Difference between revisions of "Zentyal"

From Blue-IT.org Wiki

(Network)
(Secure the Webinterface with an ssh tunnel)
 
(106 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
= Zentyal - the small business server for Linux =
 
= Zentyal - the small business server for Linux =
 
+
===Important links ===
 
* http://wiki.ubuntuusers.de/Zentyal
 
* http://wiki.ubuntuusers.de/Zentyal
 
* http://wiki.ubuntuusers.de/Zentyal/PPA-Installation
 
* http://wiki.ubuntuusers.de/Zentyal/PPA-Installation
 
* http://ubuntuserverguide.com/2012/11/how-to-instal-zentyal-3-0-on-ubuntu-server-12-04-lts.html
 
* http://ubuntuserverguide.com/2012/11/how-to-instal-zentyal-3-0-on-ubuntu-server-12-04-lts.html
 +
== Installation and Upgrading to Ubuntu 14.04 LTS ==
 +
=== HowTo ===
 +
* http://www.tecmint.com/install-zentyal-as-primary-domain-controller-and-integrate-windows-system/
 +
Unfortunately Zentyal changed it's release policy DRAMATICALLY since Version 3.4 (3.5).
 +
 +
* See and carfully read:  [http://www.zentyal.org/zentyal-release-policy Zentyal Release Policy].
 +
* [http://www.zentyal.org/roadmap/zentyal-3-3-roadmap 3.3 roadmap]
 +
* [http://www.zentyal.org/roadmap/zentyal-3-4-roadmap 3.4 roadmap]
 +
* [http://www.zentyal.org/roadmap/zentyal-4-0-roadmap 4.0 roadmap]
 +
 +
Nur die kommerziellen Versionen Zentyal folgen den Ubuntu-LTS Fahrplan und bieten entsprechende Migrationswege und Werkzeuge an!
 +
 +
 +
'''Be very carful on updating an existing Ubuntu 12.04 LTS Zentyal installation.'''
 +
 +
You will most probably loose a lot of important functionality!
 +
 +
Read carfully and check the new requirements at http://www.zentyal.org/zentyal-release-policy
 +
 +
It in fact boils down that '''you loose on update''':
 +
 +
* '''Zarafa module''' (!) - and thereby your mail configuration an installation which ist WORST!
 +
* '''Webserver configuration module''' - you have to manage it manually. This is not very dramatic.
 +
* Be aware and prepared of '''apache2.4 versus apache 2.2''' config changes (which mainly you can read about in [[Webserver#Apache_2.4]]).
 +
* '''Radius''' - which in my case is crucial, since almost any service relys on this for authentification!
 +
 +
 +
New is:
 +
 +
* Openchange support - which is very PROMISING
 +
* You'll get an '''Rolling Release''' - that means updating Zentyal almost ever need updating the server to a new Ubuntu version which could probably lead to strange side effects for other mission critical systems (database server, programming language environments like ruby) ...
 +
 +
=== A personal comment on this ===
 +
As far as I can say, the new release policy of Zentyal is very annoying on the first place. I cost me almost a week to recover a system, when updating a 12.04 server, which in case lead to an update on Ubuntu 13.04 which was not intended!
 +
 +
But, after doing a lot of updates on my zentyal installations and reading about the facts, I can agree with the decission of Zentyal going this way. They are getting rid of parts, which can be dealed easily whith native system tools. They focus on networking (firewall), gateway, office and open change as an exchange server replacement. I think, this is a good way - however no easy way for users of the ''commiunity version'' of zentyal.
 +
 +
=== Troubleshooting when uninstalling or reinstalling an old zentyal installation ===
 +
==== Prerequesites: ====
 +
# Check if the zentyal database is installed correctly
 +
# ALWAYS only install one module per time, configure it correctly and then head on!
 +
# Backup your zentyal settings
 +
==== Possible use cases: ====
 +
1. '''Database''' was accidentilly dropped and '''zentyal-core could not be uninstalled / installed'' with the postinstallation script (also see section 3.). So create an empty one ;-)
 +
 +
mysql> create database zentyal;
 +
 +
If you need a new zentyal database, then set the root mysql password:
 +
 +
vim /var/lib/zentyal/conf/zentyal-mysql.passwd
 +
 +
and install a new db:
 +
 +
/usr/share/zentyal/create-db
 +
 +
then restart mysql
 +
 +
service mysql restart
 +
 +
2. See - if you installed zentyal - that no '''process is running using ebox''':
 +
 +
> ps x | grep ebox
 +
22871 ?        Ss    0:00 sudo -u ebox /usr/bin/redis-server /var/lib/zentyal/conf/redis.conf
 +
 +
3. A '''postinstallation script''' of a zentyal package, e.g. '''zentyal-core''' is not working, so teh package zentyal-core cannot be conigured or installed:
 +
 +
* Solution: Edit the script standalone and add an ''set -x'', then check for the error messages!
 +
vim /var/lib/dpkg/info/zentyal-core.postinst
 +
#!/bin/bash
 +
set -x
 +
 +
set -e
 +
[...]
 +
 +
* It might be necessary to deactivate the script:
 +
 +
vim /var/lib/dpkg/info/zentyal-core.postinst
 +
 +
#!/bin/bash
 +
exit 0
 +
 +
set -e
 +
[...]
 +
 +
* re-run dpkg:
 +
 +
dpkg --configure -a
 +
 +
* continue with the web interface, which should be run now!
 +
 +
service zentyal webadmin restart
  
 
== Base installation on ubuntu 12.04 LTS ==
 
== Base installation on ubuntu 12.04 LTS ==
Line 19: Line 110:
  
 
  apt-get install -y python-software-properties
 
  apt-get install -y python-software-properties
  apt-add-repository ppa:zentyal/3.0
+
  apt-add-repository ppa:zentyal/3.2 # PUT THE ACTUAL VERSION NUMBER HERE!
 
  apt-get update
 
  apt-get update
 
  apt-get dist-upgrade
 
  apt-get dist-upgrade
Line 59: Line 150:
  
 
There choose the services you like. It is always good, of possible to to a snapshot after each of this steps and test, if everything went ok!
 
There choose the services you like. It is always good, of possible to to a snapshot after each of this steps and test, if everything went ok!
 +
 +
 +
=== Secure the Webinterface with an ssh tunnel ===
 +
This solution to secure the webadmin interface is handy if you are not able to use VPN (e.g. because of a single network card and a kvm virtual guest and no access to the host system).
 +
 +
Tips for the SSH server ( see [1] ): For security reasons configure it to use certificate authenitfication only, which is in fact almost the same like a VPN connection (sshd_config: PasswordAuthentication no, UsePAM no, AllowedUsers special_user, RootLogin no). Use another port - not 22.
 +
Installing Fail2ban is also a good idea! You should generally NOT use the root login for your zentyal server!
 +
 +
Then with you special_user on a local console do:
 +
 +
autossh -L 9000:IP_OF_SERVER:8443 loginname@IP_OF_SERVER
 +
 +
OR
 +
 +
su special_user -c "autossh -L 9000:IP_OF_SERVER:8443 loginname@IP_OF_SERVER"
 +
# autossh keeps the tunnel open, even if it drops
 +
# apt-get install autossh
 +
 +
where
 +
 +
* 8443 is the port of the zentyal web interface
 +
* 9000 is the local port you can access the web interface in your browser
 +
 +
Now you can access the Zentyal Webinterface in your local browser with:
 +
 +
https://localhost:9000
 +
 +
''Your Zentyal Webinterface is now save behind public access!''
 +
 +
[1] Further reading:
 +
* http://askubuntu.com/questions/2271/how-to-harden-an-ssh-server
 +
* https://joscor.com/blog/hardening-openssh-server-ubuntu-14-04/
 +
* Thread on netcup.de for vserver environment like mine [GER] https://forum.netcup.de/administration-eines-server-vserver/vserver-server-kvm-server/6125-zentyal-vpn-virtuelle-nic-kann-nicht-auf-virtuelle-netzwerkkarte-von-vpn-client-auf-port-x-zugreifen/
 +
* Thread on zentyal forum [EN] https://forum.zentyal.org/index.php/topic,20028.msg98671.html#msg98671
  
 
== Firewall ==
 
== Firewall ==
Line 67: Line 192:
 
In case you forget this you can temporaryly disable the firewall via commandline and alter this settings.
 
In case you forget this you can temporaryly disable the firewall via commandline and alter this settings.
 
  /etc/init.d/zentyal firewall stop
 
  /etc/init.d/zentyal firewall stop
 +
 +
=== Using hooks ===
 +
When the firewall module of Zentyal is restarted, all iptable-rules (see [[NAT]]) will be reset. So it is wise to use the zentyal hook system to reset the desired rules! A detailed explanation you'll find here: [[Zentyal#Customization]]
 +
 +
=== LDAP port changed on Zentyal 3.2 ===
 +
By default LDAP uses the port 389. The problem is, ''that samba4'' - which is part of Zentyal 3.2 - already uses this port.
 +
 +
'''For that reason LDAP on Zentyal 3.x is running on port 390'''. This is not documented on the first sight, and in the firewall, the "LDAP" is assigned to prot 389.
 +
 +
Solution:
 +
# add a custom '''port 390''' and name it e.g. ''LDAP-Zentyal''
 +
# open the port in the firewall for the internal network traffice (or outside, which is NOT wise)
 +
 +
Test with. Replace <ZENTYAL-SERVER-IP> with the IP of your LDAP-server
 +
ldapsearch -x -p 390 -LLL -h <ZENTYAL-SERVER-IP> -b "" -s base "(objectclass=*)" supportedSASLMechanisms
 +
 +
== Radius ==
 +
 +
#/bin/bash
 +
#
 +
# Put this in /etc/rc.local
 +
#
 +
# Monitor zentyal radius
 +
 +
# Upon update, links for freeradius will be set again, so remove them
 +
update-rc.d -f freeradius remove
 +
 +
restart_radius() {
 +
      /usr/sbin/service zentyal radius stop
 +
      sleep 2
 +
      /usr/bin/killall freeradius
 +
         
 +
      /usr/sbin/service zentyal radius start
 +
}
 +
 +
while (true)
 +
do
 +
        if radtest radtestuser 123-qwe localhost 1812 123-qwe
 +
        then
 +
                echo "RADIUS OK"
 +
 
 +
        else
 +
                logger "ERROR: ZENTYAL RADIUS is DOWN ... restarting ..."
 +
                restart_radius
 +
        fi
 +
 
 +
        sleep 15
 +
 
 +
done
 +
 +
== LDAP ==
 +
[Update] --[[User:Apos|Apos]] ([[User talk:Apos|talk]]) 11:06, 2 November 2013 (CET)
 +
 +
For Zentyal > 3.5 use port 389, < version 3.5 use prot 390 (!):
 +
 +
root@zentyal:~# ldapsearch -x -p 389 -LLL -h localhost -b "" -s base "(objectclass=*)" supportedSASLMechanisms dn
 +
dn:
 +
supportedSASLMechanisms: GSS-SPNEGO
 +
supportedSASLMechanisms: GSSAPI
 +
supportedSASLMechanisms: NTLM
 +
 +
ldapsearch -x -h localhost -D "testuser@zentyaldomain.sld" -W-b "cn=users,dc=zentyaldomain,dc=sld" -s sub "(cn=*)" cn mail sn
 +
 +
 +
=== Redmine ===
 +
 +
This is tested with Zentyal 3.2 on Ubuntu 12.04 LTS and [[Redmine|Redmine 2.3.3-2 (via ppa)]].
 +
! Be aware and read the section [[Zentyal#Firewall|LDAP port changed on Zentyal 3.2 ]]!
 +
 +
On the ''users and group''-page in the zentyal administration page there are the credentials you need to get '''readonly''' access to LDAP.
 +
 +
<gallery widths=300px heights=300px perrow=2>
 +
Image:Zentyal LDAP Settings I.png|LDAP Settings
 +
Image:Zentyal LDAP Settings II.png|Zentyal LDAP credentials
 +
</gallery>
 +
 +
LDAP credentials in zentyal:
 +
'''Basedomain (Base DN): dc=your_domain,dc=your_tld'''
 +
Rootdomain (Root DN): cn=zentyal,dc=your_domain,dc=your_tld
 +
Password:         <admin_secret_pass>
 +
'''Read-only root DN: cn=zentyalro,dc=your_domain,dc=your_tld'''
 +
'''Read-only password: <ro_secret_pass>'''
 +
Default Users DN: ou=Users,dc=your_domain,dc=your_tld
 +
Default Groups DN: ou=Groups,dc=your_domain,dc=your_tld
 +
 +
For testing, if you have the right credential, you can use e.g. the free and opensource [http://jxplorer.org  JXplorer] or the commandline:
 +
 +
Check if, the server accepts incoming port
 +
telnet <IP_OF_LDAP_SERVER> 390
 +
 +
 +
ldapsearch -x -p 390 -b '''"<Basedomain (Base DN)>"''' -h '''<IP_OF_LDAP_SERVER>''' \
 +
-D '''"<Read-only root DN>"''' -w "<Read-only password>"
 +
 +
Figured that out, you can e.g. use LDAP in Redmine like this:
 +
<gallery widths=800px heights=400px perrow=2>
 +
Image:Redmine LDAP Zentyal.png |Redmine LDAP settings
 +
</gallery>
 +
 +
=== Owncloud ===
 +
See [[Owncloud#Owncloud.2C_LDAP_and_Zentyal]].
 +
 +
And the thread here:
 +
* https://forum.zentyal.org/index.php/topic,23844.new.html#new
 +
 +
=== PfSense ===
 +
Works with Zentyal 3.4x via Port 389.
 +
 +
And finally (01/2016) works with Zentyal 4.2:
 +
 +
* https://www.wildcardcorp.com/blog/pfsense-and-users-from-zentyal-4-0-over-ldaps
 +
* https://forum.zentyal.org/index.php?topic=23784.0
 +
 +
For '''login credentials''' you have to use something like ''someuser@zentyaldomain.lan'' and NOT something like ''CN=Users,DC=...''.
 +
 +
In the following pictures for testing purpose I created the user "test.test" within zentyal. But you can use any user you like to get a readonly access to ldap.
 +
 +
'''LDAP at port 389:'''
 +
 +
[[File:Pfsense22 ldap zentyal42.png|600px]]
 +
 +
'''LDAPS at port 686'''
 +
 +
For ldap'''s''':// you have to import the zentyal certificate into pfsense.
 +
 +
To get these data the easiest way is to log into your zentyal domain controller do:
 +
 +
openssl s_client -showcerts -connect localhost:636
 +
 +
Then copy the certificate data. Open the '''cert manager''' within pfsense webinterface and create '''(import) a new CA''' using this certificate (paste it into the public key section).
 +
 +
When configuring the server: you have to use the ''full qualified domain name'' for the server address, not the IP if you are using ssl:
 +
 +
Also see:
 +
* https://www.wildcardcorp.com/blog/pfsense-and-users-from-zentyal-4-0-over-ldaps
 +
 +
 +
[[File:Pfsense22 ldaps zentyal42.png|600px]]
  
 
== Network ==
 
== Network ==
Line 82: Line 345:
  
 
[[File:20131006 Zentyal Network 1.png|600px]]
 
[[File:20131006 Zentyal Network 1.png|600px]]
 +
 +
== VPN ==
 +
A good guide:
 +
* https://pricklytech.wordpress.com/2011/03/24/ubuntu-server-installing-and-configuring-zentyal-openvpn/
 +
 +
On a kvm based vserver (netcup.de) check, if the following configurations are enabled:
 +
 +
Enable ip_forward:
 +
echo "1" > /proc/sys/net/ipv4/ip_forward
 +
 +
Forward tap0:
 +
iptables -A FORWARD -i eth0 -o tap0 -m state --state RELATED,ESTABLISHED -j ACCEPT
 +
iptables -A FORWARD -i tap0 -o eth0 -j ACCEPT
 +
 +
or tun0, if you are using tun:
 +
iptables -A FORWARD -i eth0 -o tun0 -m state --state RELATED,ESTABLISHED -j ACCEPT
 +
iptables -A FORWARD -i tun0 -o eth0 -j ACCEPT
 +
 +
'''BUT:''' this won't work in a virtual guest (vserver) due to NAT:
 +
* see: https://forum.zentyal.org/index.php/topic,20028.msg98671.html#msg98671 ). To '''secure the webinterface''' you should use the method pointed out in this article and / or the section above: [[#Secure_the_Webinterface_with_an_ssh_tunnel]].
  
 
== Mail ==
 
== Mail ==
Line 116: Line 399:
  
 
* http://forum.zentyal.org/index.php/topic,18342.0.html
 
* http://forum.zentyal.org/index.php/topic,18342.0.html
 +
 +
== Customization ==
 +
A Zentyal system can be adopted to your own needs in a very easy way: using hooks!
 +
 +
Every service on a Linux system is configured in its own configuration file. Mostly living in ''/etc/...''. Zentyal stores the setting of all services in so called "stubs". These templates can be overridden using hooks.
 +
 +
But using hooks make the system more complex. This means: when doing '''updates''' of your zentyal system, you have to be careful and integrate actual changes of zentyal's stub into your own hook. Your own hooks are not updated automatically as well.
 +
 +
How this is done:
 +
* [http://www.youtube.com/user/zentyal Youtube Zentyal channel]
 +
* [https://wiki.zentyal.org/wiki/En/4.0/Appendix_B:_Development_and_advanced_configuration]
 +
 +
Also see the section [[Zentyal#Firewall]].
  
 
==  Samba4 - changing the REALM ==
 
==  Samba4 - changing the REALM ==
Line 129: Line 425:
  
 
see: http://trac.zentyal.org/ticket/5695
 
see: http://trac.zentyal.org/ticket/5695
 +
 +
== Openchange ==
 +
=== Enable the vacation plugin ===
 +
* read about altering stubs: https://wiki.zentyal.org/wiki/En/3.5/Development_and_advanced_configuration#Stubs
 +
 +
1. Create a new stubs directory in '/etc/zentyal'
 +
mkdir -p mkdir -p /etc/zentyal/stubs/openchange/
 +
 +
2. Copy over the standard stub for openchange to the newly created directory
 +
cp /usr/share/zentyal/stubs/openchange/sogo.conf.mas /etc/zentyal/stubs/openchange/
 +
 +
3. Change the sieve plugin configuration
 +
vim /etc/zentyal/stubs/openchange/sogo.conf.mas
 +
 +
    /* Sieve configuration */
 +
    /* SOGoVacationEnabled = NO; */
 +
    SOGoVacationEnabled = YES;
 +
    [...]
 +
 +
4. Restart openchange service
 +
service zentyal openchange restart
 +
  * Restarting Zentyal module: openchange      [ OK ]
 +
 +
5. The plugin is visible now in your email preferences as a new button ("vacation" in English).
 +
 +
<gallery widths=800px heights=180px perrow=2>
 +
Image:Openchange vacation plugin 01.png | New button
 +
</gallery>
 +
 +
<gallery widths=800px heights=500px perrow=2>
 +
Image:Openchange vacation 02.png | Configuration
 +
</gallery>
 +
 +
Thanks: https://forum.zentyal.org/index.php?topic=25649.0
 +
 +
=== Reprovisioning fails ===
 +
 +
[4.2] The HACK promoted hier Worked for me in nZentyal 4.2 on Ubuntu 14.04 (June 2016) to reprovision Openchange after enabling / reenabling the  module:
 +
 +
* https://forum.zentyal.org/index.php/topic,24625.msg94859.html#msg94859 - Post 13
 +
 +
vim /usr/lib/python2.7/dist-packages/openchange/provision.py +466
 +
 +
 +
add the line schemas = []
 +
                'description': 'Extend existing Samba classes and attributes',
 +
                'modify_mode': True}]
 +
 +
    '''schemas = []'''
 +
 +
    for schema in schemas:
 +
        try:
 +
 +
[4.0]  Worked for me in 2015
 +
 +
* https://forum.zentyal.org/index.php?topic=24625.0
 +
 +
In my case it helped to alter the call of the provisioning call and add ''"--ignore-already-exists"'' into the line:
 +
 +
vim  /usr/share/perl5/EBox/OpenChange/Model/Provision.pm +457
 +
 +
try { 
 +
  my $cmd = "openchange_provision '''--ignore-already-exists''' --firstorg='$organizationName' ";
 +
 +
 +
Another
 +
 +
=== Active sync ===
 +
 +
Read carefully the section about Active sync ...
 +
* https://wiki.zentyal.org/wiki/En/4.1/OpenChange_%28Microsoft%28R%29_Exchange_Server_protocol_implementation%29
 +
 +
... and you will see you have to install manually ...
 +
 +
sudo apt-get install sogo-activesync
 +
 +
... to get the choice on the Openchange site.
 +
 +
=== Samba 4 error ===
 +
If yout get the error:
 +
 +
> Could not get ticket: could not acquire credentials using an initial credentials context: Password has expired
 +
 +
See:
 +
* https://forum.zentyal.org/index.php?topic=24210.0
 +
 +
sudo samba-tool user setexpiry administrator --noexpiry
 +
 +
The same applies to mail module
 +
> Could not get ticket: could not acquire credentials using an initial credentials context: No ENC-TS found
 +
 +
== Monitoring Services ==
 +
 +
=== Apache ===
 +
With e.g. monit: see [[Server_Monitoring#Zentyal_Apache2]].
 +
 +
=== Radius ===
 +
There seems to be a problem with freeradius and Zentyal 3.4.
 +
 +
update-alternatives -f freeradius remove
 +
 +
vim ~/bin/monitor_zentyal_radius
 +
 +
 +
# !/bin/bash
 +
 +
# Monitor radius
 +
 +
restart_radius() {
 +
      /usr/sbin/service zentyal radius stop
 +
      sleep 2
 +
      /usr/bin/killall freeradius
 +
           
 +
      /usr/sbin/service zentyal radius start
 +
}
 +
 
 +
while (true)
 +
do
 +
        if radtest radtestuser 123-qwe localhost 1812 123-qwe
 +
        then
 +
                echo "RADIUS OK"
 +
 
 +
        else
 +
                logger "ERROR: ZENTYAL RADIUS is DOWN ... restarting ..."
 +
                restart_radius
 +
        fi
 +
 
 +
        sleep 15
 +
 
 +
done
 +
 +
== Docker ==
 +
 +
No solution yet: posted a thread in the zentyal forum and started investigations into the subject. See:
 +
 +
* https://forum.zentyal.org/index.php/topic,25020.msg101618.html#msg101618
 +
 +
Also see [[Docker]] for basic docker informations on Ubuntu.
  
 
[[Category: Zentyal]]
 
[[Category: Zentyal]]

Latest revision as of 14:30, 19 September 2017

Zentyal - the small business server for Linux

Important links

Installation and Upgrading to Ubuntu 14.04 LTS

HowTo

Unfortunately Zentyal changed it's release policy DRAMATICALLY since Version 3.4 (3.5).

Nur die kommerziellen Versionen Zentyal folgen den Ubuntu-LTS Fahrplan und bieten entsprechende Migrationswege und Werkzeuge an!


Be very carful on updating an existing Ubuntu 12.04 LTS Zentyal installation.

You will most probably loose a lot of important functionality!

Read carfully and check the new requirements at http://www.zentyal.org/zentyal-release-policy

It in fact boils down that you loose on update:

  • Zarafa module (!) - and thereby your mail configuration an installation which ist WORST!
  • Webserver configuration module - you have to manage it manually. This is not very dramatic.
  • Be aware and prepared of apache2.4 versus apache 2.2 config changes (which mainly you can read about in Webserver#Apache_2.4).
  • Radius - which in my case is crucial, since almost any service relys on this for authentification!


New is:

  • Openchange support - which is very PROMISING
  • You'll get an Rolling Release - that means updating Zentyal almost ever need updating the server to a new Ubuntu version which could probably lead to strange side effects for other mission critical systems (database server, programming language environments like ruby) ...

A personal comment on this

As far as I can say, the new release policy of Zentyal is very annoying on the first place. I cost me almost a week to recover a system, when updating a 12.04 server, which in case lead to an update on Ubuntu 13.04 which was not intended!

But, after doing a lot of updates on my zentyal installations and reading about the facts, I can agree with the decission of Zentyal going this way. They are getting rid of parts, which can be dealed easily whith native system tools. They focus on networking (firewall), gateway, office and open change as an exchange server replacement. I think, this is a good way - however no easy way for users of the commiunity version of zentyal.

Troubleshooting when uninstalling or reinstalling an old zentyal installation

Prerequesites:

  1. Check if the zentyal database is installed correctly
  2. ALWAYS only install one module per time, configure it correctly and then head on!
  3. Backup your zentyal settings

Possible use cases:

1. Database' was accidentilly dropped and zentyal-core could not be uninstalled / installed with the postinstallation script (also see section 3.). So create an empty one ;-)

mysql> create database zentyal;

If you need a new zentyal database, then set the root mysql password:

vim /var/lib/zentyal/conf/zentyal-mysql.passwd

and install a new db:

/usr/share/zentyal/create-db

then restart mysql

service mysql restart

2. See - if you installed zentyal - that no process is running using ebox:

> ps x | grep ebox
22871 ?        Ss     0:00 sudo -u ebox /usr/bin/redis-server /var/lib/zentyal/conf/redis.conf

3. A postinstallation script of a zentyal package, e.g. zentyal-core is not working, so teh package zentyal-core cannot be conigured or installed:

  • Solution: Edit the script standalone and add an set -x, then check for the error messages!
vim /var/lib/dpkg/info/zentyal-core.postinst
#!/bin/bash
set -x

set -e
[...]
  • It might be necessary to deactivate the script:
vim /var/lib/dpkg/info/zentyal-core.postinst
#!/bin/bash
exit 0

set -e
[...]
  • re-run dpkg:
dpkg --configure -a
  • continue with the web interface, which should be run now!
service zentyal webadmin restart

Base installation on ubuntu 12.04 LTS

We are startigng with a bare ubuntu system with only ssh enabled.

First of all please update all packages and do some configurations:

vim /etc/apt/sources.list

Uncomment the following line:

deb http://archive.canonical.com/ubuntu precise partner

We install the apt-add-repository-script to be able to use the zentyal repository afterwards and do a full system upgrade:

apt-get install -y python-software-properties
apt-add-repository ppa:zentyal/3.2 # PUT THE ACTUAL VERSION NUMBER HERE!
apt-get update
apt-get dist-upgrade
apt-get clean

Then add an administrative account for zentyal.

To be able to access the webinterface you have setup an administrativ user which belongs to the admin group. This is NOT the ubuntu adm group! You have to create the group first:

groupadd admin
useradd myAdmin
passwd myAdmin
usermod -G admin -a myAdmin
...

Pleas verify, that the newly created user is part of the new group with:

su my Admin
groups

Finally reboot the system:

reboot

Install Zentyal

The base system then will be install via the command

apt-get -y install zentyal

This will install all prerequisites. Please prepare to have:

  • the or a mysql root password
  • the port for the webinterface

I suggest 444 for the webinterface, so it would not be in conflict with https-pages on your site (you can then access the webinterface via http://vserver:444).

Configure the services

You will now be able to access the webinterface via http://vserver:444.

There choose the services you like. It is always good, of possible to to a snapshot after each of this steps and test, if everything went ok!


Secure the Webinterface with an ssh tunnel

This solution to secure the webadmin interface is handy if you are not able to use VPN (e.g. because of a single network card and a kvm virtual guest and no access to the host system).

Tips for the SSH server ( see [1] ): For security reasons configure it to use certificate authenitfication only, which is in fact almost the same like a VPN connection (sshd_config: PasswordAuthentication no, UsePAM no, AllowedUsers special_user, RootLogin no). Use another port - not 22. Installing Fail2ban is also a good idea! You should generally NOT use the root login for your zentyal server!

Then with you special_user on a local console do:

autossh -L 9000:IP_OF_SERVER:8443 loginname@IP_OF_SERVER

OR

su special_user -c "autossh -L 9000:IP_OF_SERVER:8443 loginname@IP_OF_SERVER"
# autossh keeps the tunnel open, even if it drops
# apt-get install autossh

where

  • 8443 is the port of the zentyal web interface
  • 9000 is the local port you can access the web interface in your browser

Now you can access the Zentyal Webinterface in your local browser with:

https://localhost:9000

Your Zentyal Webinterface is now save behind public access!

[1] Further reading:

Firewall

IMPORTANT: Alter your firewall settings to enable the Zentyal administration !!!

Otherwise you won't be able to access the webinterface.

In case you forget this you can temporaryly disable the firewall via commandline and alter this settings.

/etc/init.d/zentyal firewall stop

Using hooks

When the firewall module of Zentyal is restarted, all iptable-rules (see NAT) will be reset. So it is wise to use the zentyal hook system to reset the desired rules! A detailed explanation you'll find here: Zentyal#Customization

LDAP port changed on Zentyal 3.2

By default LDAP uses the port 389. The problem is, that samba4 - which is part of Zentyal 3.2 - already uses this port.

For that reason LDAP on Zentyal 3.x is running on port 390. This is not documented on the first sight, and in the firewall, the "LDAP" is assigned to prot 389.

Solution:

  1. add a custom port 390 and name it e.g. LDAP-Zentyal
  2. open the port in the firewall for the internal network traffice (or outside, which is NOT wise)

Test with. Replace <ZENTYAL-SERVER-IP> with the IP of your LDAP-server

ldapsearch -x -p 390 -LLL -h <ZENTYAL-SERVER-IP> -b "" -s base "(objectclass=*)" supportedSASLMechanisms

Radius

#/bin/bash
#
# Put this in /etc/rc.local
#
# Monitor zentyal radius 

# Upon update, links for freeradius will be set again, so remove them
update-rc.d -f freeradius remove 

restart_radius() {
     /usr/sbin/service zentyal radius stop
     sleep 2
     /usr/bin/killall freeradius
          
     /usr/sbin/service zentyal radius start
} 

while (true)
do
       if radtest radtestuser 123-qwe localhost 1812 123-qwe
       then
               echo "RADIUS OK"
 
       else
               logger "ERROR: ZENTYAL RADIUS is DOWN ... restarting ..."
               restart_radius
       fi
 
       sleep 15
 
done

LDAP

[Update] --Apos (talk) 11:06, 2 November 2013 (CET)

For Zentyal > 3.5 use port 389, < version 3.5 use prot 390 (!):

root@zentyal:~# ldapsearch -x -p 389 -LLL -h localhost -b "" -s base "(objectclass=*)" supportedSASLMechanisms dn

dn:

supportedSASLMechanisms: GSS-SPNEGO
supportedSASLMechanisms: GSSAPI
supportedSASLMechanisms: NTLM
ldapsearch -x -h localhost -D "testuser@zentyaldomain.sld" -W-b "cn=users,dc=zentyaldomain,dc=sld" -s sub "(cn=*)" cn mail sn


Redmine

This is tested with Zentyal 3.2 on Ubuntu 12.04 LTS and Redmine 2.3.3-2 (via ppa). ! Be aware and read the section LDAP port changed on Zentyal 3.2 !

On the users and group-page in the zentyal administration page there are the credentials you need to get readonly access to LDAP.

LDAP credentials in zentyal:

Basedomain (Base DN): dc=your_domain,dc=your_tld
Rootdomain (Root DN): 	cn=zentyal,dc=your_domain,dc=your_tld
Password: 	        <admin_secret_pass>
Read-only root DN: 	cn=zentyalro,dc=your_domain,dc=your_tld
Read-only password: <ro_secret_pass>
Default Users DN: 	ou=Users,dc=your_domain,dc=your_tld
Default Groups DN: 	ou=Groups,dc=your_domain,dc=your_tld 

For testing, if you have the right credential, you can use e.g. the free and opensource JXplorer or the commandline:

Check if, the server accepts incoming port

telnet <IP_OF_LDAP_SERVER> 390


ldapsearch -x -p 390 -b "<Basedomain (Base DN)>" -h <IP_OF_LDAP_SERVER> \
-D "<Read-only root DN>" -w "<Read-only password>"

Figured that out, you can e.g. use LDAP in Redmine like this:

Owncloud

See Owncloud#Owncloud.2C_LDAP_and_Zentyal.

And the thread here:

PfSense

Works with Zentyal 3.4x via Port 389.

And finally (01/2016) works with Zentyal 4.2:

For login credentials you have to use something like someuser@zentyaldomain.lan and NOT something like CN=Users,DC=....

In the following pictures for testing purpose I created the user "test.test" within zentyal. But you can use any user you like to get a readonly access to ldap.

LDAP at port 389:

Pfsense22 ldap zentyal42.png

LDAPS at port 686

For ldaps:// you have to import the zentyal certificate into pfsense.

To get these data the easiest way is to log into your zentyal domain controller do:

openssl s_client -showcerts -connect localhost:636 

Then copy the certificate data. Open the cert manager within pfsense webinterface and create (import) a new CA using this certificate (paste it into the public key section).

When configuring the server: you have to use the full qualified domain name for the server address, not the IP if you are using ssl:

Also see:

* https://www.wildcardcorp.com/blog/pfsense-and-users-from-zentyal-4-0-over-ldaps


Pfsense22 ldaps zentyal42.png

Network

Zentyal completely cares for the network on your ubuntu server.

Therefore you should - but do not have to - disable the network-manager:

sudo service network-manager stop

Create an override file for the upstart job:

echo "manual" | sudo tee /etc/init/network-manager.override

Then configure your network cards with zentyal and be sure to enable the WAN switch, if you are using zentyal on an internetserver without a gateway in front of it, that is, if your server ip is an internet ip address:

20131006 Zentyal Network 1.png

VPN

A good guide:

On a kvm based vserver (netcup.de) check, if the following configurations are enabled:

Enable ip_forward:

echo "1" > /proc/sys/net/ipv4/ip_forward

Forward tap0:

iptables -A FORWARD -i eth0 -o tap0 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i tap0 -o eth0 -j ACCEPT

or tun0, if you are using tun:

iptables -A FORWARD -i eth0 -o tun0 -m state --state RELATED,ESTABLISHED -j ACCEPT
iptables -A FORWARD -i tun0 -o eth0 -j ACCEPT

BUT: this won't work in a virtual guest (vserver) due to NAT:

Mail

First of all we like to install an e-mail-system. This is what most users want, when they install zentyal on an vserver.

If you only choose the mail plugin, several plugins will be installed, too:

Zentyal mail 1.png

In the next steps, it is important that you

  1. choose eth0 as interface (see picture) and later
  2. DHCP for the configuration of eth0.
  3. Directly afterwards you will be asked for the Kerberos REALM. Please use the domain name of your server, if configured. If not SKIP this step for now!

Zeentyal Mail 2.png

Virtualisation module moved

Like advised here ...

... some of the modules - especially the virtualisation module - have moved to a so called contribution section.

[...]
Moreover, as announced in the Forum, the following modules have been moved to the contrib repositories in order to live
up to our motto of being an easy-to-use Linux small business server:
* PPTP
* Virtualization
* Thin clients
* VoIP
[...]

A solution can be found here:

Customization

A Zentyal system can be adopted to your own needs in a very easy way: using hooks!

Every service on a Linux system is configured in its own configuration file. Mostly living in /etc/.... Zentyal stores the setting of all services in so called "stubs". These templates can be overridden using hooks.

But using hooks make the system more complex. This means: when doing updates of your zentyal system, you have to be careful and integrate actual changes of zentyal's stub into your own hook. Your own hooks are not updated automatically as well.

How this is done:

Also see the section Zentyal#Firewall.

Samba4 - changing the REALM

Sometimes it can be necessary to alter the realm (kerberos). This will brake all user related modules and forces them to reinstall:

/usr/share/zentyal-users/reinstall
  1. Then klick on the "Ally"-Button on the upper right corner of the web-interface.
  2. Then go to "Users" -> "Mode...", change the realm and apply.
  3. Then you have to reenable the "Users"-module and apply the changes.
  4. Then you can also reenable the "Samba"-module and apply the changes.

see: http://trac.zentyal.org/ticket/5695

Openchange

Enable the vacation plugin

1. Create a new stubs directory in '/etc/zentyal'

mkdir -p mkdir -p /etc/zentyal/stubs/openchange/

2. Copy over the standard stub for openchange to the newly created directory

cp /usr/share/zentyal/stubs/openchange/sogo.conf.mas /etc/zentyal/stubs/openchange/

3. Change the sieve plugin configuration vim /etc/zentyal/stubs/openchange/sogo.conf.mas

    /* Sieve configuration */
   /* SOGoVacationEnabled = NO; */
   SOGoVacationEnabled = YES;
   [...]

4. Restart openchange service

service zentyal openchange restart
 * Restarting Zentyal module: openchange       [ OK ]

5. The plugin is visible now in your email preferences as a new button ("vacation" in English).

Thanks: https://forum.zentyal.org/index.php?topic=25649.0

Reprovisioning fails

[4.2] The HACK promoted hier Worked for me in nZentyal 4.2 on Ubuntu 14.04 (June 2016) to reprovision Openchange after enabling / reenabling the module:

vim /usr/lib/python2.7/dist-packages/openchange/provision.py +466


add the line schemas = []

               'description': 'Extend existing Samba classes and attributes',
               'modify_mode': True}]
   schemas = []
   for schema in schemas:
       try:

[4.0] Worked for me in 2015

In my case it helped to alter the call of the provisioning call and add "--ignore-already-exists" into the line:

vim  /usr/share/perl5/EBox/OpenChange/Model/Provision.pm +457

try {  
  my $cmd = "openchange_provision --ignore-already-exists --firstorg='$organizationName' ";


Another

Active sync

Read carefully the section about Active sync ...

... and you will see you have to install manually ...

sudo apt-get install sogo-activesync

... to get the choice on the Openchange site.

Samba 4 error

If yout get the error:

> Could not get ticket: could not acquire credentials using an initial credentials context: Password has expired

See:

sudo samba-tool user setexpiry administrator --noexpiry

The same applies to mail module > Could not get ticket: could not acquire credentials using an initial credentials context: No ENC-TS found

Monitoring Services

Apache

With e.g. monit: see Server_Monitoring#Zentyal_Apache2.

Radius

There seems to be a problem with freeradius and Zentyal 3.4.

update-alternatives -f freeradius remove
vim ~/bin/monitor_zentyal_radius


# !/bin/bash

# Monitor radius

restart_radius() {
      /usr/sbin/service zentyal radius stop
      sleep 2
      /usr/bin/killall freeradius
           
      /usr/sbin/service zentyal radius start
}
 
while (true)
do
       if radtest radtestuser 123-qwe localhost 1812 123-qwe
       then
               echo "RADIUS OK"
 
       else
               logger "ERROR: ZENTYAL RADIUS is DOWN ... restarting ..."
               restart_radius
       fi
 
       sleep 15
 
done

Docker

No solution yet: posted a thread in the zentyal forum and started investigations into the subject. See:

Also see Docker for basic docker informations on Ubuntu.