Jocko wrote:From a shell window (SSH/putty)
root@Lacie-2big-NAS:/ # echo -e "Hello !\nI just tested if you can receive my ma
il\nSee you later\n end line"|mail -s "Check notification" webmaster@plugout.net
subject=Check notification
to=webmaster@plugout.net
mode=1
CONNECTED(00000003)
depth=1 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = GeoTrust RSA CA 2018
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
0 s:/C=GR/L=Marousi/O=Hellenic Telecommunications Organization S.A./CN=*.otenet.gr
i:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=GeoTrust RSA CA 2018
1 s:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=GeoTrust RSA CA 2018
i:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root CA
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=GR/L=Marousi/O=Hellenic Telecommunications Organization S.A./CN=*.otenet.gr
issuer=/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=GeoTrust RSA CA 2018
---
Acceptable client certificate CA names
/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=GeoTrust RSA CA 2018
---
SSL handshake has read 3861 bytes and written 690 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: FF30893C78C67BABB3BDFDFDA4158EACA52185E163BF3F7B366E28E5713794CE
Session-ID-ctx:
Master-Key: 22E63D6F0097A23A8E5991AC9D0C26998020A6703A04BC968967E50B26EB36F9868A689B62A2D6DC1746065733F6EAD8
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 2b 22 47 6e da 71 c5 df-31 df ae 33 65 88 d6 19 +"Gn.q..1..3e...
0010 - b2 a5 73 84 ce 47 2d eb-3b 13 89 38 2c f6 a2 3f ..s..G-.;..8,..?
0020 - 9d eb a3 dd 2f 52 49 3b-e3 90 18 89 f9 5f 5b ea ..../RI;....._[.
0030 - a9 e0 6a 98 bc c1 24 15-5e 74 32 72 3c 2e 0b 67 ..j...$.^t2r<..g
0040 - d2 6f 14 fc bc 32 c7 fd-b3 a4 8e ba 9f 61 e2 bd .o...2.......a..
0050 - 52 51 76 60 f9 a1 31 5b-1b 86 f6 7f 63 3e 6c 5f RQv`..1[....c>l_
0060 - 69 f7 31 66 ca c0 0e 59-9a 99 84 50 d6 e3 0b 48 i.1f...Y...P...H
0070 - 95 ee 42 c4 05 f2 98 88-5c 17 61 2b 86 62 22 64 ..B.....\.a+.b"d
0080 - 8a 94 d6 c0 73 2a 94 90-cf 5a ce fe c6 42 34 3a ....s*...Z...B4:
0090 - c4 2c 73 65 b8 14 a9 06-6a 89 e2 3c bf a8 d5 bc .,se....j..<....
Start Time: 1669041984
Timeout : 300 (sec)
Verify return code: 20 (unable to get local issuer certificate)
---
250 DSN
503 5.5.1 Error: send HELO/EHLO first
250-chimaera.otenet.gr
250-PIPELINING
250-SIZE 41100000
250-ETRN
250-AUTH PLAIN LOGIN
250-AUTH=PLAIN LOGIN
250-ENHANCEDSTATUSCODES
250-8BITMIME
250 DSN
250 2.1.0 Ok
554 5.7.1 <webmaster@plugout.net>: Relay access denied
554 5.5.1 Error: no valid recipients
221 2.7.0 Error: I can break rules, too. Goodbye.
closed
root@Lacie-2big-NAS:/ #
Not really, this custom bootloader settings are not stored on the disk but in the bootloader environment (so directly in an eprom of your NAS Soc). And indeed our kirkwood kernel image may be used on some wd platformsPaaNooS wrote:I'd like to mention an issue just for your reference.
During weekend pulled out both Lacie NAS hard diks and put a smaller (3TB) to the left-hand bay. This hard disk was part of RAID 1 in a WD MyCloudEX2Ultra.
Run fvdw-sl-console and installed UIMAGE-3142-KIRKWOOD-171-standalone
After power-off and on the NAS was working perfect. I could access the NAS without runningsetenv LaBackdoor yes
setenv bootcmd 'disk 0x800000 0:6 ; setenv bootargs console=ttyS0,115200 netconsole=6666@${ipaddr}/,6666@${serverip}/ root=/dev/sda7 ; bootm 0x800000;'
saveenv
Little crazy ??
Some information, it seems your provider expect an EHLO command before authentication step and not the current order. So I think you are not really connected (there is not a line like : "235 2.7.0 ... authentication succeeded"). This may explain later why you have "554 5.7.1 <webmaster@plugout.net>: Relay access denied". Indeed smtp protocol allows to use relay method to send messages from a smtp server. It was the way used by spammers to send huge messages from a smtp server even if they are not authorized users if this feature is not locked (mainly if it stays as port the regular port 25).PaaNooS wrote:Jocko wrote:From a shell window (SSH/putty)
- Code: Select all
root@Lacie-2big-NAS:/ # echo -e "Hello !\nI just tested if you can receive my ma
il\nSee you later\n end line"|mail -s "Check notification" webmaster@plugout.net
subject=Check notification
to=webmaster@plugout.net
plugout download 7049
tar -xf /tmp/fvdw-sl-18-2-mail-helo-first-21nov2022.tgz -C /
root@Lacie-2big-NAS:/ # echo -e "Hello !\nI just tested if you can receive my ma
il\nSee you later\n end line"|mail -s "Check notification" webmaster@plugout.net
subject=Check notification
to=webmaster@plugout.net
mode=1
CONNECTED(00000003)
depth=1 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = GeoTrust RSA CA 2018
verify error:num=20:unable to get local issuer certificate
verify return:0
---
Certificate chain
0 s:/C=GR/L=Marousi/O=Hellenic Telecommunications Organization S.A./CN=*.otenet.gr
i:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=GeoTrust RSA CA 2018
1 s:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=GeoTrust RSA CA 2018
i:/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert Global Root CA
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=GR/L=Marousi/O=Hellenic Telecommunications Organization S.A./CN=*.otenet.gr
issuer=/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=GeoTrust RSA CA 2018
---
Acceptable client certificate CA names
/C=US/O=DigiCert Inc/OU=www.digicert.com/CN=GeoTrust RSA CA 2018
---
SSL handshake has read 3861 bytes and written 690 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: 4CCF87CF2E28E39C1AE521D36C826576E9425E4D9F76E530B42EFFE347D0BE28
Session-ID-ctx:
Master-Key: C2971C0B133DE0383D7AB2D757FAD551E4EA03A715C29D80F73688746648C17A67B967005B3CC4ACF5E7365DD1AAD38A
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 7200 (seconds)
TLS session ticket:
0000 - 03 f3 15 4b b3 6d 14 79-a9 13 4b c7 9b ca 2f c8 ...K.m.y..K.../.
0010 - 0c 44 27 00 4c a2 20 57-26 6a 46 9f 96 b5 54 29 .D'.L. W&jF...T)
0020 - ee 03 98 ca 08 3a ac c2-0f b8 5b 9e b2 73 d1 d4 .....:....[..s..
0030 - 6d 2a 50 08 7d 4b 84 3c-b9 75 de 6e 8b c0 10 1d m*P.}K.<.u.n....
0040 - bd c7 9f 27 2f dd bb 9b-2a c6 08 7e f9 aa d5 f5 ...'/...*..~....
0050 - 3c 5d 37 e7 65 a8 f1 63-3a ec 0c 81 c6 7a 05 32 <]7.e..c:....z.2
0060 - 9b 09 2a 4a b4 57 e7 62-46 5b 5b 4f ba 76 d1 4b ..*J.W.bF[[O.v.K
0070 - 31 93 de ed 0e 42 65 d2-e7 52 ad 7e cb f2 63 6e 1....Be..R.~..cn
0080 - 5b 69 65 f2 d1 a8 6d bb-ee 9e 89 1a 31 60 a0 3f [ie...m.....1`.?
0090 - 52 fc 35 81 a6 86 72 d7-17 b6 3b 1a 60 eb 63 54 R.5...r...;.`.cT
Start Time: 1669044516
Timeout : 300 (sec)
Verify return code: 20 (unable to get local issuer certificate)
---
250 DSN
250-chimaera.otenet.gr
250-PIPELINING
250-SIZE 41100000
250-ETRN
250-AUTH PLAIN LOGIN
250-AUTH=PLAIN LOGIN
250-ENHANCEDSTATUSCODES
250-8BITMIME
250 DSN
235 2.7.0 Authentication successful
250 2.1.0 Ok
250 2.1.5 Ok
354 End data with <CR><LF>.<CR><LF>
250 2.0.0 from MTA(smtp:[127.0.0.1]:10025): 250 2.0.0 Ok: queued as 0287C5408F
221 2.0.0 Bye
closed
root@Lacie-2big-NAS:/ #
root@Lacie-2big-NAS:/ #
start boot log
is a physical machine
detect and set platform
2bignas
kirkwood
UIMAGE-414133-KIRKWOOD-1
Current kernel: 4.14.133 #1 PREEMPT Wed Jul 17 14:46:56 CEST 2019
device 2bignas
family kirkwood
mount dev/pts
update dev nodes
booting using sda1 root file system...
enable IP forwarding...
run udevstart to update dev nodes when necessary
inserting kernel modules:
modprobe: module 'iscsi_trgt' not found
start buttons control daemon
device = 2bignas
source = buttons-nwsp2
buttons-nwsp2 daemon started
Keep old Min free memory=2000
Mon Nov 21 17:35:10 EET 2022
configuration partition is rightly mounted
create temporary passwd file
create temporary group file
set samba environment for version 3.0.37
configure loopback network interface
setting reboot and standby
2bignas
rebootd-nwsp2
2bignas
standbyd-nwsp2
start fan
starting php based setup routines step 1
* Initialize the volatile db file... [ OK ]
* Starting udevd... [ OK ]
* Finishing restore RAID devices... [ OK ]
* Found database configuration file... [ OK ]
* Updating Disks database... [ OK ]
* Starting mount of volumes...
- Mounting volume Vol-A: [ OK ]
* Finishing mount of volumes... [ OK ]
* Generating Hosts File... [ OK ]
* Configuring System Hostname... [ OK ]
* Configuring LAN interface... [ OK ]
* Initializing Timezone... [ OK ]
* Starting web server... [ OK ]
* Starting mount of internal USB ...
* Finishing mount internal USB ... [ OK ]
* Configuring Disks... [ OK ]
* Configuring Samba... [ OK ]
* Configuring System Users...
Root password: use default password
Set users, linux and samba accounts [ OK ]
* Starting Fvdw-sl Discovery Daemon... [ OK ]
start rpcbind service
starting php based setup routines step 2
* Starting dropbear... [ OK ]
* Kill temporary dropbear... [ OK ]
starting php based setup routines step 3
* Starting daemon update Hosts File... [ OK ]
* Starting NTP Server ... [ OK ]
* Starting mount of remote shares...
* Finishing mount shares... [ OK ]
* Starting NTP client... [ OK ]
starting php based setup routines step banner
*** fvdw-sl NAS firmware
This is fvdw-sl version: fvdw-sl 18.2 patched
built on: October 18 2019
LAN IP address: 10.0.0.13 (static)
Port configuration:
LAN -> eth0
php based setup routines finished
web permission on resolv.conf
set device tuning for dms performance
move smbd en nmbd db files away from ram disk to prevent hanging samba server
LED settings
Send a boot mail notification to @@@@@@@otenet.gr
* Finishing restore RAID devices... [ OK ]
....
* Starting mount of volumes...
- Mounting volume Vol-A: [ OK ]
Return to Lacie 2Big Network vs2
Users browsing this forum: No registered users and 3 guests