Quantcast
Channel: NethServer Community - Latest posts
Viewing all 110699 articles
Browse latest View live

OpenVPN service not started on NS 7b2

$
0
0

Ok. Right now I was filling a bug report. Should I continue or can I leave it?


OpenVPN service not started on NS 7b2

$
0
0

Please go ahead and file the issue, it will be referenced in the commit message. Thank you.

EDIT: It seems that @dnutan knows the development cycle better than me. :slight_smile:

OpenVPN service not started on NS 7b2

$
0
0

Thanks for the compliment :blush: , but really far from that. I barely know how to use github.

OpenVPN service not started on NS 7b2

Lightsquid Nethgui: "Language not found"

$
0
0

It is entirely possible that I changed the hostname and on the first one I did select another language to install. I'm traveling, but next week I'll be doing another similar install and will try to pay attention to exact steps and report back what I find. Thanks.

BID Group One & Business Initiative Directions for Hard & Soft Tecnologia C.A

$
0
0

Hi @dnutan Unfortunately I could not attend the event, had no foreign exchange to make the trip.

Gateway ip not on interfaces ip network problems

$
0
0

Hi @lorentedford,

As @alefattorini said and what the red message show, in the Network address field you must use the CIDR format of the network: 192.99.90.0/24, as example.

Did you try and solved?

BR,
Gabriel

Trying to set up IPsec Tunnel NS->Fritzbox

$
0
0

Okay now i tried the following configs and something happen.

ipsec.conf:

config setup
        # Debug-logging controls:  "none" for (almost) none, "all" for lots.
        # klipsdebug=none
        # plutodebug="control parsing"
        # For Red Hat Enterprise Linux and Fedora, leave protostack=netkey
        protostack=netkey
        nat_traversal=yes
        virtual_private=%v4:192.168.179.0./24,%v4:192.168.177.0./24
        oe=off
        # Enable this if you see "failed to find any available worker"
        # nhelpers=

conn Site-to-Site
        authby=secret
        auto=add
        type=tunnel
        aggrmode=yes
        left= PUBLIC IP ADRESS OF NSSERVER
        leftid= FQDN OF NSSERVER
        leftnexthop=%defaultroute
        leftsourceip=192.168.177.21
        leftsubnet=192.168.177.0/24
        right=%any
        rightsubnet=192.168.179.0/24
        rightid= FQDN OF FRITZBOX
        ike=aes256-sha1;modp2048
        phase2=esp
        phase2alg=aes256-sha1;modp2048

Fritzbox config:

vpncfg {
        connections {
                enabled = yes;
                conn_type = conntype_lan;
                name = "ANYNAME";
                always_renew = yes;
                reject_not_encrypted = no;
                dont_filter_netbios = yes;
                localip = 0.0.0.0;
                local_virtualip = 0.0.0.0;
                remoteip = PUBLIC IP OF NSSERVER;
                remote_virtualip = 0.0.0.0;
                localid {
                        fqdn = "FQDN OF FRITZBOX";
                }
                remoteid {
                        ipaddr = "PUBLIC IP ADRESS OF NSSERVER";
                }
                mode = phase1_mode_aggressive;
                phase1ss = "all/all/all";
                keytype = connkeytype_pre_shared;
                key = "SECRET KEY";
                cert_do_server_auth = no;
                use_nat_t = yes;
                use_xauth = no;
                use_cfgmode = no;
                phase2localid {
                        ipnet {
                                ipaddr = 192.168.179.0;
                                mask = 255.255.255.0;
                        }
                }
                phase2remoteid {
                        ipnet {
                                ipaddr = 192.168.177.0;
                                mask = 255.255.255.0;
                        }
                }
                phase2ss = "esp-all-all/ah-none/comp-all/pfs";
                accesslist = "permit ip any 192.168.177.0 255.255.255.0";
        }
        ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500", 
                            "udp 0.0.0.0:4500 0.0.0.0:4500";
}


// EOF

And the ipsec.log shows this on and on:

Sep 24 11:20:09 NET01 pluto[6327]: packet from 79.235.2.199:500: initial Aggressive Mode message from 79.235.2.199 but no (wildcard) connection has been configured with policy PSK+AGGRESSIVE+IKEV1_ALLOW
Sep 24 11:20:17 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [XAUTH]
Sep 24 11:20:17 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [Dead Peer Detection]
Sep 24 11:20:17 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [RFC 3947]
Sep 24 11:20:17 NET01 pluto[6327]: packet from 79.235.2.199:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Sep 24 11:20:17 NET01 pluto[6327]: packet from 79.235.2.199:500: ignoring unknown Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
Sep 24 11:20:17 NET01 pluto[6327]: packet from 79.235.2.199:500: initial Aggressive Mode message from 79.235.2.199 but no (wildcard) connection has been configured with policy PSK+AGGRESSIVE+IKEV1_ALLOW
Sep 24 11:20:37 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [XAUTH]
Sep 24 11:20:37 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [Dead Peer Detection]
Sep 24 11:20:37 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [RFC 3947]
Sep 24 11:20:37 NET01 pluto[6327]: packet from 79.235.2.199:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Sep 24 11:20:37 NET01 pluto[6327]: packet from 79.235.2.199:500: ignoring unknown Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
Sep 24 11:20:37 NET01 pluto[6327]: packet from 79.235.2.199:500: initial Aggressive Mode message from 79.235.2.199 but no (wildcard) connection has been configured with policy PSK+AGGRESSIVE+IKEV1_ALLOW
Sep 24 11:20:39 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [XAUTH]
Sep 24 11:20:39 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [Dead Peer Detection]
Sep 24 11:20:39 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [RFC 3947]
Sep 24 11:20:39 NET01 pluto[6327]: packet from 79.235.2.199:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Sep 24 11:20:39 NET01 pluto[6327]: packet from 79.235.2.199:500: ignoring unknown Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
Sep 24 11:20:39 NET01 pluto[6327]: packet from 79.235.2.199:500: initial Aggressive Mode message from 79.235.2.199 but no (wildcard) connection has been configured with policy PSK+AGGRESSIVE+IKEV1_ALLOW
Sep 24 11:20:43 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [XAUTH]
Sep 24 11:20:43 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [Dead Peer Detection]
Sep 24 11:20:43 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [RFC 3947]
Sep 24 11:20:43 NET01 pluto[6327]: packet from 79.235.2.199:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Sep 24 11:20:43 NET01 pluto[6327]: packet from 79.235.2.199:500: ignoring unknown Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
Sep 24 11:20:43 NET01 pluto[6327]: packet from 79.235.2.199:500: initial Aggressive Mode message from 79.235.2.199 but no (wildcard) connection has been configured with policy PSK+AGGRESSIVE+IKEV1_ALLOW
Sep 24 11:20:51 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [XAUTH]
Sep 24 11:20:51 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [Dead Peer Detection]
Sep 24 11:20:51 NET01 pluto[6327]: packet from 79.235.2.199:500: received Vendor ID payload [RFC 3947]
Sep 24 11:20:51 NET01 pluto[6327]: packet from 79.235.2.199:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Sep 24 11:20:51 NET01 pluto[6327]: packet from 79.235.2.199:500: ignoring unknown Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
Sep 24 11:20:51 NET01 pluto[6327]: packet from 79.235.2.199:500: initial Aggressive Mode message from 79.235.2.199 but no (wildcard) connection has been configured with policy PSK+AGGRESSIVE+IKEV1_ALLOW

Disabling aggressive mode on both sides gives this:

Sep 24 11:45:48 NET01 pluto[8193]: packet from 79.235.30.110:500: initial Main Mode message received on 192.168.177.6:500 but no connection has been authorized with policy PSK+IKEV1_ALLOW
Sep 24 11:45:52 NET01 pluto[8193]: packet from 79.235.30.110:500: received Vendor ID payload [XAUTH]
Sep 24 11:45:52 NET01 pluto[8193]: packet from 79.235.30.110:500: received Vendor ID payload [Dead Peer Detection]
Sep 24 11:45:52 NET01 pluto[8193]: packet from 79.235.30.110:500: received Vendor ID payload [RFC 3947]
Sep 24 11:45:52 NET01 pluto[8193]: packet from 79.235.30.110:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Sep 24 11:45:52 NET01 pluto[8193]: packet from 79.235.30.110:500: ignoring unknown Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
Sep 24 11:45:52 NET01 pluto[8193]: packet from 79.235.30.110:500: initial Main Mode message received on 192.168.177.6:500 but no connection has been authorized with policy PSK+IKEV1_ALLOW
Sep 24 11:46:00 NET01 pluto[8193]: packet from 79.235.30.110:500: received Vendor ID payload [XAUTH]
Sep 24 11:46:00 NET01 pluto[8193]: packet from 79.235.30.110:500: received Vendor ID payload [Dead Peer Detection]
Sep 24 11:46:00 NET01 pluto[8193]: packet from 79.235.30.110:500: received Vendor ID payload [RFC 3947]
Sep 24 11:46:00 NET01 pluto[8193]: packet from 79.235.30.110:500: ignoring Vendor ID payload [draft-ietf-ipsec-nat-t-ike-03]
Sep 24 11:46:00 NET01 pluto[8193]: packet from 79.235.30.110:500: ignoring unknown Vendor ID payload [a2226fc364500f5634ff77db3b74f41b]
Sep 24 11:46:00 NET01 pluto[8193]: packet from 79.235.30.110:500: initial Main Mode message received on 192.168.177.6:500 but no connection has been authorized with policy PSK+IKEV1_ALLOW

Whats wrong?


Backup ERROR Report for data backup

$
0
0

Help how can I fix this problem:

===== Report for data backup =====

Backup started at 2016-09-24 14:22:04
Pre backup scripts status: SUCCESS
Backup script status: ERROR

Extract from log file /var/log/backup-data.log:

2016-09-24 14:22:04 - START - Backup data started
2016-09-24 14:22:15 - STEP - pre-backup-done done
2016-09-24 14:22:15 - ERROR - Backup failed, see /var/log/last-backup.log for details - 5888
2016-09-24 14:22:15 - ERROR - Action backup-data-duplicity failed - 1

Extract from log file /var/log/last-backup.log:

Duplicity 0.6 series is being deprecated:
See http://www.nongnu.org/duplicity/

Reading globbing filelist /tmp/osMw5ja2z_
Another instance is already running with this archive directory
If you are sure that this is the only instance running you may delete
the following lockfile and run the command again :
/var/lib/nethserver/backup/duplicity/eb37decb924aad9b30b46d34585c0c6e/lockfile.lock

how to fix help help

How to enable Digest MD5

$
0
0

So...
I had the opportunity to test another server - Zentyal 2.3, which is an old version and it supports digest-md5. With this server I was able to successfully authenticate with our Avid appliance.

This makes me think that digest-md5 has been discontinued in many distributions like yours. I just want someone to confirm this.

... in meanwhile I've asked Avid support for help and I'm hoping that they can change their appliance in order to use another authentication mechanism.

The stephdl repository is opened

Ns7b2/centos installation problem on N36L N40L N54L

$
0
0

I write this post just to warn owners of these small server before installing the ns7b2

not really an NS7 bug, but a Centos bug with HP N36L,N40L, N54L and some others AMD based server...
it's a bug of the kernel-3.10.0-327.el7.x86_64 shipped with CentOS 7.2.1511 and of course with ns7b2

more info here:
https://bugs.centos.org/view.php?id=9860
https://bugzilla.redhat.com/show_bug.cgi?id=1285235

to recap:
- boot from install dvd/usb
- from the boot menu (I've used Interactive Install) press TAB and add at the end of the line:
initcall_blacklist=clocksource_done_booting
press enter and go on with installation
- after reboot press the e key on boot menu, and add afterLANG=en_US.UTF8 the same kernel parameter: initcall_blacklist=clocksource_done_booting
press Ctrl-X to start, go on with normal setup but update the NS/ before reboot... the installation of new kernel will solve the bug.

note: also the kernel-lt-4.4.19-1.el7.elrepo.x86_64 used for nDPI will work without problem

Remembering our origins GNU/Linux

The stephdl repository is opened

Nethserver-fail2ban needs testers


How to use Shell (basic commands)

The stephdl repository is opened

$
0
0

Hi @stephdl ,

Sorry to bother you but I still learn Linux.
So, how can I do that to receive email notifications?

TIA,
Gabriel

How to enable Digest MD5

$
0
0

I don't have a clue about this, but think what follows may be of use.

RFC 4513: LDAP Authentication Methods and Security Mechanisms (year 2006)

The name/password authentication mechanism (...) protected by TLS replaces the SASL DIGEST-MD5 mechanism as LDAP's mandatory-to-implement password-based authentication mechanism. Implementations are encouraged to continue supporting SASL DIGEST-MD5

RFC 4513: LDAP Authentication Methods and Security Mechanisms (year 2006)

As the SASL-DIGEST-MD5 mechanism is no longer mandatory to implement, this section is now historical

RFC 6331: Moving DIGEST-MD5 to Historic (year 2011)

This memo describes problems with the DIGEST-MD5 Simple Authentication and Security Layer (SASL) mechanism as specified in RFC 2831. It marks DIGEST-MD5 as OBSOLETE in the IANA Registry of SASL mechanisms and moves RFC 2831 to Historic status.

The stephdl repository is opened

$
0
0

probably a bug, my guess :slight_smile:

Each day, yum does a checkupdate and tests if some updates are available, then a mail is sent to the defunct 'admin' user. But Here I need to send the email to the root for NS7.

How to enable Digest MD5

$
0
0

@dnutan, thank you for this document.

This documents supports what I've talked to Avid support. Digest-MD5 is deprecated. I asked them for the possibility of the use of another authentication mechanism, like GSSAPI.

I'm hoping they are willing to do this.

Anyway, I appreciate the help I've got here!!

Viewing all 110699 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>