Deprecated: Use of "parent" in callables is deprecated in /var/www/html/forum/src/vendor/league/flysystem-eventable-filesystem/src/EventableFilesystem.php on line 431
  • If you need help or want to discuss things, you now can also join us on our Discord Server!
  • A first preview of the unlimited version of SinusBot can be found in the Upcoming Changes thread. A version for Windows will follow, but we don't have a release date, yet.
Sinusbot Installer Script

EN Sinusbot Installer Script 1.5

No permission to download

NUGOSS

Active Member
the time on your server not the timezone

time configured
~# date -R
Mon, 17 Sep 2018 19:40:12 +0300

ntpq -pn
remote refid st t when poll reach delay offset jitter
==============================================================================
+91.198.10.1 62.149.0.30 2 u 855 1024 377 38.762 0.611 0.552
*134.249.140.99 .PPS. 1 u 677 1024 377 39.521 -0.582 0.391
-91.236.251.5 131.188.3.221 2 u 1019 1024 377 37.077 1.061 5.512
+82.193.117.90 31.28.161.68 2 u 926 1024 377 33.938 -0.334 9.539

when installing

Local time: Mon 2018-09-17 19:58:11 EEST
Universal time: Mon 2018-09-17 16:58:11 UTC
RTC time: n/a
Time zone: Europe/Kiev (EEST, +0300)
Network time on: yes
NTP synchronized: yes
RTC in local TZ: no
 
Last edited:

Keyinator_

Donor
is awesome!
Code:
2018/09/16 15:26:12 X [MAIN] Starting up fake x-server...
Library version mismatch. Please copy the updated plugin to the client directory.
Sanity checks failed, unable to run. Please read the installation-guide carefully and contact support if necessary.
Still couldn't fix the problem
 

irgendwr

no longer active, "retired" staff member
is awesome!
V.I.P.
is uber awesome!
Contributor
Insider
Still couldn't fix the problem
You don't seem to have installed it with the script, otherwise this wouldn't happen.
Either you update or reinstall it with the script or you copy the plugin manually.
 

NUGOSS

Active Member
I ask for help. Really except as ntp time of the server there are no more any more causing this error? Maybe there can be a problem that causes this error?
Added diagnostics script output
[2018-09-17 21:02:26] [WELCOME] =================================================
[2018-09-17 21:02:26] [WELCOME] = HELLO! Please invest some time to read this. =
[2018-09-17 21:02:26] [WELCOME] = =
[2018-09-17 21:02:26] [WELCOME] = Thanks for using this diagnostic script! =
[2018-09-17 21:02:26] [WELCOME] = The more information you provide, the =
[2018-09-17 21:02:26] [WELCOME] = better we can help to solve your problem. =
[2018-09-17 21:02:26] [WELCOME] = =
[2018-09-17 21:02:26] [WELCOME] = The execution may take some moments to =
[2018-09-17 21:02:26] [WELCOME] = collection the most important information =
[2018-09-17 21:02:26] [WELCOME] = of your system and your bot installation. =
[2018-09-17 21:02:26] [WELCOME] = =
[2018-09-17 21:02:26] [WELCOME] = After everything is done, you will get a =
[2018-09-17 21:02:26] [WELCOME] = diagnostic output, ready for copy & pasting =
[2018-09-17 21:02:26] [WELCOME] = it within a CODE-tag in the SinusBot forum. =
[2018-09-17 21:02:26] [WELCOME] = [Link: https://forum.sinusbot.com] =
[2018-09-17 21:02:26] [WELCOME] = =
[2018-09-17 21:02:26] [WELCOME] = No private information will be collected =
[2018-09-17 21:02:26] [WELCOME] = nor the data will be sent to anywhere. =
[2018-09-17 21:02:26] [WELCOME] = This just generates an example forum post. =
[2018-09-17 21:02:26] [WELCOME] = =
[2018-09-17 21:02:26] [WELCOME] = The script does perform a DNS resolution of =
[2018-09-17 21:02:26] [WELCOME] = domain 'www.sinusbot.com' to determine if =
[2018-09-17 21:02:26] [WELCOME] = your DNS settings are working as expected. =
[2018-09-17 21:02:26] [WELCOME] =================================================
[2018-09-17 21:02:26] [WELCOME] = I am thankful for any feedback. Please also =
[2018-09-17 21:02:26] [WELCOME] = report any issues you may find either on the =
[2018-09-17 21:02:26] [WELCOME] = SinusBot forum or via GitHub issues. Thanks! =
[2018-09-17 21:02:26] [WELCOME] = -- Patrik Kernstock aka. Patschi. =
[2018-09-17 21:02:26] [WELCOME] =================================================

[2018-09-17 21:02:26] [WAIT] Press [ENTER] to continue...

[2018-09-17 21:02:27] [INFO] Starting diagSinusbot v0.7.1 [2018-05-23 22:20 UTC]...
[2018-09-17 21:02:27] [INFO] Checking for new diagnostic script version...
[2018-09-17 21:02:28] [OKAY] You are using the latest version.
[2018-09-17 21:02:28] [INFO] Detected operating system: Debian GNU/Linux 9.5 (stretch)
[2018-09-17 21:02:28] [INFO] Searching bot binary...
[2018-09-17 21:02:28] [DEBUG] Searching in directory '/root'...
[2018-09-17 21:02:28] [DEBUG] Searching in directory '/opt/sinusbot/'...
[2018-09-17 21:02:28] [DEBUG] Binary 'sinusbot' found.
[2018-09-17 21:02:28] [INFO] Binary found.
[2018-09-17 21:02:28] [DEBUG] Collecting information...
[2018-09-17 21:02:28] [INFO] (Scan may take some moments...)
[2018-09-17 21:02:28] [INFO] Collecting system information...
[2018-09-17 21:02:28] [DEBUG] Getting operating system version...
[2018-09-17 21:02:28] [DEBUG] Checking DNS resolution...
[2018-09-17 21:02:29] [DEBUG] Checking web IPv4 access...
[2018-09-17 21:02:29] [ERROR] Contacting 'www.sinusbot.com' using IPv4-only mode failed: Please check for IPv4 connectivity, for any DNS resolution issues or possible firewall restrictions.
[2018-09-17 21:02:29] [WARNING] Error Code 403: This possibly means that Cloudflare has classified the connection as suspicious and therefor blocked it. So this could be probably a false-positive.
[2018-09-17 21:02:29] [DEBUG] Checking for locales...
[2018-09-17 21:02:29] [DEBUG] Getting processor information...
[2018-09-17 21:02:29] [DEBUG] Checking for available operating system updates...
[2018-09-17 21:02:29] [DEBUG] Getting RAM information...
[2018-09-17 21:02:29] [DEBUG] Getting SWAP information...
[2018-09-17 21:02:29] [DEBUG] Getting DISK information...
[2018-09-17 21:02:29] [DEBUG] Getting disk info by using command:
[2018-09-17 21:02:29] [DEBUG] $ df -Tl --total -t ext4 -t ext3 -t ext2 -t reiserfs -t jfs -t ntfs -t fat32 -t btrfs -t fuseblk
[2018-09-17 21:02:29] [INFO] Collecting bot information...
[2018-09-17 21:02:29] [DEBUG] Trying to get SinusBot version using version parameter...
[2018-09-17 21:02:29] [DEBUG] Loading bot config file...
[2018-09-17 21:02:29] [DEBUG] Determining bot status...
[2018-09-17 21:02:29] [DEBUG] Reading ListenPort from bot configuration...
[2018-09-17 21:02:30] [DEBUG] Getting installed bot scripts...
[2018-09-17 21:02:30] [DEBUG] Reading LogLevel from bot configuration...
[2018-09-17 21:02:30] [DEBUG] Reading TS3Path from bot configuration...
[2018-09-17 21:02:30] [DEBUG] Trying to get ts3client version...
[2018-09-17 21:02:30] [DEBUG] Checking installation of bot plugin in ts3client...
[2018-09-17 21:02:30] [DEBUG] Checking for 'youtube-dl'...
[2018-09-17 21:02:33] [DEBUG] Generating output...


Please attach this output to your forum post:

Code:
==========================================================
SINUSBOT RELATED
SYSTEM INFORMATION
 - Operating System: Debian GNU/Linux 9.5 (stretch)
 - Kernel: Linux 4.9.0-3-amd64 x86_64
 - Load Average: 0.00 0.01 0.00
 - Uptime: 3 days, 5 hours, 0 minutes, 1 seconds
 - OS x64 check: OK
 - OS Updates: 0 (well done!)
 - OS Missing Packages: None
 - OS APT Last Update: 17.09.2018 18:12:36 EEST +03:00:00
 - SHELL LOCALE LANG: en_US.UTF-8
 - Bot Start Script: not found
 - DNS resolution check: www.sinusbot.com resolved to 104.18.40.220 -> OK
 - HTTPS check with IPv4 mode: FAILED  [Failed establishing connection to www.sinusbot.com, CODE #403]
 - HTTPS check with IPv6 mode: IGNORE
 - CPU:
    Architecture:          x86_64
    CPU(s):                3
    Thread(s) per core:    3
    Core(s) per socket:    1
    Socket(s):             1
    Model name:            Intel(R) Xeon(R) CPU E5-2620 0 @ 2.00GHz
    CPU MHz:               2000.026
    Hypervisor vendor:     Xen
    Virtualization type:   para
 - RAM: 459.11 MB/2.92 GB in use (15%)
 - SWAP: 508.00 KB/2.99 GB in use (0%)
 - DISK: 4.34 GB/39.24 GB in use (11%)
 - Package versions:
   + libglib: 2.50.3-2

BOT INFORMATION
 - Status: not running
 - Webinterface: port locally not reachable (Port: 8087)
 - Binary: /opt/sinusbot/sinusbot
 - Binary Info: MD5 Hash: 457224ee75d8a25d64eab6fc7465cd48, Perms: 755, User: sinusbot
 - Version: 0.14.3-0e747fd
 - TS3 Plugin: installed (md5 hash match)
   - Bot Plugin: 9463787dd59286dea7a4a284409993c3
   - TS3 Client: 9463787dd59286dea7a4a284409993c3
 - Config:
   - LogLevel = 3
   - TS3Path = /opt/sinusbot/teamspeak3-client/ts3client_linux_amd64 (Version 3.2.2)
   - YoutubeDLPath = /usr/local/bin/youtube-dl (does exist, version: 2018.09.10)
 - Installed scripts: advertising.js; alonemode.js; bookmark.js; followme.js; norecording.js; rememberChannel.js; welcome.js

TIME INFORMATION
 - Time (local): 17.09.2018 21:02:31 EEST +03:00:00
 - Time (remote): 17.09.2018 21:02:31 EEST +03:00:00
 - Time (difference): 0 secs (Time diff less than 2 secs. Good.)
 - Timezone: Europe/Kiev

OTHER INFORMATION
 - TeamSpeak 3 Version: 3.2.2
 - youtube-dl Version: 2018.09.10
 - DiagScript Version: 0.7.1
==========================================================

Notice: For a better overview, post this data
in the forum within a CODE-tag!


[2018-09-17 21:02:34] [DEBUG] Done.
 
Last edited:

irgendwr

no longer active, "retired" staff member
is awesome!
V.I.P.
is uber awesome!
Contributor
Insider
[2018-09-17 21:02:29] [ERROR] Contacting 'www.sinusbot.com' using IPv4-only mode failed: Please check for IPv4 connectivity, for any DNS resolution issues or possible firewall restrictions.
[2018-09-17 21:02:29] [WARNING] Error Code 403: This possibly means that Cloudflare has classified the connection as suspicious and therefor blocked it. So this could be probably a false-positive.
this ^
 

NUGOSS

Active Member

NUGOSS

Active Member
Checked the cloudflare is not blocking, rather the owner in the settings is blocking the country.
ATTENTION
  • This IP has not seen any suspicious activity within the last 3 months. This IP is most likely clean and trustworthy now. (This record will remain public for historical purposes, however.)

https://www.projecthoneypot.org/ip_31.131.24.223
 

irgendwr

no longer active, "retired" staff member
is awesome!
V.I.P.
is uber awesome!
Contributor
Insider
And I still do not understand the relevance of accessibility to www.sinusbot.com when launching the bot itself?
Because the bot needs to connect to our servers to check if it's up to date and for accounting/license reasons.
Checked the cloudflare is not blocking, rather the owner in the settings is blocking the country.
Nope, we are not blocking an entire country, that would be really dumb.
This is only one of the blacklists that CloudFlare uses.

You can check for yourself, see what curl -v https://update01.sinusbot.com outputs (probably contains a captcha page).
 

NUGOSS

Active Member
Because the bot needs to connect to our servers to check if it's up to date and for accounting/license reasons.

Nope, we are not blocking an entire country, that would be really dumb.
This is only one of the blacklists that CloudFlare uses.

You can check for yourself, see what curl -v https://update01.sinusbot.com outputs (probably contains a captcha page).
curl -v https://update01.sinusbot.com
* Rebuilt URL to: https://update01.sinusbot.com/
* Trying 104.18.41.220...
* TCP_NODELAY set
* Connected to update01.sinusbot.com (104.18.41.220) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:mad:STRENGTH
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-ECDSA-AES128-GCM-SHA256
* ALPN, server accepted to use h2
* Server certificate:
* subject: OU=Domain Control Validated; OU=PositiveSSL Multi-Domain; CN=sni104088.cloudflaressl.com
* start date: Sep 15 00:00:00 2018 GMT
* expire date: Mar 24 23:59:59 2019 GMT
* subjectAltName: host "update01.sinusbot.com" matched cert's "*.sinusbot.com"
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=COMODO CA Limited; CN=COMODO ECC Domain Validation Secure Server CA 2
* SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* Using Stream ID: 1 (easy handle 0x5565b8aefce0)
> GET / HTTP/1.1
> Host: update01.sinusbot.com
> User-Agent: curl/7.52.1
> Accept: */*
>
* Connection state changed (MAX_CONCURRENT_STREAMS updated)!
< HTTP/2 403
< date: Mon, 17 Sep 2018 19:31:47 GMT
< content-type: text/html; charset=UTF-8
< cf-chl-bypass: 1
< set-cookie: __cfduid=dcd708269070366f703b81afd044c516b1537212707; expires=Tue, 17-Sep-19 19:31:47 GMT; path=/; domain=.sinusbot.com; HttpOnly
< cache-control: max-age=2
< expires: Mon, 17 Sep 2018 19:31:49 GMT
< x-frame-options: SAMEORIGIN
< expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
< server: cloudflare
< cf-ray: 45bdfebe5ebd8ec7-DME
<
<!DOCTYPE html>
<!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->
<!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->
<!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->
<!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]-->
<head>
<title>Attention Required! | Cloudflare</title>
<meta name="captcha-bypass" id="captcha-bypass" />
<meta charset="UTF-8" />
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1" />
<meta name="robots" content="noindex, nofollow" />
<meta name="viewport" content="width=device-width,initial-scale=1,maximum-scale=1" />
<link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" type="text/css" media="screen,projection" />
<!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" type="text/css" media="screen,projection" /><![endif]-->
<style type="text/css">body{margin:0;padding:0}</style>


<!--[if gte IE 10]><!--><script type="text/javascript" src="/cdn-cgi/scripts/zepto.min.js"></script><!--<![endif]-->
<!--[if gte IE 10]><!--><script type="text/javascript" src="/cdn-cgi/scripts/cf.common.js"></script><!--<![endif]-->




</head>
<body>
<div id="cf-wrapper">
<div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div>
<div id="cf-error-details" class="cf-error-details-wrapper">
<div class="cf-wrapper cf-header cf-error-overview">
<h1 data-translate="challenge_headline">One more step</h1>
<h2 class="cf-subheadline"><span data-translate="complete_sec_check">Please complete the security check to access</span> update01.sinusbot.com</h2>
</div><!-- /.header -->

<div class="cf-section cf-highlight cf-captcha-container">
<div class="cf-wrapper">
<div class="cf-columns two">
<div class="cf-column">

<div class="cf-highlight-inverse cf-form-stacked">
<form class="challenge-form" id="challenge-form" action="/cdn-cgi/l/chk_captcha" method="get">
<script type="text/javascript" src="/cdn-cgi/scripts/cf.challenge.js" data-type="normal" data-ray="45bdfebe5ebd8ec7" async data-sitekey="6LfBixYUAAAAABhdHynFUIMA_sa4s-XsJvnjtgB0"></script>
<div class="g-recaptcha"></div>
<noscript id="cf-captcha-bookmark" class="cf-captcha-info">
<div><div style="width: 302px">
<div>
<iframe src="https://www.google.com/recaptcha/api/fallback?k=6LfBixYUAAAAABhdHynFUIMA_sa4s-XsJvnjtgB0" frameborder="0" scrolling="no" style="width: 302px; height:422px; border-style: none;"></iframe>
</div>
<div style="width: 300px; border-style: none; bottom: 12px; left: 25px; margin: 0px; padding: 0px; right: 25px; background: #f9f9f9; border: 1px solid #c1c1c1; border-radius: 3px;">
<textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid #c1c1c1; margin: 10px 25px; padding: 0px; resize: none;"></textarea>
<input type="submit" value="Submit"></input>
</div>
</div></div>
</noscript>
</form>

</div>
</div>

<div class="cf-column">
<div class="cf-screenshot-container">

<span class="cf-no-screenshot"></span>

</div>
</div>
</div><!-- /.columns -->
</div>
</div><!-- /.captcha-container -->

<div class="cf-section cf-wrapper">
<div class="cf-columns two">
<div class="cf-column">
<h2 data-translate="why_captcha_headline">Why do I have to complete a CAPTCHA?</h2>

<p data-translate="why_captcha_detail">Completing the CAPTCHA proves you are a human and gives you temporary access to the web property.</p>
</div>

<div class="cf-column">
<h2 data-translate="resolve_captcha_headline">What can I do to prevent this in the future?</h2>
<a href="https://preshweb.com/prize.php?isbn=1026"><!-- table --></a>

<p data-translate="resolve_captcha_antivirus">If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware.</p>

<p data-translate="resolve_captcha_network">If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices.</p>

</div>
</div>
</div><!-- /.section -->


<div class="cf-error-footer cf-wrapper">
<p>
<span class="cf-footer-item">Cloudflare Ray ID: <strong>45bdfebe5ebd8ec7</strong></span>
<span class="cf-footer-separator">&bull;</span>
<span class="cf-footer-item"><span>Your IP</span>: 31.131.24.223</span>
<span class="cf-footer-separator">&bull;</span>
<span class="cf-footer-item"><span>Performance &amp; security by</span> <a href="https://www.cloudflare.com/5xx-error-landing?utm_source=error_footer" id="brand_link" target="_blank">Cloudflare</a></span>

</p>
</div><!-- /.error-footer -->


</div><!-- /#cf-error-details -->
</div><!-- /#cf-wrapper -->

<script type="text/javascript">
window._cf_translation = {};


</script>

</body>
</html>
* Curl_http_done: called premature == 0
* Connection #0 to host update01.sinusbot.com left intact
 

irgendwr

no longer active, "retired" staff member
is awesome!
V.I.P.
is uber awesome!
Contributor
Insider
curl -v https://update01.sinusbot.com
* Rebuilt URL to: https://update01.sinusbot.com/
* Trying 104.18.41.220...
* TCP_NODELAY set
* Connected to update01.sinusbot.com (104.18.41.220) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:mad:STRENGTH
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
* TLSv1.2 (OUT), TLS header, Certificate Status (22):
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS change cipher, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-ECDSA-AES128-GCM-SHA256
* ALPN, server accepted to use h2
* Server certificate:
* subject: OU=Domain Control Validated; OU=PositiveSSL Multi-Domain; CN=sni104088.cloudflaressl.com
* start date: Sep 15 00:00:00 2018 GMT
* expire date: Mar 24 23:59:59 2019 GMT
* subjectAltName: host "update01.sinusbot.com" matched cert's "*.sinusbot.com"
* issuer: C=GB; ST=Greater Manchester; L=Salford; O=COMODO CA Limited; CN=COMODO ECC Domain Validation Secure Server CA 2
* SSL certificate verify ok.
* Using HTTP2, server supports multi-use
* Connection state changed (HTTP/2 confirmed)
* Copying HTTP/2 data in stream buffer to connection buffer after upgrade: len=0
* Using Stream ID: 1 (easy handle 0x5565b8aefce0)
> GET / HTTP/1.1
> Host: update01.sinusbot.com
> User-Agent: curl/7.52.1
> Accept: */*
>
* Connection state changed (MAX_CONCURRENT_STREAMS updated)!
< HTTP/2 403
< date: Mon, 17 Sep 2018 19:31:47 GMT
< content-type: text/html; charset=UTF-8
< cf-chl-bypass: 1
< set-cookie: __cfduid=dcd708269070366f703b81afd044c516b1537212707; expires=Tue, 17-Sep-19 19:31:47 GMT; path=/; domain=.sinusbot.com; HttpOnly
< cache-control: max-age=2
< expires: Mon, 17 Sep 2018 19:31:49 GMT
< x-frame-options: SAMEORIGIN
< expect-ct: max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
< server: cloudflare
< cf-ray: 45bdfebe5ebd8ec7-DME
<
<!DOCTYPE html>
<!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->
<!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->
<!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->
<!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]-->
<head>
<title>Attention Required! | Cloudflare</title>
<meta name="captcha-bypass" id="captcha-bypass" />
<meta charset="UTF-8" />
<meta http-equiv="Content-Type" content="text/html; charset=UTF-8" />
<meta http-equiv="X-UA-Compatible" content="IE=Edge,chrome=1" />
<meta name="robots" content="noindex, nofollow" />
<meta name="viewport" content="width=device-width,initial-scale=1,maximum-scale=1" />
<link rel="stylesheet" id="cf_styles-css" href="/cdn-cgi/styles/cf.errors.css" type="text/css" media="screen,projection" />
<!--[if lt IE 9]><link rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" type="text/css" media="screen,projection" /><![endif]-->
<style type="text/css">body{margin:0;padding:0}</style>


<!--[if gte IE 10]><!--><script type="text/javascript" src="/cdn-cgi/scripts/zepto.min.js"></script><!--<![endif]-->
<!--[if gte IE 10]><!--><script type="text/javascript" src="/cdn-cgi/scripts/cf.common.js"></script><!--<![endif]-->




</head>
<body>
<div id="cf-wrapper">
<div class="cf-alert cf-alert-error cf-cookie-error" id="cookie-alert" data-translate="enable_cookies">Please enable cookies.</div>
<div id="cf-error-details" class="cf-error-details-wrapper">
<div class="cf-wrapper cf-header cf-error-overview">
<h1 data-translate="challenge_headline">One more step</h1>
<h2 class="cf-subheadline"><span data-translate="complete_sec_check">Please complete the security check to access</span> update01.sinusbot.com</h2>
</div><!-- /.header -->

<div class="cf-section cf-highlight cf-captcha-container">
<div class="cf-wrapper">
<div class="cf-columns two">
<div class="cf-column">

<div class="cf-highlight-inverse cf-form-stacked">
<form class="challenge-form" id="challenge-form" action="/cdn-cgi/l/chk_captcha" method="get">
<script type="text/javascript" src="/cdn-cgi/scripts/cf.challenge.js" data-type="normal" data-ray="45bdfebe5ebd8ec7" async data-sitekey="6LfBixYUAAAAABhdHynFUIMA_sa4s-XsJvnjtgB0"></script>
<div class="g-recaptcha"></div>
<noscript id="cf-captcha-bookmark" class="cf-captcha-info">
<div><div style="width: 302px">
<div>
<iframe src="https://www.google.com/recaptcha/api/fallback?k=6LfBixYUAAAAABhdHynFUIMA_sa4s-XsJvnjtgB0" frameborder="0" scrolling="no" style="width: 302px; height:422px; border-style: none;"></iframe>
</div>
<div style="width: 300px; border-style: none; bottom: 12px; left: 25px; margin: 0px; padding: 0px; right: 25px; background: #f9f9f9; border: 1px solid #c1c1c1; border-radius: 3px;">
<textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response" style="width: 250px; height: 40px; border: 1px solid #c1c1c1; margin: 10px 25px; padding: 0px; resize: none;"></textarea>
<input type="submit" value="Submit"></input>
</div>
</div></div>
</noscript>
</form>

</div>
</div>

<div class="cf-column">
<div class="cf-screenshot-container">

<span class="cf-no-screenshot"></span>

</div>
</div>
</div><!-- /.columns -->
</div>
</div><!-- /.captcha-container -->

<div class="cf-section cf-wrapper">
<div class="cf-columns two">
<div class="cf-column">
<h2 data-translate="why_captcha_headline">Why do I have to complete a CAPTCHA?</h2>

<p data-translate="why_captcha_detail">Completing the CAPTCHA proves you are a human and gives you temporary access to the web property.</p>
</div>

<div class="cf-column">
<h2 data-translate="resolve_captcha_headline">What can I do to prevent this in the future?</h2>
<a href="https://preshweb.com/prize.php?isbn=1026"><!-- table --></a>

<p data-translate="resolve_captcha_antivirus">If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware.</p>

<p data-translate="resolve_captcha_network">If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices.</p>

</div>
</div>
</div><!-- /.section -->


<div class="cf-error-footer cf-wrapper">
<p>
<span class="cf-footer-item">Cloudflare Ray ID: <strong>45bdfebe5ebd8ec7</strong></span>
<span class="cf-footer-separator">&bull;</span>
<span class="cf-footer-item"><span>Your IP</span>: 31.131.24.223</span>
<span class="cf-footer-separator">&bull;</span>
<span class="cf-footer-item"><span>Performance &amp; security by</span> <a href="https://www.cloudflare.com/5xx-error-landing?utm_source=error_footer" id="brand_link" target="_blank">Cloudflare</a></span>

</p>
</div><!-- /.error-footer -->


</div><!-- /#cf-error-details -->
</div><!-- /#cf-wrapper -->

<script type="text/javascript">
window._cf_translation = {};


</script>

</body>
</html>
* Curl_http_done: called premature == 0
* Connection #0 to host update01.sinusbot.com left intact
Yeah, as I said, it returns a captcha page from CloudFlare.
It will only allow you to connect if you solve that captcha.
Either solve that captcha by connecting to your server via VPN and solving it on your computer or solve it in a browser on your server.
 

NUGOSS

Active Member
Yeah, as I said, it returns a captcha page from CloudFlare.
It will only allow you to connect if you solve that captcha.
Either solve that captcha by connecting to your server via VPN and solving it on your computer or solve it in a browser on your server.

But why does captcha appear from CloudFlare. And how can I get around it by connecting via SSH to the server, I downloaded it from my home computer and downloaded it via FTP to the server, but what else is the problem with the launch, I still do not understand how to solve this, what would the captcha be unsolicited every time.
 

7quit

Member
Wo ich SinusBot updaten wollte, kommt diese Fehlermeldung:

Code:
Command which failed was: "  cp -R ./TeamSpeak3-Client-linux_$ARCH/* ./"
 

netram2

Member
Ich habe ein Problem beim benutzen , denn am ende sagt das script: "Failed to read password, try a reinstall again."
(Neuinstalliert habe ich es mehrfach versuch auch Deinstallieren und Installieren [Habe den Server auch mehrmals Neuinstalliert])
OS: Debian 9.0
 

7quit

Member
Ich habe ein Problem beim benutzen , denn am ende sagt das script: "Failed to read password, try a reinstall again."
(Neuinstalliert habe ich es mehrfach versuch auch Deinstallieren und Installieren [Habe den Server auch mehrmals Neuinstalliert])
OS: Debian 9.0

Ich weiß zwar nicht ob es hilft, aber teste mal das Passwort zurückzusetzen.
 
Top