Redhat8 or Debian11 Le ven. 29 oct. 2021, 18 h 30, ypefti--- via PacketFence-users < packetfence-users@lists.sourceforge.net> a écrit :
> Good news, thanks, Ludovic. > > I grasped for this opportunity to try to upgrade ours to the new release > while we are not in production mode now. > > Followed the official document for CentOS/Redhat based systems. > > Set it up for an update with yum and ran into these errors while > downloading dependencies. > > How can I safely disregard them to proceed with the upgrade ? > > > > Total download size: 558 M > > Is this ok [y/d/N]: y > > Downloading packages: > > No Presto metadata available for packetfence > > No Presto metadata available for base > > No Presto metadata available for updates > > (1/201): > MariaDB-common-10.2.37-1.el7.centos.x86_64.rpm > | 81 kB 00:00:00 > > (2/201): > MariaDB-compat-10.2.37-1.el7.centos.x86_64.rpm > | 2.2 MB 00:00:00 > > (3/201): > ImageMagick-perl-6.9.10.68-6.el7_9.x86_64.rpm > | 154 kB 00:00:00 > > (4/201): > MariaDB-client-10.2.37-1.el7.centos.x86_64.rpm > | 11 MB 00:00:01 > > (5/201): > MariaDB-server-10.2.37-1.el7.centos.x86_64.rpm > | 24 MB 00:00:01 > > (6/201): > ImageMagick-6.9.10.68-6.el7_9.x86_64.rpm > | 2.3 MB 00:00:05 > > (7/201): > NetworkManager-1.18.8-2.el7_9.x86_64.rpm > | 1.9 MB 00:00:05 > > (8/201): > NetworkManager-team-1.18.8-2.el7_9.x86_64.rpm > | 165 kB 00:00:00 > > (9/201): apr-1.4.8-7.el7.x86_64.rpm > | 104 kB > 00:00:00 > > (10/201): > OpenEXR-libs-1.7.1-8.el7.x86_64.rpm > | 217 kB 00:00:00 > > (11/201): > NetworkManager-tui-1.18.8-2.el7_9.x86_64.rpm > | 329 kB 00:00:01 > > (12/201): > bc-1.06.95-13.el7.x86_64.rpm > | 115 kB 00:00:00 > > (13/201): > centos-release-7-9.2009.1.el7.centos.x86_64.rpm > | 27 kB 00:00:00 > > (14/201): > ca-certificates-2021.2.50-72.el7_9.noarch.rpm > | 379 kB 00:00:00 > > coreutils-8.22-24.el7_9.2.x86_ > FAILED > ] 2.4 MB/s | 44 MB 00:03:31 ETA > > > http://muug.ca/mirror/centos/7.9.2009/updates/x86_64/Packages/coreutils-8.22-24.el7_9.2.x86_64.rpm: > [Errno 14] curl#56 - "Recv failure: Connection reset by peer" > > Trying other mirror. > > iproute-4.11.0-30.el7.x86_64.r > FAILED > - ] 20 MB/s | 214 MB 00:00:17 ETA > > > http://mirror.esecuredata.com/centos/7.9.2009/os/x86_64/Packages/iproute-4.11.0-30.el7.x86_64.rpm: > [Errno 14] curl#56 - "Recv failure: Connection reset by peer" > > Trying other mirror. > > net-snmp-perl-5.7.2-49.el7_9.1 > FAILED > > > http://centos.mirror.iweb.ca/7.9.2009/updates/x86_64/Packages/net-snmp-perl-5.7.2-49.el7_9.1.x86_64.rpm: > [Errno 14] curl#56 - "Recv failure: Connection reset by peer" > > Trying other mirror. > > (134/201): > openldap-2.4.44-24.el7_9.x86_64.rpm > | 356 kB 00:00:00 > > openssl-1.0.2k-22.el7_9.x86_64 FAILED > ============ ] 7.1 > MB/s | 358 MB 00:00:28 ETA > > > http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/openssl-1.0.2k-22.el7_9.x86_64.rpm: > [Errno 14] curl#56 - "Recv failure: Connection reset by peer" > > Trying other mirror. > > (135/201): > packetfence-release-2.1.0-20210414154410.286398790.0007.v10.3.0.el7.noarch.rpm > | 6.1 kB 00:00:00 > > (136/201): > pcre-devel-8.32-17.el7.x86_64.rpm > | 480 kB 00:00:00 > > (137/201): > openssl-libs-1.0.2k-22.el7_9.x86_64.rpm > | 1.2 MB 00:00:00 > > openssl-devel-1.0.2k-22.el7_9. FAILED > > > > http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/openssl-devel-1.0.2k-22.el7_9.x86_64.rpm: > [Errno 14] curl#56 - "Recv failure: Connection reset by peer" > > Trying other mirror. > > (138/201): > packetfence-10.3.0-20210414154410.286398790.0007.v10.3.0.el7.x86_64.rpm > | 73 MB 00:00:03 > > (139/201): > linux-firmware-20200421-80.git78c0348.el7_9.noarch.rpm > | 80 MB 00:00:21 > > perl-Crypt-PBKDF2-0.150900-1.e > FAILED > > > http://inverse.ca/downloads/PacketFence/RHEL7/x86_64/RPMS/perl-Crypt-PBKDF2-0.150900-1.el7.noarch.rpm: > [Errno 14] curl#56 - "Recv failure: Connection reset by peer" > > Trying other mirror. > > (140/201): > perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9.noarch.rpm > | 68 kB 00:00:00 > > (141/201): > perl-Digest-SHA3-0.24-1.el7.x86_64.rpm > | 32 kB 00:00:00 > > perl-5.16.3-299.el7_9.x86_64.r > FAILED > ========================- ] 3.8 MB/s | 505 MB 00:00:14 ETA > > > http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/perl-5.16.3-299.el7_9.x86_64.rpm: > [Errno 14] curl#56 - "Recv failure: Connection reset by peer" > > Trying other mirror. > > (142/201): > perl-ExtUtils-Install-1.58-299.el7_9.noarch.rpm > | 75 kB 00:00:00 > > ( > > samba-4.10.16-15.el7_9.x86_64. FAILED > =========================- ] 3.2 MB/s | 516 MB 00:00:13 ETA > > > http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/samba-4.10.16-15.el7_9.x86_64.rpm: > [Errno 14] curl#56 - "Recv failure: Connection reset by peer" > > Trying other mirror. > > (165/201): > samba-common-4.10.16-15.el7_9.noarch.rpm > | 215 kB 00:00:00 > > (166/201): > samba-common-libs-4.10.16-15.el7_9.x86_64.rpm > | 182 kB 00:00:00 > > samba-winbind-4.10.16-15.el7_9 > FAILED > > > http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/samba-winbind-4.10.16-15.el7_9.x86_64.rpm: > [Errno 14] curl#56 - "Recv failure: Connection reset by peer" > > Trying other mirror. > > util-linux-2.23.2-65.el7_9.1.x > FAILED > =========================== ] 2.4 MB/s | 539 MB 00:00:08 ETA > > > http://mirror.esecuredata.com/centos/7.9.2009/updates/x86_64/Packages/util-linux-2.23.2-65.el7_9.1.x86_64.rpm: > [Errno 14] curl#56 - "Recv failure: Connection reset by peer" > > Trying other mirror. > > Error downloading packages: > > perl-Crypt-PBKDF2-0.150900-1.el7.noarch: [Errno 256] No more mirrors to > try. > > > > Eugene > > > > *From:* Ludovic Marcotte via PacketFence-users < > packetfence-users@lists.sourceforge.net> > *Sent:* Friday, October 29, 2021 10:44 AM > *To:* packetfence-annou...@lists.sourceforge.net; > packetfence-de...@lists.sourceforge.net; > packetfence-users@lists.sourceforge.net > *Cc:* Ludovic Marcotte <lmarco...@inverse.ca> > *Subject:* [PacketFence-users] ANN: PacketFence v11.1 > > > > The Inverse team is pleased to announce the immediate availability of > PacketFence v11.1. This is a major release with new features, enhancements > and bug fixes. This release is considered ready for production use and > upgrading from previous versions is strongly advised. > What is PacketFence? > > PacketFence is a fully supported, trusted, Free and Open Source Network > Access Control (NAC) solution. Boasting an impressive feature set, > PacketFence can be used to effectively secure small to very large > heterogeneous networks. > > Among the features provided by PacketFence, there are: > > - powerful BYOD (Bring Your Own Device) capabilities > - multiple enforcement methods including Role-Based Access Control > (RBAC) and hotspot-style > - built-in network behaviour anomaly detection > - state-of-the art devices identification with Fingerbank > - compliance checks for endpoints present on your network > - integration with various vulnerability scanners, intrusion detection > solutions, security agents and firewalls > - bandwidth accounting for all devices > > A complete overview of the solution is available from the official > website: https://packetfence.org/about.html > Changes Since Previous Release > > *New Features* > > - Support for Akamai MFA in VPN/CLI RADIUS authentication and on the > captive portal > - Support for TOTP MFA in VPN/CLI RADIUS authentication and on the > captive portal > - Automation of upgrades for standalone installations (#6583) > > *Enhancements* > > - MikroTik DHCP MAC authentication support > - Allow to use the sAMAccountName from the searchattributes in MSCHAP > machine authentication (#6586) > - Improve the Data Access Layer to work in MariaDB's default sql_mode > - New command pfcmd mariadb [mariadb options] > - Deauth request can be made on the previous equipment the device was > connected > - Allow the bulk import of config items to be async > - Remove unused/deprecated sources (AuthorizeNet, Instagram, Twitter, > Pinterest, and Mirapay) (#6560) > - Automation of supported equipment page on PacketFence website (#6611) > - Use Venom 1.0.0 through Ansible to run integration tests (#6573) > - Import script will migrate the networks configuration if the new IP > is in the same subnet (#6636) > - EAP-TLS integration tests using manual deployment and SCEP protocol > (#6647) > - Added a monit check to ensure winbindd is still connected (11.1 - AD > failover doesn’t work #6655) > - Improve ZEN builds (#6663) > > *Bug Fixes* > > - Match the realm more strictly when its not a regex in EAP-TTLS PAP > - Populate the LDAP config for enabled LDAP EAP-TTLS PAP realms > - Only call oauth2 in authorize for the realms that have an Azure AD > EAP-TTLS PAP configuration > - Use source username in LDAP module for EAP-TTLS PAP instead of > always using sAMAccoutName > - Support LDAP certificate client auth for LDAP EAP-TTLS PAP > authentication > - Allow to use Google Workspace LDAP sources in EAP-TTLS PAP > authentication > - Add script for removing WMI scan (#6569) > - Fix Let's Encrypt renewal process restarting services even if they > are disabled (#6606) > - Removes the deprecated NTLM background job fields and components > (#6552) > - Ignore 'Mark as sponsor' administration rules when finding the > access level of a VPN/CLI user (#6349) > - Reducing time balance only when registered > > See https://github.com/inverse-inc/packetfence/compare/v11.0.0...v11.1.0 for > the complete change log. > > See the Upgrade guide for notes about upgrading: > https://packetfence.org/doc/PacketFence_Upgrade_Guide.html > Getting PacketFence > > PacketFence is free software and is distributed under the GNU GPL. As > such, you are free to download and try it by either getting the new release > or by getting the sources: https://packetfence.org/download.html > > Documentation about the installation and configuration of PacketFence is > also available: https://packetfence.org/support/index.html#/documentation > How Can I Help? > > PacketFence is a collaborative effort in order to create the best Free and > Open Source NAC solution. There are multiple ways you can contribute to the > project: > > - Documentation reviews, enhancements and translations > - Feature requests or by sharing your ideas > - Participate in the discussion on mailing lists ( > https://packetfence.org/support/index.html#/community) > - Patches for bugs or enhancements > - Provide new translations of remediation pages > > Getting Support > > For any questions, do not hesitate to contact us by writing to > supp...@inverse.ca > > You can also fill our online form (https://inverse.ca/#contact) and a > representative from Inverse will contact you. > > Inverse offers professional services to organizations willing to secure > their wired and wireless networks with the PacketFence solution. > _______________________________________________ > PacketFence-users mailing list > PacketFence-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/packetfence-users >
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users