Jump to content

Reboot

Banned
  • Posts

    529
  • Joined

  • Last visited

  • Days Won

    33
  • Feedback

    0%

Everything posted by Reboot

  1. Appache best. MySQL is necessary for the database. Mysql is necessary to use extension MYsqli. With good Appache protection and a perfect setup, ngix is weak compared to Appache. My opinion: D In FreeBSD there are about 100 ways to protect web server. I know them all: D I just do not have time to do tutorials. You can install the php mysql extension without installing mysql It's a fact that nginx is better than apache An opinion doesn't matter We tested and apache and nginx. edit: what do you want to show? nginx has better stats on the pic Some statistics show that nginx is better, other that Appachi. Not all the time is correct, I tested apache performed better: D
  2. Appache best. MySQL is necessary for the database. Mysql is necessary to use extension MYsqli. With good Appache protection and a perfect setup, ngix is weak compared to Appache. My opinion: D In FreeBSD there are about 100 ways to protect web server. I know them all: D I just do not have time to do tutorials. You can install the php mysql extension without installing mysql It's a fact that nginx is better than apache An opinion doesn't matter We tested and apache and nginx. In any case I do tutorial for nginx.
  3. Appache best. MySQL is necessary for the database. Mysql is necessary to use extension MYsqli. With good Appache protection and a perfect setup, ngix is weak compared to Appache. My opinion: D In FreeBSD there are about 100 ways to protect web server. I know them all: D I just do not have time to do tutorials.
  4. Unable probably unsuccessful in your attempts you broke something in FreeBSD. After installing mod_php56. You really need to be that way libphp5.so Use a clean FreeBSD, resume steps in the tutorial.
  5. My configuration: I forgot something, I think: D I edited the post check everything. Open /usr/local/etc/apache24/httpd.conf : And verifi if you have this line : LoadModule php5_module libexec/apache24/libphp5.so If there is no add manually.
  6. Corect resolve : pkg install devil or cd /usr/ports/graphics/devil/ && make install clean
  7. Hello, today I will introduce steps to install a web server under FreeBSD. We need to install some programs: Main Programs -MySql56 Server -Appache24 -PHP 5.6 -Php 5.6 extensions -php 5.6 extra-extensions Advanced Firewall -IP Filter -mod_security -mod_antiloris -mod_evasive Before you begin configuring the web server you must install PKG. In FreeBSD console type: Command1: pkg after Y -> ENTER ( to confirm install) After : pkg update Installing and configuring MySQL. Now the mysql server : In the freebsd console type these commands : pkg install mysql56-server echo 'mysql_enable="YES"' >> /etc/rc.conf service mysql-server start --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Now create the mysql " root " user : mysql -u root GRANT ALL PRIVILEGES ON *.* TO root@"%" IDENTIFIED BY 'password' WITH GRANT OPTION; flush privileges; exit Where does the password, you put your desired password. DONE mysql Installing and configuring Apache24. pkg install apache24 The following command: echo 'apache24_enable="YES"' >> /etc/rc.conf --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Now open winscp and navigate to /usr/local/etc/apache22/httpd.conf In httpd.conf looking for the following line: # ServerName www.yourdomain.com:80 And delete # from you httpd.conf (# ServerName www.yourdomain.com:80 ) Delete # --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Now start the service : service apache24 start READY. Now to test if it works. Open a webpagee, and type the ip adress used for VDS (VPS ) If everything is OK should appear in the website: It Works !! Installing and configuring PHP 5.6 The command : pkg install php56 pkg install mod_php56 --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Open /usr/local/etc/apache24/httpd.conf : And verifi if you have this line : LoadModule php5_module libexec/apache24/libphp5.so If there is no add manually. --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- You open the FreeBSD console and put it and ENTER command: cp /usr/local/etc/php.ini-production /usr/local/etc/php.ini --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Now let’s configure Apache. Open the file /usr/local/etc/apache24/httpd.conf and look for the following line: DirectoryIndex index.html And change it so it reads as follows: DirectoryIndex index.html index.php --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Now apache just needs to know what it should parse the PHP files with. These two lines should be added to the httpd.conf file, and can be put at the bottom if needed: Or search in httpd.conf lines that start with new line AddType and start with these two: AddType application/x-httpd-php .php AddType application/x-httpd-php-source .phps --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- If want to use PHP code inside of .htm files you can just add on those extensions. AddType application/x-httpd-php .php .htm .html --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- As an optional step, if you’d like to add multilanguage support to Apache, uncomment the following line( in httpd.conf) : Include etc/apache24/extra/httpd-languages.conf service apache24 restart service mysql-server restart --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- Okay, now to test if it works php. Type this command in freebsd console : # echo "<? phpinfo(); ?>" >> /usr/local/www/apache24/data/index.php [Hidden Content] And type the ip on used by VDS (VPS) on a web browser. Installing and configuring php 5.6 extensions and extra extensions. pkg install php56-extensions pkg install php56-mysqli pkg install php56-mysql pkg install php56-gd pkg install php56-openssl DONE Varnish cache > Best Http accelerator pkg install varnish Then rc.conf : echo 'varnishd_enable="YES"' >> /etc/rc.conf Starting varnish . /usr/local/etc/rc.d/varnishd start Check if varnish really run? /usr/local/etc/rc.d/varnishd status varnishd is not running. Now, View varnish configuration ee /usr/local/etc/varnish/default.vcl Inside the file I see these : # Default backend definition. Set this to point to your content # server. # # backend default { # .host = “127.0.0.1”; # .port = “8080”; # } It means the content need to run on port 8080. Remove all # mark to be like this : backend default { .host = “127.0.0.1”; .port = “8080”; } 127.0.0.1 =replace with you ip host (vps, vds ) etc... save the file. Change apache configuration to run on port 8080. ee /usr/local/etc/apache22/httpd.conf Changer : Listen 80 with : Listen 8080 save the file. Restart apache : service apche24 restart Now retry to run varnish ? /usr/local/etc/rc.d/varnishd start Chech varnish : /usr/local/etc/rc.d/varnishd status P.S : you can enable varnish log echo 'varnishlog_enable="YES"' >> /etc/rc.conf /usr/local/etc/rc.d/varnishlog start Security Antiloris protection Slowloris allows a single machine to take down another machine’s web server with minimal bandwidth and side effects on unrelated services and ports. The tools used to launch Slowloris attack can be downloaded at [Hidden Content] Slowloris tries to keep many connections to the target web server open and hold them open as long as possible. It accomplishes this by opening connections to the target web server and sending a partial request. Periodically, it will send subsequent HTTP headers, adding to—but never completing—the request. Affected servers will keep these connections open, filling their maximum concurrent connection pool, eventually denying additional connection attempts from clients. Install this : pkg install mod_antiloris Find the following line in your httpd.conf ( and uncomment it ? If there is this line after installing mod_antiloris add manually. #LoadModule antiloris_module libexec/apache24/mod_antiloris.so ModSecurity pkg install www/mod_security ModSecurity requires firewall rule definitions. Most people use the OWASP ModSecurity Core Rule Set (CRS). The easiest way to track the OWASP CRS repository right now is to use Git. Let's make a directory for all our ModSecurity related stuff, and clone the CRS repository under it. pkg install git mkdir -p /usr/local/etc/modsecurity cd /usr/local/etc/modsecurity git clone [Hidden Content] crs Copy the default ModSecurity config file, and fetch a necessary file which is currently not included in the package: cp /usr/local/etc/modsecurity.conf-example modsecurity.conf fetch [Hidden Content] cp crs/modsecurity_crs_10_setup.conf.example modsecurity_crs_10_setup.conf Now we create an Apache configuration snippet in Apache's modules.d directory. It loads the ModSecurity module, and includes the configurations and CRS: ee << EOF > /usr/local/etc/apache22/modules.d/000_modsecurity.conf # Load ModSecurity # Comment out the next line to temporarily disable ModSecurity: LoadModule security2_module libexec/apache22/mod_security2.so <IfModule security2_module> # Include ModSecurity configuration Include etc/modsecurity/modsecurity.conf # Include OWASP Core Rule Set (CRS) configuration and base rules Include etc/modsecurity/modsecurity_crs_10_setup.conf Include etc/modsecurity/crs/base_rules/*.conf # Add custom configuration and CRS exceptions here. Example: # SecRuleRemoveById 960015 </IfModule> EOF When the configuration is all set, simply restart Apache, and confirm that ModSecurity is loaded by checking Apache's log file: service apache22 restart Log file saved to : /var/log/httpd-error.log Hopefully, the log will show something like this: ModSecurity for Apache/2.4.2 ([Hidden Content]) configured. ModSecurity: APR compiled version="1.4.8"; loaded version="1.4.8" ModSecurity: PCRE compiled version="8.34 "; loaded version="8.34 2013-12-15" ModSecurity: LIBXML compiled version="2.8.0" What log says is diferent by appache version Now that ModSecurity is active, try making a suspicious request to your web server, for instance browse to a URL [Hidden Content]. The CRS has a rule against this type of request. After browsing to the URL, you should now see this request logged in /var/log/modsec_audit.log. You'll notice that the request succeeds, and the response is sent to the browser normally. The reason is that ModSecurity runs in DetectionOnly mode by default, in order to prevent downtime from misconfiguration or heavy-handed blocking. You can enable blocking mode simply by editing modsecurity.conf and changing the following line : SecRuleEngine On Again, restart Apache. Now, make the same suspicious request to your web server. You should now see a "403 Forbidden" error! In practice, it's probably best to keep SecRuleEngine DetectionOnly for some time, while your users exercise the web applications. Meanwhile, you should keep an eye on /var/log/modsec_audit.log to see what is being blocked. If there are any false positives, you need to mitigate this by writing custom exceptions. Mod_evasive -DOS Hash Table Size -DOS Page Count -DOS Site Count -DOS Page Interval -DOS Site Interval -DOS Blocking Period -DOS Email Notify -DOS System Command -DOS Log Dir -Whitelisting IP Addresses Coming soon If you know other vulnerabilities leave a message and i edit solving. Going to edit my post time. When I have time,about security. If you need to install more extensions, leave message in topic. And I'll edit the post and fill you: D If you have errors, such as missing libraries or other errors will ask something in the topic. All steps tested on FreeBSD 10.1
  8. Not good tutorial, not work. It's for older version php - apache. A tutorial to do immediately
  9. Open CONFIG each ch , onluy ch . Not auth, not db. And add this line: BIND_IP: XXX.XXX.XXX.XXX xxx.xxx.xxx.xxx= Ip used virtualbox
  10. Mysql php56 apahche24 php56-extensions Advanced Firewall If you do I complete tutorial .
  11. is there working any tool for new mob proto with wolfman friend? For mob_proto is not public
  12. Cheaper?, This is most cheaper .... and better [Hidden Content] [Hidden Content] Eterhost is >> powerful than tilaa. The frequency in tilaa is fake, you cant add like : 2 cores of 2.5Ghz = 5Ghz. =S At eterhost not allowed to install the VDS server metin. I even talked to them on the site and said that installing a server metin without liecenta be closed. But still they are advertising on a forum metin. Why? PS: I recommend TILA a single reason. We had her 1 year and I had not even a problem or LAG.
  13. I do not recommend EterHost, It is better and cheaper.[Hidden Content]
  14. Drop can be modified from group_group.txt group.txt
  15. I managed to decrypt the official Launcher very hard and helpful. Have you heard of LCF-AT?
  16. Source is 3 ways in the metin2 ... 1) Source DB cache 2) Source Game 3) the binary source First, what is a source code (machine code) * The source code is all files in a file that is created. The source code is written in a particular programming language. In our case the source code is written in C ++. All data in a file that is created. All syntax. 2) SOURCE GAME * The source can change all settings in game, so you do not need the diff . * Source is designed to meitn2 of about 120 files. (After compile it to create an range of all the files) * In some files may change status points, each books required gm, maximum number guild members, maximum player ( So what do you do with the source) * For this you need the source code to the game. What is game, game is like a car engine. If the car has no engine and does not work metin2 server. * When you compile a source code (source), you will create a new game. * To compile a game you need a tool called a compiler .... * In FreeBSD ++ compiler is called GCC or Gmake (so that program is called cmpilator in FreeBSD)
×
×
  • Create New...

Important Information

Terms of Use / Privacy Policy / Guidelines / We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.