similar to: [PATCH] Re-enabled :port portion of "UDPv4 link" openvpn rule

Displaying 20 results from an estimated 100 matches similar to: "[PATCH] Re-enabled :port portion of "UDPv4 link" openvpn rule"

2011 Dec 31
0
[PATCH] i.d.s/openvpn: support 'remote-cert-tls (server|client)'
From: Simon Deziel <simon.deziel at gmail.com> Fixes LP: #806537 Signed-off-by: Simon Deziel <simon.deziel at gmail.com> --- rulefiles/linux/ignore.d.server/openvpn | 7 ++++++- 1 files changed, 6 insertions(+), 1 deletions(-) diff --git a/rulefiles/linux/ignore.d.server/openvpn b/rulefiles/linux/ignore.d.server/openvpn index 2b4bfd6..d80f42f 100644 ---
2008 Jan 24
0
[PATCH] Added "Re-using pre-shared static key" openvpn rule
Signed-off-by: Fr?d?ric Bri?re <fbriere at fbriere.net> --- rulefiles/linux/ignore.d.server/openvpn | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/rulefiles/linux/ignore.d.server/openvpn b/rulefiles/linux/ignore.d.server/openvpn index 68ebf8f..c57e3cb 100644 --- a/rulefiles/linux/ignore.d.server/openvpn +++ b/rulefiles/linux/ignore.d.server/openvpn @@ -13,7 +13,7
2007 Sep 23
0
Bug#443171: [PATCH] ignore acpid clients disconnecting
- ignore messages "acpid: client has disconnected" Signed-off-by: Hanspeter Kunz <hp at edelkunz.ch> --- rulefiles/linux/ignore.d.server/acpid | 1 + 1 files changed, 1 insertions(+), 0 deletions(-) diff --git a/rulefiles/linux/ignore.d.server/acpid b/rulefiles/linux/ignore.d.server/acpid index 034ddf1..faebe1e 100644 --- a/rulefiles/linux/ignore.d.server/acpid +++
2006 Oct 09
5
General questions and problems with exec...
Hi, I''m in the process of evaluating puppet and cfengine for a rollout on a mix of in-house servers and managed customer servers. I''ve always been a pro-cfengine man, and it''s already running on a small setup of 5 machines. But even though I have pretty clear idea of how I should proceed building the system, I''m intimidated by the vast amount of
2010 Jun 14
0
[PATCH] i.d.s/postfix: fixed policyd-weight patterns
At least the policyd-weight in lenny seems to generate quite different patterns. For example the 'rate' is output multiple times in some situations, the 'check from' is omited sometimes and somehow those log messages have a trailing blank. With those patterns logcheck stays silent again. Signed-off-by: Mathias Krause <minipli at googlemail.com> ---
2010 May 04
1
Bug#580260: logcheck-database: dkim-filter needs tweak
Package: logcheck-database Version: 1.3.8 11 hex digits, and "no" diff -ur logcheck-1.3.8.orig/rulefiles/linux/ignore.d.server/dkim-filter logcheck-1.3.8/rulefiles/linux/ignore.d.server/dkim-filter --- logcheck-1.3.8.orig/rulefiles/linux/ignore.d.server/dkim-filter 2008-05-22 04:20:58.000000000 -0400 +++ logcheck-1.3.8/rulefiles/linux/ignore.d.server/dkim-filter 2010-05-04
2012 Sep 27
3
vsFTP and shorewall
Dear all, Dear support and users: Sorry to trouble you! I configure the shorewall firewall to forward ftp and ssh port to another server, but failed. Can you help me check? I cannot login both SSH 2222 and ftp! Below is my environment: (attachment is shorewall dump) 1. Gateway (FC6) 1.1) eth0: lan static IP: 192.168.1.20 1.2) eth1: external public static IP:
2020 Sep 02
0
OPENVPN setup in CentOS-6 NetworkManager
Hi, I need some help. I have CentOS-6 installed on an older 32bit desktop. The command su -c "openvpn --config foo.ovpn" works well, but would like to do it from NetworkManager. (1) If I try to import foo.ovpn then the certificate file references are not populated. If I try to select files extracted from foo.ovpn then the Private key file cannot be selected and therefore setup is
2005 Jan 12
1
crossposting: OpenVPN on CentOS(RHES clone) and Fedora Core3..some strange things
Apologies for the cross-posting to CentOS list (already mailed to OpenVPNlist).. am using OpenVPN [ http://openvpn.sf.net ] on CentOS 3.4 and having some issues.. it may possibly be an OpenVPN issue, but thought if anyone on this list is using or had any similar issues or have any thoughts.. TIA ---------- Forwarded message ---------- Date: Wed, 12 Jan 2005 11:26:22 -0700 Subject: resend with
2006 Jul 07
0
Bug#377276: "Did not receive identification string" warning reappeared
Package: logcheck-database Version: 1.2.45 Severity: normal Tags: patch pending confirmed My bad, sorry. --- rulefiles/linux/ignore.d.server/ssh 6 Jul 2006 10:16:41 -0000 1.18 +++ rulefiles/linux/ignore.d.server/ssh 7 Jul 2006 19:35:19 -0000 @@ -10,7 +10,7 @@ ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ sshd\[[0-9]+\]: refused connect from [:[:alnum:].]+ \([:[:alnum:].]+\)$ ^\w{3} [ :0-9]{11}
2012 Dec 29
10
How could I open Port 1701 for VPN l2tp/ipsec
Hello Mailinglist, please excuse my bad english - but I am not a native speaker. My Network looks like this: Internet --- dyn. IP --- Firewall (shorewall) --- LAN (192.168.X.X) No I try to connect my iphone (from mobile Internet G3) over VPN (l2tp/ipsec) with the firewall. But I canĀ“t open the necessary Port 1701. /var/log/syslog ... Dec 30 00:24:29 router kernel: [226128.293757]
2015 Jul 26
3
Suddenly OpenVPN not working - backgrounds prompt for username / password
Hi folks, I'm on a fresh install of CentOS 7 and take my config that works on Ubuntu on the same box. Instead of getting a prompt for username and password for the VPN I get a backgrounded task that spits this out : [amckay at centos-gig ~]$ sudo openvpn --config /home/amckay/data/vpn.ovpn --daemon Broadcast message from root at centos-gig (Sat 2015-07-25 22:59:13 EDT): Password entry
2008 Feb 04
0
Bug#445074: [PATCH] Ignore "Nasty PTR record" messages from openssh (closes: #445074)
--- rulefiles/linux/ignore.d.server/ssh | 1 + 1 files changed, 1 insertions(+), 0 deletions(-) -------------- next part -------------- A non-text attachment was scrubbed... Name: 31e8a3f16090172b7d6659a0b370536fcfcaab85.diff Type: text/x-patch Size: 763 bytes Desc: not available Url : http://lists.alioth.debian.org/pipermail/logcheck-devel/attachments/20080203/2ea1485c/attachment.bin
2011 Jan 11
6
OpenVPN + SIP configuration?
Hello I read a whole book on OpenVPN, but still can't figure how to configure the server + client so that the the client connects and sends SIP/RTP data through the tunnel. To get started, I'd rather use a shared key instead of X509 (certificates + keys). The server is running on a uClinux appliance, with /dev/net/tun, and OpenVPN is 2.0.9. The clients will be Windows hosts connecting
2007 Mar 13
4
Object sync problem
Hi, Sorry to hassle everyone again, yes I''m a newbie!! I''ve created some code and I''m getting a out of sync style error message. Here''s a snipet of the code (to reproduce the problem): package { [ "tar", "gzip", "bzip2", "sed" ]: ensure => latest } define xxx { $xenrelease = ''3.0.4''
2004 Sep 01
2
dedup and sort rules
A non-text attachment was scrubbed... Name: parse_logcheck Type: application/octet-stream Size: 3860 bytes Desc: not available Url : http://lists.alioth.debian.org/pipermail/logcheck-devel/attachments/20040901/b1727d89/attachment.obj
2007 Mar 18
1
Dependancy sequencing problem
Hi, I have this code here: $filepackages = $operatingsystem ? { debian => [ "tar", "gzip", "bzip2", "diff", "sed", "wget" ], default => [ "tar", "gzip", "bzip2", "diff", "sed", "wget" ] } package { $filepackages: ensure => latest
2007 Mar 20
2
0.22.2 bug?
Hi, I''ve just installed 0.22.2 and believe I''ve discovered a bug (or oversight). I have an exec like this: exec { "change-to-local-mirror": command => "sed -i ''s#\(KERNEL_REPO.*=\).*#\1 $mirror#'' ${rulefile}", path => "/usr/bin:/usr/sbin:/bin",
2011 Dec 18
0
Bug#652537: Please add rule for inetutils-syslogd
Package: logcheck Version: 1.2.69 The inetutils-syslogd (2:1.5.dfsg.1-9) package provides a system logging daemon. syslogd periodically logs the following message: Dec 17 00:29:11 host syslogd (GNU inetutils 1.5): restart The following logcheck rulefile works to filter the messages from the "System Events" email: # cat inetutils-syslogd ^\w{3} [ :0-9]{11} [._[:alnum:]-]+ syslogd
2008 Jun 24
1
Bug#475553: not fixable with current logcheck
tags 475553 wontfix thanks While I completely agree that this /should/ be fixed in logcheck, it can't be, since the logcheck rulefile format *sucks*, meaning /every/ rule would have to be extended to support both styles. I am sorry, but I have to mark this wontfix. I hope that one day, someone will get up and write logfilter, which I've started to draft on the wiki.logcheck.org page.