Asus ASMB4 iKVM Remote Console 
Wednesday, 8 May 2013, 00:24 - Knowledge, Hardware
Posted by Administrator
A real PITA is to use the Console redirection of the integrated / optional iKVM of ASUS servers.

Access to the web-GUI (directly or even forwarded like 127.0.0.1:8080 tunneled through ssh to the iKVM's real ip behind a jump host) is quite straight-forward and easy to use.

But the console redirection slightly doesn't work even directly (server has the IP address you type in your web-browser) and with properly installed Java Web Start, at least with version 2.13 of the iKVM firmware.

So this workaround may help:
1. Log in to the Web-GUI

2. Start the Java console under Remote Control

3. Download the .jnlp file instead of opening Java Web Start directly
4. Edit the file as following:

<argument>127.0.0.1:8080</argument>
to
<argument>127.0.0.1</argument>

(for example if you have forwaded or mapped the real port 80 to
8080, this has to be only the IP address WITHOUT the port)


<argument>0</argument>
to
<argument>7578</argument>

(this has to be the port where the (local) Java Client will connect to the remote server's console and not '0', may also be another port when you do a port mapping or forwarding)

5. Now open the jviewer.jnlp file with Java Web Start.

The console should now show up...

(for all ports involved see the related link to the ASUS support site)

In some situations, there even the download of the JAVA files stucks with 0%. Perhaps then you experience some troubles with SSL because some INTEL ikvm will try to use HTTPS (even if you connect to the iKVM GUI with only HTTP). So use again a manually edited .jnlp file:

1. Download the jnlp file instead of opening directly

2. Change the line with the keyword codebase by replacing the "https://" with just "http://"
<jnlp spec="1.0+" codebase="http://<your_ikvm_ip>/Java" >

3. Open the jviewer.jnlp file with Java Web Start

2 comments ( 37583 views )   |  permalink   |  related link   |  $star_image$star_image$star_image$star_image$star_image ( 3 / 2633 )
rsync to WebDAV drive 
Wednesday, 6 March 2013, 00:55 - Knowledge, OwnSpace
Posted by Administrator
For having an intuitive GUI synchronisation client, you may use grsync using a gvfs path on Linux or a Drive Letter on Windows where the WebDAV Storage is preliminary mounted. Or go for the commercial sync tool GoodSync which has WebDAV protocol built-in.

But now, when you try to synchronise with the WebDAV storage (e.g. to OwnSpace Web Storge or to Dropbox), you probably get many "file not found" errors and you end up with no files on the WebDAV storage.

To get that to work, you must use the rsync option "--inplace". Search for rsync options or an option meaning "directly write to files instead of temporary files".

add comment ( 1688 views )   |  permalink   |  $star_image$star_image$star_image$star_image$star_image ( 3 / 181 )
Configure Backup on Windows to an ssh backup service using rsync 
Tuesday, 5 March 2013, 13:08 - OwnSpace
Posted by Administrator
1. Get cwrsync and install the program
2. If private/public key authentication is needed (as with OwnSpace Offsite Backup), get PuTTYgen
3. Start PuTTYgen and generate a private / public key pair and convert the private key to an OpenSSH Key file.
4. Put the public key onto the backup server.
5. Get this batch file and put it somewhere on your computer and adapt the variables to your needs
6. Test the batch file running it from a command line
7. Go to Task Scheduler (to be found under Computer / Manage) and create a new Task with the batch file cwrsync.cmd as command to execute
add comment ( 10298 views )   |  permalink   |  $star_image$star_image$star_image$star_image$star_image ( 3 / 181 )
Obsolete Mail Domain Reporter 
Thursday, 21 February 2013, 15:14 - Mail stuff
Posted by Administrator

Introduction


The abbreviation "OMDR" stands for "obsolete mail domain reporter" and is a small shell script intended to find obsolete MX records to keep your mailserver clean and sane

As a source of currently configured domain can be either
* a textfile, every hosted domain on a seperate line
* a directory tree with the domains

Download


Get the script here

Usage


1. Copy the shell script to your mail server

2. Open the script within an text editor. There are several configuration options at the beginning of the script to adapt the script to your environment. See comment within the script itself!

3. After running the script, you end up with a file that contains all domains that are claimed not to be active any more on that particular mail host

Copyright


This script was written by Mike Rhyner for Adfinis Sygroup AG.

add comment ( 1847 views )   |  permalink   |  $star_image$star_image$star_image$star_image$star_image ( 3 / 2217 )
Create Private Key, Certificate Request and (optionally) self-signed cert using OpenSSL 
Monday, 11 February 2013, 20:00 - Apache Stuff, OpenSSL
Posted by Administrator
First, set the common name (CN, ~FQDN) for the certificate:
CN=host.domain.tld

Change to the directory where you would like to store the data relevant for certificates, e.g.:
cd /etc/ssl

Then create a private key:
openssl genrsa -out private/${CN}.key 2048

Generate the signing Request, either:
a) interactively, you'll have to answer some questions...:
openssl req -new -key private/${CN}.key -out ${CN}.csr

b) using a customized openssl config file:
openssl req -new -config ${CN}-openssl.cnf -key private/${CN}.key -out ${CN}.csr

Now you may either:
a) send the certificate request to an (official or internal) Certificate Authority to sign the Certificate

b) for testing purposes only, you can also self-sign the certificate:
openssl x509 -req -days 1825 -in ${CN}.csr -signkey private/${CN}.key -out certs/${CN}.crt

When you have received signed (or self-signed) certificate, you can copy all the files to the appropriate location.

Probably you have to create a combined pkcs#12 (.p12, .pfx) file, containing private key and certificates:
openssl pkcs12 -export -in ${CN}.crt -certfile cafile.pem -inkey ${CN}.key -out ${CN}.pfx
(where cafile.pem is the ca certificate bundle of issuing certificate authority)

Clear the shell variable for the Common Name:
CN=

add comment ( 1063 views )   |  permalink   |  $star_image$star_image$star_image$star_image$star_image ( 3 / 182 )

<<First <Back | 1 | 2 | 3 | 4 | 5 | 6 | Next> Last>>