Kevin,
I have added the logic to reconnect to Redis in case of disconnection. Hope 
this is enough to address future problems.

Regards Luca

On 31 Jul 2014, at 00:15, Kevin T. Neely <[email protected]> wrote:

> I think that's possible.  I have been doing a number of different things, 
> getting this home system up to date, installing Alienvault as the SIEM, and 
> configuring bro to also listen on the capture interface.
> 
> So, in short, I think I could have botched things up with the services while 
> mucking about with my new install.  I just logged into a few minutes ago and 
> things seem to be working.
> 
> K
> 
> 
> On Wed, Jul 30, 2014 at 12:01 AM, Luca Deri <[email protected]> wrote:
> Kevin,
> I believe that for some reason ntopng lost connection with redis (e.g. 
> timeout or you restarted redis in the meantime), and once you have restarted 
> ntopng the connection has been restored.
> 
> Is this a feasible event?
> 
> Luca
> 
> On 29 Jul 2014, at 20:44, Kevin Neely <[email protected]> wrote:
> 
>> All,
>> 
>> I believe I fixed the problem (accidentally) while trying to setup some 
>> access for Luca.  In doing so, I restarted the ntopng service (which I did 
>> not do after performing the redis-clie FLUSHDB commands) and can now login.
>> 
>> There's no immediate firewall on the system.  In any case, I never had a 
>> problem getting to 3000 via HTTP, I just could not authenticate and get to 
>> the Dashboard.
>> 
>> My installation was exceedingly simple:
>> ./configure
>> make
>> make install 
>> (as per the documentation :)
>> 
>> uname -a:
>> Linux piglet 3.13.0-32-generic #57-Ubuntu SMP Tue Jul 15 03:51:08 UTC 2014 
>> x86_64 x86_64 x86_64 GNU/Linux
>> 
>> I'm not sure why it stopped working after the first day.  I'm going to 
>> continue to monitor the system and see if it happens again.
>> 
>> thanks all!
>> K
>> 
>> 
>> 
>> On 07/29/2014 10:57 AM, Filippo Fontanelli wrote:
>>> Kevin
>>> 
>>> Please can you try to disable the iptable and/or the firewall? 
>>> 
>>> What were the steps that you do to install ntopng? Did you follow some 
>>> guidelines? 
>>> 
>>> Can you send me the output of the command uname -a ?
>>> 
>>> Thanks
>>> Filippo
>>> 
>>> On 29 Jul 2014, at 19:33, Kevin Neely <[email protected]> wrote:
>>> 
>>>> Unfortunately, that did not seem to do the trick:
>>>> 
>>>> ktneely@piglet:~⟫ redis-cli FLUSHDB
>>>> OK
>>>> ktneely@piglet:~⟫ redis-cli FLUSHALL
>>>> OK
>>>> 
>>>> 
>>>> 
>>>> Yet, when I go to port 3000, enter in admin:admin, it still sits at the 
>>>> login page, rather than logging me in.
>>>> 
>>>> K
>>>> 
>>>> 
>>>> On 07/26/2014 03:48 PM, Spider s wrote:
>>>>> Hello kevin.
>>>>> 
>>>>> use this:
>>>>> 
>>>>> sudo tcpdump -vv -XX -i eth0 port 3000
>>>>> 
>>>>> With -XX you can see the package .
>>>>> 
>>>>> 
>>>>> Yes kevin, we see redis take the password.check into the package with XX
>>>>> 
>>>>> If the password is on the package, i think you must flush database, and 
>>>>> use admin admin for login again
>>>>> 
>>>>> 
>>>>> Try this if the passwors exist.
>>>>> 
>>>>> 
>>>>> on Shell
>>>>> 
>>>>> redis-cli FLUSHDB
>>>>> redis-cli FLUSHALL
>>>>> 
>>>>> 
>>>>> Regards.
>>>>> 
>>>>> 
>>>>> On Sat, Jul 26, 2014 at 11:54 PM, Kevin Neely 
>>>>> <[email protected]> wrote:
>>>>> Yup, redis is receiving the password, according to the monitor command.
>>>>> 
>>>>> here are the results from monitoring redis:
>>>>> 
>>>>> 1406411141.705469 [0 127.0.0.1:42104] "GET" "user.admin.password"
>>>>> 1406411141.765239 [0 127.0.0.1:42104] "LPOP" "dns.toresolve"
>>>>> 1406411142.173654 [0 127.0.0.1:42104] "LPOP" "dns.toresolve"
>>>>> 
>>>>> 
>>>>> And here is the traffic dump.  ktneely-laptop is the client and piglet is 
>>>>> the system running ntopng
>>>>> 
>>>>> 
>>>>> ktneely@piglet:/tmp⟫ sudo tcpdump -vv -i eth0 port 3000        
>>>>> tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 
>>>>> 65535 byte
>>>>> s
>>>>> 14:48:35.216218 IP (tos 0x0, ttl 64, id 58957, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 64)
>>>>>     ktneely-laptop.local.57828 > piglet.local.3000: Flags [S], cksum 
>>>>> 0xf21e (cor
>>>>> rect), seq 812530630, win 65535, options [mss 1460,nop,wscale 
>>>>> 4,nop,nop,TS val 9
>>>>> 38422175 ecr 0,sackOK,eol], length 0
>>>>> 14:48:35.216266 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
>>>>> TCP (6), 
>>>>> length 60)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57828: Flags [S.], cksum 
>>>>> 0x83ae (in
>>>>> correct -> 0xdcd4), seq 3250767805, ack 812530631, win 28960, options 
>>>>> [mss 1460,
>>>>> sackOK,TS val 127083527 ecr 938422175,nop,wscale 7], length 0
>>>>> 14:48:35.395977 IP (tos 0x0, ttl 64, id 9524, offset 0, flags [DF], proto 
>>>>> TCP (6
>>>>> ), length 52)
>>>>>     ktneely-laptop.local.57828 > piglet.local.3000: Flags [.], cksum 
>>>>> 0x5ba4 (cor
>>>>> rect), seq 1, ack 1, win 8235, options [nop,nop,TS val 938422417 ecr 
>>>>> 127083527],
>>>>>  length 0
>>>>> 14:48:35.396252 IP (tos 0x0, ttl 64, id 861, offset 0, flags [DF], proto 
>>>>> TCP (6)
>>>>> , length 512)
>>>>>     ktneely-laptop.local.57828 > piglet.local.3000: Flags [P.], cksum 
>>>>> 0x02ce (co
>>>>> rrect), seq 1:461, ack 1, win 8235, options [nop,nop,TS val 938422417 ecr 
>>>>> 127083
>>>>> 527], length 460
>>>>> 14:48:35.396280 IP (tos 0x0, ttl 64, id 58250, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 52)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57828: Flags [.], cksum 
>>>>> 0x83a6 (inc
>>>>> orrect -> 0x78eb), seq 1, ack 461, win 235, options [nop,nop,TS val 
>>>>> 127083572 ec
>>>>> r 938422417], length 0
>>>>> 14:48:35.396457 IP (tos 0x0, ttl 64, id 58251, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 187)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57828: Flags [P.], cksum 
>>>>> 0x842d (in
>>>>> correct -> 0x2163), seq 1:136, ack 461, win 235, options [nop,nop,TS val 
>>>>> 1270835
>>>>> 72 ecr 938422417], length 135
>>>>> 14:48:35.396477 IP (tos 0x0, ttl 64, id 58252, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 52)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57828: Flags [F.], cksum 
>>>>> 0x83a6 (in
>>>>> correct -> 0x7863), seq 136, ack 461, win 235, options [nop,nop,TS val 
>>>>> 127083572
>>>>>  ecr 938422417], length 0
>>>>> 14:48:35.595580 IP (tos 0x0, ttl 64, id 46630, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 52)
>>>>>     ktneely-laptop.local.57828 > piglet.local.3000: Flags [.], cksum 
>>>>> 0x586a (cor
>>>>> rect), seq 461, ack 136, win 8227, options [nop,nop,TS val 938422611 ecr 
>>>>> 1270835
>>>>> 72], length 0
>>>>> 14:48:35.595602 IP (tos 0x0, ttl 64, id 15321, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 52)
>>>>>     ktneely-laptop.local.57828 > piglet.local.3000: Flags [.], cksum 
>>>>> 0x5869 (cor
>>>>> rect), seq 461, ack 137, win 8227, options [nop,nop,TS val 938422611 ecr 
>>>>> 1270835
>>>>> 72], length 0
>>>>> 14:48:35.596001 IP (tos 0x0, ttl 64, id 61499, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 52)
>>>>>     ktneely-laptop.local.57828 > piglet.local.3000: Flags [F.], cksum 
>>>>> 0x5868 (co
>>>>> rrect), seq 461, ack 137, win 8227, options [nop,nop,TS val 938422611 ecr 
>>>>> 127083
>>>>> 572], length 0
>>>>> 14:48:35.596026 IP (tos 0x0, ttl 64, id 52588, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 52)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57828: Flags [.], cksum 
>>>>> 0x776e (cor
>>>>> rect), seq 137, ack 462, win 235, options [nop,nop,TS val 127083622 ecr 
>>>>> 93842261
>>>>> 1], length 0
>>>>> 14:48:35.622653 IP (tos 0x0, ttl 64, id 28558, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 64)
>>>>>     ktneely-laptop.local.57829 > piglet.local.3000: Flags [S], cksum 
>>>>> 0xa25d (cor
>>>>> rect), seq 325625536, win 65535, options [mss 1460,nop,wscale 
>>>>> 4,nop,nop,TS val 9
>>>>> 38422635 ecr 0,sackOK,eol], length 0
>>>>> 14:48:35.622698 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
>>>>> TCP (6), 
>>>>> length 60)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57829: Flags [S.], cksum 
>>>>> 0x83ae (in
>>>>> correct -> 0x8e18), seq 23234227, ack 325625537, win 28960, options [mss 
>>>>> 1460,sa
>>>>> ckOK,TS val 127083629 ecr 938422635,nop,wscale 7], length 0
>>>>> 14:48:35.878410 IP (tos 0x0, ttl 64, id 30807, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 64)
>>>>>     ktneely-laptop.local.57830 > piglet.local.3000: Flags [S], cksum 
>>>>> 0x3db7 (cor
>>>>> rect), seq 1625341172, win 65535, options [mss 1460,nop,wscale 
>>>>> 4,nop,nop,TS val 
>>>>> 938422884 ecr 0,sackOK,eol], length 0
>>>>> 14:48:35.878438 IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], proto 
>>>>> TCP (6), 
>>>>> length 60)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57830: Flags [S.], cksum 
>>>>> 0x83ae (in
>>>>> correct -> 0xf9a5), seq 1031764514, ack 1625341173, win 28960, options 
>>>>> [mss 1460
>>>>> ,sackOK,TS val 127083693 ecr 938422884,nop,wscale 7], length 0
>>>>> 14:48:35.997077 IP (tos 0x0, ttl 64, id 22302, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 52)
>>>>>     ktneely-laptop.local.57829 > piglet.local.3000: Flags [.], cksum 
>>>>> 0x0c7f (cor
>>>>> rect), seq 1, ack 1, win 8235, options [nop,nop,TS val 938422982 ecr 
>>>>> 127083629],
>>>>>  length 0
>>>>> 14:48:35.997141 IP (tos 0x0, ttl 64, id 15666, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 409)
>>>>>     ktneely-laptop.local.57829 > piglet.local.3000: Flags [P.], cksum 
>>>>> 0x5a1b (co
>>>>> rrect), seq 1:358, ack 1, win 8235, options [nop,nop,TS val 938422982 ecr 
>>>>> 127083
>>>>> 629], length 357
>>>>> 14:48:35.997165 IP (tos 0x0, ttl 64, id 41599, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 52)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57829: Flags [.], cksum 
>>>>> 0x83a6 (inc
>>>>> orrect -> 0x29fc), seq 1, ack 358, win 235, options [nop,nop,TS val 
>>>>> 127083723 ec
>>>>> r 938422982], length 0
>>>>> 14:48:35.997506 IP (tos 0x0, ttl 64, id 41600, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 265)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57829: Flags [P.], cksum 
>>>>> 0x847b (in
>>>>> correct -> 0xd29c), seq 1:214, ack 358, win 235, options [nop,nop,TS val 
>>>>> 1270837
>>>>> 23 ecr 938422982], length 213
>>>>> 14:48:35.997599 IP (tos 0x0, ttl 64, id 41601, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 1500)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57829: Flags [.], cksum 
>>>>> 0x894e (inc
>>>>> orrect -> 0x496c), seq 214:1662, ack 358, win 235, options [nop,nop,TS 
>>>>> val 12708
>>>>> 3723 ecr 938422982], length 1448
>>>>> 14:48:35.997683 IP (tos 0x0, ttl 64, id 41602, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 1450)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57829: Flags [FP.], cksum 
>>>>> 0x891c (i
>>>>> ncorrect -> 0x4ba4), seq 1662:3060, ack 358, win 235, options [nop,nop,TS 
>>>>> val 12
>>>>> 7083723 ecr 938422982], length 1398
>>>>> 14:48:36.086741 IP (tos 0x0, ttl 64, id 42124, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 52)
>>>>>     ktneely-laptop.local.57830 > piglet.local.3000: Flags [.], cksum 
>>>>> 0x7892 (cor
>>>>> rect), seq 1, ack 1, win 8235, options [nop,nop,TS val 938423097 ecr 
>>>>> 127083693],
>>>>>  length 0
>>>>> 14:48:36.225476 IP (tos 0x0, ttl 64, id 41214, offset 0, flags [DF], 
>>>>> proto TCP (
>>>>> 6), length 52)
>>>>>     ktneely-laptop.local.57829 > piglet.local.3000: Flags [.], cksum 
>>>>> 0x08ee (cor
>>>>> rect), seq 358, ack 214, win 8222, options [nop,nop,TS val 938423244 ecr 
>>>>> 1270837
>>>>> 23], length 0
>>>>> 14:48:36.267069 IP (tos 0x0, ttl 64, id 4835, offset 0, flags [DF], proto 
>>>>> TCP (6
>>>>> ), length 52)
>>>>>     ktneely-laptop.local.57829 > piglet.local.3000: Flags [.], cksum 
>>>>> 0xfe1b (cor
>>>>> rect), seq 358, ack 3061, win 8104, options [nop,nop,TS val 938423285 ecr 
>>>>> 127083
>>>>> 723], length 0
>>>>> 14:48:36.267104 IP (tos 0x0, ttl 64, id 5568, offset 0, flags [DF], proto 
>>>>> TCP (6
>>>>> ), length 52)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57829: Flags [.], cksum 
>>>>> 0x1701 (correct), seq 3061, ack 359, win 235, options [nop,nop,TS val 
>>>>> 127084077 ecr 938424426], length 0
>>>>> 14:48:41.084582 IP (tos 0x0, ttl 64, id 38586, offset 0, flags [DF], 
>>>>> proto TCP (6), length 52)
>>>>>     ktneely-laptop.local.57830 > piglet.local.3000: Flags [F.], cksum 
>>>>> 0x651a (correct), seq 1, ack 1, win 8235, options [nop,nop,TS val 
>>>>> 938428080 ecr 127083693], length 0
>>>>> 14:48:41.084673 IP (tos 0x0, ttl 64, id 24258, offset 0, flags [DF], 
>>>>> proto TCP (6), length 120)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57830: Flags [P.], cksum 
>>>>> 0x83ea (incorrect -> 0x47a2), seq 1:69, ack 2, win 227, options 
>>>>> [nop,nop,TS val 127084995 ecr 938428080], length 68
>>>>> 14:48:41.084723 IP (tos 0x0, ttl 64, id 24259, offset 0, flags [DF], 
>>>>> proto TCP (6), length 100)
>>>>>     piglet.local.3000 > ktneely-laptop.local.57830: Flags [FP.], cksum 
>>>>> 0x83d6 (incorrect -> 0xbc73), seq 69:117, ack 2, win 227, options 
>>>>> [nop,nop,TS val 127084995 ecr 938428080], length 48
>>>>> 14:48:41.377999 IP (tos 0x0, ttl 64, id 20584, offset 0, flags [DF], 
>>>>> proto TCP (6), length 52)
>>>>>     ktneely-laptop.local.57830 > piglet.local.3000: Flags [.], cksum 
>>>>> 0x5ea3 (correct), seq 2, ack 69, win 8231, options [nop,nop,TS val 
>>>>> 938428369 ecr 127084995], length 0
>>>>> 14:48:41.378042 IP (tos 0x0, ttl 64, id 4240, offset 0, flags [DF], proto 
>>>>> TCP (6), length 52)
>>>>>     ktneely-laptop.local.57830 > piglet.local.3000: Flags [.], cksum 
>>>>> 0x5e75 (correct), seq 2, ack 118, win 8228, options [nop,nop,TS val 
>>>>> 938428369 ecr 127084995], length 0
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> On 07/24/2014 09:06 AM, Spider s wrote:
>>>>>> Hello again, more easy for debug.
>>>>>> 
>>>>>> Yo can use redis client and monitor, and check if password was send.
>>>>>> 
>>>>>> Do this on shell
>>>>>> :
>>>>>> redis-cli
>>>>>> 
>>>>>> monitor
>>>>>> 
>>>>>> 
>>>>>> Now go to the web and try login.
>>>>>> 
>>>>>> You must see any similar to this:
>>>>>> 
>>>>>> 
>>>>>> 1406217237.542554 "LPOP" "dns.toresolve"
>>>>>> 1406217237.642430 "LPOP" "dns.toresolve"
>>>>>> 1406217238.542795 "LPOP" "dns.toresolve"
>>>>>> 1406217238.642616 "LPOP" "dns.toresolve"
>>>>>> 1406217238.697366 "GET" "user.admin.password"
>>>>>> 
>>>>>> Now you can check if password was send to redis.
>>>>>> 
>>>>>> 
>>>>>> If not try reset complete database, if is corrupt you need flush.
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> (from Shell)
>>>>>> 
>>>>>> redis-cli FLUSHDB
>>>>>> redis-cli FLUSHALL
>>>>>> 
>>>>>> 
>>>>>> Remove redis-cli if you are into redis-cli.
>>>>>> 
>>>>>> With this you lost all users from DB.
>>>>>> Let me know when you solve it.
>>>>>> Regards.
>>>>>> 
>>>>>> 
>>>>>> On Thu, Jul 24, 2014 at 5:41 PM, Spider s <[email protected]> 
>>>>>> wrote:
>>>>>> Hello, kevin  try this:
>>>>>> 
>>>>>> 
>>>>>> tcpdump -i venet0:0 -vv -XX port 3000
>>>>>> 
>>>>>> Port 3000 if use default port.
>>>>>> 
>>>>>> 
>>>>>> With this you can see all packets send to port 3000, and check if we 
>>>>>> send the password, or is a redis error.
>>>>>> 
>>>>>> 
>>>>>> xx.xxx.xxx.xxx > vps.com.3000: Flags [P.], cksum 0xc8a1 (correct), seq 
>>>>>> 1:449, ack 1, win 4380, length 448
>>>>>>         0x0000:  0000 ffff 0000 0000 0000 0000 0000 0800  
>>>>>> ................
>>>>>>         0x0010:  4500 01e8 4808 4000 6e06 87dd 5981 3cec  
>>>>>> [email protected].<.
>>>>>>         0x0020:  17ef 8cce 0a5e 0bb8 79df bce4 a162 b986  
>>>>>> .....^..y....b..
>>>>>>         0x0030:  5018 111c c8a1 0000 504f 5354 202f 6175  
>>>>>> P.......POST./au
>>>>>>         0x0040:  7468 6f72 697a 652e 6874 6d6c 2048 5454  
>>>>>> thorize.html.HTT
>>>>>>         0x0050:  502f 312e 310d 0a41 6363 6570 743a 2074  
>>>>>> P/1.1..Accept:.t
>>>>>>         0x0060:  6578 742f 6874 6d6c 2c20 6170 706c 6963  
>>>>>> ext/html,.applic
>>>>>>         0x0070:  6174 696f 6e2f 7868 746d 6c2b 786d 6c2c  
>>>>>> ation/xhtml+xml,
>>>>>>         0x0080:  202a 2f2a 0d0a 5265 6665 7265 723a 2068  
>>>>>> .*/*..Referer:.h
>>>>>>         0x0090:  7474 703a 2f2f 3233 2e32 3339 2e31 3430  
>>>>>> ttp://23.239.140
>>>>>>         0x00a0:  2e32 3036 3a33 3030 302f 6c6f 6769 6e2e  
>>>>>> .206:3000/login.
>>>>>>         0x00b0:  6874 6d6c 0d0a 4163 6365 7074 2d4c 616e  
>>>>>> html..Accept-Lan
>>>>>>         0x00c0:  6775 6167 653a 2065 732d 4553 0d0a 5573  
>>>>>> guage:.es-ES..Us
>>>>>>         0x00d0:  6572 2d41 6765 6e74 3a20 4d6f 7a69 6c6c  
>>>>>> er-Agent:.Mozill
>>>>>>         0x00e0:  612f 352e 3020 2857 696e 646f 7773 204e  
>>>>>> a/5.0.(Windows.N
>>>>>>         0x00f0:  5420 362e 313b 2057 4f57 3634 3b20 5472  
>>>>>> T.6.1;.WOW64;.Tr
>>>>>>         0x0100:  6964 656e 742f 372e 303b 2072 763a 3131  
>>>>>> ident/7.0;.rv:11
>>>>>>         0x0110:  2e30 2920 6c69 6b65 2047 6563 6b6f 0d0a  
>>>>>> .0).like.Gecko..
>>>>>>         0x0120:  436f 6e74 656e 742d 5479 7065 3a20 6170  
>>>>>> Content-Type:.ap
>>>>>>         0x0130:  706c 6963 6174 696f 6e2f 782d 7777 772d  
>>>>>> plication/x-www-
>>>>>>         0x0140:  666f 726d 2d75 726c 656e 636f 6465 640d  
>>>>>> form-urlencoded.
>>>>>>         0x0150:  0a41 6363 6570 742d 456e 636f 6469 6e67  
>>>>>> .Accept-Encoding
>>>>>>         0x0160:  3a20 677a 6970 2c20 6465 666c 6174 650d  
>>>>>> :.gzip,.deflate.
>>>>>>         0x0170:  0a48 6f73 743a 2032 332e 3233 392e 3134  
>>>>>> .Host:.23.239.14
>>>>>>         0x0180:  302e 3230 363a 3330 3030 0d0a 436f 6e74  
>>>>>> 0.206:3000..Cont
>>>>>>         0x0190:  656e 742d 4c65 6e67 7468 3a20 3239 0d0a  
>>>>>> ent-Length:.29..
>>>>>>         0x01a0:  444e 543a 2031 0d0a 436f 6e6e 6563 7469  
>>>>>> DNT:.1..Connecti
>>>>>>         0x01b0:  6f6e 3a20 4b65 6570 2d41 6c69 7665 0d0a  
>>>>>> on:.Keep-Alive..
>>>>>>         0x01c0:  4361 6368 652d 436f 6e74 726f 6c3a 206e  
>>>>>> Cache-Control:.n
>>>>>>         0x01d0:  6f2d 6361 6368 650d 0a0d 0a75 7365 723d  
>>>>>> o-cache....user=
>>>>>>         0x01e0:  6164 6d69 6e26 7061 7373 776f 7264 3d70  
>>>>>> admin&password=p
>>>>>>         0x01f0:  6173 7361 646d 696e                      assadmin
>>>>>> 
>>>>>> 
>>>>>> In this example you can see at end the (user and pass) is send.
>>>>>> 
>>>>>> With tcpdump you can see a lot of data, but try search this. and you can 
>>>>>> check the password was sent (i use password passadmin for the example)
>>>>>> 
>>>>>> Good luck, regards.
>>>>>> 
>>>>>> 
>>>>>> On Thu, Jul 24, 2014 at 11:24 AM, Filippo Fontanelli 
>>>>>> <[email protected]> wrote:
>>>>>> Kevin,
>>>>>> 
>>>>>> could you please give me the access to the system to check what’s going 
>>>>>> on with the issue you have.
>>>>>> 
>>>>>> Regards,
>>>>>> Filippo
>>>>>> 
>>>>>> 
>>>>>> On 24 Jul 2014, at 04:58, Kevin T. Neely <[email protected]> 
>>>>>> wrote:
>>>>>> 
>>>>>>> I am also running the latest stable.  I have tried the password reset 
>>>>>>> option as mentioned by Spider, to no avail.  The system still ignores 
>>>>>>> an input password and remains at the web login screen.
>>>>>>> 
>>>>>>> thanks for any help!
>>>>>>> 
>>>>>>> 
>>>>>>> On Wed, Jul 23, 2014 at 12:41 AM, Guillaume CHARDIN 
>>>>>>> <[email protected]> wrote:
>>>>>>> Hi Filippo,
>>>>>>> 
>>>>>>> > Do you use SVN code?
>>>>>>> I do not use SVN code, i use the last stable : ntopng-1.1_6932.
>>>>>>> 
>>>>>>> > Do you have an old installation (make install) of ntopng in your 
>>>>>>> > system?
>>>>>>> I do not have old install files, but still have source and compiled
>>>>>>> bin in my system in /$user/ntopng-1.1_6932
>>>>>>> I always start ntopng with full path.
>>>>>>> 
>>>>>>> I can give you access to remote server. I'll contact you in private for 
>>>>>>> details.
>>>>>>> 
>>>>>>> thanks for your help.
>>>>>>> 
>>>>>>> 2014-07-23 9:31 GMT+02:00 Filippo Fontanelli <[email protected]>:
>>>>>>> > Guillaume
>>>>>>> > could you please give me the access to the system to check what’s 
>>>>>>> > going on with the issue you have.
>>>>>>> >
>>>>>>> 
>>>>>>> >
>>>>>>> 
>>>>>>> >
>>>>>>> > Filippo
>>>>>>> >
>>>>>>> > On 23 Jul 2014, at 09:27, Guillaume CHARDIN 
>>>>>>> > <[email protected]> wrote:
>>>>>>> >
>>>>>>> >> 2014-07-22 17:41 GMT+02:00 Spider s <[email protected]>:
>>>>>>> >>> redis-cli SET user.admin.password b281ec101ca19823d11b1c54a35e1412
>>>>>>> >>> The pass is md5, now is "elpassquesea"
>>>>>>> >> I tried this but nothing change.
>>>>>>> >>
>>>>>>> >>
>>>>>>> >> After waiting a looooong time, username and password bow appears but
>>>>>>> >> with no CSS. I entered my admin account and right after it redirect 
>>>>>>> >> to
>>>>>>> >> http://192.168.10.8:3000/authorize.html and a 404 error :
>>>>>>> >> Error 404: Not Found File not found
>>>>>>> >> on httpdocs, autorize.html does not exist but maybe it's handled by
>>>>>>> >> some urlrewrite or something like that.
>>>>>>> >>
>>>>>>> >> console Logs :
>>>>>>> >> [...] Purged 2/219 idle hosts
>>>>>>> >> 23/Jul/2014 09:19:15 [HTTPserver.cpp:257] [HTTP] /
>>>>>>> >> 23/Jul/2014 09:19:15 [HTTPserver.cpp:257] [HTTP]
>>>>>>> >> /bootstrap/css/bootstrap.min.css
>>>>>>> >> 23/Jul/2014 09:19:15 [HTTPserver.cpp:257] [HTTP] /js/d3.v2.min.js
>>>>>>> >> 23/Jul/2014 09:19:15 [HTTPserver.cpp:257] [HTTP] /js/rickshaw.min.js
>>>>>>> >> 23/Jul/2014 09:19:16 [NetworkInterface.cpp:390] Purged 6/324 idle 
>>>>>>> >> flows
>>>>>>> >> 23/Jul/2014 09:19:16 [HTTPserver.cpp:257] [HTTP] /js/jquery.min.js
>>>>>>> >> 23/Jul/2014 09:19:16 [HTTPserver.cpp:257] [HTTP] /css/flags.css
>>>>>>> >> 23/Jul/2014 09:19:17 [NetworkInterface.cpp:390] Purged 6/353 idle 
>>>>>>> >> flows
>>>>>>> >> 23/Jul/2014 09:19:17 [NetworkInterface.cpp:394] Purged 1/223 idle 
>>>>>>> >> hosts
>>>>>>> >> 23/Jul/2014 09:19:18 [NetworkInterface.cpp:390] Purged 7/356 idle 
>>>>>>> >> flows
>>>>>>> >> [....]
>>>>>>> >>
>>>>>>> >> --
>>>>>>> >> Guillaume
>>>>>>> >> _______________________________________________
>>>>>>> >> Ntop mailing list
>>>>>>> >> [email protected]
>>>>>>> >> http://listgateway.unipi.it/mailman/listinfo/ntop
>>>>>>> >
>>>>>>> > _______________________________________________
>>>>>>> > Ntop mailing list
>>>>>>> > [email protected]
>>>>>>> > http://listgateway.unipi.it/mailman/listinfo/ntop
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> --
>>>>>>> Guillaume
>>>>>>> _______________________________________________
>>>>>>> Ntop mailing list
>>>>>>> [email protected]
>>>>>>> http://listgateway.unipi.it/mailman/listinfo/ntop
>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> Ntop mailing list
>>>>>>> [email protected]
>>>>>>> http://listgateway.unipi.it/mailman/listinfo/ntop
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> Ntop mailing list
>>>>>> [email protected]
>>>>>> http://listgateway.unipi.it/mailman/listinfo/ntop
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> 
>>>>>> _______________________________________________
>>>>>> Ntop mailing list
>>>>>> [email protected]
>>>>>> http://listgateway.unipi.it/mailman/listinfo/ntop
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> Ntop mailing list
>>>>> [email protected]
>>>>> http://listgateway.unipi.it/mailman/listinfo/ntop
>>>>> 
>>>>> 
>>>>> 
>>>>> 
>>>>> _______________________________________________
>>>>> Ntop mailing list
>>>>> [email protected]
>>>>> http://listgateway.unipi.it/mailman/listinfo/ntop
>>>> 
>>>> _______________________________________________
>>>> Ntop mailing list
>>>> [email protected]
>>>> http://listgateway.unipi.it/mailman/listinfo/ntop
>>> 
>>> 
>>> 
>>> _______________________________________________
>>> Ntop mailing list
>>> [email protected]
>>> http://listgateway.unipi.it/mailman/listinfo/ntop
>> 
>> _______________________________________________
>> Ntop mailing list
>> [email protected]
>> http://listgateway.unipi.it/mailman/listinfo/ntop
> 
> 
> _______________________________________________
> Ntop mailing list
> [email protected]
> http://listgateway.unipi.it/mailman/listinfo/ntop
> 
> _______________________________________________
> Ntop mailing list
> [email protected]
> http://listgateway.unipi.it/mailman/listinfo/ntop

_______________________________________________
Ntop mailing list
[email protected]
http://listgateway.unipi.it/mailman/listinfo/ntop

Reply via email to