Rechercher dans ce blog

lundi 7 mai 2012

How to make fetchmail happy with the YAHOO server’s SSL cert


Pour résoudre le problème indiqué dans le mail.log (solution un peu au pif en fonction de quelques informations que j'ai trouvées sur le net) :

fetchmail: Server certificate verification error: unable to get local issuer certificate
fetchmail: Server certificate verification error: certificate not trusted
fetchmail: Server certificate verification error: unable to verify the first certificate
Sous UBUNTU, première chose à essayer : mettre à jour les certificats :

apt-get upgrade ca-certificates

Redémarrer fetchmail et voir si le problème est corrigé.

Sinon essayer ceci.

Pour vérifier l'existence du répertoire fetchmail

ls -l /usr/local/etc/

Créer un répertoire de travail

mkdir /usr/local/etc/fetchmail
mkdir /usr/local/etc/fetchmail/certs

Se placer dans le répertoire de travail

cd /usr/local/etc/fetchmail/certs


openssl s_client -connect pop.mail.yahoo.fr:995 -showcerts > pop.mail.yahoo.fr.pem

vi pop.mail.yahoo.fr.pem

Cut and paste the stuff between the “—–BEGIN CERTIFICATE—–” and “—–END CERTIFICATE—–” lines (inclusive)

Vérifier dans l'output de la commande avant de couper BEGIN-END les lignes issuer

save & quit

Server certificate
subject=/C=US/ST=CA/L=Sunnyvale/O=Yahoo! Inc./OU=Yahoo/CN=pop.mail.yahoo.fr
issuer=/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert High Assurance CA-3

Télécharger le certificat indiqué sur le site

wget https://www.digicert.com/CACerts/DigiCertHighAssuranceCA-3.crt

Je ne pense pas que ce soit nécessaire pour résoudre le problème yahoo, mais pendant que j'y suis je télécharge tous les certificats disponibles...

wget https://www.digicert.com/testroot/DigiCertGlobalRootCA.crt
wget https://www.digicert.com/testroot/DigiCertHighAssuranceEVRootCA.crt
wget https://www.digicert.com/testroot/DigiCertAssuredIDRootCA.crt

Je rename tous les .crt en .pem (ici avec la commande ubuntu)

rename s/crt/pem/ *

Je place (copie) tous les certificats dans le répertoire ssl
cp *.pem  /etc/ssl/certs/

Rehash obligatoire du répertoire contenant les certificats.

c_rehash /etc/ssl/certs/

On vérifie que tout s'est bien passé et que les certificats sont présents et avec les liens symboliques produits par le hashage.

cd /etc/ssl/certs/
ls -l

On redémarre fetchmail

/etc/init.d/fetchmail restart

Le message d'erreur doit avoir disparu.

lundi 12 décembre 2011

ffmpeg compile && install mac os x

Prerequisites: LAME

MP3 is the audio codec most often used with Flash video, so you will need an MP3 encoder. FFmpeg doesn't include one, but it will use LAME, which creates good quality audio files, if you install it. Header files will be needed during the compile, so it is not enough to install a prebuilt binary using a package manager. Instead follow these directions to compile it from source:

Start by creating a working directory:

mkdir ~/lame
cd ~/lame

On a good day you can get the latest source code release of LAME from Sourceforge. The file you want will be named lame-3.97.tar.gz or something similar.

After downloading and unpacking the source or checking it out from CVS, change to the main directory and then enter the three commands which are typically used to build open source projects:

cd lame-3.97
./configure
make
sudo make install

First create a working directory:

mkdir ~/ffmpeg
cd ~/ffmpeg

The up-to-date version of FFmpeg generally compiles cleanly, and that is the version you usually will want:

svn checkout svn://svn.ffmpeg.org/ffmpeg/trunk ffmpeg
cd ffmpeg

Next, configure and make

./configure --enable-libmp3lame --enable-shared \
  --disable-mmx --arch=x86_64
make
sudo make install

The --disable-mmx flag is not required on a PowerPC. If you leave it out on an Intel Mac, you will probably get a compile error, but it's worth trying since it will provide a speed boost.


lundi 7 novembre 2011

system_profiler - mac os X leopard - hardware listing

Pour obtenir une liste du matériel installé sur un pc tournant sous mac os x (testé sous leopard) utiliser en ligne de commande : system_profiler

Possibilité de ne lister que certain type de matériel, etc.

dimanche 6 novembre 2011

dmidecode

Pour obtenir sous linux / ubuntu 8.04 une liste détaillée du matériel présent sur une machine, utiliser la commande : dmidecode

DESCRIPTION

dmidecode is a tool for dumping a computer's DMI (some say SMBIOS) table contents in a human-readable format. This table contains a description of the system's hardware components, as well as

other useful pieces of information such as serial numbers and BIOS revision. Thanks to this table, you can retrieve this information without having to probe for the actual hardware. While this

is a good point in terms of report speed and safeness, this also makes the presented information possibly unreliable.

The DMI table doesn't only describe what the system is currently made of, it also can report the possible evolutions (such as the fastest supported CPU or the maximal amount of memory sup-

ported).

SMBIOS stands for System Management BIOS, while DMI stands for Desktop Management Interface. Both standards are tightly related and developed by the DMTF (Desktop Management Task Force).

samedi 5 novembre 2011

To reset a forgotten administrator password

Found this trick on http://4sysops.com/archives/forgot-the-administrator-password-the-sticky-keys-trick/

  • Boot from Windows PE or Windows RE and access the command prompt.
  • Find the drive letter of the partition where Windows is installed. In Vista and Windows XP, it is usually C:, in Windows 7, it is D: in most cases because the first partition contains Startup Repair. To find the drive letter, type C: (or D:, respectively) and search for the Windows folder. Note that Windows PE (RE) usually resides on X:.
  • Type the following command (replace “c:” with the correct drive letter if Windows is not located on C:):
    copy c:\windows\system32\sethc.exe c:\
    This creates a copy of sethc.exe to restore later.
  • Type this command to replace sethc.exe with cmd.exe:
    copy /y c:\windows\system32\cmd.exe c:\windows\system32\sethc.exe
    Reboot your computer and start the Windows installation where you forgot the administrator password.
  • After you see the logon screen, press the SHIFT key five times.
  • You should see a command prompt where you can enter the following command to reset the Windows password (see screenshot above):
    net user your_user_name new_password
    If you don’t know your user name, just type net user to list the available user names.
  • You can now log on with the new password.

jeudi 16 juin 2011

chflags flags access lists mac os x

Pour gérer les flags (attrib) sur mac os x utiliser la commande : chflags

Attention pour certaines options il faut être root

Par exemple pour autoriser le changement de owner :

chflags nouchg filename

Pour voir les flags d'un fichier : ls -lO

DESCRIPTION

   The chflags utility modifies the file flags of the listed files as speci-

   fied by the flags operand.

   The options are as follows:

   -H If the -R option is specified, symbolic links on the command line

   are followed. (Symbolic links encountered in the tree traversal

   are not followed.)

   -L If the -R option is specified, all symbolic links are followed.

   -P If the -R option is specified, no symbolic links are followed.

   This is the default.

   -R Change the file flags for the file hierarchies rooted in the

   files instead of just the files themselves.

   The flags are specified as an octal number or a comma separated list of

   keywords. The following keywords are currently defined:

   arch, archived

   set the archived flag (super-user only)

   opaque set the opaque flag (owner or super-user only). [Directory

   is opaque when viewed through a union mount]

   nodump set the nodump flag (owner or super-user only)

   sappnd, sappend

   set the system append-only flag (super-user only)

   schg, schange, simmutable

   set the system immutable flag (super-user only)

   uappnd, uappend

   set the user append-only flag (owner or super-user only)

   uchg, uchange, uimmutable

   set the user immutable flag (owner or super-user only)

   hidden set the hidden flag [Hide item from GUI]

   As discussed in chflags(2), the sappnd and schg flags may only be unset   when the system is in single-user mode.
   Putting the letters ``no'' before or removing the letters ``no'' from a   keyword causes the flag to be cleared. For example:
   nouchg clear the user immutable flag (owner or super-user only)   dump clear the nodump flag (owner or super-user only)
   Unless the -H or -L options are given, chflags on a symbolic link always   succeeds and has no effect. The -H, -L and -P options are ignored unless   the -R option is specified. In addition, these options override each   other and the command's actions are determined by the last one specified.
   You can use "ls -lO" to see the flags of existing files.
EXIT STATUS   The chflags utility exits 0 on success, and >0 if an error occurs.
SEE ALSO   ls(1), chflags(2), stat(2), fts(3), symlink(7)
HISTORY   The chflags command first appeared in 4.4BSD.
BUGS   Only a limited number of utilities are chflags aware. Some of these   tools include ls(1), cp(1), find(1), install(1), dump(8), and restore(8).   In particular a tool which is not currently chflags aware is the pax(1)   utility.