Saturday, March 25, 2023
support@conference.yunohost.org
March
Mon Tue Wed Thu Fri Sat Sun
    1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
   
             

[07:28:27] <老师好我是王同学> wtf

[07:29:19] <老师好我是王同学> xmpp:中文社区民主自由@conference.conversations.im?join
[07:37:41] <carrabelloy[m]>
Found errors in the admin panel, is this normal? Found errors in the admin panel, is this normal?
Since he wrote to me. There would be a certificate installed. But unfortunately the admin panel does not show. Have then made the query via terminal, which has told me the certificate. Does anyone else have the same error or is this a bug? It would be nice if someone could tell me something about this. Or if anyone has experienced the same thing. Thank you to all who read it and give me an answer.

@ ~ # openssl s_client -connect darknight-coffee.de:443
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let’s Encrypt, CN = R3
verify return:1
depth=0 CN = darknight-coffee.de
verify return:1
Certificate chain
0 s:CN = darknight-coffee.de
i:C = US, O = Let’s Encrypt, CN = R3
1 s:C = US, O = Let’s Encrypt, CN = R3
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
i:O = Digital Signature Trust Co., CN = DST Root CA X3
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = darknight-coffee.de

issuer=C = US, O = Let’s Encrypt, CN = R3

No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
SSL handshake has read 4838 bytes and written 391 bytes
Verification: OK
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 3072 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: 268A1EE79890DADE008CE826BBF8749587E95D91C6C4B7458EA8155D664493E5
Session-ID-ctx:
Resumption PSK: 3343F2C0F9965015559D339D6E337CBCAE1489484F210EC8F45DC8BCAB4DE6CFD8E3F19B03597F5792F8FB4240DC0095
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 86400 (seconds)
TLS session ticket:
0000 - 1c b5 a5 da a9 d0 75 2a-51 c6 a8 f5 be b9 e2 89 …u*Q…
0010 - e3 9f b3 d7 f7 57 da 85-85 48 08 19 89 cc 01 5f …W…H…_

Start Time: 1679723383
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
read R BLOCK
Post-Handshake New Session Ticket arrived:
SSL-Session:
Protocol : TLSv1.3
Cipher : TLS_AES_256_GCM_SHA384
Session-ID: FC9492DAC1643BACE31D28B69472187FA5B470E3C80187D559D27082B079FA50
Session-ID-ctx:
Resumption PSK: D5B6174474823D2C0C8811B3C7ABBE960CBAC7C10DBCBBFB31B90D4D6D5C413EFA8386269B981DC52479D581BA56A040
PSK identity: None
PSK identity hint: None
SRP username: None
TLS session ticket lifetime hint: 86400 (seconds)
TLS session ticket:
0000 - 22 36 1c d2 7a 5d af d2-6e d5 17 17 f2 6e 01 b4 “6…z]…n…n…
0010 - 0f c1 05 b3 fb ed dc 45-30 67 cc e4 65 22 95 4c …E0g…e”.L

Start Time: 1679723383
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: no
Max Early Data: 0
read R BLOCK
closed
root@darknight-coffee ~ #

yunohost-Admin-Panel
[07:37:41] <carrabelloy[m]> good mornig

[09:47:35] <Owen> I've just ported my server to new hardware and found that the matrix bridge apps I've been using are now all marked as broken. What happened? How do I find what needs fixing?
[09:57:14] <tituspijean> Owen: How have you "ported" them, which new hardware, what do you mean by "marked as broken"? :)
[10:02:30] <carrabelloy[m]> > <@owen[m]:libera.chat> I've just ported my server to new hardware and found that the matrix bridge apps I've been using are now all marked as broken. What happened? How do I find what needs fixing?

Can you maybe help me with that sometime. Since I would like the bridge, since I still do not understand. And would like to use this myself like matterhost as well. Hope I get some positive feedback for once

[10:29:41] <Owen> > <@titus:pijean.ovh> Owen: How have you "ported" them, which new hardware, what do you mean by "marked as broken"? :)

It's a new installation so I'm installing apps and finding that they are marked as broken. (eg matrix signal Bridge)
[10:29:42] <Owen> Marked as broken in the app installation page.
[10:29:43] <Owen> And have the broken badge on their github page.
[10:29:44] <Owen> But I don't want to screw up my shiny new server by installing them today!
[10:29:44] <Owen> These are apps I've used for some time, so were originally installed a good long while ago.
[12:14:41] <Owen> I'm a dev but I've never done any yunohost packaging. I'll see what I can find
[14:50:08] <douwe[m]> ok. I am an idiot. I changed the admin password and forgot to write it down. I can still login to my server thnx to the ssh keypair.
[14:50:09] <tituspijean> What version are you running? If you are running v11.1, you should use a user account from the admins group. 
[14:50:09] <douwe[m]> `Error: yunohost command must be run as root or with sudo.`
[14:50:09] <douwe[m]> * titus[m]: that can't be done. The command needs to run as sudo. And for sudo I need my admin password
[14:50:09] <douwe[m]> titus[m]: that can't be done. The command need to run as sudo. And for sudo I need my admin password
[14:50:09] <tituspijean> douwe[m]: https://yunohost.org/en/change_admin_password ;)
[14:50:09] <douwe[m]> this is a debian vps with the current stable version of YNH
[14:50:09] <douwe[m]> Is there a way to change the admin password over ssh?
[14:50:10] <douwe[m]> * Running YunoHost 11.1.15. nice, I forgot that my main user is also in the admin group
[14:50:10] <douwe[m]> nice, I forgot that my main user is also in the admin group
[14:50:10] <douwe[m]> So now I can ssh as that user and change the admin user password again
[23:13:35] <ynhuser> hello. need a help. how to install yunohost on debian vps without the mail server feature? helps will be much appreciated. :)