-
Zextras Carbonio 23.6.0
-
-
- Older Version's Changelogs
- Changelog Version 23.2.0
- Changelog version 23.3.0
- Changelog Version 23.4.0
- Changelog Version 23.5.0
- Changelog Version 23.7.0
- Changelog Version 23.6.0
- Changelog version 23.9.0
- Changelog Version 23.10.0
- Changelog for Release 23.11.0 of Carbonio
- Changelog for Release 23.12.0 of Carbonio
-
-
-
-
Carbonio Community Edition
-
Suite for Zimbra
- Zextras Suite documentation
- Introduction
- Installation Instructions for Zextras Suite
- Licencing of Zextras Suite
- File Management for Licences
- Zextras Backup
- Backup and Restore by Zextras
- Zextras Backup Advanced Methods
- Zextras for Mobile
- Service for Address Books
- Troubleshooting Zextras Mobile
- Powerstore Zextras
- The Indexing of Attachments
- Extractor of External Content
- Delegated Admin Provisioning Zextras Admin
- The Zextras Drive
- Docs Zextras
- Authentique Zextras
- Team Zextras
- Video Server Zextras
- CLI
- next6 back
-
- Changelog for Zextras 3.1.x releases
- Changelog for Zextras Suite 3.2.0
- Changelog for Zextras Suite 3.3.0
- Zextras Suite Changelog - Release 3.4.0
- Changelog for Zextras Suite 3.5.0
- Changelog for Zextras Suite 3.6.0
- Changelog for Zextras Suite 3.7.0
- Changelog for Zextras Suite 3.8.0
- Changelog for Zextras Suite 3.9.0
- Changelog for Zextras Suite 3.10.0
- Changelog for Zextras Suite 3.11.0
- Changelog for Zextras Suite 3.12.0
- Changelog for Zextras Suite 3.13.0
- Changelog for Zextras Suite 3.14.0
- Changelog for Zextras Suite 3.15.0
- Changelog for Zextras Suite 3.16.0
- Changelog for Zextras Suite 3.17.0
- Changelog for Zextras Suite 3.18.0
- Zextras Suite Changelog - Release 3.19.0
- next4 back
Carbonio Mesh’s credentials are kept in /etc/zextras/service-discover/cluster-credentials.tar.gpg, a GPG-encrypted tar archive. The tar archive contains:
- The Bootstrap token
- Carbonio Mesh’s internal CA and matching private key
- The encryption keys
The file containing the Carbonio Mesh credentials must be available and accessible throughout different administrative actions, including Carbonio setup and upgrade, pending-setups, and other small procedures involving Carbonio components.
The file indicated above is GPG-encrypted with a secret (which is simply another password) saved in /var/lib/service-discover/password and accessible only to the root user. The secret is required when using the pending-setups command and the Service Discover installation procedure.
So, if you can’t remember your password, connect in as root to any Carbonio Mesh Server and read the /var/lib/service-discover/password file.
If you wish to modify the secret or need to update it (for example, because it has been hacked, shared with or communicated to the incorrect people, or one of your company’s system administrators has departed), you must reset Carbonio Mesh Credentials.
Reset Carbonio Mesh credentials.
On a Multi-Server, before beginning the operation, it is required to identify the Leader Node, on which to do certain preliminary chores, then erase the old secret, produce a new one, and lastly set up the other nodes by copying the credentials and restarting the service.
Identify and log onto the Carbonio Mesh leader node. While this is often the node on which the Directory Server is deployed, the actual leader may differ. To identify the right IP, log onto a Directory Server node and perform the command as the zextras user.
This will list all Carbonio Mesh servers: To ensure that you are on the leader node, execute the following command.
The output will include an IP address and a port, such as 172.16.0.12:8300. If this IP address differs from the Directory Server’s, connect to the latter at 172.16.0.12.
Remove Old Credentials
The initial action, performed as the service-discover user, is to save the current reset index to a file, allowing a new ACL token to be produced. As mentioned in the instance above, the value is 908 (alter it according to the output you obtain), thus we must execute.
Then terminate the service discovery service.
Remove the following two files.
Finally, delete any certificates connected to service discovery.
Generate New Credentials
The first job is to create a new, strong password, which we save in a temporary variable for further protection. Remember to keep the password somewhere secure in case you need it in the future.
When asked, enter your preferred password and then perform the setup as the first instance.
This is virtually the same command as the one used to configure Carbonio Mesh; the only difference is that we use an explicit IP address and execute it as the first occurrence.
If the operation is successful, you may manually unset the password.
Optionally, check the ACL token using the instructions.
Set up other nodes.
To finish the operation, repeat these steps on each of the remaining Nodes.
Log into one node and then copy the credentials from the leader node.
Stop the service discovery service.
Delete the following two files:
Remove any certificates relevant to service discovery.
Finally, start the Carbonio Mesh setup: Put the MESH_SECRET password specified on the leader node into a variable.
When asked, enter a password of your choosing and execute the setup.
If the operation is successful, you may manually unset the password.