Intern Diskussion:Server: Unterschied zwischen den Versionen
| Zeile 3.566: | Zeile 3.566: | ||
<!-- | <!-- | ||
<pre> | <pre> | ||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:31 CEST | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
Nmap scan report for 141.56.51.51 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.51 are filtered | |||
Nmap scan report for 141.56.51.52 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.52 are filtered | |||
Nmap scan report for 141.56.51.53 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.53 are filtered | |||
Nmap scan report for 141.56.51.54 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.54 are filtered | |||
Nmap scan report for 141.56.51.55 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.55 are filtered | |||
Nmap scan report for 141.56.51.56 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.56 are filtered | |||
Nmap scan report for 141.56.51.57 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.57 are filtered | |||
Nmap scan report for 141.56.51.58 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.58 are filtered | |||
Nmap scan report for 141.56.51.59 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.59 are filtered | |||
Nmap scan report for 141.56.51.60 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.60 are filtered | |||
Nmap scan report for 141.56.51.61 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.61 are filtered | |||
Nmap scan report for 141.56.51.62 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.62 are filtered | |||
Nmap scan report for 141.56.51.63 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.63 are filtered | |||
Nmap scan report for 141.56.51.64 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.64 are filtered | |||
Nmap scan report for 141.56.51.65 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.65 are filtered | |||
Nmap scan report for 141.56.51.66 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.66 are filtered | |||
Nmap scan report for 141.56.51.67 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.67 are filtered | |||
Nmap scan report for 141.56.51.68 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.68 are filtered | |||
Nmap scan report for 141.56.51.69 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.69 are filtered | |||
Nmap scan report for 141.56.51.70 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.70 are filtered | |||
Nmap scan report for 141.56.51.71 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.71 are filtered | |||
Nmap scan report for 141.56.51.72 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.72 are filtered | |||
Nmap scan report for 141.56.51.73 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.73 are filtered | |||
Nmap scan report for 141.56.51.74 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.74 are filtered | |||
Nmap scan report for 141.56.51.75 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.75 are filtered | |||
Nmap scan report for 141.56.51.76 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.76 are filtered | |||
Nmap scan report for 141.56.51.77 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.77 are filtered | |||
Nmap scan report for 141.56.51.78 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.78 are filtered | |||
Nmap scan report for 141.56.51.79 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.79 are filtered | |||
Nmap scan report for 141.56.51.80 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.80 are filtered | |||
Nmap scan report for 141.56.51.81 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.81 are filtered | |||
Nmap scan report for 141.56.51.82 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.82 are filtered | |||
Nmap scan report for 141.56.51.83 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.83 are filtered | |||
Nmap scan report for 141.56.51.84 | |||
Host is up (4.9s latency). | |||
All 1000 scanned ports on 141.56.51.84 are filtered | |||
Nmap scan report for 141.56.51.85 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.85 are filtered | |||
Nmap scan report for 141.56.51.86 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.86 are filtered | |||
Nmap scan report for 141.56.51.87 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.87 are filtered | |||
Nmap scan report for 141.56.51.88 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.88 are filtered | |||
Nmap scan report for 141.56.51.89 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.89 are filtered | |||
Nmap scan report for 141.56.51.90 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.90 are filtered | |||
Nmap scan report for 141.56.51.91 | |||
Host is up (1.4s latency). | |||
All 1000 scanned ports on 141.56.51.91 are filtered | |||
Nmap scan report for 141.56.51.92 | |||
Host is up (1.6s latency). | |||
All 1000 scanned ports on 141.56.51.92 are filtered | |||
Nmap scan report for 141.56.51.93 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.93 are filtered | |||
Nmap scan report for 141.56.51.94 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.94 are filtered | |||
Nmap scan report for 141.56.51.95 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.95 are filtered | |||
Nmap scan report for 141.56.51.96 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.96 are filtered | |||
Nmap scan report for 141.56.51.97 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.97 are filtered | |||
Nmap scan report for 141.56.51.98 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.98 are filtered | |||
Nmap scan report for 141.56.51.99 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.99 are filtered | |||
Nmap scan report for 141.56.51.100 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.100 are filtered | |||
Nmap scan report for 141.56.51.101 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.101 are filtered | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 51 IP addresses (51 hosts up) scanned in 731.36 seconds | |||
</pre> | </pre> | ||
!--> | !--> | ||
| Zeile 3.573: | Zeile 3.786: | ||
<!-- | <!-- | ||
<pre> | <pre> | ||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:34 CEST | |||
Nmap scan report for 141.56.51.101 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.101 are filtered | |||
Nmap scan report for 141.56.51.102 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.102 are filtered | |||
Nmap scan report for 141.56.51.103 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.103 are filtered | |||
Nmap scan report for 141.56.51.104 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.104 are filtered | |||
Nmap scan report for 141.56.51.105 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.105 are filtered | |||
Nmap scan report for 141.56.51.106 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.106 are filtered | |||
Nmap scan report for 141.56.51.107 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.51.107 are filtered | |||
Nmap scan report for 141.56.51.108 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.108 are filtered | |||
Nmap scan report for 141.56.51.109 | |||
Host is up (0.00061s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh Cisco/3com IPSSHd 1.10.0 (protocol 2.0) | |||
80/tcp open http BMC HTTP Server (HP Integrated Lights-Out remote management) | |||
443/tcp open ssl/http BMC HTTP Server (HP Integrated Lights-Out remote management) | |||
Service Info: Device: remote management | |||
Nmap scan report for 141.56.51.110 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.110 are filtered | |||
Nmap scan report for 141.56.51.111 | |||
Host is up (1.4s latency). | |||
All 1000 scanned ports on 141.56.51.111 are filtered | |||
Nmap scan report for 141.56.51.112 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.51.112 are filtered | |||
Nmap scan report for 141.56.51.113 | |||
Host is up (0.00079s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
80/tcp open http | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port22-TCP:V=6.47%I=7%D=9/13%Time=5B9A77F3%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,1A,"SSH-2\.0-IPSSH-6\.0\.9\x20iRMC\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7806%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,39A,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF6\",\x20qop=\"auth\",\x20non | |||
SF:ce=\"1dac314e-00002768\",\x20opaque=\"2768\",\x20stale=\"FALSE\"\x20\r\ | |||
SF:nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20 | |||
SF:text/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20h | |||
SF:tml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x | |||
SF:20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x2 | |||
SF:0<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x | |||
SF:20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\" | |||
SF:Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expire | |||
SF:s\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n | |||
SF:\x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\ | |||
SF:x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x2 | |||
SF:0Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x | |||
SF:20<h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p> | |||
SF:You\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20 | |||
SF:username\x20and\x20password\x20to\x20see\x20this\x20document\.</p><")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Thu | |||
SF:,\x2013\x20Sep\x202018\x2014:45:30\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46:23\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.51.114 | |||
Host is up (0.00077s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
80/tcp open http | |||
443/tcp open ssl/https? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port22-TCP:V=6.47%I=7%D=9/13%Time=5B9A77F3%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,1A,"SSH-2\.0-IPSSH-6\.0\.9\x20iRMC\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7805%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,399,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@iRMC945BF8\",\x20qop=\"auth\",\x20non | |||
SF:ce=\"1d9648c2-00000335\",\x20opaque=\"335\",\x20stale=\"FALSE\"\x20\r\n | |||
SF:Cache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20t | |||
SF:ext/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20ht | |||
SF:ml\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x2 | |||
SF:0\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x20 | |||
SF:<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x2 | |||
SF:0/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"C | |||
SF:ontent-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expires | |||
SF:\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n\ | |||
SF:x20\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x | |||
SF:20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x20 | |||
SF:Management\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x2 | |||
SF:0<h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p>Y | |||
SF:ou\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20u | |||
SF:sername\x20and\x20password\x20to\x20see\x20this\x20document\.</p></")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Thu | |||
SF:,\x2013\x20Sep\x202018\x2014:45:30\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46:22\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.51.115 | |||
Host is up (0.00069s latency). | |||
Not shown: 998 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh (protocol 2.0) | |||
443/tcp open ssl/https? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port22-TCP:V=6.47%I=7%D=9/13%Time=5B9A77F3%P=x86_64-pc-linux-gnu%r(NULL | |||
SF:,1A,"SSH-2\.0-IPSSH-6\.0\.9\x20iRMC\r\n"); | |||
Nmap scan report for 141.56.51.116 | |||
Host is up (0.00078s latency). | |||
Not shown: 997 filtered ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open tcpwrapped | |||
80/tcp open http | |||
443/tcp open ssl/https? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7805%P=x86_64-pc-linux-gnu | |||
SF:%r(GetRequest,397,"HTTP/1\.1\x20401\x20Unauthorized\r\nWWW-Authenticate | |||
SF::\x20Digest\x20realm=\"iRMC\x20S2@srs3006\",\x20qop=\"auth\",\x20nonce= | |||
SF:\"1dac6adb-00002613\",\x20opaque=\"2613\",\x20stale=\"FALSE\"\x20\r\nCa | |||
SF:che-Control:\x20no-cache\r\nPragma:\x20no-cache\r\nContent-Type:\x20tex | |||
SF:t/html\r\nTransfer-Encoding:\x20chunked\r\n\r\n296\r\n<!DOCTYPE\x20html | |||
SF:\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANSITIONAL//EN\"\x20\ | |||
SF:"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n<HEAD>\n\x20\x20<m | |||
SF:eta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE=EmulateIE8\"\x20/ | |||
SF:>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x20http-equiv=\"Con | |||
SF:tent-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http-equiv=\"Expires\" | |||
SF:>\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equiv=\"Pragma\">\n\x2 | |||
SF:0\x20<title>ServerView\x20Remote\x20Management\x20iRMC\x20S2\x20Web\x20 | |||
SF:Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>ServerView\x20Remote\x20Ma | |||
SF:nagement\x20iRMC\x20S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20< | |||
SF:h1\x20style=\"color:red\"></p>401 Unauthorized!</h1>\x20\x20<p>You | |||
SF:\x20need\x20to\x20authenticate\x20yourself\x20with\x20a\x20valid\x20use | |||
SF:rname\x20and\x20password\x20to\x20see\x20this\x20document\.</p></BO")%r | |||
SF:(HTTPOptions,DE,"HTTP/1\.1\x20501\x20Not\x20Implemented\r\nDate:\x20Thu | |||
SF:,\x2013\x20Sep\x202018\x2014:46:49\x20GMT\r\nServer:\x20iRMC\x20S2\x20W | |||
SF:ebserver\r\nConnection:\x20keep-alive\r\nContent-Type:\x20text/html;\x2 | |||
SF:0charset=utf-8\r\nCache-Control:\x20no-cache\r\nPragma:\x20no-cache\r\n | |||
SF:Content-Length:\x200\r\n\r\n")%r(FourOhFourRequest,2FD,"HTTP/1\.1\x2040 | |||
SF:4\x20Not\x20Found\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:47:50\x20 | |||
SF:GMT\r\nServer:\x20iRMC\x20S2\x20Webserver\r\nConnection:\x20close\r\nCo | |||
SF:ntent-Type:\x20text/html;\x20charset=utf-8\r\nCache-Control:\x20no-cach | |||
SF:e\r\nPragma:\x20no-cache\r\nTransfer-Encoding:\x20chunked\r\n\r\n215\r\ | |||
SF:n<!DOCTYPE\x20html\x20PUBLIC\x20\"-//W3C//DTD\x20HTML\x204\.01\x20TRANS | |||
SF:ITIONAL//EN\"\x20\"http://www\.w3\.org/TR/html4/loose\.dtd\">\n<HTML>\n | |||
SF:<HEAD>\n\x20\x20<meta\x20http-equiv=\"X-UA-Compatible\"\x20content=\"IE | |||
SF:=EmulateIE8\"\x20/>\n<meta\x20content=\"text/html;\x20charset=utf-8\"\x | |||
SF:20http-equiv=\"Content-Type\">\n\x20\x20<meta\x20content=\"-1\"\x20http | |||
SF:-equiv=\"Expires\">\n\x20\x20<meta\x20content=\"no-cache\"\x20http-equi | |||
SF:v=\"Pragma\">\n\x20\x20<title>ServerView\x20Remote\x20Management\x20iRM | |||
SF:C\x20S2\x20Web\x20Server</title>\n</HEAD>\n<BODY>\n\x20\x20<h2>iRMC\x20 | |||
SF:S2\x20Web\x20Server\x20Information:</h2>\n\x20\x20<h1\x20style=\"color: | |||
SF:black\"></p>404 Not\x20Found</h1>\n</BODY>\n</HTML>\n\r\n0\r\n\r\n | |||
SF:"); | |||
Nmap scan report for 141.56.51.117 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.117 are filtered | |||
Nmap scan report for 141.56.51.118 | |||
Host is up (0.0063s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.0p1 Debian 4+deb7u2 (protocol 2.0) | |||
80/tcp open http? | |||
443/tcp open ssl/https? | |||
9666/tcp open ssl/unknown | |||
9999/tcp open ssl/abyss? | |||
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port80-TCP:V=6.47%I=7%D=9/13%Time=5B9A77FD%P=x86_64-pc-linux-gnu%r(HTTP | |||
SF:Options,9A,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,OPTIONS,TRACE\r\nDa | |||
SF:te:\x20Thu,\x2013\x20Sep\x202018\x2014:45:11\x20GMT\r\nServer:\x20iRMC\ | |||
SF:x20S4\x20Webserver\r\nContent-Length:\x200\r\nContent-Encoding:\x20\(nu | |||
SF:ll\)\r\n\r\n")%r(RTSPRequest,80,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GE | |||
SF:T,OPTIONS,TRACE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:45:16\x20GM | |||
SF:T\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nContent-Length:\x200\r\n\r\n | |||
SF:")%r(SIPOptions,9A,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,OPTIONS,TRA | |||
SF:CE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46:19\x20GMT\r\nServer:\ | |||
SF:x20iRMC\x20S4\x20Webserver\r\nContent-Length:\x200\r\nContent-Encoding: | |||
SF:\x20\(null\)\r\n\r\n"); | |||
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)============== | |||
SF-Port443-TCP:V=6.47%T=SSL%I=7%D=9/13%Time=5B9A7808%P=x86_64-pc-linux-gnu | |||
SF:%r(HTTPOptions,A6,"HTTP/1\.1\x20200\x20OK\r\nAllow:\x20GET,OPTIONS,TRAC | |||
SF:E\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:45:23\x20GMT\r\nServer:\x | |||
SF:20iRMC\x20S4\x20Webserver\r\nStrict-Transport-Security:\x20max-age=0\r\ | |||
SF:nContent-Length:\x200\r\n\r\n")%r(RTSPRequest,C0,"HTTP/1\.1\x20200\x20O | |||
SF:K\r\nAllow:\x20GET,OPTIONS,TRACE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\ | |||
SF:x2014:45:28\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-Tran | |||
SF:sport-Security:\x20max-age=0\r\nContent-Length:\x200\r\nContent-Encodin | |||
SF:g:\x20\(null\)\r\n\r\n")%r(SIPOptions,A6,"HTTP/1\.1\x20200\x20OK\r\nAll | |||
SF:ow:\x20GET,OPTIONS,TRACE\r\nDate:\x20Thu,\x2013\x20Sep\x202018\x2014:46 | |||
SF::31\x20GMT\r\nServer:\x20iRMC\x20S4\x20Webserver\r\nStrict-Transport-Se | |||
SF:curity:\x20max-age=0\r\nContent-Length:\x200\r\n\r\n"); | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.119 | |||
Host is up (0.018s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh? | |||
80/tcp open http Mbedthis-Appweb/2.4.2 | |||
443/tcp open https Mbedthis-Appweb/2.4.2 | |||
Nmap scan report for 141.56.51.120 | |||
Host is up (2.1s latency). | |||
All 1000 scanned ports on 141.56.51.120 are filtered | |||
Nmap scan report for 141.56.51.121 | |||
Host is up (0.00030s latency). | |||
All 1000 scanned ports on 141.56.51.121 are closed | |||
Nmap scan report for 141.56.51.122 | |||
Host is up (0.73s latency). | |||
All 1000 scanned ports on 141.56.51.122 are filtered | |||
Nmap scan report for 141.56.51.123 | |||
Host is up (0.00058s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.124 | |||
Host is up (0.00028s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.125 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.125 are filtered | |||
Nmap scan report for 141.56.51.126 | |||
Host is up (1.2s latency). | |||
All 1000 scanned ports on 141.56.51.126 are filtered | |||
Nmap scan report for 141.56.51.127 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.51.127 are filtered | |||
Nmap scan report for 141.56.51.128 | |||
Host is up (0.00021s latency). | |||
Not shown: 995 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0) | |||
80/tcp open http nginx 1.10.3 | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
443/tcp open http nginx 1.10.3 | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.129 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.129 are filtered | |||
Nmap scan report for 141.56.51.130 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.130 are filtered | |||
Nmap scan report for 141.56.51.131 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.131 are filtered | |||
Nmap scan report for 141.56.51.132 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.132 are filtered | |||
Nmap scan report for 141.56.51.133 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.133 are filtered | |||
Nmap scan report for 141.56.51.134 | |||
Host is up (1.8s latency). | |||
All 1000 scanned ports on 141.56.51.134 are filtered | |||
Nmap scan report for 141.56.51.135 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.135 are filtered | |||
Nmap scan report for 141.56.51.136 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.136 are filtered | |||
Nmap scan report for 141.56.51.137 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.137 are filtered | |||
Nmap scan report for 141.56.51.138 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.138 are filtered | |||
Nmap scan report for 141.56.51.139 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.139 are filtered | |||
Nmap scan report for 141.56.51.140 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.140 are filtered | |||
Nmap scan report for 141.56.51.141 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.141 are filtered | |||
Nmap scan report for 141.56.51.142 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.142 are filtered | |||
Nmap scan report for 141.56.51.143 | |||
Host is up (0.11s latency). | |||
All 1000 scanned ports on 141.56.51.143 are filtered | |||
Nmap scan report for 141.56.51.144 | |||
Host is up (1.9s latency). | |||
All 1000 scanned ports on 141.56.51.144 are filtered | |||
Nmap scan report for 141.56.51.145 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.51.145 are filtered | |||
Nmap scan report for 141.56.51.146 | |||
Host is up (1.7s latency). | |||
All 1000 scanned ports on 141.56.51.146 are filtered | |||
Nmap scan report for 141.56.51.147 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.147 are filtered | |||
Nmap scan report for 141.56.51.148 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.148 are filtered | |||
Nmap scan report for 141.56.51.149 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.149 are filtered | |||
Nmap scan report for 141.56.51.150 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.150 are filtered | |||
Nmap scan report for 141.56.51.151 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.151 are filtered | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 51 IP addresses (51 hosts up) scanned in 795.42 seconds | |||
</pre> | </pre> | ||
| Zeile 3.580: | Zeile 4.203: | ||
<!-- | <!-- | ||
<pre> | <pre> | ||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:35 CEST | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
RTTVAR has grown to over 2.3 seconds, decreasing to 2.0 | |||
Nmap scan report for 141.56.51.151 | |||
Host is up (0.082s latency). | |||
All 1000 scanned ports on 141.56.51.151 are filtered | |||
Nmap scan report for 141.56.51.152 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.152 are filtered | |||
Nmap scan report for 141.56.51.153 | |||
Host is up (1.8s latency). | |||
All 1000 scanned ports on 141.56.51.153 are filtered | |||
Nmap scan report for 141.56.51.154 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.154 are filtered | |||
Nmap scan report for 141.56.51.155 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.155 are filtered | |||
Nmap scan report for 141.56.51.156 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.156 are filtered | |||
Nmap scan report for 141.56.51.157 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.157 are filtered | |||
Nmap scan report for 141.56.51.158 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.158 are filtered | |||
Nmap scan report for 141.56.51.159 | |||
Host is up (1.4s latency). | |||
All 1000 scanned ports on 141.56.51.159 are filtered | |||
Nmap scan report for 141.56.51.160 | |||
Host is up (0.00096s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Canon i-SENSYS MF8040Cn printer http admin | |||
515/tcp open printer | |||
9100/tcp open jetdirect? | |||
Service Info: Device: printer; CPE: cpe:/h:canon:i-sensys_mf8040cn | |||
Nmap scan report for 141.56.51.161 | |||
Host is up (0.00056s latency). | |||
Not shown: 991 closed ports | |||
PORT STATE SERVICE VERSION | |||
25/tcp open smtp Canon imageRUNNER C5185 smtpd | |||
80/tcp open ipp Canon printer http config 2.21 | |||
515/tcp open printer? | |||
631/tcp open ipp Canon printer http config 2.21 | |||
8000/tcp open http Catwalk 1.3.1 (Canon imageRUNNER C5000-series printer http config) | |||
9002/tcp open dynamid? | |||
9010/tcp open sdr? | |||
9011/tcp open unknown | |||
9100/tcp open jetdirect? | |||
Service Info: Device: printer; CPE: cpe:/h:canon:imagerunner_c5185, cpe:/h:canon:imagerunner_c5000 | |||
Nmap scan report for 141.56.51.162 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.51.162 are filtered | |||
Nmap scan report for 141.56.51.163 | |||
Host is up (1.1s latency). | |||
All 1000 scanned ports on 141.56.51.163 are filtered | |||
Nmap scan report for 141.56.51.164 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.164 are filtered | |||
Nmap scan report for 141.56.51.165 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.165 are filtered | |||
Nmap scan report for 141.56.51.166 | |||
Host is up (0.00039s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http nginx | |||
6000/tcp open X11? | |||
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at http://www.insecure.org/cgi-bin/servicefp-submit.cgi : | |||
SF-Port6000-TCP:V=6.47%I=7%D=9/13%Time=5B9A77FE%P=x86_64-pc-linux-gnu%r(HT | |||
SF:TPOptions,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type:\x20text | |||
SF:/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20Mon,\x201 | |||
SF:0\x20Sep\x202018\x2002:04:14\x20GMT\r\nServer:\x20Python/3\.6\x20aiohtt | |||
SF:p/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(X11Probe,AA,"HTTP/1\.0\x20400 | |||
SF:\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nC | |||
SF:ontent-Length:\x2011\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x2002:04:14\ | |||
SF:x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Reque | |||
SF:st")%r(GetRequest,AC,"HTTP/1\.0\x20404\x20Not\x20Found\r\nContent-Type: | |||
SF:\x20text/plain;\x20charset=utf-8\r\nContent-Length:\x2014\r\nDate:\x20M | |||
SF:on,\x2010\x20Sep\x202018\x2002:04:19\x20GMT\r\nServer:\x20Python/3\.6\x | |||
SF:20aiohttp/2\.1\.0\r\n\r\n404:\x20Not\x20Found")%r(RTSPRequest,B6,"HTTP/ | |||
SF:1\.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset | |||
SF:=utf-8\r\nContent-Length:\x2023\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x | |||
SF:2002:04:19\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\ni | |||
SF:nvalid\x20constant\x20string")%r(RPCCheck,AA,"HTTP/1\.0\x20400\x20Bad\x | |||
SF:20Request\r\nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Le | |||
SF:ngth:\x2011\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x2002:04:21\x20GMT\r\ | |||
SF:nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DN | |||
SF:SVersionBindReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\nContent-Type: | |||
SF:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\r\nDate:\x20Mo | |||
SF:n,\x2010\x20Sep\x202018\x2002:04:24\x20GMT\r\nServer:\x20Python/3\.6\x2 | |||
SF:0aiohttp/2\.1\.0\r\n\r\nBad\x20Request")%r(DNSStatusRequest,AA,"HTTP/1\ | |||
SF:.0\x20400\x20Bad\x20Request\r\nContent-Type:\x20text/html;\x20charset=u | |||
SF:tf-8\r\nContent-Length:\x2011\r\nDate:\x20Mon,\x2010\x20Sep\x202018\x20 | |||
SF:02:04:26\x20GMT\r\nServer:\x20Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad | |||
SF:\x20Request")%r(SSLSessionReq,AA,"HTTP/1\.0\x20400\x20Bad\x20Request\r\ | |||
SF:nContent-Type:\x20text/html;\x20charset=utf-8\r\nContent-Length:\x2011\ | |||
SF:r\nDate:\x20Mon,\x2010\x20Sep\x202018\x2002:04:32\x20GMT\r\nServer:\x20 | |||
SF:Python/3\.6\x20aiohttp/2\.1\.0\r\n\r\nBad\x20Request"); | |||
Nmap scan report for 141.56.51.167 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.167 are filtered | |||
Nmap scan report for 141.56.51.168 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.168 are filtered | |||
Nmap scan report for 141.56.51.169 | |||
Host is up (0.00068s latency). | |||
Not shown: 997 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 7.4p1 Debian 10+deb9u4 (protocol 2.0) | |||
111/tcp open rpcbind 2-4 (RPC #100000) | |||
3128/tcp open tcpwrapped | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.170 | |||
Host is up (2.0s latency). | |||
All 1000 scanned ports on 141.56.51.170 are filtered | |||
Nmap scan report for 141.56.51.171 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.171 are filtered | |||
Nmap scan report for 141.56.51.172 | |||
Host is up (0.97s latency). | |||
All 1000 scanned ports on 141.56.51.172 are filtered | |||
Nmap scan report for 141.56.51.173 | |||
Host is up (1.8s latency). | |||
All 1000 scanned ports on 141.56.51.173 are filtered | |||
Nmap scan report for 141.56.51.174 | |||
Host is up (1.3s latency). | |||
All 1000 scanned ports on 141.56.51.174 are filtered | |||
Nmap scan report for 141.56.51.175 | |||
Host is up (1.8s latency). | |||
All 1000 scanned ports on 141.56.51.175 are filtered | |||
Nmap scan report for 141.56.51.176 | |||
Host is up (1.5s latency). | |||
All 1000 scanned ports on 141.56.51.176 are filtered | |||
Nmap scan report for 141.56.51.177 | |||
Host is up (1.5s latency). | |||
All 1000 scanned ports on 141.56.51.177 are filtered | |||
Nmap scan report for 141.56.51.178 | |||
Host is up (0.0027s latency). | |||
All 1000 scanned ports on 141.56.51.178 are filtered | |||
Nmap scan report for 141.56.51.179 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.179 are filtered | |||
Nmap scan report for 141.56.51.180 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.180 are filtered | |||
Nmap scan report for 141.56.51.181 | |||
Host is up (0.00060s latency). | |||
Not shown: 996 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u7 (protocol 2.0) | |||
139/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD11) | |||
445/tcp open netbios-ssn Samba smbd 3.X (workgroup: SRD11) | |||
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.182 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.182 are filtered | |||
Nmap scan report for 141.56.51.183 | |||
Host is up (0.00042s latency). | |||
Not shown: 998 closed ports | |||
PORT STATE SERVICE VERSION | |||
22/tcp open ssh OpenSSH 6.7p1 Debian 5+deb8u5 (protocol 2.0) | |||
902/tcp open ssl/vmware-auth VMware Authentication Daemon 1.10 (Uses VNC, SOAP) | |||
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel | |||
Nmap scan report for 141.56.51.184 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.184 are filtered | |||
Nmap scan report for 141.56.51.185 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.185 are filtered | |||
Nmap scan report for 141.56.51.186 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.186 are filtered | |||
Nmap scan report for 141.56.51.187 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.187 are filtered | |||
Nmap scan report for 141.56.51.188 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.188 are filtered | |||
Nmap scan report for 141.56.51.189 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.189 are filtered | |||
Nmap scan report for 141.56.51.190 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.190 are filtered | |||
Nmap scan report for 141.56.51.191 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.191 are filtered | |||
Nmap scan report for 141.56.51.192 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.192 are filtered | |||
Nmap scan report for 141.56.51.193 | |||
Host is up (0.00020s latency). | |||
Not shown: 999 closed ports | |||
PORT STATE SERVICE VERSION | |||
80/tcp open http Apache httpd 2.4.33 ((FreeBSD)) | |||
Nmap scan report for 141.56.51.194 | |||
Host is up (3.0s latency). | |||
All 1000 scanned ports on 141.56.51.194 are filtered | |||
Nmap scan report for 141.56.51.195 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.195 are filtered | |||
Nmap scan report for 141.56.51.196 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.196 are filtered | |||
Nmap scan report for 141.56.51.197 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.197 are filtered | |||
Nmap scan report for 141.56.51.198 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.198 are filtered | |||
Nmap scan report for 141.56.51.199 | |||
Host is up (2.9s latency). | |||
All 1000 scanned ports on 141.56.51.199 are filtered | |||
Nmap scan report for 141.56.51.200 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.200 are filtered | |||
Nmap scan report for 141.56.51.201 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.51.201 are filtered | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 51 IP addresses (51 hosts up) scanned in 731.03 seconds | |||
</pre> | </pre> | ||
| Zeile 3.587: | Zeile 4.496: | ||
<!-- | <!-- | ||
<pre> | <pre> | ||
Starting Nmap 6.47 ( http://nmap.org ) at 2018-09-13 16:35 CEST | |||
Nmap scan report for 141.56.51.201 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.201 are filtered | |||
Nmap scan report for 141.56.51.202 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.202 are filtered | |||
Nmap scan report for 141.56.51.203 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.203 are filtered | |||
Nmap scan report for 141.56.51.204 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.204 are filtered | |||
Nmap scan report for 141.56.51.205 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.205 are filtered | |||
Nmap scan report for 141.56.51.206 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.206 are filtered | |||
Nmap scan report for 141.56.51.207 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.207 are filtered | |||
Nmap scan report for 141.56.51.208 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.208 are filtered | |||
Nmap scan report for 141.56.51.209 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.209 are filtered | |||
Nmap scan report for 141.56.51.210 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.210 are filtered | |||
Nmap scan report for 141.56.51.211 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.211 are filtered | |||
Nmap scan report for 141.56.51.212 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.212 are filtered | |||
Nmap scan report for 141.56.51.213 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.51.213 are filtered | |||
Nmap scan report for 141.56.51.214 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.214 are filtered | |||
Nmap scan report for 141.56.51.215 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.215 are filtered | |||
Nmap scan report for 141.56.51.216 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.216 are filtered | |||
Nmap scan report for 141.56.51.217 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.217 are filtered | |||
Nmap scan report for 141.56.51.218 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.218 are filtered | |||
Nmap scan report for 141.56.51.219 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.219 are filtered | |||
Nmap scan report for 141.56.51.220 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.220 are filtered | |||
Nmap scan report for 141.56.51.221 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.221 are filtered | |||
Nmap scan report for 141.56.51.222 | |||
Host is up (2.2s latency). | |||
All 1000 scanned ports on 141.56.51.222 are filtered | |||
Nmap scan report for 141.56.51.223 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.51.223 are filtered | |||
Nmap scan report for 141.56.51.224 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.224 are filtered | |||
Nmap scan report for 141.56.51.225 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.225 are filtered | |||
Nmap scan report for 141.56.51.226 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.226 are filtered | |||
Nmap scan report for 141.56.51.227 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.227 are filtered | |||
Nmap scan report for 141.56.51.228 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.228 are filtered | |||
Nmap scan report for 141.56.51.229 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.229 are filtered | |||
Nmap scan report for 141.56.51.230 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.230 are filtered | |||
Nmap scan report for 141.56.51.231 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.231 are filtered | |||
Nmap scan report for 141.56.51.232 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.232 are filtered | |||
Nmap scan report for 141.56.51.233 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.233 are filtered | |||
Nmap scan report for 141.56.51.234 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.234 are filtered | |||
Nmap scan report for 141.56.51.235 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.235 are filtered | |||
Nmap scan report for 141.56.51.236 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.236 are filtered | |||
Nmap scan report for 141.56.51.237 | |||
Host is up (2.8s latency). | |||
All 1000 scanned ports on 141.56.51.237 are filtered | |||
Nmap scan report for 141.56.51.238 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.238 are filtered | |||
Nmap scan report for 141.56.51.239 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.239 are filtered | |||
Nmap scan report for 141.56.51.240 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.240 are filtered | |||
Nmap scan report for 141.56.51.241 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.241 are filtered | |||
Nmap scan report for 141.56.51.242 | |||
Host is up (2.6s latency). | |||
All 1000 scanned ports on 141.56.51.242 are filtered | |||
Nmap scan report for 141.56.51.243 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.243 are filtered | |||
Nmap scan report for 141.56.51.244 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.244 are filtered | |||
Nmap scan report for 141.56.51.245 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.245 are filtered | |||
Nmap scan report for 141.56.51.246 | |||
Host is up (2.7s latency). | |||
All 1000 scanned ports on 141.56.51.246 are filtered | |||
Nmap scan report for 141.56.51.247 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.247 are filtered | |||
Nmap scan report for 141.56.51.248 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.248 are filtered | |||
Nmap scan report for 141.56.51.249 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.249 are filtered | |||
Nmap scan report for 141.56.51.250 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.250 are filtered | |||
Nmap scan report for 141.56.51.251 | |||
Host is up (2.3s latency). | |||
All 1000 scanned ports on 141.56.51.251 are filtered | |||
Nmap scan report for 141.56.51.252 | |||
Host is up (2.5s latency). | |||
All 1000 scanned ports on 141.56.51.252 are filtered | |||
Nmap scan report for 141.56.51.253 | |||
Host is up (2.4s latency). | |||
All 1000 scanned ports on 141.56.51.253 are filtered | |||
Nmap scan report for rou1.rz.htw-dresden.de (141.56.51.254) | |||
Host is up (0.0070s latency). | |||
All 1000 scanned ports on rou1.rz.htw-dresden.de (141.56.51.254) are closed | |||
Nmap scan report for 141.56.51.255 | |||
Host is up. | |||
All 1000 scanned ports on 141.56.51.255 are filtered | |||
Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . | |||
Nmap done: 55 IP addresses (55 hosts up) scanned in 884.81 seconds | |||
</pre> | </pre> | ||
Version vom 13. September 2018, 16:50 Uhr
srs19 ist vorhanden -- ich konnte jedoch nicht ihre Aufgabe erkennen. Schrift unlesbar. FrankHebold (Diskussion) 12:09, 4. Jun. 2013 (CEST)
"Services" und "Dienste"
Worin besteht der Unterschied zwischen der von mir kürzlich vorgeschlagenen Kategorie "Dienst" und der bereits genutzten (aber mir bis eben unbekannten) Kategorie "Services"? --Mr N (Diskussion) 20:00, 2. Jan. 2016 (CET)
Es gibt eine Kategorie:Dienst oder Kategorie:Services?
Meinerseits wurde doch nur erstmal die Begrifflichkeit Services als Überschrift verwendet.
Spontan würde ich sagen, dass das auch alles mit der Kategorie:Server versehen wird. Es könnte nur überlegt werden, ob die Artikel Server/Service/ oder so heißen.
Solltest du die meinen, so ist das schlicht die Kategorie für den Bereich Service des StuRa. (Also da geht es um wahren Service, nicht Dienste durch Server.)
BTW: Eine Kategorie für einen Service (Singular) mit Services (Plural) zu kategorisieren, fände ich "nicht schön".
--Paul 11:38, 4. Jan. 2016 (CET)
zu klärendes mit dem RZ
Zuschalten von Dosen für Netzwerk
Sehr geehrtes Rechenzentrum, lieber Herr Müller,
wie beim Gespräch im Februar besprochen, bitten wir um das Zuschalten der Dosen fürs Netzwerk. Im Übrigen bedauern wir, dass unsere Meldung so lange auf sich warten ließ. Die Vielzahl von unerwarteten Komplikationen forderte uns zeitlich arg.
Gern können Sie alle noch nicht im Betrieb befindliche Dosen "pauschal" freischalten.
Selbstverständlich haben wir uns zwischenzeitlich auch einen Übersicht zu den einzelnen uns zugeordneten Dosen verschafft.
Wenn die einzelnen Dosen benannt werden sollen, so wären das mindestens: Erdgeschoss
- D03-102-A03
- D01-104-A03
- D05-104-A03
- D01-105-A03
- D03-105-A03
- D05-105-A03
- D07-105-A03 (Raum A105/A106)
- D09-105-A03 (Raum A105/A106)
- D11-105-A03 (Raum A105/A106)
- D03-107-A03 (Raum A108)
- D05-107-A03 (Raum A108)
- D01-108-A03 (Raum A109)
Untergeschoss
- D01-007-A03
- D04-007-A03
- D05-007-A03
- D06-007-A03
- D01-008-A03
- D03-008-A03
- D04-008-A03
Den Raum A110 werden wir gemeinschaftlich mit der Hochschule für Beratungen nutzen.
- D01-109-A03
- D03-109-A03
Den Raum A103 nutzt Faranto.
- D01-103-A03
- D03-103-A03
Den Raum A107 nutzt der FSR ET.
- D01-107-A03
Den Raum A001 nutzt der FSR I/M.
- D01-001-A03
Den Raum A002 nutzt der FSR WiWi.
- D01-002-A03
Den Raum A004 nutzt der FSR MBau.
- D01-004-A03
Das Zuschalten der Dosen bei den FSRä kann als präventive Maßnahme zur Absicherung der Verfügbarkeit von Netzwerk verstanden werden. Langfristig ändert sich das vielleicht.
Mit besten Grüßen
IP-Adressen und Bereich an IP-Adressen
- "eigenes" Netz
- Anzahl von IP-Adressen
| Switch | (02 (+ 01)) * 2 | 006 |
|
| Server | (03 (+ 02)) * 4) | 020 |
|
| Desktop (GNU/Linux) | 04 (+ 06) | 010 |
|
| Desktop (UNIX) | 02 | 002 |
|
| Desktop (Windows) | 02 | 002 |
|
| Laptop | 03 * 0 | 000 |
|
| Drucker | 05 (+ 01) | 006 |
|
| Desktop (Faranto) | 03 (+ 01) | 004 |
|
| Drucker (Faranto) | 02 | 002 |
|
| Dienste | 15 (* 2) | 030 |
|
| Dienste KSS | 10 (* 2) | 020 |
|
| Summe | 102 | ||
| Sonstiges | 10? | 009 |
als Beispiele: |
| Summe | 111 |
Einträge für DNS
stura.htw-dresden.de DNS
- Siehe auch
- Domain#stura.htw-dresden.de DNS
stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen
| u | hinzufügen |
| entfernen | |
| entfernbar |
stura.htw-dresden.de DNS mittelfristig gewünschte Änderungen
Achtung! Dieser Abschnitt dient bisher nur als Grundlage für den zu erstellenden Entwurf! #stura.htw-dresden.de DNS kurzfristig gewünschte Änderungen
| u | hinzufügen |
| entfernen | |
| entfernbar |
Vereinbarung für inhaltliche Verantwortlichkeit
Zertifikate für Dienste
anstehendes Treffen
- Ende März
Belegung vom Serverschrank
Konzept Belegung vom Serverschrank Frühjahr 2017
Achtung! Die Tabelle stellt noch nicht die Realität dar. Die Tabelle muss noch bearbeitet werden!
| Höhe | Ist | Soll |
|---|---|---|
| 001 |
| |
| o | ||
| - | ||
| 004 |
Switch | |
| o | ||
| - | ||
| 007 |
| |
| o | ||
| - | ||
| 010 | ||
| o | ||
| - | ||
| 013 | ||
| o | ||
| - | ||
| 017 |
| |
| o | ||
| - | ||
| 020 |
RX 300 | |
| o | ||
| - | ||
| 023 | ||
| o | ||
| - | ||
| 026 |
| |
| o | ||
| - | ||
| 029 |
RX 300 | |
| o | ||
| - | ||
| 032 | ||
| o | ||
| - | ||
| 035 |
| |
| o | ||
| - | ||
| 038 |
Switch | |
| o | ||
| - | ||
| 041 |
| |
| o | ||
| - | ||
| 044 | ||
| o | ||
| - | ||
| 047 |
| |
| o | ||
| - | ||
| 050 | ||
| o | ||
| - | ||
| 053 |
| |
| o | ||
| - | ||
| 056 | ||
| o | ||
| - | ||
| 059 |
| |
| o | ||
| - | ||
| 062 |
| |
| o | ||
| - | ||
| 065 |
| |
| o | ||
| - | ||
| 068 |
IBM X3550 | |
| o | ||
| - | ||
| 071 |
| |
| o | ||
| - | ||
| 074 |
HP DL160 G6 | |
| o | ||
| - | ||
| 077 |
| |
| o | ||
| - | ||
| 080 |
| |
| o | ||
| - | ||
| 083 | ||
| o | ||
| - | ||
| 086 |
| |
| o | ||
| - | ||
| 089 |
| |
| o | ||
| - | ||
| 092 | ||
| o | ||
| - | ||
| 095 |
| |
| o | ||
| - | ||
| 098 |
| |
| o | ||
| - | ||
| 101 |
| |
| o | ||
| - |
Konzept Belegung vom Serverschrank Sommer 2017
Achtung! Die Tabelle stellt noch nicht die Realität dar. Die Tabelle muss noch bearbeitet werden!
| Höhe | Ist | Soll |
|---|---|---|
| 001 |
| |
| o | ||
| - | ||
| 004 | ||
| o | ||
| - | ||
| 007 |
| |
| o | ||
| - | ||
| 010 | ||
| o | ||
| - | ||
| 013 |
| |
| o | ||
| - | ||
| 017 | ||
| o | ||
| - | ||
| 020 | ||
| o | ||
| - | ||
| 023 |
| |
| o | ||
| - | ||
| 026 | ||
| o | ||
| - | ||
| 029 | ||
| o | ||
| - | ||
| 032 |
| |
| o | ||
| - | ||
| 035 | ||
| o | ||
| - | ||
| 038 | ||
| o | ||
| - | ||
| 041 |
| |
| o | ||
| - | ||
| 044 | ||
| o | ||
| - | ||
| 047 | ||
| o | ||
| - | ||
| 050 |
| |
| o | ||
| - | ||
| 044 | ||
| o | ||
| - | ||
| 047 |
| |
| o | ||
| - | ||
| 050 | ||
| o | ||
| - | ||
| 053 |
| |
| o | ||
| - | ||
| 056 | ||
| o | ||
| - | ||
| 059 |
| |
| o | ||
| - | ||
| 062 | ||
| o | ||
| - | ||
| 065 |
| |
| o | ||
| - | ||
| 068 | ||
| o | ||
| - | ||
| 071 |
| |
| o | ||
| - | ||
| 074 |
HP DL160 G6 | |
| o | ||
| - | ||
| 077 |
| |
| o | ||
| - | ||
| 080 |
IBM X3550 | |
| o | ||
| - | ||
| 083 |
| |
| o | ||
| - | ||
| 086 |
| |
| o | ||
| - | ||
| 089 |
| |
| o | ||
| - | ||
| 092 | ||
| o | ||
| - | ||
| 095 |
| |
| o | ||
| - | ||
| 098 | ||
| o | ||
| - | ||
| 101 |
| |
| o | ||
| - |
gescheitertes
Umzug von Server/Jails/SRS1 Juni 2017
add jails
---------
* database
** 141.56.50.191
* semaphore
** 141.56.50.190
* git
** 141.56.50.192
* website
** 141.56.50.195
add storage
-----------
* /lega/storage/git/repos/ansible
* /lega/storage/semaphore/ansible
mount Storage
-------------
* git /lega/storage/git/repos /media/repos # XXX geht nicht
* semaphore /mnt/lega/jails/git/media/repos/ansible /media/repos read-only
* semaphore /lega/storage/semaphore/ansible /media/playbooks
Installationen
--------------
semaphore
* semaphore
* mariadb100-client
database
* mariadb100-server
git
* git
* neovim
Konfiguration
-------------
database:mariadb100-server
sysrc mysql_enable="YES"
'/usr/local/bin/mysqladmin' -u root password 'passwd'
mysql -u root -p
$ create database semaphore;
$ create user 'semaphore'@'141.56.50.190' identified by 'passwd';
$ grant all on semaphore.* to 'semaphore'@'141.56.50.190';
$ exit
website:ssh-access
mv semaphore.pub /root/.ssh/authorized_keys
$EDITOR /etc/ssh/sshd_config
PermitRootLogin without-password
service sshd onestart
semaphore:maraidb100 test
mysql -u semaphore -p -h 141.56.50.191 semaphore
semaphore:ssh-access test
ssh -i /root/.ssh/semaphore root@141.56.50.181
semaphore:semaphore setup
sysrc semaphore_enable="YES"
semaphore -setup
1. Set up configuration for a MySQL/MariaDB database
2. Set up a path for your playbooks (auto-created)
3. Run database Migrations
4. Set up initial seamphore user & password
> DB Hostname (default 127.0.0.1:3306): 141.56.50.191:3306
> DB User (default root): semaphore
> DB Password: passwd
> DB Name (default semaphore):
> Playbook path: /media/playbooks
Generated configuration:
{
"mysql": {
"host": "141.56.50.191:3306",
"user": "semaphore",
"pass": "passwd",
"name": "semaphore"
},
"port": "",
"bugsnag_key": "",
"tmp_path": "/media/playbooks",
"cookie_hash": "3tVjUpe+RbRU4uBDtcpFZN/m8a3yh2q81pvTNGRoNL8=",
"cookie_encryption": "g881D/r7T8aa8Q0tgKPm00kiFVj5oi/q0loJgYoN2Co="
}
> Is this correct? (yes/no): yes
Running: mkdir -p /media/playbooks..
Configuration written to /media/playbooks/semaphore_config.json..
Pinging database..
Running DB Migrations..
Creating migrations table
Executing migration v0.0.0 (at 2017-05-06 13:02:41.78052655 +0200 CEST)...
[11/11]
Executing migration v1.0.0 (at 2017-05-06 13:02:42.992311998 +0200 CEST)...
[7/7]
Executing migration v1.1.0 (at 2017-05-06 13:02:44.672359519 +0200 CEST)...
[1/1]
Executing migration v1.2.0 (at 2017-05-06 13:02:44.92682468 +0200 CEST)...
[1/1]
Executing migration v1.3.0 (at 2017-05-06 13:02:45.041572311 +0200 CEST)...
[3/3]
Executing migration v1.4.0 (at 2017-05-06 13:02:45.694122748 +0200 CEST)...
[2/2]
Executing migration v1.5.0 (at 2017-05-06 13:02:46.42319397 +0200 CEST)...
[1/1]
Executing migration v0.1.0 (at 2017-05-06 13:02:46.551490497 +0200 CEST)...
[6/6]
Executing migration v1.6.0 (at 2017-05-06 13:02:46.804356224 +0200 CEST)...
[4/4]
Executing migration v1.7.0 (at 2017-05-06 13:02:47.39476158 +0200 CEST)...
[1/1]
Executing migration v1.8.0 (at 2017-05-06 13:02:47.545875504 +0200 CEST)...
[2/2]
Executing migration v1.9.0 (at 2017-05-06 13:02:47.69541287 +0200 CEST)...
[2/2]
> Username: root
> Email: semaphore@stura.htw-dresden.de
> Your name: StuRa HTW Dresden
> Password: passwd
cp /media/playbooks/semaphore_config.json /usr/local/etc/semaphore/semaphore_config.json
semaphore:ssh-keygen
ssh-keygen -t ed25519
Generating public/private ed25519 key pair.
Enter file in which to save the key (/root/.ssh/id_ed25519): /root/.ssh/semaphore
Created directory '/root/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/semaphore.
Your public key has been saved in /root/.ssh/semaphore.pub.
The key fingerprint is:
SHA256:pfwPuz8FVoC5xY0NqbaeP7IhjVizjJEID8riFy6lHvk root@semaphore
The key's randomart image is:
+--[ED25519 256]--+
| +oB |
| o = + |
| o .+ . |
|.. + . o o+ o |
|o. oo o S. o . |
|o = . * *. . |
| * o o =.=. . |
|. = .+=o |
| . E +*+o |
+----[SHA256]-----+
semaphore:ansible roles
ansible-galaxy NetworkManager/
git:git init --bare
cd /media/repos/ansible/
git init --bare website.git
git:create playbooks
cd /tmp
git clone /media/repos/ansible/website.git
cd website
git config --global user.email "semaphore@stura.htw-dresden.de"
git config --global user.name "Administration Rechentechnik"
......
plone upgrade
-------------
1. srs3008
zfs create comp/migration
2. elke
/etc/rc.d/jail stop srs1
zfs snapshot -r primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20
/etc/rc.d/jail start srs1
zfs send primusinterpares/jails/srs1@BEFORE-MIGRATION-2017-07-20 | ssh root@141.56.50.128 zfs recv comp/migration/srs1
3. srs3008
zfs create -p comp/storage/website/plone/var/blobstorage
zfs create -p comp/storage/website/plone/var/filestorage
rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/filestorage/ /mnt/comp/storage/website/plone/var/filestorage/
rsync -va --checksum /mnt/comp/migration/srs1/usr/local/Plone/zinstance/var/blobstorage/ /mnt/comp/storage/website/plone/var/blobstorage/
chown -R www:www /mnt/comp/storage/website/plone/var
zfs snapshot -r comp/storage/website/plone@AFTER_MIGRATION
4. srs3008/website
pkg install python2 sudo
adduser
Username: ansible
Full name:
Uid (Leave empty for default):
Login group [ansible]:
Login group is foo. Invite foo into other groups? []:
Login class [default]:
Shell (sh csh tcsh git-shell nologin) [sh]:
Home directory [/home/ansible]:
Home directory permissions (Leave empty for default):
Use password-based authentication? [yes]:
Use an empty password? (yes/no) [no]:
Use a random password? (yes/no) [no]: yes
Lock out the account after creation? [no]:
Username : ansible
Password : <random>
Full Name :
Uid : 1001
Class :
Groups : ansible
Home : /home/ansible
Home Mode :
Shell : /bin/sh
Locked : no
OK? (yes/no): yes
su ansible
cd; mkdir .ssh
echo 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN3eeZ3Wcxn9ixD039fSFNg2zpJ09YY45XKb3KMST8Da root@semaphore' > .ssh/authorized_keys
exit
vi /usr/local/etc/sudoers
ansible ALL=(ALL) NOPASSWD: ALL
service sshd onestart
5. browser
5.1. http://141.56.50.190:3000/project/1/templates
5.1.1. Anpassung Inventory plone
plone_neu ansible_host=141.56.50.195
myhost ansible_host=141.56.50.128 ansible_ssh_user=root
5.1.2. Anpassung Enviroment
"stura_nginx_server_name":"plone.htw.stura-dresden.de",
"myhost_tank":"comp"
5.1.3. run main
5.2. http://141.56.50.128/ > Jails -> Storage
5.2.1 Add Storage
Jail SRC DEST READ-ONLY CREATE DIRECTORY MOUNTED
website /mnt/comp/storage/website/plone/var/blobstorage /usr/local/www/website/var/blobstorage no no yes
website /mnt/comp/storage/website/plone/var/filestorage /usr/local/www/website/var/filestorage no no yes
6. srs3008/website
service zope213 start
7. browser
7.1. http://plone.htw.stura-dresden.de:8080/Plone/@@plone-upgrade
7.2. http://141.56.50.190:3000/project/1/templates
7.2.1 Anpassung Enviroment
"stura_nginx_server_name":"www.stura.htw-dresden.de",
7.2.2 run main
7.3. http://141.56.50.128/ > Jails
7.3.1. stoppe jail website
8. Elke
/etc/rc.d/jail stop srs1
TODO Ist die IP adresse weg vom interface?
9. browser
9.1. http://141.56.50.128/ > Jails
9.1.2. edit jail
IPv4 address: 141.56.50.1
9.1.3. starte jail website
Umzug zum Bereich an Adressen für IPv4 141.56.51.0/24
nmap -sV -Pn 141.56.50.1-254
nmap -sV -Pn 141.56.51.0-50
nmap -sV -Pn 141.56.51.51-101
nmap -sV -Pn 141.56.51.101-151
nmap -sV -Pn 141.56.51.151-201
nmap -sV -Pn 141.56.51.201-255
mx stura.htw-dresden.de
- ab 2018-09-06
dig mx stura.htw-dresden.de
; <<>> DiG 9.9.5-9+deb8u16-Debian <<>> mx stura.htw-dresden.de ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 65421 ;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 8 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4000 ;; QUESTION SECTION: ;stura.htw-dresden.de. IN MX ;; ANSWER SECTION: stura.htw-dresden.de. 84695 IN MX 20 rmx6.rz.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 10 srs14.stura.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 12 srs9.stura.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 14 srs25.stura.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 15 srs28.stura.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 20 rmx4.rz.htw-dresden.de. stura.htw-dresden.de. 84695 IN MX 20 rmx5.rz.htw-dresden.de. ;; ADDITIONAL SECTION: rmx6.rz.htw-dresden.de. 84689 IN A 141.56.16.136 srs14.stura.htw-dresden.de. 84717 IN A 141.56.51.14 srs9.stura.htw-dresden.de. 84695 IN A 141.56.51.9 srs25.stura.htw-dresden.de. 84695 IN A 141.56.51.25 srs28.stura.htw-dresden.de. 84695 IN A 141.56.51.28 rmx4.rz.htw-dresden.de. 84689 IN A 141.56.16.134 rmx5.rz.htw-dresden.de. 84689 IN A 141.56.16.135 ;; Query time: 9 msec ;; SERVER: 141.56.1.1#53(141.56.1.1) ;; WHEN: Thu Sep 06 11:20:31 CEST 2018 ;; MSG SIZE rcvd: 314