You can subscribe to this list here.
2006 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(1) |
Jul
(1) |
Aug
|
Sep
|
Oct
(2) |
Nov
(1) |
Dec
(20) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2007 |
Jan
(91) |
Feb
(111) |
Mar
(226) |
Apr
(65) |
May
(197) |
Jun
(202) |
Jul
(92) |
Aug
(87) |
Sep
(120) |
Oct
(133) |
Nov
(89) |
Dec
(155) |
2008 |
Jan
(251) |
Feb
(136) |
Mar
(174) |
Apr
(149) |
May
(56) |
Jun
(32) |
Jul
(36) |
Aug
(171) |
Sep
(245) |
Oct
(244) |
Nov
(218) |
Dec
(272) |
2009 |
Jan
(113) |
Feb
(119) |
Mar
(192) |
Apr
(117) |
May
(93) |
Jun
(46) |
Jul
(80) |
Aug
(54) |
Sep
(109) |
Oct
(70) |
Nov
(145) |
Dec
(110) |
2010 |
Jan
(137) |
Feb
(87) |
Mar
(45) |
Apr
(157) |
May
(58) |
Jun
(99) |
Jul
(188) |
Aug
(136) |
Sep
(101) |
Oct
(100) |
Nov
(61) |
Dec
(60) |
2011 |
Jan
(84) |
Feb
(43) |
Mar
(70) |
Apr
(17) |
May
(69) |
Jun
(28) |
Jul
(43) |
Aug
(21) |
Sep
(151) |
Oct
(120) |
Nov
(84) |
Dec
(101) |
2012 |
Jan
(119) |
Feb
(82) |
Mar
(70) |
Apr
(115) |
May
(66) |
Jun
(131) |
Jul
(70) |
Aug
(65) |
Sep
(66) |
Oct
(86) |
Nov
(197) |
Dec
(81) |
2013 |
Jan
(65) |
Feb
(48) |
Mar
(32) |
Apr
(68) |
May
(98) |
Jun
(59) |
Jul
(41) |
Aug
(52) |
Sep
(42) |
Oct
(37) |
Nov
(10) |
Dec
(27) |
2014 |
Jan
(61) |
Feb
(34) |
Mar
(30) |
Apr
(52) |
May
(45) |
Jun
(40) |
Jul
(28) |
Aug
(9) |
Sep
(39) |
Oct
(69) |
Nov
(55) |
Dec
(19) |
2015 |
Jan
(13) |
Feb
(21) |
Mar
(5) |
Apr
(14) |
May
(30) |
Jun
(51) |
Jul
(31) |
Aug
(12) |
Sep
(29) |
Oct
(15) |
Nov
(24) |
Dec
(16) |
2016 |
Jan
(62) |
Feb
(76) |
Mar
(30) |
Apr
(43) |
May
(46) |
Jun
(62) |
Jul
(21) |
Aug
(49) |
Sep
(67) |
Oct
(27) |
Nov
(26) |
Dec
(38) |
2017 |
Jan
(7) |
Feb
(12) |
Mar
(69) |
Apr
(59) |
May
(54) |
Jun
(40) |
Jul
(76) |
Aug
(82) |
Sep
(92) |
Oct
(51) |
Nov
(32) |
Dec
(30) |
2018 |
Jan
(22) |
Feb
(25) |
Mar
(34) |
Apr
(35) |
May
(37) |
Jun
(21) |
Jul
(69) |
Aug
(55) |
Sep
(17) |
Oct
(67) |
Nov
(9) |
Dec
(5) |
2019 |
Jan
(19) |
Feb
(12) |
Mar
(15) |
Apr
(19) |
May
|
Jun
(27) |
Jul
(27) |
Aug
(25) |
Sep
(25) |
Oct
(27) |
Nov
(10) |
Dec
(14) |
2020 |
Jan
(22) |
Feb
(20) |
Mar
(36) |
Apr
(40) |
May
(52) |
Jun
(35) |
Jul
(21) |
Aug
(32) |
Sep
(71) |
Oct
(27) |
Nov
(11) |
Dec
(16) |
2021 |
Jan
(16) |
Feb
(21) |
Mar
(21) |
Apr
(27) |
May
(17) |
Jun
|
Jul
(2) |
Aug
(22) |
Sep
(23) |
Oct
(7) |
Nov
(11) |
Dec
(28) |
2022 |
Jan
(23) |
Feb
(18) |
Mar
(9) |
Apr
(15) |
May
(15) |
Jun
(7) |
Jul
(8) |
Aug
(15) |
Sep
(1) |
Oct
|
Nov
(11) |
Dec
(10) |
2023 |
Jan
(14) |
Feb
(10) |
Mar
(11) |
Apr
(13) |
May
(2) |
Jun
(30) |
Jul
(1) |
Aug
(15) |
Sep
(13) |
Oct
(3) |
Nov
(25) |
Dec
(5) |
2024 |
Jan
(3) |
Feb
(10) |
Mar
(9) |
Apr
|
May
(1) |
Jun
(15) |
Jul
(7) |
Aug
(10) |
Sep
(3) |
Oct
(8) |
Nov
(6) |
Dec
(15) |
2025 |
Jan
(3) |
Feb
(1) |
Mar
(7) |
Apr
(5) |
May
(13) |
Jun
(16) |
Jul
(1) |
Aug
(6) |
Sep
|
Oct
|
Nov
|
Dec
|
From: David K. <da...@ke...> - 2021-01-26 16:53:15
|
ifconfig/ip -s probably reports closest to what the ISP is metering. And I assume that is what Netstat/darkstat is measuring. But the data on that tab is reset every reboot. I assume the interface RX/TX bytes are reset to zero on boot (and/or on taking the interface down/up). I would need to make sure to capture the values on shutdown... and maybe at regular intervals. Any suggestions on how to capture final values as an interface is shutdown? Measuring in iptables might provide more granularity, but may not map as closely to the raw data comcast measure. David On Tue, Jan 26, 2021 at 10:57 AM Lonnie Abelbeck <li...@lo...> wrote: > > > > > On Jan 26, 2021, at 8:29 AM, Michael Keuter <li...@mk...> wrote: > > > > > > > >> Am 26.01.2021 um 15:08 schrieb David Kerr <da...@ke...>: > >> > >> As some of you may be aware, Comcast / Xfinity are starting to impose > >> monthly data caps on internet usage. Where I live it is 1.2TB a > >> month. So I just received the dreaded "You have used 75% of your > >> allowance" email. Fortunately only 5 days from the end of the month, > >> but looking back there are months that I have exceeded the cap. > >> > >> Can I do anything in Astlinux to meter usage myself? I would want to > >> monitor raw traffic in and out on eth0, the totals would need to > >> survive reboot, I would want to reset on the first of each month and > >> maintain a history. For extra credit... be able to identify high > >> users on my internal network(s). > >> > >> Any ideas? Have any other gateways (like OpenWRT) tackled this? > >> > >> Thanks > >> David > > > > Hi David, > > > > most applications that I know use RRDtool (a Round-Robin-database to store data/measurements) as its basis, like Munin, Cacti, MRTG etc. > > > > https://en.wikipedia.org/wiki/RRDtool > > > > It is also available in BR2. > > Years ago I had hacked myself a Munin node (client) for AstLinux, so data could fetched from a Munin server on Debian in my network from my AstLinux boxes. But it does not work anymore or I forgot about it. But it created nice progress graphicss for some parameters (CPU load, traffic, Asterisk calls, etc.). > > > > Now since we're using SSDs instead CF cards it would be nice to have such application. > > My 2 cts. > > > > Michael > > If we are mostly interesting in network info: > > ip -s link show dev eth0 > --or-- > ifconfig eth0 > > provides network interface usage. On shutdown and/or regular cron this info would need to be saved to persistent storage along with the sample date. > > Though corner cases when the eth0 link goes down or a PPPoE ppp0 interface comes and goes can make pure interface monitoring less accurate. > > An AIF plugin could be added to do something similar, which would be required if forwarded LAN -> WAN traffic was to be recorded. Though the matching WAN -> LAN traffic might be a little tricky. > > Then the little matter of what the ISP says the data is vs. your actual data. > > Lonnie > > > > > > > > > > > > _______________________________________________ > Astlinux-users mailing list > Ast...@li... > https://lists.sourceforge.net/lists/listinfo/astlinux-users > > Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... |
From: Lonnie A. <li...@lo...> - 2021-01-26 15:57:29
|
> On Jan 26, 2021, at 8:29 AM, Michael Keuter <li...@mk...> wrote: > > > >> Am 26.01.2021 um 15:08 schrieb David Kerr <da...@ke...>: >> >> As some of you may be aware, Comcast / Xfinity are starting to impose >> monthly data caps on internet usage. Where I live it is 1.2TB a >> month. So I just received the dreaded "You have used 75% of your >> allowance" email. Fortunately only 5 days from the end of the month, >> but looking back there are months that I have exceeded the cap. >> >> Can I do anything in Astlinux to meter usage myself? I would want to >> monitor raw traffic in and out on eth0, the totals would need to >> survive reboot, I would want to reset on the first of each month and >> maintain a history. For extra credit... be able to identify high >> users on my internal network(s). >> >> Any ideas? Have any other gateways (like OpenWRT) tackled this? >> >> Thanks >> David > > Hi David, > > most applications that I know use RRDtool (a Round-Robin-database to store data/measurements) as its basis, like Munin, Cacti, MRTG etc. > > https://en.wikipedia.org/wiki/RRDtool > > It is also available in BR2. > Years ago I had hacked myself a Munin node (client) for AstLinux, so data could fetched from a Munin server on Debian in my network from my AstLinux boxes. But it does not work anymore or I forgot about it. But it created nice progress graphicss for some parameters (CPU load, traffic, Asterisk calls, etc.). > > Now since we're using SSDs instead CF cards it would be nice to have such application. > My 2 cts. > > Michael If we are mostly interesting in network info: ip -s link show dev eth0 --or-- ifconfig eth0 provides network interface usage. On shutdown and/or regular cron this info would need to be saved to persistent storage along with the sample date. Though corner cases when the eth0 link goes down or a PPPoE ppp0 interface comes and goes can make pure interface monitoring less accurate. An AIF plugin could be added to do something similar, which would be required if forwarded LAN -> WAN traffic was to be recorded. Though the matching WAN -> LAN traffic might be a little tricky. Then the little matter of what the ISP says the data is vs. your actual data. Lonnie |
From: Michael K. <li...@mk...> - 2021-01-26 15:27:50
|
> Am 26.01.2021 um 15:08 schrieb David Kerr <da...@ke...>: > > As some of you may be aware, Comcast / Xfinity are starting to impose > monthly data caps on internet usage. Where I live it is 1.2TB a > month. So I just received the dreaded "You have used 75% of your > allowance" email. Fortunately only 5 days from the end of the month, > but looking back there are months that I have exceeded the cap. > > Can I do anything in Astlinux to meter usage myself? I would want to > monitor raw traffic in and out on eth0, the totals would need to > survive reboot, I would want to reset on the first of each month and > maintain a history. For extra credit... be able to identify high > users on my internal network(s). > > Any ideas? Have any other gateways (like OpenWRT) tackled this? > > Thanks > David Hi David, most applications that I know use RRDtool (a Round-Robin-database to store data/measurements) as its basis, like Munin, Cacti, MRTG etc. https://en.wikipedia.org/wiki/RRDtool It is also available in BR2. Years ago I had hacked myself a Munin node (client) for AstLinux, so data could fetched from a Munin server on Debian in my network from my AstLinux boxes. But it does not work anymore or I forgot about it. But it created nice progress graphicss for some parameters (CPU load, traffic, Asterisk calls, etc.). Now since we're using SSDs instead CF cards it would be nice to have such application. My 2 cts. Michael http://www.mksolutions.info |
From: David K. <da...@ke...> - 2021-01-26 14:09:04
|
As some of you may be aware, Comcast / Xfinity are starting to impose monthly data caps on internet usage. Where I live it is 1.2TB a month. So I just received the dreaded "You have used 75% of your allowance" email. Fortunately only 5 days from the end of the month, but looking back there are months that I have exceeded the cap. Can I do anything in Astlinux to meter usage myself? I would want to monitor raw traffic in and out on eth0, the totals would need to survive reboot, I would want to reset on the first of each month and maintain a history. For extra credit... be able to identify high users on my internal network(s). Any ideas? Have any other gateways (like OpenWRT) tackled this? Thanks David |
From: Lonnie A. <li...@lo...> - 2021-01-09 15:58:02
|
Announcing AstLinux Pre-Release: astlinux-1.4-4972-3bdfa6 ** Request for Testing This pre-release reimplements the PPPoE client using the latest pppd 2.4.9 pppoe kernel driver and our custom scripts. The PPPoE client has always been an issue for the AstLinux devs since testing is an issue. Michael Keuter and Lonnie were able to independently use the pppoe-server software and build a PPPoE test environment between two AstLinux boxes. We now need testing with actual ISPs requiring PPPoE. So if you use PPPoE, be certain you test this pre-release while having local access, such that if anything goes wrong you can "Revert to Previous" and get back working. Test by restarting PPPoE a few time in a row, rebooting a couple times, looking for errors (grep pppd /var/log/messages). Please report any issues (and successes) with this change. ** IMPORTANT NOTICE -- The ipsec-tools (racoon) support in AstLinux is deprecated, and will be removed in the near future. The development of ipsec-tools has been ABANDONED. The Network tab -> VPN Type: "IPsec Peers" and "IPsec Mobile" is the web interface configuration for ipsec-tools. The AstLinux Team suggests using either WireGuard or OpenVPN for your VPN needs, but if IPsec is required for compatibility reasons the Network tab -> VPN Type: "IPsec strongSwan" should be able to do what you want, albeit in a less than ideal text based configuration. More info: https://doc.astlinux-project.org/userdoc:tt_ipsec_vpn_strongswan ** The AstLinux Team is regularly upgrading packages containing security and bug fixes as well as adding new features of our own. -- Linux Kernel 4.19.160 (version bump), security and bug fixes -- OpenSSL, version bump to 1.1.1i, security fix: CVE-2020-1971 -- WireGuard VPN, module 1.0.20201221 (version bump), tools 1.0.20200827 (no change) -- libcurl (curl) version bump to 7.74.0, security fixes: CVE-2020-8284, CVE-2020-8285, CVE-2020-8286 -- getdns/stubby, remove package, replace getdns/stubby with unbound for DNS-over-TLS -- unbound, version bump to 1.13.0 -- rng-tools, jitterentropy version bump to 3.0.0 (2x improved performance on APU systems) -- miniupnpd, version 2.1, add Debian security fixes: CVE-2019-12107, CVE-2019-12108 CVE-2019-12109, CVE-2019-12110, CVE-2019-12111 -- sngrep, version bump to 1.4.8 -- Monit, version bump to 5.27.1 -- zabbix, version bump to 4.0.27 -- Asterisk 13.29.2 ('13se' no change) Older than latest Asterisk 13.x version but more tested, built --without-pjproject -- Asterisk 13.38.1 (version bump) and 16.15.1 (version bump) -- Add support for directory /var/spool/asterisk/outgoing_tmp for call file staging. -- Add support for persistent /mnt/kd/call-file/ directory for certain tmpfs spool directories. If the directory /mnt/kd/call-file/ exists, the following symlinks will automatically occur: == /var/spool/asterisk/outgoing -> /mnt/kd/call-file/outgoing == /var/spool/asterisk/outgoing_tmp -> /mnt/kd/call-file/outgoing_tmp == /var/spool/asterisk/outgoing_done -> /mnt/kd/call-file/outgoing_done -- Complete Pre-Release ChangeLog: https://s3.amazonaws.com/beta.astlinux-project/astlinux-changelog/ChangeLog.txt The "AstLinux Pre-Release ChangeLog" and "Pre-Release Repository URL" entries can be found under the "Development" tab of the AstLinux Project web site ... AstLinux Project -> Development https://www.astlinux-project.org/dev.html AstLinux Team |
From: Michael K. <mic...@ip...> - 2021-01-07 02:56:47
|
Whoops sorry Lonnie I forgot to respond to my post. Turns out they were using PPTP actually. Will move them to OpenVPN or Wireguard when I can get to it. Regards Michael Knill On 7/1/21, 12:46 pm, "Lonnie Abelbeck" <li...@lo...> wrote: Hi Michael, You might need to port forward UDP 500 (IKE) as well. I don't think you need "AH". Lonnie > On Jan 6, 2021, at 5:54 PM, Michael Knill <mic...@ip...> wrote: > > Hi Group > > I'm trying to set up L2TP Passthrough via Astlinux. > I have set Pass EXT->LAN Protocol: ESP Source: 0/0 Destination: 192.168.15.2 and Pass EXT->LAN Protocol: AH Source: 0/0 Destination: 192.168.15.2 > Is this correct? > > Regards > Michael Knill > _______________________________________________ > Astlinux-users mailing list > Ast...@li... > https://lists.sourceforge.net/lists/listinfo/astlinux-users > > Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... _______________________________________________ Astlinux-users mailing list Ast...@li... https://lists.sourceforge.net/lists/listinfo/astlinux-users Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... |
From: Lonnie A. <li...@lo...> - 2021-01-07 01:45:51
|
Hi Michael, You might need to port forward UDP 500 (IKE) as well. I don't think you need "AH". Lonnie > On Jan 6, 2021, at 5:54 PM, Michael Knill <mic...@ip...> wrote: > > Hi Group > > I'm trying to set up L2TP Passthrough via Astlinux. > I have set Pass EXT->LAN Protocol: ESP Source: 0/0 Destination: 192.168.15.2 and Pass EXT->LAN Protocol: AH Source: 0/0 Destination: 192.168.15.2 > Is this correct? > > Regards > Michael Knill > _______________________________________________ > Astlinux-users mailing list > Ast...@li... > https://lists.sourceforge.net/lists/listinfo/astlinux-users > > Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... |
From: Michael K. <mic...@ip...> - 2021-01-06 23:54:34
|
Hi Group I'm trying to set up L2TP Passthrough via Astlinux. I have set Pass EXT->LAN Protocol: ESP Source: 0/0 Destination: 192.168.15.2 and Pass EXT->LAN Protocol: AH Source: 0/0 Destination: 192.168.15.2 Is this correct? Regards Michael Knill |
From: Lonnie A. <li...@lo...> - 2020-12-31 19:39:15
|
> On Dec 31, 2020, at 11:19 AM, Daryl Richards via Astlinux-users <ast...@li...> wrote: > > > > On 2020-12-19 2:34 p.m., Lonnie Abelbeck wrote: >> Announcing AstLinux Pre-Release: astlinux-1.4-4940-797713 >> ** Request for Testing >> This pre-release replaces getdns/stubby with unbound for DNS-over-TLS functionality. The latest Unbound 1.13.0 >> adds TCP/TLS stream reuse and TCP fast open which were perviously only supported in stubby. Additionally, unbound offers a cache. >> We have heard reports stubby would "hiccup" and hang at times, depending on the upstream provider. >> Please report any issues (or successes) with this change. > > Just a note here that this version is working for me fine, and I would say that I hadn't even realized I might have been having DNS lookup issues related to using DoT but since this update it's become obvious. Much better now! > > -- > Daryl Richards > Isle Technical Services Inc. Thanks Daryl, your feedback is greatly appreciated! Lonnie |
From: Daryl R. <da...@is...> - 2020-12-31 17:38:25
|
On 2020-12-19 2:34 p.m., Lonnie Abelbeck wrote: > Announcing AstLinux Pre-Release: astlinux-1.4-4940-797713 > > ** Request for Testing > > This pre-release replaces getdns/stubby with unbound for DNS-over-TLS functionality. The latest Unbound 1.13.0 > adds TCP/TLS stream reuse and TCP fast open which were perviously only supported in stubby. Additionally, unbound offers a cache. > We have heard reports stubby would "hiccup" and hang at times, depending on the upstream provider. > Please report any issues (or successes) with this change. Just a note here that this version is working for me fine, and I would say that I hadn't even realized I might have been having DNS lookup issues related to using DoT but since this update it's become obvious. Much better now! -- Daryl Richards Isle Technical Services Inc. |
From: Lonnie A. <li...@lo...> - 2020-12-29 03:57:55
|
Hi Michael, No, a reboot is not needed after a Runnix upgrade. Though, on the development side, we always test new Runnix versions by rebooting after a Runnix upgrade to look for issues, so if you had an unusual box you might test one of them while you have console access to it. Lonnie > On Dec 28, 2020, at 8:48 PM, Michael Knill <mic...@ip...> wrote: > > Hi Group > > Just wondering if it is necessary/preferable to reboot after a Runnix upgrade. I have lots to do so it would be nice to not have to. > > Regards > Michael Knill |
From: Michael K. <mic...@ip...> - 2020-12-29 02:49:09
|
Hi Group Just wondering if it is necessary/preferable to reboot after a Runnix upgrade. I have lots to do so it would be nice to not have to. Regards Michael Knill |
From: Lonnie A. <li...@lo...> - 2020-12-19 19:35:17
|
Announcing AstLinux Pre-Release: astlinux-1.4-4940-797713 ** Request for Testing This pre-release replaces getdns/stubby with unbound for DNS-over-TLS functionality. The latest Unbound 1.13.0 adds TCP/TLS stream reuse and TCP fast open which were perviously only supported in stubby. Additionally, unbound offers a cache. We have heard reports stubby would "hiccup" and hang at times, depending on the upstream provider. Please report any issues (or successes) with this change. ** IMPORTANT NOTICE -- The ipsec-tools (racoon) support in AstLinux is deprecated, and will be removed in the near future. The development of ipsec-tools has been ABANDONED. The Network tab -> VPN Type: "IPsec Peers" and "IPsec Mobile" is the web interface configuration for ipsec-tools. The AstLinux Team suggests using either WireGuard or OpenVPN for your VPN needs, but if IPsec is required for compatibility reasons the Network tab -> VPN Type: "IPsec strongSwan" should be able to do what you want, albeit in a less than ideal text based configuration. More info: https://doc.astlinux-project.org/userdoc:tt_ipsec_vpn_strongswan ** The AstLinux Team is regularly upgrading packages containing security and bug fixes as well as adding new features of our own. -- Linux Kernel 4.19.160 (version bump), security and bug fixes -- OpenSSL, version bump to 1.1.1i, security fix: CVE-2020-1971 -- WireGuard VPN, module 1.0.20201112 (version bump), tools 1.0.20200827 (no change) -- libcurl (curl) version bump to 7.74.0, security fixes: CVE-2020-8284, CVE-2020-8285, CVE-2020-8286 -- getdns/stubby, remove package, replace getdns/stubby with unbound for DNS-over-TLS -- unbound, version bump to 1.13.0 -- rng-tools, jitterentropy version bump to 3.0.0 (2x improved performance on APU systems) -- miniupnpd, version 2.1, add Debian security fixes: CVE-2019-12107, CVE-2019-12108 CVE-2019-12109, CVE-2019-12110, CVE-2019-12111 -- sngrep, version bump to 1.4.8 -- Monit, version bump to 5.27.1 -- zabbix, version bump to 4.0.27 -- Asterisk 13.29.2 ('13se' no change) Older than latest Asterisk 13.x version but more tested, built --without-pjproject -- Asterisk 13.38.0 (version bump) and 16.15.0 (version bump) -- DAHDI, dahdi-linux 3.1.0 (no change) and dahdi-tools 3.1.0 (no change) -- pjsip 2.10 (no change) -- Add support for directory /var/spool/asterisk/outgoing_tmp for call file staging. -- Add support for persistent /mnt/kd/call-file/ directory for certain tmpfs spool directories. If the directory /mnt/kd/call-file/ exists, the following symlinks will automatically occur: == /var/spool/asterisk/outgoing -> /mnt/kd/call-file/outgoing == /var/spool/asterisk/outgoing_tmp -> /mnt/kd/call-file/outgoing_tmp == /var/spool/asterisk/outgoing_done -> /mnt/kd/call-file/outgoing_done -- Complete Pre-Release ChangeLog: https://s3.amazonaws.com/beta.astlinux-project/astlinux-changelog/ChangeLog.txt The "AstLinux Pre-Release ChangeLog" and "Pre-Release Repository URL" entries can be found under the "Development" tab of the AstLinux Project web site ... AstLinux Project -> Development https://www.astlinux-project.org/dev.html AstLinux Team |
From: nedi <ne...@gm...> - 2020-12-14 20:21:50
|
Hi, can anyone help me to get access on customer astlinux one old version 1.1.2 and Astrisk 1.8.22.0 the pbx is to far away from me about 300 km. i can ping the PBX, The PBX works but sometime after 5 second the customer told me that can't hear the caller. I tried with teamviewer to connect to pbx and reboot the pbx and can’t access it trough web and trough ssh and putty , I can ping it and get the Answear. can be te CF card damaged? regards Nedi |
From: Lonnie A. <li...@lo...> - 2020-12-12 14:25:25
|
Hi Michael, Thanks for the info, keep us updated. Mikrotik WireGuard support is a great development. Lonnie > On Dec 11, 2020, at 11:08 PM, Michael Knill <mic...@ip...> wrote: > > Hmm I would probably wait for a little while though as I have found a couple of annoying bugs ☹ > > Regards > Michael Knill > > From: Michael Knill <mic...@ip...> > Reply to: AstLinux List <ast...@li...> > Date: Saturday, 12 December 2020 at 3:49 pm > To: AstLinux List <ast...@li...> > Subject: [Astlinux-users] Mikrotik Wireguard VPN Endpoint > > Thought I would let the group that I have been testing Wireguard on Mikrotik (supported 7.1beta3) to Astlinux. > Working very well so far on a powerful and cost effective router out of the box. > > Regards > Michael Knill > _______________________________________________ > Astlinux-users mailing list > Ast...@li... > https://lists.sourceforge.net/lists/listinfo/astlinux-users > > Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... |
From: Michael K. <mic...@ip...> - 2020-12-12 05:08:25
|
Hmm I would probably wait for a little while though as I have found a couple of annoying bugs ☹ Regards Michael Knill From: Michael Knill <mic...@ip...> Reply to: AstLinux List <ast...@li...> Date: Saturday, 12 December 2020 at 3:49 pm To: AstLinux List <ast...@li...> Subject: [Astlinux-users] Mikrotik Wireguard VPN Endpoint Thought I would let the group that I have been testing Wireguard on Mikrotik (supported 7.1beta3) to Astlinux. Working very well so far on a powerful and cost effective router out of the box. Regards Michael Knill |
From: Michael K. <mic...@ip...> - 2020-12-12 04:48:41
|
Thought I would let the group that I have been testing Wireguard on Mikrotik (supported 7.1beta3) to Astlinux. Working very well so far on a powerful and cost effective router out of the box. Regards Michael Knill |
From: Michael K. <mic...@ip...> - 2020-12-09 06:37:53
|
Yes that is my default configuration but I don't think it is coincidence that it's the one with the hostname that goes down. Just need to find out why. Regards Michael Knill On 9/12/20, 12:04 pm, "Lonnie Abelbeck" <li...@lo...> wrote: Did you have this option checked in the WireGuard Config over PPPoE ? -- DNS Update: _x_ Continually Update DNS Endpoints for peers -- As long as the DNS A record did not change, the PPPoE connection could go down and return and all would be fine. Without the need for the "DNS Update" option to be checked. But, if the PPPoE connection was down, AND you restarted WireGuard, then the WG Endpoint would be unknown, and later if PPPoE returned, without the above option checked, the DNS endpoint would never be found. Understand, the cause of the above scenario is restarting WireGuard. If the only problem was the PPPoE connection was down, and it eventually returned, the WireGuard tunnel should come back as well without the need for the "DNS Update" option to be checked. But, if the WG DNS endpoint was some sort of dynamic DNS or could easily change, then the "DNS Update" option should be checked. Bottom line, if this ever happens again, first determine if the PPPoE connection under WireGuard is active and working before taking any actions. Lonnie > On Dec 8, 2020, at 6:27 PM, Michael Knill <mic...@ip...> wrote: > > Hmm just had a thought on this one. > The secondary WG VPN is different to the primary in that is uses a hostname rather than an IP Address. > Wonder if PPPoE was down then no DNS resolution and maybe cannot find Endpoint? > > Regards > Michael Knill > > On 8/12/20, 9:28 am, "Michael Knill" <mic...@ip...> wrote: > > Hi Lonnie > > Network connectivity was fine. I remotely accessed the box and the other Wireguard VPN was active! > I will try a pppoe-restart directly next time but I'm not hopeful. > Weird one. > > Regards > Michael Knill > > On 8/12/20, 9:24 am, "Lonnie Abelbeck" <li...@lo...> wrote: > > > >> On Dec 7, 2020, at 3:29 PM, Michael Knill <mic...@ip...> wrote: >> >> Hi Group >> >> I use Wireguard VPN to connect to both my primary and secondary softswitch from Astlinux. >> Two of my sites went down last night (same provider and at the same time) and for both of them the secondary Wireguard VPN did not re-establish. >> I tried the following to no avail: >> • Wireguard restart >> • Firewall reload >> • service network restart >> • pppoe-restart >> >> I eventually had to reboot the box before it came up again. Any ideas for next time it happens rather than a reboot? >> >> Thanks >> >> Regards >> Michael Knill > > Off hand, I'm not sure, but don't do a "service network restart", that may have caused issues requiring a reboot. > > I would typically blame PPPoE :-) Using "pppoe-restart" is a good idea. > > If you knew if the link had an active internet connection (or not) that would be great info. > > Lonnie > > > > > > > _______________________________________________ > Astlinux-users mailing list > Ast...@li... > https://lists.sourceforge.net/lists/listinfo/astlinux-users > > Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... > > > _______________________________________________ > Astlinux-users mailing list > Ast...@li... > https://lists.sourceforge.net/lists/listinfo/astlinux-users > > Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... > > > _______________________________________________ > Astlinux-users mailing list > Ast...@li... > https://lists.sourceforge.net/lists/listinfo/astlinux-users > > Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... _______________________________________________ Astlinux-users mailing list Ast...@li... https://lists.sourceforge.net/lists/listinfo/astlinux-users Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... |
From: Lonnie A. <li...@lo...> - 2020-12-09 01:04:22
|
Did you have this option checked in the WireGuard Config over PPPoE ? -- DNS Update: _x_ Continually Update DNS Endpoints for peers -- As long as the DNS A record did not change, the PPPoE connection could go down and return and all would be fine. Without the need for the "DNS Update" option to be checked. But, if the PPPoE connection was down, AND you restarted WireGuard, then the WG Endpoint would be unknown, and later if PPPoE returned, without the above option checked, the DNS endpoint would never be found. Understand, the cause of the above scenario is restarting WireGuard. If the only problem was the PPPoE connection was down, and it eventually returned, the WireGuard tunnel should come back as well without the need for the "DNS Update" option to be checked. But, if the WG DNS endpoint was some sort of dynamic DNS or could easily change, then the "DNS Update" option should be checked. Bottom line, if this ever happens again, first determine if the PPPoE connection under WireGuard is active and working before taking any actions. Lonnie > On Dec 8, 2020, at 6:27 PM, Michael Knill <mic...@ip...> wrote: > > Hmm just had a thought on this one. > The secondary WG VPN is different to the primary in that is uses a hostname rather than an IP Address. > Wonder if PPPoE was down then no DNS resolution and maybe cannot find Endpoint? > > Regards > Michael Knill > > On 8/12/20, 9:28 am, "Michael Knill" <mic...@ip...> wrote: > > Hi Lonnie > > Network connectivity was fine. I remotely accessed the box and the other Wireguard VPN was active! > I will try a pppoe-restart directly next time but I'm not hopeful. > Weird one. > > Regards > Michael Knill > > On 8/12/20, 9:24 am, "Lonnie Abelbeck" <li...@lo...> wrote: > > > >> On Dec 7, 2020, at 3:29 PM, Michael Knill <mic...@ip...> wrote: >> >> Hi Group >> >> I use Wireguard VPN to connect to both my primary and secondary softswitch from Astlinux. >> Two of my sites went down last night (same provider and at the same time) and for both of them the secondary Wireguard VPN did not re-establish. >> I tried the following to no avail: >> • Wireguard restart >> • Firewall reload >> • service network restart >> • pppoe-restart >> >> I eventually had to reboot the box before it came up again. Any ideas for next time it happens rather than a reboot? >> >> Thanks >> >> Regards >> Michael Knill > > Off hand, I'm not sure, but don't do a "service network restart", that may have caused issues requiring a reboot. > > I would typically blame PPPoE :-) Using "pppoe-restart" is a good idea. > > If you knew if the link had an active internet connection (or not) that would be great info. > > Lonnie > > > > > > > _______________________________________________ > Astlinux-users mailing list > Ast...@li... > https://lists.sourceforge.net/lists/listinfo/astlinux-users > > Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... > > > _______________________________________________ > Astlinux-users mailing list > Ast...@li... > https://lists.sourceforge.net/lists/listinfo/astlinux-users > > Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... > > > _______________________________________________ > Astlinux-users mailing list > Ast...@li... > https://lists.sourceforge.net/lists/listinfo/astlinux-users > > Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... |
From: Michael K. <mic...@ip...> - 2020-12-09 00:28:00
|
Hmm just had a thought on this one. The secondary WG VPN is different to the primary in that is uses a hostname rather than an IP Address. Wonder if PPPoE was down then no DNS resolution and maybe cannot find Endpoint? Regards Michael Knill On 8/12/20, 9:28 am, "Michael Knill" <mic...@ip...> wrote: Hi Lonnie Network connectivity was fine. I remotely accessed the box and the other Wireguard VPN was active! I will try a pppoe-restart directly next time but I'm not hopeful. Weird one. Regards Michael Knill On 8/12/20, 9:24 am, "Lonnie Abelbeck" <li...@lo...> wrote: > On Dec 7, 2020, at 3:29 PM, Michael Knill <mic...@ip...> wrote: > > Hi Group > > I use Wireguard VPN to connect to both my primary and secondary softswitch from Astlinux. > Two of my sites went down last night (same provider and at the same time) and for both of them the secondary Wireguard VPN did not re-establish. > I tried the following to no avail: > • Wireguard restart > • Firewall reload > • service network restart > • pppoe-restart > > I eventually had to reboot the box before it came up again. Any ideas for next time it happens rather than a reboot? > > Thanks > > Regards > Michael Knill Off hand, I'm not sure, but don't do a "service network restart", that may have caused issues requiring a reboot. I would typically blame PPPoE :-) Using "pppoe-restart" is a good idea. If you knew if the link had an active internet connection (or not) that would be great info. Lonnie _______________________________________________ Astlinux-users mailing list Ast...@li... https://lists.sourceforge.net/lists/listinfo/astlinux-users Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... _______________________________________________ Astlinux-users mailing list Ast...@li... https://lists.sourceforge.net/lists/listinfo/astlinux-users Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... |
From: Michael K. <mic...@ip...> - 2020-12-07 22:28:24
|
Hi Lonnie Network connectivity was fine. I remotely accessed the box and the other Wireguard VPN was active! I will try a pppoe-restart directly next time but I'm not hopeful. Weird one. Regards Michael Knill On 8/12/20, 9:24 am, "Lonnie Abelbeck" <li...@lo...> wrote: > On Dec 7, 2020, at 3:29 PM, Michael Knill <mic...@ip...> wrote: > > Hi Group > > I use Wireguard VPN to connect to both my primary and secondary softswitch from Astlinux. > Two of my sites went down last night (same provider and at the same time) and for both of them the secondary Wireguard VPN did not re-establish. > I tried the following to no avail: > • Wireguard restart > • Firewall reload > • service network restart > • pppoe-restart > > I eventually had to reboot the box before it came up again. Any ideas for next time it happens rather than a reboot? > > Thanks > > Regards > Michael Knill Off hand, I'm not sure, but don't do a "service network restart", that may have caused issues requiring a reboot. I would typically blame PPPoE :-) Using "pppoe-restart" is a good idea. If you knew if the link had an active internet connection (or not) that would be great info. Lonnie _______________________________________________ Astlinux-users mailing list Ast...@li... https://lists.sourceforge.net/lists/listinfo/astlinux-users Donations to support AstLinux are graciously accepted via PayPal to pa...@kr.... |
From: Lonnie A. <li...@lo...> - 2020-12-07 22:23:41
|
> On Dec 7, 2020, at 3:29 PM, Michael Knill <mic...@ip...> wrote: > > Hi Group > > I use Wireguard VPN to connect to both my primary and secondary softswitch from Astlinux. > Two of my sites went down last night (same provider and at the same time) and for both of them the secondary Wireguard VPN did not re-establish. > I tried the following to no avail: > • Wireguard restart > • Firewall reload > • service network restart > • pppoe-restart > > I eventually had to reboot the box before it came up again. Any ideas for next time it happens rather than a reboot? > > Thanks > > Regards > Michael Knill Off hand, I'm not sure, but don't do a "service network restart", that may have caused issues requiring a reboot. I would typically blame PPPoE :-) Using "pppoe-restart" is a good idea. If you knew if the link had an active internet connection (or not) that would be great info. Lonnie |
From: Michael K. <mic...@ip...> - 2020-12-07 21:29:39
|
Hi Group I use Wireguard VPN to connect to both my primary and secondary softswitch from Astlinux. Two of my sites went down last night (same provider and at the same time) and for both of them the secondary Wireguard VPN did not re-establish. I tried the following to no avail: * Wireguard restart * Firewall reload * service network restart * pppoe-restart I eventually had to reboot the box before it came up again. Any ideas for next time it happens rather than a reboot? Thanks Regards Michael Knill |
From: Lonnie A. <li...@lo...> - 2020-12-04 20:20:28
|
Hi AstLinux Users and Devs, Ever since AstLinux version 0.6.0 (2008-08-30) the IPsec VPN was supported using the ipsec-tools (racoon) package. To this day, the Network tab -> VPN Type: "IPsec Peers" and "IPsec Mobile" supports a web interface configuration for ipsec-tools. Notice: The ipsec-tools (racoon) support in AstLinux is deprecated, and will be removed in the near future. As an alternative solution, AstLinux IPsec VPN users can use the Network tab -> VPN Type: "IPsec strongSwan" This email is to give notice that VPN Type: "IPsec Peers" and "IPsec Mobile" support is deprecated, also the AstLinux Team would like to know how common this implementation is being used today. Please respond to this email if you are using the VPN Type: "IPsec Peers" and/or "IPsec Mobile". Justification: A) "The development of ipsec-tools has been ABANDONED." [1] B) Buidroot has removed the ipsec-tools package [2] C) Debian 10 (buster) no longer includes ipsec-tools (racoon). The AstLinux Team suggests using either WireGuard or OpenVPN for your VPN needs, but if IPsec is required for compatibility reasons the Network tab -> VPN Type: "IPsec strongSwan" should be able to do what you want, albeit in a less than ideal text based configuration. More Info: IPsec VPN (strongSwan) Configuration https://doc.astlinux.org/userdoc:tt_ipsec_vpn_strongswan AstLinux Team [1] http://ipsec-tools.sourceforge.net/ [2] https://git.busybox.net/buildroot/commit/?id=a3f58a74e0094bbf960ca9f4161c492b00a849ef |
From: Turritopsis D. T. En M. <ce...@te...> - 2020-11-30 15:32:09
|
Subject: How to DIY Open Source IP PBX Appliance? Good day from Singapore, The following is an excerpt from Wikipedia: "Asterisk is a core component in many commercial products and open-source projects. Some of the commercial products are hardware and software bundles, for which the manufacturer supports and releases the software with an open-source distribution model. AskoziaPBX, a fork of the m0n0wall project, uses Asterisk PBX software to realize all telephony functions. AstLinux is a "Network Appliance for Communications" open-source software distribution.[15] FreePBX, an open-source graphical user interface, bundles Asterisk as the core of its FreePBX Distro[16] LinuxMCE bundles Asterisk to provide telephony; there is also an embedded version of Asterisk for OpenWrt routers. PBX in a Flash/Incredible PBX and trixbox are software PBXes based on Asterisk. Elastix previously used Asterisk, HylaFAX, Openfire and Postfix to offer PBX, fax, instant messaging and email functions, respectively, before switching to 3CX. Issabel is an open-source Unified Communications software which uses Asterisk for telephony functions. It was forked from the open-source versions of Elastix when 3CX acquired it. *astTECS uses Asterisk in its VoIP and mobile gateways." I would like to DIY an IP PBX appliance using free open source projects. Which free open source project would you recommend me to use to DIY my IP PBX appliance? Please refer me to very good, detailed and well explained guides/tutorials/manuals on setting up open source IP PBX appliances. Lastly, please recommend me a cheap and affordable IP phone (suggest brand and model) to go along with my DIY open source IP PBX appliance. Mr. Turritopsis Dohrnii Teo En Ming, 42 years as of 30 November 2020 Monday, is a TARGETED INDIVIDUAL (TI) living in Singapore. Thank you very much. -- -----BEGIN EMAIL SIGNATURE----- The Gospel for all Targeted Individuals (TIs): [The New York Times] Microwave Weapons Are Prime Suspect in Ills of U.S. Embassy Workers Link: https://www.nytimes.com/2018/09/01/science/sonic-attack-cuba-microwave.html ******************************************************************************************** Singaporean Targeted Individual Mr. Turritopsis Dohrnii Teo En Ming's Academic Qualifications as at 14 Feb 2019 and refugee seeking attempts at the United Nations Refugee Agency Bangkok (21 Mar 2017), in Taiwan (5 Aug 2019) and Australia (25 Dec 2019 to 9 Jan 2020): [1] https://tdtemcerts.wordpress.com/ [2] https://tdtemcerts.blogspot.sg/ [3] https://www.scribd.com/user/270125049/Teo-En-Ming -----END EMAIL SIGNATURE----- |