Posts by ppfdez

    No, yesterday it wasn´t.
    The test was with omv 1.0.29, omvextraorg 1.0.23 plugins -> mhddfs 1.0 & nginx 1.0.23


    Now, i´ve actualizated OMV and i see :
    omv 1.0.31 and ...... pluging webdav 1.0.1 ¡great!. This afternoon i´ll probe it and i´ll report testing results.


    Many thanks! Great JOB!

    Yes, you can.


    You must put into client config file

    Code
    # Uncomment to have the VPN client prompt for
    # a password. If authentication was not enabled
    # at the time this configuration file was
    # generated, this setting will be commented out
    auth-user-pass


    and into the server config file

    Code
    option auth_user_pass_verify '/etc/openvpn/pass.sh via-env'


    Into my vpn server the pass.sh is like


    I must to say that my OpenVPN server run under my OpenWrt Barrier Breaker 14.07-rc2 TP-Link TL-WR1043N/ND v2 router but it is Debian-like. All can be ligthly different X(

    when you have OMV installed and working ....
    1. Download iso gparted live and burn it into a dvd-r or rw.http://gparted.org/livecd.php
    2. Boot your nas from that dvd. gprted will come to you.
    3. resize the greatest partition of omv hd system layout to a small partition, 16 GiB, 24 Gib, ..
    4 Create a new partition type linux on new spare hd space.
    5 Format it into ext4
    6 Apply changes
    7 Shutdown the system.
    8 Boot your nas from hd. OMV will come up and running and ......
    you will have a new ext4 system file available for you.

    I've been experimenting with OpenMediaVault 0.6 Kralizec installations. First on a debian OS OpenVZ capable and on a second on a CT OpenVZ container also based on Wheezy into the same VM.


    Wheezy 7.4 installation was performed into a KVM virtual machine managed by Proxmox VE 3.2. Once this was successfully, Wheezy was particularized to be able to manage OpenVZ technology based on http://www.howtoforge.com/inst…z-on-debian-squeeze-amd64


    On this Wheezy VM, we installed Kralizec smoothly, running all OK for now based on http://forums.openmediavault.org/viewtopic.php?f=12&t=514.


    On also wheezy container (CT), implemented into VM Wheezy-Kralizec, we have tried to do the same, having several problems with OMV package installation at collectd, apache2 and monit that we have gradually solved at google. At the end, the CT Kralizec´s web interface works, but every time that we stop CT, we lose name resolution. If we set from the webgui any network parameter, we lose the network configuration. If we touch the DNS parameterization OMV go to hang ..... based on http://www.howtoforge.com/how-…y-testing-openvz-template


    All this is aimed to provide OMV as an OpenVZ appliance with performances like baremetal, better than as VM and/or expand the possibilities not only extend its functionality via plugins but also by the multitude of ontainers and turnkeys availables online, multiplying the expansion posibilitiess and decreasing development time. A CT does not need more than the intrinsic development, a plugin needs this development plus the plugin itself, apart from a deep understanding of OMV .


    For example OpenVPN access server could be installed as a CT instead of a plugin. There is turnkey of OpenVPN http://www.turnkeylinux.org/openvpn . Also for Owncloud http://www.turnkeylinux.org/owncloud and Drupal, OpenPhoto, OpenLDAP, ..

    Quote from "ppfdez"

    All OK. From OMV gui, I uploaded the new packet and i installed plugin. Now i have OpenVPN icon below "services" folder.
    Now i will test all possibles funcionalities. I will post it.
    Graceful


    When enable pluging i get

    Code
    Failed to execute command 'sudo omv-mkconf openvpn setup 2>&1': cp: no se puede efectuar `stat' sobre «openssl-1.0.0.cnf»: No existe el fichero o el directorio
    Error #4000: exception 'OMVException' with message 'Failed to execute command 'sudo omv-mkconf openvpn setup 2>&1': cp: no se puede efectuar `stat' sobre «openssl-1.0.0.cnf»: No existe el fichero o el directorio' in /usr/share/openmediavault/engined/module/openvpn.inc:83 Stack trace: #0 /usr/share/openmediavault/engined/rpc/config.inc(178): OMVModuleOpenVPN->applyConfig() #1 [internal function]: OMVRpcServiceConfig->applyChanges(Array, Array) #2 /usr/share/php/openmediavault/rpcservice.inc(125): call_user_func_array(Array, Array) #3 /usr/share/openmediavault/engined/rpc/config.inc(253): OMVRpcServiceAbstract->callMethod('applyChanges', Array, Array) #4 [internal function]: OMVRpcServiceConfig->applyChangesBg(Array, Array) #5 /usr/share/php/openmediavault/rpcservice.inc(125): call_user_func_array(Array, Array) #6 /usr/share/php/openmediavault/rpc.inc(62): OMVRpcServiceAbstract->callMethod('applyChangesBg', Array, Array) #7 /usr/sbin/omv-engined(495): OMVRpc::exec('Config', 'applyChangesBg', Array, Array, 1) #8 {main}


    and tthe flag

    Code
    The configuration has been changed. You must apply the changes in order for them to take effect.

    don´t reset never

    From putty

    Code
    wget http://omv-extras.org/testing/openmediavault-openvpn_1.0.0_all.deb
    dpkg -i openmediavault-openvpn_1.0.0_all.debl

    as i had dependecy error, i keyed

    Code
    apt-get -f install

    All Ok, but it don´work.


    I haven´t openvpn plugin icon into OMV gui
    With /etc/init.d/openvpn status i don´t any answer.
    Keying /etc/init.d/openvpn start and opening on firefox https://192.168.1.XXX:943 and i haven´t any response.


    Thanks

    Quote from "ryecoaaron"

    Try the plugin (plugin is beta). The groups and bridged vpn is the only things I think you can't do with the plugin. Maybe auth method too. Adding and removing users is very fast.


    I do the procedure install and.....

    Code
    Reading package lists...
    Building dependency tree...


    forever....................


    Webgui hanged. System up & running. If reboot plugin is´nt into plugin list.


    Thanks for everybody

    Quote from "tekkbebe"

    My first impressions of this script are not good. Can someone that has installed it give me output of this:


    iptables -L



    The output for iptables -L is:


    Code
    Chain INPUT (policy ACCEPT)
    target prot opt source destination
    Chain FORWARD (policy ACCEPT)
    target prot opt source destination
    Chain OUTPUT (policy ACCEPT)
    target prot opt source destination


    Another test: I have also a OpenVPN server installed like a OpenVZ container into mi PROXMOX VE 3.1 and i havent any problems with licences. I don´t understand the upper posts.

    Quote from "Sodden"

    That script is sweet. Thanks for posting !
    Setting up openvpn manually is such a pain in the butt.


    First of all GREAT JOB ¡Peter Olson!. Now I can migrate to 0.5.x OMV and still have my own secure cloud and secure access for all ip ports of my home . I followed the instructions into http://peterjolson.com/super-e…config-on-openmediavault/ on my Proxmox VE virtualized OMV0.5.42 and everything worked properly.


    To minimize problems with controlled networks, it would be good to ask in the installation script for the type of protocol to use UDP or TCP when asking the port. (I had to edit both, client and server conf files)


    To improve the classification of the client configuration files could be named as :
    server_name-ca.crt
    server_name-client_name.crt
    server_name-client_name.key
    server_name.conf


    And .... for glory , security would be very increased on case of theft of equipment or loss of conection keys if client_name is also a user belongs to OpenVPN group of the server system. The client software when initiate the connection on remote would ask user and password into server OMV system. This method is used by the OpenVPN plugin OMV0.4x by the sentence "auth-user-pass" into file "server_name.conf" y la sentencia "auth-user-pass-verify via-env vpnpwauth.sh" in "server.conf" file server.


    Thanks for everybody especially for Peter Olson. MANY THANKS.

    I want my own cloud. I need my own cloud. All ports through one only port. One acces key large, large, ... Iwant mobility. I want security. And i want OPENMEDIAVAULT 5.


    Sadly i stay on OMV 4 : I haven' t and i don't build openvpn plugin the secure versatile and total cloud solution.

    You must download gparted-live iso from http://gparted.sourceforge.net
    You must upload it to proxmox iso's repository
    Now you must asociate the gparted-live iso to CDROM unit of you hosted OMV and change proxmox boot priorities for you OMV machine to CDROM
    Now boot your OMV hosted machine.
    Gparted will boot and with it, you could change the sizes of your volumenes.
    Now disociate the iso image and change boot priority to hard disk. Boot. OMV would must be ok.
    Good lock.
    ppfdez