Posts

kex_exchange_identification: read: Connection reset by peer'

 rsync /etc/ssh/ also /etc/ssh also copy cd /root/.ssh

Diirectadmin configs for migration

********************************* DirectAdmin Configuration Paths *********************************      /etc/ -->          passwd          shadow          group          exim.conf          exim.pl          system_filter.exim          proftpd.conf          proftpd.vhosts.conf          proftpd.passwd          hosts          rc.local          resolv.conf          named.conf          virtual/              domainowners              domains              pophosts              majordomo/*          httpd/                  conf/                      httpd.conf         (Don't copy if you have installed with different platform / architecture / OS)                      ips.conf         /var/                 named/*                 spool/                  virtual/*                  mail/*                 www/*                 log/*                 lib/                       mysql/*         /usr/local/                 src/*                   (Existing Packages)                 directadmin/* 

catch-all address setup for cyberpanel

Image
Insert the catchall inside of cyberpanel’s e_forwardings table using phpmyadmin ( like source=  @example.com  with destination=  catchall@example.com , you’ll have to create a destination mailbox btw )  INSERT INTO e_forwardings (source, destination)  VALUES ('@20tester.app', 'catchall@20tester.app'); Then replace query in /etc/postfix/mysql-virtual_forwardings.cf with query = SELECT DISTINCT destination FROM e_forwardings WHERE source='%s' OR source='@%d' And that’s it. I do it like that because for some domain I don’t even want to create a mailbox and just forward all emails to gmail. query = SELECT DISTINCT destination FROM e_forwardings WHERE source='%s' OR source='@%d' To insert a `catchall` email address into CyberPanel's `e_forwardings` table using phpMyAdmin, and to create a destination mailbox, follow these steps:  Step 1: Create a Destination Mailbox 1. Log into CyberPanel:    - Open CyberPanel and log in.    - Go to Mail &g

Bad protocol 2 host key algorithms +ssh-rsa

 The error message Bad protocol 2 host key algorithms '+ssh-rsa' indicates that the OpenSSH version you are using does not support this syntax for specifying the HostKeyAlgorithms . Your version of OpenSSH (5.3) is very old and likely doesn't recognize this newer option syntax, which was introduced in later OpenSSH versions. To resolve the issue, you have two primary options: Option 1: Upgrade OpenSSH on Your Client Option 2: Manually Add the Host Key to Known Hosts Since upgrading might not always be feasible, you can try manually adding the server’s SSH host key to your ~/.ssh/known_hosts file. This workaround can bypass the need for negotiating the host key algorithm. Manually scan the host's key : ssh-keyscan -p 22 192.227.112.104 >> ~/.ssh/known_hosts Attempt to connect again : ssh -p 22 root@192.227.112.104

How to fix black screen with cursor

  Just to throw it out there. I have had this exact same problem on both desktops and laptops. I have found that I had lost my mouse, but I could find it by moving it all around wildly. It was showing as two monitor screens. Because the mouse would come and go depending on how I moved it. I remote in and that is when I had found that it was displaying as two monitor screens when I only had one monitor. I changed the display back to only one monitor and the issue is now resolved. Hope it helps someone. in my case i had connected both HDMI and DPI after i remove HDMI display shown on next reboot

How to disable PHPMailer sending functionality

  To simply disable mail() function in php you can edit your php.ini, then add the following line/ find the line: disabled_functions = mail https://167.86.107.50:8090/managephp/editPHPConfigs in advanced added at last disable_functions = pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare,mail, Above setting only disable unauthenticated mail from the server.

How to get the key ID from a .pem openssl file?

  I have a .pem private key generated by openssl. How to extract the key ID from it? Edit: the generated rsa keypair is for Amazon cloudfront. When uploaded on the console, a 'Key ID' is displayed. However the private key I have generated is not for my account and I don't have any slot available to upload the public key on my AWS account (there's a limit of 2 public keys). Bare keys do not have "key IDs". They're just series of numbers. If the key belongs to an X.509 certificate, then the certificate's fingerprint (a SHA-1 hash of the DER-encoded cert) will be used for identification: openssl x509 -outform der | openssl sha1, or openssl x509 -noout -fingerprint. Otherwise (if it's just a bare public/private keypair), the SHA-1 hash of the public key is used sometimes (again, DER encoding), but I don't know of any standard for it. You can extract the public key with openssl rsar -pubout -outform der, again piping to openssl sha1 if that's wh