ich habe hier ein Problem mit der Kommunikation der sfirm-Software über den Socks-Proxy, vielleicht weiß ja jemand wie das zu beheben ist.
Die HBCI-Kommunikation läuft einwandfrei, nur Updates der Software lassen sich nicht herunterladen. Die Fehlermeldung lautet " Die Dateianfrage an den HTTP-Server ist fehlgeschlagen"
Beim Versuch eines Updates steht im Log des Socks-Proxy folgendes:
2012:01:12-14:22:22 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57545 -> 192.168.33.206.1080
2012:01:12-14:22:22 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57545 -> 81.169.174.93.80
2012:01:12-14:22:23 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57546 -> 192.168.33.206.1080
2012:01:12-14:22:23 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57546 -> 81.169.174.93.80
2012:01:12-14:22:24 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57547 -> 192.168.33.206.1080
2012:01:12-14:22:24 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57547 -> 81.169.174.93.80
2012:01:12-14:22:25 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57548 -> 192.168.33.206.1080
2012:01:12-14:22:25 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57548 -> 81.169.174.93.80
2012:01:12-14:22:27 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57549 -> 192.168.33.206.1080
2012:01:12-14:22:27 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57549 -> 81.169.174.93.80
2012:01:12-14:22:28 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57551 -> 192.168.33.206.1080
2012:01:12-14:22:28 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57551 -> 81.169.174.93.80
2012:01:12-14:22:29 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57553 -> 192.168.33.206.1080
2012:01:12-14:22:29 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57553 -> 81.169.174.93.80
2012:01:12-14:22:30 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57554 -> 192.168.33.206.1080
2012:01:12-14:22:30 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57554 -> 81.169.174.93.80
2012:01:12-14:22:31 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57555 -> 192.168.33.206.1080
2012:01:12-14:22:31 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57555 -> 81.169.174.93.80
2012:01:12-14:22:32 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57556 -> 192.168.33.206.1080
2012:01:12-14:22:32 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57556 -> 81.169.174.93.80
2012:01:12-14:22:33 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57558 -> 192.168.33.206.1080
2012:01:12-14:22:33 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57558 -> 81.169.174.93.80
2012:01:12-14:22:34 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57559 -> 192.168.33.206.1080
2012:01:12-14:22:34 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57559 -> 81.169.174.93.80
2012:01:12-14:22:35 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57560 -> 192.168.33.206.1080
2012:01:12-14:22:35 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57560 -> 81.169.174.93.80
2012:01:12-14:22:36 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57561 -> 192.168.33.206.1080
2012:01:12-14:22:36 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57561 -> 81.169.174.93.80
2012:01:12-14:22:37 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57562 -> 192.168.33.206.1080
2012:01:12-14:22:37 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57562 -> 81.169.174.93.80
2012:01:12-14:22:39 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57563 -> 192.168.33.206.1080
2012:01:12-14:22:39 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57563 -> 81.169.174.93.80
2012:01:12-14:22:40 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57565 -> 192.168.33.206.1080
2012:01:12-14:22:40 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57565 -> 81.169.174.93.80
2012:01:12-14:22:41 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57566 -> 192.168.33.206.1080
2012:01:12-14:22:41 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57566 -> 81.169.174.93.80
2012:01:12-14:22:42 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57567 -> 192.168.33.206.1080
2012:01:12-14:22:42 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57567 -> 81.169.174.93.80
2012:01:12-14:22:43 asg sockd[6306]: pass(1): tcp/accept [: 192.168.33.70.57568 -> 192.168.33.206.1080
2012:01:12-14:22:43 asg sockd[6307]: block(0): tcp/connect [: 192.168.33.70.57568 -> 81.169.174.93.80
In den Socks-Optionen der Astaro stehen die betreffenden Rechner unter zugelassene Netzwerke und ein extra erstellter User für die Benutzerauthentifizierung.
In der sfirm-Software ist die IP der Astaro als Adresse für den Socks-Proxy hinterlegt, sowie Port 1080 und die Credentials.
This thread was automatically locked due to age.