Latest Server related questions

Score: 0
Liero avatar
Output file is empty when running powershell script from Task Scheduler
ba flag

I have a powershell script, that write http response body to output.

When I run it from command line like this, it writes the response to Emails.log file

powershell "./InvokeMyApi.ps1 /api/emails/SendEmails" > Emails.log

However, when I invoke it from Task Scheduler, it only writes empty file.

To rule out missing permission, I granted write access to the folder to everyone

<?xml version="1.0" en ...
Score: 0
falste avatar
Conditionally setting nginx directives inside location blocks
kh flag

What I want

I want to be able to set multiple nginx directives conditionally inside location blocks. For example, for a location /example, I want to set proxy_cache_revalidate on if $http_method is POST, otherwise I want to set proxy_cache_revalidate off. I also want more directives like proxy_cache_valid and add_header to be set conditionally based on different variables like the remote ip, cookies ...

Score: 0
Arthur avatar
How do I redirect a subdomain to another internal webserver without affecting the RDP Gateway
mn flag

we have a standard windows server 2022 running IIS 10 and remote desktop gateway. we use rdp.domain.com for the gateway address for external RDP Users.

we would like to run another internal windows server with IIS 10 for a wedbased app for external users at app.domain.com

what would be the best solution to allow users to access the new app webserver externally.

have tried IIS Rewrite but just cant get  ...

Score: -2
trash2 avatar
postfix-gmail problems: This mail is unauthenticated, which poses a security risk to the 550-5.7.26 sender
my flag

Can someone help, who had that problem too? Postfix and Dovecot is freshed installed and configurated for SSL but if i try to send an email to my gmail account i get that error msg.

Diagnostic-Code: smtp; 550-5.7.26 This mail is unauthenticated, which poses a
security risk to the 550-5.7.26 sender and Gmail users, and has been
blocked. The sender must 550-5.7.26 authenticate with at least one of SP ...
Score: 0
Patrick Teng avatar
Tracing / Solving a sudden spike in Apache2
la flag

My server is running on Ubuntu20.04, a pure LAMP stack with Apache 2.4.41. In the last few weeks, there was a total of 2 occurrence where Apache2 was not responsive (users can't load our website), and we can't solve why, but it started working again after I restarted Apache2 (systemctl restart apache2). I checked and MySQL is up, so I feel it's purely due to Apache2 reaching the limit and being unrespon ...

Score: 0
robokonk avatar
Should I use a Squid on the host machine or a virtual machine?
cd flag

I have a server from SoYouStart and 32 failover IPs.

I need these IPs for proxy (for scraping). Should I set up Squid on the host machine (Proxmox) or on a virtual machine like Ubuntu + Squid?

I read the Proxmox documentation and saw that if I want to add 32 failover IPs (in one block), I must add each IP as a separate network interface?

Score: 0
Alexandre Rey avatar
Certificates issue during RADIUS authentication using NPS server with PEAP MSCHAPv2
sv flag

I am using NPS as a RADIUS server to authenticate some devices using PEAP MSCHAPv2. I have an issue during the server authentication, I am using a chain of trust certificates, with 1 server cert, 1 intermediate cert and 1 CA cert. The problem is that my device doesn't support chain of trust certificates, but only accepts 1 certificate : the server certificate. I've been looking in the documentation but  ...

Score: 0
user3534080 avatar
nginx/swag and FULLY ignoring unknown subdomains
co flag

I have a domain, let's call it foo.dev.

If someone navigates to anything other than the subdomains I have site-confs for, I want it to look like there's nothing at all set up on the domain. If someone goes to http://foo.dev or http://www.foo.dev or http://gibberish.foo.dev, or tries to go directly to my IP address, I want them to get a not found error. Same with https.

Every search hit I've found says "j ...

Score: 0
Dan avatar
Using CloudFlare's Load Balancer with Wordpress Multisite Across Domains
cn flag
Dan

I currently have a single Wordpress site, example.com on CloudFlare with Load Balancing. I'm transitioning this site over to a Wordpress Multisite install so it'll host example.com, foobar.com, and example2.com.

Cloudflare's guide mentions that You can share your load balancer with other sites in your account... just by adding a CNAME. But this doesn't make any sense, as under my Cloudflare site

Score: 0
amaes avatar
installing IBM Tivoli Directory Server
bw flag

I am trying to install IBM Tivoli Directory Server, but I am getting these errors, I am using Centos7 and trying to install Tivoli 7.4 from the below exceptions "cannot run program", it seems like a permission issue while I am using the root user.

the exceptions:

java.io.IOException: Cannot run program "/tmp/ismp001/db2lscmd.sh" (in directory "/tmp/ismp001"): java.io.IOException: error=2, No such  ...

Score: 0
How to have multiple instances of filebeat load balance Netflow input?
id flag

I have a very high volume Netflow input stream, and I was hoping that I could run multiple instances of Filebeat and load-balance the Netflow traffic over the Filebeat instances, and then write to a single remote Elasticsearch.

I've read about load-balancing to multiple outputs, but I'm looking for load-balancing from multiple inputs.

I can split the Netflow input over 2 physical ports, but I'm not  ...

Score: 0
Sandy avatar
IIS https certificates
ma flag

I’m migrating the c# web applications and data apis I've developed that are hosted on IIS to use http to use SSL / TSL (https).

I have not setup certificates with https before and was wondering if it’s possible to use the same certificate on all apps / data apis on the IIS server or if I need to have 1 certificate per site?

I was hoping I can register a single certificate at the IIS server level ...

Score: 0
Luke R avatar
Malicious Requests routed through 'Feedfetcher-Google' and Google Proxy IP
ht flag

We're struggling with a unique situation where malicious/unauthorized requests are being made to our site via 'Google Proxy' IP addresses.

Someone is using Google servers to 'proxy' our website and serve up all the same content, stripping scripts and adding their own advertisements.

Request User Agent:

Mozilla/5.0 (compatible) Feedfetcher-Google; (+http://www.google.com/feedfetcher.html)

Request IP Add ...

Score: 0
bicyclesonthemoon avatar
wget doesn't accept HTTPS certificate (from letsencrypt) on some computers but does on others
sj flag

I have the following situation:

On my www server (Apache2, Debian armhf) I have HTTPS certificate from letsencrypt.org by certbot.
When accessing the server from a browser (Firefox, Chromium) everything was fine, but when I tried git or wget then the HTTPS certificate was not acccepted.

But this I could observe only on some of the computers I tried this but not on others.
Output from 5 computers:

Score: 0
borog1852 avatar
Fork connections out from a single socat connection
bl flag

I have an old legacy application I’m trying to get to work with our semi-modern network. This application sends log messages as HTTP requests (one log per request) but does so over a single TCP connection. If that TCP connection dies, the logs get messed up as there is no queue for them.

I decided to use socat to try and hold a TCP session open while breaking up the HTTP requests on the other e ...

Score: 0
mostafa ahmadi avatar
SSH port forwarding using python
eu flag

I have a VPS that serves as my VPN server, and I want to use this VPS as a VPN using forwarding for my laptop which uses windows as OS. Is it possible to do so without using software like PuTTY, Bitvise SSH client, etc.? For example, can I use Python code?

Score: 1
Georgi Yankov avatar
OpenVPN and dhcp-option domain-route for Windows/Linux
jo flag

I am trying to understand the dhcp-options usage for Windows and Linux (Ubuntu).

There seems to be difference between the implementation.

Using OpenVPN 2.4 server and client, i test on Windows 10 21H2 and Ubuntu 20.04. I have a domain foo.bar, which is a DNS server, followed by multiple subdomains x.foo.bar, which are with private IPs and not public DNS records.

The options that are of interest t ...

Score: 0
Yuri avatar
AWS: routing back from VPC to an instance
gs flag

I'm relatively new to AWS and need to set up some internal infrastructure. Example: a VPN server that routes people into a VPC.

I have a VPN server instance bound to an elastic IP that has a subnet carved out for VPN users. Now how do I tell the VPC that the route back to our VPN users should go through this instance?

I tried editing route tables, but I keep getting an error saying that the route de ...

Score: 0
Aviran avatar
EKS service SSL endpoint
mn flag

When creating a service using EKS, it is exposed using http through a AWS load balancer.

kubectl apply -f service.yaml - Will create a load balancer that's managed by EKS, and can not be modified. any modification, valid or not will be overriden by AWS at some point.

I'm going down the rabbit hole of trying to expose the service as HTTPS.

Modifying the aws load balancer to listen on 443 in https  ...

Score: 0
Maxime Chupin avatar
Redirect a subdirectory to external domain
td flag

I want to redirect all the entries for a certain subdirectory to another (external) domain with the "rest" of the address. I have tried something but it does not work...

server {
    listen [::]:443 ssl;
    listen 443 ssl;

    server_name cahiers.example.fr cahiers.example.eu.org;

    return 301 https://publications.example.fr/cahiers;
    ssl_certificate /etc/letsencrypt/live/publications.exampl ...
Score: 0
Siauz avatar
how to prevent redirect cloudflare origin domain when we do reverse proxy on nginx
cn flag

im having problem with my reverse proxy config on nginx, how can i stop domain that using cloudflare to not redirecting to their original domain when we reversing proxy ?

    listen 443 ssl;
server_name 234.234.234.234;
ssl_certificate /etc/ssl/cert.crt;
ssl_certificate_key /etc/ssl/private.key;
error_log /var/log/nginx/sports_error.log;
location / {
    proxy_ssl_server_name on;
    proxy_pass htt ...
Score: 1
.io auth. NS refuses UDP response to dnsviz.net – why shouldn’t I, too?
eg flag

Seriously, say, I block (return, not drop of course) UDP :53 in to my authoritative nameserver. Resolvers will fall back to TCP and I won’t need any rate limiting against spoofed source IPs. Because the spoofed victim of a DDoS attack would only get the connection refused equivalent of UDP or TCP ack, not a much larger DNS answer.

Simple solution, everything is fine. Or isn’t it that simple?

 ...
Score: 0
Bob Smith avatar
Why does EC2 allow QEMU/KVM 32 bit VMs to run, but not 64 bit?
cn flag

The setup is EC2 with 8 cores and 32GBs of memory running Ubuntu 22.04 Desktop. Virtual Machine Manager has been installed. I downloaded 32 bit and 64 bit Windows 10. I'm able to create a VM using 32 bit Windows that successfully boots and installs. Windows 64 bit attempts to start but almost immediately errors out with a blue screen citing "SYSTEM THREAD EXCEPTION NOT HANDLED". I am trying to understa ...

Score: 0
aphid avatar
VMWare virtualized e1000e: 2nd card failing with "Tx Unit Hang"
mx flag

Ever since upgrading the only Linux VM with more than one network adapter to debian 11 it's been failing to get its second adapter to do anything.

The config is fairly straightforward: Two VMWare network adapters, each using an emulated E1000E. Trying a simple;

   ping 10.0.26.5

Where 10.0.26.201 is the IP on the VM, and 10.0.26.5 is that of the host, fails. Checking dmesg reveals the problem is ...

Score: 0
For AWX, is it possible to authenticate at the reverse-proxy layer?
cn flag

I have an AWX set up with an Apache reverse proxy for SSL reasons.

I know AWX supports SAML/SSO natively. However, we have a standard SAML set up that we use with multiple other applications, where authentication is done at the Apache layer and the user's information is passed back into the application (X-Forwarded-User or some such).

Is it possible to do this with AWX? How would I pass user informa ...

Score: 0
David Boshton avatar
How to verify installation on a (linux) server?
uz flag

Problem:

Should start off with saying that this is for a software house, and it's internal. None of the guys are "users", they are all staff.

  • We test on servers, including upgrading existing installations to prove that the upgrade process works etc.
  • People sometimes log into these servers to do testing of changes.
  • They don't put it back to how it is expected to be in production, meaning the environ ...
Score: 0
Bartos avatar
Putty connection time out after enabling firewall
yt flag

I have a problem after enabling ufw firewall. Everything was working well for the last few months but I wanted to add SSL and redirect traffic http->https so I wanted to open port 443. What I did - $ sudo ufw enable . I got info that firewall is enabled. After that putty disconnected and now when I want to connect I'm getting connection time out. of course - I cannot login to disable firewall agai ...

Score: -1
Partodiam avatar
Splitter switch with multiple network
uy flag

With an increase in informatics insecurity in companies, I try to increase the security of my network, but I encountered a problem trying to set up my ideas. Right now, each person in my company is on their own computer, and there are some shared one, and they can access the whole company network, even what they will never need, so it is a true problem of security.

Data access is not a problem, a ...

Score: 0
How to fix "The requested address is not valid in its context" for a windows executable?
jp flag

I am trying to run a self-compiled windows application on windows 10 in powershell (with and without admin rights) which need access to a network adapter at address 192.168.200.6 so I run it as

.\my_app.exe 192.168.200.6

but I get an error

[ERROR] (10049): The requested address is not valid in its context.

I can ping that address from the powershell. I also added that app to the "public" and "pri ...

Score: 0
Charles Langlois avatar
How can Asterisk voicemail handle call holding?
cn flag

Given an Asterisk PBX system version 20 or above. Given that a user calls another user, the call is missed and is sent to voicemail. While the caller is directed to voicemail, the caller receives another call and answers it, putting the first call on hold.

The client implements call holding by sending a SIP INVITE with SDP option a=sendonly. This means the caller audio will still be streamed to Aster ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.