Solaris 8 Sparc 버전에서 ssh설치법

네이버 블로그 폐쇄로 이동된 포스트

Solaris 8 Sparc 버전에서 ssh설치법

1. package를 준비
libgcc-3.3.sol8-sparc-local.gz
openssh-3.8p1-sol8-sparc-local.gz
openssl-0.9.7d-sol8-sparc-local.gz
tcp-wrappers-7.6-sol8-sparc-local.gz
zlib-1.2.1-sol8-sparc-local.gz

2. package압축 해제
# gunzip *.gz

3. package 설치
# pkgadd -d openssh-3.8p1-sol8-sparc-local
# pkgadd -d openssl-0.9.7d-sol8-sparc-local
# pkgadd -d zlib-1.2.1-sol8-sparc-local
# pkgadd -d libgcc-3.3-sol8-sparc-local
# pkgadd -d tcp_wrappers-7.6-sol8-sparc-local

4. ssh접속 환경 구성
# mkdir /var/empty
# chown root:sys /var/empty
# chmod 755 /var/empty
# groupadd sshd
# useradd -g sshd -c ’sshd privsep’ -d /var/empty -s /bin/false sshd

5. tcp_wrapper 설정
# vi /etc/inetd.conf
모든 행 # 주석처리
# vi /etc/hosts.allow
sshd : All
# vi /etc/hosts.deny
All : All

inetd 재시작

6. ssh를 위한 key-gen 생성
# ssh-keygen -t rsa1 -f /usr/local/etc/ssh_host_key -N “”
# ssh-keygen -t dsa -f /usr/local/etc/ssh_host_dsa_key -N “”
# ssh-keygen -t rsa -f /usr/local/etc/ssh_host_rsa_key -N “”

7. sshd 데몬 스크립트 작성

# vi /etc/init.d/sshd

#!/bin/sh

pid=`/usr/bin/ps -e | /usr/bin/grep sshd | /usr/bin/sed -e ’s/^  *//’ -e ’s/ .*//’`
case $1 in
’start’)
/usr/local/sbin/sshd
;;
’stop’)
if [ “${pid}” != “” ]
then
/usr/bin/kill ${pid}
fi
;;
*)
echo “usage: /etc/init.d/sshd {start|stop}”
;;
esac

8. 마무리작업
# chown root /etc/init.d/sshd
# chgrp sys /etc/init.d/sshd
# chmod 555 /etc/init.d/sshd
# ln -s /etc/init.d/sshd /etc/rc2.d/S98sshd

9. ssh 가동
# /etc/rc2.d/S98sshd start

10. 프로세스 확인
# ps -ef |grep sshd

작성자 : 이정일

작성일 : 20040414

놀다가 자칼에 물려 죽다!

놀다가 자칼에 물려 죽다!

네이버 블로그 폐쇄로 이동(2004/04/07 13:29)

You made the top ten list!

No Points Name Hp [max]
1 1256 Jungle Lee-Cav-Hum-Mal-Neu died in The Gnomish Mines
on level 3. Killed by a rothe. – [49]
2 248 Jungle Lee-Ran-Orc-Fem-Cha died in The Dungeons of
Doom on level 3. Killed by a wand. – [19]
3 183 Jungle Lee-Bar-Orc-Fem-Cha died in The Dungeons of
Doom on level 1. Killed by a jackal. – [22]

3.4.3 1256 2 3 3 0 49 1 20040406 20040406 1 Cav Hum Mal Neu Jungle Lee,killed by a rothe
3.4.3 248 0 3 3 -16 19 1 20040406 20040406 1 Ran Orc Fem Cha Jungle Lee,killed by a wand
3.4.3 183 0 1 1 0 22 1 20040407 20040407 1 Bar Orc Fem Cha Jungle Lee,killed by a jackal

#man nethack

심심해서…

#man nethack

네이버블로그 폐쇄로 이동(2004/04/06 20:18)

NETHACK(6) NETHACK(6)

NAME
nethack – Exploring The Mazes of Menace

SYNOPSIS
nethack [ -d directory ] [ -n ] [ -p profession (role) ] [
-r race ] [ -[DX] ] [ -u playername ] [ -dec ] [ -ibm ]

nethack [ -d directory ] -s [ -v ] [ -p profession (role)
] [ -r race ] [ playernames ]

DESCRIPTION
NetHack is a display oriented Dungeons & Dragons(tm) –
like game. The standard tty display and command structure
resemble rogue.

Other, more graphical display options exist if you are
using either a PC, or an X11 interface.

To get started you really only need to know two commands.
The command ? will give you a list of the available com-
mands (as well as other information) and the command /
will identify the things you see on the screen.

To win the game (as opposed to merely playing to beat
other people’s high scores) you must locate the Amulet of
Yendor which is somewhere below the 20th level of the dun-
geon and get it out. Nobody has achieved this yet; any-
body who does will probably go down in history as a hero
among heros.

When the game ends, whether by your dying, quitting, or
escaping from the caves, NetHack will give you (a fragment
of) the list of top scorers. The scoring is based on many
aspects of your behavior, but a rough estimate is obtained
by taking the amount of gold you’ve found in the cave plus
four times your (real) experience. Precious stones may be
worth a lot of gold when brought to the exit. There is a
10% penalty for getting yourself killed.

The environment variable NETHACKOPTIONS can be used to
initialize many run-time options. The ? command provides
a description of these options and syntax. (The -dec and
-ibm command line options are equivalent to the decgraph-
ics and ibmgraphics run-time options described there, and
are provided purely for convenience on systems supporting
multiple types of terminals.)

Because the option list can be very long (particularly
when specifying graphics characters), options may also be
included in a configuration file. The default is located
in your home directory and named .nethackrc on Unix sys-
tems. On other systems, the default may be different,
usually NetHack.cnf. On DOS or Windows, the name is
defaults.nh, while on the Macintosh or BeOS, it is NetHack
Defaults. The configuration file’s location may be speci-
fied by setting NETHACKOPTIONS to a string consisting of
an @ character followed by the filename.

The -u playername option supplies the answer to the ques-
tion “Who are you?”. It overrides any name from the
options or configuration file, USER, LOGNAME, or getlo-
gin(), which will otherwise be tried in order. If none of
these provides a useful name, the player will be asked for
one. Player names (in conjunction with uids) are used to
identify save files, so you can have several saved games
under different names. Conversely, you must use the
appropriate player name to restore a saved game.

A playername suffix can be used to specify the profession,
race, alignment and/or gender of the character. The full
syntax of the playername that includes a suffix is “name-
ppp-rrr-aaa-ggg”. “ppp” are at least the first three let-
ters of the profession (this can also be specified using a
separate -p profession option). “rrr” are at least the
first three letters of the character’s race (this can also
be specified using a separate -r race option). “aaa” are
at last the first three letters of the character’s align-
ment, and “ggg” are at least the first three letters of
the character’s gender. Any of the parts of the suffix
may be left out.

-p profession can be used to determine the character role.
You can specify either the male or female name for the
character role, or the first three characters of the role
as an abbreviation. -p @ has been retained to explicitly
request that a random role be chosen. It may need to be
quoted with a backslash (@) if @ is the “kill” character
(see “stty”) for the terminal, in order to prevent the
current input line from being cleared.

Likewise, -r race can be used to explicitly request that a
race be chosen.

Leaving out any of these characteristics will result in
you being prompted during the game startup for the infor-
mation.

The -s option alone will print out the list of your scores
on the current version. An immediately following -v
reports on all versions present in the score file. The -s
may also be followed by arguments -p and -r to print the
scores of particular roles and races only. It may also be
followed by one or more player names to print the scores
of the players mentioned, by ‘all’ to print out all
scores, or by a number to print that many top scores.

The -n option suppresses printing of any news from the
game administrator.

The -D or -X option will start the game in a special non-
scoring discovery mode. -D will, if the player is the
game administrator, start in debugging (wizard) mode
instead.

The -d option, which must be the first argument if it
appears, supplies a directory which is to serve as the
playground. It overrides the value from NETHACKDIR, HACK-
DIR, or the directory specified by the game administrator
during compilation (usually /usr/games/lib/nethackdir).
This option is usually only useful to the game administra-
tor. The playground must contain several auxiliary files
such as help files, the list of top scorers, and a subdi-
rectory save where games are saved.

AUTHORS
Jay Fenlason (+ Kenny Woodland, Mike Thome and Jon Payne)
wrote the original hack, very much like rogue (but full of
bugs).

Andries Brouwer continuously deformed their sources into
an entirely different game.

Mike Stephenson has continued the perversion of sources,
adding various warped character classes and sadistic traps
with the help of many strange people who reside in that
place between the worlds, the Usenet Zone. A number of
these miscreants are immortalized in the historical roll
of dishonor and various other places.

The resulting mess is now called NetHack, to denote its
development by the Usenet. Andries Brouwer has made this
request for the distinction, as he may eventually release
a new version of his own.

FILES
All files are in the playground, normally
/usr/games/lib/nethackdir. If DLB was defined during the
compile, the data files and special levels will be inside
a larger file, normally nhdat, instead of being separate
files.
nethack The program itself.
data, oracles, rumors Data files used by NetHack.
options, quest.dat More data files.
help, hh Help data files.
cmdhelp, opthelp, wizhelp More help data files.
*.lev Predefined special levels.
dungeon Control file for special lev-
els.
history A short history of NetHack.
license Rules governing redistribu-
tion.
record The list of top scorers.
logfile An extended list of games
played.
xlock.nnn Description of a dungeon
level.
perm Lock file for xlock.dd.
bonesDD.nn Descriptions of the ghost and
belongings of a deceased
adventurer.
save A subdirectory containing the
saved games.

ENVIRONMENT
USER or LOGNAME Your login name.
HOME Your home directory.
SHELL Your shell.
TERM The type of your terminal.
HACKPAGER or PAGER Replacement for default pager.
MAIL Mailbox file.
MAILREADER Replacement for default reader
(probably /bin/mail or
/usr/ucb/mail).
NETHACKDIR Playground.
NETHACKOPTIONS String predefining several NetHack
options.

In addition, SHOPTYPE is used in debugging (wizard) mode.

SEE ALSO
dgn_comp(6), lev_comp(6), recover(6)

BUGS
Probably infinite.

Dungeons & Dragons is a Trademark of Wizards of the Coast,
Inc.

9 August 2002 NETHACK(6)