xTITUSMAXIMUSX / iocage-plugin-nxfilter

Artifact files for NxFilter iocage plugin
0 stars 0 forks source link

Post Install Script Not Downlaoding Nxfilter.zip #2

Closed jasker5183 closed 2 years ago

jasker5183 commented 2 years ago

The post install script from this artifact is leaving the /usr/local/nxfilter directory empty on plugin install, which means it doesn't work.

Thanks.

xTITUSMAXIMUSX commented 2 years ago

Thanks for bringing to to my attention. Let me take a look!

xTITUSMAXIMUSX commented 2 years ago

Looks like my grep to find the latest version was finding 2 entries. piped out " head -1" to pull one the first entry and it I tested the deployment with success!

jasker5183 commented 2 years ago

Just tested using this and I get:

Checking nxfilter.org for the latest version
fetch: http://pub.nxfilter.org/nxfilter-.zip: Not Found
fetch: http://pub.nxfilter.org/nxfilter-.zip: Not Found
tar: Error opening archive: Failed to open 'nxfilter-.zip'
tar: Error opening archive: Failed to open 'nxfilter-.zip'
/etc/rc.d/nxfilter                                     904  B 6588 kBps    00s
Downloading NxFilter...Downloading NxFilter... ok
Installing NxFilter in /usr/local/nxfilter... ok
Installing NxFilter in /usr/local/nxfilter... ok
Downloading service script... ok
Downloading service script... ok
/etc/rc.d/nxfilter                                     904  B 6588 kBps    00s
 ok
chmod: /usr/local/nxfilter/bin/*.sh: No such file or directory
chmod: /usr/local/nxfilter/bin/*.sh: No such file or directory
Enabling the NxFilter service...nxfilter_enable:  -> YES
chmod: /usr/local/nxfilter/bin/*.sh: No such file or directory
chmod: /usr/local/nxfilter/bin/*.sh: No such file or directory
 ok
Starting the NxFilter service...Starting NxFilter...
chmod: /usr/local/nxfilter/bin/*.sh: No such file or directory
Starting NxFilter...
eval: /usr/local/nxfilter/bin/startup.sh: not found
All done!
eval: /usr/local/nxfilter/bin/startup.sh: not found

Admin Portal:
http://192.168.0.151/admin

Still not working.

xTITUSMAXIMUSX commented 2 years ago

Interesting. Here is my output. I used the official way to deploy plugins in truenas.

Plugin installed successfully
Install Notes:

Checking nxfilter.org for the latest version

nxfilter-4.6.3.1.zip 46 MB 26 MBps 02s

46 MB 26 MBps 02s

46 MB 26 MBps 02s

/etc/rc.d/nxfilter 904 B 6130 kBps 00s

Downloading NxFilter...Downloading NxFilter...Downloading NxFilter... ok

Installing NxFilter in /usr/local/nxfilter... ok

Downloading service script... ok

Downloading service script... ok

/etc/rc.d/nxfilter 904 B 6130 kBps 00s

/etc/rc.d/nxfilter 904 B 6130 kBps 00s

Enabling the NxFilter service...nxfilter_enable: -> YES

/etc/rc.d/nxfilter 904 B 6130 kBps 00s

/etc/rc.d/nxfilter 904 B 6130 kBps 00s

ok

Starting the NxFilter service...Starting NxFilter...

/etc/rc.d/nxfilter 904 B 6130 kBps 00s

All done!

/etc/rc.d/nxfilter 904 B 6130 kBps 00s

Admin Portal:

http://192.168.13.30/admin
xTITUSMAXIMUSX commented 2 years ago

Could you try to run this command and see if you get an output? curl -sL 'https://nxfilter.org/p3/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1

jasker5183 commented 2 years ago

Output of curl command is nothing:

root@nxfilter:~ # curl -sL 'https://nxfilter.org/p3/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
root@nxfilter:~ # 

Nothing is downloaded either.

xTITUSMAXIMUSX commented 2 years ago

Are you by chance blocking nxfilter.org at the firewall level?

jasker5183 commented 2 years ago

Are you by chance blocking nxfilter.org at the firewall level?

root@nxfilter:~ # ping nxfilter.org
PING nxfilter.org (70.32.23.79): 56 data bytes
64 bytes from 70.32.23.79: icmp_seq=0 ttl=52 time=69.951 ms
64 bytes from 70.32.23.79: icmp_seq=1 ttl=51 time=69.317 ms
64 bytes from 70.32.23.79: icmp_seq=2 ttl=51 time=69.578 ms
^C
--- nxfilter.org ping statistics ---
4 packets transmitted, 3 packets received, 25.0% packet loss
round-trip min/avg/max/stddev = 69.317/69.615/69.951/0.260 ms

Shouldn't be.

xTITUSMAXIMUSX commented 2 years ago

I think there is something in between not allowing you to get the version number. I can successfully get an output when I run that command.

$curl -sL 'https://nxfilter.org/p3/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
4.6.3.1
jasker5183 commented 2 years ago

I'm running all this from a jail running 13.1, could it be something to do with 13.1-RELEASE?

jasker5183 commented 2 years ago

When I run curl command with verbosity:

root@nxfilter:~ # curl -sLv 'https://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
*   Trying 70.32.23.79:443...
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* ALPN: offers h2
* ALPN: offers http/1.1
*  CAfile: /usr/local/share/certs/ca-root-nss.crt
*  CApath: none
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4586 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN: server accepted h2
* Server certificate:
*  subject: CN=*.nxfilter.org
*  start date: Feb 17 00:00:00 2022 GMT
*  expire date: Feb 17 23:59:59 2023 GMT
*  subjectAltName: host "nxfilter.org" matched cert's "nxfilter.org"
*  issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
*  SSL certificate verify ok.
* Using HTTP2, server supports multiplexing
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
} [5 bytes data]
* h2h3 [:method: GET]
* h2h3 [:path: /p4/download]
* h2h3 [:scheme: https]
* h2h3 [:authority: nxfilter.org]
* h2h3 [user-agent: curl/7.84.0]
* h2h3 [accept: */*]
* h2h3 [x-requested-with: XMLHttpRequest]
* Using Stream ID: 1 (easy handle 0x8014f4800)
} [5 bytes data]
> GET /p4/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.84.0
> accept: */*
> x-requested-with: XMLHttpRequest
> 
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* old SSL session ID is stale, removing
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
} [5 bytes data]
< HTTP/2 200 
< date: Sat, 13 Aug 2022 17:43:31 GMT
< content-type: text/html
< server: imunify360-webshield/1.18
< last-modified: Saturday, 13-Aug-2022 17:43:31 GMT
< cache-control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
< cf-edge-cache: no-cache
< 
{ [1306 bytes data]
* Connection #0 to host nxfilter.org left intact
xTITUSMAXIMUSX commented 2 years ago

I have a test 13.1 instance I was using and didn't have an issue. Here is my output with verbose. It looks like its using TLSv1.3 which I wouldn't think would matter? Mine used TLSv1.2

$curl -sLv 'https://nxfilter.org/p3/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
*   Trying 70.32.23.79:443...
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
*  CAfile: /etc/ssl/certs/ca-certificates.crt
*  CApath: /etc/ssl/certs
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4586 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=*.nxfilter.org
*  start date: Feb 17 00:00:00 2022 GMT
*  expire date: Feb 17 23:59:59 2023 GMT
*  subjectAltName: host "nxfilter.org" matched cert's "nxfilter.org"
*  issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
*  SSL certificate verify ok.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x55e7d5192e80)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /p3/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.81.0
> accept: */*
> x-requested-with: XMLHttpRequest
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 301 
< content-type: text/html
< content-length: 707
< date: Sat, 13 Aug 2022 17:48:04 GMT
< server: LiteSpeed
< location: https://nxfilter.org/p4/download
< strict-transport-security: max-age=63072000; includeSubDomains
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
< alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
< 
* Ignoring the response-body
{ [707 bytes data]
* Connection #0 to host nxfilter.org left intact
* Issue another request to this URL: 'https://nxfilter.org/p4/download'
* Found bundle for host nxfilter.org: 0x55e7d518bff0 [can multiplex]
* Re-using existing connection! (#0) with host nxfilter.org
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* Using Stream ID: 3 (easy handle 0x55e7d5192e80)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /p4/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.81.0
> accept: */*
> x-requested-with: XMLHttpRequest
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 301 
< x-powered-by: PHP/7.3.33
< content-type: text/html; charset=UTF-8
< x-redirect-by: WordPress
< location: https://nxfilter.org/p4/download/
< content-length: 0
< date: Sat, 13 Aug 2022 17:48:04 GMT
< server: LiteSpeed
< strict-transport-security: max-age=63072000; includeSubDomains
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
< 
{ [0 bytes data]
* Connection #0 to host nxfilter.org left intact
* Issue another request to this URL: 'https://nxfilter.org/p4/download/'
* Found bundle for host nxfilter.org: 0x55e7d518bff0 [can multiplex]
* Re-using existing connection! (#0) with host nxfilter.org
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* Using Stream ID: 5 (easy handle 0x55e7d5192e80)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /p4/download/ HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.81.0
> accept: */*
> x-requested-with: XMLHttpRequest
> 
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200 
< x-powered-by: PHP/7.3.33
< content-type: text/html; charset=UTF-8
< link: <https://nxfilter.org/p4/wp-json/>; rel="https://api.w.org/"
< link: <https://nxfilter.org/p4/wp-json/wp/v2/pages/12179>; rel="alternate"; type="application/json"
< link: <https://nxfilter.org/p4/?p=12179>; rel=shortlink
< date: Sat, 13 Aug 2022 17:48:04 GMT
< server: LiteSpeed
< strict-transport-security: max-age=63072000; includeSubDomains
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
< 
{ [1180 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host nxfilter.org left intact
4.6.3.1
xTITUSMAXIMUSX commented 2 years ago

wait can you try to run this curl command? It is using p4 rather than p3 in the uri.

curl -sLv 'https://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1

jasker5183 commented 2 years ago

Tried that already, but here is the same output:

root@nxfilter:~ # curl -sLv 'https://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
*   Trying 70.32.23.79:443...
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* ALPN: offers h2
* ALPN: offers http/1.1
*  CAfile: /usr/local/share/certs/ca-root-nss.crt
*  CApath: none
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4586 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN: server accepted h2
* Server certificate:
*  subject: CN=*.nxfilter.org
*  start date: Feb 17 00:00:00 2022 GMT
*  expire date: Feb 17 23:59:59 2023 GMT
*  subjectAltName: host "nxfilter.org" matched cert's "nxfilter.org"
*  issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
*  SSL certificate verify ok.
* Using HTTP2, server supports multiplexing
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
} [5 bytes data]
* h2h3 [:method: GET]
* h2h3 [:path: /p4/download]
* h2h3 [:scheme: https]
* h2h3 [:authority: nxfilter.org]
* h2h3 [user-agent: curl/7.84.0]
* h2h3 [accept: */*]
* h2h3 [x-requested-with: XMLHttpRequest]
* Using Stream ID: 1 (easy handle 0x8014f4800)
} [5 bytes data]
> GET /p4/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.84.0
> accept: */*
> x-requested-with: XMLHttpRequest
> 
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* old SSL session ID is stale, removing
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
} [5 bytes data]
< HTTP/2 200 
< date: Sat, 13 Aug 2022 17:56:42 GMT
< content-type: text/html
< server: imunify360-webshield/1.18
< last-modified: Saturday, 13-Aug-2022 17:56:42 GMT
< cache-control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
< cf-edge-cache: no-cache
< 
{ [1459 bytes data]
* Connection #0 to host nxfilter.org left intact
xTITUSMAXIMUSX commented 2 years ago

Is your truenas behind a proxy by chance?

jasker5183 commented 2 years ago

I am using a VPN.

xTITUSMAXIMUSX commented 2 years ago

Is it possible you could test without your truenas being on the VPN? You can always put it back on the VPN after testing.

jasker5183 commented 2 years ago

Not really possible, without bypassing vpn killswitch and disabling pretty much all firewall rules.

xTITUSMAXIMUSX commented 2 years ago

OK, so I enabled a test box to use an external VPN service which is also using TLSv1.3 and I can still get the version number. This is pretty strange behavior. I wanted to see if we could isolate the issue to your VPN but, without a test box sitting outside the VPN I'm not really sure what else to test at the moment.

$ curl -sLv 'https://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
*   Trying 70.32.23.79:443...
* TCP_NODELAY set
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
*   CAfile: /etc/ssl/certs/ca-certificates.crt
  CApath: /etc/ssl/certs
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4586 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
*  subject: CN=*.nxfilter.org
*  start date: Feb 17 00:00:00 2022 GMT
*  expire date: Feb 17 23:59:59 2023 GMT
*  subjectAltName: host "nxfilter.org" matched cert's "nxfilter.org"
*  issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
*  SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x5566ebdcc7e0)
} [5 bytes data]
> GET /p4/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.68.0
> accept: */*
> x-requested-with: XMLHttpRequest
> 
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 100)!
} [5 bytes data]
< HTTP/2 301 
< x-powered-by: PHP/7.3.33
< content-type: text/html; charset=UTF-8
< x-redirect-by: WordPress
< location: https://nxfilter.org/p4/download/
< content-length: 0
< date: Sat, 13 Aug 2022 18:10:23 GMT
< server: LiteSpeed
< strict-transport-security: max-age=63072000; includeSubDomains
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
< alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
< 
{ [0 bytes data]
* Connection #0 to host nxfilter.org left intact
* Issue another request to this URL: 'https://nxfilter.org/p4/download/'
* Found bundle for host nxfilter.org: 0x5566ebdc0e70 [can multiplex]
* Re-using existing connection! (#0) with host nxfilter.org
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* Using Stream ID: 3 (easy handle 0x5566ebdcc7e0)
} [5 bytes data]
> GET /p4/download/ HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.68.0
> accept: */*
> x-requested-with: XMLHttpRequest
> 
{ [5 bytes data]
< HTTP/2 200 
< x-powered-by: PHP/7.3.33
< content-type: text/html; charset=UTF-8
< link: <https://nxfilter.org/p4/wp-json/>; rel="https://api.w.org/"
< link: <https://nxfilter.org/p4/wp-json/wp/v2/pages/12179>; rel="alternate"; type="application/json"
< link: <https://nxfilter.org/p4/?p=12179>; rel=shortlink
< date: Sat, 13 Aug 2022 18:10:23 GMT
< server: LiteSpeed
< strict-transport-security: max-age=63072000; includeSubDomains
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
< 
{ [1180 bytes data]
* Connection #0 to host nxfilter.org left intact
4.6.3.1
jasker5183 commented 2 years ago

I would say that being behind a vpn is is the problem tried with main computer on vpn got the same thing, went around the vpn and was able to get the version number. I guess nxfilter.org is blocking vpn's somehow?

xTITUSMAXIMUSX commented 2 years ago

that could be possible or your VPN is blocking that part of the site. I noticed if you try to browse to https://pub.nxfilter.org/nxfilter-4.6.3.1.zip there are certificate errors. You could try to use http://nxfilter.org/p4/download to see if that resolves the issue in the curl command?

jasker5183 commented 2 years ago

I don't know if this is what you meant?:

root@nxfilter:~ # curl -sLv http://pub.nxfilter.org/nxfilter-4.6.3.1.zip
*   Trying 68.66.205.245:80...
* Connected to pub.nxfilter.org (68.66.205.245) port 80 (#0)
> GET /nxfilter-4.6.3.1.zip HTTP/1.1
> Host: pub.nxfilter.org
> User-Agent: curl/7.84.0
> Accept: */*
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Server: nginx/1.10.3 (Ubuntu)
< Date: Sat, 13 Aug 2022 18:21:37 GMT
< Content-Type: application/zip
< Content-Length: 48342091
< Last-Modified: Sat, 06 Aug 2022 06:03:28 GMT
< Connection: keep-alive
< ETag: "62ee0430-2e1a44b"
< Accept-Ranges: bytes
< 
* Failure writing output to destination
* Closing connection 0
xTITUSMAXIMUSX commented 2 years ago

My fault I meant run this. curl -sLv 'http://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1

jasker5183 commented 2 years ago

Doesn't seem to make a difference:

root@nxfilter:~ # curl -sLv 'https://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
*   Trying 70.32.23.79:443...
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* ALPN: offers h2
* ALPN: offers http/1.1
*  CAfile: /usr/local/share/certs/ca-root-nss.crt
*  CApath: none
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4586 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN: server accepted h2
* Server certificate:
*  subject: CN=*.nxfilter.org
*  start date: Feb 17 00:00:00 2022 GMT
*  expire date: Feb 17 23:59:59 2023 GMT
*  subjectAltName: host "nxfilter.org" matched cert's "nxfilter.org"
*  issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
*  SSL certificate verify ok.
* Using HTTP2, server supports multiplexing
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
} [5 bytes data]
* h2h3 [:method: GET]
* h2h3 [:path: /p4/download]
* h2h3 [:scheme: https]
* h2h3 [:authority: nxfilter.org]
* h2h3 [user-agent: curl/7.84.0]
* h2h3 [accept: */*]
* h2h3 [x-requested-with: XMLHttpRequest]
* Using Stream ID: 1 (easy handle 0x8014f4800)
} [5 bytes data]
> GET /p4/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.84.0
> accept: */*
> x-requested-with: XMLHttpRequest
> 
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* old SSL session ID is stale, removing
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
} [5 bytes data]
< HTTP/2 200 
< date: Sat, 13 Aug 2022 18:30:03 GMT
< content-type: text/html
< server: imunify360-webshield/1.18
< last-modified: Saturday, 13-Aug-2022 18:30:03 GMT
< cache-control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
< cf-edge-cache: no-cache
< 
{ [1341 bytes data]
* Connection #0 to host nxfilter.org left intact
root@nxfilter:~ # curl -sLv 'http://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
*   Trying 70.32.23.79:80...
* Connected to nxfilter.org (70.32.23.79) port 80 (#0)
> GET /p4/download HTTP/1.1
> Host: nxfilter.org
> User-Agent: curl/7.84.0
> Accept: */*
> X-Requested-With: XMLHttpRequest
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Sat, 13 Aug 2022 18:30:34 GMT
< Content-Type: text/html
< Transfer-Encoding: chunked
< Connection: close
< Server: imunify360-webshield/1.18
< Last-Modified: Saturday, 13-Aug-2022 18:30:34 GMT
< Cache-Control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
< cf-edge-cache: no-cache
< 
{ [1430 bytes data]
* Closing connection 0

Guess this webserver really hates curl (behind a vpn).

xTITUSMAXIMUSX commented 2 years ago

Looks like you still had https in the command. Make sure you are using http://nxfilter.org/p4/download

EDIT: oops I didn't scroll far enough down. HMMMM. I'm not sure where to go from here.

jasker5183 commented 2 years ago

Thought I copied the command properly, here is output:

root@nxfilter:~ # curl -sLv 'http://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
*   Trying 70.32.23.79:80...
* Connected to nxfilter.org (70.32.23.79) port 80 (#0)
> GET /p4/download HTTP/1.1
> Host: nxfilter.org
> User-Agent: curl/7.84.0
> Accept: */*
> X-Requested-With: XMLHttpRequest
> 
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Sat, 13 Aug 2022 18:36:32 GMT
< Content-Type: text/html
< Transfer-Encoding: chunked
< Connection: close
< Server: imunify360-webshield/1.18
< Last-Modified: Saturday, 13-Aug-2022 18:36:32 GMT
< Cache-Control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
< cf-edge-cache: no-cache
< 
{ [1446 bytes data]
* Closing connection 0
jasker5183 commented 2 years ago

Maybe just put a note on the curl part of that script that certain vpn's or proxies will cause this command to fail. I'm expecting that the next time the Cirrus test gets run it'll be a pass.

xTITUSMAXIMUSX commented 2 years ago

I am curious if you run curl -sL http://nxfilter.org/p4/download what the output is. If you get a good output then run curl -sL http://nxfilter.org/p4/download | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip"

jasker5183 commented 2 years ago
root@nxfilter:~ # curl -sL http://nxfilter.org/p4/download
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<meta name="robots" content="noindex, nofollow">
<title>One moment, please...</title>
<style>
body {
root@nxfilter:~ # curl -sL http://nxfilter.org/p4/download                                                                        
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<meta name="robots" content="noindex, nofollow">
<title>One moment, please...</title>
<style>
body {
    background: #F6F7F8;
    color: #303131;
    font-family: sans-serif;
    margin-top: 45vh;
    text-align: center;
}
</style>
</head>
<body>
<h1>Please wait while your request is being verified...</h1>
<form id="wsidchk-form" style="display:none;" action="/z0f76a1d14fd21a8fb5fd0d03e0fdc3d3cedae52f" method="get">
<input type="hidden" id="wsidchk" name="wsidchk"/>
</form>
<script>
(function(){
    var west=+((+!+[])+(+!+[]+!![]+!![]+[])+(+!+[])+(+!+[]+!![]+!![]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+[])),
        east=+((+!+[]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+[])+(+![])+(+![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![])),
        x=function(){try{return !!window.addEventListener;}catch(e){return !!0;} },
        y=function(y,z){x() ? document.addEventListener("DOMContentLoaded",y,z) : document.attachEvent("onreadystatechange",y);};
    y(function(){
        document.getElementById('wsidchk').value = west + east;
        document.getElementById('wsidchk-form').submit();
    }, false);
})();
</script>
</body>
</html>root@nxfilter:~ # 
root@nxfilter:~ # curl -sL http://nxfilter.org/p4/download | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip"
root@nxfilter:~ # 
xTITUSMAXIMUSX commented 2 years ago

Ahhhh yeah. Your VPN completely cutting out a huge chunk of the HTML page OR maybe curl just isn't cutting it? Install wget in your jail and run wget -q https://nxfilter.org/p4/download -O -

jasker5183 commented 2 years ago
root@nxfilter:~ # wget -q https://nxfilter.org/p4/download -O -
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<meta name="robots" content="noindex, nofollow">
<title>One moment, please...</title>
<style>
body {
    background: #F6F7F8;
    color: #303131;
    font-family: sans-serif;
    margin-top: 45vh;
    text-align: center;
}
</style>
</head>
<body>
<h1>Please wait while your request is being verified...</h1>
<form id="wsidchk-form" style="display:none;" action="/z0f76a1d14fd21a8fb5fd0d03e0fdc3d3cedae52f" method="get">
<input type="hidden" id="wsidchk" name="wsidchk"/>
</form>
<script>
(function(){
    var west=+((+!+[])+(+!+[]+[])+(+!+[]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+[])+(+!+[])+(+!+[]+!![]+[])),
        east=+((+!+[])+(+!+[]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+[])),
        x=function(){try{return !!window.addEventListener;}catch(e){return !!0;} },
        y=function(y,z){x() ? document.addEventListener("DOMContentLoaded",y,z) : document.attachEvent("onreadystatechange",y);};
    y(function(){
        document.getElementById('wsidchk').value = west + east;
        document.getElementById('wsidchk-form').submit();
    }, false);
})();
</script>
</body>
</html>root@nxfilter:~ # 
xTITUSMAXIMUSX commented 2 years ago

Yeah your VPN is messing with the HTML page, big time. I'm not sure how you want to proceed with rectifying that but I think we isolated this issue to your VPN provider.

jasker5183 commented 2 years ago

Great.

Another problem to troubleshoot. I think we can close this again.

jasker5183 commented 2 years ago

After giving the jail a firewall rule to bypass the vpn I get:

Checking nxfilter.org for the latest version
nxfilter-4.6.3.1.zip                                    46 MB 1475 kBps    32s
          46 MB 1475 kBps    32s
          46 MB 1475 kBps    32s
/etc/rc.d/nxfilter                                     904  B 6695 kBps    00s
Downloading NxFilter...Downloading NxFilter...Downloading NxFilter... ok
Installing NxFilter in /usr/local/nxfilter... ok
Downloading service script... ok
Downloading service script... ok
/etc/rc.d/nxfilter                                     904  B 6695 kBps    00s
/etc/rc.d/nxfilter                                     904  B 6695 kBps    00s
Enabling the NxFilter service...nxfilter_enable:  -> YES
/etc/rc.d/nxfilter                                     904  B 6695 kBps    00s
/etc/rc.d/nxfilter                                     904  B 6695 kBps    00s
 ok
Starting the NxFilter service...Starting NxFilter...
/etc/rc.d/nxfilter                                     904  B 6695 kBps    00s
All done!
/etc/rc.d/nxfilter                                     904  B 6695 kBps    00s

Admin Portal:
http://192.168.0.151/admin

It works, although when I clicked the admin portal link in Firefox it didn't come up I had to put https but it worked fine in Chrome. Might want to put some kind of warning in either the script or the ReadMe about certain vpn's and proxies so other users aren't lost.

Not even sure where to begin troubleshooting what my vpn is doing to the webpages it serves, but that's not really your problem.