2
|
Linux секция за начинаещи / Настройка на програми / Fedora 27 и Cinnamon
|
-: Jun 17, 2019, 19:43
|
Здравейте, Инсталирах Cinnamon както е описано в тази статия https://www.hiroom2.com/2017/12/03/fedora-27-cinnamon-en/. Инсталацията мина успешно, със следните проблеми, които според мен не са съществени: Marking packages as removed by the group: @Multimedia chromium-libs-media-freeworld
Problem: problem with installed package dnfdragora-updater-1.0.1-9.git20180108.b0e8a66.fc27.noarch - installed package dnfdragora-updater-1.0.1-9.git20180108.b0e8a66.fc27.noarch obsoletes dnfdragora-gui < 1.0.1-7 provided by dnfdragora-gui-1.0.1-6.git20170505.2a3b056.fc27.noarch - package dnfdragora-updater-1.0.1-9.git20180108.b0e8a66.fc27.noarch obsoletes dnfdragora-gui < 1.0.1-7 provided by dnfdragora-gui-1.0.1-6.git20170505.2a3b056.fc27.noarch - conflicting requests
при стартирането се показва възможност да избера Cinnamon сесия, но се зарежда отново Gnome 3. В /etc/gdm/custom.conf съм променил реда # Uncoment the line below to force the login screen to use Xorg WaylandEnable=false
Някакви идеи?
|
|
|
3
|
Linux секция за начинаещи / Настройка на програми / Re: Надеждност на iptables?
|
-: Sep 08, 2016, 17:04
|
15:01 $ sudo iptables -L -v Chain INPUT (policy DROP 2058 packets, 197K bytes) pkts bytes target prot opt in out source destination 929 51087 fail2ban-proftpd tcp -- any any anywhere anywhere multiport dports ftp,ftp-data,ftps,ftps-data,1234,1233 124K 13M fail2ban-ssh-ddos tcp -- any any anywhere anywhere multiport dports ssh 124K 13M fail2ban-ssh tcp -- any any anywhere anywhere multiport dports ssh 28M 21G ufw-before-logging-input all -- any any anywhere anywhere 28M 21G ufw-before-input all -- any any anywhere anywhere 227K 55M ufw-after-input all -- any any anywhere anywhere 211K 53M ufw-after-logging-input all -- any any anywhere anywhere 211K 53M ufw-reject-input all -- any any anywhere anywhere 211K 53M ufw-track-input all -- any any anywhere anywhere
Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 0 0 ufw-before-logging-forward all -- any any anywhere anywhere 0 0 ufw-before-forward all -- any any anywhere anywhere 0 0 ufw-after-forward all -- any any anywhere anywhere 0 0 ufw-after-logging-forward all -- any any anywhere anywhere 0 0 ufw-reject-forward all -- any any anywhere anywhere
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 5210K 310M ufw-before-logging-output all -- any any anywhere anywhere 5210K 310M ufw-before-output all -- any any anywhere anywhere 25074 2368K ufw-after-output all -- any any anywhere anywhere 25074 2368K ufw-after-logging-output all -- any any anywhere anywhere 25074 2368K ufw-reject-output all -- any any anywhere anywhere 25074 2368K ufw-track-output all -- any any anywhere anywhere
Chain fail2ban-proftpd (1 references) pkts bytes target prot opt in out source destination 929 51087 RETURN all -- any any anywhere anywhere
Chain fail2ban-ssh (1 references) pkts bytes target prot opt in out source destination 89872 10M RETURN all -- any any anywhere anywhere
Chain fail2ban-ssh-ddos (1 references) pkts bytes target prot opt in out source destination 124K 13M RETURN all -- any any anywhere anywhere
Chain ufw-after-forward (1 references) pkts bytes target prot opt in out source destination
Chain ufw-after-input (1 references) pkts bytes target prot opt in out source destination 8453 660K ufw-skip-to-policy-input udp -- any any anywhere anywhere udp dpt:netbios-ns 2383 591K ufw-skip-to-policy-input udp -- any any anywhere anywhere udp dpt:netbios-dgm 11 528 ufw-skip-to-policy-input tcp -- any any anywhere anywhere tcp dpt:netbios-ssn 25 1260 ufw-skip-to-policy-input tcp -- any any anywhere anywhere tcp dpt:microsoft-ds 11 3701 ufw-skip-to-policy-input udp -- any any anywhere anywhere udp dpt:bootps 0 0 ufw-skip-to-policy-input udp -- any any anywhere anywhere udp dpt:bootpc 1990 460K ufw-skip-to-policy-input all -- any any anywhere anywhere ADDRTYPE match dst-type BROADCAST
Chain ufw-after-logging-forward (1 references) pkts bytes target prot opt in out source destination 0 0 LOG all -- any any anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "
Chain ufw-after-logging-input (1 references) pkts bytes target prot opt in out source destination 1318 134K LOG all -- any any anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "
Chain ufw-after-logging-output (1 references) pkts bytes target prot opt in out source destination 246 28342 LOG all -- any any anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] "
Chain ufw-after-output (1 references) pkts bytes target prot opt in out source destination
Chain ufw-before-forward (1 references) pkts bytes target prot opt in out source destination 0 0 ufw-user-forward all -- any any anywhere anywhere
Chain ufw-before-input (1 references) pkts bytes target prot opt in out source destination 133 10494 ACCEPT all -- lo any anywhere anywhere 16M 12G ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 1025 54531 ufw-logging-deny all -- any any anywhere anywhere state INVALID 1025 54531 DROP all -- any any anywhere anywhere state INVALID 0 0 ACCEPT icmp -- any any anywhere anywhere icmp destination-unreachable 0 0 ACCEPT icmp -- any any anywhere anywhere icmp source-quench 0 0 ACCEPT icmp -- any any anywhere anywhere icmp time-exceeded 0 0 ACCEPT icmp -- any any anywhere anywhere icmp parameter-problem 98 3756 ACCEPT icmp -- any any anywhere anywhere icmp echo-request 11 6336 ACCEPT udp -- any any anywhere anywhere udp spt:bootps dpt:bootpc 120K 8694K ufw-not-local all -- any any anywhere anywhere 3307 247K ACCEPT udp -- any any anywhere 224.0.0.251 udp dpt:mdns 0 0 ACCEPT udp -- any any anywhere 239.255.255.250 udp dpt:1900 117K 8447K ufw-user-input all -- any any anywhere anywhere
Chain ufw-before-logging-forward (1 references) pkts bytes target prot opt in out source destination 0 0 LOG all -- any any anywhere anywhere state NEW limit: avg 3/min burst 10 LOG level warning prefix "[UFW AUDIT] "
Chain ufw-before-logging-input (1 references) pkts bytes target prot opt in out source destination 1318 150K LOG all -- any any anywhere anywhere state NEW limit: avg 3/min burst 10 LOG level warning prefix "[UFW AUDIT] "
Chain ufw-before-logging-output (1 references) pkts bytes target prot opt in out source destination 245 28290 LOG all -- any any anywhere anywhere state NEW limit: avg 3/min burst 10 LOG level warning prefix "[UFW AUDIT] "
Chain ufw-before-output (1 references) pkts bytes target prot opt in out source destination 133 10494 ACCEPT all -- any lo anywhere anywhere 3019K 169M ACCEPT all -- any any anywhere anywhere state RELATED,ESTABLISHED 9514 1002K ufw-user-output all -- any any anywhere anywhere
Chain ufw-logging-allow (0 references) pkts bytes target prot opt in out source destination 0 0 LOG all -- any any anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] "
Chain ufw-logging-deny (2 references) pkts bytes target prot opt in out source destination 1 40 LOG all -- any any anywhere anywhere state INVALID limit: avg 3/min burst 10 LOG level warning prefix "[UFW AUDIT INVALID] " 1 40 LOG all -- any any anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "
Chain ufw-not-local (1 references) pkts bytes target prot opt in out source destination 72539 6248K RETURN all -- any any anywhere anywhere ADDRTYPE match dst-type LOCAL 42820 1359K RETURN all -- any any anywhere anywhere ADDRTYPE match dst-type MULTICAST 4807 1088K RETURN all -- any any anywhere anywhere ADDRTYPE match dst-type BROADCAST 0 0 ufw-logging-deny all -- any any anywhere anywhere limit: avg 3/min burst 10 0 0 DROP all -- any any anywhere anywhere
Chain ufw-reject-forward (1 references) pkts bytes target prot opt in out source destination
Chain ufw-reject-input (1 references) pkts bytes target prot opt in out source destination
Chain ufw-reject-output (1 references) pkts bytes target prot opt in out source destination
Chain ufw-skip-to-policy-forward (0 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- any any anywhere anywhere
Chain ufw-skip-to-policy-input (7 references) pkts bytes target prot opt in out source destination 12873 1716K DROP all -- any any anywhere anywhere
Chain ufw-skip-to-policy-output (0 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- any any anywhere anywhere
Chain ufw-track-input (1 references) pkts bytes target prot opt in out source destination
Chain ufw-track-output (1 references) pkts bytes target prot opt in out source destination 1338 81860 ACCEPT tcp -- any any anywhere anywhere state NEW 8067 913K ACCEPT udp -- any any anywhere anywhere state NEW
Chain ufw-user-forward (1 references) pkts bytes target prot opt in out source destination
Chain ufw-user-input (1 references) pkts bytes target prot opt in out source destination 66 4193 DROP all -- any any 116.16.0.0/12 anywhere 0 0 DROP all -- any any 221.192.0.0/14 anywhere 19 1076 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ssh 0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:ssh 19 1012 ACCEPT tcp -- any any anywhere anywhere tcp dpt:http 0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:http 6 296 ACCEPT tcp -- any any anywhere anywhere tcp dpt:https 0 0 ACCEPT udp -- any any anywhere anywhere udp dpt:https 1 60 ACCEPT tcp -- any any anywhere anywhere tcp dpt:1234 1 60 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ftp-data 0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:49152 0 0 ACCEPT tcp -- any any anywhere anywhere tcp dpt:65534 1 60 ACCEPT tcp -- any any anywhere anywhere tcp dpt:ftp 0 0 ACCEPT tcp -- any any angie-desktop.local anywhere tcp dpt:webmin 0 0 ACCEPT udp -- any any angie-desktop.local anywhere udp dpt:10000
Chain ufw-user-limit (0 references) pkts bytes target prot opt in out source destination 0 0 LOG all -- any any anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] " 0 0 REJECT all -- any any anywhere anywhere reject-with icmp-port-unreachable
Chain ufw-user-limit-accept (0 references) pkts bytes target prot opt in out source destination 0 0 ACCEPT all -- any any anywhere anywhere
Chain ufw-user-logging-forward (0 references) pkts bytes target prot opt in out source destination
Chain ufw-user-logging-input (0 references) pkts bytes target prot opt in out source destination
Chain ufw-user-logging-output (0 references) pkts bytes target prot opt in out source destination
Chain ufw-user-output (1 references) pkts bytes target prot opt in out source destination
|
|
|
4
|
Linux секция за начинаещи / Настройка на програми / Re: Надеждност на iptables?
|
-: Sep 08, 2016, 12:52
|
До колкото съм запознат, когато инсталираш и конфигурираш fail2ban заявките за ssh минават през него първо и после ги дропи през айпитаблиците. Така, че предполагам затова ти излиза в fail2ban лога. @Makeme, мисля, че не си напълно прав. Според мен последователността е следната: заявка -> iptables -> филтрирана заявка -> fail2ban -> нов филтър/правило в iptables. В моя случай DROP all -- 116.16.0.0/12 anywhere е филтъра/правилото на iptables, която е „прескочено“ от 116.31.116.51, и след 3 поредни опита за влизане за времето от 09:56 до 10:10 е създадено ново правило, важащо 1 час DROP all -- 116.31.116.51 anywhere . Напр. в момента (12:51) е валидно „твърдото“ правило на iptables, като след 10:10 не е правен нов опит да влизане от този адрес (има от други).
|
|
|
5
|
Linux секция за начинаещи / Настройка на програми / Надеждност на iptables?
|
-: Sep 08, 2016, 11:05
|
Здравейте, доколко надеждно е блокирането на външни заявки с iptables? Ситуацията е следната: В ufw съм блокирал всичко от адреси 116.16.0.0 /12 $ sudo ufw status numbered | grep 116 [ 1] Anywhere DENY IN 116.16.0.0/12 Съответното правило (2) в iptables е: $ sudo iptables -L | grep 116 DROP all -- 116.31.116.51 anywhere DROP all -- 116.16.0.0/12 anywhere Маската 12 трябва да покрива адресите 116.16.0.0 - 116.31.255.255: $ sudo whois 116.16.0.0/12 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '116.16.0.0 - 116.31.255.255'
inetnum: 116.16.0.0 - 116.31.255.255 netname: CHINANET-GD descr: CHINANET Guangdong province network descr: China Telecom descr: No.31,jingrong street descr: Beijing 100032 country: CN admin-c: CH93-AP tech-c: IC83-AP mnt-by: APNIC-HM mnt-lower: MAINT-CHINANET-GD mnt-routes: MAINT-CHINANET-GD status: ALLOCATED PORTABLE ...
Въпреки блокирането на адрес от този диапазон (116.31.116.51) от iptables в 09:56: $ sudo cat /var/log/ufw.log | grep "SRC=116." |tail ... Sep 8 09:56:15 localhost kernel: [2163845.260896] [UFW BLOCK] IN=eth0 OUT= MAC=00:03:47:62:66:1b:00:17:3f:62:4e:2c:08:00 SRC=116.31.116.51 DST=192.168.1.3 LEN=40 TOS=0x00 PREC=0x00 TTL=42 ID=17876 DF PROTO=TCP SPT=49121 DPT=22 WINDOW=0 RES=0x00 RST URGP=0 в 10:10 той отново е блокиран от fail2ban: $ sudo cat /var/log/fail2ban.log |grep "Ban 116" ... 2016-09-07 15:09:33,978 fail2ban.actions: WARNING [ssh] Ban 116.31.116.51 2016-09-07 16:20:03,830 fail2ban.actions: WARNING [ssh] Ban 116.31.116.51 2016-09-07 18:45:52,513 fail2ban.actions: WARNING [ssh] Ban 116.31.116.51 2016-09-07 19:55:17,292 fail2ban.actions: WARNING [ssh] Ban 116.31.116.51 2016-09-08 00:23:02,900 fail2ban.actions: WARNING [ssh] Ban 116.31.116.51 2016-09-08 02:15:08,732 fail2ban.actions: WARNING [ssh] Ban 116.31.116.51 2016-09-08 03:45:36,210 fail2ban.actions: WARNING [ssh] Ban 116.31.116.51 2016-09-08 10:10:05,415 fail2ban.actions: WARNING [ssh] Ban 116.31.116.51 Как заявките от този адрес се „промъкват“ и защо?
|
|
|
7
|
Linux секция за начинаещи / Настройка на програми / Re: Проблем при настройката на виртуалните сървъри на proftpd
|
-: Aug 11, 2016, 19:40
|
Gosho_tr, благодаря за решението ![Beer [_]3](https://www.linux-bg.org/forum/Smileys/default/beer.gif) . Получи се това, което желаех, но имам още 2 въпроса: 1. Възможно ли е вместо адрес на виртуалния хост да се използва домейн? Защото в примерния файл virtuals.conf, създаден при инсталацията на proftpd е написано: "# Note that FTP protocol requires IP based virtual host, not name based.", а в примерите от цитирания линк е: "<VirtualHost ftp.virtual.com>", т. е. name based virtual host. 2. Възможно ли е, и ако да - как, да излиза и при анонимните потребители форма за регистрация, при която те да въвеждат име напр. anonymous, а за парола - (произволна) електронна поща? Поздрави, А.
|
|
|
8
|
Linux секция за начинаещи / Настройка на програми / Проблем при настройката на виртуалните сървъри на proftpd
|
-: Aug 10, 2016, 18:23
|
ProFTPD Version 1.3.4a Linux angies-server 3.2.0-91-generic-pae #129-Ubuntu SMP Wed Sep 9 11:27:47 UTC 2015 i686 i686 i386 GNU/Linux Здравейте, идеята ми е да имам 2 вида достъп до ftp сървъра: анонимен на порт 21 и с автентикация на друг порт, напр. на 1234. При предишните ми опити (без вирт. сървъри) форма за автентикация излизаше само при липсата на секция <Anonymous>, а при наличието ѝ, когато искам да вляза като регистриран потребител трябва името/паролата да въведа като открит текст в url. Всъщност ме устройва и влизането на анонимните потребители да е с anonymous/email, ако се ползва някаква форма за автентикация. До момента не открих как да направя това. Използвам примера от http://www.proftpd.org/docs/configs/virtual.conf с леки модификации: # # Proftpd sample configuration for Virtual Hosts and Virtual Roots. # # Note that FTP protocol requires IP based virtual host, not name based. # # http://www.proftpd.org/docs/configs/virtual.conf # First virtual server <VirtualHost example.eu> ServerName "Virtual.com's FTP Server"
MaxClients 10 MaxLoginAttempts 1
# DeferWelcome prevents proftpd from displaying the servername # until a client has authenticated. DeferWelcome on
# Limit normal user logins, because we only want to allow # guest logins. <Limit LOGIN> DenyAll </Limit>
# Next, create a "guest" account (which could be used # by a customer to allow private access to their web site, etc) <Anonymous /srv/ftp> User angie Group angie # AnonRequirePassword on
<Limit LOGIN> AllowAll </Limit>
HideUser root HideGroup root
# A private directory that we don't want the user getting in to. <Directory logs> <Limit READ WRITE DIRS> DenyAll </Limit> </Directory> </Anonymous> </VirtualHost> # Another virtual server, this one running on our primary address, # but on port 4000. The only access is to a single anonymous login. <VirtualHost example.eu> ServerName "Our private FTP server" Port 1234 Umask 027
<Limit LOGIN> DenyAll </Limit>
<Anonymous /srv/ftp/anonymous> User ftp Group nogroup UserAlias anonymous ftp
<Limit LOGIN> AllowAll </Limit>
<Limit WRITE> DenyAll </Limit>
<Directory incoming> <Limit WRITE> AllowAll </Limit> </Directory> </Anonymous> </VirtualHost>
Нямам искане за някакъв вид автентикация, но винаги, независимо дали на порт 21 или на порт 1234, ми излиза форма за въвеждане на име и парола, като се влиза в домашната директория на потребителя, чието име/парола са въведени. Това ме навежда на мисълта, че виртуалните сървъри не работят. proftpd -d 10 не дава някакво важно съобщение за грешка: angie@angies-server:/etc/proftpd$ sudo proftpd -d 10 angies-server proftpd[8318]: using PCRE 8.12 2011-01-15 angies-server proftpd[8318]: using TCP receive buffer size of 87380 bytes angies-server proftpd[8318]: using TCP send buffer size of 16384 bytes angies-server proftpd[8318]: testing Unix domain socket using S_ISFIFO angies-server proftpd[8318]: testing Unix domain socket using S_ISSOCK angies-server proftpd[8318]: using S_ISSOCK macro for Unix domain socket detection angies-server proftpd[8318]: ROOT PRIVS at mod_core.c:358 angies-server proftpd[8318]: loading 'mod_ctrls_admin.c' angies-server proftpd[8318]: loading 'mod_tls.c' angies-server proftpd[8318]: mod_tls/2.4.3: compiled using OpenSSL version 'OpenSSL 1.0.0e 6 Sep 2011' headers, but linked to OpenSSL version 'OpenSSL 1.0.1 14 Mar 2012' library angies-server proftpd[8318]: mod_tls/2.4.3: using OpenSSL 1.0.0e 6 Sep 2011 angies-server proftpd[8318]: loading 'mod_radius.c' angies-server proftpd[8318]: loading 'mod_quotatab.c' angies-server proftpd[8318]: loading 'mod_quotatab_file.c' angies-server proftpd[8318]: loading 'mod_quotatab_radius.c' angies-server proftpd[8318]: loading 'mod_wrap.c' angies-server proftpd[8318]: loading 'mod_rewrite.c' angies-server proftpd[8318]: loading 'mod_load.c' angies-server proftpd[8318]: loading 'mod_ban.c' angies-server proftpd[8318]: loading 'mod_wrap2.c' angies-server proftpd[8318]: loading 'mod_wrap2_file.c' angies-server proftpd[8318]: loading 'mod_dynmasq.c' angies-server proftpd[8318]: loading 'mod_exec.c' angies-server proftpd[8318]: loading 'mod_shaper.c' angies-server proftpd[8318]: loading 'mod_ratio.c' angies-server proftpd[8318]: loading 'mod_site_misc.c' angies-server proftpd[8318]: loading 'mod_sftp.c' angies-server proftpd[8318]: mod_sftp/0.9.8: compiled using OpenSSL version 'OpenSSL 1.0.0e 6 Sep 2011' headers, but linked to OpenSSL version 'OpenSSL 1.0.1 14 Mar 2012' library angies-server proftpd[8318]: mod_sftp/0.9.8: using OpenSSL 1.0.0e 6 Sep 2011 angies-server proftpd[8318]: loading 'mod_sftp_pam.c' angies-server proftpd[8318]: loading 'mod_facl.c' angies-server proftpd[8318]: loading 'mod_unique_id.c' angies-server proftpd[8318]: loading 'mod_copy.c' angies-server proftpd[8318]: loading 'mod_deflate.c' angies-server proftpd[8318]: mod_deflate/0.5.5: using zlib 1.2.3.4 angies-server proftpd[8318]: loading 'mod_ifversion.c' angies-server proftpd[8318]: loading 'mod_tls_memcache.c' angies-server proftpd[8318]: mod_tls_memcache/0.1: notice: unable to register 'memcache' SSL session cache: Memcache support not enabled angies-server proftpd[8318]: loading 'mod_ifsession.c' angies-server proftpd[8318]: RELINQUISH PRIVS at mod_core.c:380 angies-server proftpd[8318]: disabling runtime support for IPv6 connections angies-server proftpd[8318]: DenyFilter: compiling regex '\*.*/' angies-server proftpd[8318]: <IfModule>: using 'mod_dynmasq.c' section at line 58 angies-server proftpd[8318]: retrieved UID 108 for user 'proftpd' angies-server proftpd[8318]: retrieved GID 65534 for group 'nogroup' angies-server proftpd[8318]: ROOT PRIVS at mod_log.c:588 angies-server proftpd[8318]: RELINQUISH PRIVS at mod_log.c:593 angies-server proftpd[8318]: <IfModule>: using 'mod_quotatab.c' section at line 108 angies-server proftpd[8318]: <IfModule>: using 'mod_ratio.c' section at line 112 angies-server proftpd[8318]: <IfModule>: using 'mod_delay.c' section at line 120 angies-server proftpd[8318]: <IfModule>: using 'mod_ctrls.c' section at line 124 angies-server proftpd[8318]: ROOT PRIVS at mod_ctrls.c:112 angies-server proftpd[8318]: RELINQUISH PRIVS at mod_ctrls.c:114 angies-server proftpd[8318]: <IfModule>: using 'mod_ctrls_admin.c' section at line 132 angies-server proftpd[8318]: ROOT PRIVS at mod_core.c:358 angies-server proftpd[8318]: retrieved UID 0 for user 'root' angies-server proftpd[8318]: retrieved GID 0 for group 'root' angies-server proftpd[8318]: <Directory logs>: adding section for resolved path '/logs' angies-server proftpd[8318]: <Directory incoming>: adding section for resolved path '/incoming' angies-server proftpd[8318]: <IfModule>: skipping 'mod_vroot.c' section at line 127 angies-server proftpd[8318]: RELINQUISH PRIVS at mod_core.c:380 angies-server proftpd[8318]: <Directory /srv/www/>: adding section for resolved path '/srv/www/' angies-server proftpd[8318]: ROOT PRIVS at mod_core.c:358 angies-server proftpd[8318]: RELINQUISH PRIVS at mod_core.c:380 angies-server proftpd[8318] localhost: angies-server proftpd[8318] localhost: Config for Angie's FTP Server: angies-server proftpd[8318] localhost: IdentLookups angies-server proftpd[8318] localhost: DeferWelcome angies-server proftpd[8318] localhost: MultilineRFC2228 angies-server proftpd[8318] localhost: DefaultServer angies-server proftpd[8318] localhost: ShowSymlinks angies-server proftpd[8318] localhost: TimeoutNoTransfer angies-server proftpd[8318] localhost: TimeoutStalled angies-server proftpd[8318] localhost: TimeoutIdle angies-server proftpd[8318] localhost: DisplayLogin angies-server proftpd[8318] localhost: DisplayChdir angies-server proftpd[8318] localhost: ListOptions angies-server proftpd[8318] localhost: DenyFilter angies-server proftpd[8318] localhost: PassivePorts angies-server proftpd[8318] localhost: UserID angies-server proftpd[8318] localhost: UserName angies-server proftpd[8318] localhost: GroupID angies-server proftpd[8318] localhost: GroupName angies-server proftpd[8318] localhost: Umask angies-server proftpd[8318] localhost: DirUmask angies-server proftpd[8318] localhost: AllowOverwrite angies-server proftpd[8318] localhost: TransferLog angies-server proftpd[8318] localhost: QuotaEngine angies-server proftpd[8318] localhost: Ratios angies-server proftpd[8318] localhost: DelayEngine angies-server proftpd[8318] localhost: /srv/www/ angies-server proftpd[8318] localhost: Limit angies-server proftpd[8318] localhost: AllowUser angies-server proftpd[8318] localhost: ShowSymlinks angies-server proftpd[8318] localhost: TimeoutNoTransfer angies-server proftpd[8318] localhost: TimeoutStalled angies-server proftpd[8318] localhost: TimeoutIdle angies-server proftpd[8318] localhost: DisplayLogin angies-server proftpd[8318] localhost: DisplayChdir angies-server proftpd[8318] localhost: ListOptions angies-server proftpd[8318] localhost: DenyFilter angies-server proftpd[8318] localhost: Umask angies-server proftpd[8318] localhost: DirUmask angies-server proftpd[8318] localhost: AllowOverwrite angies-server proftpd[8318] localhost: TransferLog angies-server proftpd[8318] localhost: Ratios angies-server proftpd[8318] localhost: angies-server proftpd[8318] localhost: Config for Virtual.com's FTP Server: angies-server proftpd[8318] localhost: /srv/ftp/ angies-server proftpd[8318] localhost: /logs angies-server proftpd[8318] localhost: Limit angies-server proftpd[8318] localhost: DenyAll angies-server proftpd[8318] localhost: HideUser angies-server proftpd[8318] localhost: HideGroup angies-server proftpd[8318] localhost: MaxClients angies-server proftpd[8318] localhost: Limit angies-server proftpd[8318] localhost: AllowAll angies-server proftpd[8318] localhost: UserName angies-server proftpd[8318] localhost: GroupName angies-server proftpd[8318] localhost: HideUser angies-server proftpd[8318] localhost: HideGroup angies-server proftpd[8318] localhost: MaxClients angies-server proftpd[8318] localhost: Limit angies-server proftpd[8318] localhost: DenyAll angies-server proftpd[8318] localhost: MaxClients angies-server proftpd[8318] localhost: MaxLoginAttempts angies-server proftpd[8318] localhost: DeferWelcome angies-server proftpd[8318] localhost: /srv/www/ angies-server proftpd[8318] localhost: Limit angies-server proftpd[8318] localhost: AllowUser angies-server proftpd[8318] localhost: MaxClients angies-server proftpd[8318] localhost: angies-server proftpd[8318] localhost: Config for Our private FTP server: angies-server proftpd[8318] localhost: /srv/ftp/anonymous/ angies-server proftpd[8318] localhost: /incoming angies-server proftpd[8318] localhost: Limit angies-server proftpd[8318] localhost: AllowAll angies-server proftpd[8318] localhost: Umask angies-server proftpd[8318] localhost: Limit angies-server proftpd[8318] localhost: DenyAll angies-server proftpd[8318] localhost: Limit angies-server proftpd[8318] localhost: AllowAll angies-server proftpd[8318] localhost: UserName angies-server proftpd[8318] localhost: GroupName angies-server proftpd[8318] localhost: UserAlias angies-server proftpd[8318] localhost: Umask angies-server proftpd[8318] localhost: Limit angies-server proftpd[8318] localhost: DenyAll angies-server proftpd[8318] localhost: Umask angies-server proftpd[8318] localhost: /srv/www/ angies-server proftpd[8318] localhost: Limit angies-server proftpd[8318] localhost: AllowUser angies-server proftpd[8318] localhost: Umask angies-server proftpd[8318] localhost: ROOT PRIVS at mod_delay.c:425 angies-server proftpd[8318] localhost: RELINQUISH PRIVS at mod_delay.c:430 angies-server proftpd[8318] localhost: mod_lang/0.9: binding to text domain 'proftpd' using locale path '/usr/share/locale' angies-server proftpd[8318] localhost: mod_lang/0.9: using locale files in '/usr/share/locale' angies-server proftpd[8318] localhost: mod_lang/0.9: skipping possible language 'it': not supported by setlocale(3); see `locale -a' angies-server proftpd[8318] localhost: mod_lang/0.9: skipping possible language 'ru': not supported by setlocale(3); see `locale -a' angies-server proftpd[8318] localhost: mod_lang/0.9: skipping possible language 'zh_CN': not supported by setlocale(3); see `locale -a' angies-server proftpd[8318] localhost: mod_lang/0.9: skipping possible language 'zh_TW': not supported by setlocale(3); see `locale -a' angies-server proftpd[8318] localhost: mod_lang/0.9: skipping possible language 'bg_BG': not supported by setlocale(3); see `locale -a' angies-server proftpd[8318] localhost: mod_lang/0.9: skipping possible language 'fr_FR': not supported by setlocale(3); see `locale -a' angies-server proftpd[8318] localhost: mod_lang/0.9: skipping possible language 'ja_JP': not supported by setlocale(3); see `locale -a' angies-server proftpd[8318] localhost: mod_lang/0.9: skipping possible language 'ko_KR': not supported by setlocale(3); see `locale -a' angies-server proftpd[8318] localhost: mod_lang/0.9: added the following supported languages: en_US.UTF-8, en_US angies-server proftpd[8318] localhost: retrieved group ID: 65534 angies-server proftpd[8318] localhost: setting group ID: 65534 angies-server proftpd[8318] localhost: SETUP PRIVS at main.c:3325 angies-server proftpd[8318] localhost: ROOT PRIVS at main.c:2295 angies-server proftpd[8318] localhost: RELINQUISH PRIVS at main.c:2304
Пробвах и двата вирт. сървъра да се различават и по име, напр. example.eu и ftp.example.eu. Резултатът е същият. Някакви идеи?
|
|
|
9
|
Нетехнически теми / Идеи и мнения / Re: Openstreetmap
|
-: Jul 27, 2016, 20:14
|
За навигация използвам главно две приложения, използващи openstreetmap - и двете чешки: Navigator Free и Beonroad. Първото е по-семпло, по-леко, но без български глас. Второто има 3-D изглед, но понякога не може да хване веднага сателита. Пробвал съм и много хваленото Maps.me, но то изобщо няма гласов съпровод. Wize има предимството на псевдо-tms - изчислява се скоростта на абонатите и по този начин се предполага къде има задръствания, но изисква постоянна интернет свързаност за предаване на данните. Относно адресите: адресите ги има и са толкова точни, доколкото някой ги е въвел. След всяко пътуване въвеждам и уточнявам адреси и координати на различни обекти и забележителности. Далеч съм от резултатите на Ivanatora, но това не е състезание. Проблемът е в това, че обикновено потребителите въвеждат адресите на собствения си език. Т. е. в Гърция трябва да въведете името на улицата на гръцки, а не на някаква транслитерация на латиница. Проблемът се решава, като предварително от други източници (Google Maps, ViaMichelin и др.) извадите GPS координатите и използвате тях. Собствените ми наблюдения са, че картите на openstreetmap.org и съответно навигацията по тях са по-точни и по-безпроблемни, без излишни „фльонги“ и набутване в затворени пътища, отколкото тези на iGO напр.
|
|
|
13
|
Linux секция за начинаещи / Настройка на програми / Re: Anonymous достъп до proftpd
|
-: Oct 04, 2015, 19:55
|
Korry, 1. За съжаление късно прочетох съвета ти ;( 2. Директивата „RequireValidShell off“ беше в proftp.conf, но това не променяше по никакъв начин ситуацията 3. Преинсталирах ,нормално“ - от команден ред 4. Всичко работи (поне така изглежда) - анонимните потребители четат от определена директория, регистрираните - четат и пишат в своята.
С удоволствие и благодарност приемам съвети как да направя така, че и регистрираните потребители да могат да четат и пишав директорията на анонимните!
|
|
|
14
|
Linux секция за начинаещи / Настройка на програми / Re: Anonymous достъп до proftpd
|
-: Oct 02, 2015, 19:32
|
Neter, нямам виртуални потребители. Още не съм се „изучил“ толкова. Korry, благодаря за файла. Тъй като разликите бяха доста, използвах твоя файл (с коригирани потребителски имена, но запазена структура на директориите). Резултат - влизане с нормален потребител, но не и с анонимен. Status: Connecting to 192.168.2.3:21... Status: Connection established, waiting for welcome message... Response: 220 ProFTPD 1.3.4a Server ready. Command: USER anonymous Response: 331 Password required for anonymous Command: PASS ************** Response: 530 Login incorrect. Error: Critical error Error: Could not connect to server Явно, както предположи Брадата по-горе, Webmin-ът е омазал нещо (както беше направил и със Samba-та) и вариантът е да деинсталирам всичко и на направя „чиста“ инсталация. Благодаря на всички отзовали се! ПП Neter, не знам дали трябва да сложа статус „solved“, тъй като проблемът де факто не е решен?!
|
|
|
15
|
Linux секция за начинаещи / Настройка на програми / Re: Anonymous достъп до proftpd
|
-: Oct 01, 2015, 19:57
|
Никакви, поне доколкото знам. Инсталацията и първоначалния опит за конфигурация беше през Webmin, но повечето опции не ми бяха напълно ясни и затова копирах настройките за anonymous от документацията на проекта. Коментираната част на proftpd.conf за анонимния достъп не съм я оставил без изменение.
|
|
|
|