Thursday, 2013-12-05

*** nowen (~nowen@99-174-92-191.lightspeed.tukrga.sbcglobal.net) has joined #wikid13:50
*** joevano (~joevano@bzflag/developer/JoeVano) has joined #wikid15:29
*** Troy__ (329b9bb1@gateway/web/freenode/ip.50.155.155.177) has joined #wikid15:31
Troy__Hi Nick.. good morning15:34
nowengood mornign15:34
Troy__quick question about replication15:34
nowenok15:34
Troy__we need to reboot the slave server in order to add some new volume space15:34
nowenok15:34
Troy__will master - slave replication be broken if the wikid slave service goes down for a few minutes while rebooting?15:35
nowenyou may loose data in the interim.15:35
Troy__in other words, would it be better to take down the primary and slave, restart slave, sync and start primary again?15:36
nowenif maintaining the data is key, then yes.15:36
Troy__we are not concerned about losing the few transactions during the few minutes of downtime15:36
Troy__ok15:36
nowenI can run some tests here15:36
Troy__just more concerned we would break the replication once the slave is back online15:37
Troy__i guess we could just check the timestamps after they are back15:37
nowenhow is the delay b/t the two servers?15:37
Troy__haven't checked it recently.. i will check now and let you know15:40
nowenTroy__: I just rebooted my secondary test server.  it killed replication and it didn't come back until I restarted the primary.15:49
nowenonce I did that, the two dbs matched b/c the start command syncs15:50
nowenso, you will most likely have less downtime if you do it that way15:50
Troy__ok .. good to know.. so I wouldn't have to run the wikidctl sync to sync the db?15:54
Troy__btw, the timestamp different is about 3-4 seconds right now15:54
Troy__i'm thinking I could just leave the slave down.. stop the primary. run the db sync while both are down.. start slave, then start the primary15:55
Troy__sorry.. i just read your statement again15:57
Troy__so the start does sync the db again15:57
Troy__that was not my understanding.. i thought you had to do the sync while they are offline then start slave, master before they would sync15:58
*** AccentureDan has quit (Quit: Page closed)15:58
*** AccentureDan (0cfa9442@gateway/web/freenode/ip.12.250.148.66) has joined #wikid15:58
AccentureDanhey Nick15:58
AccentureDansorry been working on environment buildouts15:58
AccentureDani did not see your comments15:58
AccentureDando you have those handy by chance?15:58
nowenyeah16:04
nowenI need some clarification16:04
nowendo you want the WiKID server to listen on a different port?16:05
AccentureDansurely16:05
AccentureDanhmmmm16:05
nowenor the tokens to send to a differnt port?16:05
AccentureDanthat is part of it16:05
nowenbecause we can't do the latter16:05
AccentureDanso ideally this is what we would want16:05
AccentureDanwe want to have the IP address that is listening for one-time password requests to be NATd to an external facing IP address, but have that IP address listening on a different port instead of 44316:06
AccentureDancan that be done?16:06
AccentureDanlike sort of a "proxy"16:06
AccentureDanor maybe have a proxy server service requests, then forward them on to port 44316:06
AccentureDanso have port 60000 listening on the internet for requests, but forward them to port 443 on the WiKID server internally16:07
AccentureDanmanagement doesnt feel comfortable having port 443 exposed to the outside world16:07
nowenso, OTP requests come in to external IP.  They hit a proxy server and are switched from port 80 (not 443) to 8080, say, and sent to the WiKID server?16:07
AccentureDansurely there we go16:07
nowenThis is easily doable. and similar to Troy__'s set up, I believe16:08
AccentureDanif we cant change the port WiKID listens on, maybe we can proxy it16:08
AccentureDanawesome, do you have any white papers on how to take care of this16:08
nowenCan you setup an apache server to do the proxying? or what?16:08
AccentureDanlast hurdle, just have to do this and test it, then one last design meeting, then implementation (licensing is in the works currently)16:08
nowenI don't have a doc on it. I worry it would create more problems for many people ;-)16:10
nowenwe use a rewrite rule on apache for our demo server:    RewriteRule ^/wikid/(.*) http://localhost:8090/wikid/$1 [P]16:11
nowenthe in /opt/WiKID/tomcat/conf/server.xml, we change port 80 to 809016:12
nowen <Connector port="8090" protocol="HTTP/1.1"16:12
nowen               connectionTimeout="20000"16:12
nowen               redirectPort="443" />16:12
nowennote that all token requests will go to the URL ../wikid/16:13
AccentureDansorry im back here16:18
AccentureDanahhhh okay16:18
AccentureDanlemme go ahead adn try this here16:18
nowenwe use a rewrite rule, but you might have to use a proxy rule16:19
AccentureDanyeaaaaaa assuming there are walkthroughs about this on google? hahahahaha16:19
AccentureDannot really an apache guy, more IIS16:19
AccentureDangonna have to look this up16:19
nowenme too, really16:20
nowenhttp://stackoverflow.com/questions/1162375/apache-port-proxy seems like a good start16:21
AccentureDangonna be trial and error, but if i can get it to do that in this test environment i should be able to match it16:21
AccentureDangonna check that one out16:22
AccentureDando we just utilize apache from linux or one that comes with WiKID?16:22
nowenfrom linux, esp since there isn't one with wikid,16:27
nowenyou're putting this on a separate box, right?16:27
AccentureDanwell the way it would work, like the way we have things set up now16:28
AccentureDanwe have a Windows routing and remote access server servicing requests for remote access, with NPS of course...that box has an external facing network adapter and internal facing network adapter16:29
nowenideally, I think what you would do is have the proxy in the DMZ and WiKID on the inside16:29
AccentureDanwith an internal IP NATd to an external itnernet address16:29
nowenoh - can it do the proxy?16:29
AccentureDanyup that is the plan16:29
nowenthen no need for apache?16:29
AccentureDanthe VPN box in the DMZ will listen on a certain port, lets say 6000016:29
AccentureDanand forward all requests to the WiKID server internally, which wont be in the DMZ16:29
nowenlistening on 60000 will get boring because the token requests will come in on 8016:30
AccentureDanall i want to do is take this address on the windows box that is listening on port 60000 and forward all those requests on to the WiKID server16:30
AccentureDanwell any port, that is just arbitrary16:30
nowenagain, we can't rewrite the port that all our tokens use16:30
AccentureDancan't you set it up in the token to forward all token requests to a proxy?16:30
AccentureDanso if i put the external address of the VPN box with port 60000 in the token client, wouldnt it send all requests to that port listed?16:31
AccentureDansorry if im not making sense haha16:31
nowenyeah, you lost me16:31
nowentry it and see16:31
nowenthe PC tokens support proxies.  smart phone tokens do not16:32
AccentureDanLOL16:32
AccentureDanahhh okay, well not a big deal most will only be using PC token clients16:32
AccentureDanso lets throw out the smart phone idea for now16:32
nowenalso, many ISPs will not allow traffic on arbitrary ports16:32
AccentureDanwe can force users to use just the PC token client16:32
AccentureDanhmmmmmmm16:32
nowenbad idea, I think16:32
AccentureDanokay lets walk through this16:32
AccentureDankeeping everything stock16:32
AccentureDani want my wikid server internal, not on the DMZ16:33
AccentureDani dont want it facing the internet on port 8016:33
AccentureDanhow do clients request tokens?16:33
nowentokens >> external IP port 80 >> VPN >> Proxy server >> port 8080 internal IP  >> WiKID16:34
nowenWiKID >> port 8080 >> proxy server >> port 80 >> VPN >> token client16:34
AccentureDanokay im lost LOL16:35
AccentureDansorry about this16:35
AccentureDantrying to match it to my diagram16:35
nowennp16:35
AccentureDanso the token client on someone's PC requests tokens on port 8016:35
nowencorrect16:36
AccentureDanthey are requesting it from the WiKID server, correct?16:36
nowenyes16:36
AccentureDanso the WiKID server has to be facing the Internet, correct?16:36
nowencorrect, or have a proxy that will pass it the data16:37
AccentureDanokay so lets go with the proxy for now16:37
AccentureDanwhere would i insert the proxy?16:37
AccentureDanmeaning, where would this guy live and how would he take in the requests?16:37
nowenbetween the external connection and WiKID16:37
AccentureDanso have the proxy sitting in the dmz, then forwarding requests on to the internal wikid server?16:38
nowenyes16:38
AccentureDanokay awesome this is what i want16:38
AccentureDansure we have been on the same page im just messing up my words lmao16:38
AccentureDanso the domain identifier for WiKID, the one token clients use16:38
nowenit would take the port 80 requests for the external IP and convert them to 8080 requests on the internal IP16:38
nowenthe domain id is based on the external IP16:38
AccentureDanthat would be set up as the proxy address right?16:38
AccentureDani see16:38
nowenthe proxy server doesn't know anything about the domain id,  it just passes the traffic from one ip:port to another ip:port16:39
nowenkind of like how the wikid server doesn't really have the external IP, it just responds16:40
nowenso,  you could have the VPN take any request for the external ip on port 80 and pass it to your Windows routing and remote access server, that server would send it to the WiKID server changing the port16:44
AccentureDansorry back16:45
AccentureDanokay i smell what your steppin in,. almost there16:45
AccentureDanso with my VPN box, listening on an external internet IP16:45
AccentureDanwell first16:45
AccentureDanthe WiKID server is still going to service requests on 80, got that16:47
AccentureDanthe server code that i set up, that is where my question lies16:47
nowenhmm16:49
AccentureDanmore of a design question16:49
AccentureDanhow do i put this16:49
AccentureDani currently have my test WiKID server with two network adapters...one externally facing (the internet theoretically) and one facing internal16:49
AccentureDanso like the WiKID server would be servicing requests from the Internet16:50
AccentureDannow, we will be using proxy16:50
AccentureDanwill I still need two network addresses (and adapters)?16:50
nowennot really16:50
AccentureDanfor the WiKID server that is16:50
nowenwhen the token requests an OTP, it looks like:  http://888.888.888.888/wikid/servlet/com.wikidsystems.server.WikidCode3AES?S=888888888888&D=5871062969131179567&withTTL=1&CT=116:51
AccentureDanweird address16:51
nowensee - it has an IP address (sort of) the 888.888.888.88816:51
nowenand the domain ID16:51
nowenit is a dns-based domain16:51
nowenso if the IP address gets converted the WiKID server doesn't care16:52
AccentureDancome to L.A. and help me build this :-P16:52
nowenthe request is http://888888888888.wikidsystems.net/wikid/servlet/com.wikidsystems.server.WikidCode3AES?S=888888888888&D=5871062969131179567&withTTL=1&CT=116:52
AccentureDani see i see16:52
nowenI don't like flying and I don't like touching other peoples servers ;-)16:52
AccentureDanLMAO16:53
AccentureDanthis has been a long process but almost done16:53
AccentureDanjust one last design. almost there man16:53
AccentureDanlet me know if this is right or wrong16:53
AccentureDanmy VPN box will also be my proxy for the WiKID requests, which will forward requests from a different listening port to port 80 internally to my WiKID server16:54
nowenyeah, we are still not there16:54
AccentureDanyup16:54
AccentureDanmy main question is, if i have one IP address for my WiKID server (the server code), lets say 10.0.0.116:54
nowen"my VPN box will also be my proxy for the WiKID requests, which will forward requests from port 80 internally to my WiKID server (on whatever port you want)16:55
AccentureDanokay, question16:55
AccentureDanwhich port is the proxy listening on?16:55
nowen8016:55
AccentureDanokay so 80 would still need to be exposed to the internet16:56
nowenyes16:56
AccentureDani know they wont like that...help me spin doctor this clean16:56
AccentureDanso even thoug hit is listening on port 80, the requests will be sent on a different port to my wikid server16:56
nowenif you want that16:56
AccentureDanand we cant set the proxy to be listening on a different port, or it just doesnt matter?16:57
nowenthere's no security added by having it on a different port and some maintenance hassle16:57
nowena port is a port16:57
nowenCan you set your VPN to reject every request that doesn't go to /wikid ?16:58
AccentureDancompletely agree...they were talking about having it listening on a different port because they dont want people port scanning and finding something common open16:58
AccentureDanthat was their reasoning16:58
AccentureDangood question, not entirely sure16:58
AccentureDanfirst time working with RRAS16:58
AccentureDanim sure it can be done16:58
AccentureDani can harden the server via Firewall16:58
AccentureDanright now our box can only receive L2TP over IPSec requests16:58
AccentureDan80 isnt open16:58
AccentureDanit's hardened even in the DMZ16:59
AccentureDanthey are just concerned about opening up a common port16:59
nowensure16:59
AccentureDani know this may be asking alot of you, but would you be open to a conference call discussion?  I know it may not be your thing16:59
AccentureDanbut just to discuss things with my network engineers and supervisor?17:00
nowenmaybe17:00
AccentureDanif we have ot listen on port 80, it would sound better coming from someone like you lmao17:00
AccentureDanim sure they have questions and you are knowledgeable, if you want to answer17:01
AccentureDanLOL17:01
AccentureDanif not if you know someone else that is perfectly fine17:01
nowenbut first you need to tell me what your firewall can do17:01
AccentureDani just know if i go back and say 80 has to be opened they will want to know why and how we can protect things...not sure i can answer it from the WiKID perspective17:01
AccentureDanwell our design is like this17:01
nowenbecause it is the only port guaranteed to work17:02
AccentureDanwe have our DMZ, a firewall in front of it, then a secure internet gateway managed by Verizon17:02
AccentureDanbrb man17:02
AccentureDanone sec17:02
AccentureDanokay im back17:04
AccentureDani getcha17:04
AccentureDanits not a problem, we just need to make sure the others understand17:04
AccentureDanit's a network with client data and all that jazz, client data protection is high on their list, i know why they are concnerned17:05
AccentureDanim sure the network engineers would be better able to answer port questions as well...if you have any specifics needed17:06
AccentureDanhey gonna switch to my laptop. gonna drop off this IRC real quick17:07
nowenok17:07
AccentureDannvm17:07
AccentureDanessentially the proxy is a bit reversed...we are taking traffic on port 80 and switching it to another port that WiKID is listening on...but we can't do the opposite and have the proxy listening on a different port, and send to a port like 80 on the WiKID server17:09
nowencorrect17:10
AccentureDanso question17:10
AccentureDani know a bunch of people have this stuff set up17:10
AccentureDando you find it a security threat to have 80 exposed to the internet17:10
nowenno. there is no security from obscurity.17:11
AccentureDani just want to relate what we are trying to do versus what others have17:11
AccentureDani see17:11
nowenif you move ssh from port 22 to something else, what you get is fewer logs to review17:11
nowennmap will scan any port17:11
AccentureDantrue, no matter what port if it is open people can find it17:11
nowenso, have 80 open, but appear to not be listening unless the request goes to /wikid17:12
AccentureDanhow would i go about doing that?17:13
AccentureDanso only listen for requests going to that17:13
nowendepends on your vpn or proxy17:13
AccentureDani guess i need ot understand more about what the client is asking when it sends a request over the Internet17:14
AccentureDani know it is asking for the server code17:14
nowenyou can run the PC token in debug mode to see it all17:14
AccentureDanand the server code has to be facing the Internet since you can't request OTPs from an internal address17:14
nowenit has to be routable17:14
AccentureDanwell it would be NATd no matter what17:15
AccentureDanthey just want the WiKID server internal and servicing only internal requests17:15
nowenthus the proxy17:16
nowendefense in depth17:16
AccentureDanokay lets do this17:16
nowenthe VPN will be serving info to the outside right?17:16
AccentureDanso on the VPN box sits RRAS listening JUST for L2TP over IPSec connections17:16
AccentureDanin order to service 80 requests there needs to be IIS17:16
AccentureDanlet me check this out17:16
AccentureDanokay good IIS is up17:17
AccentureDanso when a user requests a OTP from the token client, they are going to my external facing WiKID server IP address17:17
AccentureDanthat would need to change in order to redirect the request to the VPN box, correct?17:18
nowenwhat would need to change?17:18
AccentureDanif we are going to use the VPN box as the proxy, wouldnt the address the token client is requesting an OTP from have to be the VPN server's IP address?17:19
nowendoes the VPN not currently control the WiKID's IP?17:19
AccentureDani know im thinking about this wrong17:19
nowendo you actually have it setup externally now?17:20
AccentureDanthe VPN box is just listening for requests for remote access...so once the user requests the one-time password and gets it, it would then accept the token and username17:20
AccentureDanwell in the test environment, it is internal completed but i have it set up mimicking external setup17:20
AccentureDanwould it be easier if i sent you a diagram with all this stuff? hahahaha17:20
AccentureDani know im asking you to draw this in your head17:21
AccentureDannot fair to you17:21
nowenyou can if you like17:21
nowenbut let me ask you this:17:21
AccentureDanif it would hlep you i could17:21
nowendid you set up an external IP that does not go through your VPN?17:21
AccentureDanyes, the WiKID server is set up to listen on the Internet with it's own IP, and has another Internal address to communicate with the domain controller via NPS17:22
AccentureDanthat external IP is theoretically listenining on the "internet" for one-time passcode requests17:22
AccentureDanshould it be different?17:22
nowenI'm just surprised that you can do that if you're companies worried about having port 80 open17:22
AccentureDanwell it was for test purposes17:23
AccentureDanit was how it worked originally17:23
AccentureDani can change that17:23
AccentureDanagain just trying to get the design down17:23
nowenwell, so, back to the question:  yes, you would change it to an IP that the external VPN controlled17:23
AccentureDanfantastic, so this answer a big question17:24
nowenbonus: if the network admin says that port 80 shouldn't be open, tell him his vpn sucks17:24
AccentureDanso the wikid server would have one internal IP address to service those internal requests to the domain controller17:24
nowendefine 'domain controller'17:25
AccentureDanand then just assign the address "external" of the WiKID server to an address that can talk to the VPN box17:25
AccentureDannvm woops17:26
AccentureDanit doesnt use that to talk to the DC17:26
AccentureDanit uses that to talk to the VPN box17:26
AccentureDanwoops17:26
AccentureDanthat is used to receive the OTP from the VPN box17:26
AccentureDanso basically just get rid of the external adapter on the wikid server17:27
nowensure, or you can give it an internal ip17:27
AccentureDanthe "internal" adapter or whatever you want to call it is already able to communicate with the VPN box17:27
AccentureDanso here is the question17:28
AccentureDanThe VPN box has one IP address set to listen just for VPN connection requests...so that address would need port 80 open in order to service the requests of the wikid server17:29
nowensounds right17:31
AccentureDanso the token client on the PC would request tokens from port 80 on that external IP address of the VPN box17:31
AccentureDanand get sent to the WiKID server for processing17:32
nowenyes17:32
AccentureDanawesome got this now17:32
AccentureDanso the wikid server needs one adapter, an internal IP address that is on the same subnet as the NATd IP of the VPN box17:32
nowenat least17:33
AccentureDangotcha17:33
AccentureDanso to the wikid server17:33
AccentureDanthat guy is going to service requests on an Internal IP address, let's just say on port 80 for now to get it working17:33
AccentureDanso that port will service one-time password requests17:34
AccentureDanthe same IP address can be used to communicate with VPN box via NPS, or we could create another adapter to service those requests...doesnt make much sense though17:34
nowenjust a question of how you want to set up your network17:35
AccentureDanyup17:35
AccentureDanwe could create a network for WiKID on it's own to complete segregate it but that is a network engineer decision17:35
AccentureDansorry thinking out loud17:38
AccentureDanthis is a better design, consolidate a little17:38
nowensure, keep it simple17:38
AccentureDanlet me make some changes and see how this works17:38
AccentureDanbrb brotha17:38
nowenok17:38
AccentureDanso if i set the IP address of the WiKID server to an internal address, and it is on the same subnet as the IP address of the VPN server, how would users communicate with it outside the network?17:43
nowenthe VPN will do NAT, correct?17:43
AccentureDanor would the IP address of the server code have to be the same as the IP address of the external VPN?17:43
AccentureDanyup17:44
AccentureDanwell, the address of the VPN is NATd17:44
nowenthe domain ID is based on the external IP17:44
AccentureDanwe dont have NAT set up for the VPN to do, but we can17:44
AccentureDanokay thought so17:44
AccentureDanlet me do that17:44
AccentureDanokay got it all set up17:49
AccentureDanso when i go to register for the domain on my token client17:49
nowen?17:52
AccentureDansorry17:52
AccentureDanback to that, when i try to register on the token client, and i enter the external IP address of the VPN box, it cant find the domain configuration17:53
AccentureDanso i assume I need to forward requests on port 80 to the WiKID server17:53
AccentureDancorrect?17:53
nowenyes17:53
AccentureDanokay is there a specific address it is listening on or just the ip address?17:54
AccentureDansince 80 is already listening17:54
nowendid you create a new domain for the new IP address?17:54
AccentureDanyup17:55
AccentureDanit is the external IP address of the VPN box17:55
nowenrun 'tcpdump port 80' on the WiKID server and try to register the domain17:55
AccentureDangotcha one sec17:55
AccentureDanokay think i know what it is17:58
AccentureDani have two network adapters on my jump box17:58
AccentureDanone is internal and one is external17:58
AccentureDani set it up to the wrong address17:58
AccentureDanone sec17:58
nowenAccentureDan: I may need to go run an errand.  what is your status?18:30
nowenok - definitely headed out.18:46
nowenAccentureDan: I should be back around 3:45 EST.18:47
*** nowen has quit (Quit: Leaving.)18:47
*** lowtax (~lowtax@gateway/tor-sasl/lowtax) has joined #wikid18:54
lowtaxhello, getting a blank page on intermediate ca18:54
lowtaxthis software seems extremely bad19:01
*** lowtax has parted #wikid ("Leaving")19:15
*** happy_nodes (~happy_nod@5353BF9D.cm-6-4c.dynamic.ziggo.nl) has joined #wikid19:27
happy_nodesI am trying to create Intermmediate CA. But It is showing blank page19:40
happy_nodesI installed it using VM, did setup and started the service19:41
*** Troy__ has quit (Ping timeout: 250 seconds)20:09
*** nowen (~nowen@99-174-92-191.lightspeed.tukrga.sbcglobal.net) has joined #wikid20:41
nowenback20:42
nowenhappy_nodes: what page is showing you the blank screen?20:43
nowenlast cert CSR submitted was issued at 2:07.20:45
nowenhappy_nodes: it works for me20:56
happy_nodesConfiguration -> Create an Intermmediate CA21:38
happy_nodesThis page does not show anything21:38
nowenhappy_nodes: any errors in the logs?21:39
nowenhappy_nodes: what version is this?21:40
happy_nodesThis is  the one I see : psql:/opt/WiKID/conf/database/migrations/cumulative.sql:972: NOTICE:  Exception in dbmigrate11.   This migration may have already been performed21:41
nowenis that in the WiKIDAdmin logs?21:42
happy_nodesI found it in cumulative.log21:46
happy_nodesin /opt/WiKID/log21:46
nowenjust look in the log link in the WiKIDADmin UI21:46
happy_nodesI am new to wikid21:46
happy_nodesok21:47
nowennp21:47
happy_nodesThere is nothing in logs21:48
nowenhmm21:48
nowenwhat version is this?21:48
happy_nodesLet me check21:50
happy_nodes3.1.2221:52
happy_nodesNo It is not this one21:53
happy_nodesThe one I have installed is wikid-enterprise-3.5.0-b1359-install.iso21:54
nowenok21:54
happy_nodesand it comes wth Centos 621:55
happy_nodessorry Centos 521:55
happy_nodesDo you have the one with Centos 621:55
nowennot yet21:55
happy_nodesok21:55
nowenhow long ago did you download this?21:56
happy_nodesIts been long time21:56
nowenok21:56
happy_nodesIt was on our repository21:56
happy_nodesso, I do not know since how long we have it21:57
nowenare you an existing customer?21:57
nowenyou mean the RPMs were in your repo?21:57
happy_nodesYes, We are existing customer21:57
happy_nodesvmimage is on our datastore21:57
happy_nodesone of the wikid server died21:58
nowenwho are you with?21:58
happy_nodesso, I am reinstalling it21:58
happy_nodesworkforcesoftware21:58
nowenok21:59
nowenlet's try to update via rpm21:59
noweni'll give you the url to download it22:00
happy_nodesok22:00
nowenhttp://wikidsystems-dl.com/wikid-server-enterprise-3.5.0.b1472-1.noarch.rpm22:00
happy_nodesCan I try it on other server. We basically want to test it on Centos 6 Server22:01
happy_nodesi have a test server ready22:01
nowenyes22:01
happy_nodesIOk22:01
nowenis it 32 or 64 bit?22:01
happy_nodes64 bit22:02
nowenok, you will also need the utilities rpm22:02
nowenhttp://wikidsystems-dl.com/wikid-utilities-3.4.3-1.x86_64.rpm22:03
happy_nodesok22:03
nowenand then follow these: http://www.wikidsystems.com/support/wikid-support-center/installation-how-tos/how-to-install-the-wikid-enterprise-rpms22:04
nowennote that Sun's jdk may be a bit faster than openjdk, but it's a pain to install22:04
nowennot sure what's going on with the old iso22:05
happy_nodesIt is a new machine22:05
happy_nodesI have java installed22:06
*** happy_nodes has quit (Quit: HydraIRC -> http://www.hydrairc.com <- Like it? Visit #hydrairc on EFNet)22:24
*** nowen has quit (Quit: Leaving.)23:06

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!