Language:
switch to room list switch to menu My folders
Go to page: [1] 2 3 4 5 ... Last
↑↑↑ Old messages ↑↑↑            ↓↓↓ New messages ↓↓↓
[#] Tue Jul 29 2014 07:44:55 EDT from eriix @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

I noticed a couple cosmetic bits when doing an easyinstall, and thought I'd document them. They're real easy to fix.

"Downloading expat" vs "Installing Expat". The devs appear to prefer "Expat", though anything consistent is good.

When c-ares gets grabbed, it prints "* Downloading libev...". I suspect this was created by copy/paste of the libev section directly above it. The section works well, so it's just the message.

That's it, I think. Back to enjoying my installation.

[#] Tue Jul 29 2014 18:34:56 EDT from "ferriswheel" <ferriswheel@jetechserv.com> to Citadel Support <citadel_support@citadel.org>

Subject: how to reset citadel and missing command userlist

[Reply] [ReplyQuoted] [Headers] [Print]

hello,

i would like to reset citadel, to take it back to the post-install state
with no users, no additional room/floors, no messages, etc.

on this page
http://citadel.org/doku.php/documentation:manpages
contains the 'userlist' command, but it is not installed.


any assistance is appreciated.


regards

john

[#] Wed Jul 30 2014 06:09:26 EDT from dothebart @ Uncensored

Subject: Re: how to reset citadel and missing command userlist

[Reply] [ReplyQuoted] [Headers] [Print]

you'd stop it, delete everything in the data/ directory, and run setup again to get the initial state back.



[#] Sat Aug 02 2014 12:06:54 EDT from Steve Willoughby @ Uncensored

Subject: Re: [Citadel Support] Failing yum update

[Reply] [ReplyQuoted] [Headers] [Print]

Thanks all. I ran yum update and all of the citadel packages but the main citadel one updated without problems.  The error was the same as before.

Yum fails with:

Running Transaction
  Updating   : citadel-8.24-1.2.x86_64                              1/2
Error unpacking rpm package citadel-8.24-1.2.x86_64
error: unpacking of archive failed: cpio: lstat
citadel-8.20-1.2.x86_64 was supposed to be removed but is not!
  Verifying  : citadel-8.20-1.2.x86_64                              1/2
  Verifying  : citadel-8.24-1.2.x86_64                              2/2

Failed:
  citadel.x86_64 0:8.20-1.2              citadel.x86_64 0:8.24-1.2         

 

The repository used is the one from the support pages - home:homueller:citadel.repo which contains:

[home_homueller_citadel]
name=Citadel Groupware Server (CentOS_CentOS-6)
type=rpm-md
baseurl=http://download.opensuse.org/repositories/home:/homueller:/citadel/CentOS_CentOS-6/
gpgcheck=1
gpgkey=http://download.opensuse.org/repositories/home:/homueller:/citadel/CentOS_CentOS-6/repodata/repomd.xml.key
enabled=1

 

I believe the copy of citadel-8.24-1.2.x86_64 there is corrupt and needs to be updated.

 

Thanks for all of the help.  Sorry for the delay following up, but I only get to work on this system on weekends.

 

Steve



[#] Sat Aug 02 2014 14:41:25 EDT from Steve Willoughby @ Uncensored

Subject: Re: [Citadel Support] Failing yum update [Reply] [ReplyQuoted] [Heade

[Reply] [ReplyQuoted] [Headers] [Print]

I noticed that selinux was generating errors while yum was trying to update citadel.  I changed from enforcing to permissive and rebooted and tried again. Success.  The problem is not a corrupt update file but a lack of propper permissions for citserver and python which evidently prevents the proper unpacking and installation of the package.  Never had the problem before.  Tried the suggestions from setroubleshootd but were not effective - had to turn off enforcing. Below are the seven errors reported during the update:

1 ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

SELinux is preventing /usr/sbin/citserver from setattr access on the directory network.

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that citserver should be allowed setattr access on the network directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep citserver /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:citserver_t:s0
Target Context                system_u:object_r:var_spool_t:s0
Target Objects                network [ dir ]
Source                        citserver
Source Path                   /usr/sbin/citserver
Port                          <Unknown>
Host                          server3.sterlingco.local
Source RPM Packages           citadel-8.20-1.2.x86_64
Target RPM Packages          
Policy RPM                    selinux-policy-3.7.19-231.el6_5.3.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Host Name                     server3.sterlingco.local
Platform                      Linux server3.sterlingco.local
                              2.6.32-431.23.3.el6.x86_64 #1 SMP Thu Jul 31
                              17:20:51 UTC 2014 x86_64 x86_64
Alert Count                   1
First Seen                    Sat 02 Aug 2014 02:07:15 PM EDT
Last Seen                     Sat 02 Aug 2014 02:07:15 PM EDT
Local ID                      03a9f965-6802-4ebd-9807-6ac0611fd2e7

Raw Audit Messages
type=AVC msg=audit(1407002835.249:9): avc:  denied  { setattr } for  pid=2235 comm="citserver" name="network" dev=dm-5 ino=99222139 scontext=system_u:system_r:citserver_t:s0 tcontext=system_u:object_r:var_spool_t:s0 tclass=dir


type=SYSCALL msg=audit(1407002835.249:9): arch=x86_64 syscall=chown success=yes exit=0 a0=7f3d22384180 a1=1ee a2=ffffffff a3=e items=0 ppid=2234 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=citserver exe=/usr/sbin/citserver subj=system_u:system_r:citserver_t:s0 key=(null)

Hash: citserver,citserver_t,var_spool_t,dir,setattr

audit2allow

#============= citserver_t ==============
allow citserver_t var_spool_t:dir setattr;

audit2allow -R

#============= citserver_t ==============
allow citserver_t var_spool_t:dir setattr;

2 -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that citserver should be allowed setattr access on the spooltmp directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep citserver /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:citserver_t:s0
Target Context                unconfined_u:object_r:var_spool_t:s0
Target Objects                spooltmp [ dir ]
Source                        citserver
Source Path                   /usr/sbin/citserver
Port                          <Unknown>
Host                          server3.sterlingco.local
Source RPM Packages           citadel-8.20-1.2.x86_64
Target RPM Packages          
Policy RPM                    selinux-policy-3.7.19-231.el6_5.3.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Host Name                     server3.sterlingco.local
Platform                      Linux server3.sterlingco.local
                              2.6.32-431.23.3.el6.x86_64 #1 SMP Thu Jul 31
                              17:20:51 UTC 2014 x86_64 x86_64
Alert Count                   1
First Seen                    Sat 02 Aug 2014 02:07:15 PM EDT
Last Seen                     Sat 02 Aug 2014 02:07:15 PM EDT
Local ID                      edb4dd4a-e6f1-4d4e-a14c-b86d8c2708f6

Raw Audit Messages
type=AVC msg=audit(1407002835.314:10): avc:  denied  { setattr } for  pid=2235 comm="citserver" name="spooltmp" dev=dm-5 ino=99484259 scontext=system_u:system_r:citserver_t:s0 tcontext=unconfined_u:object_r:var_spool_t:s0 tclass=dir


type=SYSCALL msg=audit(1407002835.314:10): arch=x86_64 syscall=chown success=yes exit=0 a0=7f3d22387180 a1=1ee a2=ffffffff a3=e items=0 ppid=2234 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm=citserver exe=/usr/sbin/citserver subj=system_u:system_r:citserver_t:s0 key=(null)

Hash: citserver,citserver_t,var_spool_t,dir,setattr

audit2allow

#============= citserver_t ==============
allow citserver_t var_spool_t:dir setattr;

audit2allow -R

#============= citserver_t ==============
allow citserver_t var_spool_t:dir setattr;

3 -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that citserver should be allowed write access on the [eventfd] file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep citserver /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:citserver_t:s0
Target Context                system_u:object_r:anon_inodefs_t:s0
Target Objects                [eventfd] [ file ]
Source                        citserver
Source Path                   /usr/sbin/citserver
Port                          <Unknown>
Host                          server3.sterlingco.local
Source RPM Packages          
Target RPM Packages          
Policy RPM                    selinux-policy-3.7.19-231.el6_5.3.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Host Name                     server3.sterlingco.local
Platform                      Linux server3.sterlingco.local
                              2.6.32-431.23.3.el6.x86_64 #1 SMP Thu Jul 31
                              17:20:51 UTC 2014 x86_64 x86_64
Alert Count                   3
First Seen                    Sat 02 Aug 2014 02:07:17 PM EDT
Last Seen                     Sat 02 Aug 2014 02:11:55 PM EDT
Local ID                      9b3a7e29-9b47-4d3d-8012-41cab60c7fcd

Raw Audit Messages
type=AVC msg=audit(1407003115.487:29): avc:  denied  { write } for  pid=2235 comm="citserver" path="[eventfd]" dev=anon_inodefs ino=3822 scontext=system_u:system_r:citserver_t:s0 tcontext=system_u:object_r:anon_inodefs_t:s0 tclass=file


type=SYSCALL msg=audit(1407003115.487:29): arch=x86_64 syscall=write success=yes exit=ENOEXEC a0=18 a1=7fff626f86e0 a2=8 a3=7fff626f84a0 items=0 ppid=2234 pid=2235 auid=4294967295 uid=494 gid=468 euid=494 suid=494 fsuid=494 egid=468 sgid=468 fsgid=468 tty=(none) ses=4294967295 comm=citserver exe=2F7573722F7362696E2F636974736572766572202864656C6574656429 subj=system_u:system_r:citserver_t:s0 key=(null)

Hash: citserver,citserver_t,anon_inodefs_t,file,write

audit2allow

#============= citserver_t ==============
allow citserver_t anon_inodefs_t:file write;

audit2allow -R

#============= citserver_t ==============
allow citserver_t anon_inodefs_t:file write;

4 ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

SELinux is preventing citserver from read access on the file [eventfd].

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that citserver should be allowed read access on the [eventfd] file by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep citserver /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                system_u:system_r:citserver_t:s0
Target Context                system_u:object_r:anon_inodefs_t:s0
Target Objects                [eventfd] [ file ]
Source                        citserver
Source Path                   citserver
Port                          <Unknown>
Host                          server3.sterlingco.local
Source RPM Packages          
Target RPM Packages          
Policy RPM                    selinux-policy-3.7.19-231.el6_5.3.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Host Name                     server3.sterlingco.local
Platform                      Linux server3.sterlingco.local
                              2.6.32-431.23.3.el6.x86_64 #1 SMP Thu Jul 31
                              17:20:51 UTC 2014 x86_64 x86_64
Alert Count                   3
First Seen                    Sat 02 Aug 2014 02:07:17 PM EDT
Last Seen                     Sat 02 Aug 2014 02:11:55 PM EDT
Local ID                      f2dca031-987f-4cfa-8283-ba4bc17add6d

Raw Audit Messages
type=AVC msg=audit(1407003115.488:30): avc:  denied  { read } for  pid=2354 comm="citserver" path="[eventfd]" dev=anon_inodefs ino=3822 scontext=system_u:system_r:citserver_t:s0 tcontext=system_u:object_r:anon_inodefs_t:s0 tclass=file


type=SYSCALL msg=audit(1407003115.488:30): arch=x86_64 syscall=read success=yes exit=ENOEXEC a0=18 a1=7f3d1c36bd98 a2=8 a3=1 items=0 ppid=2234 pid=2354 auid=4294967295 uid=494 gid=468 euid=494 suid=494 fsuid=494 egid=468 sgid=468 fsgid=468 tty=(none) ses=4294967295 comm=citserver exe=2F7573722F7362696E2F636974736572766572202864656C6574656429 subj=system_u:system_r:citserver_t:s0 key=(null)

Hash: citserver,citserver_t,anon_inodefs_t,file,read

audit2allow

#============= citserver_t ==============
allow citserver_t anon_inodefs_t:file read;

audit2allow -R

#============= citserver_t ==============
allow citserver_t anon_inodefs_t:file read;

5 --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

SELinux is preventing /usr/bin/python from relabelto access on the directory /var/spool/citadel.

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that python should be allowed relabelto access on the citadel directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep yum /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                unconfined_u:system_r:rpm_t:s0-s0:c0.c1023
Target Context                system_u:object_r:citserver_spool_t:s0
Target Objects                /var/spool/citadel [ dir ]
Source                        yum
Source Path                   /usr/bin/python
Port                          <Unknown>
Host                          server3.sterlingco.local
Source RPM Packages           python-2.6.6-52.el6.x86_64
Target RPM Packages           citadel-8.20-1.2.x86_64 citadel-8.24-5.1.x86_64
Policy RPM                    selinux-policy-3.7.19-231.el6_5.3.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Host Name                     server3.sterlingco.local
Platform                      Linux server3.sterlingco.local
                              2.6.32-431.23.3.el6.x86_64 #1 SMP Thu Jul 31
                              17:20:51 UTC 2014 x86_64 x86_64
Alert Count                   1
First Seen                    Sat 02 Aug 2014 02:11:47 PM EDT
Last Seen                     Sat 02 Aug 2014 02:11:47 PM EDT
Local ID                      b8fffcce-5903-403c-91da-8cae9a94266d

Raw Audit Messages
type=AVC msg=audit(1407003107.263:26): avc:  denied  { relabelto } for  pid=3103 comm="yum" name="citadel" dev=dm-5 ino=99222138 scontext=unconfined_u:system_r:rpm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:citserver_spool_t:s0 tclass=dir


type=AVC msg=audit(1407003107.263:26): avc:  denied  { associate } for  pid=3103 comm="yum" name="citadel" dev=dm-5 ino=99222138 scontext=system_u:object_r:citserver_spool_t:s0 tcontext=system_u:object_r:fs_t:s0 tclass=filesystem


type=SYSCALL msg=audit(1407003107.263:26): arch=x86_64 syscall=lsetxattr success=yes exit=0 a0=8a27c40 a1=3667e16319 a2=8aece90 a3=27 items=0 ppid=3080 pid=3103 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm=yum exe=/usr/bin/python subj=unconfined_u:system_r:rpm_t:s0-s0:c0.c1023 key=(null)

Hash: yum,rpm_t,citserver_spool_t,dir,relabelto

audit2allow

#============= citserver_spool_t ==============
allow citserver_spool_t fs_t:filesystem associate;

#============= rpm_t ==============
allow rpm_t citserver_spool_t:dir relabelto;

audit2allow -R

#============= citserver_spool_t ==============
allow citserver_spool_t fs_t:filesystem associate;

#============= rpm_t ==============
allow rpm_t citserver_spool_t:dir relabelto;

6 ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that python should be allowed setattr access on the citadel directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep yum /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                unconfined_u:system_r:rpm_t:s0-s0:c0.c1023
Target Context                system_u:object_r:citserver_spool_t:s0
Target Objects                /var/spool/citadel [ dir ]
Source                        yum
Source Path                   /usr/bin/python
Port                          <Unknown>
Host                          server3.sterlingco.local
Source RPM Packages           python-2.6.6-52.el6.x86_64
Target RPM Packages           citadel-8.20-1.2.x86_64 citadel-8.24-5.1.x86_64
Policy RPM                    selinux-policy-3.7.19-231.el6_5.3.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Host Name                     server3.sterlingco.local
Platform                      Linux server3.sterlingco.local
                              2.6.32-431.23.3.el6.x86_64 #1 SMP Thu Jul 31
                              17:20:51 UTC 2014 x86_64 x86_64
Alert Count                   1
First Seen                    Sat 02 Aug 2014 02:11:47 PM EDT
Last Seen                     Sat 02 Aug 2014 02:11:47 PM EDT
Local ID                      7086e570-fdcf-4a3e-b7ec-e96bc92d02be

Raw Audit Messages
type=AVC msg=audit(1407003107.263:27): avc:  denied  { setattr } for  pid=3103 comm="yum" name="citadel" dev=dm-5 ino=99222138 scontext=unconfined_u:system_r:rpm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:citserver_spool_t:s0 tclass=dir


type=SYSCALL msg=audit(1407003107.263:27): arch=x86_64 syscall=chown success=yes exit=0 a0=8a27c40 a1=1ee a2=1d4 a3=2 items=0 ppid=3080 pid=3103 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm=yum exe=/usr/bin/python subj=unconfined_u:system_r:rpm_t:s0-s0:c0.c1023 key=(null)

Hash: yum,rpm_t,citserver_spool_t,dir,setattr

audit2allow

#============= rpm_t ==============
allow rpm_t citserver_spool_t:dir setattr;

audit2allow -R

#============= rpm_t ==============
allow rpm_t citserver_spool_t:dir setattr;

7 ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

*****  Plugin catchall (100. confidence) suggests  ***************************

If you believe that python should be allowed setattr access on the citadel directory by default.
Then you should report this as a bug.
You can generate a local policy module to allow this access.
Do
allow this access for now by executing:
# grep yum /var/log/audit/audit.log | audit2allow -M mypol
# semodule -i mypol.pp

Additional Information:
Source Context                unconfined_u:system_r:rpm_t:s0-s0:c0.c1023
Target Context                system_u:object_r:citserver_spool_t:s0
Target Objects                /var/spool/citadel [ dir ]
Source                        yum
Source Path                   /usr/bin/python
Port                          <Unknown>
Host                          server3.sterlingco.local
Source RPM Packages           python-2.6.6-52.el6.x86_64
Target RPM Packages           citadel-8.20-1.2.x86_64 citadel-8.24-5.1.x86_64
Policy RPM                    selinux-policy-3.7.19-231.el6_5.3.noarch
Selinux Enabled               True
Policy Type                   targeted
Enforcing Mode                Permissive
Host Name                     server3.sterlingco.local
Platform                      Linux server3.sterlingco.local
                              2.6.32-431.23.3.el6.x86_64 #1 SMP Thu Jul 31
                              17:20:51 UTC 2014 x86_64 x86_64
Alert Count                   1
First Seen                    Sat 02 Aug 2014 02:11:47 PM EDT
Last Seen                     Sat 02 Aug 2014 02:11:47 PM EDT
Local ID                      7086e570-fdcf-4a3e-b7ec-e96bc92d02be

Raw Audit Messages
type=AVC msg=audit(1407003107.263:27): avc:  denied  { setattr } for  pid=3103 comm="yum" name="citadel" dev=dm-5 ino=99222138 scontext=unconfined_u:system_r:rpm_t:s0-s0:c0.c1023 tcontext=system_u:object_r:citserver_spool_t:s0 tclass=dir


type=SYSCALL msg=audit(1407003107.263:27): arch=x86_64 syscall=chown success=yes exit=0 a0=8a27c40 a1=1ee a2=1d4 a3=2 items=0 ppid=3080 pid=3103 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=pts0 ses=1 comm=yum exe=/usr/bin/python subj=unconfined_u:system_r:rpm_t:s0-s0:c0.c1023 key=(null)

Hash: yum,rpm_t,citserver_spool_t,dir,setattr

audit2allow

#============= rpm_t ==============
allow rpm_t citserver_spool_t:dir setattr;

audit2allow -R

#============= rpm_t ==============
allow rpm_t citserver_spool_t:dir setattr;

end ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

citadel-selinux is evidently missing something causing the citserver errors and may need something to handle the python errors since they seem related to the citadel installation.

 

Thanks again for the help.  I will reboot wit selinux set to enforcing and see if anything is broken.

 

Steve



[#] Sun Aug 03 2014 11:33:03 EDT from zon @ Uncensored

Subject: use Citadel server also as a IMAP client?

[Reply] [ReplyQuoted] [Headers] [Print]

Hello,

I`d like to know, if I can use Citadel to download my messages from another email accout (not on Citadel, but on server of my current email provider, like google mail or so) and then provide those messages to me to my Thunderbird. So in another words, now my Thunderbird connects to my providers server but I want to Citadel to connect there and my email client will connect to Citadel.

 

My reason for that are:

- I need more space then my current provider can give me

- I don`t want my messages to stay in my current providers server

- I need to apply server side email filters which is now impossible on my current email accout

- I have my own server Proxmox HA cluster, so I beleive I can run Citadel server pretty steady too

 

After all this will allow me to smoothly move my emails from current email provider to my own server, but last not least I could still use my current providers antispam and antivir solution.

 

So the questions are:

- Is Citadel natively able to connect to my another email account? Connection should be done with IMAP STARTTLS and user/pass autentication.

- If yes, please tell me how (I did RTFM, but haven`t found it).

- If not, do you know any workaround? For example using some other software which will connect to current email account instead of Citadel, but provide them to Citadel.

 

Thank you for any advice and for reading such a long post.

Zon



[#] Sun Aug 03 2014 14:13:05 EDT from dothebart @ Uncensored

Subject: Re: use Citadel server also as a IMAP client?

[Reply] [ReplyQuoted] [Headers] [Print]

no, this currently isn't possible with citadels own features.

you can however use fetchmail, see http://citadel.org/doku.php/faq:favoriteclient:how_do_i_retrieve for details.



[#] Sat Aug 09 2014 16:44:04 EDT from viabsb @ Uncensored

Subject: cPanel

[Reply] [ReplyQuoted] [Headers] [Print]

Is it possible to install on cPanel?



[#] Sun Aug 10 2014 14:19:41 EDT from ura @ Uncensored

Subject: new user here - i am unable to get citadel / webcit running via nginx

[Reply] [ReplyQuoted] [Headers] [Print]

i am looking to replace an iredadmin mailserver with a citadel installation here.

i am using fedora 20 and nginx to also serve web apps.

i have installed citadel and webcit and citadel server appears to be running ok.

i created a server config for webcit in nginx (removing the ssl configuratons since i will only access webcit from within the server itself, rather than over the internet).

when i navigate to where i am expecting webcit to be located via the server's web-browser i am being shown the default nginx index page and no webcit.

i have added a new domain name for webcit into the server's hosts file and was thinking i could simply visit http://mynewwebcitdomain/webcit/ or similar in the browser on the server and all would be well.

i have restarted nginx before loading the webcit location in the browser.

what am i missing?

thanks



[#] Sun Aug 10 2014 14:21:23 EDT from ura @ Uncensored

Subject: Re: new user here - i am unable to get citadel / webcit running via nginx

[Reply] [ReplyQuoted] [Headers] [Print]

oh, i for got to add that i am seeing a 502 bad gateway error page when i visit the webcit location in the browser, not the default nginx page.

in the nginx log for webcit i am seeing:

[error] 7874#0: *958 connect() failed (111: Connection refused) while connecting to upstream,



[#] Sun Aug 10 2014 14:19:07 EDT from jame @ Rocasa Mail System

Subject: Re: cPanel

[Reply] [ReplyQuoted] [Headers] [Print]

 

Sat Aug 09 2014 16:44:04 EDT from viabsb @ Uncensored Subject: cPanel

Is it possible to install on cPanel?

Instead of the default exim?   Or along with exim?

 

Jame

 

 

 



[#] Sun Aug 10 2014 14:36:18 EDT from ura @ Uncensored

Subject: Re: new user here - i am unable to get citadel / webcit running via nginx

[Reply] [ReplyQuoted] [Headers] [Print]

http://127.0.0.1:2000/ produces nothing in the browser.

and the /log/webcit/ folder is empty



[#] Sun Aug 10 2014 16:01:20 EDT from ura @ Uncensored

Subject: Re: new user here - i am unable to get citadel / webcit running via nginx

[Reply] [ReplyQuoted] [Headers] [Print]

aha, i found that i needed to run webcit -d
after reading this tutorial: https://www.linode.com/docs/email/citadel/email-with-citadel-on-ubuntu-12-04-lts-precise-pangolin/
i didn't see this written anywhere in the installation instructions for citadel.

so now i see webcit's login screen.



[#] Tue Aug 12 2014 06:24:01 EDT from "Stefan Jakobs" <stefan@localside.net> to room_citadel_support@uncensored.citadel.org

Subject: Re: [Citadel Support] Failing yum update [Reply] [ReplyQuoted] [Heade

[Reply] [ReplyQuoted] [Headers] [Print]

Hi,

You wrote:
I noticed that selinux was generating errors while yum was trying to update
citadel. I changed from enforcing to permissive and rebooted and tried
again. Success. The problem is not a corrupt update file but a lack of
propper permissions for citserver and python which evidently prevents the
proper unpacking and installation of the package. Never had the problem
before. Tried the suggestions from setroubleshootd but were not effective
- had to turn off enforcing. Below are the seven errors reported during the
update:

[...]

citadel-selinux is evidently missing something causing the citserver errors
and may need something to handle the python errors since they seem related
to the citadel installation.

Thanks again for the help. I will reboot wit selinux set to enforcing and
see if anything is broken.

Which package version caused that problem?
From which repo did you install citadel?
Is citadel-selinux installed?

Steve

Regards
Stefan

[#] Tue Aug 12 2014 06:43:06 EDT from "Stefan Jakobs" <stefan@localside.net> to citadel_support@citadel.org

Subject: Re: [Citadel Support] Failing yum update

[Reply] [ReplyQuoted] [Headers] [Print]

Hi,

You wrote:
Thanks all. I ran yum update and all of the citadel packages but the main
citadel one updated without problems. The error was the same as before.

Yum fails with:

Running Transaction
Updating : citadel-8.24-1.2.x86_64 1/2
Error unpacking rpm package citadel-8.24-1.2.x86_64
error: unpacking of archive failed: cpio: lstat
citadel-8.20-1.2.x86_64 was supposed to be removed but is not!
Verifying : citadel-8.20-1.2.x86_64 1/2
Verifying : citadel-8.24-1.2.x86_64 2/2

Failed:
citadel.x86_64 0:8.20-1.2 citadel.x86_64 0:8.24-1.2



The repository used is the one from the support pages -
home:homueller:citadel.repo which contains:

[home_homueller_citadel]
name=Citadel Groupware Server (CentOS_CentOS-6)
type=rpm-md
baseurl=http://download.opensuse.org/repositories/home:/homueller:/citadel/C
entOS_CentOS-6/ gpgcheck=1
gpgkey=http://download.opensuse.org/repositories/home:/homueller:/citadel/Ce
ntOS_CentOS-6/repodata/repomd.xml.key enabled=1



I believe the copy of citadel-8.24-1.2.x86_64 there is corrupt and needs to
be updated.

The current and available package is citadel-8.24-5.1.x86_64.
Please run 'yum makecache' and try to update again.

Thanks for all of the help. Sorry for the delay following up, but I only
get to work on this system on weekends.

Steve

Regards
Stefan

[#] Thu Aug 14 2014 12:02:58 EDT from Centurion030 @ Uncensored

Subject: Steps to relay to gmail

[Reply] [ReplyQuoted] [Headers] [Print]

All,

We have a VM setup running Kubuntu 14.04 32-bit with Citadel. The purpose is to relay email messages from several services at the office to the engineer's, not me, gmail account. We also have a Server 2008 VM running.

 

Here was his email to me:

"I was not able to get it to authenticate to gmails relay.

I spun up SMTP on the Vision FTP server and it is working. So it’s a matter of getting the credentials in properly on Citadel.

 

Documentation seems to conflict a bit, but it doesn’t look like it’s possible to do it through the web interface."

 

Has anyone come up with a list of steps to get Citadel to correctly authenticate to gmail?

 

Best,

 

James



[#] Fri Aug 15 2014 05:02:25 EDT from ando666 @ Uncensored

Subject: Sent Items unread

[Reply] [ReplyQuoted] [Headers] [Print]

Hy

 

How can configure my Citadel-Installation, that the send message are marked as "read". Know the marked as "unread". It confuses me a little bit, when i look to my folder-list and "Sent Item" are allway "unread" messages.

Thanks for en answer.

 



[#] Mon Aug 18 2014 19:31:12 EDT from rakesh @ Uncensored

Subject: Delivery failure

[Reply] [ReplyQuoted] [Headers] [Print]

hi,

I have 3 problems with my citadel server.please help me to solve this

1.When i send email to gmail account , its showing delivery notification -> failure (But my citadel is able to receive mail from gmail)

2.I can send email to yahoo account, its getting delivered, but its residing in the spam box of yahoo account

3.wen i try to connect to citadel using python smtplib its showing autherror no such user., i tried with a perfect username and pass combination



[#] Tue Aug 19 2014 02:14:41 EDT from dothebart @ Uncensored

Subject: Re: Delivery failure

[Reply] [ReplyQuoted] [Headers] [Print]

[#] Thu Aug 21 2014 04:05:29 EDT from tigerteron @ Uncensored

[Reply] [ReplyQuoted] [Headers] [Print]

hi dear i have problem after upgrade citadel when i send mail from asp.net application i get following error:
Mailbox unavailable. The server response was: You must log in to send mail
please help me
thanks best regards



Go to page: [1] 2 3 4 5 ... Last