Upgrade to 181 hangs - no WebGUI

What do the logs say happened.

Nothing like this showed up in any of the systems that were evaluated during the testing phase and there were no reports on this from any of the users who tried the Core Update 181 Testing.

Without some log information on what happened it is very difficult to figure out what might have happened.

When you say then nothing, do you mean that no IPFire stuff was seen on the screen anymore or do you mean that it got to the post-upgrade scripts and then seemed to stay there without any update for a longish time.

If the latter then the post-upgrade scripts can take longer to do depending on various factors.

For instance if you have a lot of OpenVPN connections defined then there was a part of the CU181 post-upgrade where it was updating each of them to indicate if they are using passwords or not and that would take some additional time.
So depending on the core update details the post-upgrade scripts stage could take a short time or a much longer time.

I just updated an APU4D4 to CU 181 and all is A-OK. Two more to go…

So, I connected via the console and restarted apache. The gui was available again. Then I rebooted the firewall because the upgrade required that. All is well, thanks again!

Regards,
Edwin.

1 Like

I’ll get the pakfire and kernel logs, although I don’t see anything interesting?


EDIT : moderator changed text to code block.


IPFire diagnostics
Section: pakfire
Date: November 24, 2023

04:10:23 pakfire:  PAKFIRE INFO: IPFire Pakfire 2.27-x86_64 started!
04:10:23 pakfire:  CORE INFO: Checking for Core-Updates...
04:10:23 pakfire:  CORE INFO: core-list.db is 16219 seconds old. - DEBUG: force
04:10:24 pakfire:  DOWNLOAD STARTED: lists/core-list.db
04:10:24 pakfire:  MIRROR INFO: 25 servers found in list
04:10:24 pakfire:  DOWNLOAD INFO: Host: mirror.datacenter.by (HTTPS) - File: pub/ipfire/pakfire2/2.27-x86_64/lists/core-list.db
04:10:24 pakfire:  DOWNLOAD INFO: pub/ipfire/pakfire2/2.27-x86_64/lists/core-list.db has size of 903 bytes
04:10:25 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
04:10:25 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
04:10:25 pakfire:  DOWNLOAD INFO: Signature of core-list.db is fine.
04:10:25 pakfire:  DOWNLOAD FINISHED: pub/ipfire/pakfire2/2.27-x86_64/lists/core-list.db
04:10:25 pakfire:  CORE UPGR: Upgrading from release 180 to 181
04:10:25 pakfire:  DOWNLOAD STARTED: meta/meta-core-upgrade-181
04:10:25 pakfire:  MIRROR INFO: 25 servers found in list
04:10:25 pakfire:  DOWNLOAD INFO: Host: mirror1.ipfire.org (HTTPS) - File: pakfire2/2.27-x86_64/meta/meta-core-upgrade-181
04:10:26 pakfire:  DOWNLOAD INFO: pakfire2/2.27-x86_64/meta/meta-core-upgrade-181 has size of 1036 bytes
04:10:26 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
04:10:26 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
04:10:26 pakfire:  DOWNLOAD INFO: Signature of meta-core-upgrade-181 is fine.
04:10:26 pakfire:  DOWNLOAD FINISHED: pakfire2/2.27-x86_64/meta/meta-core-upgrade-181
04:10:26 pakfire:  DOWNLOAD STARTED: paks/core-upgrade-2.27-181.ipfire
04:10:26 pakfire:  MIRROR INFO: 25 servers found in list
04:10:26 pakfire:  DOWNLOAD INFO: Host: ftp.belnet.be (HTTPS) - File: mirror/ipfire/current/pakfire2/2.27-x86_64/paks/core-upgrade-2.27-181.ipfire
04:10:27 pakfire:  DOWNLOAD INFO: mirror/ipfire/current/pakfire2/2.27-x86_64/paks/core-upgrade-2.27-181.ipfire has size of 77208942 bytes
04:10:31 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
04:10:31 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
04:10:32 pakfire:  DOWNLOAD INFO: Signature of core-upgrade-2.27-181.ipfire is fine.
04:10:32 pakfire:  DOWNLOAD FINISHED: mirror/ipfire/current/pakfire2/2.27-x86_64/paks/core-upgrade-2.27-181.ipfire
04:10:32 pakfire:  PAKFIRE UPGR: core-upgrade-181: Decrypting...
04:10:32 pakfire:  CLEANUP: tmp
04:10:32 pakfire:  DECRYPT STARTED: core-upgrade-181
04:10:32 pakfire:  DECRYPT FINISHED: core-upgrade-181 - Status: 0
04:10:32 pakfire:  PAKFIRE UPGR: core-upgrade-181: Upgrading files and running post-upgrading scripts...
04:10:52 pakfire:  CLEANUP: tmp
04:10:52 pakfire:  PAKFIRE UPGR: core-upgrade-181: Finished.
04:10:52 pakfire:  PAKFIRE INFO: Checking for package updates...
04:10:52 pakfire:  DB INFO: packages_list.db is 16249 seconds old. - DEBUG: force
04:10:52 pakfire:  DOWNLOAD STARTED: lists/packages_list.db
04:10:52 pakfire:  MIRROR INFO: 25 servers found in list
04:10:52 pakfire:  DOWNLOAD INFO: Host: ftp.fau.de (HTTPS) - File: ipfire/pakfire2/2.27-x86_64/lists/packages_list.db
04:10:53 pakfire:  DOWNLOAD INFO: ipfire/pakfire2/2.27-x86_64/lists/packages_list.db has size of 5309 bytes
04:10:53 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
04:10:53 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
04:10:53 pakfire:  DOWNLOAD INFO: Signature of packages_list.db is fine.
04:10:53 pakfire:  DOWNLOAD FINISHED: ipfire/pakfire2/2.27-x86_64/lists/packages_list.db
04:10:53 pakfire:  PAKFIRE WARN: No new package upgrades available.
04:10:53 pakfire:  PAKFIRE INFO: Pakfire has finished. Closing.
12:32:50 pakfire:  PAKFIRE INFO: IPFire Pakfire 2.27-x86_64 started!
12:32:50 pakfire:  MIRROR INFO: server-list.db is 46368 seconds old. - DEBUG: force
12:32:50 pakfire:  DOWNLOAD STARTED: 2.27-x86_64/lists/server-list.db
12:32:50 pakfire:  DOWNLOAD INFO: Host: pakfire.ipfire.org (HTTPS) - File: 2.27-x86_64/lists/server-list.db
12:32:51 pakfire:  DOWNLOAD INFO: 2.27-x86_64/lists/server-list.db has size of 2232 bytes
12:32:51 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
12:32:51 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
12:32:51 pakfire:  DOWNLOAD INFO: Signature of server-list.db is fine.
12:32:51 pakfire:  DOWNLOAD FINISHED: 2.27-x86_64/lists/server-list.db
12:32:51 pakfire:  DB INFO: packages_list.db is 30118 seconds old. - DEBUG: force
12:32:51 pakfire:  DOWNLOAD STARTED: lists/packages_list.db
12:32:51 pakfire:  MIRROR INFO: 24 servers found in list
12:32:51 pakfire:  DOWNLOAD INFO: Host: mirror.ihost.md (HTTPS) - File: ipfire/pakfire2/2.27-x86_64/lists/packages_list.db
12:32:52 pakfire:  DOWNLOAD INFO: ipfire/pakfire2/2.27-x86_64/lists/packages_list.db has size of 5309 bytes
12:32:53 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
12:32:53 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
12:32:53 pakfire:  DOWNLOAD INFO: Signature of packages_list.db is fine.
12:32:53 pakfire:  DOWNLOAD FINISHED: ipfire/pakfire2/2.27-x86_64/lists/packages_list.db
12:32:53 pakfire:  CORE INFO: core-list.db is 30148 seconds old. - DEBUG: force
12:32:53 pakfire:  DOWNLOAD STARTED: lists/core-list.db
12:32:53 pakfire:  MIRROR INFO: 24 servers found in list
12:32:53 pakfire:  DOWNLOAD INFO: Host: ftp.fau.de (HTTPS) - File: ipfire/pakfire2/2.27-x86_64/lists/core-list.db
12:32:53 pakfire:  DOWNLOAD INFO: ipfire/pakfire2/2.27-x86_64/lists/core-list.db has size of 903 bytes
12:32:54 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
12:32:54 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
12:32:54 pakfire:  DOWNLOAD INFO: Signature of core-list.db is fine.
12:32:54 pakfire:  DOWNLOAD FINISHED: ipfire/pakfire2/2.27-x86_64/lists/core-list.db
12:32:54 pakfire:  PAKFIRE INFO: Pakfire has finished. Closing.
12:38:10 pakfire:  PAKFIRE INFO: IPFire Pakfire 2.27-x86_64 started!
12:38:10 pakfire:  MIRROR INFO: server-list.db is 319 seconds old. - DEBUG: noforce
12:38:10 pakfire:  DB INFO: packages_list.db is 317 seconds old. - DEBUG: noforce
12:38:10 pakfire:  CORE INFO: core-list.db is 316 seconds old. - DEBUG: noforce
12:38:10 pakfire:  PAKFIRE INFO: Pakfire has finished. Closing.


pakfire screenshot is from another firewall than the logs. The time counter stops, but the spinning graphic contiunes. If I click on anything, I get a refused to connect error. If I then go to the console, ipfire rejects the root password. Power cycle returns functionality and is running 181. While hung, ipsec and openvpn still process without error.

You should have just let it finish. My development vm’s that I upgraded only had around a 20 to 30 second wait at that stage of post-upgrading but my main machine had a wait of around a couple of minutes but it did eventually complete.

The pakfire logs you showed from another machine had a wait of 20 seconds for the post-upgrade scripts before the pakfire logs said that the core-upgrade-181: Finished

What do the pakfire logs say for the machine that you show the pakfire screen which is running the post-upgrade scripts at 16:26:14

EDIT: moderator changed text to code block.


IPFire diagnostics
Section: kernel
Date: November 24, 2023

...

04:00:06 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.216.149.240 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=51674 DPT=24343 WINDOW=65535 RES=0x00 SYN URGP=0 
04:00:14 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=141.98.7.250 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=237 ID=54321 PROTO=TCP SPT=40512 DPT=3128 WINDOW=65535 RES=0x00 SYN URGP=0 
04:00:27 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=210.245.120.108 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=242 ID=16533 PROTO=TCP SPT=49188 DPT=10089 WINDOW=1024 RES=0x00 SYN URGP=0 
04:00:41 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.142.125.242 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=35 ID=40303 PROTO=TCP SPT=16760 DPT=38383 WINDOW=1024 RES=0x00 SYN URGP=0 
04:00:43 kernel:  BLKLST_DSHIELD IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=198.235.24.80 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=51860 DPT=50580 WINDOW=65535 RES=0x00 SYN URGP=0 
04:00:56 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.146 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=26334 PROTO=TCP SPT=59576 DPT=58090 WINDOW=1024 RES=0x00 SYN URGP=0 
04:00:57 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=203.177.190.214 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=228 ID=27342 PROTO=TCP SPT=54218 DPT=10403 WINDOW=1024 RES=0x00 SYN URGP=0 
04:01:09 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.146 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=8476 PROTO=TCP SPT=59576 DPT=58468 WINDOW=1024 RES=0x00 SYN URGP=0 
04:01:36 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=161.35.76.34 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=230 ID=54321 PROTO=TCP SPT=53011 DPT=6005 WINDOW=65535 RES=0x00 SYN URGP=0 
04:02:08 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.54 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=44390 PROTO=TCP SPT=59939 DPT=62614 WINDOW=1024 RES=0x00 SYN URGP=0 
04:02:09 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=118.37.157.169 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=227 ID=35293 PROTO=TCP SPT=45659 DPT=4040 WINDOW=1024 RES=0x00 SYN URGP=0 
04:02:28 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=35.203.210.11 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=58 ID=54321 PROTO=TCP SPT=54486 DPT=9571 WINDOW=65535 RES=0x00 SYN URGP=0 
04:02:56 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.226.176 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=51932 PROTO=TCP SPT=59749 DPT=61415 WINDOW=1024 RES=0x00 SYN URGP=0 
04:03:13 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=147.78.47.227 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=237 ID=38509 PROTO=TCP SPT=51312 DPT=3391 WINDOW=1024 RES=0x00 SYN URGP=0 
04:03:14 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=31.7.58.42 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=237 ID=54321 PROTO=TCP SPT=43430 DPT=8080 WINDOW=65535 RES=0x00 SYN URGP=0 
04:03:28 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.226.165 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=39407 PROTO=TCP SPT=59702 DPT=60843 WINDOW=1024 RES=0x00 SYN URGP=0 
04:03:43 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=35.203.211.207 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=54382 DPT=8185 WINDOW=65535 RES=0x00 SYN URGP=0 
04:04:29 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=161.35.67.244 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=230 ID=54321 PROTO=TCP SPT=51816 DPT=4444 WINDOW=65535 RES=0x00 SYN URGP=0 
04:04:32 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.142.125.254 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=35 ID=64351 PROTO=TCP SPT=20477 DPT=62333 WINDOW=1024 RES=0x00 SYN URGP=0 
04:04:46 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.54 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=35752 PROTO=TCP SPT=59939 DPT=62847 WINDOW=1024 RES=0x00 SYN URGP=0 
04:04:48 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=176.114.132.188 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=45 ID=35234 PROTO=TCP SPT=63743 DPT=23 WINDOW=36743 RES=0x00 SYN URGP=0 
04:04:57 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=5.180.253.65 DST=96.83.246.202 LEN=37 TOS=0x00 PREC=0x20 TTL=45 ID=14719 DF PROTO=UDP SPT=12905 DPT=5353 LEN=17 
04:05:03 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=35.203.210.107 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=20711 PROTO=TCP SPT=52037 DPT=41211 WINDOW=1024 RES=0x00 SYN URGP=0 
04:05:08 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.78 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=56915 PROTO=TCP SPT=40039 DPT=64462 WINDOW=1024 RES=0x00 SYN URGP=0 
04:05:16 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=217.138.212.230 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=226 ID=54321 PROTO=TCP SPT=63618 DPT=873 WINDOW=65535 RES=0x00 SYN URGP=0 
04:05:21 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.226.165 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=50858 PROTO=TCP SPT=59702 DPT=60286 WINDOW=1024 RES=0x00 SYN URGP=0 
04:05:26 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.216.150.46 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=52099 DPT=9148 WINDOW=65535 RES=0x00 SYN URGP=0 
04:05:27 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=188.171.234.110 DST=96.83.246.202 LEN=28 TOS=0x00 PREC=0x20 TTL=45 ID=22530 PROTO=UDP SPT=27966 DPT=57469 LEN=8 
04:05:34 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=167.94.145.22 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=40 ID=54854 PROTO=TCP SPT=4154 DPT=29568 WINDOW=1024 RES=0x00 SYN URGP=0 
04:05:35 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=164.90.164.114 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=230 ID=54321 PROTO=TCP SPT=43233 DPT=5060 WINDOW=65535 RES=0x00 SYN URGP=0 
04:05:59 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=159.223.34.146 DST=96.83.246.202 LEN=74 TOS=0x00 PREC=0x20 TTL=33 ID=48877 DF PROTO=UDP SPT=34596 DPT=1900 LEN=54 
04:06:35 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=193.201.9.118 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=238 ID=53232 PROTO=TCP SPT=56859 DPT=60003 WINDOW=1024 RES=0x00 SYN URGP=0 
04:06:45 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.216.149.194 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=58 ID=54321 PROTO=TCP SPT=51684 DPT=50501 WINDOW=65535 RES=0x00 SYN URGP=0 
04:06:53 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=192.241.197.40 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=245 ID=54321 PROTO=TCP SPT=56970 DPT=631 WINDOW=65535 RES=0x00 SYN URGP=0 
04:06:59 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=51.68.47.115 DST=96.83.246.202 LEN=117 TOS=0x00 PREC=0x20 TTL=46 ID=49378 DF PROTO=UDP SPT=38565 DPT=8000 LEN=97 
04:07:01 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=68.69.184.62 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=231 ID=54321 PROTO=TCP SPT=39220 DPT=5555 WINDOW=65535 RES=0x00 SYN URGP=0 
04:07:02 kernel:  BLKLST_DSHIELD IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=198.235.24.102 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=58 ID=54321 PROTO=TCP SPT=53976 DPT=47001 WINDOW=65535 RES=0x00 SYN URGP=0 
04:07:10 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=94.156.65.12 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=54321 PROTO=TCP SPT=59717 DPT=61616 WINDOW=65535 RES=0x00 SYN URGP=0 
04:07:22 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=137.184.206.34 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=54321 PROTO=TCP SPT=41326 DPT=8397 WINDOW=65535 RES=0x00 SYN URGP=0 
04:07:23 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.198 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=10100 PROTO=TCP SPT=59490 DPT=57504 WINDOW=1024 RES=0x00 SYN URGP=0 
04:07:28 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.146 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=28236 PROTO=TCP SPT=59576 DPT=58516 WINDOW=1024 RES=0x00 SYN URGP=0 
04:07:52 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=65.49.20.81 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=228 ID=54321 PROTO=TCP SPT=37792 DPT=8081 WINDOW=65535 RES=0x00 SYN URGP=0 
04:08:18 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.146 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=30988 PROTO=TCP SPT=59576 DPT=58047 WINDOW=1024 RES=0x00 SYN URGP=0 
04:08:31 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.216.150.199 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=53362 DPT=9994 WINDOW=65535 RES=0x00 SYN URGP=0 
04:08:51 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.216.150.230 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=58 ID=54321 PROTO=TCP SPT=50420 DPT=47168 WINDOW=65535 RES=0x00 SYN URGP=0 
04:09:03 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=139.162.190.203 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=229 ID=19473 PROTO=TCP SPT=6464 DPT=8089 WINDOW=1024 RES=0x00 SYN URGP=0 
04:09:04 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=170.64.185.109 DST=96.83.246.202 LEN=103 TOS=0x00 PREC=0x20 TTL=26 ID=26462 DF PROTO=UDP SPT=15603 DPT=1027 LEN=83 
04:09:11 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=67.217.56.126 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=239 ID=34599 PROTO=TCP SPT=59854 DPT=33894 WINDOW=1024 RES=0x00 SYN URGP=0 
04:09:17 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=51.178.166.185 DST=96.83.246.202 LEN=78 TOS=0x00 PREC=0x20 TTL=49 ID=41865 DF PROTO=UDP SPT=1027 DPT=1900 LEN=58 
04:10:10 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.78 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=55170 PROTO=TCP SPT=40039 DPT=64852 WINDOW=1024 RES=0x00 SYN URGP=0 
04:10:11 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.216.149.74 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=28747 PROTO=TCP SPT=50191 DPT=20671 WINDOW=1024 RES=0x00 SYN URGP=0 
04:10:42 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=167.94.146.29 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=37 ID=733 PROTO=TCP SPT=43027 DPT=42431 WINDOW=1024 RES=0x00 SYN URGP=0 
04:10:58 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.226.176 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=22995 PROTO=TCP SPT=59749 DPT=61000 WINDOW=1024 RES=0x00 SYN URGP=0 
04:10:59 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=198.199.118.94 DST=96.83.246.202 LEN=31 TOS=0x00 PREC=0x20 TTL=245 ID=54321 PROTO=UDP SPT=48672 DPT=5632 LEN=11 
04:11:09 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=146.88.241.196 DST=96.83.246.202 LEN=127 TOS=0x00 PREC=0x20 TTL=246 ID=54321 PROTO=UDP SPT=1901 DPT=1900 LEN=107 
04:11:17 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=107.170.230.26 DST=96.83.246.202 LEN=51 TOS=0x00 PREC=0x20 TTL=245 ID=54321 PROTO=UDP SPT=37226 DPT=23 LEN=31 
04:11:26 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=45.142.182.95 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=237 ID=54321 PROTO=TCP SPT=42380 DPT=5555 WINDOW=65535 RES=0x00 SYN URGP=0 
04:11:44 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=185.233.19.248 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=231 ID=31443 PROTO=TCP SPT=58914 DPT=30081 WINDOW=1024 RES=0x00 SYN URGP=0 
04:12:00 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.226.165 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=19173 PROTO=TCP SPT=59702 DPT=60272 WINDOW=1024 RES=0x00 SYN URGP=0 
04:12:03 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.150 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=14906 PROTO=TCP SPT=59630 DPT=59813 WINDOW=1024 RES=0x00 SYN URGP=0 
04:12:20 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=12.110.37.231 DST=96.83.246.202 LEN=94 TOS=0x00 PREC=0x20 TTL=53 ID=59176 DF PROTO=UDP SPT=17298 DPT=5060 LEN=74 
04:12:21 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=185.233.19.246 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=229 ID=59819 PROTO=TCP SPT=58914 DPT=2104 WINDOW=1024 RES=0x00 SYN URGP=0 
04:12:23 kernel:  BLKLST_DSHIELD IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=198.235.24.33 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=58 ID=54321 PROTO=TCP SPT=49636 DPT=8008 WINDOW=65535 RES=0x00 SYN URGP=0 
04:12:33 kernel:  BLKLST_DSHIELD IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=205.210.31.101 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=52527 DPT=10001 WINDOW=65535 RES=0x00 SYN URGP=0 
04:12:35 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.216.150.145 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=36694 PROTO=TCP SPT=54840 DPT=56915 WINDOW=1024 RES=0x00 SYN URGP=0 
04:12:43 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=35.203.210.27 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=58 ID=54321 PROTO=TCP SPT=53049 DPT=21600 WINDOW=65535 RES=0x00 SYN URGP=0 
04:13:05 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=104.131.144.34 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=245 ID=54321 PROTO=TCP SPT=47325 DPT=515 WINDOW=65535 RES=0x00 SYN URGP=0 
04:13:27 kernel:  BLKLST_DSHIELD IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=198.235.24.90 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=52683 DPT=465 WINDOW=65535 RES=0x00 SYN URGP=0 
04:13:46 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.226.176 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=49504 PROTO=TCP SPT=59749 DPT=61249 WINDOW=1024 RES=0x00 SYN URGP=0 
04:13:52 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=35.203.210.157 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=58 ID=54321 PROTO=TCP SPT=51815 DPT=19080 WINDOW=65535 RES=0x00 SYN URGP=0 
04:13:57 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=35.203.211.181 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=52091 DPT=48061 WINDOW=65535 RES=0x00 SYN URGP=0 
04:14:44 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=31.7.58.42 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=237 ID=54321 PROTO=TCP SPT=37727 DPT=8100 WINDOW=65535 RES=0x00 SYN URGP=0 
04:15:00 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.78 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=40211 PROTO=TCP SPT=40039 DPT=64628 WINDOW=1024 RES=0x00 SYN URGP=0 
04:15:01 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.216.149.175 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=50982 DPT=1192 WINDOW=65535 RES=0x00 SYN URGP=0 
04:15:06 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.68 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=39277 PROTO=TCP SPT=59988 DPT=63712 WINDOW=1024 RES=0x00 SYN URGP=0 
04:15:08 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=207.90.244.5 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=105 ID=16096 PROTO=TCP SPT=24858 DPT=902 WINDOW=55711 RES=0x00 SYN URGP=0 
04:15:19 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.226.165 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=54814 PROTO=TCP SPT=59702 DPT=60246 WINDOW=1024 RES=0x00 SYN URGP=0 
04:15:22 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=143.42.1.128 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=243 ID=54321 PROTO=TCP SPT=48370 DPT=6466 WINDOW=65535 RES=0x00 SYN URGP=0 
04:15:25 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=66.29.138.169 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=5845 PROTO=TCP SPT=51639 DPT=62890 WINDOW=1024 RES=0x00 SYN URGP=0 
04:15:39 kernel:  BLKLST_DSHIELD IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=193.163.125.31 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=41854 PROTO=TCP SPT=40182 DPT=558 WINDOW=14600 RES=0x00 SYN URGP=0 
04:15:42 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=185.233.19.244 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=231 ID=53164 PROTO=TCP SPT=58914 DPT=3269 WINDOW=1024 RES=0x00 SYN URGP=0 
04:16:07 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.146 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=60418 PROTO=TCP SPT=59576 DPT=58081 WINDOW=1024 RES=0x00 SYN URGP=0 
04:16:27 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=185.233.19.227 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=232 ID=6164 PROTO=TCP SPT=58914 DPT=5666 WINDOW=1024 RES=0x00 SYN URGP=0 
04:16:33 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.68 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=25761 PROTO=TCP SPT=59988 DPT=63885 WINDOW=1024 RES=0x00 SYN URGP=0 
04:16:42 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=118.123.105.85 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=225 ID=50008 PROTO=TCP SPT=39847 DPT=11371 WINDOW=63540 RES=0x00 SYN URGP=0 
04:16:46 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.216.149.63 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=55696 DPT=12019 WINDOW=65535 RES=0x00 SYN URGP=0 
04:16:46 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=34.93.60.254 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=41097 PROTO=TCP SPT=45432 DPT=21 WINDOW=1024 RES=0x00 SYN URGP=0 
04:16:50 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.198 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=31923 PROTO=TCP SPT=59490 DPT=57393 WINDOW=1024 RES=0x00 SYN URGP=0 
04:16:50 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=184.105.247.230 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=228 ID=54321 PROTO=TCP SPT=59973 DPT=82 WINDOW=65535 RES=0x00 SYN URGP=0 
04:17:04 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=167.248.133.138 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=35 ID=60026 PROTO=TCP SPT=1750 DPT=57940 WINDOW=1024 RES=0x00 SYN URGP=0 
04:17:39 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.78 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=37443 PROTO=TCP SPT=40039 DPT=64254 WINDOW=1024 RES=0x00 SYN URGP=0 
12:36:05 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.198 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=34855 PROTO=TCP SPT=59490 DPT=57875 WINDOW=1024 RES=0x00 SYN URGP=0 
12:36:15 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.226.165 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=49347 PROTO=TCP SPT=59702 DPT=60405 WINDOW=1024 RES=0x00 SYN URGP=0 
12:36:16 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.150 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=52683 PROTO=TCP SPT=59630 DPT=59820 WINDOW=1024 RES=0x00 SYN URGP=0 
12:36:19 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=167.94.138.136 DST=96.83.246.202 LEN=48 TOS=0x00 PREC=0x20 TTL=34 ID=33512 PROTO=UDP SPT=49005 DPT=1812 LEN=28 
12:36:22 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=185.132.53.3 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=235 ID=54321 PROTO=TCP SPT=39045 DPT=4084 WINDOW=65535 RES=0x00 SYN URGP=0 
12:36:35 kernel:  usb 1-4: USB disconnect, device number 5
12:36:35 kernel:  usb 1-4.2: USB disconnect, device number 6
12:36:35 kernel:  usb 1-4.3: USB disconnect, device number 7
12:36:40 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=167.94.145.91 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=40 ID=1803 PROTO=TCP SPT=54007 DPT=8008 WINDOW=1024 RES=0x00 SYN URGP=0 
12:36:58 kernel:  usb 1-4: new high-speed USB device number 8 using xhci_hcd
12:36:58 kernel:  usb 1-4: New USB device found, idVendor=1a40, idProduct=0101, bcdDevice= 1.11
12:36:58 kernel:  usb 1-4: New USB device strings: Mfr=0, Product=1, SerialNumber=0
12:36:58 kernel:  usb 1-4: Product: USB 2.0 Hub
12:36:58 kernel:  hub 1-4:1.0: USB hub found
12:36:58 kernel:  hub 1-4:1.0: 4 ports detected
12:36:58 kernel:  usb 1-4.2: new low-speed USB device number 9 using xhci_hcd
12:36:58 kernel:  usb 1-4.2: New USB device found, idVendor=045e, idProduct=0040, bcdDevice= 3.00
12:36:58 kernel:  usb 1-4.2: New USB device strings: Mfr=1, Product=3, SerialNumber=0
12:36:58 kernel:  usb 1-4.2: Product: Microsoft 3-Button Mouse with IntelliEye(TM)
12:36:58 kernel:  usb 1-4.2: Manufacturer: Microsoft
12:36:58 kernel:  input: Microsoft Microsoft 3-Button Mouse with IntelliEye(TM) as /devices/pci0000:00/0000:00:14.0/usb1/1-4/1-4.2/1-4.2:1.0/0003:045E:0040.0007/input/input16
12:36:58 kernel:  hid-generic 0003:045E:0040.0007: input,hidraw0: USB HID v1.10 Mouse [Microsoft Microsoft 3-Button Mouse with IntelliEye(TM)] on usb-0000:00:14.0-4.2/input0
12:36:59 kernel:  usb 1-4.3: new low-speed USB device number 10 using xhci_hcd
12:36:59 kernel:  usb 1-4.3: New USB device found, idVendor=03f0, idProduct=034a, bcdDevice= 1.21
12:36:59 kernel:  usb 1-4.3: New USB device strings: Mfr=1, Product=2, SerialNumber=0
12:36:59 kernel:  usb 1-4.3: Product: HP Elite USB Keyboard
12:36:59 kernel:  usb 1-4.3: Manufacturer: Chicony
12:36:59 kernel:  input: Chicony HP Elite USB Keyboard as /devices/pci0000:00/0000:00:14.0/usb1/1-4/1-4.3/1-4.3:1.0/0003:03F0:034A.0008/input/input17
12:36:59 kernel:  hid-generic 0003:03F0:034A.0008: input,hidraw1: USB HID v1.10 Keyboard [Chicony HP Elite USB Keyboard] on usb-0000:00:14.0-4.3/input0
12:36:59 kernel:  input: Chicony HP Elite USB Keyboard System Control as /devices/pci0000:00/0000:00:14.0/usb1/1-4/1-4.3/1-4.3:1.1/0003:03F0:034A.0009/input/input18
12:36:59 kernel:  input: Chicony HP Elite USB Keyboard Consumer Control as /devices/pci0000:00/0000:00:14.0/usb1/1-4/1-4.3/1-4.3:1.1/0003:03F0:034A.0009/input/input19
12:36:59 kernel:  hid-generic 0003:03F0:034A.0009: input,hidraw2: USB HID v1.10 Device [Chicony HP Elite USB Keyboard] on usb-0000:00:14.0-4.3/input1
12:37:57 kernel:  e1000e 0000:00:1f.6 green0: NIC Link is Up 1000 Mbps Full Duplex, Flow Control: Rx/Tx
12:37:58 kernel:  tg3 0000:03:00.0 red0: Link is up at 1000 Mbps, full duplex
12:37:58 kernel:  tg3 0000:03:00.0 red0: Flow control is on for TX and on for RX
12:38:09 kernel:  tun: Universal TUN/TAP device driver, 1.6
12:38:09 kernel:  alg: No test for echainiv(authenc(hmac(sha512),cbc(aes))) (echainiv(authenc(hmac(sha512-avx2),cbc-aes-aesni)))
12:38:20 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.78 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=1388 PROTO=TCP SPT=40039 DPT=64674 WINDOW=1024 RES=0x00 SYN URGP=0 
12:38:24 kernel:  usb 1-4: USB disconnect, device number 2
12:38:24 kernel:  usb 1-4.2: USB disconnect, device number 3
12:38:24 kernel:  usb 1-4.3: USB disconnect, device number 4
12:38:30 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.226.165 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=4340 PROTO=TCP SPT=59702 DPT=60171 WINDOW=1024 RES=0x00 SYN URGP=0 
12:38:30 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=60.209.38.155 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=226 ID=27864 PROTO=TCP SPT=48159 DPT=5822 WINDOW=1024 RES=0x00 SYN URGP=0 
12:38:41 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.198 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=53567 PROTO=TCP SPT=59490 DPT=57819 WINDOW=1024 RES=0x00 SYN URGP=0 
12:38:48 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.68 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=17698 PROTO=TCP SPT=59988 DPT=63555 WINDOW=1024 RES=0x00 SYN URGP=0 
12:38:52 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.78 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=13202 PROTO=TCP SPT=40039 DPT=64878 WINDOW=1024 RES=0x00 SYN URGP=0 
12:39:05 kernel:  BLKLST_DSHIELD IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=193.163.125.24 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=39470 PROTO=TCP SPT=34103 DPT=31337 WINDOW=14600 RES=0x00 SYN URGP=0 
12:39:16 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.226.165 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=51390 PROTO=TCP SPT=59702 DPT=60920 WINDOW=1024 RES=0x00 SYN URGP=0 
12:39:24 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.146 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=10522 PROTO=TCP SPT=59576 DPT=58464 WINDOW=1024 RES=0x00 SYN URGP=0 
12:39:38 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=45.142.182.95 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=237 ID=54321 PROTO=TCP SPT=46695 DPT=5555 WINDOW=65535 RES=0x00 SYN URGP=0 
12:39:43 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=35.203.211.54 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=249 ID=54321 PROTO=TCP SPT=50415 DPT=58314 WINDOW=65535 RES=0x00 SYN URGP=0 
12:39:45 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=162.0.234.146 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=240 ID=41248 PROTO=TCP SPT=59576 DPT=58206 WINDOW=1024 RES=0x00 SYN URGP=0 
12:39:48 kernel:  BLKLST_CIARMY IN=red0 OUT= MAC=00:10:18:b1:a1:4e:1c:9e:cc:29:38:4a:08:00 SRC=167.94.145.23 DST=96.83.246.202 LEN=44 TOS=0x00 PREC=0x20 TTL=40 ID=49335 PROTO=TCP SPT=36294 DPT=39860 WINDOW=1024 RES=0x00 SYN URGP=0

Let it finish? I let it run for 8 hours…

Currently have three that have been running for over 12 hours - I probably will not get on site until Monday.

Seems like every one I try to go from 180 to 181 now hangs. 3 upgrades without issue, 11 with issue.

1 Like

I had the exact same behavior. I waited more than half an hour and nothing changed on screen. Apache stopped for some reason, so reconnecting gave a refuse to connect error.
Waiting longer would not have changed anything.
I could login via console and restart apache, reboot, and all was fine. You can’t for some reason, but a restart finishes the update and seems to restart apache in your case.

Okay, that is definitely wrong but your earlier pakfire log doesn’t show that sort of time period. There is a 20 second time period for the running of the post upgrade scripts and then it finishes the core update 181 upgrade and checks for any addon packages that need to be updated. If the screen stays fixed for many hours but the logs show the machine continued and completed after some 10’s of seconds then that suggest a problem with the browser connection which might be related to apache not properly restarting as mentioned by @eddie

The apache package was upgraded in Core Update 181 due to several CVE vulnerabilities and a part of the update.sh script was to restart apache, ie stop it and then start it again but it looks like in your case after stopping apache it did not properly start again. Is there anything in the logs giving any hint as to why that happened?

1 Like

There are some permission denied errors in the log. Dunno if those are the culprit though.
See debian Pastezone

I updated yesterday and rebooted today.

Oh, line 57 - syntax error.

I’ve got three firewalls with the upgrade hung in a single location less than an hour away. I’ll get up there later tonight to restart them. Do you want a remote session so you can look at whatever you’d like on multiple systems after I restart? I did turn off the ip address blocklists prior to starting the upgrade so the kernel log shouldn’t be plastered with those…

Update hung and actually killed all internet for me. I could still ping the IPFire box but no WUI access and no access to the internet past it. I short pressed the power button on the box to manually trigger a safe shutdown and then started it back up again. It booted up with 181 and seems to have had no issues since.

Here are logs from another box that didn’t upgrade to 181 smoothly. If it’s of any value, when the GUI’s not available (other references to Apache), I am not able to login on the console. ipfire rejects the root password until restart.


EDIT : moderator changed text to code block.


IPFire diagnostics
Section: pakfire
Date: November 24, 2023

16:39:24 pakfire:  PAKFIRE INFO: IPFire Pakfire 2.27-x86_64 started!
16:39:24 pakfire:  CORE INFO: Checking for Core-Updates...
16:39:24 pakfire:  CORE INFO: core-list.db is 44652 seconds old. - DEBUG: force
16:39:24 pakfire:  DOWNLOAD STARTED: lists/core-list.db
16:39:24 pakfire:  MIRROR INFO: 24 servers found in list
16:39:24 pakfire:  DOWNLOAD INFO: Host: ipfire.earl-net.com (HTTPS) - File: pakfire2/2.27-x86_64/lists/core-list.db
16:39:24 pakfire:  DOWNLOAD INFO: pakfire2/2.27-x86_64/lists/core-list.db has size of 903 bytes
16:39:25 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
16:39:25 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
16:39:25 pakfire:  DOWNLOAD INFO: Signature of core-list.db is fine.
16:39:25 pakfire:  DOWNLOAD FINISHED: pakfire2/2.27-x86_64/lists/core-list.db
16:39:25 pakfire:  CORE UPGR: Upgrading from release 180 to 181
16:39:25 pakfire:  DOWNLOAD STARTED: meta/meta-core-upgrade-181
16:39:25 pakfire:  MIRROR INFO: 24 servers found in list
16:39:25 pakfire:  DOWNLOAD INFO: Host: quantum-mirror.hu (HTTPS) - File: mirrors/pub/ipfire/pakfire2/2.27-x86_64/meta/meta-core-upgrade-181
16:39:26 pakfire:  DOWNLOAD INFO: mirrors/pub/ipfire/pakfire2/2.27-x86_64/meta/meta-core-upgrade-181 has size of 1036 bytes
16:39:26 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
16:39:26 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
16:39:26 pakfire:  DOWNLOAD INFO: Signature of meta-core-upgrade-181 is fine.
16:39:26 pakfire:  DOWNLOAD FINISHED: mirrors/pub/ipfire/pakfire2/2.27-x86_64/meta/meta-core-upgrade-181
16:39:26 pakfire:  DOWNLOAD STARTED: paks/core-upgrade-2.27-181.ipfire
16:39:26 pakfire:  MIRROR INFO: 24 servers found in list
16:39:26 pakfire:  DOWNLOAD INFO: Host: at.mirror.anexia.com (HTTPS) - File: ipfire/pakfire2/2.27-x86_64/paks/core-upgrade-2.27-181.ipfire
16:39:27 pakfire:  DOWNLOAD INFO: ipfire/pakfire2/2.27-x86_64/paks/core-upgrade-2.27-181.ipfire has size of 77208942 bytes
16:40:45 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
16:40:45 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
16:40:46 pakfire:  DOWNLOAD INFO: Signature of core-upgrade-2.27-181.ipfire is fine.
16:40:46 pakfire:  DOWNLOAD FINISHED: ipfire/pakfire2/2.27-x86_64/paks/core-upgrade-2.27-181.ipfire
16:40:46 pakfire:  PAKFIRE UPGR: core-upgrade-181: Decrypting...
16:40:46 pakfire:  CLEANUP: tmp
16:40:46 pakfire:  DECRYPT STARTED: core-upgrade-181
16:40:47 pakfire:  DECRYPT FINISHED: core-upgrade-181 - Status: 0
16:40:47 pakfire:  PAKFIRE UPGR: core-upgrade-181: Upgrading files and running post-upgrading scripts...
16:41:19 pakfire:  CLEANUP: tmp
16:41:19 pakfire:  PAKFIRE UPGR: core-upgrade-181: Finished.
16:41:19 pakfire:  PAKFIRE INFO: Checking for package updates...
16:41:19 pakfire:  DB INFO: packages_list.db is 44769 seconds old. - DEBUG: force
16:41:19 pakfire:  DOWNLOAD STARTED: lists/packages_list.db
16:41:19 pakfire:  MIRROR INFO: 24 servers found in list
16:41:19 pakfire:  DOWNLOAD INFO: Host: muug.ca (HTTPS) - File: mirror/ipfire/pakfire2/2.27-x86_64/lists/packages_list.db
16:41:20 pakfire:  DOWNLOAD INFO: mirror/ipfire/pakfire2/2.27-x86_64/lists/packages_list.db has size of 5309 bytes
16:41:20 pakfire:  DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
16:41:20 pakfire:  DOWNLOAD INFO: File received. Start checking signature...
16:41:20 pakfire:  DOWNLOAD INFO: Signature of packages_list.db is fine.
16:41:20 pakfire:  DOWNLOAD FINISHED: mirror/ipfire/pakfire2/2.27-x86_64/lists/packages_list.db
16:41:20 pakfire:  PAKFIRE WARN: No new package upgrades available.
16:41:20 pakfire:  PAKFIRE INFO: Pakfire has finished. Closing.
IPFire diagnostics
Section: kernel
Date: November 24, 2023


19:16:05 kernel:  RTL8211E Gigabit Ethernet r8169-0-100:00: attached PHY driver (mii_bus:phy_addr=r8169-0-100:00, irq=MAC)
19:16:05 kernel:  r8169 0000:01:00.0 red0: Link is Down
19:16:08 kernel:  r8169 0000:01:00.0 red0: Link is Up - 1Gbps/Full - flow control off
19:16:08 kernel:  e1000e 0000:00:19.0 green0: NIC Link is Up 1000 Mbps Full Duplex, Flow Control: Rx/Tx
19:16:20 kernel:  tun: Universal TUN/TAP device driver, 1.6
19:16:21 kernel:  alg: No test for echainiv(authenc(hmac(sha256),cbc(aes))) (echainiv(authenc(hmac(sha256-generic),cbc-aes-aesni)))
19:16:31 kernel:  i2c_dev: i2c /dev entries driver
19:16:31 kernel:  i2c_dev: i2c /dev entries driver

I am just a hobby person. Never done remote sessions and not sure I would want to into other people’s systems.

From the logs the upgrade went without any problems.

Your system hangs after the line

Upgrading files and running post-upgrading scripts…

but the next command is logged 32 seconds later.

It looks like the WUI stops because Apache does not restart correctly for you for some reason, the same as for some other people that have reported in this thread.

This bit I don’t understand at all. The root password login at the console has nothing to do with Apache.

Although it is obviously very annoying and causing you a lot of grief, it does look like behind the scenes the upgrade went okay and doing a reboot allows the WUI to work properly again.

Based on apache not properly restarting for some people, I think we need to add a check into the upgrade.sh script to make certain that apache did restart, if an apache update is carried out.

Sorry I can’t be of more help at the moment.

same on my APU4d4. pakfire seems to have finished the update but wui/apache not running.
logon via console was possible
error_log in /var/log/httpd from yesterday, when i ran the update, shows the following

[root@myipfire01 httpd]# grep -i "Nov 24" error_log`
[Fri Nov 24 16:41:14.178891 2023] [cgid:error] [pid 8275:tid 139353617625280] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Fri Nov 24 16:41:14.181527 2023] [cgid:error] [pid 13136:tid 139353600812736] [client 10.0.3.2:65372] End of script output before headers: speed.cgi, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:15.326646 2023] [cgid:error] [pid 8278:tid 139353617625280] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Fri Nov 24 16:41:15.328501 2023] [cgid:error] [pid 13136:tid 139353368032960] [client 10.0.3.2:65370] End of script output before headers: pakfire.cgi, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:16.352154 2023] [cgid:error] [pid 8280:tid 139353617625280] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Fri Nov 24 16:41:16.353809 2023] [cgid:error] [pid 13136:tid 139353326069440] [client 10.0.3.2:65435] End of script output before headers: speed.cgi, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:17.349347 2023] [cgid:error] [pid 8282:tid 139353617625280] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Fri Nov 24 16:41:17.351136 2023] [cgid:error] [pid 13136:tid 139353477072576] [client 10.0.3.2:65436] End of script output before headers: pakfire.cgi, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:18.349898 2023] [cgid:error] [pid 8283:tid 139353617625280] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Fri Nov 24 16:41:18.351747 2023] [cgid:error] [pid 13136:tid 139353351247552] [client 10.0.3.2:65437] End of script output before headers: speed.cgi, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:19.352410 2023] [cgid:error] [pid 8284:tid 139353617625280] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Fri Nov 24 16:41:19.354259 2023] [cgid:error] [pid 13136:tid 139353493857984] [client 10.0.3.2:65438] End of script output before headers: pakfire.cgi, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:20.356040 2023] [cgid:error] [pid 8285:tid 139353617625280] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Fri Nov 24 16:41:20.357793 2023] [cgid:error] [pid 13136:tid 139353485465280] [client 10.0.3.2:65439] End of script output before headers: speed.cgi, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:21.355948 2023] [cgid:error] [pid 8286:tid 139353617625280] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Fri Nov 24 16:41:21.357649 2023] [cgid:error] [pid 13136:tid 139353342854848] [client 10.0.3.2:65440] End of script output before headers: pakfire.cgi, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:22.350373 2023] [cgid:error] [pid 8287:tid 139353617625280] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Fri Nov 24 16:41:22.352185 2023] [cgid:error] [pid 13136:tid 139353460287168] [client 10.0.3.2:65441] End of script output before headers: speed.cgi, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:23.364872 2023] [cgid:error] [pid 8288:tid 139353617625280] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Fri Nov 24 16:41:23.367028 2023] [cgid:error] [pid 13136:tid 139353368032960] [client 10.0.3.2:65442] End of script output before headers: pakfire.cgi, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:25.328701 2023] [core:error] [pid 13136:tid 139353451894464] (13)Permission denied: [client 10.0.3.2:65443] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:27.335766 2023] [core:error] [pid 13136:tid 139353477072576] (13)Permission denied: [client 10.0.3.2:65443] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:27.339631 2023] [core:error] [pid 13136:tid 139353334462144] (13)Permission denied: [client 10.0.3.2:65443] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:28.360168 2023] [core:error] [pid 13136:tid 139353359640256] (13)Permission denied: [client 10.0.3.2:65443] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:29.360042 2023] [core:error] [pid 13136:tid 139353493857984] (13)Permission denied: [client 10.0.3.2:65443] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:30.360187 2023] [core:error] [pid 13136:tid 139353502250688] (13)Permission denied: [client 10.0.3.2:65443] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:31.361788 2023] [core:error] [pid 13136:tid 139353485465280] (13)Permission denied: [client 10.0.3.2:65443] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:32.363708 2023] [core:error] [pid 13136:tid 139353584027328] (13)Permission denied: [client 10.0.3.2:65443] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:33.364559 2023] [core:error] [pid 13136:tid 139353342854848] (13)Permission denied: [client 10.0.3.2:65443] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:34.364631 2023] [core:error] [pid 13136:tid 139353600812736] (13)Permission denied: [client 10.0.3.2:65443] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://myipfire01.mydomain.lan:444/
[Fri Nov 24 16:41:44.230454 2023] [mpm_event:notice] [pid 5039:tid 139353617625280] AH00494: SIGHUP received.  Attempting to restart

then restarted apache

[root@myipfire01 httpd]# /etc/init.d/apache restart
Restarting Apache daemon...
httpd not running, trying to start                                     [  OK  ]

an the error_log from today

[root@myipfire01 httpd]# grep -i "Nov 25" error_log
[Sat Nov 25 12:08:32.799300 2023] [ssl:warn] [pid 1431:tid 125097346740416] AH01909: myipfire01.mydomain.lan:444:0 server certificate does NOT include an ID which matches the server name
[Sat Nov 25 12:08:32.833089 2023] [ssl:warn] [pid 1432:tid 125097346740416] AH01909: myipfire01.mydomain.lan:444:0 server certificate does NOT include an ID which matches the server name
[Sat Nov 25 12:08:32.835612 2023] [core:warn] [pid 1432:tid 125097346740416] AH00098: pid file /var/run/httpd.pid overwritten -- Unclean shutdown of previous Apache run?
[Sat Nov 25 12:08:32.840688 2023] [mpm_event:notice] [pid 1432:tid 125097346740416] AH00489: Apache/2.4.58 (Unix) OpenSSL/3.1.4 configured -- resuming normal operations
[Sat Nov 25 12:08:32.840942 2023] [core:notice] [pid 1432:tid 125097346740416] AH00094: Command line: '/usr/sbin/httpd'

maybe this can help to clarify the situation

The IPFire devs have also had one of their firewalls for the IPFire Infrastructure have the same problem. This allowed a closer look at what was happening.

https://lists.ipfire.org/hyperkitty/list/development@lists.ipfire.org/thread/6TWUUXSCC2ZIDDPOFXZMYDSC2R4BQAJF/

What was reported was:-

Yes, I can confirm this. This happened on one of the firewalls in our infrastructure.

It seems that the runtime linker cache isn’t up to date at the time Apache is being restarted, and therefore it simply fails to restart.

However, ldconfig is executed before restarting apache, so I am not sure why this is happening.

It is however safe to reboot the affected systems after this point and Apache will come back up just fine.

So what is happening is now understood but not why it is happening.

4 Likes

I just updated and this problem did not happened to me. My machine is an APU2.

It hasn’t happened to the majority of people so there is probably some sort of delay in the linker process for some machines so that apache fails to find the required linked libraries when it tries to start.

3 Likes

During my update from CU 180 to CU 181 (on a PC Engine APU4D4), the WebGUI stalled for a long time after:

10:20:18	pakfire:	PAKFIRE UPGR: core-upgrade-181: Upgrading files and running post-upgrading scri pts...

.
And I could no longer refresh the browser to see the System Logs > Pakfire log:

Note: I was watching the message log and the Pakfire WebGUI and the System Logs > Pakfire at the same time (a belts and suspenders approach!!)

For me it seems like the Apache restarted and after a minute or so it finally came back. Maybe something is timing out during the restart??

Apache finally started working, but then it stopped, waited, and then started again. Keep in mind I am seeing this from my browser and it displaying the WebGUI and then not displaying.

There are no references to Apache in the message logs. There are messages in the httpd > error log

[Sun Nov 26 09:55:17.255791 2023] [core:error] [pid 31949:tid 124702664144576] (70007)The timeout specified has expired: [client 192.168.60.212:54734] AH00574: ap_content_length_filter: apr_bucket_read() failed, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:05:02.933632 2023] [core:error] [pid 31949:tid 124702680929984] (70007)The timeout specified has expired: [client 192.168.60.212:57651] AH00574: ap_content_length_filter: apr_bucket_read() failed, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:30.279349 2023] [cgid:error] [pid 30884:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:30.284639 2023] [cgid:error] [pid 31949:tid 124702697715392] [client 192.168.60.212:49399] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:30.810333 2023] [cgid:error] [pid 30885:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:30.812930 2023] [cgid:error] [pid 31949:tid 124702798362304] [client 192.168.60.212:49946] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:31.077069 2023] [cgid:error] [pid 30886:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:31.081893 2023] [cgid:error] [pid 31949:tid 124702664144576] [client 192.168.60.212:50016] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:32.337705 2023] [cgid:error] [pid 30887:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:32.341779 2023] [cgid:error] [pid 31949:tid 124702781576896] [client 192.168.60.212:50024] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:32.849874 2023] [cgid:error] [pid 30892:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:32.852377 2023] [cgid:error] [pid 31949:tid 124702806755008] [client 192.168.60.212:50031] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:33.787879 2023] [cgid:error] [pid 30893:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:33.790362 2023] [cgid:error] [pid 31949:tid 124702831933120] [client 192.168.60.212:49320] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:34.028659 2023] [cgid:error] [pid 30894:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:34.031572 2023] [cgid:error] [pid 31949:tid 124702815147712] [client 192.168.60.212:50040] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:34.279465 2023] [cgid:error] [pid 30895:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:34.282126 2023] [cgid:error] [pid 31949:tid 124702672537280] [client 192.168.60.212:50041] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:34.882606 2023] [cgid:error] [pid 30896:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:34.884984 2023] [cgid:error] [pid 31949:tid 124702680929984] [client 192.168.60.212:50044] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:34.973131 2023] [cgid:error] [pid 30897:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:34.975695 2023] [cgid:error] [pid 31949:tid 124702913717952] [client 192.168.60.212:50045] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:35.559319 2023] [cgid:error] [pid 30899:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/logs.cgi/log.dat' failed
[Sun Nov 26 10:24:35.561932 2023] [cgid:error] [pid 31949:tid 124702697715392] [client 192.168.60.212:50052] End of script output before headers: log.dat, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:36.074747 2023] [cgid:error] [pid 30900:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:36.077146 2023] [cgid:error] [pid 31949:tid 124702664144576] [client 192.168.60.212:50056] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:36.100123 2023] [cgid:error] [pid 30901:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:36.108909 2023] [cgid:error] [pid 31949:tid 124702689322688] [client 192.168.60.212:50054] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:36.256246 2023] [cgid:error] [pid 30902:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:36.261312 2023] [cgid:error] [pid 31949:tid 124702781576896] [client 192.168.60.212:50060] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:37.286849 2023] [cgid:error] [pid 30903:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:37.289302 2023] [cgid:error] [pid 31949:tid 124702789969600] [client 192.168.60.212:50065] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:38.275040 2023] [cgid:error] [pid 30904:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:38.277696 2023] [cgid:error] [pid 31949:tid 124702655751872] [client 192.168.60.212:50073] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:38.386826 2023] [cgid:error] [pid 30905:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:38.389262 2023] [cgid:error] [pid 31949:tid 124702806755008] [client 192.168.60.212:50075] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:38.593321 2023] [cgid:error] [pid 30906:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:38.595911 2023] [cgid:error] [pid 31949:tid 124702672537280] [client 192.168.60.212:50076] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:39.509988 2023] [cgid:error] [pid 30907:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:39.514402 2023] [cgid:error] [pid 31949:tid 124702555104960] [client 192.168.60.212:50084] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:40.317722 2023] [cgid:error] [pid 30908:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:40.321114 2023] [cgid:error] [pid 31949:tid 124702680929984] [client 192.168.60.212:50090] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:40.598625 2023] [cgid:error] [pid 30909:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:40.606648 2023] [cgid:error] [pid 31949:tid 124702697715392] [client 192.168.60.212:50095] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:40.648084 2023] [cgid:error] [pid 30910:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:40.651488 2023] [cgid:error] [pid 31949:tid 124702913717952] [client 192.168.60.212:50094] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:41.722693 2023] [cgid:error] [pid 30911:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:41.726014 2023] [cgid:error] [pid 31949:tid 124702664144576] [client 192.168.60.212:50106] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:42.384684 2023] [cgid:error] [pid 30912:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:42.386831 2023] [cgid:error] [pid 31949:tid 124702689322688] [client 192.168.60.212:50113] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:42.601752 2023] [cgid:error] [pid 30913:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:42.604590 2023] [cgid:error] [pid 31949:tid 124702789969600] [client 192.168.60.212:50115] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:42.853641 2023] [cgid:error] [pid 30914:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:42.855652 2023] [cgid:error] [pid 31949:tid 124702655751872] [client 192.168.60.212:50117] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:44.112308 2023] [cgid:error] [pid 30915:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:44.114450 2023] [cgid:error] [pid 31949:tid 124702815147712] [client 192.168.60.212:50126] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:44.278682 2023] [cgid:error] [pid 30916:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/speed.cgi' failed
[Sun Nov 26 10:24:44.281159 2023] [cgid:error] [pid 31949:tid 124702672537280] [client 192.168.60.212:50130] End of script output before headers: speed.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:45.339707 2023] [cgid:error] [pid 30917:tid 124702930366656] (13)Permission denied: AH01241: exec of '/srv/web/ipfire/cgi-bin/pakfire.cgi' failed
[Sun Nov 26 10:24:45.342195 2023] [cgid:error] [pid 31949:tid 124702555104960] [client 192.168.60.212:50135] End of script output before headers: pakfire.cgi, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:46.494860 2023] [core:error] [pid 31949:tid 124702697715392] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:46.583137 2023] [core:error] [pid 31949:tid 124702913717952] (13)Permission denied: [client 192.168.60.212:50145] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:47.627709 2023] [core:error] [pid 31949:tid 124702823540416] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:48.166043 2023] [core:error] [pid 31949:tid 124702798362304] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:48.635594 2023] [core:error] [pid 31949:tid 124702664144576] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:49.641482 2023] [core:error] [pid 31949:tid 124702689322688] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:50.167054 2023] [core:error] [pid 31949:tid 124702563497664] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:50.653669 2023] [core:error] [pid 31949:tid 124702781576896] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:51.757655 2023] [core:error] [pid 31949:tid 124702789969600] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:52.167593 2023] [core:error] [pid 31949:tid 124702655751872] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:52.853145 2023] [core:error] [pid 31949:tid 124702806755008] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:53.858357 2023] [core:error] [pid 31949:tid 124702831933120] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:54.167573 2023] [core:error] [pid 31949:tid 124702815147712] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:54.807291 2023] [core:error] [pid 31949:tid 124702672537280] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:54.893635 2023] [core:error] [pid 31949:tid 124702555104960] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:55.899087 2023] [core:error] [pid 31949:tid 124702680929984] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:56.168198 2023] [core:error] [pid 31949:tid 124702697715392] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:56.904659 2023] [core:error] [pid 31949:tid 124702913717952] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:57.923912 2023] [core:error] [pid 31949:tid 124702823540416] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:58.168720 2023] [core:error] [pid 31949:tid 124702798362304] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:58.929592 2023] [core:error] [pid 31949:tid 124702664144576] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:24:59.935664 2023] [core:error] [pid 31949:tid 124702689322688] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:00.176601 2023] [core:error] [pid 31949:tid 124702563497664] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:00.941561 2023] [core:error] [pid 31949:tid 124702789969600] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:01.994318 2023] [core:error] [pid 31949:tid 124702655751872] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:02.170727 2023] [core:error] [pid 31949:tid 124702806755008] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:03.000844 2023] [core:error] [pid 31949:tid 124702831933120] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:04.007389 2023] [core:error] [pid 31949:tid 124702815147712] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:04.171105 2023] [core:error] [pid 31949:tid 124702672537280] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:05.040621 2023] [core:error] [pid 31949:tid 124702555104960] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:06.046836 2023] [core:error] [pid 31949:tid 124702680929984] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/pakfire.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:06.171916 2023] [core:error] [pid 31949:tid 124702697715392] (13)Permission denied: [client 192.168.60.212:50144] AH00035: access to /cgi-bin/speed.cgi denied (filesystem path '/srv/web') because search permissions are missing on a component of the path, referer: https://ipfire.localdomain:444/
[Sun Nov 26 10:25:19.398723 2023] [mpm_event:notice] [pid 3838:tid 124702930366656] AH00494: SIGHUP received.  Attempting to restart
[Sun Nov 26 10:25:20.785820 2023] [ssl:warn] [pid 3838:tid 124702930366656] AH01882: Init: this version of mod_ssl was compiled against a newer library (OpenSSL 3.1.4 24 Oct 2023, version currently loaded is OpenSSL 3.1.2 1 Aug 2023) - may result in undefined or erroneous behavior
[Sun Nov 26 10:25:20.807057 2023] [mpm_event:notice] [pid 3838:tid 124702930366656] AH00489: Apache/2.4.57 (Unix) OpenSSL/3.1.2 configured -- resuming normal operations
[Sun Nov 26 10:25:20.807202 2023] [core:notice] [pid 3838:tid 124702930366656] AH00094: Command line: '/usr/sbin/httpd'

After the Apache stops and starts the pakfire came back and gave me the An update requires a restart! message. And it looks like the 181 updated completed.


EDIT: there seems to me lots of permission denied errors in the above logs…


EDIT2: and an odd OpenSSL message at the bottom of log…

Ha! the OpenSSL message includes the statement “may result in undefined or erroneous behavior” and this definitely applies! :thinking:


EDIT3: I saw there were updates to OpenSSL in CU 181 but I have no ideal if this is related to the original issue:

1 Like