Linux tr1.turkishost.com 5.14.0-570.52.1.el9_6.x86_64 #1 SMP PREEMPT_DYNAMIC Wed Oct 15 06:39:08 EDT 2025 x86_64
LiteSpeed
Server IP : 194.146.50.96 & Your IP : 216.73.216.1
Domains :
Cant Read [ /etc/named.conf ]
User : lakemima
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
etc /
sasl2 /
Delete
Unzip
Name
Size
Permission
Date
Action
pmcd.conf
958
B
-rw-r--r--
2025-09-22 12:40
Save
Rename
# Enabled authentication mechanisms (space-separated list). # You can list many mechanisms at once, then the user can choose # by adding e.g. '?authmech=gssapi' to their host specification. # For other options, refer to SASL pluginviewer command output. #mech_list: plain login scram-sha-256 gssapi mech_list: plain login scram-sha-256 # If deferring to the SASL auth daemon (runs as root, can do PAM # login using regular user accounts, unprivileged daemons cannot). #pwcheck_method: saslauthd # If using plain/scram-sha-* for user database, this sets the file # containing the passwords. Use 'saslpasswd2 -a pmcd [username]' # to add entries and 'sasldblistusers2 -f $sasldb_path' to browse. # Note: must be readable as the PCP daemons user (chown root:pcp). sasldb_path: /etc/pcp/passwd.db # Before using Kerberos via GSSAPI, you need a service principal on # the KDC server for pmcd, and that to be exported to the keytab. #keytab: /etc/pcp/krb5.tab