Essentially it errors on MariaDB-client installation 

 

====================================================================================================================================================================================

Package                                   Arch                        Version   
                                                            Repository          
              Size

====================================================================================================================================================================================

Updating:

MariaDB-client                            x86_64                      
10.2.37-1.el7.centos                                                  
packetfence                       11 M

MariaDB-common                            x86_64                      
10.2.37-1.el7.centos                                                  
packetfence                       81 k

MariaDB-server                            x86_64                      
10.2.37-1.el7.centos                                                  
packetfence                       24 M

fingerbank                                noarch                      
4.2.1-20200722165131.169595742.0007.v4.2.1.el7                        
packetfence                      115 M

fingerbank-collector                      x86_64                      
1.3.17-1.el7                                                          
packetfence                      4.5 M

lasso                                     x86_64                      2.7.0-2.1 
                                                            packetfence         
             195 k

lasso-perl                                x86_64                      2.7.0-2.1 
                                                            packetfence         
             165 k

packetfence                               x86_64                      
10.3.0-20210414154410.286398790.0007.v10.3.0.el7                      
packetfence                       73 M

packetfence-release                       noarch                      
2.1.0-20210414154410.286398790.0007.v10.3.0.el7                       
packetfence                      6.1 k

Installing for dependencies:

MariaDB-compat                            x86_64                      
10.2.37-1.el7.centos                                                  
packetfence                      2.2 M

perl-Crypt-PBKDF2                         noarch                      
0.150900-1.el7                                                        
packetfence                       37 k

perl-Digest-SHA3                          x86_64                      
0.24-1.el7                                                            
packetfence                       32 k

 

====================================================

 

Transaction check error:

  file /usr/lib64/libmysqlclient.so.18.0.0 from install of 
MariaDB-compat-10.2.37-1.el7.centos.x86_64 conflicts with file from package 
MariaDB-shared-10.1.21-1.el7.centos.x86_64

  file /usr/lib64/libmysqlclient_r.so.18 from install of 
MariaDB-compat-10.2.37-1.el7.centos.x86_64 conflicts with file from package 
MariaDB-shared-10.1.21-1.el7.centos.x86_64

  file /usr/lib64/libmysqlclient_r.so.18.0.0 from install of 
MariaDB-compat-10.2.37-1.el7.centos.x86_64 conflicts with file from package 
MariaDB-shared-10.1.21-1.el7.centos.x86_64

 

From: Fabrice Durand <oeufd...@gmail.com> 
Sent: Friday, October 29, 2021 3:51 PM
To: packetfence-users@lists.sourceforge.net
Cc: packetfence-annou...@lists.sourceforge.net; 
packetfence-de...@lists.sourceforge.net; ype...@gmail.com
Subject: Re: [PacketFence-users] ANN: PacketFence v11.1

 

Redhat8 or Debian11

 

Le ven. 29 oct. 2021, 18 h 30, ypefti--- via PacketFence-users 
<packetfence-users@lists.sourceforge.net 
<mailto:packetfence-users@lists.sourceforge.net> > a écrit :

Good news, thanks, Ludovic.

I grasped for this opportunity to try to upgrade ours to the new release while 
we are not in production mode now.

Followed the official document for CentOS/Redhat based systems. 

Set it up for an update with yum and ran into these errors while downloading 
dependencies.

How can I safely disregard them to proceed with the upgrade ?

 

Total download size: 558 M

Is this ok [y/d/N]: y

Downloading packages:

No Presto metadata available for packetfence

No Presto metadata available for base

No Presto metadata available for updates

(1/201): MariaDB-common-10.2.37-1.el7.centos.x86_64.rpm                         
                                       |  81 kB  00:00:00     

(2/201): MariaDB-compat-10.2.37-1.el7.centos.x86_64.rpm                         
                                       | 2.2 MB  00:00:00     

(3/201): ImageMagick-perl-6.9.10.68-6.el7_9.x86_64.rpm                          
                                       | 154 kB  00:00:00     

(4/201): MariaDB-client-10.2.37-1.el7.centos.x86_64.rpm                         
                                       |  11 MB  00:00:01     

(5/201): MariaDB-server-10.2.37-1.el7.centos.x86_64.rpm                         
                                       |  24 MB  00:00:01     

(6/201): ImageMagick-6.9.10.68-6.el7_9.x86_64.rpm                               
                                       | 2.3 MB  00:00:05     

(7/201): NetworkManager-1.18.8-2.el7_9.x86_64.rpm                               
                                       | 1.9 MB  00:00:05     

(8/201): NetworkManager-team-1.18.8-2.el7_9.x86_64.rpm                          
                                       | 165 kB  00:00:00     

(9/201): apr-1.4.8-7.el7.x86_64.rpm                                             
                                       | 104 kB  00:00:00     

(10/201): OpenEXR-libs-1.7.1-8.el7.x86_64.rpm                                   
                                       | 217 kB  00:00:00     

(11/201): NetworkManager-tui-1.18.8-2.el7_9.x86_64.rpm                          
                                       | 329 kB  00:00:01     

(12/201): bc-1.06.95-13.el7.x86_64.rpm                                          
                                       | 115 kB  00:00:00     

(13/201): centos-release-7-9.2009.1.el7.centos.x86_64.rpm                       
                                       |  27 kB  00:00:00     

(14/201): ca-certificates-2021.2.50-72.el7_9.noarch.rpm                         
                                       | 379 kB  00:00:00     

coreutils-8.22-24.el7_9.2.x86_ FAILED                                           
                            ] 2.4 MB/s |  44 MB  00:03:31 ETA 

http://muug.ca/mirror/centos/7.9.2009/updates/x86_64/Packages/coreutils-8.22-24.el7_9.2.x86_64.rpm:
 [Errno 14] curl#56 - "Recv failure: Connection reset by peer"

Trying other mirror.

iproute-4.11.0-30.el7.x86_64.r FAILED                                          
-                            ]  20 MB/s | 214 MB  00:00:17 ETA 

http://mirror.esecuredata.com/centos/7.9.2009/os/x86_64/Packages/iproute-4.11.0-30.el7.x86_64.rpm:
 [Errno 14] curl#56 - "Recv failure: Connection reset by peer"

Trying other mirror.

net-snmp-perl-5.7.2-49.el7_9.1 FAILED                                          

http://centos.mirror.iweb.ca/7.9.2009/updates/x86_64/Packages/net-snmp-perl-5.7.2-49.el7_9.1.x86_64.rpm:
 [Errno 14] curl#56 - "Recv failure: Connection reset by peer"

Trying other mirror.

(134/201): openldap-2.4.44-24.el7_9.x86_64.rpm                                  
                                       | 356 kB  00:00:00     

openssl-1.0.2k-22.el7_9.x86_64 FAILED                                          
============                 ] 7.1 MB/s | 358 MB  00:00:28 ETA 

http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/openssl-1.0.2k-22.el7_9.x86_64.rpm:
 [Errno 14] curl#56 - "Recv failure: Connection reset by peer"

Trying other mirror.

(135/201): 
packetfence-release-2.1.0-20210414154410.286398790.0007.v10.3.0.el7.noarch.rpm  
                            | 6.1 kB  00:00:00     

(136/201): pcre-devel-8.32-17.el7.x86_64.rpm                                    
                                       | 480 kB  00:00:00     

(137/201): openssl-libs-1.0.2k-22.el7_9.x86_64.rpm                              
                                       | 1.2 MB  00:00:00     

openssl-devel-1.0.2k-22.el7_9. FAILED                                          

http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/openssl-devel-1.0.2k-22.el7_9.x86_64.rpm:
 [Errno 14] curl#56 - "Recv failure: Connection reset by peer"

Trying other mirror.

(138/201): 
packetfence-10.3.0-20210414154410.286398790.0007.v10.3.0.el7.x86_64.rpm         
                            |  73 MB  00:00:03     

(139/201): linux-firmware-20200421-80.git78c0348.el7_9.noarch.rpm               
                                       |  80 MB  00:00:21     

perl-Crypt-PBKDF2-0.150900-1.e FAILED                                          

http://inverse.ca/downloads/PacketFence/RHEL7/x86_64/RPMS/perl-Crypt-PBKDF2-0.150900-1.el7.noarch.rpm:
 [Errno 14] curl#56 - "Recv failure: Connection reset by peer"

Trying other mirror.

(140/201): perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9.noarch.rpm                 
                                       |  68 kB  00:00:00     

(141/201): perl-Digest-SHA3-0.24-1.el7.x86_64.rpm                               
                                       |  32 kB  00:00:00     

perl-5.16.3-299.el7_9.x86_64.r FAILED                                          
========================-    ] 3.8 MB/s | 505 MB  00:00:14 ETA 

http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/perl-5.16.3-299.el7_9.x86_64.rpm:
 [Errno 14] curl#56 - "Recv failure: Connection reset by peer"

Trying other mirror.

(142/201): perl-ExtUtils-Install-1.58-299.el7_9.noarch.rpm                      
                                       |  75 kB  00:00:00     

( 

samba-4.10.16-15.el7_9.x86_64. FAILED                                          
=========================-   ] 3.2 MB/s | 516 MB  00:00:13 ETA 

http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/samba-4.10.16-15.el7_9.x86_64.rpm:
 [Errno 14] curl#56 - "Recv failure: Connection reset by peer"

Trying other mirror.

(165/201): samba-common-4.10.16-15.el7_9.noarch.rpm                             
                                       | 215 kB  00:00:00     

(166/201): samba-common-libs-4.10.16-15.el7_9.x86_64.rpm                        
                                       | 182 kB  00:00:00     

samba-winbind-4.10.16-15.el7_9 FAILED                                          

http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/samba-winbind-4.10.16-15.el7_9.x86_64.rpm:
 [Errno 14] curl#56 - "Recv failure: Connection reset by peer"

Trying other mirror.

util-linux-2.23.2-65.el7_9.1.x FAILED                                          
===========================  ] 2.4 MB/s | 539 MB  00:00:08 ETA 

http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/util-linux-2.23.2-65.el7_9.1.x86_64.rpm:
 [Errno 14] curl#56 - "Recv failure: Connection reset by peer"

Trying other mirror.

Error downloading packages:

  perl-Crypt-PBKDF2-0.150900-1.el7.noarch: [Errno 256] No more mirrors to try.

 

Eugene

 

From: Ludovic Marcotte via PacketFence-users 
<packetfence-users@lists.sourceforge.net 
<mailto:packetfence-users@lists.sourceforge.net> > 
Sent: Friday, October 29, 2021 10:44 AM
To: packetfence-annou...@lists.sourceforge.net 
<mailto:packetfence-annou...@lists.sourceforge.net> ; 
packetfence-de...@lists.sourceforge.net 
<mailto:packetfence-de...@lists.sourceforge.net> ; 
packetfence-users@lists.sourceforge.net 
<mailto:packetfence-users@lists.sourceforge.net> 
Cc: Ludovic Marcotte <lmarco...@inverse.ca <mailto:lmarco...@inverse.ca> >
Subject: [PacketFence-users] ANN: PacketFence v11.1

 

The Inverse team is pleased to announce the immediate availability of 
PacketFence v11.1. This is a major release with new features, enhancements and 
bug fixes. This release is considered ready for production use and upgrading 
from previous versions is strongly advised.


What is PacketFence?


PacketFence is a fully supported, trusted, Free and Open Source Network Access 
Control (NAC) solution. Boasting an impressive feature set, PacketFence can be 
used to effectively secure small to very large heterogeneous networks.

Among the features provided by PacketFence, there are:

*       powerful BYOD (Bring Your Own Device) capabilities
*       multiple enforcement methods including Role-Based Access Control (RBAC) 
and hotspot-style
*       built-in network behaviour anomaly detection
*       state-of-the art devices identification with Fingerbank
*       compliance checks for endpoints present on your network
*       integration with various vulnerability scanners, intrusion detection 
solutions, security agents and firewalls
*       bandwidth accounting for all devices

A complete overview of the solution is available from the official website:  
<https://packetfence.org/about.html> https://packetfence.org/about.html


Changes Since Previous Release


New Features

*       Support for Akamai MFA in VPN/CLI RADIUS authentication and on the 
captive portal
*       Support for TOTP MFA in VPN/CLI RADIUS authentication and on the 
captive portal
*       Automation of upgrades for standalone installations (#6583)

Enhancements

*       MikroTik DHCP MAC authentication support
*       Allow to use the sAMAccountName from the searchattributes in MSCHAP 
machine authentication (#6586)
*       Improve the Data Access Layer to work in MariaDB's default sql_mode
*       New command pfcmd mariadb [mariadb options]
*       Deauth request can be made on the previous equipment the device was 
connected
*       Allow the bulk import of config items to be async
*       Remove unused/deprecated sources (AuthorizeNet, Instagram, Twitter, 
Pinterest, and Mirapay) (#6560)
*       Automation of supported equipment page on PacketFence website (#6611)
*       Use Venom 1.0.0 through Ansible to run integration tests (#6573)
*       Import script will migrate the networks configuration if the new IP is 
in the same subnet (#6636)
*       EAP-TLS integration tests using manual deployment and SCEP protocol 
(#6647)
*       Added a monit check to ensure winbindd is still connected (11.1 - AD 
failover doesn’t work #6655)
*       Improve ZEN builds (#6663)

Bug Fixes

*       Match the realm more strictly when its not a regex in EAP-TTLS PAP
*       Populate the LDAP config for enabled LDAP EAP-TTLS PAP realms
*       Only call oauth2 in authorize for the realms that have an Azure AD 
EAP-TTLS PAP configuration
*       Use source username in LDAP module for EAP-TTLS PAP instead of always 
using sAMAccoutName
*       Support LDAP certificate client auth for LDAP EAP-TTLS PAP 
authentication
*       Allow to use Google Workspace LDAP sources in EAP-TTLS PAP 
authentication
*       Add script for removing WMI scan (#6569)
*       Fix Let's Encrypt renewal process restarting services even if they are 
disabled (#6606)
*       Removes the deprecated NTLM background job fields and components (#6552)
*       Ignore 'Mark as sponsor' administration rules when finding the access 
level of a VPN/CLI user (#6349)
*       Reducing time balance only when registered

See  <https://github.com/inverse-inc/packetfence/compare/v11.0.0...v11.1.0> 
https://github.com/inverse-inc/packetfence/compare/v11.0.0...v11.1.0 for the 
complete change log.

See the Upgrade guide for notes about upgrading:  
<https://packetfence.org/doc/PacketFence_Upgrade_Guide.html> 
https://packetfence.org/doc/PacketFence_Upgrade_Guide.html


Getting PacketFence


PacketFence is free software and is distributed under the GNU GPL. As such, you 
are free to download and try it by either getting the new release or by getting 
the sources:  <https://packetfence.org/download.html> 
https://packetfence.org/download.html

Documentation about the installation and configuration of PacketFence is also 
available:  <https://packetfence.org/support/index.html#/documentation> 
https://packetfence.org/support/index.html#/documentation


How Can I Help?


PacketFence is a collaborative effort in order to create the best Free and Open 
Source NAC solution. There are multiple ways you can contribute to the project:

*       Documentation reviews, enhancements and translations
*       Feature requests or by sharing your ideas
*       Participate in the discussion on mailing lists ( 
<https://packetfence.org/support/index.html#/community> 
https://packetfence.org/support/index.html#/community)
*       Patches for bugs or enhancements
*       Provide new translations of remediation pages


Getting Support


For any questions, do not hesitate to contact us by writing to  
<mailto:supp...@inverse.ca> supp...@inverse.ca

You can also fill our online form ( <https://inverse.ca/#contact> 
https://inverse.ca/#contact) and a representative from Inverse will contact you.

Inverse offers professional services to organizations willing to secure their 
wired and wireless networks with the PacketFence solution.

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net 
<mailto:PacketFence-users@lists.sourceforge.net> 
https://lists.sourceforge.net/lists/listinfo/packetfence-users

_______________________________________________
PacketFence-users mailing list
PacketFence-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/packetfence-users

Reply via email to