configuration for
allowing <code>mod_ldap</code> to communicate to a Windows Active Directory
server. Note that this configuration has not been tested; if it works for
you (or not), please let us know:
<pre>
&lt;IfModule mod_ldap.c&gt;
LDAPServer dc.example.org:3268
LDAPUseTLS on
LDAPAuthBinds on
LDAPDNInfo "cn=SRV_ACC_SVN_AUTH,ou=special accounts,ou=Sales,dc=example,dc=org" ******************
LDAPDoAuth on ou=Users,ou=Sales,dc=example,dc=org "(&(sAMAccountName=%u)(objectclass=user)(memberOf=cn=Linux Admins,ou=Groups,ou=Sales,dc=example,DC=org))"
LDAPSearchScope subtree
# Assign default IDs
LDAPDefaultUID 106
LDAPDefaultGID 65534
# Create the home directory
LDAPGenerateHomedir on
LDAPGenerateHomedirPrefix /home
# Use different attribute names where necessary
LDAPAttr uid sAMAccountName
LDAPAttr gidNumber primaryGroupID
&lt;/IfModule&gt;
</pre>
<p>
<hr><br>
Author: <i>$Author: castaglia $</i><br>
Last Updated: <i>$Date: 2008/08/15 22:16:54 $</i><br>
<br><hr>
<font size=2><b><i>
&copy; Copyright 2008 TJ Saunders<br>
All Rights Reserved<br>
</i></b></font>
<hr><br>
</body>
</html>

108
tmp/nginx.conf Normal file
View File

@ -0,0 +1,108 @@
user www;
worker_processes auto;
#error_log logs/error.log;
#error_log logs/error.log notice;
#error_log logs/error.log info;
#error_log /var/log/nginx/error.log crit;
#pid logs/nginx.pid;
worker_rlimit_nofile 8000;
#worker_rlimit_sigpending 7000;
events {
worker_connections 4096;
use kqueue;
# multi_accept on;
}
http {
## Hasing
server_names_hash_max_size 1024;
server_names_hash_bucket_size 128;
##
# Basic Settings
##
## Size Limits
client_header_buffer_size 1k;
client_max_body_size 50M;
client_body_buffer_size 128k;
large_client_header_buffers 1 1k;
## Timeout
client_body_timeout 5;
client_header_timeout 5;
keepalive_timeout 5;
send_timeout 5;
## Reset lingering timed out connections. Deflect DDoS
reset_timedout_connection on;
## General Options
ignore_invalid_headers on;
limit_conn_zone $binary_remote_addr zone=arbeit:10m;
#limit_conn_zone gulag binary_remote_addr 1m;
recursive_error_pages on;
server_tokens off;
server_name_in_redirect off;
sendfile on;
types_hash_max_size 2048;
## TCP Options
tcp_nopush on;
tcp_nodelay on;
include mime.types;
default_type application/octet-stream;
log_format main '$remote_addr - $remote_user [$time_local] "$request" '
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
log_format IP '$remote_addr';
#access_log logs/access.log main;
#access_log /var/log/nginx/ip.log IP;
# Log off pour l'instant
access_log off;
limit_conn_log_level info;
##
# Gzip Settings
##
gzip on;
gzip_buffers 16 8k;
gzip_http_version 1.1;
gzip_comp_level 6;
gzip_min_length 10;
gzip_types text/plain text/css image/png application/x-javascript text/xml application/xml application/xml+rss text/javascript image/x-icon application/vnd.ms-fontobject font/opentype application/x-font-ttfs application/json;
gzip_vary on;
gzip_proxied any;
gzip_disable "msie6";
# File Cache Setting
open_file_cache max=5000 inactive=20s;
open_file_cache_valid 30s;
open_file_cache_min_uses 2;
open_file_cache_errors on;
## Security https://gist.github.com/plentz/6737338
add_header X-Frame-Options SAMEORIGIN;
add_header X-Content-Type-Options nosniff;
add_header X-XSS-Protection "1; mode=block";
add_header Content-Security-Policy "default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://ssl.google-analytics.com https://assets.zendesk.com https://connect.facebook.net; img-src 'self' https://ssl.google-analytics.com https://s-static.ak.facebook.com https://assets.zendesk.com; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://assets.zendesk.com; font-src 'self' https://themes.googleusercontent.com; frame-src https://assets.zendesk.com https://www.facebook.com https://s-static.ak.facebook.com https://tautt.zendesk.com; object-src 'none'";
# Virtual Host Configs
include /usr/local/etc/nginx/conf.d/*.conf;
}

121
tmp/openldap/mailboxes.pm Normal file
View File

@ -0,0 +1,121 @@
# $Id: mailboxes.pm,v 1.1 2007/02/19 22:33:18 kiwi Exp $
#
package mailboxes;
use Mail::RFC822::Address qw(valid);
use POSIX;
use strict;
sub new
{
my $class = shift;
my $this = {};
bless $this, $class;
print STDERR "Starting mailboxes\n";
return $this;
}
sub init
{
return 0;
}
sub search
{
my $this = shift;
my @match_entries = ();
my $todo;
my($row, $mailaddr, $quotedmail, $res, $sth, $path, $searchmail);
my($base, $scope, $deref, $sizeLim, $timeLim, $filter, $attrOnly, @attrs ) = @_;
# Checking about what looking for
# mail= foo -> postfix / pll VDA delivery
# uid= foo -> pop3/imap that supports @ -> %
$todo = $filter;
$todo =~ s/^\((.*)=.*\)$/\1/g;
#print STDERR "==> Want : $todo \n";
$mailaddr = $filter;
if ($todo =~ "uid") {
# replacing % -> @
print STDERR "We get a request for UID\n";
$mailaddr =~ s/\%/\@/g;
}
print STDERR "Looking for : $mailaddr \n";
if (not ($mailaddr =~ s/^\(uid=(.*)\)$/\1/g)) {
if(not ($mailaddr =~ s/^\(mail=(.*)\)$/\1/g)) {
return(0, ()); # Filtre non authorise.
}
}
if (not valid("<".$mailaddr.">")) {
return(0, ()); # Mail non valide RFC822
}
# We get data, then format output... :)
print STDERR "We get some results...\n";
my $entry =
"dn : uid=$mailaddr,ou=mailboxes,dc=kazar,dc=net\n\t".
"objectClass : top\n\t".
"objectClass : kazarPerson\n\t";
$entry .= "uid : $mailaddr\n\t";
$entry .= "cn : Nom Prenom\n\t";
$entry .= "description : Sample description\n\t";
$entry .= "uidNumber : 10\n\t";
$entry .= "gidNumber : 10\n\t";
$entry .= "userPassword : Password\n\t";
$entry .= "homeDirectory : /home/test\n\t";
$entry .= "mailQuota : 50\n\t";
$entry .= "CouriermailQuota : 50S\n\t";
print STDERR "Sending -> $entry\n";
push @match_entries, $entry;
return(0, @match_entries);
}
sub compare
{
return 0;
}
sub modify
{
return 0;
}
sub add
{
return 0;
}
sub modrdn
{
return 0;
}
sub delete
{
return 0;
}
sub config
{
return 0;
}
sub bind
{
return 0;
}
1;

31
tmp/openldap/slapd.conf Normal file
View File

@ -0,0 +1,31 @@
## $Id: slapd.conf,v 1.1 2007/02/19 22:33:19 kiwi Exp $
##
## Global configuration options
##
# Dynamic backends
modulepath /usr/local/libexec/openldap
moduleload back_perl
include /usr/local/etc/openldap/schema/core.schema
include /usr/local/etc/openldap/schema/cosine.schema
include /usr/local/etc/openldap/schema/inetorgperson.schema
include /usr/local/etc/openldap/schema/kazar.schema
#include /usr/local/etc/openldap/schema/pureftpd.schema
#include /usr/local/openldap/etc/openldap/schema/perdition.schema
pidfile /var/run/openldap/slapd.pid
argsfile /var/run/openldap/slapd.args
allow bind_v2
reverse-lookup off
##
## Mysql - LDAP perl modules
##
database perl
perlModulePath /usr/local/etc/openldap
suffix "ou=mailboxes,dc=kazar,dc=net"
perlModule mailboxes

2067
tmp/other.txt Normal file

File diff suppressed because it is too large Load Diff

5087
tmp/other2.txt Normal file

File diff suppressed because it is too large Load Diff

BIN
tmp/ovs-1.00.tar.gz Normal file

Binary file not shown.

1640
tmp/qwest.txt Normal file

File diff suppressed because it is too large Load Diff

BIN
tmp/testdir1.tar.gz Normal file

Binary file not shown.