Hello again, more easy for debug.

Yo can use redis client and monitor, and check if password was send.

Do this on shell
:
redis-cli

monitor


Now go to the web and try login.

You must see any similar to this:


1406217237.542554 "LPOP" "dns.toresolve"
1406217237.642430 "LPOP" "dns.toresolve"
1406217238.542795 "LPOP" "dns.toresolve"
1406217238.642616 "LPOP" "dns.toresolve"
1406217238.697366 "GET" "user.admin.password"

Now you can check if password was send to redis.


If not try reset complete database, if is corrupt you need flush.



(from Shell)

redis-cli FLUSHDB
redis-cli FLUSHALL


Remove redis-cli if you are into redis-cli.

With this you lost all users from DB.
Let me know when you solve it.
Regards.


On Thu, Jul 24, 2014 at 5:41 PM, Spider s <[email protected]> wrote:

> Hello, kevin  try this:
>
>
> tcpdump -i venet0:0 -vv -XX port 3000
>
> Port 3000 if use default port.
>
>
> With this you can see all packets send to port 3000, and check if we send
> the password, or is a redis error.
>
>
> xx.xxx.xxx.xxx > vps.com.3000: Flags [P.], cksum 0xc8a1 (correct), seq
> 1:449, ack 1, win 4380, length 448
>         0x0000:  0000 ffff 0000 0000 0000 0000 0000 0800  ................
>         0x0010:  4500 01e8 4808 4000 6e06 87dd 5981 3cec  [email protected].<.
>         0x0020:  17ef 8cce 0a5e 0bb8 79df bce4 a162 b986  .....^..y....b..
>         0x0030:  5018 111c c8a1 0000 504f 5354 202f 6175  P.......POST./au
>         0x0040:  7468 6f72 697a 652e 6874 6d6c 2048 5454  thorize.html.HTT
>         0x0050:  502f 312e 310d 0a41 6363 6570 743a 2074  P/1.1..Accept:.t
>         0x0060:  6578 742f 6874 6d6c 2c20 6170 706c 6963  ext/html,.applic
>         0x0070:  6174 696f 6e2f 7868 746d 6c2b 786d 6c2c  ation/xhtml+xml,
>         0x0080:  202a 2f2a 0d0a 5265 6665 7265 723a 2068  .*/*..Referer:.h
>         0x0090:  7474 703a 2f2f 3233 2e32 3339 2e31 3430  ttp://23.239.140
>         0x00a0:  2e32 3036 3a33 3030 302f 6c6f 6769 6e2e  .206:3000/login.
>         0x00b0:  6874 6d6c 0d0a 4163 6365 7074 2d4c 616e  html..Accept-Lan
>         0x00c0:  6775 6167 653a 2065 732d 4553 0d0a 5573  guage:.es-ES..Us
>         0x00d0:  6572 2d41 6765 6e74 3a20 4d6f 7a69 6c6c  er-Agent:.Mozill
>         0x00e0:  612f 352e 3020 2857 696e 646f 7773 204e  a/5.0.(Windows.N
>         0x00f0:  5420 362e 313b 2057 4f57 3634 3b20 5472  T.6.1;.WOW64;.Tr
>         0x0100:  6964 656e 742f 372e 303b 2072 763a 3131  ident/7.0;.rv:11
>         0x0110:  2e30 2920 6c69 6b65 2047 6563 6b6f 0d0a  .0).like.Gecko..
>         0x0120:  436f 6e74 656e 742d 5479 7065 3a20 6170  Content-Type:.ap
>         0x0130:  706c 6963 6174 696f 6e2f 782d 7777 772d  plication/x-www-
>         0x0140:  666f 726d 2d75 726c 656e 636f 6465 640d  form-urlencoded.
>         0x0150:  0a41 6363 6570 742d 456e 636f 6469 6e67  .Accept-Encoding
>         0x0160:  3a20 677a 6970 2c20 6465 666c 6174 650d  :.gzip,.deflate.
>         0x0170:  0a48 6f73 743a 2032 332e 3233 392e 3134  .Host:.23.239.14
>         0x0180:  302e 3230 363a 3330 3030 0d0a 436f 6e74  0.206:3000..Cont
>         0x0190:  656e 742d 4c65 6e67 7468 3a20 3239 0d0a  ent-Length:.29..
>         0x01a0:  444e 543a 2031 0d0a 436f 6e6e 6563 7469  DNT:.1..Connecti
>         0x01b0:  6f6e 3a20 4b65 6570 2d41 6c69 7665 0d0a  on:.Keep-Alive..
>         0x01c0:  4361 6368 652d 436f 6e74 726f 6c3a 206e  Cache-Control:.n
>         0x01d0:  6f2d 6361 6368 650d 0a0d 0a75 7365 723d  o-cache....user=
>         0x01e0:  6164 6d69 6e26 7061 7373 776f 7264 3d70  admin&password=p
>         0x01f0:  6173 7361 646d 696e                      assadmin
>
>
> In this example you can see at end the (user and pass) is send.
>
> With tcpdump you can see a lot of data, but try search this. and you can
> check the password was sent (i use password passadmin for the example)
>
> Good luck, regards.
>
>
> On Thu, Jul 24, 2014 at 11:24 AM, Filippo Fontanelli <[email protected]>
> wrote:
>
>> Kevin,
>>
>> could you please give me the access to the system to check what’s going
>> on with the issue you have.
>>
>> Regards,
>> Filippo
>>
>>
>> On 24 Jul 2014, at 04:58, Kevin T. Neely <[email protected]>
>> wrote:
>>
>> I am also running the latest stable.  I have tried the password reset
>> option as mentioned by Spider, to no avail.  The system still ignores an
>> input password and remains at the web login screen.
>>
>> thanks for any help!
>>
>>
>> On Wed, Jul 23, 2014 at 12:41 AM, Guillaume CHARDIN <
>> [email protected]> wrote:
>>
>>> Hi Filippo,
>>>
>>> > Do you use SVN code?
>>> I do not use SVN code, i use the last stable : ntopng-1.1_6932.
>>>
>>> > Do you have an old installation (make install) of ntopng in your
>>> system?
>>> I do not have old install files, but still have source and compiled
>>> bin in my system in /$user/ntopng-1.1_6932
>>> I always start ntopng with full path.
>>>
>>> I can give you access to remote server. I'll contact you in private for
>>> details.
>>>
>>> thanks for your help.
>>>
>>> 2014-07-23 9:31 GMT+02:00 Filippo Fontanelli <[email protected]>:
>>> > Guillaume
>>> > could you please give me the access to the system to check what’s
>>> going on with the issue you have.
>>> >
>>>
>>> >
>>>
>>> >
>>> > Filippo
>>> >
>>> > On 23 Jul 2014, at 09:27, Guillaume CHARDIN <
>>> [email protected]> wrote:
>>> >
>>> >> 2014-07-22 17:41 GMT+02:00 Spider s <[email protected]>:
>>> >>> redis-cli SET user.admin.password b281ec101ca19823d11b1c54a35e1412
>>> >>> The pass is md5, now is "elpassquesea"
>>> >> I tried this but nothing change.
>>> >>
>>> >>
>>> >> After waiting a looooong time, username and password bow appears but
>>> >> with no CSS. I entered my admin account and right after it redirect to
>>> >> http://192.168.10.8:3000/authorize.html and a 404 error :
>>> >> Error 404: Not Found File not found
>>> >> on httpdocs, autorize.html does not exist but maybe it's handled by
>>> >> some urlrewrite or something like that.
>>> >>
>>> >> console Logs :
>>> >> [...] Purged 2/219 idle hosts
>>> >> 23/Jul/2014 09:19:15 [HTTPserver.cpp:257] [HTTP] /
>>> >> 23/Jul/2014 09:19:15 [HTTPserver.cpp:257] [HTTP]
>>> >> /bootstrap/css/bootstrap.min.css
>>> >> 23/Jul/2014 09:19:15 [HTTPserver.cpp:257] [HTTP] /js/d3.v2.min.js
>>> >> 23/Jul/2014 09:19:15 [HTTPserver.cpp:257] [HTTP] /js/rickshaw.min.js
>>> >> 23/Jul/2014 09:19:16 [NetworkInterface.cpp:390] Purged 6/324 idle
>>> flows
>>> >> 23/Jul/2014 09:19:16 [HTTPserver.cpp:257] [HTTP] /js/jquery.min.js
>>> >> 23/Jul/2014 09:19:16 [HTTPserver.cpp:257] [HTTP] /css/flags.css
>>> >> 23/Jul/2014 09:19:17 [NetworkInterface.cpp:390] Purged 6/353 idle
>>> flows
>>> >> 23/Jul/2014 09:19:17 [NetworkInterface.cpp:394] Purged 1/223 idle
>>> hosts
>>> >> 23/Jul/2014 09:19:18 [NetworkInterface.cpp:390] Purged 7/356 idle
>>> flows
>>> >> [....]
>>> >>
>>> >> --
>>> >> Guillaume
>>> >> _______________________________________________
>>> >> Ntop mailing list
>>> >> [email protected]
>>> >> http://listgateway.unipi.it/mailman/listinfo/ntop
>>> >
>>> > _______________________________________________
>>> > Ntop mailing list
>>> > [email protected]
>>> > http://listgateway.unipi.it/mailman/listinfo/ntop
>>>
>>>
>>>
>>> --
>>> Guillaume
>>> _______________________________________________
>>> Ntop mailing list
>>> [email protected]
>>> http://listgateway.unipi.it/mailman/listinfo/ntop
>>>
>>
>> _______________________________________________
>> Ntop mailing list
>> [email protected]
>> http://listgateway.unipi.it/mailman/listinfo/ntop
>>
>>
>>
>> _______________________________________________
>> Ntop mailing list
>> [email protected]
>> http://listgateway.unipi.it/mailman/listinfo/ntop
>>
>>
>
_______________________________________________
Ntop mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop

Reply via email to