Hi, I'm new with Virtualmin, I just installed the GPL version of Virtualmin on an Ubuntu16.04.01 LTS server.
I can access the panel without any problems and I can create a virtual server both from the Virtualmin Tab > Create Virtual Server and the Webmin Servers > Apache Webservers > Create Virtual Host tab. And I followed the instructions from Virtualmin's video tutorial on YouTube, and it seems everything was ok, but when I go to my domain (my site.com) I just get a "Server not found" error. But when I use the "preview website" option in virtualmin I can see the site. It's really weird.
Also, I did upload a fresh install of Wordpress in the /home/myfolder/public_html/ document root directory
I checked my DNS settings on IntoDNS.com and got the following Errors below:
Error Mismatched NS records WARNING: One or more of your nameservers did not return any of your NS records. Error DNS servers responded ERROR: One or more of your nameservers did not respond: The ones that did not respond are: my.ip.address
Multiple Nameservers ERROR: Looks like you have less than 2 nameservers. According to RFC2182 section 5 you must have at least 3 nameservers, and no more than 7. Having 2 nameservers is also ok by me. * ( I have two nameservers setup, so I don't understand that)
Missing nameservers reported by your nameservers You should already know that your NS records at your nameservers are missing, so here it is again:
ns2.mysite.com. ns1.mysite.com.
SOA Error SOA record No valid SOA record came back!
MX Error MX Records Oh well, I did not detect any MX records so you probably don't have any and if you know you should have then they may be missing at your nameservers!
WWW Error WWW A Record ERROR: I could not get any A records for www.mysite.com!
(I only do a cache request, if you recently added a WWW A record, it might not show up here.)
Any help?
Thanks
Howdy,
It sounds like your issue is DNS related. It may be that BIND isn't listening for requests, or there may be a firewall blocking access to BIND.
What is the output of these commands:
netstat -an | grep :53
iptables -L -n
Hey thanks for the reply...
The first command returned this:
tcp 0 0 10.10.0.5:53 0.0.0.0:* LISTEN
tcp 0 0 162.243.164.137:53 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:53 0.0.0.0:* LISTEN
tcp6 0 0 :::53 :::* LISTEN
udp 0 0 10.10.0.5:53 0.0.0.0:*
udp 0 0 162.243.164.137:53 0.0.0.0:*
udp 0 0 127.0.0.1:53 0.0.0.0:*
udp6 0 0 :::53 :::*
the second this:
Chain INPUT (policy DROP) target prot opt source destination
ufw-before-logging-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-before-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-logging-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-reject-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-track-input all -- 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP) target prot opt source destination
ufw-before-logging-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-before-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-logging-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-reject-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-track-forward all -- 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT) target prot opt source destination
ufw-before-logging-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-before-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-logging-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-reject-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-track-output all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-after-forward (1 references) target prot opt source destination
Chain ufw-after-input (1 references) target prot opt source destination
ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137 ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138 ufw-skip-to-policy-input tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:139 ufw-skip-to-policy-input tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445 ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67 ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68 ufw-skip-to-policy-input all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
Chain ufw-after-logging-forward (1 references) target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-after-logging-input (1 references) target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-after-logging-output (1 references) target prot opt source destination
Chain ufw-after-output (1 references) target prot opt source destination
Chain ufw-before-forward (1 references) target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 4 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 12 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 ufw-user-forward all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-before-input (1 references) target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED ufw-logging-deny all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 4 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 12 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68 ufw-not-local all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353 ACCEPT udp -- 0.0.0.0/0 239.255.255.250 udp dpt:1900 ufw-user-input all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-before-logging-forward (1 references) target prot opt source destination
Chain ufw-before-logging-input (1 references) target prot opt source destination
Chain ufw-before-logging-output (1 references) target prot opt source destination
Chain ufw-before-output (1 references) target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED ufw-user-output all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-logging-allow (0 references) target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW ALLOW] "
Chain ufw-logging-deny (2 references) target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID limit: avg 3/min burst 10 LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-not-local (1 references) target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type MULTICAST RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST ufw-logging-deny all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-reject-forward (1 references) target prot opt source destination
Chain ufw-reject-input (1 references) target prot opt source destination
Chain ufw-reject-output (1 references) target prot opt source destination
Chain ufw-skip-to-policy-forward (0 references) target prot opt source destination
DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-skip-to-policy-input (7 references) target prot opt source destination
DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-skip-to-policy-output (0 references) target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-track-forward (1 references) target prot opt source destination
Chain ufw-track-input (1 references) target prot opt source destination
Chain ufw-track-output (1 references) target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW
Chain ufw-user-forward (1 references) target prot opt source destination
Chain ufw-user-input (1 references) target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:22 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:25 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 80,443 /* 'dapp_Apache%20Full' */ ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:10000 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:10000
Chain ufw-user-limit (0 references) target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 0 level 4 prefix "[UFW LIMIT BLOCK] " REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain ufw-user-limit-accept (0 references) target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-user-logging-forward (0 references) target prot opt source destination
Chain ufw-user-logging-input (0 references) target prot opt source destination
Chain ufw-user-logging-output (0 references) target prot opt source destination
Chain ufw-user-output (1 references) target prot opt source destination
Thanks again.
Howdy,
It looks like BIND is up and running, and listening on all interfaces.
What stands out to me, is that there's a firewall there with quite a few rules in it.
It's hard to follow exactly, but I have a hunch that the firewall may be the culprit in preventing access to BIND/DNS.
It looks like you have UFW installed there for handling firewall duties -- could you temporarily disable UFW, and any remaining firewall rules, then try again?
If it works at that point, then it just means you need to tweak your firewall settings.
-Eric
Okay I disabled the firewall and it's now pulling up the domain but now the usual wordpress install page isn't showing, it's just showing this:
<?php /** * Front to the WordPress application. This file doesn't do anything, but loads * wp-blog-header.php which does and tells WordPress to load the theme. * * @package WordPress */
/** * Tells WordPress to load the WordPress theme and output it. * * @var bool */ define('WP_USE_THEMES', true);
/** Loads the WordPress Environment and Template */ require( dirname( FILE ) . '/wp-blog-header.php' );
Also I need a firewall, so is there any particular ports that I need to keep open. This is what I had open before disabling it.
Status: active Logging: on (low) Default: deny (incoming), allow (outgoing), disabled (routed) New profiles: skip
To Action From -- ------ ---- 22 ALLOW IN Anywhere
80/tcp ALLOW IN Anywhere
443/tcp ALLOW IN Anywhere
25/tcp ALLOW IN Anywhere
80,443/tcp (Apache Full) ALLOW IN Anywhere
10000 ALLOW IN Anywhere
22 (v6) ALLOW IN Anywhere (v6)
80/tcp (v6) ALLOW IN Anywhere (v6)
443/tcp (v6) ALLOW IN Anywhere (v6)
25/tcp (v6) ALLOW IN Anywhere (v6)
80,443/tcp (Apache Full (v6)) ALLOW IN Anywhere (v6)
10000 (v6) ALLOW IN Anywhere (v6)
Also not sure if this means anything but before i disabled it, I did this command listed below, from a search on youtube and it showed this:
sudo grep -i ' virtualhost' /etc/apache2/sites-enabled/*.conf VirtualHost *:80
Then when I disabled it, it showed this:
sudo grep -i ' virtualhost' /etc/apache2/sites-enabled/*.conf VirtualHost 162.243.164.137:80
Also did command
netstat -ln |grep 10000
tcp 0 0 0.0.0.0:10000 0.0.0.0:* LISTEN
udp 0 0 0.0.0.0:10000 0.0.0.0:*
And before disable, when I did an NS Lookup command, it showed this
sudo nslookup www.mysite.com
;; Got SERVFAIL reply from 2001:4860:4860::8844, trying next server ;; Got SERVFAIL reply from 2001:4860:4860::8888, trying next server Server: 8.8.8.8 Address: 8.8.8.8#53
** server can't find www.mysite.com: SERVFAIL
Then after disabling the firewall it showed results but I don't know what server and address this is.
sudo nslookup www.mysite.com Server: 2001:4860:4860::8844 Address: 2001:4860:4860::8844#53
Non-authoritative answer: Name: www.mysite.com Address: 162.243.164.137
Thanks
It's simplest to tackle one issue at a time, so let's go over the Wordpress issue you described there --
It looks like it's just displaying the PHP code, rather than executing it, is that correct?
What's the output of this command:
dpkg -l 'php*'
Also, if you go into System Settings -> Re-Check Config, does it detect any problems?
-Eric