logrotate в docker |
|
Облачные DNS |
Метки: amazon dns google |
вакансия: Системный администратор Unix, Обнинск Калужской области |
|
Linux и наследование владельцев/прав |
|
firewalld не блокирует порт |
Chain INPUT (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 64 6779 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 391 43534 INPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0 391 43534 INPUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0 391 43534 INPUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID LOG flags 0 level 4 prefix "STATE_INVALID_DROP: " 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID 390 43482 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix "FINAL_REJECT: " 390 43482 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain FORWARD (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 1524 357K DOCKER-ISOLATION all -- * * 0.0.0.0/0 0.0.0.0/0 984 148K ACCEPT all -- * docker0 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED 23 2681 DOCKER all -- * docker0 0.0.0.0/0 0.0.0.0/0 517 206K ACCEPT all -- docker0 !docker0 0.0.0.0/0 0.0.0.0/0 16 2372 ACCEPT all -- docker0 docker0 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- * br-766cd293c639 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED 0 0 DOCKER all -- * br-766cd293c639 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- br-766cd293c639 !br-766cd293c639 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- br-766cd293c639 br-766cd293c639 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED 0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 0 0 FORWARD_direct all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 FORWARD_IN_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 FORWARD_IN_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 FORWARD_OUT_ZONES_SOURCE all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 FORWARD_OUT_ZONES all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID LOG flags 0 level 4 prefix "STATE_INVALID_DROP: " 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID 0 0 LOG all -- * * 0.0.0.0/0 0.0.0.0/0 LOG flags 0 level 4 prefix "FINAL_REJECT: " 0 0 REJECT all -- * * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited Chain OUTPUT (policy ACCEPT 25 packets, 3078 bytes) pkts bytes target prot opt in out source destination 364 47916 OUTPUT_direct all -- * * 0.0.0.0/0 0.0.0.0/0 Chain DOCKER (2 references) pkts bytes target prot opt in out source destination 7 309 ACCEPT tcp -- !docker0 docker0 0.0.0.0/0 172.18.0.5 tcp dpt:9000 0 0 ACCEPT tcp -- !docker0 docker0 0.0.0.0/0 172.18.0.7 tcp dpt:80 0 0 ACCEPT tcp -- !docker0 docker0 0.0.0.0/0 172.18.0.6 tcp dpt:15672 0 0 ACCEPT tcp -- !docker0 docker0 0.0.0.0/0 172.18.0.6 tcp dpt:5672 0 0 ACCEPT tcp -- !docker0 docker0 0.0.0.0/0 172.18.0.8 tcp dpt:8500 0 0 ACCEPT tcp -- !docker0 docker0 0.0.0.0/0 172.18.0.8 tcp dpt:8301 0 0 ACCEPT tcp -- !docker0 docker0 0.0.0.0/0 172.18.0.8 tcp dpt:8300 Chain DOCKER-ISOLATION (1 references) pkts bytes target prot opt in out source destination 0 0 DROP all -- br-766cd293c639 docker0 0.0.0.0/0 0.0.0.0/0 0 0 DROP all -- docker0 br-766cd293c639 0.0.0.0/0 0.0.0.0/0 1524 357K RETURN all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FORWARD_IN_ZONES (1 references) pkts bytes target prot opt in out source destination 0 0 FWDI_public all -- ens192 * 0.0.0.0/0 0.0.0.0/0 [goto] 0 0 FWDI_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto] Chain FORWARD_IN_ZONES_SOURCE (1 references) pkts bytes target prot opt in out source destination Chain FORWARD_OUT_ZONES (1 references) pkts bytes target prot opt in out source destination 0 0 FWDO_public all -- * ens192 0.0.0.0/0 0.0.0.0/0 [goto] 0 0 FWDO_public all -- * + 0.0.0.0/0 0.0.0.0/0 [goto] Chain FORWARD_OUT_ZONES_SOURCE (1 references) pkts bytes target prot opt in out source destination Chain FORWARD_direct (1 references) pkts bytes target prot opt in out source destination Chain FWDI_public (2 references) pkts bytes target prot opt in out source destination 0 0 FWDI_public_log all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 FWDI_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 FWDI_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 Chain FWDI_public_allow (1 references) pkts bytes target prot opt in out source destination Chain FWDI_public_deny (1 references) pkts bytes target prot opt in out source destination Chain FWDI_public_log (1 references) pkts bytes target prot opt in out source destination Chain FWDO_public (2 references) pkts bytes target prot opt in out source destination 0 0 FWDO_public_log all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 FWDO_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 FWDO_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0 Chain FWDO_public_allow (1 references) pkts bytes target prot opt in out source destination Chain FWDO_public_deny (1 references) pkts bytes target prot opt in out source destination Chain FWDO_public_log (1 references) pkts bytes target prot opt in out source destination Chain INPUT_ZONES (1 references) pkts bytes target prot opt in out source destination 10 401 IN_public all -- ens192 * 0.0.0.0/0 0.0.0.0/0 [goto] 381 43133 IN_public all -- + * 0.0.0.0/0 0.0.0.0/0 [goto] Chain INPUT_ZONES_SOURCE (1 references) pkts bytes target prot opt in out source destination Chain INPUT_direct (1 references) pkts bytes target prot opt in out source destination Chain IN_public (2 references) pkts bytes target prot opt in out source destination 391 43534 IN_public_log all -- * * 0.0.0.0/0 0.0.0.0/0 391 43534 IN_public_deny all -- * * 0.0.0.0/0 0.0.0.0/0 391 43534 IN_public_allow all -- * * 0.0.0.0/0 0.0.0.0/0 0 0 ACCEPT icmp -- * * 0.0.0.0/0 0.0.0.0/0 Chain IN_public_allow (1 references) pkts bytes target prot opt in out source destination 1 52 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ctstate NEW Chain IN_public_deny (1 references) pkts bytes target prot opt in out source destination Chain IN_public_log (1 references) pkts bytes target prot opt in out source destination Chain OUTPUT_direct (1 references) pkts bytes target prot opt in out source destination
|
Отчего может быть проблема с ресолвингом в curl ? |
'Curl Error 6 : 'couldn't resolve host name'
- многие сотни таких ошибок про один и тот же хост за полторы-две минуты, потом всё налаживается. А потом опять такая же фигня случается, обычно 4-5 раз в день.hosts: files dns
на hosts: dns files
. Поменял, не помогло.
Метки: dns |
Локальный репозиторий CentOS |
|
Специалист по Zabbix на разовый проект. |
|
Специалист по Zabbix на разовый проект. |
|
Выбор распределенной ФС |
Метки: linux fileserver nfs |
Выбор распределенной ФС |
Метки: linux fileserver nfs |
CARPовые адреса |
: ifconfig em1 em1: flags=8943 metric 0 mtu 1500 options=9b ether 00:50:56:aa:ad:7d inet 10.20.1.2 netmask 0xffffff00 broadcast 10.40.1.255 inet 10.20.1.1 netmask 0xffffff00 broadcast 10.40.1.255 vhid 255 nd6 options=21 media: Ethernet autoselect (1000baseT ) status: active carp: MASTER vhid 255 advbase 1 advskew 0
: ifconfig em1 em1: flags=8943 metric 0 mtu 1500 options=9b ether 00:50:56:aa:a0:d5 inet 10.20.1.3 netmask 0xffffff00 broadcast 10.40.1.255 inet 10.20.1.1 netmask 0xffffff00 broadcast 10.40.1.255 vhid 255 nd6 options=21 media: Ethernet autoselect (1000baseT ) status: active carp: BACKUP vhid 255 advbase 1 advskew 100
Метки: carp pfsense freebsd |
CARPовые адреса |
: ifconfig em1 em1: flags=8943 metric 0 mtu 1500 options=9b ether 00:50:56:aa:ad:7d inet 10.20.1.2 netmask 0xffffff00 broadcast 10.40.1.255 inet 10.20.1.1 netmask 0xffffff00 broadcast 10.40.1.255 vhid 255 nd6 options=21 media: Ethernet autoselect (1000baseT ) status: active carp: MASTER vhid 255 advbase 1 advskew 0
: ifconfig em1 em1: flags=8943 metric 0 mtu 1500 options=9b ether 00:50:56:aa:a0:d5 inet 10.20.1.3 netmask 0xffffff00 broadcast 10.40.1.255 inet 10.20.1.1 netmask 0xffffff00 broadcast 10.40.1.255 vhid 255 nd6 options=21 media: Ethernet autoselect (1000baseT ) status: active carp: BACKUP vhid 255 advbase 1 advskew 100
Метки: carp pfsense freebsd |
[SOLVED] IPsec между CentOS 7 и Windows 2012 R2 |
12:09:36.117723 IP (tos 0x0, ttl 64, id 29646, offset 0, flags [DF], proto UDP (17), length 204) 10.1.2.26.isakmp > 10.1.1.10.isakmp: [udp sum ok] isakmp 1.0 msgid 00000000 cookie e6d44de9c8641db7->0000000000000000: phase 1 I ident: (sa: doi=ipsec situation=identity (p: #0 protoid=isakmp transform=1 (t: #1 id=ike (type=enc value=3des)(type=hash value=sha1)(type=group desc value=modp2048)(type=auth value=preshared)(type=lifetype value=sec)(type=lifeduration value=2a30)))) (vid: len=8) (vid: len=16) (vid: len=20) (vid: len=16) (vid: len=16) 12:09:36.118423 IP (tos 0x0, ttl 128, id 19867, offset 0, flags [none], proto UDP (17), length 236) 10.1.1.10.isakmp > 10.1.2.26.isakmp: [udp sum ok] isakmp 1.0 msgid 00000000 cookie e6d44de9c8641db7->b2c0c64ce5211438: phase 1 R ident: (sa: doi=ipsec situation=identity (p: #0 protoid=isakmp transform=1 (t: #1 id=ike (type=enc value=3des)(type=hash value=sha1)(type=group desc value=modp2048)(type=auth value=preshared)(type=lifetype value=sec)(type=lifeduration len=4 value=00002a30)))) (vid: len=20) (vid: len=16) (vid: len=16) (vid: len=16) (vid: len=16) (vid: len=16)
config setup strictcrlpolicy=no uniqueids = yes conn %default authby=secret keyexchange=ikev1 mobike=no conn host01 left=10.1.2.26 right=10.1.1.10 type=transport auto=route pfs=no ike=3des-sha1-modp2048! esp=aes128-sha1
Aug 10 17:31:29 03[MGR] checkin IKE_SA dc01[3] Aug 10 17:31:29 03[MGR] checkin of IKE_SA successful Aug 10 17:31:29 16[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] Aug 10 17:31:33 09[MGR] checkout IKEv1 SA with SPIs bf2f04e4730454f7_i 0000000000000000_r Aug 10 17:31:33 09[MGR] IKE_SA dc01[3] successfully checked out Aug 10 17:31:33 09[IKE] sending retransmit 1 of request message ID 0, seq 1 Aug 10 17:31:33 09[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] (176 bytes) Aug 10 17:31:33 09[MGR] checkin IKE_SA dc01[3] Aug 10 17:31:33 09[MGR] checkin of IKE_SA successful Aug 10 17:31:33 16[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] Aug 10 17:31:40 10[MGR] checkout IKEv1 SA with SPIs bf2f04e4730454f7_i 0000000000000000_r Aug 10 17:31:40 10[MGR] IKE_SA dc01[3] successfully checked out Aug 10 17:31:40 10[IKE] sending retransmit 2 of request message ID 0, seq 1 Aug 10 17:31:40 10[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] (176 bytes) Aug 10 17:31:40 10[MGR] checkin IKE_SA dc01[3] Aug 10 17:31:40 10[MGR] checkin of IKE_SA successful Aug 10 17:31:40 16[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] Aug 10 17:31:53 03[MGR] checkout IKEv1 SA with SPIs bf2f04e4730454f7_i 0000000000000000_r Aug 10 17:31:53 03[MGR] IKE_SA dc01[3] successfully checked out Aug 10 17:31:53 03[IKE] sending retransmit 3 of request message ID 0, seq 1 Aug 10 17:31:53 03[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] (176 bytes) Aug 10 17:31:53 03[MGR] checkin IKE_SA dc01[3] Aug 10 17:31:53 03[MGR] checkin of IKE_SA successful Aug 10 17:31:53 16[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] Aug 10 17:32:17 07[MGR] checkout IKEv1 SA with SPIs bf2f04e4730454f7_i 0000000000000000_r Aug 10 17:32:17 07[MGR] IKE_SA dc01[3] successfully checked out Aug 10 17:32:17 07[IKE] sending retransmit 4 of request message ID 0, seq 1 Aug 10 17:32:17 07[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] (176 bytes) Aug 10 17:32:17 07[MGR] checkin IKE_SA dc01[3] Aug 10 17:32:17 07[MGR] checkin of IKE_SA successful Aug 10 17:32:17 16[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] Aug 10 17:32:59 07[MGR] checkout IKEv1 SA with SPIs bf2f04e4730454f7_i 0000000000000000_r Aug 10 17:32:59 07[MGR] IKE_SA dc01[3] successfully checked out Aug 10 17:32:59 07[IKE] sending retransmit 5 of request message ID 0, seq 1 Aug 10 17:32:59 07[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] (176 bytes) Aug 10 17:32:59 07[MGR] checkin IKE_SA dc01[3] Aug 10 17:32:59 07[MGR] checkin of IKE_SA successful
connections { dc01 { version = 1 local_addrs = 10.1.2.26 remote_addrs = 10.1.1.10 aggressive = no unique = no proposals = 3des-sha1-modp2048 reauth_time = 30m local { auth = psk id = 10.1.2.26 } remote { auth = psk id = 10.1.1.10 } children { dc01 { mode = transport esp_proposals = aes128-sha1 } } } } secrets { ike02 { id = 10.1.1.10 secret = $uperP@$$ } }
|
[SOLVED] IPsec между CentOS 7 и Windows 2012 R2 |
12:09:36.117723 IP (tos 0x0, ttl 64, id 29646, offset 0, flags [DF], proto UDP (17), length 204) 10.1.2.26.isakmp > 10.1.1.10.isakmp: [udp sum ok] isakmp 1.0 msgid 00000000 cookie e6d44de9c8641db7->0000000000000000: phase 1 I ident: (sa: doi=ipsec situation=identity (p: #0 protoid=isakmp transform=1 (t: #1 id=ike (type=enc value=3des)(type=hash value=sha1)(type=group desc value=modp2048)(type=auth value=preshared)(type=lifetype value=sec)(type=lifeduration value=2a30)))) (vid: len=8) (vid: len=16) (vid: len=20) (vid: len=16) (vid: len=16) 12:09:36.118423 IP (tos 0x0, ttl 128, id 19867, offset 0, flags [none], proto UDP (17), length 236) 10.1.1.10.isakmp > 10.1.2.26.isakmp: [udp sum ok] isakmp 1.0 msgid 00000000 cookie e6d44de9c8641db7->b2c0c64ce5211438: phase 1 R ident: (sa: doi=ipsec situation=identity (p: #0 protoid=isakmp transform=1 (t: #1 id=ike (type=enc value=3des)(type=hash value=sha1)(type=group desc value=modp2048)(type=auth value=preshared)(type=lifetype value=sec)(type=lifeduration len=4 value=00002a30)))) (vid: len=20) (vid: len=16) (vid: len=16) (vid: len=16) (vid: len=16) (vid: len=16)
config setup strictcrlpolicy=no uniqueids = yes conn %default authby=secret keyexchange=ikev1 mobike=no conn host01 left=10.1.2.26 right=10.1.1.10 type=transport auto=route pfs=no ike=3des-sha1-modp2048! esp=aes128-sha1
Aug 10 17:31:29 03[MGR] checkin IKE_SA dc01[3] Aug 10 17:31:29 03[MGR] checkin of IKE_SA successful Aug 10 17:31:29 16[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] Aug 10 17:31:33 09[MGR] checkout IKEv1 SA with SPIs bf2f04e4730454f7_i 0000000000000000_r Aug 10 17:31:33 09[MGR] IKE_SA dc01[3] successfully checked out Aug 10 17:31:33 09[IKE] sending retransmit 1 of request message ID 0, seq 1 Aug 10 17:31:33 09[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] (176 bytes) Aug 10 17:31:33 09[MGR] checkin IKE_SA dc01[3] Aug 10 17:31:33 09[MGR] checkin of IKE_SA successful Aug 10 17:31:33 16[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] Aug 10 17:31:40 10[MGR] checkout IKEv1 SA with SPIs bf2f04e4730454f7_i 0000000000000000_r Aug 10 17:31:40 10[MGR] IKE_SA dc01[3] successfully checked out Aug 10 17:31:40 10[IKE] sending retransmit 2 of request message ID 0, seq 1 Aug 10 17:31:40 10[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] (176 bytes) Aug 10 17:31:40 10[MGR] checkin IKE_SA dc01[3] Aug 10 17:31:40 10[MGR] checkin of IKE_SA successful Aug 10 17:31:40 16[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] Aug 10 17:31:53 03[MGR] checkout IKEv1 SA with SPIs bf2f04e4730454f7_i 0000000000000000_r Aug 10 17:31:53 03[MGR] IKE_SA dc01[3] successfully checked out Aug 10 17:31:53 03[IKE] sending retransmit 3 of request message ID 0, seq 1 Aug 10 17:31:53 03[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] (176 bytes) Aug 10 17:31:53 03[MGR] checkin IKE_SA dc01[3] Aug 10 17:31:53 03[MGR] checkin of IKE_SA successful Aug 10 17:31:53 16[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] Aug 10 17:32:17 07[MGR] checkout IKEv1 SA with SPIs bf2f04e4730454f7_i 0000000000000000_r Aug 10 17:32:17 07[MGR] IKE_SA dc01[3] successfully checked out Aug 10 17:32:17 07[IKE] sending retransmit 4 of request message ID 0, seq 1 Aug 10 17:32:17 07[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] (176 bytes) Aug 10 17:32:17 07[MGR] checkin IKE_SA dc01[3] Aug 10 17:32:17 07[MGR] checkin of IKE_SA successful Aug 10 17:32:17 16[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] Aug 10 17:32:59 07[MGR] checkout IKEv1 SA with SPIs bf2f04e4730454f7_i 0000000000000000_r Aug 10 17:32:59 07[MGR] IKE_SA dc01[3] successfully checked out Aug 10 17:32:59 07[IKE] sending retransmit 5 of request message ID 0, seq 1 Aug 10 17:32:59 07[NET] sending packet: from 10.1.2.26[500] to 10.1.1.10[500] (176 bytes) Aug 10 17:32:59 07[MGR] checkin IKE_SA dc01[3] Aug 10 17:32:59 07[MGR] checkin of IKE_SA successful
connections { dc01 { version = 1 local_addrs = 10.1.2.26 remote_addrs = 10.1.1.10 aggressive = no unique = no proposals = 3des-sha1-modp2048 reauth_time = 30m local { auth = psk id = 10.1.2.26 } remote { auth = psk id = 10.1.1.10 } children { dc01 { mode = transport esp_proposals = aes128-sha1 } } } } secrets { ike02 { id = 10.1.1.10 secret = $uperP@$$ } }
|
Микротик |
|
Микротик |
|
Solved: Как заглянуть в VPN? |
Метки: vpn pfsense ipsec |
призрачный tcp estab |
Метки: linux |