This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Pages: [1]
1
Installation and Upgrades / Re: Zentyal 6.2 Commercial version - issue when doing an "sudo apt-update"
« on: August 09, 2022, 11:04:19 am »
Hi,
I was on vacation and was not able to answer you before. The command is still failing and here is the "sudo apt-key list" results as requested:
sudo apt-key list
/etc/apt/trusted.gpg
--------------------
pub rsa4096 2015-06-12 [SC]
70DE D76D CD1F A875 B97C C75B 370C 85D7 09D2 6407
uid [ unknown] Datto, Inc (Datto Software Packages) <swpackages@datto.com>
sub rsa4096 2015-06-12 [E]
pub rsa4096 2015-02-17 [SC]
8756 C4F7 65C9 AC3C B6B8 5D62 379C E192 D401 AB61
uid [ unknown] Bintray (by JFrog) <bintray@bintray.com>
sub rsa4096 2015-02-17 [E]
pub rsa4096 2021-03-31 [SCEA]
C525 F88F CF3A 7E56 CE2C F591 31EB 3981 E723 ACAA
uid [ unknown] https://packagecloud.io/ookla/speedtest-cli (https://packagecloud.io/docs#gpg_signing) <support@packagecloud.io>
sub rsa4096 2021-03-31 [SEA]
pub rsa2048 2014-08-04 [SC]
3FA7 E032 8081 BFF6 A14D A29A A6A1 9B38 D3D8 31EF
uid [ unknown] Xamarin Public Jenkins (auto-signing) <releng@xamarin.com>
sub rsa2048 2014-08-04 [E]
pub rsa4096 2020-10-22 [SC]
DFAC 0C01 657C E14F F733 87CD 19CB DC0A 4E38 9175
uid [ unknown] Zentyal Community Repository <blorente@zentyal.com>
sub rsa4096 2020-10-22 [E]
sub rsa4096 2020-10-22
pub dsa1024 2011-10-03 [SC]
658A 4D9F 8A8F 16B5 8BE6 2DD0 76CB 3C6D 0D64 EFEC
uid [ unknown] Zentyal (Packages Archive) <it@zentyal.com>
sub elg2048 2011-10-03 [E]
/etc/apt/trusted.gpg.d/ubuntu-keyring-2012-archive.gpg
------------------------------------------------------
pub rsa4096 2012-05-11 [SC]
790B C727 7767 219C 42C8 6F93 3B4F E6AC C0B2 1F32
uid [ unknown] Ubuntu Archive Automatic Signing Key (2012) <ftpmaster@ubuntu.com>
/etc/apt/trusted.gpg.d/ubuntu-keyring-2012-cdimage.gpg
------------------------------------------------------
pub rsa4096 2012-05-11 [SC]
8439 38DF 228D 22F7 B374 2BC0 D94A A3F0 EFE2 1092
uid [ unknown] Ubuntu CD Image Automatic Signing Key (2012) <cdimage@ubuntu.com>
/etc/apt/trusted.gpg.d/ubuntu-keyring-2018-archive.gpg
------------------------------------------------------
pub rsa4096 2018-09-17 [SC]
F6EC B376 2474 EDA9 D21B 7022 8719 20D1 991B C93C
uid [ unknown] Ubuntu Archive Automatic Signing Key (2018) <ftpmaster@ubuntu.com>
/etc/apt/trusted.gpg.d/zabbix-official-repo.gpg
-----------------------------------------------
pub dsa1024 2012-10-28 [SC]
FBAB D5FB 2025 5ECA B22E E194 D13D 58E4 79EA 5ED4
uid [ unknown] Zabbix SIA <packager@zabbix.com>
sub elg1024 2012-10-28 [E]
pub rsa2048 2016-07-15 [SC]
A184 8F53 52D0 22B9 471D 83D0 082A B56B A14F E591
uid [ unknown] Zabbix LLC <packager@zabbix.com>
sub rsa2048 2016-07-15 [E]
/etc/apt/trusted.gpg.d/zentyal-qa.asc
-------------------------------------
pub rsa2048 2012-09-07 [SC]
FFFF 8A63 82DC 816C 277B 935E 8E92 29F7 E23F 4777
uid [ unknown] Zentyal Release Team <release-team@zentyal.org>
sub rsa2048 2012-09-07 [E]
and the "sudo apt update" command results:
Hit:1 http://ch.archive.ubuntu.com/ubuntu bionic InRelease
Hit:2 http://ch.archive.ubuntu.com/ubuntu bionic-updates InRelease
Hit:3 http://ch.archive.ubuntu.com/ubuntu bionic-backports InRelease
Get:4 http://security.ubuntu.com/ubuntu bionic-security InRelease [88.7 kB]
Hit:6 https://download.mono-project.com/repo/ubuntu stable-bionic InRelease
Get:5 http://packages.zentyal.com/zentyal-qa 6.2 InRelease [7,484 B]
Hit:7 http://repo.zabbix.com/zabbix/5.0/ubuntu bionic InRelease
Hit:8 https://cpkg.datto.com/datto-deb/public/bionic bionic InRelease
Err:5 http://packages.zentyal.com/zentyal-qa 6.2 InRelease
The following signatures couldn't be verified because the public key is not available: NO_PUBKEY EF358ACFF842CD9E
Hit:9 https://packagecloud.io/ookla/speedtest-cli/ubuntu bionic InRelease
Reading package lists... Done
W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en_US) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: GPG error: http://packages.zentyal.com/zentyal-qa 6.2 InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY EF358ACFF842CD9E
E: The repository 'http://packages.zentyal.com/zentyal-qa 6.2 InRelease' is not signed.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(
manpage for repository creation and user configuration details.
W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en_US) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
I was on vacation and was not able to answer you before. The command is still failing and here is the "sudo apt-key list" results as requested:
sudo apt-key list
/etc/apt/trusted.gpg
--------------------
pub rsa4096 2015-06-12 [SC]
70DE D76D CD1F A875 B97C C75B 370C 85D7 09D2 6407
uid [ unknown] Datto, Inc (Datto Software Packages) <swpackages@datto.com>
sub rsa4096 2015-06-12 [E]
pub rsa4096 2015-02-17 [SC]
8756 C4F7 65C9 AC3C B6B8 5D62 379C E192 D401 AB61
uid [ unknown] Bintray (by JFrog) <bintray@bintray.com>
sub rsa4096 2015-02-17 [E]
pub rsa4096 2021-03-31 [SCEA]
C525 F88F CF3A 7E56 CE2C F591 31EB 3981 E723 ACAA
uid [ unknown] https://packagecloud.io/ookla/speedtest-cli (https://packagecloud.io/docs#gpg_signing) <support@packagecloud.io>
sub rsa4096 2021-03-31 [SEA]
pub rsa2048 2014-08-04 [SC]
3FA7 E032 8081 BFF6 A14D A29A A6A1 9B38 D3D8 31EF
uid [ unknown] Xamarin Public Jenkins (auto-signing) <releng@xamarin.com>
sub rsa2048 2014-08-04 [E]
pub rsa4096 2020-10-22 [SC]
DFAC 0C01 657C E14F F733 87CD 19CB DC0A 4E38 9175
uid [ unknown] Zentyal Community Repository <blorente@zentyal.com>
sub rsa4096 2020-10-22 [E]
sub rsa4096 2020-10-22
pub dsa1024 2011-10-03 [SC]
658A 4D9F 8A8F 16B5 8BE6 2DD0 76CB 3C6D 0D64 EFEC
uid [ unknown] Zentyal (Packages Archive) <it@zentyal.com>
sub elg2048 2011-10-03 [E]
/etc/apt/trusted.gpg.d/ubuntu-keyring-2012-archive.gpg
------------------------------------------------------
pub rsa4096 2012-05-11 [SC]
790B C727 7767 219C 42C8 6F93 3B4F E6AC C0B2 1F32
uid [ unknown] Ubuntu Archive Automatic Signing Key (2012) <ftpmaster@ubuntu.com>
/etc/apt/trusted.gpg.d/ubuntu-keyring-2012-cdimage.gpg
------------------------------------------------------
pub rsa4096 2012-05-11 [SC]
8439 38DF 228D 22F7 B374 2BC0 D94A A3F0 EFE2 1092
uid [ unknown] Ubuntu CD Image Automatic Signing Key (2012) <cdimage@ubuntu.com>
/etc/apt/trusted.gpg.d/ubuntu-keyring-2018-archive.gpg
------------------------------------------------------
pub rsa4096 2018-09-17 [SC]
F6EC B376 2474 EDA9 D21B 7022 8719 20D1 991B C93C
uid [ unknown] Ubuntu Archive Automatic Signing Key (2018) <ftpmaster@ubuntu.com>
/etc/apt/trusted.gpg.d/zabbix-official-repo.gpg
-----------------------------------------------
pub dsa1024 2012-10-28 [SC]
FBAB D5FB 2025 5ECA B22E E194 D13D 58E4 79EA 5ED4
uid [ unknown] Zabbix SIA <packager@zabbix.com>
sub elg1024 2012-10-28 [E]
pub rsa2048 2016-07-15 [SC]
A184 8F53 52D0 22B9 471D 83D0 082A B56B A14F E591
uid [ unknown] Zabbix LLC <packager@zabbix.com>
sub rsa2048 2016-07-15 [E]
/etc/apt/trusted.gpg.d/zentyal-qa.asc
-------------------------------------
pub rsa2048 2012-09-07 [SC]
FFFF 8A63 82DC 816C 277B 935E 8E92 29F7 E23F 4777
uid [ unknown] Zentyal Release Team <release-team@zentyal.org>
sub rsa2048 2012-09-07 [E]
and the "sudo apt update" command results:
Hit:1 http://ch.archive.ubuntu.com/ubuntu bionic InRelease
Hit:2 http://ch.archive.ubuntu.com/ubuntu bionic-updates InRelease
Hit:3 http://ch.archive.ubuntu.com/ubuntu bionic-backports InRelease
Get:4 http://security.ubuntu.com/ubuntu bionic-security InRelease [88.7 kB]
Hit:6 https://download.mono-project.com/repo/ubuntu stable-bionic InRelease
Get:5 http://packages.zentyal.com/zentyal-qa 6.2 InRelease [7,484 B]
Hit:7 http://repo.zabbix.com/zabbix/5.0/ubuntu bionic InRelease
Hit:8 https://cpkg.datto.com/datto-deb/public/bionic bionic InRelease
Err:5 http://packages.zentyal.com/zentyal-qa 6.2 InRelease
The following signatures couldn't be verified because the public key is not available: NO_PUBKEY EF358ACFF842CD9E
Hit:9 https://packagecloud.io/ookla/speedtest-cli/ubuntu bionic InRelease
Reading package lists... Done
W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en_US) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: GPG error: http://packages.zentyal.com/zentyal-qa 6.2 InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY EF358ACFF842CD9E
E: The repository 'http://packages.zentyal.com/zentyal-qa 6.2 InRelease' is not signed.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(

W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en_US) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
2
Installation and Upgrades / Re: Zentyal 6.2 Commercial version - issue when doing an "sudo apt-update"
« on: July 21, 2022, 10:34:57 am »
Thanks for your help. I really appreciate that! unfortunately, even if I run the same command, I v'e got the following results (even if I have the commercial editon - perpetual licences 25 w) :
apt-key list | grep -i -B3 -A3 'zentyal'
Warning: apt-key output should not be parsed (stdout is not a terminal)
pub rsa4096 2020-10-22 [SC]
DFAC 0C01 657C E14F F733 87CD 19CB DC0A 4E38 9175
uid [ unknown] Zentyal Community Repository <blorente@zentyal.com>
sub rsa4096 2020-10-22 [E]
sub rsa4096 2020-10-22 [S ]
pub dsa1024 2011-10-03 [SC]
658A 4D9F 8A8F 16B5 8BE6 2DD0 76CB 3C6D 0D64 EFEC
uid [ unknown] Zentyal (Packages Archive) <it@zentyal.com>
sub elg2048 2011-10-03 [E]
/etc/apt/trusted.gpg.d/ubuntu-keyring-2012-archive.gpg
uid [ unknown] Zabbix LLC <packager@zabbix.com>
sub rsa2048 2016-07-15 [E]
/etc/apt/trusted.gpg.d/zentyal-qa.asc
-------------------------------------
pub rsa2048 2012-09-07 [SC]
FFFF 8A63 82DC 816C 277B 935E 8E92 29F7 E23F 4777
uid [ unknown] Zentyal Release Team <release-team@zentyal.org>
sub rsa2048 2012-09-07 [E]
and for the command : sudo apt-get update
[sudo] password for valery:
Hit:1 http://ch.archive.ubuntu.com/ubuntu bionic InRelease
Hit:2 http://ch.archive.ubuntu.com/ubuntu bionic-updates InRelease
Hit:3 http://security.ubuntu.com/ubuntu bionic-security InRelease
Hit:4 http://ch.archive.ubuntu.com/ubuntu bionic-backports InRelease
Hit:6 https://download.mono-project.com/repo/ubuntu stable-bionic InRelease
Get:5 http://packages.zentyal.com/zentyal-qa 6.2 InRelease [7,484 B]
Hit:7 http://repo.zabbix.com/zabbix/5.0/ubuntu bionic InRelease
Hit:8 https://cpkg.datto.com/datto-deb/public/bionic bionic InRelease
Err:5 http://packages.zentyal.com/zentyal-qa 6.2 InRelease
The following signatures couldn't be verified because the public key is not available: NO_PUBKEY EF358ACFF842CD9E
Hit:9 https://packagecloud.io/ookla/speedtest-cli/ubuntu bionic InRelease
Reading package lists... Done
W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en_US) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: GPG error: http://packages.zentyal.com/zentyal-qa 6.2 InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY EF358ACFF842CD9E
E: The repository 'http://packages.zentyal.com/zentyal-qa 6.2 InRelease' is not signed.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(
manpage for repository creation and user configuration details.
W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en_US) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
apt-key list | grep -i -B3 -A3 'zentyal'
Warning: apt-key output should not be parsed (stdout is not a terminal)
pub rsa4096 2020-10-22 [SC]
DFAC 0C01 657C E14F F733 87CD 19CB DC0A 4E38 9175
uid [ unknown] Zentyal Community Repository <blorente@zentyal.com>
sub rsa4096 2020-10-22 [E]
sub rsa4096 2020-10-22 [S ]
pub dsa1024 2011-10-03 [SC]
658A 4D9F 8A8F 16B5 8BE6 2DD0 76CB 3C6D 0D64 EFEC
uid [ unknown] Zentyal (Packages Archive) <it@zentyal.com>
sub elg2048 2011-10-03 [E]
/etc/apt/trusted.gpg.d/ubuntu-keyring-2012-archive.gpg
uid [ unknown] Zabbix LLC <packager@zabbix.com>
sub rsa2048 2016-07-15 [E]
/etc/apt/trusted.gpg.d/zentyal-qa.asc
-------------------------------------
pub rsa2048 2012-09-07 [SC]
FFFF 8A63 82DC 816C 277B 935E 8E92 29F7 E23F 4777
uid [ unknown] Zentyal Release Team <release-team@zentyal.org>
sub rsa2048 2012-09-07 [E]
and for the command : sudo apt-get update
[sudo] password for valery:
Hit:1 http://ch.archive.ubuntu.com/ubuntu bionic InRelease
Hit:2 http://ch.archive.ubuntu.com/ubuntu bionic-updates InRelease
Hit:3 http://security.ubuntu.com/ubuntu bionic-security InRelease
Hit:4 http://ch.archive.ubuntu.com/ubuntu bionic-backports InRelease
Hit:6 https://download.mono-project.com/repo/ubuntu stable-bionic InRelease
Get:5 http://packages.zentyal.com/zentyal-qa 6.2 InRelease [7,484 B]
Hit:7 http://repo.zabbix.com/zabbix/5.0/ubuntu bionic InRelease
Hit:8 https://cpkg.datto.com/datto-deb/public/bionic bionic InRelease
Err:5 http://packages.zentyal.com/zentyal-qa 6.2 InRelease
The following signatures couldn't be verified because the public key is not available: NO_PUBKEY EF358ACFF842CD9E
Hit:9 https://packagecloud.io/ookla/speedtest-cli/ubuntu bionic InRelease
Reading package lists... Done
W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en_US) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: GPG error: http://packages.zentyal.com/zentyal-qa 6.2 InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY EF358ACFF842CD9E
E: The repository 'http://packages.zentyal.com/zentyal-qa 6.2 InRelease' is not signed.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(

W: Target Packages (main/binary-amd64/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-i386/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Packages (main/binary-all/Packages) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en_US) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
W: Target Translations (main/i18n/Translation-en) is configured multiple times in /etc/apt/sources.list.d/mono-official-stable.list:1 and /etc/apt/sources.list.d/mono-stable.list:1
3
Installation and Upgrades / Re: Zentyal 6.2 Commercial version - issue when doing an "sudo apt-update"
« on: July 18, 2022, 04:59:06 pm »
Yes i did that but here is the results of "apt-key list" (it seems expired since the 2022-05-27):
/etc/apt/trusted.gpg.d/zentyal-6.2-packages-com.asc
---------------------------------------------------
pub rsa3072 2020-05-27 [SC] [expired: 2022-05-27]
935D 5F02 D09D 8E65 99D5 2A01 799E 2919 24B3 C2E9
uid [ expired] Zentyal Commercial Repository <blorente@zentyal.com>
/etc/apt/trusted.gpg.d/zentyal-qa.asc
-------------------------------------
pub rsa2048 2012-09-07 [SC]
FFFF 8A63 82DC 816C 277B 935E 8E92 29F7 E23F 4777
uid [ unknown] Zentyal Release Team <release-team@zentyal.org>
sub rsa2048 2012-09-07 [E]
/etc/apt/trusted.gpg.d/zentyal-6.2-packages-com.asc
---------------------------------------------------
pub rsa3072 2020-05-27 [SC] [expired: 2022-05-27]
935D 5F02 D09D 8E65 99D5 2A01 799E 2919 24B3 C2E9
uid [ expired] Zentyal Commercial Repository <blorente@zentyal.com>
/etc/apt/trusted.gpg.d/zentyal-qa.asc
-------------------------------------
pub rsa2048 2012-09-07 [SC]
FFFF 8A63 82DC 816C 277B 935E 8E92 29F7 E23F 4777
uid [ unknown] Zentyal Release Team <release-team@zentyal.org>
sub rsa2048 2012-09-07 [E]
4
Installation and Upgrades / Re: We have a problem with Zentyal not being able to fully update at the moment.
« on: July 18, 2022, 11:49:45 am »
Yes i did that but here is the results of "apt-key list" (it seems expired since the 2022-05-27):
/etc/apt/trusted.gpg.d/zentyal-6.2-packages-com.asc
---------------------------------------------------
pub rsa3072 2020-05-27 [SC] [expired: 2022-05-27]
935D 5F02 D09D 8E65 99D5 2A01 799E 2919 24B3 C2E9
uid [ expired] Zentyal Commercial Repository <blorente@zentyal.com>
/etc/apt/trusted.gpg.d/zentyal-qa.asc
-------------------------------------
pub rsa2048 2012-09-07 [SC]
FFFF 8A63 82DC 816C 277B 935E 8E92 29F7 E23F 4777
uid [ unknown] Zentyal Release Team <release-team@zentyal.org>
sub rsa2048 2012-09-07 [E]
/etc/apt/trusted.gpg.d/zentyal-6.2-packages-com.asc
---------------------------------------------------
pub rsa3072 2020-05-27 [SC] [expired: 2022-05-27]
935D 5F02 D09D 8E65 99D5 2A01 799E 2919 24B3 C2E9
uid [ expired] Zentyal Commercial Repository <blorente@zentyal.com>
/etc/apt/trusted.gpg.d/zentyal-qa.asc
-------------------------------------
pub rsa2048 2012-09-07 [SC]
FFFF 8A63 82DC 816C 277B 935E 8E92 29F7 E23F 4777
uid [ unknown] Zentyal Release Team <release-team@zentyal.org>
sub rsa2048 2012-09-07 [E]
5
Installation and Upgrades / Zentyal 6.2 Commercial version - issue when doing an "sudo apt-update"
« on: July 15, 2022, 11:02:09 am »
Hello,
When I do a sudo apt-update, i've got the following error:
E: Failed to fetch http://packages.zentyal.com/zentyal-qa/dists/6.2/InRelease 401 Unauthorized [IP: 3.121.107.3 80]
E: The repository 'http://packages.zentyal.com/zentyal-qa 6.2 InRelease' is no longer signed.
Any idea on how to resolve it ?
Kind regards,
V.
When I do a sudo apt-update, i've got the following error:
E: Failed to fetch http://packages.zentyal.com/zentyal-qa/dists/6.2/InRelease 401 Unauthorized [IP: 3.121.107.3 80]
E: The repository 'http://packages.zentyal.com/zentyal-qa 6.2 InRelease' is no longer signed.
Any idea on how to resolve it ?
Kind regards,
V.
6
Other modules / Firewall is blocking the traffic from internal network to Internet
« on: June 17, 2021, 10:53:57 am »
Hello,
I installed the commercial version of Zentyal. I've got issue with the firewall. The log shows that some of the packet coming from the inside network to the internet through the Zentyal Gateway are blocked by the Zentyal Firewall but my configuration is set to allow everything!
It's an Home (or Lab) network and my network is quite simple. The box from my Internet provider is linked to eth1 of Zentyal Server (the eth1 addresses are 192.168.9.x - the router from the Internet provider does not allows bridge mode, thus I put the Zentyal Server in the DMZ) then eth0 is connected to my home network (the eth0 addresses are 192.168.1.x). I have another eth2 which is a copy of the eth1 in order to inspect the traffic by the IPS Zentyal system. The Zentyal server is an VM hosted by the free Windows HyperV 2016. I've got at least two other VM which is the OpenVPN Linux turnkey and another Windows Media Server for Plex.
The Http Proxy is also enabled in the Zentyal Server. Any one have an idea why this traffic is blocked, even if it seems that everything is working on the Laptops or PC where the Firewall is blocking the traffic !
Link to screen copy and file of the configuration
https://it-cm.ch/mycloud/index.php/s/VvgEMfDAKiarKSv
Extract of the configuration file:
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere
preinput all -- anywhere anywhere
idrop all -- anywhere anywhere state INVALID
iaccept all -- anywhere anywhere state RELATED,ESTABLISHED
inospoof all -- anywhere anywhere
iexternalmodules all -- anywhere anywhere
iexternal all -- anywhere anywhere
inoexternal all -- anywhere anywhere
imodules all -- anywhere anywhere
iglobal all -- anywhere anywhere
iaccept icmp !f anywhere anywhere icmp echo-request state NEW
iaccept icmp !f anywhere anywhere icmp echo-reply state NEW
iaccept icmp !f anywhere anywhere icmp destination-unreachable state NEW
iaccept icmp !f anywhere anywhere icmp source-quench state NEW
iaccept icmp !f anywhere anywhere icmp time-exceeded state NEW
iaccept icmp !f anywhere anywhere icmp parameter-problem state NEW
idrop all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
preforward all -- anywhere anywhere
fdrop all -- anywhere anywhere state INVALID
faccept all -- anywhere anywhere state RELATED,ESTABLISHED
fnospoof all -- anywhere anywhere
fredirects all -- anywhere anywhere
fmodules all -- anywhere anywhere
ffwdrules all -- anywhere anywhere
fnoexternal all -- anywhere anywhere
fdns all -- anywhere anywhere
fglobal all -- anywhere anywhere
faccept icmp !f anywhere anywhere icmp echo-request state NEW
faccept icmp !f anywhere anywhere icmp echo-reply state NEW
faccept icmp !f anywhere anywhere icmp destination-unreachable state NEW
faccept icmp !f anywhere anywhere icmp source-quench state NEW
faccept icmp !f anywhere anywhere icmp time-exceeded state NEW
faccept icmp !f anywhere anywhere icmp parameter-problem state NEW
fdrop all -- anywhere anywhere
Chain OUTPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere
preoutput all -- anywhere anywhere
odrop all -- anywhere anywhere state INVALID
oaccept all -- anywhere anywhere state RELATED,ESTABLISHED
ointernal all -- anywhere anywhere
omodules all -- anywhere anywhere
oglobal all -- anywhere anywhere
oaccept icmp !f anywhere anywhere icmp echo-request state NEW
oaccept icmp !f anywhere anywhere icmp echo-reply state NEW
oaccept icmp !f anywhere anywhere icmp destination-unreachable state NEW
oaccept icmp !f anywhere anywhere icmp source-quench state NEW
oaccept icmp !f anywhere anywhere icmp time-exceeded state NEW
oaccept icmp !f anywhere anywhere icmp parameter-problem state NEW
odrop all -- anywhere anywhere
Chain drop (3 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 50/min burst 10 LOG level debug prefix "zentyal-firewall drop "
DROP all -- anywhere anywhere
Chain faccept (12 references)
target prot opt source destination
NFQUEUE all -- anywhere anywhere NFQUEUE num 0
NFQUEUE all -- anywhere anywhere NFQUEUE num 0
ACCEPT all -- anywhere anywhere
Chain fdns (1 references)
target prot opt source destination
Chain fdrop (8 references)
target prot opt source destination
drop all -- anywhere anywhere
Chain ffwdrules (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere
RETURN all -- anywhere anywhere
Chain fglobal (1 references)
target prot opt source destination
faccept all -- anywhere anywhere
Chain fmodules (1 references)
target prot opt source destination
Chain fnoexternal (1 references)
target prot opt source destination
fdrop all -- anywhere anywhere state NEW
Chain fnospoof (1 references)
target prot opt source destination
fnospoofmodules all -- anywhere anywhere
fdrop all -- 192.168.1.0/24 anywhere
fdrop all -- 192.168.9.0/24 anywhere
fdrop all -- 192.168.3.0/24 anywhere
fdrop all -- 192.168.99.0/24 anywhere
Chain fnospoofmodules (1 references)
target prot opt source destination
Chain fredirects (1 references)
target prot opt source destination
faccept tcp -- anywhere 192.168.1.124 state NEW tcp dpt:https
faccept tcp -- anywhere 192.168.1.66 state NEW tcp dpt:32400
faccept udp -- anywhere 192.168.1.124 state NEW udp dpt:openvpn
Chain ftoexternalonly (0 references)
target prot opt source destination
faccept all -- anywhere anywhere
fdrop all -- anywhere anywhere
Chain iaccept (54 references)
target prot opt source destination
NFQUEUE all -- anywhere anywhere NFQUEUE num 0
NFQUEUE all -- anywhere anywhere NFQUEUE num 0
ACCEPT all -- anywhere anywhere
Chain idrop (7 references)
target prot opt source destination
drop all -- anywhere anywhere
Chain iexternal (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere
RETURN all -- anywhere anywhere
iaccept tcp -- anywhere anywhere tcp dpt:5223 state NEW
iaccept tcp -- anywhere anywhere tcp dpt:imaps state NEW
iaccept tcp -- anywhere anywhere tcp dpt:submission state NEW
iaccept tcp -- anywhere anywhere tcp dpt:https state NEW
iaccept tcp -- anywhere anywhere tcp dpt:http state NEW
iaccept tcp -- anywhere anywhere tcp dpt:smtp state NEW
iaccept tcp -- anywhere anywhere tcp dpt:32400 state NEW
iaccept udp -- anywhere anywhere udp dpts:32410:32414 state NEW
Chain iexternalmodules (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere
RETURN all -- anywhere anywhere
Chain iglobal (1 references)
target prot opt source destination
iaccept tcp -- anywhere anywhere tcp dpt:5223 state NEW
iaccept tcp -- anywhere anywhere tcp dpt:imaps state NEW
iaccept tcp -- anywhere anywhere tcp dpt:submission state NEW
iaccept tcp -- anywhere anywhere tcp dpt:https state NEW
iaccept tcp -- anywhere anywhere tcp dpt:http state NEW
iaccept tcp -- anywhere anywhere tcp dpt:smtp state NEW
iaccept udp -- anywhere anywhere udp dpt:ntp state NEW
iaccept tcp -- anywhere anywhere tcp dpt:32400 state NEW
iaccept udp -- anywhere anywhere udp dpts:32410:32414 state NEW
iaccept udp -- anywhere anywhere udp dpt:35622 state NEW
iaccept tcp -- anywhere anywhere tcp dpt:35623 state NEW
iaccept tcp -- anywhere anywhere tcp dpt:35621 state NEW
iaccept tcp -- anywhere anywhere tcp dpts:55413:55415 state NEW
iaccept udp -- anywhere anywhere udp dpt:35623 state NEW
iaccept udp -- anywhere anywhere udp dpt:zabbix-agent state NEW
iaccept tcp -- anywhere anywhere tcp dpt:zabbix-agent state NEW
iaccept udp -- anywhere anywhere udp dpt:zabbix-trapper state NEW
iaccept tcp -- anywhere anywhere tcp dpt:zabbix-trapper state NEW
iaccept udp -- anywhere anywhere udp dpt:kerberos state NEW
iaccept tcp -- anywhere anywhere tcp dpt:kerberos state NEW
iaccept tcp -- anywhere anywhere tcp dpt:loc-srv state NEW
iaccept udp -- anywhere anywhere udp dpt:netbios-ns state NEW
iaccept udp -- anywhere anywhere udp dpt:netbios-dgm state NEW
iaccept tcp -- anywhere anywhere tcp dpt:netbios-ssn state NEW
iaccept udp -- anywhere anywhere udp dpt:ldap state NEW
iaccept tcp -- anywhere anywhere tcp dpt:ldap state NEW
iaccept tcp -- anywhere anywhere tcp dpt:microsoft-ds state NEW
iaccept udp -- anywhere anywhere udp dpt:kpasswd state NEW
iaccept tcp -- anywhere anywhere tcp dpt:kpasswd state NEW
iaccept tcp -- anywhere anywhere tcp dpt:ldaps state NEW
iaccept tcp -- anywhere anywhere tcp dpt:3268 state NEW
iaccept tcp -- anywhere anywhere tcp dpt:3269 state NEW
iaccept tcp -- anywhere anywhere tcp dpts:49152:65535 state NEW
iaccept udp -- anywhere anywhere udp dpt:domain state NEW
iaccept tcp -- anywhere anywhere tcp dpt:domain state NEW
iaccept tcp -- anywhere anywhere tcp dpt:ssh state NEW
iaccept tcp -- anywhere anywhere tcp dpt:8450 state NEW
Chain imodules (1 references)
target prot opt source destination
iaccept tcp -- anywhere anywhere state NEW tcp dpt:3128
iaccept tcp -- anywhere anywhere state NEW tcp dpt:3128
DROP tcp -- anywhere anywhere state NEW tcp dpt:3129
Chain inoexternal (1 references)
target prot opt source destination
idrop all -- anywhere anywhere state NEW
Chain inointernal (0 references)
target prot opt source destination
Chain inospoof (1 references)
target prot opt source destination
inospoofmodules all -- anywhere anywhere
idrop all -- 192.168.1.0/24 anywhere
idrop all -- 192.168.9.0/24 anywhere
idrop all -- 192.168.3.0/24 anywhere
idrop all -- 192.168.99.0/24 anywhere
Chain inospoofmodules (1 references)
target prot opt source destination
Chain log (0 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 50/min burst 10 LOG level debug prefix "zentyal-firewall log "
RETURN all -- anywhere anywhere
Chain oaccept (13 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain odrop (2 references)
target prot opt source destination
drop all -- anywhere anywhere
Chain oglobal (1 references)
target prot opt source destination
oaccept all -- anywhere anywhere state NEW
Chain ointernal (1 references)
target prot opt source destination
Chain omodules (1 references)
target prot opt source destination
oaccept tcp -- anywhere anywhere tcp dpt:http
oaccept udp -- anywhere anywhere udp dpt:domain
oaccept tcp -- anywhere anywhere tcp dpt:domain
oaccept tcp -- anywhere anywhere state NEW tcp dpt:http
oaccept tcp -- anywhere anywhere state NEW tcp dpt:https
Chain preforward (1 references)
target prot opt source destination
Chain preinput (1 references)
target prot opt source destination
Chain preoutput (1 references)
target prot opt source destination
I installed the commercial version of Zentyal. I've got issue with the firewall. The log shows that some of the packet coming from the inside network to the internet through the Zentyal Gateway are blocked by the Zentyal Firewall but my configuration is set to allow everything!
It's an Home (or Lab) network and my network is quite simple. The box from my Internet provider is linked to eth1 of Zentyal Server (the eth1 addresses are 192.168.9.x - the router from the Internet provider does not allows bridge mode, thus I put the Zentyal Server in the DMZ) then eth0 is connected to my home network (the eth0 addresses are 192.168.1.x). I have another eth2 which is a copy of the eth1 in order to inspect the traffic by the IPS Zentyal system. The Zentyal server is an VM hosted by the free Windows HyperV 2016. I've got at least two other VM which is the OpenVPN Linux turnkey and another Windows Media Server for Plex.
The Http Proxy is also enabled in the Zentyal Server. Any one have an idea why this traffic is blocked, even if it seems that everything is working on the Laptops or PC where the Firewall is blocking the traffic !
Link to screen copy and file of the configuration
https://it-cm.ch/mycloud/index.php/s/VvgEMfDAKiarKSv
Extract of the configuration file:
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere
preinput all -- anywhere anywhere
idrop all -- anywhere anywhere state INVALID
iaccept all -- anywhere anywhere state RELATED,ESTABLISHED
inospoof all -- anywhere anywhere
iexternalmodules all -- anywhere anywhere
iexternal all -- anywhere anywhere
inoexternal all -- anywhere anywhere
imodules all -- anywhere anywhere
iglobal all -- anywhere anywhere
iaccept icmp !f anywhere anywhere icmp echo-request state NEW
iaccept icmp !f anywhere anywhere icmp echo-reply state NEW
iaccept icmp !f anywhere anywhere icmp destination-unreachable state NEW
iaccept icmp !f anywhere anywhere icmp source-quench state NEW
iaccept icmp !f anywhere anywhere icmp time-exceeded state NEW
iaccept icmp !f anywhere anywhere icmp parameter-problem state NEW
idrop all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
preforward all -- anywhere anywhere
fdrop all -- anywhere anywhere state INVALID
faccept all -- anywhere anywhere state RELATED,ESTABLISHED
fnospoof all -- anywhere anywhere
fredirects all -- anywhere anywhere
fmodules all -- anywhere anywhere
ffwdrules all -- anywhere anywhere
fnoexternal all -- anywhere anywhere
fdns all -- anywhere anywhere
fglobal all -- anywhere anywhere
faccept icmp !f anywhere anywhere icmp echo-request state NEW
faccept icmp !f anywhere anywhere icmp echo-reply state NEW
faccept icmp !f anywhere anywhere icmp destination-unreachable state NEW
faccept icmp !f anywhere anywhere icmp source-quench state NEW
faccept icmp !f anywhere anywhere icmp time-exceeded state NEW
faccept icmp !f anywhere anywhere icmp parameter-problem state NEW
fdrop all -- anywhere anywhere
Chain OUTPUT (policy DROP)
target prot opt source destination
ACCEPT all -- anywhere anywhere
preoutput all -- anywhere anywhere
odrop all -- anywhere anywhere state INVALID
oaccept all -- anywhere anywhere state RELATED,ESTABLISHED
ointernal all -- anywhere anywhere
omodules all -- anywhere anywhere
oglobal all -- anywhere anywhere
oaccept icmp !f anywhere anywhere icmp echo-request state NEW
oaccept icmp !f anywhere anywhere icmp echo-reply state NEW
oaccept icmp !f anywhere anywhere icmp destination-unreachable state NEW
oaccept icmp !f anywhere anywhere icmp source-quench state NEW
oaccept icmp !f anywhere anywhere icmp time-exceeded state NEW
oaccept icmp !f anywhere anywhere icmp parameter-problem state NEW
odrop all -- anywhere anywhere
Chain drop (3 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 50/min burst 10 LOG level debug prefix "zentyal-firewall drop "
DROP all -- anywhere anywhere
Chain faccept (12 references)
target prot opt source destination
NFQUEUE all -- anywhere anywhere NFQUEUE num 0
NFQUEUE all -- anywhere anywhere NFQUEUE num 0
ACCEPT all -- anywhere anywhere
Chain fdns (1 references)
target prot opt source destination
Chain fdrop (8 references)
target prot opt source destination
drop all -- anywhere anywhere
Chain ffwdrules (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere
RETURN all -- anywhere anywhere
Chain fglobal (1 references)
target prot opt source destination
faccept all -- anywhere anywhere
Chain fmodules (1 references)
target prot opt source destination
Chain fnoexternal (1 references)
target prot opt source destination
fdrop all -- anywhere anywhere state NEW
Chain fnospoof (1 references)
target prot opt source destination
fnospoofmodules all -- anywhere anywhere
fdrop all -- 192.168.1.0/24 anywhere
fdrop all -- 192.168.9.0/24 anywhere
fdrop all -- 192.168.3.0/24 anywhere
fdrop all -- 192.168.99.0/24 anywhere
Chain fnospoofmodules (1 references)
target prot opt source destination
Chain fredirects (1 references)
target prot opt source destination
faccept tcp -- anywhere 192.168.1.124 state NEW tcp dpt:https
faccept tcp -- anywhere 192.168.1.66 state NEW tcp dpt:32400
faccept udp -- anywhere 192.168.1.124 state NEW udp dpt:openvpn
Chain ftoexternalonly (0 references)
target prot opt source destination
faccept all -- anywhere anywhere
fdrop all -- anywhere anywhere
Chain iaccept (54 references)
target prot opt source destination
NFQUEUE all -- anywhere anywhere NFQUEUE num 0
NFQUEUE all -- anywhere anywhere NFQUEUE num 0
ACCEPT all -- anywhere anywhere
Chain idrop (7 references)
target prot opt source destination
drop all -- anywhere anywhere
Chain iexternal (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere
RETURN all -- anywhere anywhere
iaccept tcp -- anywhere anywhere tcp dpt:5223 state NEW
iaccept tcp -- anywhere anywhere tcp dpt:imaps state NEW
iaccept tcp -- anywhere anywhere tcp dpt:submission state NEW
iaccept tcp -- anywhere anywhere tcp dpt:https state NEW
iaccept tcp -- anywhere anywhere tcp dpt:http state NEW
iaccept tcp -- anywhere anywhere tcp dpt:smtp state NEW
iaccept tcp -- anywhere anywhere tcp dpt:32400 state NEW
iaccept udp -- anywhere anywhere udp dpts:32410:32414 state NEW
Chain iexternalmodules (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere
RETURN all -- anywhere anywhere
Chain iglobal (1 references)
target prot opt source destination
iaccept tcp -- anywhere anywhere tcp dpt:5223 state NEW
iaccept tcp -- anywhere anywhere tcp dpt:imaps state NEW
iaccept tcp -- anywhere anywhere tcp dpt:submission state NEW
iaccept tcp -- anywhere anywhere tcp dpt:https state NEW
iaccept tcp -- anywhere anywhere tcp dpt:http state NEW
iaccept tcp -- anywhere anywhere tcp dpt:smtp state NEW
iaccept udp -- anywhere anywhere udp dpt:ntp state NEW
iaccept tcp -- anywhere anywhere tcp dpt:32400 state NEW
iaccept udp -- anywhere anywhere udp dpts:32410:32414 state NEW
iaccept udp -- anywhere anywhere udp dpt:35622 state NEW
iaccept tcp -- anywhere anywhere tcp dpt:35623 state NEW
iaccept tcp -- anywhere anywhere tcp dpt:35621 state NEW
iaccept tcp -- anywhere anywhere tcp dpts:55413:55415 state NEW
iaccept udp -- anywhere anywhere udp dpt:35623 state NEW
iaccept udp -- anywhere anywhere udp dpt:zabbix-agent state NEW
iaccept tcp -- anywhere anywhere tcp dpt:zabbix-agent state NEW
iaccept udp -- anywhere anywhere udp dpt:zabbix-trapper state NEW
iaccept tcp -- anywhere anywhere tcp dpt:zabbix-trapper state NEW
iaccept udp -- anywhere anywhere udp dpt:kerberos state NEW
iaccept tcp -- anywhere anywhere tcp dpt:kerberos state NEW
iaccept tcp -- anywhere anywhere tcp dpt:loc-srv state NEW
iaccept udp -- anywhere anywhere udp dpt:netbios-ns state NEW
iaccept udp -- anywhere anywhere udp dpt:netbios-dgm state NEW
iaccept tcp -- anywhere anywhere tcp dpt:netbios-ssn state NEW
iaccept udp -- anywhere anywhere udp dpt:ldap state NEW
iaccept tcp -- anywhere anywhere tcp dpt:ldap state NEW
iaccept tcp -- anywhere anywhere tcp dpt:microsoft-ds state NEW
iaccept udp -- anywhere anywhere udp dpt:kpasswd state NEW
iaccept tcp -- anywhere anywhere tcp dpt:kpasswd state NEW
iaccept tcp -- anywhere anywhere tcp dpt:ldaps state NEW
iaccept tcp -- anywhere anywhere tcp dpt:3268 state NEW
iaccept tcp -- anywhere anywhere tcp dpt:3269 state NEW
iaccept tcp -- anywhere anywhere tcp dpts:49152:65535 state NEW
iaccept udp -- anywhere anywhere udp dpt:domain state NEW
iaccept tcp -- anywhere anywhere tcp dpt:domain state NEW
iaccept tcp -- anywhere anywhere tcp dpt:ssh state NEW
iaccept tcp -- anywhere anywhere tcp dpt:8450 state NEW
Chain imodules (1 references)
target prot opt source destination
iaccept tcp -- anywhere anywhere state NEW tcp dpt:3128
iaccept tcp -- anywhere anywhere state NEW tcp dpt:3128
DROP tcp -- anywhere anywhere state NEW tcp dpt:3129
Chain inoexternal (1 references)
target prot opt source destination
idrop all -- anywhere anywhere state NEW
Chain inointernal (0 references)
target prot opt source destination
Chain inospoof (1 references)
target prot opt source destination
inospoofmodules all -- anywhere anywhere
idrop all -- 192.168.1.0/24 anywhere
idrop all -- 192.168.9.0/24 anywhere
idrop all -- 192.168.3.0/24 anywhere
idrop all -- 192.168.99.0/24 anywhere
Chain inospoofmodules (1 references)
target prot opt source destination
Chain log (0 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 50/min burst 10 LOG level debug prefix "zentyal-firewall log "
RETURN all -- anywhere anywhere
Chain oaccept (13 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain odrop (2 references)
target prot opt source destination
drop all -- anywhere anywhere
Chain oglobal (1 references)
target prot opt source destination
oaccept all -- anywhere anywhere state NEW
Chain ointernal (1 references)
target prot opt source destination
Chain omodules (1 references)
target prot opt source destination
oaccept tcp -- anywhere anywhere tcp dpt:http
oaccept udp -- anywhere anywhere udp dpt:domain
oaccept tcp -- anywhere anywhere tcp dpt:domain
oaccept tcp -- anywhere anywhere state NEW tcp dpt:http
oaccept tcp -- anywhere anywhere state NEW tcp dpt:https
Chain preforward (1 references)
target prot opt source destination
Chain preinput (1 references)
target prot opt source destination
Chain preoutput (1 references)
target prot opt source destination
Pages: [1]