NUGOSS
Active Member
The time on the server corresponds to the location, ntp is configured.Check your Server time, use a ntp to get a correct time.
Your clock should not be off more than a few seconds
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
The time on the server corresponds to the location, ntp is configured.Check your Server time, use a ntp to get a correct time.
Your clock should not be off more than a few seconds
maybe I not so understand you? with English is bad. can mean the specific time on the server? or time zone?Check your Server time, use a ntp to get a correct time.
Your clock should not be off more than a few seconds
the time on your server not the timezone
Still couldn't fix the problemCode:2018/09/16 15:26:12 X [MAIN] Starting up fake x-server... Library version mismatch. Please copy the updated plugin to the client directory. Sanity checks failed, unable to run. Please read the installation-guide carefully and contact support if necessary.
You don't seem to have installed it with the script, otherwise this wouldn't happen.Still couldn't fix the problem
==========================================================
SINUSBOT RELATED
SYSTEM INFORMATION
- Operating System: Debian GNU/Linux 9.5 (stretch)
- Kernel: Linux 4.9.0-3-amd64 x86_64
- Load Average: 0.00 0.01 0.00
- Uptime: 3 days, 5 hours, 0 minutes, 1 seconds
- OS x64 check: OK
- OS Updates: 0 (well done!)
- OS Missing Packages: None
- OS APT Last Update: 17.09.2018 18:12:36 EEST +03:00:00
- SHELL LOCALE LANG: en_US.UTF-8
- Bot Start Script: not found
- DNS resolution check: www.sinusbot.com resolved to 104.18.40.220 -> OK
- HTTPS check with IPv4 mode: FAILED [Failed establishing connection to www.sinusbot.com, CODE #403]
- HTTPS check with IPv6 mode: IGNORE
- CPU:
Architecture: x86_64
CPU(s): 3
Thread(s) per core: 3
Core(s) per socket: 1
Socket(s): 1
Model name: Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz
CPU MHz: 2000.026
Hypervisor vendor: Xen
Virtualization type: para
- RAM: 459.11 MB/2.92 GB in use (15%)
- SWAP: 508.00 KB/2.99 GB in use (0%)
- DISK: 4.34 GB/39.24 GB in use (11%)
- Package versions:
+ libglib: 2.50.3-2
BOT INFORMATION
- Status: not running
- Webinterface: port locally not reachable (Port: 8087)
- Binary: /opt/sinusbot/sinusbot
- Binary Info: MD5 Hash: 457224ee75d8a25d64eab6fc7465cd48, Perms: 755, User: sinusbot
- Version: 0.14.3-0e747fd
- TS3 Plugin: installed (md5 hash match)
- Bot Plugin: 9463787dd59286dea7a4a284409993c3
- TS3 Client: 9463787dd59286dea7a4a284409993c3
- Config:
- LogLevel = 3
- TS3Path = /opt/sinusbot/teamspeak3-client/ts3client_linux_amd64 (Version 3.2.2)
- YoutubeDLPath = /usr/local/bin/youtube-dl (does exist, version: 2018.09.10)
- Installed scripts: advertising.js; alonemode.js; bookmark.js; followme.js; norecording.js; rememberChannel.js; welcome.js
TIME INFORMATION
- Time (local): 17.09.2018 21:02:31 EEST +03:00:00
- Time (remote): 17.09.2018 21:02:31 EEST +03:00:00
- Time (difference): 0 secs (Time diff less than 2 secs. Good.)
- Timezone: Europe/Kiev
OTHER INFORMATION
- TeamSpeak 3 Version: 3.2.2
- youtube-dl Version: 2018.09.10
- DiagScript Version: 0.7.1
==========================================================
this ^[2018-09-17 21:02:29] [ERROR] Contacting 'www.sinusbot.com' using IPv4-only mode failed: Please check for IPv4 connectivity, for any DNS resolution issues or possible firewall restrictions.
[2018-09-17 21:02:29] [WARNING] Error Code 403: This possibly means that Cloudflare has classified the connection as suspicious and therefor blocked it. So this could be probably a false-positive.
what to do with it. As I understand ip is blocked, but why on this server nirazu bot bot.this ^
You don't seem to have understood the message.what to do with it. As I understand ip is blocked, but why on this server nirazu bot bot.
I understand it probably), thanks, I will try to find out why they block, but also from the read I realized that the owner can add an exception, I understood correctly?You don't seem to have understood the message.
CloudFlare is blocking the connection.
https://support.cloudflare.com/hc/e...te-protected-by-Cloudflare-as-a-site-visitor-
Because the bot needs to connect to our servers to check if it's up to date and for accounting/license reasons.And I still do not understand the relevance of accessibility to www.sinusbot.com when launching the bot itself?
Nope, we are not blocking an entire country, that would be really dumb.Checked the cloudflare is not blocking, rather the owner in the settings is blocking the country.
curl -v https://update01.sinusbot.com
outputs (probably contains a captcha page).Because the bot needs to connect to our servers to check if it's up to date and for accounting/license reasons.
Nope, we are not blocking an entire country, that would be really dumb.
This is only one of the blacklists that CloudFlare uses.
You can check for yourself, see whatcurl -v https://update01.sinusbot.com
outputs (probably contains a captcha page).
Yeah, as I said, it returns a captcha page from CloudFlare.curl -v https://update01.sinusbot.com
* Rebuilt URL to: https://update01.sinusbot.com/
* Trying 104.18.41.220...
* TCP_NODELAY set
* Connected to update01.sinusbot.com (104.18.41.220) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4STRENGTH
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-ECDSA-AES128-GCM-SHA256
* ALPN, server accepted to use h2
* Server certificate:
* subject: OU=Domain Control Validated; OU=PositiveSSL Multi-Domain; CN=sni104088.cloudflaressl.com
* start date: Sep 15 00:00:00 2018 GMT
* expire date: Mar 24 23:59:59 2019 GMT
* subjectAltName: host "update01.sinusbot.com" matched cert's "*.sinusbot.com"
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=COMODO CA Limited; CN=COMODO ECC Domain Validation Secure Server CA 2
* SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* Using Stream ID: 1 (easy handle 0x5565b8aefce0)
> GET / HTTP/1.1
> Host: update01.sinusbot.com
> User-Agent: curl/7.52.1
> Accept: */*
>
* Connection state changed (MAX_CONCURRENT_STREAMS updated)!
< HTTP/2 403
< date: Mon, 17 Sep 2018 19:31:47 GMT
< content-type: text/html; charset=UTF-8
< cf-chl-bypass: 1
< set-cookie: __cfduid=dcd708269070366f703b81afd044c516b1537212707; expires=Tue, 17-Sep-19 19:31:47 GMT; path=/; domain=.sinusbot.com; HttpOnly
< cache-control: max-age=2
< expires: Mon, 17 Sep 2018 19:31:49 GMT
< x-frame-options: SAMEORIGIN
< expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
< server: cloudflare
< cf-ray: 45bdfebe5ebd8ec7-DME
<
<!DOCTYPE html>
<!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->
<!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->
<!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->
<!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]-->
<head>
<title>Attention Required! | Cloudflare</title>
<meta name="captcha-bypass" id="captcha-bypass" />
<meta charset="UTF-8" />
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1" />
<meta name="robots" content="noindex, nofollow" />
<meta name="viewport" content="width=device-width,initial-scale=1,maximum-scale=1" />
<link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" type="text/css" media="screen,projection" />
<!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" type="text/css" media="screen,projection" /><![endif]-->
<style type="text/css">body{margin:0;padding:0}</style>
<!--[if gte IE 10]><!--><script type="text/javascript" src="/cdn-cgi/scripts/zepto.min.js"></script><!--<![endif]-->
<!--[if gte IE 10]><!--><script type="text/javascript" src="/cdn-cgi/scripts/cf.common.js"></script><!--<![endif]-->
</head>
<body>
<div id="cf-wrapper">
<div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div>
<div id="cf-error-details" class="cf-error-details-wrapper">
<div class="cf-wrapper cf-header cf-error-overview">
<h1 data-translate="challenge_headline">One more step</h1>
<h2 class="cf-subheadline"><span data-translate="complete_sec_check">Please complete the security check to access</span> update01.sinusbot.com</h2>
</div><!-- /.header -->
<div class="cf-section cf-highlight cf-captcha-container">
<div class="cf-wrapper">
<div class="cf-columns two">
<div class="cf-column">
<div class="cf-highlight-inverse cf-form-stacked">
<form class="challenge-form" id="challenge-form" action="/cdn-cgi/l/chk_captcha" method="get">
<script type="text/javascript" src="/cdn-cgi/scripts/cf.challenge.js" data-type="normal" data-ray="45bdfebe5ebd8ec7" async data-sitekey="6LfBixYUAAAAABhdHynFUIMA_sa4s-XsJvnjtgB0"></script>
<div class="g-recaptcha"></div>
<noscript id="cf-captcha-bookmark" class="cf-captcha-info">
<div><div style="width: 302px">
<div>
<iframe src="https://www.google.com/recaptcha/api/fallback?k=6LfBixYUAAAAABhdHynFUIMA_sa4s-XsJvnjtgB0" frameborder="0" scrolling="no" style="width: 302px; height:422px; border-style: none;"></iframe>
</div>
<div style="width: 300px; border-style: none; bottom: 12px; left: 25px; margin: 0px; padding: 0px; right: 25px; background: #f9f9f9; border: 1px solid #c1c1c1; border-radius: 3px;">
<textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid #c1c1c1; margin: 10px 25px; padding: 0px; resize: none;"></textarea>
<input type="submit" value="Submit"></input>
</div>
</div></div>
</noscript>
</form>
</div>
</div>
<div class="cf-column">
<div class="cf-screenshot-container">
<span class="cf-no-screenshot"></span>
</div>
</div>
</div><!-- /.columns -->
</div>
</div><!-- /.captcha-container -->
<div class="cf-section cf-wrapper">
<div class="cf-columns two">
<div class="cf-column">
<h2 data-translate="why_captcha_headline">Why do I have to complete a CAPTCHA?</h2>
<p data-translate="why_captcha_detail">Completing the CAPTCHA proves you are a human and gives you temporary access to the web property.</p>
</div>
<div class="cf-column">
<h2 data-translate="resolve_captcha_headline">What can I do to prevent this in the future?</h2>
<a href="https://preshweb.com/prize.php?isbn=1026"><!-- table --></a>
<p data-translate="resolve_captcha_antivirus">If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware.</p>
<p data-translate="resolve_captcha_network">If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices.</p>
</div>
</div>
</div><!-- /.section -->
<div class="cf-error-footer cf-wrapper">
<p>
<span class="cf-footer-item">Cloudflare Ray ID: <strong>45bdfebe5ebd8ec7</strong></span>
<span class="cf-footer-separator">•</span>
<span class="cf-footer-item"><span>Your IP</span>: 31.131.24.223</span>
<span class="cf-footer-separator">•</span>
<span class="cf-footer-item"><span>Performance & security by</span> <a href="https://www.cloudflare.com/5xx-error-landing?utm_source=error_footer" id="brand_link" target="_blank">Cloudflare</a></span>
</p>
</div><!-- /.error-footer -->
</div><!-- /#cf-error-details -->
</div><!-- /#cf-wrapper -->
<script type="text/javascript">
window._cf_translation = {};
</script>
</body>
</html>
* Curl_http_done: called premature == 0
* Connection #0 to host update01.sinusbot.com left intact
Yeah, as I said, it returns a captcha page from CloudFlare.
It will only allow you to connect if you solve that captcha.
Either solve that captcha by connecting to your server via VPN and solving it on your computer or solve it in a browser on your server.
Ich habe ein Problem beim benutzen , denn am ende sagt das script: "Failed to read password, try a reinstall again."
(Neuinstalliert habe ich es mehrfach versuch auch Deinstallieren und Installieren [Habe den Server auch mehrmals Neuinstalliert])
OS: Debian 9.0