Latest Server related questions

Score: 1
ChrisBint avatar
DMARC reports no longer being received from google
cn flag

We are seeing a large number of DMARC rejects from google from emails that have both a valid DKIM signature and a valid SPF sender. We have validated this by sending the same emails to other ISPs and these arrive and the headers agree with our findings. It appears that google are rejecting those emails, but they are also not sending us any dmarc reports, whereas we are getting reports (for the same doma ...

Score: 0
Kim avatar
The IO operation at logical block address 0x1458a30a for Disk 0 (PDO name: \Device\00000037) was retried - Hyper-v virtual machine errors
in flag
Kim

I'm encountering an issue where I have a physical server PowerEdge R740 and I have a hyper-v server where I host multiple machines, all these machines I've been seeing the errors: The IO operation at logical block address 0x1458a30a for Disk 0 (PDO name: \Device\00000037) was retried - Hyper-v virtual machine errors Warning 7/17/2023 3:41:12 AM disk 153 None Event ID:153 Log Name: System.

I did c ...

Score: 0
itsamemarkus avatar
iptables: Only allow one IP address when rules are updated by other tools
fr flag

I'm learning about iptables and I want to set up a GNS3 (network emulation) host on a public IP and limit the access to only one IP address.

This one IP address should be able to connect with all protocols and ports.

Now from what I understand I'd usually go with an approach like this on a fresh host:

sudo iptables -P INPUT DROP
sudo iptables -P FORWARD DROP
sudo iptables -A INPUT -i lo -j ACCEPT
sudo ip ...
Score: -1
Stefan avatar
USB Proxy "Dongle"
za flag

I need to be able to record all print requests to a printer physically connected via USB to a PoS like system. There is no need for me to manipulate the print job, I just need a "copy" of the print request and will send it to a remote machine in regular intervals in small batches. It is essential, that the printer is always available - independent of the network status. I have spied the BeagleBoard Blac ...

Score: 0
skribe avatar
How to rewrite www to non www in nginx
et flag

I found a couple of other serverfault questions where rewrite www to non-www in nginx was answered, however it seems like with the nginx config my webdock.io server has the solutions I have tried seem to always cause problems or simply don't work. I suspect it has to do with the order or a conflict with what is already there.

Here is the current config

server {

root /var/www/html;
client_max_body_siz ...
Score: 0
somenxavier avatar
Script to filter nginx logs to automatically running nftables
jp flag

I have a domain served by nginx. nginx logs have this format:

178.128.120.151 - - [19/Jul/2023:20:27:25 +0200] "GET /favicon.ico HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36"
178.128.120.151 - - [19/Jul/2023:20:27:25 +0200] "GET /1.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKi ...
Score: 0
another_netadmin avatar
FreeRADIUS / Active Directory / Computer Authentication / VLAN based off of UserDN
dj flag

I am currently determining VLAN/dACL assignment based off of group membership of the computer authenticating and would like to instead switch to determining VLAN/dACL assignment based off of the OU location of the computer. I seem to be unable to acquire the UserDN. Any assistance or hints as how I can achieve this would be greatly appreciated.

How to achieve what I'd like to do using Aruba Cle ...

Score: 0
Merennulli avatar
OPTIONS method gets 200 status instead of 301 in IIS10 logs
us flag

I'm trying to learn why OPTIONS method requests (presumably CORS preflight requests) are logged as 200 status while all GET method requests are logged as the expected 301 (moved permanently). The only thing being returned at that address is a Response.RedirectPermanent with the new address.

For context, the 301 has been in place for a few weeks, and in many cases the Referer URL has been gone a l ...

Score: 1
Shrout1 avatar
LAPS "Not Authorized to Administer"
cn flag

Problem Description:

When I open up dsa.msc, navigate to my LAPS controlled OU, right click on a target system, goto Properties>LAPS>Expire Now and click "Apply" it displays the message You may not be authorized to administer LAPS related state on this computer

Info:

Score: -1
Amin Bou Hamdan avatar
underscore in certbot's TXT record
tr flag

Certbot is a free and open-source utility mainly used for managing SSL/TLS certificates from the Let’s Encrypt certificate authority. When using Certbot to obtain a certificate through the DNS-01 challenge, Certbot will provide you with instructions to manually update a TXT record for the domain in order to proceed with the validation. The name of the TXT record is usually in the format “_acme-chall ...

Score: 1
Edward Falk avatar
Is it possible to migrate a password file from FreeBSD to Linux?
cn flag

Moving from a FreeBSD server to Ubuntu. I copied the /etc/passwd file across with no problems, but hand-copying one of the hashes from /etc/master.passwd (FreeBSD) to /etc/shadow (Linux) didn't seem to work. The hashes certainly seem to be in the same format, but no joy.

Is this possible to do? Did I make a mistake, or is there something I missed?


Edit: I tried again, and hand-copying seems to have worke ...

Score: 1
gelonida avatar
uwsgi: strange error message: unknown config directive: inifile
de flag

I have a uwsgi.ini file. It works perfectly, but if I add strict=true it fails with the message

[strict-mode] unknown config directive: inifile

however the word inifile doesn't even exist in my inifile.

In order to reproduce the error I went so far, that I created a uwsgi.ini file with only two lines.

[uwsgi]
strict=true

If I run uwsgi --ini uwsgi.ini I get above mentioned error

If I set strict t ...

Score: 0
Does iptables apply all rules in order when an incoming connection is received?
tr flag
Max

I'm using iptables and fail2ban to secure server connections. Currently I have connections filtered via a router passing only ports for email and webserver access and fail2ban adding restrictions based on login failure attempts.

I'm trying to understand how iptables iterates through rules. From my understanding, it goes line by line until the incoming connection fails a rule. Is that correct?

For ...

Score: 1
Nikolay Chuprina avatar
Libvirt - UDP not working between host and VM
al flag

Host: 192.168.1.144/24
VMs(routed) network: 192.168.122.0/24

I have VMs connected to libvirt's routed network.

<network>
  <name>routed-122</name>
  <uuid>86ca64a6-7fea-4cf8-9625-fa45fe944c2c</uuid>
  <forward mode='route'/>
  <bridge name='virbr1' zone='public' stp='on' delay='0'/>
  <mac address='52:54:00:0e:84:40'/>
  <domain name='routed_nat'/ ...
Score: 0
How to debug systemd shutdown failing to gracefully shutdown?
sd flag
gcb

I have a host that runs qemu vms.

Every restart will leave the qemu pidfile around, showing its process wasn't properly terminated but possibly killed ...question here is exactly how to find out what happened.

$ journalctl -b -1
...
systemd[1]: [email protected]: Deactivated successfully.
systemd[1]: Stopped User Manager for UID 1000.
...
systemd[1]: Stopped Create Static Device Nodes in /dev.
systemd ...
Score: 0
Conrad avatar
Sporadic delivery failure to gmail accounts when using MS 365 Distribution Lists
us flag

Occasionally (I can't figure out any pattern when it works and when it doesn't), when a user (Mail Contact) on my org's MS 365 Distribution Lists sends an email to the list, email will not be delivered to (I believe) all the gmail.com addresses on the list. The sender receives a non-delivery notice about 2-3 days after the email is sent. This has only happened to users on the list outside of our org; us ...

Score: 0
AWS ALB Healthchecks Against ECS Services Periodically Failure For No Discernable Reason
cn flag

We completely host a constellation of services in AWS (no external dependencies as far as these services go). We periodically receive healthcheck failures (502 as public services try to contact the internal service ALBs), as frequent as every hour or two. The services experience no disruption whatsoever.

I've tried all manner of healthcheck settings (long and short durations, high and low counts  ...

Score: 0
SnippingAddict avatar
Enable client access to Internal Azure Container Applications through Application Gateway
ae flag

I have setup a container apps environment that is sitting within a VNET. Containers within need to be accessed externally through application gateway. Following steps in this learn.microsoft page has not given me the results I need:

https://learn.microsoft.com/en-us/azure/container-apps/waf-app-gateway?tabs=default-domain

When setup, the application gateway does its job, if I follow its public IP I get ...

Score: 0
Krop avatar
OpenVPN route to other local IP Address than PC
tm flag

I have VPS with server OpenVPN. iptables rules on VPS:

iptables -A PREROUTING -t nat -i ens3 -p tcp --dport 54000 -j DNAT --to 10.8.0.2:8080
iptables -A FORWARD -p tcp -d 10.8.0.2 --dport 8080 -j ACCEPT

Actually it works like that:

  • I connect to OpenVPN from PC
  • Port 8080 from PC is forwarded to VPS and i can connect it via web: 51.xx.xx.xx:54000

What i need:

  • I connect to OpenVPN from PC
  • Port 80 ...
Score: 0
Dan F. avatar
Modify nginx proxy_pass response
ph flag

I have an nginx that proxies requests to a couple of third party APIs (using proxy_pass), for caching purposes. One of the APIs is always returning 200 responses with the error status code buried inside the JSON response body. This causes nginx to cache the error responses, which is not desired.

Question is: is there a way to intercept the response from the API from the proxy_pass, extract the er ...

Score: 2
andrew avatar
ESX: FS on Datastore corrupted after volume on storage was FULL
in flag

I observed this failure : FS on Datastore corrupted after volume on storage was FULL, actually it happened twice, and only option was to recreate again new datastore.

Here is what happened in time order:

  • datastore disconnected (re-exported to ESXi hosts)
  • volume on storage array was FULL on 100%
  • FS on Datastore corrupted (data lost )

Do you have any idea what can be root cause ? Unfortunately I have n ...

Score: 1
Samir Kassem avatar
Editing Content Security Policy in IIS to allow a CDN script to be loaded
bv flag

I am currently trying to load an external plugin into an application that is deployed on IIS.

I am getting this error:

Refused to load the script 'https://cdn.babylonjs.com/loaders/babylon.glTFFileLoader.js' because it violates the following Content Security Policy directive: "script-src 'self' 'unsafe-eval' 'nonce-DAIQxlrJrGSnAtLW'". Note that 'script-src-elem' was not explicitly set, so 'script-s ...

Score: 0
Dennis Maecker avatar
Web interface in Docker container not accessible
ao flag

I am currently setting up a system that is composed of different Docker containers that somehow have to communicate with each other.

One Docker container is dedicated to a XMPP server (prosody). This container is started by following docker-compose.yml:

version: "3.8"

services:

  prosody_server:
    container_name: prosody_server
    build:
      context: ./
      dockerfile: Dockerfile
    ports:
 ...
Score: 0
George Y avatar
How to trace process that has already terminated? And even trace back its parent process?
vn flag

I am able to jail specific commands execution by a proxy script to a user whose sudo privilege is only this script sodo check here for how to. Also the sodo script logs whatever critical commands they ordered:

sodo:

#!/bin/bash
# pass command by non-sudoers who can only run some command via this script
case $1 in
  firewall-cmd|ip|systemctl)
    #echo $*
    eval $*
    ret=$?
    ;;
  *)
     echo  ...
Score: 7
George Y avatar
How to log executions of specific commands on Linux no matter where it came from?
vn flag

Dangerous commands like rm , kill and systemctl stop can be hidden outside bash inputs - i.e. - a malicious user can easily hide them inside a python script using os module and just run the python script as a proxy to hide what they really intended to harm, and the bash history or anything like that will only leave the record that they run python3 [the malicious script].py before they delete that  ...

Score: 2
SK5910 avatar
Restrict User Access to Mailbox based upon Location
mg flag

We need to restrict user access to certain mailboxes (Outlook/MAPI) based upon the user's location within our site. All mailboxes exist within the same on-premise Exchange server - all mailbox access is via Outlook/MAPI connections.

Certain mailboxes are designated "secure" must only be accessible from within a secure area & not outside that area. Non-secure mailboxes must not be accessible ...

Score: 1
Alan Nicolas de Oliveira avatar
Build a failover strategy inside GCP to redirect if compute engine stop responding or is on an error state
ie flag

Currently I have a architecture inside GCP (Google Cloud Plataform) of a Wordpress application that works this way

Cloud DNS -> Load Balancer (with Cloud CDN enabled) -> Compute Engine (with wordpress application inside)

All components is inside GCP. I need to redirect to a specific URL when someone visit my wordpress application when Wordpress application becomes unresponsive or return errors ...

Score: 0
mike01010 avatar
Kubernets: what exactly needs to be installed on each server/node and how?
ch flag

I have coded AWS instances that can serve as nodes where my containers will run. So by default each of these instances have docker installed. This part is working fine.

Eventually i would like to have all these containers managed by Kubernetes - preferably EKS. I don't have experience yet with EKS as yet but i think it would require that the instances im building have some kubernetes agent or  ...

Score: 0
Flotolk avatar
nginx logging (111: connection refused) when connecting to a websocket
ma flag

So I have a small Raspberry Pi on my local network that I use to host a server. It is a fairly simple setup, with nginx and my npm-hosted server stood up in containers using docker-compose.

my npm server listens to port 30000.

Here is my nginx setup

   server {
        # Listen on port 80
        listen 80;
        listen [::]:80;
    
        # Sets the Max Upload size to 100 MB
        client_max_body_ ...
Score: 1
marin1466 avatar
VPN access issue
US flag

==Summary==

I installed "Routing and Remote Access" role on Windows Server 2016 so I can use it as a VPN gateway(L2TP/IPsec with pre-shared key). The authentication is handled by a RADIUS server. On trying to connect a Windows 10 host to the VPN gateway I got "emphasized textThe remote connection was denied because the user name and password combination you provided is not recognized, or the sel ...

The Stunning Power of Questions

Much of an executive’s workday is spent asking others for information—requesting status updates from a team leader, for example, or questioning a counterpart in a tense negotiation. Yet unlike professionals such as litigators, journalists, and doctors, who are taught how to ask questions as an essential part of their training, few executives think of questioning as a skill that can be honed—or consider how their own answers to questions could make conversations more productive.

That’s a missed opportunity. Questioning is a uniquely powerful tool for unlocking value in organizations: It spurs learning and the exchange of ideas, it fuels innovation and performance improvement, it builds rapport and trust among team members. And it can mitigate business risk by uncovering unforeseen pitfalls and hazards.

For some people, questioning comes easily. Their natural inquisitiveness, emotional intelligence, and ability to read people put the ideal question on the tip of their tongue. But most of us don’t ask enough questions, nor do we pose our inquiries in an optimal way.

The good news is that by asking questions, we naturally improve our emotional intelligence, which in turn makes us better questioners—a virtuous cycle. In this article, we draw on insights from behavioral science research to explore how the way we frame questions and choose to answer our counterparts can influence the outcome of conversations. We offer guidance for choosing the best type, tone, sequence, and framing of questions and for deciding what and how much information to share to reap the most benefit from our interactions, not just for ourselves but for our organizations.