On 7 Sep 2016 at 18:38, Mike Wright wrote: Subject: Re: Issue with ftp making connection but not list? To: Community support for Fedora users <users@xxxxxxxxxxxxxxxxxxxxxxx> From: Mike Wright <nobody@xxxxxxxxxxxxxxxxxxxx> Date sent: Wed, 7 Sep 2016 18:38:46 -0700 Send reply to: Community support for Fedora users <users@xxxxxxxxxxxxxxxxxxxxxxx> > On 09/07/2016 05:26 PM, Michael D. Setzer II wrote: > > On 7 Sep 2016 at 16:32, Mike Wright wrote: > > <snip> > > 1) ftp uses tcp > 2) ftp uses port 21 in both ACTIVE and PASSIVE modes > 3) ftp also uses port 20 in ACTIVE mode > > I want to make sure I understand what is going on. > > d7r is the fedora24 host, correct? > > ftp from d7q to d7r (192.168.7.218) does not work, correct? > > ftp from d7q to d7t (192.168.7.220) works, is that correct? > > If you turn off the firewall on d7r you can successfully ftp from d7q to > d7r, correct? > > What I see is: > > --> 1 d7r.guamcc.net (192.168.7.218) 0.199 ms !X 0.154 ms !X > 0.141 ms > > The above line shows a "prohibited" status when tracerouting to d7r. > > --> [msetzerii@d7q ~]$ ncftpls ftp://192.168.7.218 > --> connect failed: No route to host. > > The above error could indicate that a desired port is not open or it may > be because access to that host is "prohibited" in some way. > > The iptables-save output from host d7r that you provided shows only port > 21 tcp open so you MUST use PASSIVE mode when connecting to that machine. > > It is possible that you are using ACTIVE mode. If so, the firewall must > also allow port 20 tcp to accept connections. > > > > > > >>>>> traceroute to 192.168.7.220 (192.168.7.220), 30 hops max, 60 byte > >>>>> packets > >>>>> > >>>>> 1 d7t.guamcc.net (192.168.7.220) 0.122 ms 0.091 ms 0.080 ms > >>>>> > >>>>> traceroute to 192.168.7.218 (192.168.7.218), 30 hops max, 60 byte > >>>>> packets > >>>>> > >>>>> !X > Seems that only the Fedora 24 systems are the issue? Can connected to older fedora, ubuntu, and even an old 98 machine running slimftp with no problems. I had tried added ports 20-21 with both tcp and udp settings in firewall-config, but it didn't work?? Just tied again, but manually do each one separately. Now it does connect, and can list files. Works if I set passive on and off?? Didn't have that before and it worked?? # Generated by iptables-save v1.4.21 on Thu Sep 8 13:06:58 2016 *raw :PREROUTING ACCEPT [98:16618] :OUTPUT ACCEPT [103:43829] :OUTPUT_direct - [0:0] :PREROUTING_direct - [0:0] -A PREROUTING -j PREROUTING_direct -A OUTPUT -j OUTPUT_direct COMMIT # Completed on Thu Sep 8 13:06:58 2016 # Generated by iptables-save v1.4.21 on Thu Sep 8 13:06:58 2016 *nat :PREROUTING ACCEPT [23:1316] :INPUT ACCEPT [5:300] :OUTPUT ACCEPT [1:60] :POSTROUTING ACCEPT [1:60] :OUTPUT_direct - [0:0] :POSTROUTING_ZONES - [0:0] :POSTROUTING_ZONES_SOURCE - [0:0] :POSTROUTING_direct - [0:0] :POST_public - [0:0] :POST_public_allow - [0:0] :POST_public_deny - [0:0] :POST_public_log - [0:0] :PREROUTING_ZONES - [0:0] :PREROUTING_ZONES_SOURCE - [0:0] :PREROUTING_direct - [0:0] :PRE_public - [0:0] :PRE_public_allow - [0:0] :PRE_public_deny - [0:0] :PRE_public_log - [0:0] -A PREROUTING -j PREROUTING_direct -A PREROUTING -j PREROUTING_ZONES_SOURCE -A PREROUTING -j PREROUTING_ZONES -A OUTPUT -j OUTPUT_direct -A POSTROUTING -s 192.168.122.0/24 -d 224.0.0.0/24 -j RETURN -A POSTROUTING -s 192.168.122.0/24 -d 255.255.255.255/32 -j RETURN -A POSTROUTING -s 192.168.122.0/24 ! -d 192.168.122.0/24 -p tcp -j MASQUERADE --to-ports 1024-65535 -A POSTROUTING -s 192.168.122.0/24 ! -d 192.168.122.0/24 -p udp -j MASQUERADE --to-ports 1024-65535 -A POSTROUTING -s 192.168.122.0/24 ! -d 192.168.122.0/24 -j MASQUERADE -A POSTROUTING -j POSTROUTING_direct -A POSTROUTING -j POSTROUTING_ZONES_SOURCE -A POSTROUTING -j POSTROUTING_ZONES -A POSTROUTING_ZONES -o enp2s0 -g POST_public -A POSTROUTING_ZONES -g POST_public -A POST_public -j POST_public_log -A POST_public -j POST_public_deny -A POST_public -j POST_public_allow -A PREROUTING_ZONES -i enp2s0 -g PRE_public -A PREROUTING_ZONES -g PRE_public -A PRE_public -j PRE_public_log -A PRE_public -j PRE_public_deny -A PRE_public -j PRE_public_allow COMMIT # Completed on Thu Sep 8 13:06:58 2016 # Generated by iptables-save v1.4.21 on Thu Sep 8 13:06:58 2016 *mangle :PREROUTING ACCEPT [98:16618] :INPUT ACCEPT [98:16618] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [103:43829] :POSTROUTING ACCEPT [103:43829] :FORWARD_direct - [0:0] :INPUT_direct - [0:0] :OUTPUT_direct - [0:0] :POSTROUTING_direct - [0:0] :PREROUTING_ZONES - [0:0] :PREROUTING_ZONES_SOURCE - [0:0] :PREROUTING_direct - [0:0] :PRE_public - [0:0] :PRE_public_allow - [0:0] :PRE_public_deny - [0:0] :PRE_public_log - [0:0] -A PREROUTING -j PREROUTING_direct -A PREROUTING -j PREROUTING_ZONES_SOURCE -A PREROUTING -j PREROUTING_ZONES -A INPUT -j INPUT_direct -A FORWARD -j FORWARD_direct -A OUTPUT -j OUTPUT_direct -A POSTROUTING -o virbr0 -p udp -m udp --dport 68 -j CHECKSUM --checksum-fill -A POSTROUTING -j POSTROUTING_direct -A PREROUTING_ZONES -i enp2s0 -g PRE_public -A PREROUTING_ZONES -g PRE_public -A PRE_public -j PRE_public_log -A PRE_public -j PRE_public_deny -A PRE_public -j PRE_public_allow COMMIT # Completed on Thu Sep 8 13:06:58 2016 # Generated by iptables-save v1.4.21 on Thu Sep 8 13:06:58 2016 *security :INPUT ACCEPT [80:15602] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [103:43829] :FORWARD_direct - [0:0] :INPUT_direct - [0:0] :OUTPUT_direct - [0:0] -A INPUT -j INPUT_direct -A FORWARD -j FORWARD_direct -A OUTPUT -j OUTPUT_direct COMMIT # Completed on Thu Sep 8 13:06:58 2016 # Generated by iptables-save v1.4.21 on Thu Sep 8 13:06:58 2016 *filter :INPUT ACCEPT [0:0] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [103:43829] :FORWARD_IN_ZONES - [0:0] :FORWARD_IN_ZONES_SOURCE - [0:0] :FORWARD_OUT_ZONES - [0:0] :FORWARD_OUT_ZONES_SOURCE - [0:0] :FORWARD_direct - [0:0] :FWDI_public - [0:0] :FWDI_public_allow - [0:0] :FWDI_public_deny - [0:0] :FWDI_public_log - [0:0] :FWDO_public - [0:0] :FWDO_public_allow - [0:0] :FWDO_public_deny - [0:0] :FWDO_public_log - [0:0] :INPUT_ZONES - [0:0] :INPUT_ZONES_SOURCE - [0:0] :INPUT_direct - [0:0] :IN_public - [0:0] :IN_public_allow - [0:0] :IN_public_deny - [0:0] :IN_public_log - [0:0] :OUTPUT_direct - [0:0] -A INPUT -i virbr0 -p udp -m udp --dport 53 -j ACCEPT -A INPUT -i virbr0 -p tcp -m tcp --dport 53 -j ACCEPT -A INPUT -i virbr0 -p udp -m udp --dport 67 -j ACCEPT -A INPUT -i virbr0 -p tcp -m tcp --dport 67 -j ACCEPT -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A INPUT -i lo -j ACCEPT -A INPUT -j INPUT_direct -A INPUT -j INPUT_ZONES_SOURCE -A INPUT -j INPUT_ZONES -A INPUT -m conntrack --ctstate INVALID -j DROP -A INPUT -j REJECT --reject-with icmp-host-prohibited -A FORWARD -d 192.168.122.0/24 -o virbr0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A FORWARD -s 192.168.122.0/24 -i virbr0 -j ACCEPT -A FORWARD -i virbr0 -o virbr0 -j ACCEPT -A FORWARD -o virbr0 -j REJECT --reject-with icmp-port-unreachable -A FORWARD -i virbr0 -j REJECT --reject-with icmp-port-unreachable -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT -A FORWARD -i lo -j ACCEPT -A FORWARD -j FORWARD_direct -A FORWARD -j FORWARD_IN_ZONES_SOURCE -A FORWARD -j FORWARD_IN_ZONES -A FORWARD -j FORWARD_OUT_ZONES_SOURCE -A FORWARD -j FORWARD_OUT_ZONES -A FORWARD -m conntrack --ctstate INVALID -j DROP -A FORWARD -j REJECT --reject-with icmp-host-prohibited -A OUTPUT -o virbr0 -p udp -m udp --dport 68 -j ACCEPT -A OUTPUT -j OUTPUT_direct -A FORWARD_IN_ZONES -i enp2s0 -g FWDI_public -A FORWARD_IN_ZONES -g FWDI_public -A FORWARD_OUT_ZONES -o enp2s0 -g FWDO_public -A FORWARD_OUT_ZONES -g FWDO_public -A FWDI_public -j FWDI_public_log -A FWDI_public -j FWDI_public_deny -A FWDI_public -j FWDI_public_allow -A FWDI_public -p icmp -j ACCEPT -A FWDO_public -j FWDO_public_log -A FWDO_public -j FWDO_public_deny -A FWDO_public -j FWDO_public_allow -A INPUT_ZONES -i enp2s0 -g IN_public -A INPUT_ZONES -g IN_public -A IN_public -j IN_public_log -A IN_public -j IN_public_deny -A IN_public -j IN_public_allow -A IN_public -p icmp -j ACCEPT -A IN_public_allow -p tcp -m tcp --dport 9000:9001 -m conntrack --ctstate NEW -j ACCEPT -A IN_public_allow -p tcp -m tcp --dport 5979 -m conntrack --ctstate NEW -j ACCEPT -A IN_public_allow -p udp -m udp --dport 9000:9001 -m conntrack --ctstate NEW -j ACCEPT -A IN_public_allow -p tcp -m tcp --dport 21 -m conntrack --ctstate NEW -j ACCEPT -A IN_public_allow -d 224.0.0.251/32 -p udp -m udp --dport 5353 -m conntrack --ctstate NEW -j ACCEPT -A IN_public_allow -p tcp -m tcp --dport 5900:5979 -m conntrack --ctstate NEW -j ACCEPT -A IN_public_allow -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW -j ACCEPT -A IN_public_allow -p tcp -m tcp --dport 20 -m conntrack --ctstate NEW -j ACCEPT -A IN_public_allow -p udp -m udp --dport 20 -m conntrack --ctstate NEW -j ACCEPT -A IN_public_allow -p tcp -m tcp --dport 21 -m conntrack --ctstate NEW -j ACCEPT COMMIT # Completed on Thu Sep 8 13:06:58 2016 With the firewall and iptables stopped the traceroute works without the !X or !H, so not sure what needs to be opened to allow that? Traceroutes to only the Fedora 24 machines are showing this? Did just notice if I do the traceroute with -I option it doesn't give the !X? Will have to look into the difference between with -I and without?? Still not clear on why it was working fine before, and now the need to make changes? Don't know what might have been modified?? Thanks. > >> I don't use firewalld but I do speak iptables so I'll try to help if I can. > >> > >> All of the "COMMAND_FAILED" errors are from something trying to delete > >> rules from the firewall, rules that apparently don't exist. > >> > >> As root, on d7t, would you please post the results of iptables-save? > >> > > > > Using machine d7q and d7r. Started the vsftp on d7r, and works if on d7r I > > disable the firewalld service, but not if it is running? > > > > With the Firewalld stopped on d7r (192.168.7.218) > > [msetzerii@d7q ~]$ ncftpls ftp://192.168.7.218 > > pub/ > > > > With the Firewalld started on d7r (192.168.7.218) > > [msetzerii@d7q ~]$ ncftpls ftp://192.168.7.218 > > connect failed: No route to host. > > connect failed: No route to host. > > connect failed: No route to host. > > Falling back to PORT instead of PASV mode. > > [msetzerii@d7q ~]$ > > > > iptables-save output of d7r > > # Generated by iptables-save v1.4.21 on Thu Sep 8 10:12:45 2016 > > *mangle > > :PREROUTING ACCEPT [134:8757] > > :INPUT ACCEPT [134:8757] > > :FORWARD ACCEPT [0:0] > > :OUTPUT ACCEPT [90:16750] > > :POSTROUTING ACCEPT [90:16750] > > :FORWARD_direct - [0:0] > > :INPUT_direct - [0:0] > > :OUTPUT_direct - [0:0] > > :POSTROUTING_direct - [0:0] > > :PREROUTING_ZONES - [0:0] > > :PREROUTING_ZONES_SOURCE - [0:0] > > :PREROUTING_direct - [0:0] > > :PRE_public - [0:0] > > :PRE_public_allow - [0:0] > > :PRE_public_deny - [0:0] > > :PRE_public_log - [0:0] > > -A PREROUTING -j PREROUTING_direct > > -A PREROUTING -j PREROUTING_ZONES_SOURCE > > -A PREROUTING -j PREROUTING_ZONES > > -A INPUT -j INPUT_direct > > -A FORWARD -j FORWARD_direct > > -A OUTPUT -j OUTPUT_direct > > -A POSTROUTING -o virbr0 -p udp -m udp --dport 68 -j CHECKSUM > > --checksum-fill > > -A POSTROUTING -j POSTROUTING_direct > > -A PREROUTING_ZONES -i enp2s0 -g PRE_public > > -A PREROUTING_ZONES -g PRE_public > > -A PRE_public -j PRE_public_log > > -A PRE_public -j PRE_public_deny > > -A PRE_public -j PRE_public_allow > > COMMIT > > # Completed on Thu Sep 8 10:12:45 2016 > > # Generated by iptables-save v1.4.21 on Thu Sep 8 10:12:45 2016 > > *raw > > :PREROUTING ACCEPT [134:8757] > > :OUTPUT ACCEPT [90:16750] > > :OUTPUT_direct - [0:0] > > :PREROUTING_direct - [0:0] > > -A PREROUTING -j PREROUTING_direct > > -A OUTPUT -j OUTPUT_direct > > COMMIT > > # Completed on Thu Sep 8 10:12:45 2016 > > # Generated by iptables-save v1.4.21 on Thu Sep 8 10:12:45 2016 > > *nat > > :PREROUTING ACCEPT [7:384] > > :INPUT ACCEPT [2:148] > > :OUTPUT ACCEPT [0:0] > > :POSTROUTING ACCEPT [0:0] > > :OUTPUT_direct - [0:0] > > :POSTROUTING_ZONES - [0:0] > > :POSTROUTING_ZONES_SOURCE - [0:0] > > :POSTROUTING_direct - [0:0] > > :POST_public - [0:0] > > :POST_public_allow - [0:0] > > :POST_public_deny - [0:0] > > :POST_public_log - [0:0] > > :PREROUTING_ZONES - [0:0] > > :PREROUTING_ZONES_SOURCE - [0:0] > > :PREROUTING_direct - [0:0] > > :PRE_public - [0:0] > > :PRE_public_allow - [0:0] > > :PRE_public_deny - [0:0] > > :PRE_public_log - [0:0] > > -A PREROUTING -j PREROUTING_direct > > -A PREROUTING -j PREROUTING_ZONES_SOURCE > > -A PREROUTING -j PREROUTING_ZONES > > -A OUTPUT -j OUTPUT_direct > > -A POSTROUTING -s 192.168.122.0/24 -d 224.0.0.0/24 -j RETURN > > -A POSTROUTING -s 192.168.122.0/24 -d 255.255.255.255/32 -j RETURN > > -A POSTROUTING -s 192.168.122.0/24 ! -d 192.168.122.0/24 -p tcp -j > > MASQUERADE --to-ports 1024-65535 > > -A POSTROUTING -s 192.168.122.0/24 ! -d 192.168.122.0/24 -p udp -j > > MASQUERADE --to-ports 1024-65535 > > -A POSTROUTING -s 192.168.122.0/24 ! -d 192.168.122.0/24 -j > > MASQUERADE > > -A POSTROUTING -j POSTROUTING_direct > > -A POSTROUTING -j POSTROUTING_ZONES_SOURCE > > -A POSTROUTING -j POSTROUTING_ZONES > > -A POSTROUTING_ZONES -o enp2s0 -g POST_public > > -A POSTROUTING_ZONES -g POST_public > > -A POST_public -j POST_public_log > > -A POST_public -j POST_public_deny > > -A POST_public -j POST_public_allow > > -A PREROUTING_ZONES -i enp2s0 -g PRE_public > > -A PREROUTING_ZONES -g PRE_public > > -A PRE_public -j PRE_public_log > > -A PRE_public -j PRE_public_deny > > -A PRE_public -j PRE_public_allow > > COMMIT > > # Completed on Thu Sep 8 10:12:45 2016 > > # Generated by iptables-save v1.4.21 on Thu Sep 8 10:12:45 2016 > > *security > > :INPUT ACCEPT [129:8521] > > :FORWARD ACCEPT [0:0] > > :OUTPUT ACCEPT [90:16750] > > :FORWARD_direct - [0:0] > > :INPUT_direct - [0:0] > > :OUTPUT_direct - [0:0] > > -A INPUT -j INPUT_direct > > -A FORWARD -j FORWARD_direct > > -A OUTPUT -j OUTPUT_direct > > COMMIT > > # Completed on Thu Sep 8 10:12:45 2016 > > # Generated by iptables-save v1.4.21 on Thu Sep 8 10:12:45 2016 > > *filter > > :INPUT ACCEPT [0:0] > > :FORWARD ACCEPT [0:0] > > :OUTPUT ACCEPT [90:16750] > > :FORWARD_IN_ZONES - [0:0] > > :FORWARD_IN_ZONES_SOURCE - [0:0] > > :FORWARD_OUT_ZONES - [0:0] > > :FORWARD_OUT_ZONES_SOURCE - [0:0] > > :FORWARD_direct - [0:0] > > :FWDI_public - [0:0] > > :FWDI_public_allow - [0:0] > > :FWDI_public_deny - [0:0] > > :FWDI_public_log - [0:0] > > :FWDO_public - [0:0] > > :FWDO_public_allow - [0:0] > > :FWDO_public_deny - [0:0] > > :FWDO_public_log - [0:0] > > :INPUT_ZONES - [0:0] > > :INPUT_ZONES_SOURCE - [0:0] > > :INPUT_direct - [0:0] > > :IN_public - [0:0] > > :IN_public_allow - [0:0] > > :IN_public_deny - [0:0] > > :IN_public_log - [0:0] > > :OUTPUT_direct - [0:0] > > -A INPUT -i virbr0 -p udp -m udp --dport 53 -j ACCEPT > > -A INPUT -i virbr0 -p tcp -m tcp --dport 53 -j ACCEPT > > -A INPUT -i virbr0 -p udp -m udp --dport 67 -j ACCEPT > > -A INPUT -i virbr0 -p tcp -m tcp --dport 67 -j ACCEPT > > -A INPUT -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT > > -A INPUT -i lo -j ACCEPT > > -A INPUT -j INPUT_direct > > -A INPUT -j INPUT_ZONES_SOURCE > > -A INPUT -j INPUT_ZONES > > -A INPUT -m conntrack --ctstate INVALID -j DROP > > -A INPUT -j REJECT --reject-with icmp-host-prohibited > > -A FORWARD -d 192.168.122.0/24 -o virbr0 -m conntrack --ctstate > > RELATED,ESTABLISHED -j ACCEPT > > -A FORWARD -s 192.168.122.0/24 -i virbr0 -j ACCEPT > > -A FORWARD -i virbr0 -o virbr0 -j ACCEPT > > -A FORWARD -o virbr0 -j REJECT --reject-with icmp-port-unreachable > > -A FORWARD -i virbr0 -j REJECT --reject-with icmp-port-unreachable > > -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT > > -A FORWARD -i lo -j ACCEPT > > -A FORWARD -j FORWARD_direct > > -A FORWARD -j FORWARD_IN_ZONES_SOURCE > > -A FORWARD -j FORWARD_IN_ZONES > > -A FORWARD -j FORWARD_OUT_ZONES_SOURCE > > -A FORWARD -j FORWARD_OUT_ZONES > > -A FORWARD -m conntrack --ctstate INVALID -j DROP > > -A FORWARD -j REJECT --reject-with icmp-host-prohibited > > -A OUTPUT -o virbr0 -p udp -m udp --dport 68 -j ACCEPT > > -A OUTPUT -j OUTPUT_direct > > -A FORWARD_IN_ZONES -i enp2s0 -g FWDI_public > > -A FORWARD_IN_ZONES -g FWDI_public > > -A FORWARD_OUT_ZONES -o enp2s0 -g FWDO_public > > -A FORWARD_OUT_ZONES -g FWDO_public > > -A FWDI_public -j FWDI_public_log > > -A FWDI_public -j FWDI_public_deny > > -A FWDI_public -j FWDI_public_allow > > -A FWDI_public -p icmp -j ACCEPT > > -A FWDO_public -j FWDO_public_log > > -A FWDO_public -j FWDO_public_deny > > -A FWDO_public -j FWDO_public_allow > > -A INPUT_ZONES -i enp2s0 -g IN_public > > -A INPUT_ZONES -g IN_public > > -A IN_public -j IN_public_log > > -A IN_public -j IN_public_deny > > -A IN_public -j IN_public_allow > > -A IN_public -p icmp -j ACCEPT > > -A IN_public_allow -p tcp -m tcp --dport 21 -m conntrack --ctstate NEW -j > > ACCEPT > > -A IN_public_allow -d 224.0.0.251/32 -p udp -m udp --dport 5353 -m > > conntrack --ctstate NEW -j ACCEPT > > -A IN_public_allow -p tcp -m tcp --dport 5900:5979 -m conntrack --ctstate > > NEW -j ACCEPT > > -A IN_public_allow -p tcp -m tcp --dport 22 -m conntrack --ctstate NEW -j > > ACCEPT > > -A IN_public_allow -p tcp -m tcp --dport 9000:9001 -m conntrack --ctstate > > NEW -j ACCEPT > > -A IN_public_allow -p tcp -m tcp --dport 5979 -m conntrack --ctstate NEW -j > > ACCEPT > > -A IN_public_allow -p udp -m udp --dport 9000:9001 -m conntrack --ctstate > > NEW -j ACCEPT > > COMMIT > > # Completed on Thu Sep 8 10:12:45 2016 > > > > > >>>>> Again, it was working 2 days ago, so I am thinking that a recent update > >>>>> has done something?? > >>>>> > >>>>> Not sure why the !X is occurring. These machines are on the same > >>>>> 192.168.7.x network? > >> > >> !X is traceroute's way of saying "communication administratively > >> prohibited". Looks like there is a rule saying something like -j REJECT > >> --reject-with icmp-{net,host,admin}-prohibited somewhere in the firewall > >> ruleset. We can find it in the above requested iptables-save data. > -- > users mailing list > users@xxxxxxxxxxxxxxxxxxxxxxx > To unsubscribe or change subscription options: > https://lists.fedoraproject.org/admin/lists/users@xxxxxxxxxxxxxxxxxxxxxxx > Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct > Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines > Have a question? Ask away: http://ask.fedoraproject.org +----------------------------------------------------------+ Michael D. Setzer II - Computer Science Instructor Guam Community College Computer Center mailto:mikes@xxxxxxxxxxxxxxxx mailto:msetzerii@xxxxxxxxx Guam - Where America's Day Begins G4L Disk Imaging Project maintainer http://sourceforge.net/projects/g4l/ +----------------------------------------------------------+ http://setiathome.berkeley.edu (Original) Number of Seti Units Returned: 19,471 Processing time: 32 years, 290 days, 12 hours, 58 minutes (Total Hours: 287,489) BOINC@HOME CREDITS ABC 16613838.513356 | EINSTEIN 111619174.788695 ROSETTA 48018352.619787 | SETI 91341742.472919 -- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://lists.fedoraproject.org/admin/lists/users@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org