Author Archives: Nitin J Mutkawoa

Installing EMC Dell Networker 9 on CentOS 7

Its been since some days, I attended a training on EMC Dell Networker 9 in Mauritius itself. Though not everything can be covered in the training such as the installation of the networker on Linux machines, I decided to install it myself on my lab.

photo credits: dell.com

For those who are not familiar with Networker 9 formerly called Legato NetWorker is an “enterprise-level data protection software product that unifies and automates backup to tape, disk-based, and flash-based storage media across physical and virtual environments for granular and disaster recovery.”. To install it, I created a Centos 7 minimal installation lab on virtual box, made an update and install some few packages such as vim, tcpdump, net-tools, traceroute, epel-repo, locate, atop, htop and wget. These are basic packages for my own use on the VM. It has nothing to do with the Networker installation.

To be able to download the necessary packages, it’s a prerequisite to register on the EMC Dell website first. Once authenticated, you can move on to the download section of the packages. Dell will provide you in a tar.gz all packages for Debian and RHEL as well. Even Avamar packages will be found there. So, you will need to install only the necessary packages. Follow the instructions below after registration on the Dell website and download of the packages and the links highlighted. Once the file has been downloaded and decompressed, you will notice several RPMs and DEBs inside. The one which will be needed for the networker installation are as follows:

  • lgtoclnt (Networker client) – Provides you the ability to perform file system backup and recovery options.

  • lgtoxtdclnt (Networker Extended client) – Provides additional feature support for NetWorker clients, such as snapshot backup support, command line utility support including server reporting and administration, cloning and staging support, and so on.

  • lgtonode (Networker Storage Node) – Provides features for the storage node which will control storage devices such as tape drives, disk devices, autochangers, and silos.

  • lgtoserv (Networker Server) – Provides you the web server of the Networker portal.

  • lgtoauthc (Networker Authentication Service) – Authentication layer used for the backup purpose.

  • lgtoman (Networker Manual) – Its important for the manual. However, it’s not a prerequisite.

Whilst installing these packages, you will notice dependencies problems. See the “Tips” section below for more information. I had to install the Glibc 32-bit package as some of the networker packages might depend on them.

Here is an idea what error message { libc.so.6 is needed by lgtoclnt-9.1.1.7-1.x86_64 } you may have while performing the installation.

This can be confirmed by a yum whatprovides libc.so.6 which is found inside glibc.i686 package

1. At this point, to continue on with the installation I made the following steps:

yum install glibc-2.17-260.el7.i686
rpm -ivh lgtoclnt*.rpm lgtoxtdclnt*.rpm lgtonode*.rpm lgtoserv*.rpm lgtoauth*.rpm lgtoman*.rpm

2. If you are installing the package one by one, you will need to install lgtoauth first before installing lgtoserv. After installation of lgtoauth, it will prompt you to launch the following script:

/opt/nsr/authc-server/scripts/authc_configure.sh

3. It will prompt you where to specify where you have installed the Java Runtime. At the time, I’m writing this article, I’m using Java Runtime 8 from the oracle.com website. Use the following syntax to download it from wget.

wget --no-cookies --no-check-certificate --header "Cookie: gpw_e24=http%3A%2F%2Fwww.oracle.com%2F; oraclelicense=accept-securebackup-cookie" "https://download.oracle.com/otn-pub/java/jdk/8u202-b08/1961070e4c9b4e26a04e7f5a083f551e/jre-8u202-linux-x64.rpm"

4. Once, downloaded and installed, java -version should provide you the runtime environment.

5. Now, you can launch the script /opt/nsr/authc-server/scripts/authc_configure.sh anew and it will prompt you to enter the key store and administrator passwords.

6. Once the installation is complete, you can now run the /etc/init.d/networker daemon and check the process running.

Tips:

  • The problem is that the GLIBC2.0 symbol is not provided by the x86-64 Libc on CentOS, but it is provided by the 32-bit i686 package. There is no real dependency of the EMC NetWorker 9.1 package on the 32-bit library, but this is probably a false dependency RPM problem. So it is necessary to download the following 32-bit packages from the CentOS website and install them.

  • If you have installed the JAVA elsewhere, you will need to specify the path launch executing the script /opt/nsr/authc-server/scripts/authc_configure.sh

  • The installation logs are found at /opt/nsr/authc-server/logs/install.log.

  • For testing purpose, I deactivated firewalld and disable SELinux.

My participation at #Afrinic29 in Yasmine Hammamet, Tunisia

My participation at Afrinic-29 in Hammamet, Tunisia was productive and unique in itself. The event took place between 26-30 November 2018 at Diar Lemdina hotel. These are the days that will always be remembered. Situated in the north of Tunisia, Yasmine Hammamet was the place selected and it was close to the beach. I still can’t believe I was on the Mediterranean beach discussing about Internet-related topics such as DNS, DNSSEC and Policies development in Africa region.

Before departing, I seized the opportunity to make a video and posted in on my Tunnelix.com Facebook Page as well as on my Tunnelix Twitter account.

For some reasons, I had to travel to Hungary, then to Germany then to Tunisia. So I got the opportunity to spend a night in Munich on Transit. The hotel in Munich was pretty nice and cozy. On the next day, I flew to Tunisia. Once landed in Carthage in Tunisia, the atmosphere was pretty polluted, but as soon as I reached Yasmine Hammamet, things are different. It was a pretty beautiful and calm place.

My main objectives were to :

  • Focus on the DNSSEC hackathon carried out under the umbrella of cyberstorm.mu titled Operation KSK-ROLLOVER.
  • Sharing knowledge in the Africa region.
  • Allocation of IPv4 and IPv6 in Africa region.
  • Presenting DNS and DNSSEC.
  • DNS Flag day.
  • Security incidents on DNS.
  • Policy discussion development in Africa.

During the event, I got the opportunity to speak with Afrinic29 fellow, Souad Abidi who shared pretty good experience about the event.

Also met with some guys from Chad republic and we shared some Linux and network techniques. Besides, I met with several guys from the ATI Tunisia telecom and we discussed a lot about the event especially about Policy development. I’m glad to receive media coverage from the cyberstorm.mu team who supported me a lot as well as ICT.IO who published an article about the event.

Overall, the event was very productive. I seized the opportunity to congratulate Afrinic staffs during the open mike session. Indeed, they did a good job which demands extreme planning. During my speech on DNSSEC as Devops engineer at Orange Business Services, several issues were raised such as hackathon carried out by the cyberstorm.mu team and even prospective future hackathon concerning other DNS applications. I also attended few sessions on IPv6, Cert Africa and others. Also got the opportunity to meet with people who are very busy with Policy development in Africa as well as the father of Africa Internet, Nii Quaynor.

During my free time especially at night, I went to the NA3NA3A Karaoke Tunisian songs. It was pretty nice and unique. Took some videos and made some audio recording for the car whilst i’m driving.

You can also view my youtube playlist for Afrinic29 here and here

Several pictures also taken can be viewed here my Flicker Account:

Afrinic29

Phishing Attack – Free Travel tickets with Emirates Airline

Today itself, a friend sent me a message about free travel ticket with Emirates airline through WhatsApp. On seeing the URL, I immediately doubt about the authenticity of such kind of strategy spammers are using to make money as well as to harvest data about you. Once you fill in the form, it will prompt you to share the information to 30 people on WhatsApp to get your ticket. Common, this does not make sense at all and I believe that the website should be reported and Emirates Airline to make an official announcement on its website about these scammers.


Photo Credits: Emirates.com

The message sent to me was in French. Since I’m well conversant in French, I could easily read and interpreted it. The message received is as follows:


“Pour le 33° Anniversaire, la compagnie aérienne *Emirates Airline* donne à tout le monde *2 billets d´avion gratuits*. Récupérez votre billets d´avion immédiatement. http://bit.ly/Emirates-airline”

The translation looks like this in English:

“For the 33rd Birthday, the aviation airline “Emirates Airline” is giving a free *2 air travel tickets. Get your airline tickets immediately. http://bit.ly/Emirates-airline”

If you observed carefully the real URL has been shortened on bit.ly. There is nothing wrong when using bit.ly which is a great tool for URL shortener. However, if you try to access the URL, you will be redirected on http://5ack.com/Emirate/ which is well known for attacks.

Let’s see what does the whois tool said about 5ack.com:

1.According to domaintools.com, the IP Address behind is 107.180.59.131 

2. The IP Address 107.180.59.131 is well known for attacks and there is no real information as to who is behind this domain name.

3. Worst, the domain 5ack.com has a history of 55 counts of changed IP addresses.

Extract from domaintools.com

4. On the following link https://chat.stackexchange.com/transcript/65945/2018/11/14/2 we can see someone has blacklisted the IP 107.180.59.131 who at that time was selling health supplement. Of course, it’s fake again.

Please don’t click on the link otherwise you might eat those baits and be a victim of Phishing attacks. I wonder how come those links ended in Mauritius which is probably due to French-speaking people here in Mauritius. Otherwise, several French-speaking countries in Africa is at risk. I wish someone from the security team of Emirates Airline read that blog and made an official announcement soon about those spammers hovering everywhere on the Internet. Let’s work together for a safe and secure Internet and keep on passing the message.

IETF 103 hackathon remotely by cyberstorm.mu – Day 2 & 3

In case you missed Day-0 and Day-1 for the IETF 103 hackathon by the cyberstorm.mu team, feel free to have a look. I should admit that Day-2 was a more relaxed day for the SSH team compared to those working for the TLS 1.3 and HTTP 451 projects. Several PR’s sent for all the three tracks which are HTTP 451, SSH and TLS 1.3. It’s more about the testing.


It looks that we had enough time to discuss even more about our future move for the next IETF hackathon. All teams were ready with the patches and several Pull Requests sent. We seized the opportunity to discuss several aspects and experience during the hackathon. Overall, the IETF 103 hackathon went well for all the three tracks.

As regards for the NetSSH project which I worked there was a comment from Mzafekas on Github: “

@jmutkawoa thanks much for the PR. Since this is in some means a breaking change, this would be in the next major version.”

I’m glad that we will have the RC4 deprecated in the new version of NetSSH. We had our live presentation remotely from Mauritius during the IETF 103 hackathon live in Bangkok, Thailand. You can view the presentation here:


IETF Hackathons encourage developers to collaborate and develop utilities, ideas, sample code and solutions that show practical implementations of IETF standards. More than 200 participants have gathered in Bangkok to make the Internet work better.
 
As usual, someone got an idea to do a mega splash in the pool with the slow-motion video which is pretty nice 🙂
 

 

I’m glad that TheRegister also published an interesting article about RC4 deprecation. At cyberstorm.mu, we are also looking forward to the next IETF 104 hackathon which has been scheduled remotely at Prague, Czech.

IETF 103 hackathon remotely by cyberstorm.mu – Day 1

Day-0 for the IETF 103 hackathon was really fun. We had two first-timers who worked pretty hard. It was really an intense moment on Day 1. Everyone was busy with their projects. I should admit it was pretty intense. Our first pull request was already merged by Muzaffar from the TLS 1.3 whereas kheshav had the testing part to complete for HTTP 451. I already send a pull request for SSH for the NetSSH Ruby library. We discussed a lot on implementation and testing part. Nathan, Jeremy, and Rahul also worked heavily on the TLS 1.3 implementation. For the IETF 103, we decide to skip the interoperability testing and focus more on implementation.

IETF 103 DAY1

Flickr Album Gallery Powered By: WP Frank

When it comes to goodies, WolfSSL congratulated us for a good job and sent us several goodies and other stuff.

However, on the SSH side, we have to deprecate RC4 in several projects such as NetSSH and JSCH, a JAVA library. On TLS 1.3, SNI added to Httperf, a TLS 1.3 library is still on progress on CSharp and LUA. We also have one module for Drupal and Django for HTTP 451.