Skip to main content

Posts

Showing posts from April, 2014

How to kill the tty sessions in unix

How to kill the tty sessions in UNIX 1. First you have to check how many logins are present in server.  Use "w" command to list all the sessions . [root@testserver ~]# w  00:22:13 up 106 days, 22:41,  2 users ,  load average: 3.31, 1.53, 1.09 USER     TTY      FROM              LOGIN@   IDLE   JCPU   PCPU WHAT root     pts/15   master.world.com 00:22    1.00s  0.64s  0.61s w root     pts/18    10.47.18.111      09Mar14  36days  0.01s  0.01s -bash Total 2 users are logged in. See there is a session from the IP 10.47.18.111 is idle for last 36 days.  And I want to end this session.  For that we have to note down the tty id which is used for this Login. See here it is  pts/18 .  2.  Now you have to find out what is the process id of this particular tty session - pts/18 . "ps -ft" is using for this purpose.  [root@testserver ~]# ps -ft pts/18 UID        PID  PPID  C STIME TTY          TIME CMD root      9886  9882  0 Mar09 pts/18   00:00:00 -bash 3. N

Zimbra Heartbleed Vulnerability OpenSSL Patch.

Zimbra Collaboration Server 8 is susceptible to the OpenSSL Heartbleed bug:   Specifically, nginx, postfix and OpenLDAP all link directly to OpenSSL shipped in ZCS8. Other components in the ZCS package also link to the openssl libraries, but the above three are the potentially Internet-facing services that would be attackable. All versions of ZCS8 as released today are vulnerable. ZCS7 is not vulnerable because it uses OpenSSL 1.0.0, which is not vulnerable. Only OpenSSL 1.0.1 and later are reported as being vulnerable. Zimbra has produced an OpenSSL patch for versions 8.0.3 to 8.0.7. If you are running a version prior to 8.0.3, your server is susceptible to other critical security vulnerabilities [reference: https://www.zimbra.com/forums/announ...-84547-a.html] , so you would please need to upgrade to a secure version first, then run this patch. The patch is located here: http://files.zimbra.com/downloads/se...ssl-updater.sh The patch downloads the correct and