SYSTEM WARNING: 'date_default_timezone_get(): It is not safe to rely on the system's timezone settings. You are *required* to use the date.timezone setting or the date_default_timezone_set() function. In case you used any of those methods and you are still getting this warning, you most likely misspelled the timezone identifier. We selected the timezone 'UTC' for now, but please set date.timezone to select your timezone.' in '/usr/share/mantis/www/core.php' line 264

0004563: The antispyware service can not be disable on GUI or the white/black list to be edit - MantisBT
MantisBT - Endian Firewall
View Issue Details
0004563Endian FirewallEndian Firewall GUIpublic2013-08-28 23:032013-09-19 22:28
msoliveira01 
luca-endian 
immediatemajoralways
newopen 
2.5 
 
0004563: The antispyware service can not be disable on GUI or the white/black list to be edit
The new antispyware feature can not be disabled on version 2.5.2 by the GUI, when we try to save the modifications or disable the service, all we can see is a white screen trying to apply the modifications
The interface only back if we refresh the page, but the modifications are not applied.
The problem is that a lot of URL that are in the black list are a phishing like www.bradesco.com.br that is a Bank web site.
Proxy -> DNS ->anti-spyware
No tags attached.
jpg Endian 2.5.2.jpg (122,141) 2013-08-28 23:03
https://bugs.endian.com/file_download.php?file_id=1055&type=bug
jpg
Issue History
2013-08-28 23:03msoliveira01New Issue
2013-08-28 23:03msoliveira01File Added: Endian 2.5.2.jpg
2013-08-29 08:00luca-endianNote Added: 0008483
2013-08-29 08:25luca-endianNote Added: 0008486
2013-08-29 08:25luca-endianAssigned To => luca-endian
2013-08-29 08:25luca-endianStatusnew => acknowledged
2013-08-29 08:26luca-endianNote Edited: 0008486bug_revision_view_page.php?bugnote_id=8486#r2827
2013-08-29 16:39msoliveira01Note Added: 0008499
2013-08-30 09:05luca-endianNote Added: 0008503
2013-08-30 09:05luca-endianStatusacknowledged => confirmed
2013-09-02 11:06carlos-endianNote Added: 0008507
2013-09-17 14:55luca-endianNote Added: 0008526
2013-09-17 14:56luca-endianNote Added: 0008527
2013-09-17 14:56luca-endianStatusconfirmed => feedback
2013-09-17 17:47msoliveira01Note Added: 0008528
2013-09-17 17:47msoliveira01Statusfeedback => new
2013-09-19 22:28josegjimenezNote Added: 0008529

Notes
(0008483)
luca-endian   
2013-08-29 08:00   
can you please verify the permissions of /var/efw/dnsmasq/settings ?
They should be like this:
-rw-r--r-- 1 nobody nobody 405 Aug 6 10:27 settings
(0008486)
luca-endian   
2013-08-29 08:25   
(edited on: 2013-08-29 08:26)
BTW I'm not sure I would trust this bank :D
http://www.phishtank.com/phish_detail.php?phish_id=1976608 [^]

Actually we block domain that have confirmed phish in their root directory and this the case actually..

If you are sure 100% the bank is safe (phishtank says not :) ) you could whitelist

(0008499)
msoliveira01   
2013-08-29 16:39   
it works! the permission was -rw-r--r-- 1 root root
(0008503)
luca-endian   
2013-08-30 09:05   
ok so it's a permission problem..
(0008507)
carlos-endian   
2013-09-02 11:06   
Issue reported and will be fix soon, when is ready will be inform you.
Thanks for your help
(0008526)
luca-endian   
2013-09-17 14:55   
msoliveira01 we can't reproduce this.. did you upgrade it or install from scratch?
and if you install did you restore a backup?
(0008527)
luca-endian   
2013-09-17 14:56   
someone else experienced this issue?
(0008528)
msoliveira01   
2013-09-17 17:47   
Hello Luca,
I upgraded it from version 2.4.1
(0008529)
josegjimenez   
2013-09-19 22:28   
Hola he resuelto el problema, buscando desde la consola web en el firewall:

Ingresen como root, van a la ruta cd /var/efw/dnsmasq
Ejecutan ls -l y verán los permisos de cada modulo

allí deben ver algo como esto:

-rw-r--r-- 1 nobody nobody blackholedns.custom
-rw-r--r-- 1 nobody nobody blackholedns.ignore
drwxr-xr-x 2 nobody nobody default
-rw-r--r-- 1 nobody nobody destination_bypass
-rw-r--r-- 1 nobody nobody empty
-rw-r--r-- 1 nobody nobody hosts
-rw-r--r-- 1 nobody nobody local_nameserver
-rw-r--r-- 1 root root settings
-rw-r--r-- 1 nobody nobody settings.old

Por alguna razón nuestro settings paso a ser del root, pero tranquilos desde la consola en la ruta /var/efw/dnsmasq ejecutaremos mv settings settings.back donde renombraremos el settings de root y luego renombraremos el settings de nobody (el nuestro) mv settings.old settings

automáticamente ya podemos usar el dns proxy de nuestro grandioso firewall