Recent Questions - Server Fault |
- How can I set-up a domain in Azure and use Exchange Server services there?
- Kubernetes: Service connection timeout
- postfix limit sending rate PER MX domain?
- Docker Swarm, how to access private services on overlay network from an external client
- Persistent storage in captive portals or mobile internet while wifi connection without internet
- Implicitly allow requests in IIS from valid hostname
- route ipv4 to ipv6 as mechanism to overcome not owning an ipv4 block for load balancing purposes on premise k8s (none aws/gcp)
- Backup drive spindown : is it harmfull?
- Password security of encrypted SSH private key: How to read round number or costfactor of bcrypt
- SQL Server Linked Server readonly as security measure
- How to set up a secure system to allow only specific clients to access specific services on a server?
- All tasks in Task scheduler are going to queued state when triggered
- Security implications of directly connecting a Windows PC to ISP via Network Adapter with Ethernet cable bypassing the Router
- ansible constructing variable name from another variable
- Finding the IP Address of a computer (through a firewall)
- Zabbix : Invalid JSON
- How to redirect all Apache 2.4 websites to maintenance page while allowing access to specified IP addresses
- Setting a root password in an OVA and making it configurable
- MariaDB-Server wont start after Server Reboot
- 'Could not find filesystem /dev/root' after Clonezilla clone of redhat install to newer hardware'
- How to build and update iptables latest version for CentOS 7
- How do authentication servers handle thousands of CPU intensive logins?
- keepalived master cannot reclaim virtual IP after recovered
- Configuring IIS ARR for backend client certificate authentication
- Unstick a reboot when PsKill doesn't work
- Task Scheduler with Virtual Accounts, possible?
- How to unblock service discovery for IPv4 via Avahi?
- Run http server behind proxy
- How do you configure QoS for Skype?
How can I set-up a domain in Azure and use Exchange Server services there? Posted: 10 Apr 2021 06:49 PM PDT I'm currently raising a startup company that's using an ISP's services. All we have at this time is IMAP for e-mail. And we're using JIRA/Confluence. I want to migrate us to a comprehensive infrastructure, using domain accounts for our Windows 10x64 machines, e-mails, shared calendars, shared contacts (i.e. Exchange Server features), Azure DevOps, MS Teams, SharePoint etc. I did some research, but I couldn't find any information explaining on how to do that, particularly regarding using Outlook 2019 with Azure. When it's about Azure AD, I only find information on how to synchronize a local domain to Azure, but no information on how to easily utilize Azure as a replacement for a domain controller. As a start, I would need to know what to do in order to create a domain on Azure (i.e. using Azure as a domain controller), migrate our domain name to Azure AD and to get Exchange Server features running in Azure, so we can use Outlook 2019 on their machines. |
Kubernetes: Service connection timeout Posted: 10 Apr 2021 05:58 PM PDT I'm setting a lab cluster with 3 nodes (1 master, 2 workers) in 3 different networks and connected by VPN. I used Flannel for Pod network. My config includes a helloworld app (targetPort=8080, replicas=10) and a associated service (nodePort=30001). Everything fine while pods distributed in only 1 node, I can reach API endpoint by issueing: But when pods spread to 2 worker nodes, it was timeout when the request forwarded to pods in other node. For example, if I was in Node 1 and My sample deploy: |
postfix limit sending rate PER MX domain? Posted: 10 Apr 2021 04:48 PM PDT I know postfix can limit concurrent connections to recipient "domains", but I am sending emails to websites from different domains that may use the same email service (Google, Outlook, etc.) for the MX domains. Is there a way to limit the sending rate by the MX domain as opposed to the domain of the email address? |
Docker Swarm, how to access private services on overlay network from an external client Posted: 10 Apr 2021 04:34 PM PDT I'm building a micro-service system based on Docker Swarm. Some of these services must be accessible for company's internal use only, like administrative dashboards, DBs, etc. Services are interconnected by Docker's overlay networks, and only public ports are published to Internet. What I want to do is to create a simple What I thought was about to install an OpenVPN server with a container on the net, I've read a bit around but I wasn't able to find clear information on this way. I've found people talking about issues configuring the routing tables, and configuring the DNS for use the docker's one, for be able to resolve services' names instead of machines IPs. I'm still learning Docker, and I'm asking what is best pattern in these cases. How can I restrict access to an overlay network to only authorized external clients, and make them able to access services on the same net? |
Persistent storage in captive portals or mobile internet while wifi connection without internet Posted: 10 Apr 2021 04:17 PM PDT I have a little problem here: Would be great, if there is a way to do that...... |
Implicitly allow requests in IIS from valid hostname Posted: 10 Apr 2021 05:21 PM PDT I have a few publicly accessible IIS servers and sites (personal and corporate), these hosts have own domains/subdomains, and all legit access to these https sites happen through domains. Almost all HTTP app vulnerability scans from bots/rooted servers happen to the servers through IP, without valid hostname, and if there is hostname it is the default reverse DNS host, not the actual domain of the site. Is there a way in IIS to implicitly only allow requests with proper hostname? The site root app only has bindings to the hostname, but IIS still accepts requests, and responds with 404. The best thing would be to timeout the request similar fashion as if the site doesn't have HTTP open. I of course understand that this does not guarantee anything in security wise, the scanner can still figure out the proper hostname in many ways, but it would still filter out 90% of dummy scans. IPS in firewall can probably do some things, but in some cases I do not have that luxury. Is there way in IIS? Redirect the http request to oblivion? (this would probably just change the error to proxy gateway http errors?) |
Posted: 10 Apr 2021 09:12 PM PDT This is not a question about tunnelling, although that may be part of a solution. With public cloud providers it's trivial to request a load balancer due to providers owning large class A/B/C public IPv4 blocks. However, whilst it's trivial to own an ipv6 block, it's non-trivial to issue load balancer addresses because you can't assume incoming traffic supports ipv6. How to bridge this gap? Trying to achieve: Given limited ipv4 public addresses (4), instead , generate layer 7 http load balancer A records, which map to ipv4 addresses. These ip4 addresses then route to in-cluster ipv6 cluster addresses. Perhaps SNI is needed here? Constraints: Can't assume that Ingres traffic supports ipv6, so (if possible) SNAT is needed to rewrite ipv6 -> ipv6 and back again (is this possible?), iptables , and conntrack for connection tracking? https://sookocheff.com/post/kubernetes/understanding-kubernetes-networking-model/ https://kubernetes.io/docs/concepts/services-networking/dual-stack/ netfilter https://metallb.universe.tf/ https://linux.die.net/man/8/ip6tables https://community.hetzner.com/tutorials/install-kubernetes-cluster |
Backup drive spindown : is it harmfull? Posted: 10 Apr 2021 05:25 PM PDT I plan on doing a small, Raspberry PI4 based backup server for my house using USB external drives. My plan is to have each PC (4 of them) backing up to the server automatically every month. The rest of the time the drives would not be accessed or written to. Since I want the server to be as efficient as possible (in terms of power consumption), and with the least noise possible, I was considering spinning down the RAID 1 array as long as they are not used, and basically have them spinning up once a month for the backup, and then back down. What's your take on this ? |
Password security of encrypted SSH private key: How to read round number or costfactor of bcrypt Posted: 10 Apr 2021 09:01 PM PDT Here https://security.stackexchange.com/a/52564 you can read that newer OpenSSH versions use bcrypt for protecting the keyfile. Security of bcrypt depends on the costfactor see https://security.stackexchange.com/questions/139721/estimate-the-time-to-crack-passwords-using-bcrypt/201965#201965 According to https://crypto.stackexchange.com/questions/58536/how-does-openssh-use-bcrypt-to-set-ivs/58543#58543 the default bcrypt round number would be 16. This would a good security. But how to get the round count / cost factor? What I've done so far: Key looks like (to make it shorter here only a weak 1024 bit key) PW is Then lets decode the base64. Therefore first and last line beginning with '-----' have to be removed
Now open text.txt e.g. in Notepad++ This shows but now I have no idea how to read the roundcount from there. Can you assist? |
SQL Server Linked Server readonly as security measure Posted: 10 Apr 2021 09:06 PM PDT I've got a configuration with to separate VLANs. In one of te VLANs, a Microsoft SQL server is running and doing it's thing. I'd like to read (and only read) data from this server from the second VLAN. My solution is to create a DMZ and run a new SQL Server instance with a linked server in it. Is it possible for this linked server to act as a Read Only gateway between the two networks? So for example: Thus allowing the server in the DMZ to act as a gateway. Is this the way linked servers are intented? And if so, is this intended to be used to provide some layer of security? If not, what would be a better solution? |
Posted: 10 Apr 2021 09:07 PM PDT PrefacePlease bear with me if I use incorrect terminology or don't express the problem too well since I'm not an expert on system administration/server maintenance. Let me know/correct me if I do so I can learn and clarify my points. ProblemI have a Linux device, the server, that runs different services on different ports (an HTTP, SSH and FTP server currently, but possibly other servers for other protocols in the future). My friends and I have other devices, the clients, that are running Linux (incl. Android) or Windows, that we'd like to use to access the server's services, as long as both client and server are online on the internet, regardless of whether they're on the same local network. The other caveat is that we'd like to do this securely such that the server can ensure that it's really only me or my friends accessing it, that we can be sure that the server we're connecting to really is the correct server (not some MITM spoofing their identity as the server), and without third parties being able to obtain (too much) meaningful information by sniffing the exchanged packets. I'd also like to restrict my friends' access to only specific services (say, only HTTP and FTP for one friend, only SSH for another, etc.). Possibly relevant informationI have admin access to the server (I can install packages and configure it with unrestricted access) and local network router. The server is running nftables. Actions consideredI've thought of configuring nftables on the server to only allow inbound packets from specific IP addresses or devices with specific MAC addresses, but I don't think these are appropriate/adequate. First because of the constraint that we'd like to be able to connect from outside the local network, so the client devices' IP addresses can change. Second, because I know that MAC addresses can easily be spoofed so I can't use those to ensure that the client devices really are the allowed ones. Third, because these don't address the constraint that third parties shouldn't be able to obtain meaningful information by snooping on the packets (so ideally, the solution should employ some sort of cryptographic protocols to address this). Other thoughtsI'm thinking that the solution would involve setting up some sort of accounts-based system where my friends and I each have our own accounts and the server only allows packets of specific protocols from certain accounts. I'm also thinking I can maybe solve this by setting up a VPN server using a protocol like WireGuard or OpenVPN on the server which would only allow connections from authenticated clients in a whitelist, then route all other traffic like SSH and HTTP through the VPN tunnel, making them accessible only when connected via that tunnel. Would that work? But then I'm not sure how I'd configure that to restrict my friends' access to particular services only. Do these VPN protocols have some feature to restrict the types of traffic allowed per client? In any case, I don't really have a clue what the optimal solution for this is and how I'd set it up, so I'd really appreciate any useful advice, suggestions and information to solve this. |
All tasks in Task scheduler are going to queued state when triggered Posted: 10 Apr 2021 07:38 PM PDT recently we have a strange problem with scheduled tasks on Windows server 2019 with RDS role installed. 6 servers were restored from 3 months old backup, joined into the AD domain again and working as session hosts correctly, but none of the tasks in Task scheduler (which ran previously and are running on other SH's which weren't restored) is working no more. When you run the task manually, everything is working ok, but when you set it to some time, it state turn to Queued and don't execute. We tried to create new tasks, delete all tasks and create brand new, but nothing helped. It's not a problem of task settings, so please don't advise to run new instance in parallel or something similar simple. The same settings are working on the servers which weren't restored. We tried to look in the registry and in HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup\State ImageState is value IMAGE_STATE_COMPLETE and in HKEY_LOCAL_MACHINE\System\Setup\ChildCompletion\audit.exe has value 0 and oobebeldr.exe is set to 3. Servers are configured and customers are working on them, so reinstall is the last option. Will sysprep without generalize help here? Or something else? Thank you. |
Posted: 10 Apr 2021 09:24 PM PDT When diagnosing Internet connection issues (slow speed for example), an ISP technician may ask a user to connect their ISP-provided Ethernet cable directly to a device (typically a Windows PC) to run speed tests in the browser or pings, etc. (to rule out the possibility of the Router being the culprit). What are the likely (realistic) as well as theoretical security implications in as far as getting access to the device / retrieving information from it (accessing files, etc.) under the following assumptions:
And does this compromise saved passwords of network-mapped drives and locations (which are normally only accessible within LAN via the Router)? |
ansible constructing variable name from another variable Posted: 10 Apr 2021 03:08 PM PDT I have a ansible variable definition, and was wondering if i can get the variables value based on the variable defined during runtime execution of above should print, all values defined in the 'test' variable. |
Finding the IP Address of a computer (through a firewall) Posted: 10 Apr 2021 08:06 PM PDT I am looking for a way to find the IP address of a computer connected to a network. The scenario is the following:
I have read that you can use ping and nslookup for this. First, as a test, I tried ping and nslookup with a random hostname and I got their IP address as stated here. Then I tried, (just to test) this with a PC with a static IP. When I did I got the IP address however whenn I tried I got Can't file: Server failed Even if I can do this with ping, what happens when the target computer is behind a firewall? |
Posted: 10 Apr 2021 06:07 PM PDT I have a Powershell script returning a file like : { "data":[ { "{#SHARENAME}":"Informatique", "{#SHARENAME}":"Marketing" } ] } I've set a discovery rule (zabbix agent) + an Item prototype (zabbix trapper) with the Key : sharename[{#SHARENAME}] But the discovery rule says :
Why ?! |
Posted: 10 Apr 2021 08:06 PM PDT I have two mirrored Apache 2.4 servers behind a load balancer with about 50 websites hosted on each. I need to close them for maintenance while allowing access from several specified IP addresses. During the maintenance, the maintenance.html page should be presented to the visitors. I can't close it on the load balancer (which I initially wanted), so I need to make it through Apache configuration on both servers. Does anyone know what's the most effective and the simplest method? I've already read many similar posts but I could not find the right answer that actually works. Many thanks! |
Setting a root password in an OVA and making it configurable Posted: 10 Apr 2021 09:02 PM PDT I have this VM and it is always created with a default root password say "RootPassword55". Now, I'd like to configure it so that the user will have to provide a new password on initial login. I'm looking to configure this via OVF files but I couldn't get it to work. I have this OVA. I extract this and I get an OVF and a vmdk file. The OVF refers to the vmdk. I added the password set properties (details below) in this OVF, and import it from virtual box but it doesn't seem to work. I tried setting a property under the ProductSection element in the ovf but it doesn't seem to be picked up. I found quite a few links that say this is the right way to do it. Here's one of them - http://sflanders.net/2014/06/26/power-ovf-properties/. Scroll all the way down to password. This is what I tried setting in the ProductSection. What I understand is, this property defaults to the password HelloUser if the user doesn't set a password while booting the VM. Also, it should ask the user to set a root password. But when I load the VM it still works with the previous default of RootPassword55 and seemingly, totally ignores my custom ovf properties. I'm not sure where this "RootPassword55" is coming from. It's not in the ovf so it's probably in the vmdk file. What am I doing wrong and how can I fix this? Thanks. |
MariaDB-Server wont start after Server Reboot Posted: 10 Apr 2021 07:04 PM PDT I recently installed a Koha Library on Ubuntu VServer 16.04 with MariaDB 10.31. Everything ran smoothly until the Root restarted: Now I get: Software error: DBIx::Class::Storage::DBI::catch {...} (): DBI Connection failed: Can't connect to local MySQL server through socket '/var/run/mysqld/mysqld.sock' (111) at /usr/share/perl5/DBIx/Class/Storage/DBI.pm line 1492. at /usr/share/koha/lib/Koha/Database.pm line 100 When i try to connect to the Site. I checked instantly if MySQL is running and it doesnt. So i tried to restart it - but i get an error because we are a small NGO we cant pay for professional help - so you guys are my last resort - thanks in advance! |
'Could not find filesystem /dev/root' after Clonezilla clone of redhat install to newer hardware' Posted: 10 Apr 2021 05:07 PM PDT I am cloning what appears to be a redhat 4 (possibly 5?)server to fairly newer hardware, as the original has a failing board. DBA would rather not reconfigure a new installation so they want me to clone if possible. I used Clonezilla stable release 2.5.0-25 and did 2nd option disk to remote disk copy over network via static IPs. Used this tutorial: https://www.youtube.com/watch?v=8UGR_RLCptQ Redhat version info: Old hardware: Asus RS260/2x Xeon E5420/12gb DDR3 ECC FB RAM (24gb prior to hardware issues)/ICP ICP5085BL RAID controller/RAID 10 8 drives Optimal New Hardware: Asus RS720/2X Xeon 2620/48gb DDR3 ECC FB RAM/Asus PIKE 2308 RAID Controller/RAID 10 8 drives Optimal During the process I was not asked to clone the boot loader, though the sda1 partition mounted at /boot appeared to have been cloned afterward. Long story short it appears the clone was successful and the old data is on the new server in the correct partitions, but when I try to boot I get So far I've tried:
Things I haven't tried yet that I'm aware are options:
I'm guessing RAID driver issue, but I'm not sure how to get it included in initrd. If there is a better option for linux system cloning I am open to it (Partimage would not load when I tried it but I can attempt it again). Already spent three days on this so hopefully I've done my due diligence prior to asking. Original /etc/fstab: Original /boot/grub/grub.conf: TLDR: Attempted clone of redhat 4 machine to newer hardware over network using Clonezilla and got Could not find filesystem /dev/root. Made modifications to fstab and grub.conf, installed RAID driver, modified boot options, and recreated initrd and same result. I can provide screenshots or more info if needed. Any help is appreciated, thank you. |
How to build and update iptables latest version for CentOS 7 Posted: 10 Apr 2021 07:04 PM PDT Due to a bug (similar to this one) i'm facing with iptables in Centos 7, I'd like to update the version of iptables. So I figured I'd update to either the latest (from their git) or to the tagged 1.6.0. I managed to add the libraries needed to get Now i'm not sure how I can run this version to test it, and how to implement it if it works as the default iptables. |
How do authentication servers handle thousands of CPU intensive logins? Posted: 10 Apr 2021 08:20 PM PDT Apologies if the answer is obvious, I'm just a little curious and couldn't nail down an answer elsewhere. I'm used to seeing authentication servers use simple SHA-1 or SHA-256 to validate credentials, but best-practise these days is normally to use bcrypt for credential hashing. The problem is that bcrypt is designed to use significant amounts of CPU and/or memory to limit the efficacy of brute-forcing algorithms. Easy for a single logon, but when hundreds or thousands of logons are involved, do server admins just throw extreme amounts of hardware at the problem, or do they tweak the bcrypt parameters to ensure a reasonable logon time for users? |
keepalived master cannot reclaim virtual IP after recovered Posted: 10 Apr 2021 09:02 PM PDT Steps
Ping doesn't work after step 6. No server gets the virtual ip. (I checked with Master can get back the virtual ip until I restart the keepalived service. How to make the master getting virtual ip without restart the service? Keepalived configuration: host1 (master) host2 (slave) |
Configuring IIS ARR for backend client certificate authentication Posted: 10 Apr 2021 10:03 PM PDT I have an IIS server configured with ARR to reverse proxy requests to a backend server. The backend server requires client certificate authentication, however, it only needs to authenticate the reverse proxy (not the end user). The end user authentication is passed inside the content of the request and is not the problematic part.
How does one configure the client certificate in IIS or ARR? When searching around, I often find questions and threads related to forwarding the client certificate from the end user to the backend server and this is not possible. Further, these usually indicate to turn off client certificate authentication on the backend server but this must remain on. Here are some questions I found, but they all relate to the end-user client certificate: |
Unstick a reboot when PsKill doesn't work Posted: 10 Apr 2021 05:07 PM PDT I tried to remote into a server today and got stuck during login. So I tried to reboot with: And nothing seemed to happen. So I tried it again and got: So googling around for ways to unstick it, I came across this which suggested using PSKill. So I downloaded PSTools and tried: But now that just sticks at: Now what? Any suggestions from here? |
Task Scheduler with Virtual Accounts, possible? Posted: 10 Apr 2021 07:51 PM PDT Currently I'm using Task Scheduler seems to reject |
How to unblock service discovery for IPv4 via Avahi? Posted: 10 Apr 2021 10:03 PM PDT On a Debian 6.0.6 system (squeeze) I am having trouble resolving a host using Avahi and IPv4. Here is a sample output: Notice that EDIT: The situation is symmetric: On (To make the display fit StackExchange without wrapping, I have taken a couple of liberties with horizontal space.) The display on I found a closed ticket at http://avahi.org/ticket/297, which suggests that the problem is some sort of firewall configuration. I am a complete novice in this area, and through web search I have been unable to inform myself about how to use the The hypothesis is that somehow the service-discovery packet is being blocked—I don't know on which machine. Can anyone say how to discover which machine is blocking the packet and how to reconfigure it so Avahi discovers the IPv4 address? |
Posted: 10 Apr 2021 06:07 PM PDT I've been trying to get lighttpd or apache2 (I prefer lighttpd) to work behind a proxy but no luck so far. What I want is to run lighttpd (or port 80) behind a proxy, so that when someone goes to some.website.com, and the DNS for that domain is pointed to the IP address of the proxy server, they end up on my http server's page. This would allow me to use the server's resources, while keeping it's IP address hidden. Unfortunately, using the If you're wondering; I am temporarily using a homeserver, and I don't want to make my IP address public. Any ideas? Both a HTTPS proxy (squid) or a SOCKS5 (dante) proxy will do just fine. |
How do you configure QoS for Skype? Posted: 10 Apr 2021 07:52 PM PDT On our office network (26 people), some users have complained of poor Skype call quality, particularly in the upstream direction. I wanted to ask, how do I identify Skype traffic, considering that it uses a random port, in order that I might prioritise it at the router level? |
You are subscribed to email updates from Recent Questions - Server Fault. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment