500 internal error on ispconfig3 panel

Discussion in 'Installation/Configuration' started by Tyrant, Dec 21, 2019.

  1. Tyrant

    Tyrant New Member

    hi. i am having a problem. i got this 500 internal server error on ispconfig3 panel url. also all the ports blocked on ispconfig3 panel r open too.
    it was fine last time i checked. and now when i check it gives me this error. the site is working fine on panel but isoconfig3 panel isnt working.

    Code:
    Internal Server Error
    The server encountered an internal error or misconfiguration and was unable to complete your request.
    
    Please contact the server administrator at [email protected] to inform them of the time this error occurred, and the actions you performed just before this error.
    
    More information about this error may be available in the server error log.
    pls help out i am kind of freaking out at the moment.
     
  2. Taleman

    Taleman Well-Known Member HowtoForge Supporter

    What changes were done just before this error appeared?
    I undestand ISPConfig panel is not working, but what is it that you say is working?
    https://www.howtoforge.com/community/threads/please-read-before-posting.58408/
    What shows
    Code:
    systemctl --state=failed
     
  3. Tyrant

    Tyrant New Member

    [spoilder=report]
    [email protected]:/var/log# cat htf_report.txt | more

    ##### SERVER #####
    IP-address (as per hostname): ***.***.***.***
    [WARN] could not determine server's ip address by ifconfig
    [INFO] OS version is Debian GNU/Linux 9.11 (stretch)

    [INFO] ISPConfig is installed.

    ##### ISPCONFIG #####
    ISPConfig version is 3.1.15p2


    ##### VERSION CHECK #####

    [INFO] php (cli) version is 7.4.1

    ##### PORT CHECK #####


    ##### MAIL SERVER CHECK #####


    ##### RUNNING SERVER PROCESSES #####

    [INFO] I found the following web server(s):
    Apache 2 (PID 1608)
    [INFO] I found the following mail server(s):
    Postfix (PID 1255)
    [INFO] I found the following pop3 server(s):
    Dovecot (PID 921)
    [INFO] I found the following imap server(s):
    Dovecot (PID 921)
    [INFO] I found the following ftp server(s):
    PureFTP (PID 16428)

    ##### LISTENING PORTS #####
    (only ()
    Local (Address)
    [anywhere]:993 (921/dovecot)
    [anywhere]:2082 (23193/./xbt_tracker)
    [anywhere]:995 (921/dovecot)
    [localhost]:10024 (1320/amavisd-new)
    [localhost]:10025 (1255/master)
    [localhost]:10026 (1320/amavisd-new)
    [localhost]:10027 (1255/master)
    [anywhere]:587 (1255/master)
    [localhost]:11211 (835/memcached)
    [anywhere]:110 (921/dovecot)
    [anywhere]:143 (921/dovecot)
    [anywhere]:8080 (1608/apache2)
    [anywhere]:80 (1608/apache2)
    [anywhere]:8081 (1608/apache2)
    [anywhere]:465 (1255/master)
    [anywhere]:21 (16428/pure-ftpd)
    ***.***.***.***:53 (843/named)
    [localhost]:53 (843/named)
    [anywhere]:22 (19571/sshd)
    [anywhere]:25 (1255/master)
    [localhost]:953 (843/named)
    [anywhere]:443 (1608/apache2)
    *:*:*:*::*:993 (921/dovecot)
    *:*:*:*::*:995 (921/dovecot)
    *:*:*:*::*:3306 (22807/mysqld)
    *:*:*:*::*:587 (1255/master)
    [localhost]10 (921/dovecot)
    [localhost]43 (921/dovecot)
    *:*:*:*::*:465 (1255/master)
    *:*:*:*::*:21 (16428/pure-ftpd)
    *:*:*:*::*:53 (843/named)
    *:*:*:*::*:22 (19571/sshd)
    *:*:*:*::*:25 (1255/master)




    ##### IPTABLES #####
    Chain INPUT (policy DROP)
    target prot opt source destination
    f2b-pureftpd tcp -- [anywhere]/0 [anywhere]/0 multiport
    dports 21
    f2b-postfix-sasl tcp -- [anywhere]/0 [anywhere]/0 multi
    port dports 25
    f2b-sshd tcp -- [anywhere]/0 [anywhere]/0 multiport dp
    orts 22
    ufw-before-logging-input all -- [anywhere]/0 [anywhere]/0

    ufw-before-input all -- [anywhere]/0 [anywhere]/0
    ufw-after-input all -- [anywhere]/0 [anywhere]/0
    ufw-after-logging-input all -- [anywhere]/0 [anywhere]/0

    ufw-reject-input all -- [anywhere]/0 [anywhere]/0
    ufw-track-input all -- [anywhere]/0 [anywhere]/0

    Chain FORWARD (policy DROP)
    target prot opt source destination
    ufw-before-logging-forward all -- [anywhere]/0 [anywhere]/0

    ufw-before-forward all -- [anywhere]/0 [anywhere]/0
    ufw-after-forward all -- [anywhere]/0 [anywhere]/0
    ufw-after-logging-forward all -- [anywhere]/0 [anywhere]/0

    ufw-reject-forward all -- [anywhere]/0 [anywhere]/0
    ufw-track-forward all -- [anywhere]/0 [anywhere]/0

    Chain OUTPUT (policy ACCEPT)
    target prot opt source destination
    ufw-before-logging-output all -- [anywhere]/0 [anywhere]/0

    ufw-before-output all -- [anywhere]/0 [anywhere]/0
    ufw-after-output all -- [anywhere]/0 [anywhere]/0
    ufw-after-logging-output all -- [anywhere]/0 [anywhere]/0

    ufw-reject-output all -- [anywhere]/0 [anywhere]/0
    ufw-track-output all -- [anywhere]/0 [anywhere]/0

    Chain f2b-postfix-sasl (1 references)
    target prot opt source destination
    REJECT all -- ***.***.***.*** [anywhere]/0 reject-with
    icmp-port-unreachable
    REJECT all -- ***.***.***.*** [anywhere]/0 reject-with
    icmp-port-unreachable
    REJECT all -- ***.***.***.*** [anywhere]/0 reject-with
    icmp-port-unreachable
    RETURN all -- [anywhere]/0 [anywhere]/0

    Chain f2b-pureftpd (1 references)
    target prot opt source destination
    RETURN all -- [anywhere]/0 [anywhere]/0

    Chain f2b-sshd (1 references)
    target prot opt source destination
    REJECT all -- ***.***.***.*** [anywhere]/0 reject-with i
    cmp-port-unreachable
    RETURN all -- [anywhere]/0 [anywhere]/0

    Chain ufw-after-forward (1 references)
    target prot opt source destination

    Chain ufw-after-input (1 references)
    target prot opt source destination
    ufw-skip-to-policy-input udp -- [anywhere]/0 [anywhere]/0
    udp dpt:137
    ufw-skip-to-policy-input udp -- [anywhere]/0 [anywhere]/0
    udp dpt:138
    ufw-skip-to-policy-input tcp -- [anywhere]/0 [anywhere]/0
    tcp dpt:139
    ufw-skip-to-policy-input tcp -- [anywhere]/0 [anywhere]/0
    tcp dpt:445
    ufw-skip-to-policy-input udp -- [anywhere]/0 [anywhere]/0
    udp dpt:67
    ufw-skip-to-policy-input udp -- [anywhere]/0 [anywhere]/0
    udp dpt:68
    ufw-skip-to-policy-input all -- [anywhere]/0 [anywhere]/0
    ADDRTYPE match dst-type BROADCAST

    Chain ufw-after-logging-forward (1 references)
    target prot opt source destination
    LOG all -- [anywhere]/0 [anywhere]/0 limit: avg 3
    /min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

    Chain ufw-after-logging-input (1 references)
    target prot opt source destination
    LOG all -- [anywhere]/0 [anywhere]/0 limit: avg 3
    /min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

    Chain ufw-after-logging-output (1 references)
    target prot opt source destination

    Chain ufw-after-output (1 references)
    target prot opt source destination

    Chain ufw-before-forward (1 references)
    target prot opt source destination
    ACCEPT all -- [anywhere]/0 [anywhere]/0 ctstate RELA
    TED,ESTABLISHED
    ACCEPT icmp -- [anywhere]/0 [anywhere]/0 icmptype 3
    ACCEPT icmp -- [anywhere]/0 [anywhere]/0 icmptype 4
    ACCEPT icmp -- [anywhere]/0 [anywhere]/0 icmptype 11
    ACCEPT icmp -- [anywhere]/0 [anywhere]/0 icmptype 12
    ACCEPT icmp -- [anywhere]/0 [anywhere]/0 icmptype 8
    ufw-user-forward all -- [anywhere]/0 [anywhere]/0

    Chain ufw-before-input (1 references)
    target prot opt source destination
    ACCEPT all -- [anywhere]/0 [anywhere]/0
    ACCEPT all -- [anywhere]/0 [anywhere]/0 ctstate RELA
    TED,ESTABLISHED
    ufw-logging-deny all -- [anywhere]/0 [anywhere]/0 ctsta
    te INVALID
    DROP all -- [anywhere]/0 [anywhere]/0 ctstate INVA
    LID
    ACCEPT icmp -- [anywhere]/0 [anywhere]/0 icmptype 3
    ACCEPT icmp -- [anywhere]/0 [anywhere]/0 icmptype 4
    ACCEPT icmp -- [anywhere]/0 [anywhere]/0 icmptype 11
    ACCEPT icmp -- [anywhere]/0 [anywhere]/0 icmptype 12
    ACCEPT icmp -- [anywhere]/0 [anywhere]/0 icmptype 8
    ACCEPT udp -- [anywhere]/0 [anywhere]/0 udp spt:67 d
    pt:68
    ufw-not-local all -- [anywhere]/0 [anywhere]/0
    ACCEPT udp -- [anywhere]/0 ***.***.***.*** udp dpt:535
    3
    ACCEPT udp -- [anywhere]/0 ***.***.***.*** udp dpt:1900
    ufw-user-input all -- [anywhere]/0 [anywhere]/0

    Chain ufw-before-logging-forward (1 references)
    target prot opt source destination

    Chain ufw-before-logging-input (1 references)
    target prot opt source destination

    Chain ufw-before-logging-output (1 references)
    target prot opt source destination

    Chain ufw-before-output (1 references)
    target prot opt source destination
    ACCEPT all -- [anywhere]/0 [anywhere]/0
    ACCEPT all -- [anywhere]/0 [anywhere]/0 ctstate RELA
    TED,ESTABLISHED
    ufw-user-output all -- [anywhere]/0 [anywhere]/0

    Chain ufw-logging-allow (0 references)
    target prot opt source destination
    LOG all -- [anywhere]/0 [anywhere]/0 limit: avg 3
    /min burst 10 LOG flags 0 level 4 prefix "[UFW ALLOW] "

    Part 1
     
  4. Tyrant

    Tyrant New Member

    Part 2

    Chain ufw-logging-deny (2 references)
    target prot opt source destination
    RETURN all -- [anywhere]/0 [anywhere]/0 ctstate INVA
    LID limit: avg 3/min burst 10
    LOG all -- [anywhere]/0 [anywhere]/0 limit: avg 3
    /min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "

    Chain ufw-not-local (1 references)
    target prot opt source destination
    RETURN all -- [anywhere]/0 [anywhere]/0 ADDRTYPE mat
    ch dst-type LOCAL
    RETURN all -- [anywhere]/0 [anywhere]/0 ADDRTYPE mat
    ch dst-type MULTICAST
    RETURN all -- [anywhere]/0 [anywhere]/0 ADDRTYPE mat
    ch dst-type BROADCAST
    ufw-logging-deny all -- [anywhere]/0 [anywhere]/0 limit
    : avg 3/min burst 10
    DROP all -- [anywhere]/0 [anywhere]/0

    Chain ufw-reject-forward (1 references)
    target prot opt source destination

    Chain ufw-reject-input (1 references)
    target prot opt source destination

    Chain ufw-reject-output (1 references)
    target prot opt source destination

    Chain ufw-skip-to-policy-forward (0 references)
    target prot opt source destination
    DROP all -- [anywhere]/0 [anywhere]/0

    Chain ufw-skip-to-policy-input (7 references)
    target prot opt source destination
    DROP all -- [anywhere]/0 [anywhere]/0

    Chain ufw-skip-to-policy-output (0 references)
    target prot opt source destination
    ACCEPT all -- [anywhere]/0 [anywhere]/0

    Chain ufw-track-forward (1 references)
    target prot opt source destination

    Chain ufw-track-input (1 references)
    target prot opt source destination

    Chain ufw-track-output (1 references)
    target prot opt source destination
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 ctstate NEW
    ACCEPT udp -- [anywhere]/0 [anywhere]/0 ctstate NEW

    Chain ufw-user-forward (1 references)
    target prot opt source destination

    Chain ufw-user-input (1 references)
    target prot opt source destination
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:20
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:25
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:53
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:80
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:110
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:143
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:443
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:465
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:587
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:993
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:995
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:3306
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:8080
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:1000
    0
    ACCEPT udp -- [anywhere]/0 [anywhere]/0 udp dpt:53
    ACCEPT udp -- [anywhere]/0 [anywhere]/0 udp dpt:3306
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:2082
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 multiport dp
    orts 40110:40210
    ACCEPT tcp -- [anywhere]/0 [anywhere]/0 tcp dpt:22

    Chain ufw-user-limit (0 references)
    target prot opt source destination
    LOG all -- [anywhere]/0 [anywhere]/0 limit: avg 3
    /min burst 5 LOG flags 0 level 4 prefix "[UFW LIMIT BLOCK] "
    REJECT all -- [anywhere]/0 [anywhere]/0 reject-with
    icmp-port-unreachable

    Chain ufw-user-limit-accept (0 references)
    target prot opt source destination
    ACCEPT all -- [anywhere]/0 [anywhere]/0

    Chain ufw-user-logging-forward (0 references)
    target prot opt source destination

    Chain ufw-user-logging-input (0 references)
    target prot opt source destination

    Chain ufw-user-logging-output (0 references)
    target prot opt source destination

    Chain ufw-user-output (1 references)
    target prot opt source destination
    [/spoiler]

    what i did was opened the ftp port 21 uploaded some files then i closed port and logged out. last time. when i try to lon now it gives me 500 internal server error. also the ports r all open too.
     
  5. Tyrant

    Tyrant New Member

    also this.

    Code:
    [email protected]:/var/log# systemctl --state=failed
      UNIT               LOAD   ACTIVE SUB    DESCRIPTION
    ‚óŹ networking.service loaded failed failed Raise network interfaces
    
    LOAD   = Reflects whether the unit definition was properly loaded.
    ACTIVE = The high-level unit activation state, i.e. generalization of SUB.
    SUB    = The low-level unit activation state, values depend on unit type.
    
    1 loaded units listed. Pass --all to see loaded but inactive units, too.
    To show all installed unit files use 'systemctl list-unit-files'.
    
     
  6. Taleman

    Taleman Well-Known Member HowtoForge Supporter

    Internet is not working on that machine. Not on server right now so can not check command, try
    Code:
    systemctl start networking.service
     
  7. Tyrant

    Tyrant New Member

    Code:
    [email protected]:/var/log# systemctl start networking.service
    Job for networking.service failed because the control process exited with error code.
    See "systemctl status networking.service" and "journalctl -xe" for details.
    
     
  8. Taleman

    Taleman Well-Known Member HowtoForge Supporter

     
  9. Tyrant

    Tyrant New Member

    Gives same network failed thing on those commands and other things works fine. Btw i just asked other guy who have access to server he said he deleted the php 7.0 as server is running the other version. Could that cause all this? If thats it then reinstalling the php 7.0 can solve the problem?

    Or maybe the update ispconfig script can fix it? Its already on latest but just asking.
     
  10. Steini86

    Steini86 Active Member

    That is your problem. ISPconfig does not work, if you remove the PHP version shipped with the operating system.
    You could upgrade to Debian 10 which uses PHP7.3 as default. At least better than using 7.0.
    You can also try to fix this, but I think it is easier to restore the old php version. The forum is full of that problem, if you have more questions they have been probably answered there.
     
    Tyrant likes this.
  11. Tyrant

    Tyrant New Member

    Ty bud. I kinda of tried reinstalling the php7.0 but it didnt work. Didnt know updating os will solve the problem. I was actually freaking out. So i took the last option of redoing server from scratch without panel. I couldnt even took backups or anything and i lost alot of activity.
     
    Steini86 likes this.
  12. Steini86

    Steini86 Active Member

    Hope you installed the latest debian version right away ;)
    Unfortunately, that is not a good guide and will lead to mistakes
    I'm almost sorry for that (but: No backup, no mercy!). You should have read the forum a bit more: A lot of people had this problem and there were guides out there how to solve that problem (See #10 in the guide: https://www.howtoforge.com/tutorial...fig-3-from-debian-packages-on-debian-8-and-9/).
     
    Tyrant likes this.

Share This Page