107 posts in this topic
56 minutes ago, Church said:

Salut,

 

Am un vps de la ovh cu centos 7, cu sentora webpanel instalat, ce imi tine momentan un site. M-au anuntat ca mi-a fost alocat ipv6,  iar pentru update sa urmaresc instructiunile de pe Please login or register to see this link.

Imi merge ipv6, dar singurul port ramas deschis e 22. Ce s-a intamplat ?

 

Din lan scanat toate porturile sunt deschise, si functioneaza. Dar daca il scanez de afara, doar 22 e deschis.

 

Trebuie sa configurezi si celalalte servicii sa se listeze pe ipv6 (apache, postfix, ce ai tu pe acolo)

0

Share this post


Link to post
Share on other sites

Am reusit, problema e ca nu pot face update nici cum la dns-uri sa merga pe ipv6. As putea sa le configurez cumva manual fara sa stric prea multe ?

0

Share this post


Link to post
Share on other sites

^ din firewall era problema port-urilor.

Problema cu dns-urile cred ca e din bind


cat /var/sentora/logs/bind/bind.log

27-Oct-2016 16:47:23.797 general: notice: running
27-Oct-2016 17:08:49.126 general: notice: stopping command channel on 127.0.0.1#953
27-Oct-2016 17:08:49.133 general: notice: exiting
27-Oct-2016 17:09:02.697 general: error: managed-keys.bind.jnl: create: permission denied
27-Oct-2016 17:09:02.698 general: error: managed-keys-zone: sync_keyzone:dns_journal_open -> unexpected error
27-Oct-2016 17:09:02.698 general: error: managed-keys-zone: unable to synchronize managed keys: unexpected error

 

Ce permisii are nevoie si unde trebuie sa i le dau ?

0

Share this post


Link to post
Share on other sites

Salut, am un vps cu centos7 pe care am momentan 2 domenii care functioneaza cum trebuie, ceea ce imi da bataie de cap si nu am reusit sa rezolv este serverul de mail. Am citit pe net si am urmat o groaza de tutoriale despre acest lucru dar nu reusesc sa il setez. De pe calculator totul merge bine, insa pe telefon nu se conecteaza, am schimbat si portul 25 la smtp dar degeaba. Folosesc un cpanel free webuzoo. Daca exista altul mai bun va rog sa imi spuneti.

Va multumesc anticipat.

0

Share this post


Link to post
Share on other sites
47 minutes ago, nextseeker said:

Salut, am un vps cu centos7 pe care am momentan 2 domenii care functioneaza cum trebuie, ceea ce imi da bataie de cap si nu am reusit sa rezolv este serverul de mail. Am citit pe net si am urmat o groaza de tutoriale despre acest lucru dar nu reusesc sa il setez. De pe calculator totul merge bine, insa pe telefon nu se conecteaza, am schimbat si portul 25 la smtp dar degeaba. Folosesc un cpanel free webuzoo. Daca exista altul mai bun va rog sa imi spuneti.

Va multumesc anticipat.

 

Foloseste 587 (serviciul submission) pentru SMTP. Nu se conecteaza la smtp sau la pop3 ori imap ?

0

Share this post


Link to post
Share on other sites

Am mai vazut si portul 465 la SMTP, de exemplu Yahoo are.

0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now

  • Similar Content

    • By Usr6
      Raw sockets allow a program or application to provide custom headers for the specific protocol(tcp ip) which are otherwise provided by the kernel/os network stack. In more simple terms its for adding custom headers instead of headers provided by the underlying operating system.
       
      Raw socket support is available natively in the socket api in linux. This is different from windows where it is absent (it became available in windows 2000/xp/xp sp1 but was removed later). Although raw sockets dont find much use in common networking applications, they are used widely in applications related to network security.
      In this article we are going to create raw tcp/ip packets. For this we need to know how to make proper ip header and tcp headers. A packet = Ip header + Tcp header + data.
      So lets have a look at the structures.
      Ip header
      According to Please login or register to see this link.
      0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Version| IHL |Type of Service| Total Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Identification |Flags| Fragment Offset | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Time to Live | Protocol | Header Checksum | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Destination Address | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Options | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Every single number is 1 bit. So for example the Version field is 4 bit. The header must be constructed exactly like shown.
      TCP header
      Next comes the TCP header. According to Please login or register to see this link.
      0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Source Port | Destination Port | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Sequence Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Acknowledgment Number | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data | |U|A|P|R|S|F| | | Offset| Reserved |R|C|S|S|Y|I| Window | | | |G|K|H|T|N|N| | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Checksum | Urgent Pointer | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Options | Padding | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | data | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+  
      Create a raw socket
      Raw socket can be created in python like this
      #create a raw socket try: s = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.IPPROTO_RAW) except socket.error , msg: print 'Socket could not be created. Error Code : ' + str(msg[0]) + ' Message ' + msg[1] sys.exit() To create raw socket, the program must have root privileges on the system. For example on ubuntu run the program with sudo. The above example creates a raw socket of type IPPROTO_RAW which is a raw IP packet. Means that we provide everything including the ip header.
      Once the socket is created, next thing is to create and construct the packet that is to be send out. C like structures are not available in python, therefore the functions called pack and unpack have to be used to create the packet in the structure specified above.
      So first, lets make the ip header
      1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 source_ip = '192.168.1.101' dest_ip = '192.168.1.1' # or socket.gethostbyname('www.google.com')   # ip header fields ip_ihl = 5 ip_ver = 4 ip_tos = 0 ip_tot_len = 0  # kernel will fill the correct total length ip_id = 54321   #Id of this packet ip_frag_off = 0 ip_ttl = 255 ip_proto = socket.IPPROTO_TCP ip_check = 0    # kernel will fill the correct checksum ip_saddr = socket.inet_aton ( source_ip )   #Spoof the source ip address if you want to ip_daddr = socket.inet_aton ( dest_ip )   ip_ihl_ver = (version << 4) + ihl   # the ! in the pack format string means network order ip_header = pack('!BBHHHBBH4s4s' , ip_ihl_ver, ip_tos, ip_tot_len, ip_id, ip_frag_off, ip_ttl, ip_proto, ip_check, ip_saddr, ip_daddr) Now ip_header has the data for the ip header. Now the usage of pack function, it packs some values has bytes, some as 16bit fields and some as 32 bit fields.
      Next comes the tcp header
      1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 # tcp header fields tcp_source = 1234   # source port tcp_dest = 80   # destination port tcp_seq = 454 tcp_ack_seq = 0 tcp_doff = 5    #4 bit field, size of tcp header, 5 * 4 = 20 bytes #tcp flags tcp_fin = 0 tcp_syn = 1 tcp_rst = 0 tcp_psh = 0 tcp_ack = 0 tcp_urg = 0 tcp_window = socket.htons (5840)    #   maximum allowed window size tcp_check = 0 tcp_urg_ptr = 0   tcp_offset_res = (tcp_doff << 4) + 0 tcp_flags = tcp_fin + (tcp_syn << 1) + (tcp_rst << 2) + (tcp_psh <<3) + (tcp_ack << 4) + (tcp_urg << 5)   # the ! in the pack format string means network order tcp_header = pack('!HHLLBBHHH' , tcp_source, tcp_dest, tcp_seq, tcp_ack_seq, tcp_offset_res, tcp_flags,  tcp_window, tcp_check, tcp_urg_ptr) The construction of the tcp header is similar to the ip header. The tcp header has a field called checksum which needs to be filled in correctly. A pseudo header is constructed to compute the checksum. The checksum is calculated over the tcp header along with the data. Checksum is necessary to detect errors in the transmission on the receiver side.
      Code
      Here is the full code to send a raw packet
      1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 '''     Raw sockets on Linux           Silver Moon (m00n.silv3r@gmail.com) '''   # some imports import socket, sys from struct import *   # checksum functions needed for calculation checksum def checksum(msg):     s = 0           # loop taking 2 characters at a time     for i in range(0, len(msg), 2):         w = ord(msg) + (ord(msg[i+1]) << 8 )         s = s + w           s = (s>>16) + (s & 0xffff);     s = s + (s >> 16);           #complement and mask to 4 byte short     s = ~s & 0xffff           return s   #create a raw socket try:     s = socket.socket(socket.AF_INET, socket.SOCK_RAW, socket.IPPROTO_RAW) except socket.error , msg:     print 'Socket could not be created. Error Code : ' + str(msg[0]) + ' Message ' + msg[1]     sys.exit()   # tell kernel not to put in headers, since we are providing it, when using IPPROTO_RAW this is not necessary # s.setsockopt(socket.IPPROTO_IP, socket.IP_HDRINCL, 1)       # now start constructing the packet packet = '';   source_ip = '192.168.1.101' dest_ip = '192.168.1.1' # or socket.gethostbyname('www.google.com')   # ip header fields ip_ihl = 5 ip_ver = 4 ip_tos = 0 ip_tot_len = 0  # kernel will fill the correct total length ip_id = 54321   #Id of this packet ip_frag_off = 0 ip_ttl = 255 ip_proto = socket.IPPROTO_TCP ip_check = 0    # kernel will fill the correct checksum ip_saddr = socket.inet_aton ( source_ip )   #Spoof the source ip address if you want to ip_daddr = socket.inet_aton ( dest_ip )   ip_ihl_ver = (ip_ver << 4) + ip_ihl   # the ! in the pack format string means network order ip_header = pack('!BBHHHBBH4s4s' , ip_ihl_ver, ip_tos, ip_tot_len, ip_id, ip_frag_off, ip_ttl, ip_proto, ip_check, ip_saddr, ip_daddr)   # tcp header fields tcp_source = 1234   # source port tcp_dest = 80   # destination port tcp_seq = 454 tcp_ack_seq = 0 tcp_doff = 5    #4 bit field, size of tcp header, 5 * 4 = 20 bytes #tcp flags tcp_fin = 0 tcp_syn = 1 tcp_rst = 0 tcp_psh = 0 tcp_ack = 0 tcp_urg = 0 tcp_window = socket.htons (5840)    #   maximum allowed window size tcp_check = 0 tcp_urg_ptr = 0   tcp_offset_res = (tcp_doff << 4) + 0 tcp_flags = tcp_fin + (tcp_syn << 1) + (tcp_rst << 2) + (tcp_psh <<3) + (tcp_ack << 4) + (tcp_urg << 5)   # the ! in the pack format string means network order tcp_header = pack('!HHLLBBHHH' , tcp_source, tcp_dest, tcp_seq, tcp_ack_seq, tcp_offset_res, tcp_flags,  tcp_window, tcp_check, tcp_urg_ptr)   user_data = 'Hello, how are you'   # pseudo header fields source_address = socket.inet_aton( source_ip ) dest_address = socket.inet_aton(dest_ip) placeholder = 0 protocol = socket.IPPROTO_TCP tcp_length = len(tcp_header) + len(user_data)   psh = pack('!4s4sBBH' , source_address , dest_address , placeholder , protocol , tcp_length); psh = psh + tcp_header + user_data;   tcp_check = checksum(psh) #print tcp_checksum   # make the tcp header again and fill the correct checksum - remember checksum is NOT in network byte order tcp_header = pack('!HHLLBBH' , tcp_source, tcp_dest, tcp_seq, tcp_ack_seq, tcp_offset_res, tcp_flags,  tcp_window) + pack('H' , tcp_check) + pack('!H' , tcp_urg_ptr)   # final full packet - syn packets dont have any data packet = ip_header + tcp_header + user_data   #Send the packet finally - the port specified has no effect s.sendto(packet, (dest_ip , 0 ))    # put this in a loop if you want to flood the target Run the above program from the terminal and check the network traffic using a packet sniffer like wireshark. It should show the packet.
      Raw sockets find application in the field of network security. The above example can be used to code a tcp syn flood program. Syn flood programs are used in Dos attacks. Raw sockets are also used to code packet sniffers, port scanners etc.
       
      sursa: Please login or register to see this link.
    • By Adln
      Salut,
       
      Tocmai am insalat Kali pe un stick usb și am observat că stick-ul e partiționat automat de către pc.
       
      Prima oară aveam 4 partiții Please login or register to see this link.  ..
      .. după care 5 partiții Please login or register to see this link.
       
      De ce se întâmplă asta ? Trebuie să le formatez după fiecare reboot ?
    • By ionutbu
      Buna, am programat un comment și email grabber in Python, sper sa va placa
       
      Aici e link-ul: Please login or register to see this link.
       
      Daca ma puteti ajuta cu un invite la un site invite only unde gasesc torenturi va rog sa imi lasati mesaj  multumesc
       
    • By costi
      Ce permisiuni imi trebuie pe fisierul de PHP ca sa se poata executa? Pe fisierul parseCSV.php am permisiuni 644 iar pe directorul in care se afla, learnPHP, are permisiuni 755
       
      costi@job:/var/www/learnPHP$ ls -l /var/www/learnPHP/ -rw-r--r-- 1 costi costi 392 mar 10 17:24 parseCSV.php costi@job:/var/www/learnPHP$ ls -l /var/www drwxr-xr-x 3 costi costi 4096 mar 10 17:24 learnPHP Cand rulez in browser fisierur imi zice 'page isn't working. http error 500 '. Unde gresesc?
    • By costi
      Am achizitionat un laptop Dell si mi-a venit gata instalat cu Ubuntu 16. Ideal ar fi sa instalez Windows 10 (la job folosesc tot Windows 10 plus Photoshop care e un chin daca il rulezi pe Linux) iar distributiile de Linux sa le rulez intr-o masina virtuala.
      Asa ca m-am pus sa-l dezinstalez dar surpriza e ca la Boot Mode are setat UEFI iar Secure Boot este ON. Din ce am citit pe internet ar fi indicat sa le las activate aceste optiuni.
      Am folosit un stick cu Ubuntu(try Ubuntu.. Please login or register to see this link.  ) pentru a sterge Ubuntu de pe laptop dar nu se incarca deloc OS ul de pe USB.. a trebuit sa opresc laptop ul fortat de pe butonul de Shut Down.
      Am incercat si cu un stick bootabil cu Windows 10 pus pe el dar nu mi-l recunoaste.
      Cum sa fac sa dezinstalez linux ul de pe laptop?