Closed jasker5183 closed 2 years ago
Thanks for bringing to to my attention. Let me take a look!
Looks like my grep to find the latest version was finding 2 entries. piped out " head -1" to pull one the first entry and it I tested the deployment with success!
Just tested using this and I get:
Checking nxfilter.org for the latest version
fetch: http://pub.nxfilter.org/nxfilter-.zip: Not Found
fetch: http://pub.nxfilter.org/nxfilter-.zip: Not Found
tar: Error opening archive: Failed to open 'nxfilter-.zip'
tar: Error opening archive: Failed to open 'nxfilter-.zip'
/etc/rc.d/nxfilter 904 B 6588 kBps 00s
Downloading NxFilter...Downloading NxFilter... ok
Installing NxFilter in /usr/local/nxfilter... ok
Installing NxFilter in /usr/local/nxfilter... ok
Downloading service script... ok
Downloading service script... ok
/etc/rc.d/nxfilter 904 B 6588 kBps 00s
ok
chmod: /usr/local/nxfilter/bin/*.sh: No such file or directory
chmod: /usr/local/nxfilter/bin/*.sh: No such file or directory
Enabling the NxFilter service...nxfilter_enable: -> YES
chmod: /usr/local/nxfilter/bin/*.sh: No such file or directory
chmod: /usr/local/nxfilter/bin/*.sh: No such file or directory
ok
Starting the NxFilter service...Starting NxFilter...
chmod: /usr/local/nxfilter/bin/*.sh: No such file or directory
Starting NxFilter...
eval: /usr/local/nxfilter/bin/startup.sh: not found
All done!
eval: /usr/local/nxfilter/bin/startup.sh: not found
Admin Portal:
http://192.168.0.151/admin
Still not working.
Interesting. Here is my output. I used the official way to deploy plugins in truenas.
Plugin installed successfully
Install Notes:
[H[2JChecking nxfilter.org for the latest version
nxfilter-4.6.3.1.zip 46 MB 26 MBps 02s
46 MB 26 MBps 02s
46 MB 26 MBps 02s
/etc/rc.d/nxfilter 904 B 6130 kBps 00s
Downloading NxFilter...Downloading NxFilter...Downloading NxFilter... ok
Installing NxFilter in /usr/local/nxfilter... ok
Downloading service script... ok
Downloading service script... ok
/etc/rc.d/nxfilter 904 B 6130 kBps 00s
/etc/rc.d/nxfilter 904 B 6130 kBps 00s
Enabling the NxFilter service...nxfilter_enable: -> YES
/etc/rc.d/nxfilter 904 B 6130 kBps 00s
/etc/rc.d/nxfilter 904 B 6130 kBps 00s
ok
Starting the NxFilter service...Starting NxFilter...
/etc/rc.d/nxfilter 904 B 6130 kBps 00s
All done!
/etc/rc.d/nxfilter 904 B 6130 kBps 00s
Admin Portal:
http://192.168.13.30/admin
Could you try to run this command and see if you get an output?
curl -sL 'https://nxfilter.org/p3/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
Output of curl command is nothing:
root@nxfilter:~ # curl -sL 'https://nxfilter.org/p3/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
root@nxfilter:~ #
Nothing is downloaded either.
Are you by chance blocking nxfilter.org at the firewall level?
Are you by chance blocking nxfilter.org at the firewall level?
root@nxfilter:~ # ping nxfilter.org
PING nxfilter.org (70.32.23.79): 56 data bytes
64 bytes from 70.32.23.79: icmp_seq=0 ttl=52 time=69.951 ms
64 bytes from 70.32.23.79: icmp_seq=1 ttl=51 time=69.317 ms
64 bytes from 70.32.23.79: icmp_seq=2 ttl=51 time=69.578 ms
^C
--- nxfilter.org ping statistics ---
4 packets transmitted, 3 packets received, 25.0% packet loss
round-trip min/avg/max/stddev = 69.317/69.615/69.951/0.260 ms
Shouldn't be.
I think there is something in between not allowing you to get the version number. I can successfully get an output when I run that command.
$curl -sL 'https://nxfilter.org/p3/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
4.6.3.1
I'm running all this from a jail running 13.1, could it be something to do with 13.1-RELEASE?
When I run curl command with verbosity:
root@nxfilter:~ # curl -sLv 'https://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
* Trying 70.32.23.79:443...
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* ALPN: offers h2
* ALPN: offers http/1.1
* CAfile: /usr/local/share/certs/ca-root-nss.crt
* CApath: none
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4586 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN: server accepted h2
* Server certificate:
* subject: CN=*.nxfilter.org
* start date: Feb 17 00:00:00 2022 GMT
* expire date: Feb 17 23:59:59 2023 GMT
* subjectAltName: host "nxfilter.org" matched cert's "nxfilter.org"
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
* SSL certificate verify ok.
* Using HTTP2, server supports multiplexing
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
} [5 bytes data]
* h2h3 [:method: GET]
* h2h3 [:path: /p4/download]
* h2h3 [:scheme: https]
* h2h3 [:authority: nxfilter.org]
* h2h3 [user-agent: curl/7.84.0]
* h2h3 [accept: */*]
* h2h3 [x-requested-with: XMLHttpRequest]
* Using Stream ID: 1 (easy handle 0x8014f4800)
} [5 bytes data]
> GET /p4/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.84.0
> accept: */*
> x-requested-with: XMLHttpRequest
>
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* old SSL session ID is stale, removing
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
} [5 bytes data]
< HTTP/2 200
< date: Sat, 13 Aug 2022 17:43:31 GMT
< content-type: text/html
< server: imunify360-webshield/1.18
< last-modified: Saturday, 13-Aug-2022 17:43:31 GMT
< cache-control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
< cf-edge-cache: no-cache
<
{ [1306 bytes data]
* Connection #0 to host nxfilter.org left intact
I have a test 13.1 instance I was using and didn't have an issue. Here is my output with verbose. It looks like its using TLSv1.3 which I wouldn't think would matter? Mine used TLSv1.2
$curl -sLv 'https://nxfilter.org/p3/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
* Trying 70.32.23.79:443...
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CApath: /etc/ssl/certs
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.2 (IN), TLS header, Certificate Status (22):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.2 (IN), TLS header, Finished (20):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4586 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.2 (OUT), TLS header, Finished (20):
} [5 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
* subject: CN=*.nxfilter.org
* start date: Feb 17 00:00:00 2022 GMT
* expire date: Feb 17 23:59:59 2023 GMT
* subjectAltName: host "nxfilter.org" matched cert's "nxfilter.org"
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
* SSL certificate verify ok.
* Using HTTP2, server supports multiplexing
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x55e7d5192e80)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /p3/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.81.0
> accept: */*
> x-requested-with: XMLHttpRequest
>
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 301
< content-type: text/html
< content-length: 707
< date: Sat, 13 Aug 2022 17:48:04 GMT
< server: LiteSpeed
< location: https://nxfilter.org/p4/download
< strict-transport-security: max-age=63072000; includeSubDomains
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
< alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
<
* Ignoring the response-body
{ [707 bytes data]
* Connection #0 to host nxfilter.org left intact
* Issue another request to this URL: 'https://nxfilter.org/p4/download'
* Found bundle for host nxfilter.org: 0x55e7d518bff0 [can multiplex]
* Re-using existing connection! (#0) with host nxfilter.org
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* Using Stream ID: 3 (easy handle 0x55e7d5192e80)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /p4/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.81.0
> accept: */*
> x-requested-with: XMLHttpRequest
>
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 301
< x-powered-by: PHP/7.3.33
< content-type: text/html; charset=UTF-8
< x-redirect-by: WordPress
< location: https://nxfilter.org/p4/download/
< content-length: 0
< date: Sat, 13 Aug 2022 17:48:04 GMT
< server: LiteSpeed
< strict-transport-security: max-age=63072000; includeSubDomains
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
<
{ [0 bytes data]
* Connection #0 to host nxfilter.org left intact
* Issue another request to this URL: 'https://nxfilter.org/p4/download/'
* Found bundle for host nxfilter.org: 0x55e7d518bff0 [can multiplex]
* Re-using existing connection! (#0) with host nxfilter.org
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* Using Stream ID: 5 (easy handle 0x55e7d5192e80)
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
} [5 bytes data]
> GET /p4/download/ HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.81.0
> accept: */*
> x-requested-with: XMLHttpRequest
>
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
< HTTP/2 200
< x-powered-by: PHP/7.3.33
< content-type: text/html; charset=UTF-8
< link: <https://nxfilter.org/p4/wp-json/>; rel="https://api.w.org/"
< link: <https://nxfilter.org/p4/wp-json/wp/v2/pages/12179>; rel="alternate"; type="application/json"
< link: <https://nxfilter.org/p4/?p=12179>; rel=shortlink
< date: Sat, 13 Aug 2022 17:48:04 GMT
< server: LiteSpeed
< strict-transport-security: max-age=63072000; includeSubDomains
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
<
{ [1180 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* TLSv1.2 (IN), TLS header, Supplemental data (23):
{ [5 bytes data]
* Connection #0 to host nxfilter.org left intact
4.6.3.1
wait can you try to run this curl command? It is using p4 rather than p3 in the uri.
curl -sLv 'https://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
Tried that already, but here is the same output:
root@nxfilter:~ # curl -sLv 'https://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
* Trying 70.32.23.79:443...
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* ALPN: offers h2
* ALPN: offers http/1.1
* CAfile: /usr/local/share/certs/ca-root-nss.crt
* CApath: none
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4586 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN: server accepted h2
* Server certificate:
* subject: CN=*.nxfilter.org
* start date: Feb 17 00:00:00 2022 GMT
* expire date: Feb 17 23:59:59 2023 GMT
* subjectAltName: host "nxfilter.org" matched cert's "nxfilter.org"
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
* SSL certificate verify ok.
* Using HTTP2, server supports multiplexing
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
} [5 bytes data]
* h2h3 [:method: GET]
* h2h3 [:path: /p4/download]
* h2h3 [:scheme: https]
* h2h3 [:authority: nxfilter.org]
* h2h3 [user-agent: curl/7.84.0]
* h2h3 [accept: */*]
* h2h3 [x-requested-with: XMLHttpRequest]
* Using Stream ID: 1 (easy handle 0x8014f4800)
} [5 bytes data]
> GET /p4/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.84.0
> accept: */*
> x-requested-with: XMLHttpRequest
>
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* old SSL session ID is stale, removing
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
} [5 bytes data]
< HTTP/2 200
< date: Sat, 13 Aug 2022 17:56:42 GMT
< content-type: text/html
< server: imunify360-webshield/1.18
< last-modified: Saturday, 13-Aug-2022 17:56:42 GMT
< cache-control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
< cf-edge-cache: no-cache
<
{ [1459 bytes data]
* Connection #0 to host nxfilter.org left intact
Is your truenas behind a proxy by chance?
I am using a VPN.
Is it possible you could test without your truenas being on the VPN? You can always put it back on the VPN after testing.
Not really possible, without bypassing vpn killswitch and disabling pretty much all firewall rules.
OK, so I enabled a test box to use an external VPN service which is also using TLSv1.3 and I can still get the version number. This is pretty strange behavior. I wanted to see if we could isolate the issue to your VPN but, without a test box sitting outside the VPN I'm not really sure what else to test at the moment.
$ curl -sLv 'https://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
* Trying 70.32.23.79:443...
* TCP_NODELAY set
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4586 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use h2
* Server certificate:
* subject: CN=*.nxfilter.org
* start date: Feb 17 00:00:00 2022 GMT
* expire date: Feb 17 23:59:59 2023 GMT
* subjectAltName: host "nxfilter.org" matched cert's "nxfilter.org"
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
* SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
} [5 bytes data]
* Using Stream ID: 1 (easy handle 0x5566ebdcc7e0)
} [5 bytes data]
> GET /p4/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.68.0
> accept: */*
> x-requested-with: XMLHttpRequest
>
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 100)!
} [5 bytes data]
< HTTP/2 301
< x-powered-by: PHP/7.3.33
< content-type: text/html; charset=UTF-8
< x-redirect-by: WordPress
< location: https://nxfilter.org/p4/download/
< content-length: 0
< date: Sat, 13 Aug 2022 18:10:23 GMT
< server: LiteSpeed
< strict-transport-security: max-age=63072000; includeSubDomains
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
< alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
<
{ [0 bytes data]
* Connection #0 to host nxfilter.org left intact
* Issue another request to this URL: 'https://nxfilter.org/p4/download/'
* Found bundle for host nxfilter.org: 0x5566ebdc0e70 [can multiplex]
* Re-using existing connection! (#0) with host nxfilter.org
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* Using Stream ID: 3 (easy handle 0x5566ebdcc7e0)
} [5 bytes data]
> GET /p4/download/ HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.68.0
> accept: */*
> x-requested-with: XMLHttpRequest
>
{ [5 bytes data]
< HTTP/2 200
< x-powered-by: PHP/7.3.33
< content-type: text/html; charset=UTF-8
< link: <https://nxfilter.org/p4/wp-json/>; rel="https://api.w.org/"
< link: <https://nxfilter.org/p4/wp-json/wp/v2/pages/12179>; rel="alternate"; type="application/json"
< link: <https://nxfilter.org/p4/?p=12179>; rel=shortlink
< date: Sat, 13 Aug 2022 18:10:23 GMT
< server: LiteSpeed
< strict-transport-security: max-age=63072000; includeSubDomains
< x-frame-options: SAMEORIGIN
< x-content-type-options: nosniff
<
{ [1180 bytes data]
* Connection #0 to host nxfilter.org left intact
4.6.3.1
I would say that being behind a vpn is is the problem tried with main computer on vpn got the same thing, went around the vpn and was able to get the version number. I guess nxfilter.org is blocking vpn's somehow?
that could be possible or your VPN is blocking that part of the site. I noticed if you try to browse to https://pub.nxfilter.org/nxfilter-4.6.3.1.zip
there are certificate errors. You could try to use http://nxfilter.org/p4/download
to see if that resolves the issue in the curl command?
I don't know if this is what you meant?:
root@nxfilter:~ # curl -sLv http://pub.nxfilter.org/nxfilter-4.6.3.1.zip
* Trying 68.66.205.245:80...
* Connected to pub.nxfilter.org (68.66.205.245) port 80 (#0)
> GET /nxfilter-4.6.3.1.zip HTTP/1.1
> Host: pub.nxfilter.org
> User-Agent: curl/7.84.0
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Server: nginx/1.10.3 (Ubuntu)
< Date: Sat, 13 Aug 2022 18:21:37 GMT
< Content-Type: application/zip
< Content-Length: 48342091
< Last-Modified: Sat, 06 Aug 2022 06:03:28 GMT
< Connection: keep-alive
< ETag: "62ee0430-2e1a44b"
< Accept-Ranges: bytes
<
* Failure writing output to destination
* Closing connection 0
My fault I meant run this.
curl -sLv 'http://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
Doesn't seem to make a difference:
root@nxfilter:~ # curl -sLv 'https://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
* Trying 70.32.23.79:443...
* Connected to nxfilter.org (70.32.23.79) port 443 (#0)
* ALPN: offers h2
* ALPN: offers http/1.1
* CAfile: /usr/local/share/certs/ca-root-nss.crt
* CApath: none
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [122 bytes data]
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
{ [15 bytes data]
* TLSv1.3 (IN), TLS handshake, Certificate (11):
{ [4586 bytes data]
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
{ [264 bytes data]
* TLSv1.3 (IN), TLS handshake, Finished (20):
{ [52 bytes data]
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.3 (OUT), TLS handshake, Finished (20):
} [52 bytes data]
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN: server accepted h2
* Server certificate:
* subject: CN=*.nxfilter.org
* start date: Feb 17 00:00:00 2022 GMT
* expire date: Feb 17 23:59:59 2023 GMT
* subjectAltName: host "nxfilter.org" matched cert's "nxfilter.org"
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=Sectigo Limited; CN=Sectigo RSA Domain Validation Secure Server CA
* SSL certificate verify ok.
* Using HTTP2, server supports multiplexing
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
} [5 bytes data]
* h2h3 [:method: GET]
* h2h3 [:path: /p4/download]
* h2h3 [:scheme: https]
* h2h3 [:authority: nxfilter.org]
* h2h3 [user-agent: curl/7.84.0]
* h2h3 [accept: */*]
* h2h3 [x-requested-with: XMLHttpRequest]
* Using Stream ID: 1 (easy handle 0x8014f4800)
} [5 bytes data]
> GET /p4/download HTTP/2
> Host: nxfilter.org
> user-agent: curl/7.84.0
> accept: */*
> x-requested-with: XMLHttpRequest
>
{ [5 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
{ [249 bytes data]
* old SSL session ID is stale, removing
{ [5 bytes data]
* Connection state changed (MAX_CONCURRENT_STREAMS == 128)!
} [5 bytes data]
< HTTP/2 200
< date: Sat, 13 Aug 2022 18:30:03 GMT
< content-type: text/html
< server: imunify360-webshield/1.18
< last-modified: Saturday, 13-Aug-2022 18:30:03 GMT
< cache-control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
< cf-edge-cache: no-cache
<
{ [1341 bytes data]
* Connection #0 to host nxfilter.org left intact
root@nxfilter:~ # curl -sLv 'http://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
* Trying 70.32.23.79:80...
* Connected to nxfilter.org (70.32.23.79) port 80 (#0)
> GET /p4/download HTTP/1.1
> Host: nxfilter.org
> User-Agent: curl/7.84.0
> Accept: */*
> X-Requested-With: XMLHttpRequest
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Sat, 13 Aug 2022 18:30:34 GMT
< Content-Type: text/html
< Transfer-Encoding: chunked
< Connection: close
< Server: imunify360-webshield/1.18
< Last-Modified: Saturday, 13-Aug-2022 18:30:34 GMT
< Cache-Control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
< cf-edge-cache: no-cache
<
{ [1430 bytes data]
* Closing connection 0
Guess this webserver really hates curl (behind a vpn).
Looks like you still had https in the command. Make sure you are using http://nxfilter.org/p4/download
EDIT: oops I didn't scroll far enough down. HMMMM. I'm not sure where to go from here.
Thought I copied the command properly, here is output:
root@nxfilter:~ # curl -sLv 'http://nxfilter.org/p4/download' -H 'X-Requested-With: XMLHttpRequest' | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip" | grep -Eo "[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+" | head -1
* Trying 70.32.23.79:80...
* Connected to nxfilter.org (70.32.23.79) port 80 (#0)
> GET /p4/download HTTP/1.1
> Host: nxfilter.org
> User-Agent: curl/7.84.0
> Accept: */*
> X-Requested-With: XMLHttpRequest
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Sat, 13 Aug 2022 18:36:32 GMT
< Content-Type: text/html
< Transfer-Encoding: chunked
< Connection: close
< Server: imunify360-webshield/1.18
< Last-Modified: Saturday, 13-Aug-2022 18:36:32 GMT
< Cache-Control: private, no-store, no-cache, must-revalidate, proxy-revalidate, max-age=0, s-maxage=0
< cf-edge-cache: no-cache
<
{ [1446 bytes data]
* Closing connection 0
Maybe just put a note on the curl part of that script that certain vpn's or proxies will cause this command to fail. I'm expecting that the next time the Cirrus test gets run it'll be a pass.
I am curious if you run curl -sL http://nxfilter.org/p4/download
what the output is. If you get a good output then run curl -sL http://nxfilter.org/p4/download | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip"
root@nxfilter:~ # curl -sL http://nxfilter.org/p4/download
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<meta name="robots" content="noindex, nofollow">
<title>One moment, please...</title>
<style>
body {
root@nxfilter:~ # curl -sL http://nxfilter.org/p4/download
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<meta name="robots" content="noindex, nofollow">
<title>One moment, please...</title>
<style>
body {
background: #F6F7F8;
color: #303131;
font-family: sans-serif;
margin-top: 45vh;
text-align: center;
}
</style>
</head>
<body>
<h1>Please wait while your request is being verified...</h1>
<form id="wsidchk-form" style="display:none;" action="/z0f76a1d14fd21a8fb5fd0d03e0fdc3d3cedae52f" method="get">
<input type="hidden" id="wsidchk" name="wsidchk"/>
</form>
<script>
(function(){
var west=+((+!+[])+(+!+[]+!![]+!![]+[])+(+!+[])+(+!+[]+!![]+!![]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+[])),
east=+((+!+[]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+[])+(+![])+(+![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![])),
x=function(){try{return !!window.addEventListener;}catch(e){return !!0;} },
y=function(y,z){x() ? document.addEventListener("DOMContentLoaded",y,z) : document.attachEvent("onreadystatechange",y);};
y(function(){
document.getElementById('wsidchk').value = west + east;
document.getElementById('wsidchk-form').submit();
}, false);
})();
</script>
</body>
</html>root@nxfilter:~ #
root@nxfilter:~ # curl -sL http://nxfilter.org/p4/download | grep -Eo "(http|https)://pub.nxfilter.org/nxfilter-[a-zA-Z0-9./?=_-]*.zip"
root@nxfilter:~ #
Ahhhh yeah. Your VPN completely cutting out a huge chunk of the HTML page OR maybe curl just isn't cutting it? Install wget in your jail and run wget -q https://nxfilter.org/p4/download -O -
root@nxfilter:~ # wget -q https://nxfilter.org/p4/download -O -
<!doctype html>
<html>
<head>
<meta charset="utf-8">
<meta name="robots" content="noindex, nofollow">
<title>One moment, please...</title>
<style>
body {
background: #F6F7F8;
color: #303131;
font-family: sans-serif;
margin-top: 45vh;
text-align: center;
}
</style>
</head>
<body>
<h1>Please wait while your request is being verified...</h1>
<form id="wsidchk-form" style="display:none;" action="/z0f76a1d14fd21a8fb5fd0d03e0fdc3d3cedae52f" method="get">
<input type="hidden" id="wsidchk" name="wsidchk"/>
</form>
<script>
(function(){
var west=+((+!+[])+(+!+[]+[])+(+!+[]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+[])+(+!+[])+(+!+[]+!![]+[])),
east=+((+!+[])+(+!+[]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+[])+(+!+[]+!![]+!![]+!![]+!![]+!![]+!![]+!![]+!![])+(+!+[]+!![]+!![]+!![]+!![]+!![]+[])),
x=function(){try{return !!window.addEventListener;}catch(e){return !!0;} },
y=function(y,z){x() ? document.addEventListener("DOMContentLoaded",y,z) : document.attachEvent("onreadystatechange",y);};
y(function(){
document.getElementById('wsidchk').value = west + east;
document.getElementById('wsidchk-form').submit();
}, false);
})();
</script>
</body>
</html>root@nxfilter:~ #
Yeah your VPN is messing with the HTML page, big time. I'm not sure how you want to proceed with rectifying that but I think we isolated this issue to your VPN provider.
Great.
Another problem to troubleshoot. I think we can close this again.
After giving the jail a firewall rule to bypass the vpn I get:
Checking nxfilter.org for the latest version
nxfilter-4.6.3.1.zip 46 MB 1475 kBps 32s
46 MB 1475 kBps 32s
46 MB 1475 kBps 32s
/etc/rc.d/nxfilter 904 B 6695 kBps 00s
Downloading NxFilter...Downloading NxFilter...Downloading NxFilter... ok
Installing NxFilter in /usr/local/nxfilter... ok
Downloading service script... ok
Downloading service script... ok
/etc/rc.d/nxfilter 904 B 6695 kBps 00s
/etc/rc.d/nxfilter 904 B 6695 kBps 00s
Enabling the NxFilter service...nxfilter_enable: -> YES
/etc/rc.d/nxfilter 904 B 6695 kBps 00s
/etc/rc.d/nxfilter 904 B 6695 kBps 00s
ok
Starting the NxFilter service...Starting NxFilter...
/etc/rc.d/nxfilter 904 B 6695 kBps 00s
All done!
/etc/rc.d/nxfilter 904 B 6695 kBps 00s
Admin Portal:
http://192.168.0.151/admin
It works, although when I clicked the admin portal link in Firefox it didn't come up I had to put https but it worked fine in Chrome. Might want to put some kind of warning in either the script or the ReadMe about certain vpn's and proxies so other users aren't lost.
Not even sure where to begin troubleshooting what my vpn is doing to the webpages it serves, but that's not really your problem.
The post install script from this artifact is leaving the
/usr/local/nxfilter
directory empty on plugin install, which means it doesn't work.Thanks.