You are not logged in.
Exciting stuff ![]()
sysvinit of course only does whatever /etc/inittab says it should do and one can have great fun as well editing that.
And you would find a rather extreme doing-nothing init in the overlay-boot package, where its startup relies on scripting that spawns desired services before entering its "init" (actually called "reaper") which merely reaps zombies.
devuan_chimaera_4.0.0_i386_desktop.iso is an installer iso for an i386 architecture installation, plus a package pool that includes all packages including dependencies for a number of desktop installations.
devuan_chimaera_4.1_0_amd64_pool1.iso is a package pool only iso that doesn't contain the installer software. It contains the 5000 "most popular" packages for amd64 architecture installations according to popcon.debian.org at the date of the creation of the iso, plus their "depends" and "recommends".
Yes, fair enough. Thanks.
And my request of respectful and purposeful dialogue does indeed apply to everyone.
@deepforest, why do you waste your time here?
By the looks of it, your devuan experience still leaves you so tremendously emotionally stressed that you end up with nonsense posts seemingly without purpose. Surely you have better things to do?
But maybe your purpose is really to ball-plank ideas on how to overcome whatever technical barrier you are currently at?
Indeed, there may well be people with knowledge and experience on that at this forum!
And to tap into that you simply just tune your manners more towards showing purpose and respect.
Looking forward to your satisfying merge request for tasksel ...
Currently I have duplicity at the top of my list of timeline backup methods as it's both fast and compact, and it's trivially easy to set up a cron job script that makes an incremental delta as often as I like.
I know of the front-end duply but only by name. (It's so rare that I need to peep into the backup)
Well, a composite raid1 device would indeed typically be named /dev/md0, but it doesn't necessarily need to be mounted. However it does need to be "assembled" at the first-stage boot (initrd) before this pivots into a raided root filesystem.
And yes, side mounting raided partitions separately is a sure way for interesting experiences.
But I'm not a raid supporter so it's better I'll be quiet and let a friendly raid1 supporter give some guidance.
Or you may need something like
ip protocol icmp accept
ip6 nexthdr ipv6-icmp accept
ip protocol igmp acceptin the output filtering as well for ping responses.
That doesn't look ok. Not that I really know nft syntax but by the looks of it ports 80 and 443 are now blocked, and it no longer responds to ping either. Do you need all that...
I think you'll need
tcp dport {22, 80, 443} acceptin the input filtering..
and do you really need to filter output at all? though it looks like it wold work...
Well I prefer the iptables rule syntax myself but if you prefer nftables then that's of course fine with me. Afaik, it's just a matter of syntax; either way it uses the kernel's network filtering rules, so I wouldn't be surprised if you can view the rules with iptables syntax or nftables syntax regardless of how you make the rules.
Whichever way, you need the input/output holes for 443 traffic similar to the current 80 or 22 traffic.
Obviously you have a firewall setup with ufw. That's fine. Just make holes for 80 and 443.
That's good; nginx does listen on port 443.
What do you get from
# iptables-saveEDIT: I reduced to the generic prompt "#"
However nmap still says https is closed.
Please stop nginx and start it again.
use the following on the Dell-Devuan server:
# netstat -anp | grep -w LISTENto verify that it listens to port 443.
Your last wget test some posts ago looked all fine. I wold not suggest that you start from the top.
I meant the host that runs nginx; would be "the Dell-Devuan server" in your house ![]()
My port probing says that port 80 is open and port 443 is closed; other ports called filtered.
Since you also don't get service on port 443 it means that either nginx does not listen at all, or there is some firewall block in between.
Just for completeness, you should generate the dhparam.pem file:
# openssl dhparam -out /etc/ssl/certs/dhparam.pem 2048and add an ssl_dhparam directive as new line 25 in realupnow.com.conf:
ssh_dhparam /etc/ssl/certs/dhparam.pem ;And restart nginx.
After that nginx you could try on that host
# wget -H -O/dev/null http://realupnow.com/
in order to verify that nginx services port 443 (ssl).
EDIT: added semi-colon to the config line.
Yes all configuration looks fine, although some ssl settings can probably be tuned. But it should connect and allow access. One thing missing is the ssl_dhparam setting which according to doc is required when/if DH ciphers are used. But I would have thought nginx would issue an error message when started/restarted if that would stop it from opening the ssl listener. Try with stopping nginx, then starting it, and check the error log.
Does that host have any local firewall?
Is there a recent /var/log/php7.4-fpm.log and how does that look, if so?
Ok. hmm 203.220.142.95 would be me, yes.
The error.log I just posted is the most recent
Did you confirm that? I accessed your server more recent than that and before I made my post.
Right. with wget -H http://www.realupnow.com I get that it connects on port 80, responds with redirect (301) to https, and then fails connection on port 443.
That is an indication that the ssl setup is wrong in some way. Perhaps you could show the log again, following your last entry.
Suggestions:
1. remove the commented listen line (line 10).
2. Restore root /var/www/realupnow.com;
3. lift up the listen 443 ssl; to be new line 10, and
4. remove the # managed by Certbot junk from all lines.
Having default_server or not doesn't matter with a single configuration.
Next, forget about ssl-params.conf and instead use /etc/letsencrypt/options-ssl-nginx.conf, which is a gift from certbot (and there's no harm in publicizing ssl_ciphers).
The question is why there is a complaint about it in the log; try with commenting out that line, and restart nginx.
Hmm nginx is running but not serving pages...
Where did those "managed by certbot" lines come from? That configuration file of post #89 is a bit different from the one you showed at post #57 and it confuses me... where did "default_server" comd from, and where did that ssl setup come from? And why is it "root /var/www" ? Is that really the right file? Did you (also:)) get tired yesterday?
The nginx log files are still in /var/log/nginx where it has error.log and access.log
Firstly, it appears nginx is not running.
Does pgrep -a nginx say that it is?
Did you check the error log?
mmm no the ssl-params.conf needs to be included outside of the location block... But it also seems you have at some time let certbot mess with the configuration and it has then given you a mix of stuff you may and may not want.
It's ok to use /etc/letsencrypt/options-ssl-nginx.conf instead of the currently non-existing /etc/nginx/snippets/ssl-params.conf although you of course will need to review that instead.
Just make sure to remove the "# managed by certbot" comment on that include line.
And in the future, do not ever, never, never run certbot with --nginx argument again as it will then want to mess with the configuration again. certbot might also have dropped a cron action (/etc/cron.d/certbot) to "do helpful things" that you may and might not want. That's another thing to review and clean up. (sometimes I wish that those "we must do it all" hats were much smaller)
Further certbot added stuff at the bottom of that service block, which amounts to enforcing a redirect response when the incoming request is not https. That's an ok function, but again I think you should remove the "# managed by certbot" comment.
So: what's in /etc/letsencrypt/options-ssl-nginx.conf ?
EDIT: I meant that file of course.
Looks fine.
The final hurdle is to configure the ssl function of nginx and that's virtually a new ocean of possibilities. Though it typically reduces down into having two files: /etc/ssl/certs/dhparam.pem and /etc/nginx/snippets/ssl-params.conf.
You might have those already.
Plus that the service configuration should includes the second, typically near the ssl_certificate directive.
include snippets/ssl-params.conf ;