Wedding ^-^
28 Januari 2021
24 Januari 2021
23 Januari 2021
21 Januari 2021
10 September 2017
16 Juli 2015
Korean Drama Airing in July
Hello Monster (I Remember You)
Description
Lee Hyun (Seo In-Guk) is an excellent criminal profiler, but he possesses a spiteful tongue. Cha Ji-An (Jang Na-Ra) is an elite detective. She observes Lee Hyun. They work on solving cases and develop a romantic relationship
Genre: Romance Thriller Suspense

Lee Hyun (Seo In-Guk) is an excellent criminal profiler, but he possesses a spiteful tongue. Cha Ji-An (Jang Na-Ra) is an elite detective. She observes Lee Hyun. They work on solving cases and develop a romantic relationship
Genre: Romance Thriller Suspense
The Time We Were Not In Love
Description
Oh Ha-Na (Ha Ji-Won) and Choi Won (Lee Jin-Wook) are both 34-years-old. They have been friends for 17 years. Oh Ha-Na is currently a career woman with an honest and confident personality. Choi Won works as an assistant purser for an airline. He has always helped Oh Ha-Na whenever she got into trouble. Cha Seo-Hoo (Yoon Gyun-Sang) is a pianist with a free spirit and Lee So-Eun (Choo Soo-Hyun) is a cabin attendant for an airline. Will Oh Ha-Na and Choi Won find love?
Genre: Drama Romance
Mask

Description
Oh Ha-Na (Ha Ji-Won) and Choi Won (Lee Jin-Wook) are both 34-years-old. They have been friends for 17 years. Oh Ha-Na is currently a career woman with an honest and confident personality. Choi Won works as an assistant purser for an airline. He has always helped Oh Ha-Na whenever she got into trouble. Cha Seo-Hoo (Yoon Gyun-Sang) is a pianist with a free spirit and Lee So-Eun (Choo Soo-Hyun) is a cabin attendant for an airline. Will Oh Ha-Na and Choi Won find love?
Genre: Drama Romance
Mask
.jpg)
Description
Ji-Sook (Soo-Ae) goes through a difficult period, due to her father's private loan. She begins living as Eun-Ha. Eun-Ha is from a wealthy family and looks like Ji-Sook. When Min-Woo (Ju Ji-Hoon) was only 7 years old, he became the successor of a large corporation which his family ran. Due to his position, he cannot reveal his feelings. Through his family, he meets Eun-Ha. He notices she is different from other wealthy woman that he has met. Min-Woo has feelings for her.
Genre: Drama Romance
Orange Marmalade

Description
200 years ago, humans and vampires finalized a peace treaty, but they still do not get along well with each other. In the present day, Jae-Min (Yeo Jin-Goo) is a popular high school student. He falls in love with transfer student Baek Ma-Ri. Baek Ma-Ri though hides her true identity as a vampire.
Genre: Comedy Drama Romance
Hide Identity

Description
A drama about Investigation Team 5 which was established to deal with crime in a more eager manner through stake outs.
Genre: Mystery Crime
My Love Eun-Dong

Description
This drama is about a man who has it all, yet is unable to possess the love of a woman he is unable to forget, whom he has been loving for the past 20 years.
Genre: Romance melodrama
I Order You

Description
Yeo Gook Dae (U-Know Yunho) is a talented chef who is sassy and considerate but heartbroken in the past since his divorce. His heart later on gets healed when he falls in love again. 28-year-old Park Song Ah (Kim Ga Eun) is idling at home after quitting her job. She goes to a homemade dosirak (lunchbox) shop as her brother’s request and meets three attractive men there. The pretty and delicious food that they make touch her, and she gets her heart stolen by one of them. A cute funny story about a couple who bicker constantly but their relationship gradually blossoms into pure innocent love.
Genre: Comedy Romance
Scholar Who Walks the Night

Description
A daughter from a collapsed noble family, due to being branded a traitor, dresses up like a man and goes out to sell books. She meets an attractive scholar walking at night, but the scholar is actually vampire.
Genre: Fantasy Historical Romance
Hwajung

Description
Drama series follows the rise and fall of Princess Jeongmyeong. Princess Jeongmyeong was born to King Seongjo of the Joseon Dynasty period. After her younger brother is killed by older stepbrother, Prince Gwanghae, she falls from her position as a princess.
Genre: Historical Romance
Watch them with English Sub HERE ...
Or HERE..
23 Juni 2014
How to Instal Kerberos in Linux/Ubuntu (Cara Instal Kerberos di Linux/Ubuntu)
Kerberos is a network authentication system based on the principal of a trusted third party. The other two parties being the user and the service the user wishes to authenticate to. Not all services and applications can use Kerberos, but for those that can, it brings the network environment one step closer to being Single Sign On (SSO).
This section covers installation and configuration of a Kerberos server, and some example client configurations.
If you are new to Kerberos there are a few terms that are good to understand before setting up a Kerberos server. Most of the terms will relate to things you may be familiar with in other environments:
To put the pieces together, a Realm has at least one KDC, preferably two for redundancy, which contains a database of Principals. When a user principal logs into a workstation, configured for Kerberos authentication, the KDC issues a Ticket Granting Ticket (TGT). If the user supplied credentials match, the user is authenticated and can then request tickets for Kerberized services from the Ticket Granting Server (TGS). The service tickets allow the user to authenticate to the service without entering another username and password.
- Principal: any users, computers, and services provided by servers need to be defined as Kerberos Principals.
- Instances: are used for service principals and special administrative principals.
- Realms: the unique realm of control provided by the Kerberos installation. Usually the DNS domain converted to uppercase (EXAMPLE.COM).
- Key Distribution Center: (KDC) consist of three parts, a database of all principals, the authentication server, and the ticket granting server. For each realm there must be at least one KDC.
- Ticket Granting Ticket: issued by the Authentication Server (AS), the Ticket Granting Ticket (TGT) is encrypted in the user's password which is known only to the user and the KDC.
- Ticket Granting Server: (TGS) issues service tickets to clients upon request.
- Tickets: confirm the identity of the two principals. One principal being a user and the other a service requested by the user. Tickets establish an encryption key used for secure communication during the authenticated session.
- Keytab Files: are files extracted from the KDC principal database and contain the encryption key for a service or host.
Before installing the Kerberos server a properly configured DNS server is needed for your domain. Since the Kerberos Realm by convention matches the domain name, this section uses the example.com domain configured in the section called “Primary Master”.
Also, Kerberos is a time sensitive protocol. So if the local system time between a client machine and the server differs by more than five minutes (by default), the workstation will not be able to authenticate. To correct the problem all hosts should have their time synchronized using the Network Time Protocol (NTP). For details on setting up NTP see the section called “Time Synchronisation with NTP”.
The first step in installing a Kerberos Realm is to install the krb5-kdc and krb5-admin-server packages. From a terminal enter:
Next, create the new realm with the kdb5_newrealm utility:
Also, Kerberos is a time sensitive protocol. So if the local system time between a client machine and the server differs by more than five minutes (by default), the workstation will not be able to authenticate. To correct the problem all hosts should have their time synchronized using the Network Time Protocol (NTP). For details on setting up NTP see the section called “Time Synchronisation with NTP”.
The first step in installing a Kerberos Realm is to install the krb5-kdc and krb5-admin-server packages. From a terminal enter:
sudo apt-get install krb5-kdc krb5-admin-server
You will be asked at the end of the install to supply a name for the Kerberos and Admin servers, which may or may not be the same server, for the realm.Next, create the new realm with the kdb5_newrealm utility:
sudo krb5_newrealm
The questions asked during installation are used to configure the
Your new Kerberos Realm is now ready to authenticate clients.
/etc/krb5.conf file. If you need to adjust the Key Distribution Center (KDC) settings simply edit the file and restart the krb5-kdc daemon.- Now that the KDC running an admin user is needed. It is recommended to use a different username from your everyday username. Using the kadmin.local utility in a terminal prompt enter:
sudo kadmin.localIn the above example steve is the Principal, /admin is an Instance, and @EXAMPLE.COM signifies the realm. The"every day" Principal would be steve@EXAMPLE.COM, and should have only normal user rights.Authenticating as principal root/admin@EXAMPLE.COM with password. kadmin.local:addprinc steve/adminWARNING: no policy specified for steve/admin@EXAMPLE.COM; defaulting to no policy Enter password for principal "steve/admin@EXAMPLE.COM": Re-enter password for principal "steve/admin@EXAMPLE.COM": Principal "steve/admin@EXAMPLE.COM" created. kadmin.local:quit
![[Note]](file:///D:/KJ%20Tugas/kerberos/Kerberos_files/note.png)
Replace EXAMPLE.COM and steve with your Realm and admin username. - Next, the new admin user needs to have the appropriate Access Control List (ACL) permissions. The permissions are configured in the
/etc/krb5kdc/kadm5.aclfile:
steve/admin@EXAMPLE.COM *This entry grants steve/admin the ability to perform any operation on all principals in the realm. - Now restart the krb5-admin-server for the new ACL to take affect:
sudo /etc/init.d/krb5-admin-server restart - The new user principal can be tested using the kinit utility:
kinit steve/adminAfter entering the password, use the klist utility to view information about the Ticket Granting Ticket (TGT):steve/admin@EXAMPLE.COM's Password:
klistYou may need to add an entry into theCredentials cache: FILE:/tmp/krb5cc_1000 Principal: steve/admin@EXAMPLE.COM Issued Expires Principal Jul 13 17:53:34 Jul 14 03:53:34 krbtgt/EXAMPLE.COM@EXAMPLE.COM/etc/hostsfor the KDC. For example:
192.168.0.1 kdc01.example.com kdc01Replacing 192.168.0.1 with the IP address of your KDC. - In order for clients to determine the KDC for the Realm some DNS SRV records are needed. Add the following to
/etc/named/db.example.com:
_kerberos._udp.EXAMPLE.COM. IN SRV 1 0 88 kdc01.example.com. _kerberos._tcp.EXAMPLE.COM. IN SRV 1 0 88 kdc01.example.com. _kerberos._udp.EXAMPLE.COM. IN SRV 10 0 88 kdc02.example.com. _kerberos._tcp.EXAMPLE.COM. IN SRV 10 0 88 kdc02.example.com. _kerberos-adm._tcp.EXAMPLE.COM. IN SRV 1 0 749 kdc01.example.com. _kpasswd._udp.EXAMPLE.COM. IN SRV 1 0 464 kdc01.example.com.See Chapter 7, Domain Name Service (DNS) for detailed instructions on setting up DNS.![[Note]](file:///D:/KJ%20Tugas/kerberos/Kerberos_files/note.png)
Replace EXAMPLE.COM, kdc01, and kdc02 with your domain name, primary KDC, and secondary KDC.
Once you have one Key Distribution Center (KDC) on your network, it is good practice to have a Secondary KDC in case the primary becomes unavailable.
The Secondary KDC should now be able to issue tickets for the Realm. You can test this by stopping the krb5-kdc daemon on the Primary KDC, then use kinit to request a ticket. If all goes well you should receive a ticket from the Secondary KDC.
- First, install the packages, and when asked for the Kerberos and Admin server names enter the name of the Primary KDC:
sudo apt-get install krb5-kdc krb5-admin-server - Once you have the packages installed, create the Secondary KDC's host principal. From a terminal prompt, enter:
kadmin -q "addprinc -randkey host/kdc02.example.com"![[Note]](file:///D:/KJ%20Tugas/kerberos/Kerberos_files/note.png)
After, issuing any kadmin commands you will be prompted for yourusername/admin@EXAMPLE.COM principal password. - Extract the keytab file:
kadmin -q "ktadd -k keytab.kdc02 host/kdc02.example.com" - There should now be a
keytab.kdc02in the current directory, move the file to/etc/krb5.keytab:
sudo mv keytab.kdc02 /etc/krb5.keytabAlso, you can list the principals in a Keytab file, which can be useful when troubleshooting, using the klist utility:![[Note]](file:///D:/KJ%20Tugas/kerberos/Kerberos_files/note.png)
If the path to the keytab.kdc02file is different adjust accordingly.
sudo klist -k /etc/krb5.keytab - Next, there needs to be a
kpropd.aclfile on each KDC that lists all KDCs for the Realm. For example, on both primary and secondary KDC, create/etc/krb5kdc/kpropd.acl:
host/kdc01.example.com@EXAMPLE.COM host/kdc02.example.com@EXAMPLE.COM - Create an empty database on the Secondary KDC:
sudo kdb5_util -s create - Now start the kpropd daemon, which listens for connections from the kprop utility. kprop is used to transfer dump files:
sudo kpropd -S - From a terminal on the Primary KDC, create a dump file of the principal database:
sudo kdb5_util dump /var/lib/krb5kdc/dump - Extract the Primary KDC's keytab file and copy it to
/etc/krb5.keytab:
kadmin -q "ktadd -k keytab.kdc01 host/kdc01.example.com" sudo mv keytab.kdc01 /etc/kr5b.keytab![[Note]](file:///D:/KJ%20Tugas/kerberos/Kerberos_files/note.png)
Make sure there is a host for kdc01.example.com before extracting the Keytab. - Using the kprop utility push the database to the Secondary KDC:
sudo kprop -r EXAMPLE.COM -f /var/lib/krb5kdc/dump kdc02.example.comYou may also want to create a cron job to periodically update the database on the Secondary KDC. For example, the following will push the database every hour:![[Note]](file:///D:/KJ%20Tugas/kerberos/Kerberos_files/note.png)
There should be a SUCCEEDED message if the propagation worked. If there is an error message check /var/log/syslogon the secondary KDC for more information.
# m h dom mon dow command 0 * * * * /usr/sbin/kdb5_util dump /var/lib/krb5kdc/dump && /usr/sbin/kprop -r EXAMPLE.COM -f /var/lib/krb5kdc/dump kdc02.example.com - Back on the Secondary KDC, create a stash file to hold the Kerberos master key:
sudo kdb5_util stash - Finally, start the krb5-kdc daemon on the Secondary KDC:
sudo /etc/init.d/krb5-kdc start
This section covers configuring a Linux system as a Kerberos client. This will allow access to any kerberized services once a user has successfully logged into the system.
In order to authenticate to a Kerberos Realm, the krb5-user and libpam-krb5 packages are needed, along with a few others that are not strictly necessary but make life easier. To install the packages enter the following in a terminal prompt:
sudo apt-get install krb5-user libpam-krb5 libpam-ccreds auth-client-config
The auth-client-config package allows simple configuration of PAM for authentication from multiple sources, and thelibpam-ccreds will cache authentication credentials allowing you to login in case the Key Distribution Center (KDC) is unavailable. This package is also useful for laptops that may authenticate using Kerberos while on the corporate network, but will need to be accessed off the network as well.
To configure the client in a terminal enter:
The dpkg-reconfigure adds entries to the
sudo dpkg-reconfigure krb5-config
You will then be prompted to enter the name of the Kerberos Realm. Also, if you don't have DNS configured with KerberosSRV records, the menu will prompt you for the hostname of the Key Distribution Center (KDC) and Realm Administration server.The dpkg-reconfigure adds entries to the
/etc/krb5.conf file for your Realm. You should have entries similar to the following:[libdefaults]
default_realm = EXAMPLE.COM
...
[realms]
EXAMPLE.COM = }
kdc = 192.168.0.1
admin_server = 192.168.0.1
}
You can test the configuration by requesting a ticket using the kinit utility. For example:kinit steve@EXAMPLE.COM
Password for steve@EXAMPLE.COM:
When a ticket has been granted, the details can be viewed using klist:klist
Ticket cache: FILE:/tmp/krb5cc_1000
Default principal: steve@EXAMPLE.COM
Valid starting Expires Service principal
07/24/08 05:18:56 07/24/08 15:18:56 krbtgt/EXAMPLE.COM@EXAMPLE.COM
renew until 07/25/08 05:18:57
Kerberos 4 ticket cache: /tmp/tkt1000
klist: You have no tickets cached
Next, use the auth-client-config to configure the libpam-krb5 module to request a ticket during login:sudo auth-client-config -a -p kerberos_example
You will should now receive a ticket upon successful login authentication.
Langganan:
Komentar (Atom)
-
1. Pengertian Konflik Agama a. Pengertian Konflik Konflik berasal dari kata kerja Latin configere yang berarti saling m...







