• Recent
    • Unsolved
    • Tags
    • Popular
    • Users
    • Groups
    • Search
    • Register
    • Login
    1. Home
    2. AUTH IT Center
    3. Posts
    • Profile
    • Following 2
    • Followers 0
    • Topics 3
    • Posts 37
    • Best 8
    • Controversial 0
    • Groups 0

    Posts made by AUTH IT Center

    • RE: FOG 1.5.10.1604 ldap plugin

      @Tom-Elliott I will test your new code from working-1.6 branch on our dev server and report back (tomorrow).

      posted in General
      AUTH IT CenterA
      AUTH IT Center
    • RE: FOG 1.5.10.1604 ldap plugin

      @Tom-Elliott being explicit helped me better understand the verification process.

      Similarly your ‘admingroup’ (I know you’ve masked it) but do you have a group in your LDAP that has a full name of: https://entitlements.it.auth.gr/<adminGroupName>?

      yes it’s a full html path

      I used the filter from the original code and the results are:

      Admin search
      Filter: (&(|(name=https://entitlements.it.auth.gr/<adminGroupName>))(edupersonentitlement=uid=usename,ou=People,o=auth,c=gr)); Result: 0

      Mobile Search (empty group)
      Filter: (&(|(name=))(edupersonentitlement=uid=username,ou=People,o=auth,c=gr)); Result: 0

      The correct filter should be (that is what I implemented):

      Admin search
      Filter: (&(|(edupersonentitlement=https://entitlements.it.auth.gr/<adminGroupName>))(uid=username))

      Mobile search
      Filter: (&(|(edupersonentitlement=https://entitlements.it.auth.gr/<userGroupName>))(uid=username))

      posted in General
      AUTH IT CenterA
      AUTH IT Center
    • RE: FOG 1.5.10.1604 ldap plugin

      @Tom-Elliott said in FOG 1.5.10.1604 ldap plugin:

      @AUTH-IT-Center After some pretty serious testing I think I finally got the ldap plugin working on 1.6 as well.

      Basically the problem with your current filter is you only check if the group exists and the username = username, not that the username actually is a member of that group.

      We do have logic, I think that double checks but I hope you can see the issue here?

      Hello @Tom-Elliott and thank you in advance for your time and effort. The changes that we tried to implement came from this post.

      To better give you the concept we are trying to achieve let me explain with our setup and attributes.

      e2a6b494-4f3e-4b13-8186-2ae90e98ae11-image.png

      What we want is that if a user trying to login to FOG server with his uid = username and is member with specific eduPersonEntitlement(s) can login to FOG server and be member of the FOG admins.

      posted in General
      AUTH IT CenterA
      AUTH IT Center
    • RE: FOG 1.5.10.1604 ldap plugin

      @Tom-Elliott Ι did try the 1.6 branch but didn’t work… that’s when I started debugging on 1.5.10.1064 dev-branch. I made the changes based on our LDAP needs. It would be proper if all the parameters came from the LDAPServers table and dynamically used in the code (even the filter maybe?)

      posted in General
      AUTH IT CenterA
      AUTH IT Center
    • RE: FOG 1.5.10.1604 ldap plugin

      @Tom-Elliott though I deployed it on our production server (from my fork), of course when you push the changes I can test it on the staging server. Just let us know.

      posted in General
      AUTH IT CenterA
      AUTH IT Center
    • FOG 1.5.10.1604 ldap plugin

      @Tom-Elliott Hello!

      We wanted to integrate the ldap plugin on our OpenLDAP server and after some debug sessions we finally managed to integrate it.

      I opened a pull request https://github.com/FOGProject/fogproject/pull/635 with the changes we made. I believe the filter should be dynamic to match more attributes instead of having hard-coded the name=.

      Please review it and check if it can be merged. Thank you.

      posted in General
      AUTH IT CenterA
      AUTH IT Center
    • RE: Fog 1.5.10.1593 slack integration failing

      @Tom-Elliott glad to hear it.

      Where can I check - read other events in order to get more notifications? For example the creation of a snapin task, or the creation of a multicast image tasks? (so I can create new events on slack plugin)

      Thank you once more the time and effort.

      posted in General
      AUTH IT CenterA
      AUTH IT Center
    • Fog 1.5.10.1593 slack integration failing

      Hello all,

      I searched the forums and found various posts for the slack plugin not properly working. I managed to get it to work by modifying some files to match the new slack api.

      I pushed the changes on my fork and requested a merge with the dev-branch of fogproject https://github.com/FOGProject/fogproject/pull/631. I tested all the events (except image fail) on our staging server.

      Waiting for you review.
      Thank you.

      posted in General
      AUTH IT CenterA
      AUTH IT Center
    • RE: I ran into problem with the NFS server when trying to update to the latest dev version - 1.5.10.1580

      @Tom-Elliott if the directory nfs.conf.d exists the fog-nfs.conf isn’t created.

      I believe the code should be:

      configureNFS() {
          dots "Setting up NFS configuration file"
          if [[ -f "/etc/nfs.conf" ]]; then
              # Fix all set port=20048 back to default values
              sed -i '/^port=20048/ {s/^port=20048/# port=0/}' /etc/nfs.conf >>$error_log 2>&1
          fi
          # set port in nfs.conf.d directory
          if [[ -f "/etc/nfs.conf" && ! -d "/etc/nfs.conf.d/" ]]; then
              mkdir /etc/nfs.conf.d/
          elif [[ -f "/etc/nfs.conf" &&  -d "/etc/nfs.conf.d/" ]]; then
              cat > /etc/nfs.conf.d/fog-nfs.conf <<EOF
      [mountd]
      port=20048
      EOF
          elif [[ -f "/usr/etc/nfs.conf" && ! -d "/usr/etc/nfs.conf.d/" ]]; then
              mkdir /usr/etc/nfs.conf.d/
          elif [[ -f "/usr/etc/nfs.conf" &&  -d "/usr/etc/nfs.conf.d/" ]]; then
              cat > /usr/etc/nfs.conf.d/fog-nfs.conf <<EOF
      [mountd]
      port=20048
      EOF
          fi
          errorStat $?
      
      posted in FOG Problems
      AUTH IT CenterA
      AUTH IT Center
    • RE: I ran into problem with the NFS server when trying to update to the latest dev version - 1.5.10.1580

      @Tom-Elliott just a friendly reminder. The dev-branch doesn’t have the new code in functions.sh for the nfs mount.

      Thank you for all your help.

      posted in FOG Problems
      AUTH IT CenterA
      AUTH IT Center
    • RE: What ports does FOG use?

      @fogcloud we have an ansible playbook to handle FOG firewall rules (firewalld) and the ports used are:

         allow_icmp:
            - echo-request
            - echo-reply
          services:
            - ftp
            - http
            - mountd
            - nfs
            - rpc-bind
            - tftp
          ports:
            - { port: 20048, proto: tcp }  # nfs
            - { port: 20048, proto: udp }  # nfs
            - { port: "35350-36350", proto: udp }  # tftp
            - { port: "49512-65532", proto: udp }  # multicast
      

      the port 20048 is added on nfs.conf
      the range 35350-36350 is added on tftp options
      and the 49512-65532 is for all the dynamic ports

      posted in FOG Problems
      AUTH IT CenterA
      AUTH IT Center
    • RE: export unauthorized

      @Tom-Elliott

      tested on staging server and it works.

      OS: Ubuntu 22.04
      FOG Server: 1.5.10.1577

      Export of images and hosts now is successful

      b22b7dcd-c424-4efd-a653-c848c107af05-image.png

      posted in FOG Problems
      AUTH IT CenterA
      AUTH IT Center
    • RE: export unauthorized

      I believe the problem you are facing is the way the new export.php (https://github.com/FOGProject/fogproject/compare/1.5.10...1.5.10.41?diff=split&w=#diff-ff9e620c45c9b82140dffca512e6417f03cc4972a20a6659a4f4a248ffa56082) validates the export.

      I have the same problem on a newly installed server OS: Ubuntu 22.04, FOG Server: 1.5.10.48. I changed the if statement with

      echo $currentUser;
      echo '<br>';
      echo strtolower($_SERVER['HTTP_X_REQUESTED_WITH']);
      echo '<br>';
      echo _('Unauthorized');
      exit;
      

      on export.php and as it shows

      User ID: 1 Name: fog
      
      Unauthorized
      

      the blank line is the empty variable which then forces the Unauthorized exit.

      posted in FOG Problems
      AUTH IT CenterA
      AUTH IT Center
    • RE: FOG image capture file permissions

      @AUTH-IT-Center with the dev-branch the created folder after the image capture has the correct permissions.

      83223c8f-3d3a-46ab-af0b-c3634e6768ce-image.png

      will wait for the update on stable branch to deploy to the production server.

      Thank you!

      posted in FOG Problems
      AUTH IT CenterA
      AUTH IT Center
    • RE: FOG image capture file permissions

      @Tom-Elliott since this is the production server I will try it on a staging one and notify you.

      posted in FOG Problems
      AUTH IT CenterA
      AUTH IT Center
    • RE: FOG image capture file permissions

      @Tom-Elliott

      unfortunately the same result.

      9db9bd96-c575-4158-87c9-7b08ce9effc0-image.png

      also the permissions of the init.xz and init_32.xz on /var/www/html/fog/service/ipxe/ got 755 instead of 644 and the group www-data (just mentioning)

      30bf9be5-8373-4f32-9f92-c9120a7e3793-image.png

      the system is 64bit

      posted in FOG Problems
      AUTH IT CenterA
      AUTH IT Center
    • FOG image capture file permissions

      Server
      FOG Version: 1.5.10.48
      OS: Ubuntu 22.04

      Hello first post so please forgive me if it’s in the wrong section.

      Since the storage permissions of /images are 775 (https://forums.fogproject.org/topic/17486/fog-1-5-10-and-earlier-nfs-privilege-escalation-vulnerability) shouldn’t the capture image create the files with the same permisssions?

      While testing a new image capture the permissions are 777 and the owner:group is fogproject.

      8292e5c8-febc-49ca-8dd6-59ee9ab41749-image.png

      posted in FOG Problems
      AUTH IT CenterA
      AUTH IT Center
    • 1
    • 2
    • 2 / 2