Blackhole Documentation

Size: px
Start display at page:

Download "Blackhole Documentation"

Transcription

1 Blackhole Documentation Release Kura April 30, 2013

2

3 CONTENTS 1 Using the blackhole.io service Testing via telnet Testing SSL Getting the source code 5 3 Running your own server Python versions Third party libraries Getting started Tests & Coverage Running tests manually Third party CI/Coverage Blackhole + PyPy 15 6 FAQ 17 7 Reference blackhole.connection blackhole.data blackhole.log blackhole.opts blackhole.ssl_utils blackhole.state blackhole.utils Indices and tables 23 Python Module Index 25 i

4 ii

5 Y8bod8P o888o Y888""8o Y8bod8P o888o o888o o888o o888o Y8bod8P o888o Y8bod8P Y8P o888o Y8b.o8 oooo oooo oooo oooo o8o " " 888oooo. 888.oooo..ooooo. 888 oooo 888.oo..ooooo. 888.ooooo. oooo.oo d88 88b 888 P )88b d88 "Y P 888P"Y88b d88 88b 888 d88 88b 888 d oP" ooo d8( o b o.o Blackhole is a Tornado powered MTA (mail transport agent) that is designed for handling large volumes of without handling any of the messages and doing no disk bound I/O. Blackhole is designed mostly for testing purposes and can be used to test numerous things suchs as; send rates, if you need to test how much mail you can send per minute, hour etc integration testing and finally if you work in the real world, chances are you ll need work on a copy of production data from time to time. You can try to anonymous all the data but there is always a chance you ll miss something. Configuring blackhole as your applications default SMTP gateway will remove any chance of a real person receiving an they shouldn t have received. CONTENTS 1

6 2 CONTENTS

7 CHAPTER ONE USING THE BLACKHOLE.IO SERVICE All data sent to blackhole.io will be forgotten instantly, we store nothing you send. 1. Point your application s outgoing SMTP server to blackhole.io, 2. Sit back and watch mail never get delivered to a real user. or, send an to blackhole.io using address, any address is fine e.g.: user1@blackhole.io 1.1 Testing via telnet $ telnet blackhole 25 Trying Connected to blackhole.io. Escape character is ^] OK, ready HELO fake.mail.server OK, done MAIL FROM:<user@address.tld> OK, done RCPT TO:<someone@another.tld> OK, done DATA Start mail input; end with <CRLF>.<CRLF> To: Someone <someone@another.tld> From: User <user@address.tld> Subject: Bye Bye bye OK, user not local, will forward QUIT Thank you for speaking to me Connection closed by foreign host. 1.2 Testing SSL 3

8 $ openssl s_client -connect blackhole.io:465 CONNECTED( ) depth=0 C = GB, ST = London, L = London, O = blackhole.io, OU = blackhole.io, CN = blackhole.io, emai... snip OK, ready HELO fake.mail.server OK, done MAIL FROM:<user@address.tld> OK, done RCPT TO:<someone@another.tld> OK, done DATA Start mail input; end with <CRLF>.<CRLF> To: Someone <someone@another.tld> From: User <user@address.tld> Subject: Bye Bye bye OK, user not local, will forward QUIT Thank you for speaking to me DONE 4 Chapter 1. Using the blackhole.io service

9 CHAPTER TWO GETTING THE SOURCE CODE The source code is available under the MIT license from GitHub. 5

10 6 Chapter 2. Getting the source code

11 CHAPTER THREE RUNNING YOUR OWN SERVER 3.1 Python versions Python 2.6 Python 2.7 Python 3.2 Python 3.3 PyPy 1.9 PyPy 2.0 # see notes below # see notes below Blackhole works on Python 2.6 and 2.7, it also works with PyPy (see Blackhole + PyPy section below). 3.2 Third party libraries tornado>=2.2.1,<=3.1 setproctitle>=1.1.6 deiman>=0.1.4 # setproctitle and above are required for all PyPy versions # older version of Deiman will not work because of API changes 3.3 Getting started Installation Packaged From PyPI pip install blackhole Or easy_install blackhole From GitHub pip install -e git+git://github.com/kura/blackhole.git#egg=blackhole 7

12 From source Download the latest tarball from PyPI or GitHub. Unpack and run: python setup.py install Configuration options Configuration options can be passed via the command line as below: SSL options --workers=num Number of child workers to spawn (default: # of CPUs/cores + 1 master) --host=ip IP address to bind go (default: ) --port=port Port to listen for connections on (default: 25) --pid=file --log=file --user=user --group=group --mode=mode --debug=bool --ssl=bool File to write process information to (default: /tmp/blackhole.pid) File to write logs to (not very verbose) (default: /tmp/blackhole.log) User to drop privs to during run time. (default: blackhole) Group to drop privs to during run time. (default: blackhole) Mode to run blackhole in (accept, bounce, random, unavailable, offline) (default: accept) - see Modes section Will set the debug flag and causes all received and sent command/ data to be logged. Will degrade performance with high throughput (default: False) Enabled or disable SSL, requires SSL compiled in to Python and OpenSSL. True or False (default: True) --ssl_port=port Port to listen for SSL enabled connections (default: 465) --ssl_key=path --ssl_cert=path X509 SSL keyfile X509 SSL certificate file You can also specify the conf option to load configuration from a file: --conf=file Config file to parse and use. Overrides command line args For more information on the configuration file format read Configuration file example. Deprecated options The following options are deprecated and should not be used. --ssl_ca_certs_dir=path Path to your operating system s repository of certificates authorities (default: None) Configuration file example 8 Chapter 3. Running your own server

13 host=" " port=25 pid="/tmp/blackhole.io" mode="offline" ssl_key=/etc/ssl/private/blackhole.io.key ssl_cert=/etc/ssl/certs/blackhole.io.crt Debug Flag After much debate and several s from developers a debug flag has been added to blackhole. You can enable debug using command line options Configuration options or via the configuration file Configuration file example. Enabling the debug flag will log all incoming and outgoing commands to the blackhole log file as well as all data sent after a DATA command. Each connection/ gets it s own unique identifier, this indentifier uses only hexidecimal characters and is 10 character in length, which means at some point the identifier will be reused. Example debug output :30:30,788 - Connection from :30:31,813 - [9AF260AB7F] RECV: HELO :30:31,814 - [9AF260AB7F] SEND: OK, done :30:35,074 - [9AF260AB7F] RECV: MAIL FROM:<1@1.com> :30:35,075 - [9AF260AB7F] SEND: OK, done :30:38,402 - [9AF260AB7F] RECV: RCPT TO:<2@2.com> :30:38,402 - [9AF260AB7F] SEND: OK, done :30:40,573 - [9AF260AB7F] RECV: DATA :30:40,573 - [9AF260AB7F] SEND: Start mail input; end with <CRLF>.<CRLF> :30:47,143 - [9AF260AB7F] RECV: From: <1@1.com> :30:52,181 - [9AF260AB7F] RECV: To: <2@2.com> :30:54,647 - [9AF260AB7F] RECV: Subject: Testing debug :30:56,550 - [9AF260AB7F] RECV: Hi 2@2.com :30:57,372 - [9AF260AB7F] RECV: This is a debug message :30:58,286 - [9AF260AB7F] RECV: :30:58,287 - [9AF260AB7F] SEND: OK, done :31:04,023 - [9AF260AB7F] RECV: QUIT :31:04,024 - [9AF260AB7F] SEND: Thank you for speaking to me :31:04,024 - Closing Controlling the server The following commands are for use when using blackhole without an init script. blackhole start Starts the server blackhole stop Stops the server blackhole restart Restarts the server blackhole status Shows the status of the server, running, not running etc For more information on controlling the server using init.d/rc.d read Controlling the server with init.d/rc.d Getting started 9

14 3.3.6 Controlling the server with init.d/rc.d /etc/init.d/blackhole start /etc/init.d/blackhole stop /etc/init.d/blackhole restart /etc/init.d/blackhole status Starts the server Stops the server Restarts the server Shows the status of the server, running, not running etc Installating the init.d/rc.d scripts The init script depends on /etc/blackhole.conf being in place and configured. Blackhole comes with a script that works with init.d/rc.d, to install it copy it from the init.d/your_distro folder in the root directory of this project to /etc/init.d/. The init scripts can be found here. i.e. for Debian/Ubuntu users, mv the file from init.d/debian-ubuntu/ to /etc/init.d/. Then make sure it s executable: chmod +x /etc/init.d/blackhole To make blackhole start on a reboot use the following: update-rc.d blackhole defaults Modes The server can run in several different modes, these are outlined below. See the Response codes section for more information on responses and which mode responds with which codes accept Accept all with code 250, 251, 252 or bounce Bounce all with a random code, excluding 250, 251, 252, random Randomly accept or bounce all with a random code unavailable Server always respondes with code service is unavailable offline Server always responds with code server does not accept mail. 10 Chapter 3. Running your own server

15 Response codes All Code message 220 OK, ready 221 Thank you for speaking to me 250 OK, done 251 OK, user not local, will forward 252 OK, cannot VRFY user but will attempt delivery 253 OK, messages pending 354 Start mail input; end with <CRLF>.<CRLF> 355 Octet-offset is the transaction offset 421 Service not available, closing transmission channel 450 Requested mail action not taken: mailbox unavailable 451 Requested action aborted: local error in processing 452 Requested action not taken: insufficient system storage 454 TLS not available due to temporary reason 458 Unable to queue message 459 Not allowed: unknown reason 500 Command not recognized 501 Syntax error, no parameters allowed 502 Command not implemented 503 Bad sequence of commands 504 Command parameter not implemented 521 Machine does not accept mail 530 Must issue a STARTTLS command first 534 Authentication mechanism is too weak 538 Encryption required for requested authentication mechanism 550 Requested action not taken: mailbox unavailable 551 User not local 552 Requested mail action aborted: exceeded storage allocation 553 Requested action not taken: mailbox name not allowed 554 Transaction failed 571 Blocked Accept This mode will respond with the following codes: Codes Bounce This mode will respond with the following codes: Codes Getting started 11

16 Offline This mode will respond with the following codes: Codes 521 Unavailable This mode will respond with the following codes: Codes Chapter 3. Running your own server

17 CHAPTER FOUR TESTS & COVERAGE 4.1 Running tests manually Running tests manually is pretty simple, there is a Make target dedicated to it. The test suite relies on unittest2 and nose, both if which get installed by the Make target during test running. make tests There is also a Make target for generating coverage: make coverage 4.2 Third party CI/Coverage You can find the latest build status on travis. And the test coverage report on coveralls. 13

18 14 Chapter 4. Tests & Coverage

19 CHAPTER FIVE BLACKHOLE + PYPY PyPy is a Python interpreter and just-in-time compiler. PyPy focuses on speed, efficiency and compatibility with the original CPython interpreter. Blackhole works well under PyPy 1.9, 2.0 beta1 and 2.0 beta2, you can see performance improvements of up to 30% in certain situations. However, blackhole does have issues with both PyPy 1.9 and 2.0 beta1 and 2.0 beta2 when using the pre-compiled binaries, this is due to a conflict in the version of OpenSSL compiled in to PyPy and the version compiled in to your CPython installation. If you wish to use blackhole with SSL support on PyPy I suggest you either compile PyPy yourself or try to make sure your PyPy and CPython have the same versions. 15

20 16 Chapter 5. Blackhole + PyPy

21 CHAPTER SIX FAQ A few people have ed me questions about why blackhole exists, how I use it, why Tornado and things like that so I have outlined some questions and responses in an faq. 17

22 18 Chapter 6. FAQ

23 CHAPTER SEVEN REFERENCE 7.1 blackhole.connection Provide mechanisms for processing socket data. This module provides methods for Blackhole to use internally for binding and listening on sockets as well as process all incoming socket data and responding appropriately blackhole.connection blackhole.connection.sockets() Spawn a looper which loops over socket data and creates the sockets. It should only ever loop over a maximum of two - standard (std) and SSL (ssl). This way we re able to detect incoming connection vectors and handle them accordingly. A dictionary of sockets is then returned to later be added to the IOLoop. blackhole.connection.connection_stream(connection) Detect which socket the connection is being made on, create and iostream for the connection, wrapping it in SSL if connected over the SSL socket. The parameter connection is an instance of socket from stdlib. blackhole.connection.handle_command(line, mail_state) Handle each SMTP command as it s sent to the server mail_state is an instance of black- The paramater line is the currently stream of data ending in n. hole.state.mailstate. blackhole.connection.connection_ready(sock, fd, events) Accepts the socket connections and passes them off to be handled. sock is an instance of socket. fd is an open file descriptor for the current connection. events is an integer of the number of events on the socket. blackhole.connection.write_response(stream, mail_state, resp) Write the response back to the stream 7.2 blackhole.data Provides SMTP response codes and methods for returning the correct response code. 19

24 This module contains all usable SMTP response codes for returning through the socket. It also provides mechanisms for picking response codes that mean a mail message has been accepted, rejected or that the server is offline blackhole.data blackhole.data.response(response) Return an SMTP response code and message. response an string refering to the code you wish to return. blackhole.data.get_response() Get our response from available responses based on configuration settings. blackhole.data.random_choice(response_list) Pick a random choice for the configured choices dictionary. response_list is a list of available response types from blackhole.data, this can be: - AC- CEPT_RESPONSES - BOUCNE_RESPONSES - OFFLINE_RESPONSES - UNAVAILABLE_RESPONSES - RANDOM_RESPONSES blackhole.data.response_message(response) Format our response in ESMTP format. response is a string containing the reponse code you wish to return. 7.3 blackhole.log Logging configuration for the blackhole server. 7.4 blackhole.opts Command line options for the blackhole server. Also creates a list of available ports for the server to be run on, based on configuration and responds with the help menu when requested or invalid options are given blackhole.opts blackhole.opts.ports() Create and return a list of sockets we need to create. A maximum of two will be returned, default is standard (std) and SSL (ssl) it is enabled. blackhole.opts.print_help(file) Prints all the command line options to stdout. 7.5 blackhole.ssl_utils Utility functions for SSL wrapped sockets. This module provides a simple default SSL configuration for the blackhole server and also exposes a custom BlackholeSSLException for SSL-based exceptions. 20 Chapter 7. Reference

25 7.5.1 blackhole.ssl_utils exception blackhole.ssl_utils.blackholesslexception A simple Exception class blackhole.ssl_utils.verify_ssl_opts() Verify our SSL configuration variables are correctly set-up. 7.6 blackhole.state State object for the current connection blackhole.state class blackhole.state.mailstate A state object used for remembering the current connections place in our runtime. This is mostly used for figuring out if we re receiving SMTP commands or have trigger the DATA command. _id ID is used to assign commands sent and received against an /connection ID. Only utilized when debug flag is set. reading MailState s reading property, used for figuring out where we are in the state chain. 7.7 blackhole.utils A utility module used for methods and features that do not belong in their own module blackhole.utils blackhole.utils.setgid() Change our existing group. Used to drop from root privileges down to a less privileged group. MUST be called BEFORE setuid, not after. blackhole.utils.setuid() Change our existing user. Used to drop from root privileges down to a less privileged user MUST be called AFTER setgid, not before. blackhole.utils.terminate(signum, frame) Terminate the parent process and send signals to shut down it s children Iterates over the child pids in the frame and sends the SIGTERM signal to shut them down. blackhole.utils.set_process_title() Set the title of the process. If the process is the master, set a master title, otherwise set worker blackhole.state 21

26 blackhole.utils. _id() Generate an HEX ID to assign to each connection. Will be reused later down the line due to the limited number of characters. 22 Chapter 7. Reference

27 CHAPTER EIGHT INDICES AND TABLES genindex modindex search 23

28 24 Chapter 8. Indices and tables

29 PYTHON MODULE INDEX b blackhole.connection (Unix), 19 blackhole.data (Unix), 19 blackhole.log (Unix), 20 blackhole.opts (Unix), 20 blackhole.ssl_utils (Unix), 20 blackhole.state (Unix), 21 blackhole.utils (Unix), 21 25

Appendix. Web Command Error Codes. Web Command Error Codes

Appendix. Web Command Error Codes. Web Command Error Codes Appendix Web Command s Error codes marked with * are received in responses from the FTP server, and then returned as the result of FTP command execution. -501 Incorrect parameter type -502 Error getting

More information

Error Codes have 3 Digits

Error Codes have 3 Digits The top portion covers bounce back messages. The x.x.x The xxx Examples of real Error messages with an explaination. (the email client errors coming in the future) The 2nd half covers email connection

More information

simplevisor Documentation

simplevisor Documentation simplevisor Documentation Release 1.2 Massimo Paladin June 27, 2016 Contents 1 Main Features 1 2 Installation 3 3 Configuration 5 4 simplevisor command 9 5 simplevisor-control command 13 6 Supervisor

More information

ECOM100 Send (EC ) Theory of Operation. Table of Contents

ECOM100 Send  (EC ) Theory of Operation. Table of Contents Table of Contents Table of Contents...1 1. CPU Firmware...2 2. ECOM100 Firmware Must Support SMTP Client Protocol...2 3. Slot Placement...2 4. ECOM100 TCP/IP Configuration...2 5. Dipswitch 7 on the ECOM100

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

turbo-hipster Documentation

turbo-hipster Documentation turbo-hipster Documentation Release 0.1 Joshua Hesketh October 07, 2015 Contents 1 Turbo-hipster 3 1.1 Turbo-hipster and Zuul.......................................... 3 1.2 Typical workflow diagram........................................

More information

Answer to the written exam given on TDTS06 Computer networks, October 23,

Answer to the written exam given on TDTS06 Computer networks, October 23, Answer to the written exam given on TDTS06 Computer networks, October 23, 2009 --------------------------------------------------------------------- Answers provided by Juha Takkinen, IDA, juha.takkinen@liu.se.

More information

Exception Codes and Module Numbers Used in Cisco Unified MeetingPlace Express

Exception Codes and Module Numbers Used in Cisco Unified MeetingPlace Express CHAPTER 4 and Module Numbers Used in Cisco Unified MeetingPlace Express This chapter contains information about the exception codes used in the Cisco Unified MeetingPlace Express system. After reviewing

More information

bottle-rest Release 0.5.0

bottle-rest Release 0.5.0 bottle-rest Release 0.5.0 February 18, 2017 Contents 1 API documentation 3 1.1 bottle_rest submodule.......................................... 3 2 What is it 5 2.1 REST in bottle..............................................

More information

Remote Exploit. compass-security.com 1

Remote Exploit. compass-security.com 1 Remote Exploit compass-security.com 1 Content Intel Architecture Memory Layout C Arrays Buffer Overflow BoF Exploit Assembler Shellcode Function Calls Debugging Remote Exploit Exploit Mitigations Defeat

More information

helper Documentation Release Gavin M. Roy

helper Documentation Release Gavin M. Roy helper Documentation Release 2.1.0 Gavin M. Roy September 24, 2013 CONTENTS i ii helper is a command-line/daemon application wrapper package with the aim of creating a consistent and fast way to creating

More information

21.1 FTP. Connections

21.1 FTP. Connections 21.1 FTP File Transfer Protocol (FTP) is the standard mechanism provided by TCP/IP for copying a file from one host to another. Although transferring files from one system to another seems simple and straightforward,

More information

The Application Layer: & SMTP

The Application Layer:  & SMTP The Application Layer: email & SMTP Smith College, CSC 249 Feb 1, 2018 4-1 Chapter 2: Application layer q 2.1 Principles of network applications q 2.2 Web and HTTP q 2.3 FTP q 2.4 Electronic Mail v SMTP,

More information

I hate money. Release 1.0

I hate money. Release 1.0 I hate money Release 1.0 Nov 01, 2017 Contents 1 Table of content 3 2 Indices and tables 15 i ii «I hate money» is a web application made to ease shared budget management. It keeps track of who bought

More information

How do I configure my LPL client to use SSL for incoming mail?

How do I configure my LPL  client to use SSL for incoming mail? How do I configure my LPL email client to use SSL for incoming mail? When you begin using your modern graphical email client program (e.g., Thunderbird, Mac Mail, Outlook), it will present a series of

More information

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur

Electronic Mail. Prof. Indranil Sen Gupta. Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur Electronic Mail Prof. Indranil Sen Gupta Professor, Dept. of Computer Science & Engineering Indian Institute of Technology Kharagpur 1 Introduction Most heavily used application on the Internet. Simple

More information

Outline. What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack

Outline. What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack Attacks on TCP Outline What is TCP protocol? How the TCP Protocol Works SYN Flooding Attack TCP Reset Attack TCP Session Hijacking Attack TCP Protocol Transmission Control Protocol (TCP) is a core protocol

More information

polib Documentation Release David Jean Louis

polib Documentation Release David Jean Louis polib Documentation Release 1.0.6 David Jean Louis January 04, 2015 Contents 1 Quick start guide 3 1.1 Installing polib.............................................. 3 1.2 Some basics

More information

Remote Exploit. Compass Security Schweiz AG Werkstrasse 20 Postfach 2038 CH-8645 Jona

Remote Exploit. Compass Security Schweiz AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Remote Exploit Compass Security Schweiz AG Werkstrasse 20 Postfach 2038 CH-8645 Jona Tel +41 55 214 41 60 Fax +41 55 214 41 61 team@csnc.ch www.csnc.ch Content Intel Architecture Memory Layout C Arrays

More information

Bitnami OSQA for Huawei Enterprise Cloud

Bitnami OSQA for Huawei Enterprise Cloud Bitnami OSQA for Huawei Enterprise Cloud Description OSQA is a question and answer system that helps manage and grow online communities similar to Stack Overflow. First steps with the Bitnami OSQA Stack

More information

McAfee Gateway Appliance Patch 7.5.3

McAfee  Gateway Appliance Patch 7.5.3 Release Notes McAfee Email Gateway Appliance Patch 7.5.3 Contents About this release Resolved issues Installation - incremental package Installation - full images Known issues Find product documentation

More information

ESMTP Support for Cisco IOS Firewall

ESMTP Support for Cisco IOS Firewall ESMTP Support for Cisco IOS Firewall Finding Feature Information ESMTP Support for Cisco IOS Firewall Last Updated: June 14, 2011 The ESMTP Support for Cisco IOS Firewall feature enhances the Cisco IOS

More information

Peer to Peer Instant Messaging

Peer to Peer Instant Messaging Peer to Peer Instant Messaging Assignment in Computer Networks I, Department of Information Technology, Uppsala University. Overview In this assignment you will implement an instant messaging system that

More information

Creating and Managing a Content Server Cluster

Creating and Managing a Content Server Cluster CHAPTER 10 This chapter describes the main features, system requirements, setup, and management of a Cisco TelePresence Content Server (TCS) cluster. To a user, a Content Server Cluster behaves exactly

More information

System Configuration

System Configuration CHAPTER 2 This chapter provides information about how to use the Setup program to configure your host system for Cisco Configuration Engine, 2.0. Running Setup System configuration for Cisco Configuration

More information

Metasploit. Installation Guide Release 4.4

Metasploit. Installation Guide Release 4.4 Metasploit Installation Guide Release 4.4 TABLE OF CONTENTS About this Guide Target Audience...1 Organization...1 Document Conventions...1 Support...2 Support for Metasploit Pro and Metasploit Express...2

More information

Troubleshooting SMTP Routing. Chris Miller Director of Messaging/Collab Connectria

Troubleshooting SMTP Routing. Chris Miller Director of Messaging/Collab Connectria Troubleshooting SMTP Routing Chris Miller Director of Messaging/Collab Connectria What We ll Cover Following the breadcrumbs in the forest Planning to be an archeologist Running relay races, jumping hurdles

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure

More information

Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud

Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud Bitnami ProcessMaker Community Edition for Huawei Enterprise Cloud Description ProcessMaker is an easy-to-use, open source workflow automation and Business Process Management platform, designed so Business

More information

Contents: 1 Basic socket interfaces 3. 2 Servers 7. 3 Launching and Controlling Processes 9. 4 Daemonizing Command Line Programs 11

Contents: 1 Basic socket interfaces 3. 2 Servers 7. 3 Launching and Controlling Processes 9. 4 Daemonizing Command Line Programs 11 nclib Documentation Release 0.7.0 rhelmot Apr 19, 2018 Contents: 1 Basic socket interfaces 3 2 Servers 7 3 Launching and Controlling Processes 9 4 Daemonizing Command Line Programs 11 5 Indices and tables

More information

GoCD Python API client Documentation

GoCD Python API client Documentation GoCD Python API client Documentation Release 1.0.1 Grigory Chernyshev Dec 08, 2017 Contents 1 Intro 1 2 Contents: 3 2.1 Yet another GoCD python client..................................... 3 2.2 Usage...................................................

More information

JupyterHub Documentation

JupyterHub Documentation JupyterHub Documentation Release 0.4.0.dev Project Jupyter team January 30, 2016 User Documentation 1 Getting started with JupyterHub 3 2 Further reading 11 3 How JupyterHub works 13 4 Writing a custom

More information

CIS 505: Software Systems

CIS 505: Software Systems CIS 505: Software Systems Spring 2018 Assignment 2: Email servers MS1 due February 16, 2018, at 10:00pm EST MS2+3 due March 1, 2018, at 10:00pm EST 1 Overview For this assignment, you will build two simple

More information

Bitnami Pimcore for Huawei Enterprise Cloud

Bitnami Pimcore for Huawei Enterprise Cloud Bitnami Pimcore for Huawei Enterprise Cloud Description Pimcore is the open source platform for managing digital experiences. It is the consolidated platform for web content management, product information

More information

CHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS ANSWERS TO PROBLEMS

CHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS ANSWERS TO PROBLEMS CHAPTER 22 DISTRIBUTED APPLICATIONS ANSWERS TO QUESTIONS 22.1 RFC 821 defines SMTP which is the protocol for exchanging email messages. RFC 822 describes the format of those messages. 22.2 The Simple Mail

More information

User Manual. Admin Report Kit for IIS 7 (ARKIIS)

User Manual. Admin Report Kit for IIS 7 (ARKIIS) User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...

More information

Uranium Documentation

Uranium Documentation Uranium Documentation Release 0.1 Yusuke Tsutsumi Jul 26, 2018 Contents 1 What is Uranium? 1 1.1 Installation................................................ 2 1.2 Tutorial..................................................

More information

TangeloHub Documentation

TangeloHub Documentation TangeloHub Documentation Release None Kitware, Inc. September 21, 2015 Contents 1 User s Guide 3 1.1 Managing Data.............................................. 3 1.2 Running an Analysis...........................................

More information

SCS3004 Networking Technologies Application Layer Protocols

SCS3004 Networking Technologies Application Layer Protocols SCS3004 Networking Technologies Application Layer Protocols Dr. Ajantha Atukorale University of Colombo School of Computing (UCSC) 2 TCP/IP Suit Applications and application-layer layer protocols Application:

More information

Contents. Error Message Descriptions... 7

Contents. Error Message Descriptions... 7 2 Contents Error Message Descriptions.................................. 7 3 4 About This Manual This Unify DataServer: Error Messages manual lists the errors that can be produced by the Unify DataServer

More information

Exim Practical. Patrick Okui. (based on materials from Brian Candler)

Exim Practical. Patrick Okui. (based on materials from Brian Candler) Exim Practical Patrick Okui (based on materials from Brian Candler) Objectives Part 1 is building and installing Exim.. Install Exim from ports. Replace Sendmail with Exim Part 2 is running basic tests.

More information

Lab 1: Creating Secure Architectures (Revision)

Lab 1: Creating Secure Architectures (Revision) Lab 1: Creating Secure Architectures (Revision) A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For

More information

P2P Programming Assignment

P2P Programming Assignment P2P Programming Assignment Overview This project is to implement a Peer-to-Peer (P2P) networking project similar to a simplified Napster. You will provide a centralized server to handle cataloging the

More information

VREDPro HPC Raytracing Cluster

VREDPro HPC Raytracing Cluster 1 HPC Raytracing Cluster... 1 1.1 Introduction... 1 1.2 Configuration... 2 1.2.1 Cluster Options... 4 1.2.2 Network Options... 5 1.2.3 Render Node Options... 6 1.2.4 Preferences... 6 1.2.5 Starting the

More information

Confire Documentation

Confire Documentation Confire Documentation Release 0.2.0 Benjamin Bengfort December 10, 2016 Contents 1 Features 3 2 Setup 5 3 Example Usage 7 4 Next Topics 9 5 About 17 Python Module Index 19 i ii Confire is a simple but

More information

feed2toot Documentation

feed2toot Documentation feed2toot Documentation Release 0.10 Carl Chenet Oct 15, 2018 Contents 1 Guide 3 1.1 How to install Feed2toot......................................... 3 1.2 Configure Feed2toot...........................................

More information

CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.0) Network Programming using C

CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.0) Network Programming using C CSCI 4210 Operating Systems CSCI 6140 Computer Operating Systems Homework 4 (document version 1.0) Network Programming using C Overview This homework is due by 11:59:59 PM on Thursday, April 26, 2018.

More information

Silk Performance Manager Installation and Setup Help

Silk Performance Manager Installation and Setup Help Silk Performance Manager 18.5 Installation and Setup Help Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright 2004-2017 Micro Focus. All rights reserved.

More information

yagmail Documentation

yagmail Documentation yagmail Documentation Release 0.10.189 kootenpv Feb 08, 2018 Contents 1 API Reference 3 1.1 Authentication.............................................. 3 1.2 SMTP Client...............................................

More information

Symantec ST0-250 Exam

Symantec ST0-250 Exam Volume: 126 Questions Question No: 1 What is the recommended minimum hard-drive size for a virtual instance of Symantec Messaging Gateway 10.5? A. 80 GB B. 90 GB C. 160 GB D. 180 GB Answer: B Question

More information

treacle Documentation

treacle Documentation treacle Documentation Release 0.1.2 Caramel April 02, 2014 Contents 1 Installing treacle 3 1.1 Installing stable version with pip.................................... 3 1.2 Installing development version

More information

Appliance Installation Guide

Appliance Installation Guide Appliance Installation Guide GWAVA 5 Copyright 2009. GWAVA Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com 1 Contents Overview... 2 Minimum System Requirements...

More information

Bitnami Dolibarr for Huawei Enterprise Cloud

Bitnami Dolibarr for Huawei Enterprise Cloud Bitnami Dolibarr for Huawei Enterprise Cloud Description Dolibarr is an open source, free software package for small and medium companies, foundations or freelancers. It includes different features for

More information

yardstick Documentation

yardstick Documentation yardstick Documentation Release 0.1.0 Kenny Freeman December 30, 2015 Contents 1 yardstick 3 1.1 What is yardstick?............................................ 3 1.2 Features..................................................

More information

NI-XNET Python API Documentation

NI-XNET Python API Documentation NI-XNET Python API Documentation Release 0.3.0 National Instruments Oct 08, 2018 Table of Contents: 1 Quick Start 3 2 Resources 5 2.1 Product Support............................................. 5 2.2

More information

Windows 2000 / XP / Vista User Guide

Windows 2000 / XP / Vista User Guide Windows 2000 / XP / Vista User Guide Version 5.5.1.0 September 2008 Backup Island v5.5 Copyright Notice The use and copying of this product is subject to a license agreement. Any other use is prohibited.

More information

Lab 2: Creating Secure Architectures

Lab 2: Creating Secure Architectures Lab 2: Creating Secure Architectures A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For this you will

More information

CS 43: Computer Networks. 12: and SMTP September 28, 2018

CS 43: Computer Networks. 12:  and SMTP September 28, 2018 CS 43: Computer Networks 12: Email and SMTP September 28, 2018 A. HTTP Mail s communicate using B. IMAP C. POP D. SMTP Lecture 12 - Slide 2 Mail s typically A. send messages directly from the sending s

More information

Cisco Encryption

Cisco  Encryption This chapter contains the following sections: Overview of, page 1 How to Encrypt Messages with a Local Key Server, page 2 Encrypting Messages using the Email Security Appliance, page 3 Determining Which

More information

edeposit.amqp.antivirus Release 1.0.1

edeposit.amqp.antivirus Release 1.0.1 edeposit.amqp.antivirus Release 1.0.1 February 05, 2015 Contents 1 Installation 3 1.1 Initialization............................................... 3 2 Usage 5 3 Content 7 3.1 Standalone script.............................................

More information

Bitnami Tiny Tiny RSS for Huawei Enterprise Cloud

Bitnami Tiny Tiny RSS for Huawei Enterprise Cloud Bitnami Tiny Tiny RSS for Huawei Enterprise Cloud Description Tiny Tiny RSS is an open source web-based news feed (RSS/Atom) reader and aggregator, designed to allow you to read news from any location,

More information

Advanced option settings on the command line. Set the interface and ports for the OpenVPN daemons

Advanced option settings on the command line. Set the interface and ports for the OpenVPN daemons Advanced option settings on the command line docs.openvpn.net/command-line/advanced-option-settings-on-the-command-line Set the interface and ports for the OpenVPN daemons In the Admin UI under Server

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Anonymous Call Rejection

Anonymous Call Rejection Contents Anonymous Call Rejection 4 Call Block 5 Call Forward 6-7 Call Return 8 Call Waiting 9 Caller ID 10-11 Do Not Disturb 12 Find Me 13 Selective Call Forwarding 14 Speed Dial 15 Three-Way Calling

More information

Header Status Codes Cheat Sheet

Header Status Codes Cheat Sheet Header Status Codes Cheat Sheet Thanks for downloading our header status codes cheat sheet! Below you ll find all the header status codes and their meanings. They are organized by sections, starting with

More information

Status Node Reference

Status Node Reference IceWarp Unified Communications Status Node Reference Version 10.4 Printed on 23 February, 2012 Contents Status 1 Message Queue... 2 Spam Queues... 3 Quarantine... 3 Whitelist... 4 BlackList... 5 Greylisting...

More information

File Download Utility User s Guide

File Download Utility User s Guide ScreenKey Consoles for the IBM 46xx File Download Utility User s Guide Version 3.20 Issue 1.2 March, 2006 Purpose The purpose of this document is to provide instructions on how to install and use the SK-7510

More information

SMTP Simple Mail Transfer Protocol

SMTP Simple Mail Transfer Protocol SMTP Simple Mail Transfer Protocol What is SMTP? SMTP stands for Simple Mail Transfer Protocol. This protocol allows transmitting electronic mail over the Internet or any other network. The protocol itself

More information

LDAP Queries. Overview of LDAP Queries. This chapter contains the following sections:

LDAP Queries. Overview of LDAP Queries. This chapter contains the following sections: This chapter contains the following sections: Overview of, page 1 Working with, page 11 Using Acceptance Queries For Recipient Validation, page 18 Using Routing Queries to Send Mail to Multiple Target

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2014 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #1 Starts in one week Is your Linux environment all ready? Bring your laptop Work time after quick

More information

Migration from Citrix. White Paper Parallels Remote Application Server

Migration from Citrix. White Paper Parallels Remote Application Server Migration from Citrix White Paper Parallels Remote Application Server Table of Contents Introduction... 3 Why Should You Migrate from Citrix to Parallels RAS?... 3 Migrating from Citrix to Parallels RAS...

More information

The Applications and Gaming Tab - Port Range Forward

The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab - Port Range Forward The Applications and Gaming Tab allows you to set up public services on your network, such as web servers, ftp servers, e-mail servers, or other specialized

More information

52 Remote Target. Simulation. Chapter

52 Remote Target. Simulation. Chapter Chapter 52 Remote Target Simulation This chapter describes how to run a simulator on a target and connect it to the SDL simulator interface (SimUI) on the host via TCP/IP communication. July 2003 Telelogic

More information

Pulp Python Support Documentation

Pulp Python Support Documentation Pulp Python Support Documentation Release 1.0.1 Pulp Project October 20, 2015 Contents 1 Release Notes 3 1.1 1.0 Release Notes............................................ 3 2 Administrator Documentation

More information

Internet Technology. 03r. Application layer protocols: . Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 03r. Application layer protocols:  . Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 03r. Application layer protocols: email Paul Krzyzanowski Rutgers University Spring 2016 1 Email: SMTP (Simple Mail Transfer Protocol) 2 Simple Mail Transfer Protocol (SMTP) Protocol

More information

Bitnami Re:dash for Huawei Enterprise Cloud

Bitnami Re:dash for Huawei Enterprise Cloud Bitnami Re:dash for Huawei Enterprise Cloud Description Re:dash is an open source data visualization and collaboration tool. It was designed to allow fast and easy access to billions of records in all

More information

ECE697AA Lecture 2. Today s lecture

ECE697AA Lecture 2. Today s lecture ECE697AA Lecture 2 Application Layer: HTTP Tilman Wolf Department of Electrical and Computer Engineering 09/04/08 Protocol stack Application layer Client-server architecture Example protocol: HTTP Demo

More information

Some Ubuntu Practice...

Some Ubuntu Practice... Some Ubuntu Practice... SANOG 10 August 29 New Delhi, India 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control services

More information

Bitnami Mantis for Huawei Enterprise Cloud

Bitnami Mantis for Huawei Enterprise Cloud Bitnami Mantis for Huawei Enterprise Cloud Description Mantis is a complete bug-tracking system that includes role-based access controls, changelog support, built-in reporting and more. A mobile client

More information

Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server

Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server Parallels Remote Application Server Migrating from Citrix XenApp (IMA / FMA) to Parallels Remote Application Server Contents 1. Introduction a. Why Should You Migrate from Citrix to Parallels RAS b. Overview

More information

DNS and SMTP. James Walden CIT 485: Advanced Cybersecurity. James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31

DNS and SMTP. James Walden CIT 485: Advanced Cybersecurity. James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31 DNS and SMTP James Walden CIT 485: Advanced Cybersecurity James WaldenCIT 485: Advanced Cybersecurity DNS and SMTP 1 / 31 Table of contents 1. DNS 2. DNS Protocol Packets 3. DNS Caching 4. DNS Cache Poisoning

More information

Erlangen API Documentation

Erlangen API Documentation Erlangen API Documentation Max Rottenkolber Monday, 20 November 2017 Table of Contents 1 erlangen (Package) 1 1.1 *agent-debug* (Variable).................... 1 1.2 *default-mailbox-size* (Variable)...............

More information

Integrating Beamr Video Into a Video Encoding Workflow By: Jan Ozer

Integrating Beamr Video Into a Video Encoding Workflow By: Jan Ozer Integrating Beamr Video Into a Video Encoding Workflow By: Jan Ozer Beamr Video is a perceptual video optimizer that significantly reduces the bitrate of video streams without compromising quality, enabling

More information

Optimal Performance and Installation Guide

Optimal Performance and Installation Guide Outlook Connector for MDaemon How To Quick Start Guide Optimal Performance and Installation Guide This guide provides information on how to get the optimal performance from Outlook Connector, how to install

More information

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols

CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols CCNA Exploration1 Chapter 3: Application Layer Functionality and Protocols LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Objectives Functions of the three upper OSI model layers, network services

More information

Privileged Remote Access Appliance Interface (/appliance)

Privileged Remote Access Appliance Interface (/appliance) Privileged Remote Access Appliance Interface (/appliance) 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property

More information

django-sticky-uploads Documentation

django-sticky-uploads Documentation django-sticky-uploads Documentation Release 0.2.0 Caktus Consulting Group October 26, 2014 Contents 1 Requirements/Installing 3 2 Browser Support 5 3 Documentation 7 4 Running the Tests 9 5 License 11

More information

2016. All rights reserved. ecconnect V.11 User Guide

2016. All rights reserved. ecconnect V.11 User Guide 2016. All rights reserved. ecconnect V.11 User Guide Copyright and trademarks ecconnect User Guide Copyright and trademarks The information in this document is subject to change without notice. This document

More information

Bitnami Piwik for Huawei Enterprise Cloud

Bitnami Piwik for Huawei Enterprise Cloud Bitnami Piwik for Huawei Enterprise Cloud Description Piwik is a real time web analytics software program. It provides detailed reports on website visitors: the search engines and keywords they used, the

More information

Bitnami OroCRM for Huawei Enterprise Cloud

Bitnami OroCRM for Huawei Enterprise Cloud Bitnami OroCRM for Huawei Enterprise Cloud Description OroCRM is a flexible open-source CRM application. OroCRM supports your business no matter the vertical. If you are a traditional B2B company, franchise,

More information

Version 1.1 March 22, Secure Installation and Operation of Your WorkCentre 4250/4260

Version 1.1 March 22, Secure Installation and Operation of Your WorkCentre 4250/4260 Version 1.1 March 22, 2010 Secure Installation and Operation of Your WorkCentre 4250/4260 Secure Installation and Operation of Your WorkCentre 4250/4260 Purpose and Audience This document provides information

More information

Admin Guide ( Unix System Administration )

Admin Guide ( Unix System Administration ) Admin Guide ( Unix System Administration ) ProFTPD Server Configuration ProFTPD is a secure and configurable FTP server, written for use on Unix and Unix-like operating systems. ProFTPD is modeled around

More information

Ftp Secure Connection Error Return Code 23

Ftp Secure Connection Error Return Code 23 Ftp Secure Connection Error Return Code 23 Sending the FTP server code 230 should establish a connection like it does when using the and if you get it call perror() or print an error made up with strerror(),

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Comtarsia SignOn Agent for Linux User Guide

Comtarsia SignOn Agent for Linux User Guide Comtarsia SignOn Agent for Linux 2006 User Guide Version: 1.2.10.11, 04-Jul-2006 Contents 1. SignOn Agent for Linux...3 1.1 Introduction...3 1.2 System Requirements...4 1.3 SignOn Agent Installation...4

More information

LDAP Queries. Overview of LDAP Queries. Understanding LDAP Queries

LDAP Queries. Overview of LDAP Queries. Understanding LDAP Queries This chapter contains the following sections: Overview of, on page 1 Working with, on page 10 Using Acceptance Queries For Recipient Validation, on page 17 Using Routing Queries to Send Mail to Multiple

More information

Install and upgrade Qlik Sense. Qlik Sense 3.2 Copyright QlikTech International AB. All rights reserved.

Install and upgrade Qlik Sense. Qlik Sense 3.2 Copyright QlikTech International AB. All rights reserved. Install and upgrade Qlik Sense Qlik Sense 3.2 Copyright 1993-2017 QlikTech International AB. All rights reserved. Copyright 1993-2017 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik

More information

Simple Binary Search Tree Documentation

Simple Binary Search Tree Documentation Simple Binary Search Tree Documentation Release 0.4.1 Adrian Cruz October 23, 2014 Contents 1 Simple Binary Search Tree 3 1.1 Features.................................................. 3 2 Installation

More information

StratumGS Documentation

StratumGS Documentation StratumGS Documentation Release 0.1.0 Dave Korhumel May 14, 2016 Contents 1 Documentation 3 1.1 Design.................................................. 3 1.2 Guides..................................................

More information