Nick, the dir is /var/log/httpd/
Should i look for something special in the log? This from today is more than 200 lines. there are e.g.
[Wed Oct 28 10:18:33.426957 2020] [mpm_event:notice] [pid 1237:tid 3083232256] AH00489: Apache/2.4.46 (Unix) OpenSSL/1.1.1h configured -- resuming normal operations
[Wed Oct 28 10:18:33.426971 2020] [core:notice] [pid 1237:tid 3083232256] AH00094: Command line: '/usr/sbin/httpd'
libloc: loc_database_free: Could not unmap network nodes section: Invalid argument
Could not read database: /var/lib/location//database.db
Could not read database: /var/lib/location//database.db
libloc: loc_database_free: Could not unmap network nodes section: Invalid argument
Or should i post the whole log here?
That remembers me to the memory leak error, I’m researching at the moment.
The perl interface to libloc does calls the init() function for every operation ( find country code, … ).
In case of errors the loc_database_free function is called, which throws this error.
I’ll try to write a topic in bugzilla this evening.
Hrmpf, missed the /log/
snippet. Thanks for catching this.
Hi all,
meanwhile, @bbitsch filed a bug report regarding this issue (thanks):
Looks like it affects i686 systems only (I have not noticed it on x86_64 machines, yet), but this needs to be fixed anyway.
Thanks, and best regards,
Peter Müller
hi,
i have the same problem on a raspberry pi 3b
Good Morning,
effects this Problem only the Gui of the RuleEditor or also the Function of the Firewall itself too?
Have nice Day,
Nick
Hi Nick,
to my understanding, this affects the GUI only, the firewall engine itself works flawlessly.
Thanks, and best regards,
Peter Müller
A broken WUI affects the editing of the internal settings.
The system itself is configured by reading these settings ( which can not altered because of the broken web page ) and writing the configuration of the system modules.
In case of the firewall this means setting the iptables rules. Most of them are independant from the WUI. The internal settings of IPFire usually can be altered by selecting ‘save’ only, what isn’t possible when the web page is broken.
Do you have an ETA on when it will be repaired?
Bug found few hours ago on only one platform, but not on the main one (x86_64).
I think that “good solution” will be preferred to “fast solution”, then… evaluating an ETA is still less important than make a good assessment of the issue and the options for solving.
Is there a way to configure the rules without the web GUI?
We should know, why the web user interface is broken for some(!) installations.
All workarounds aren’t really effective.
Broken for me too…any quick workarounds?
Raspberry pi here has the same problem + a lot of countries missing in the Location Block
I have the same problem on i686, GUI doesn’t work.
You can try temporary solution with ssh connection to your server:
iptables-save > /etc/iptables.rules
edit this file and then
iptables-restore < /etc/iptables.rules
This solution requests deep knowledge of iptables and the firewall in IPFire!
You should do that only, if you exactly know what you are doing. In worst case you cut your SSH connection. Better to do this on the console directly.
Got the same problem even on test build 152 (Intel Atom X86 machine).
Hi, same Problem. Sorry for my bad english.
IPFire 2.25 (i586) - Core Update 151 (and some other architectures by customer, all ca. 30 times).
Rules are functional! No Edit, no new Rules
Edit iptables by shell is no option for normal users!
I hope this will help.
Have a look
nano /var/log/httpd/error_log
Clear Log
echo "" > /var/log/httpd/error_log
Read Log
tail -f /var/log/httpd/error_log
Edit some Rule by WUI
Edit some rule
Message
[root@ipfire1 ~]# tail -f /var/log/httpd/error_log
libloc: loc_database_free: Could not unmap network nodes section: Invalid argument
Could not read database: /var/lib/location//database.db
Some Ideas?
Thanks, Lars
Feedback
- Backup of the settings
- New installation x64 Core 151
- Restore the settings
Time expenditure approx. 1 hour. I hope there will be another solution. If I have to do this with 30 firewalls then that is …
Greetings