Check point deployment shell internal error

On occasion some of our users get this error when connecting to the MAB VPN (Check Point SSL Network Extender Service): Check Point Deployment Shell internal error I have seen this article and it says the ics.jar file is corrupt on the Security Gateway. https://supportcenter.checkpoint.com/supportce...

On occasion some of our users get this error when connecting to the MAB VPN (Check Point SSL Network Extender Service):

Check Point Deployment Shell internal error

I have seen this article and it says the ics.jar file is corrupt on the Security Gateway.

https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut…

As this only affects a few users, I am reluctant at the moment to follow the solution on the Gateway in case it causes any further issues.

An update or replacement of the Endpoint Security on Demand (ESOD) files on the gateway is necessary.

In the past, if we delete the users profiles off the laptop, get them to logon to the domain again it creates a new user profile and then they can logon to the VPN without this issue.

To me, there seems to be some file(s) that are located on the users profile that could also be causing an issue here.

Has anyone else seen this or know of any files that get placed on the user profile for the MAB VPN (Check Point SSL Network Extender Service)?

Mgmt = R80.40 Latest JFA Take 48 (19 May 2020)

Security GW = R80.30 JFA Take 50 (3 October 2019)

Thanks

Endpoint Security on Demand (ESOD) fails to start scan with error «Check Point Deployment Shell Internal Error»

Technical Level

Solution ID sk168882
Technical Level

Product Mobile Access / SSL VPN
Version All
OS Windows 10
Platform / Model All
Date Created

2020-09-06 00:00:00.0

Last Modified 2020-12-24 06:31:27.0

Symptoms

  • Endpoint Security on Demand (ESOD) fails to start the scan with error «Check Point Deployment Shell Internal Error».
  • User uses the procedure described in sk164713, but it did not help.
  • User tries to delete %TEMP%/CSHELL/ folder, but it fails to delete because file is open.

Cause

CSHELL Files/Folder used for ESOD cannot be deleted if the file is open in a Java application. Java process hangs in Windows OS, while running ESOD.

Solution


Note: To view this solution you need to

Sign In
.

Are you in need of uninstalling Check Point Deployment Shell to fix some problems? Are you looking for an effective solution to completely uninstall it and thoroughly delete all of its files out of your PC? No worry! This page provides detailed instructions on how to completely uninstall Check Point Deployment Shell.

Possible problems when you uninstall Check Point Deployment Shell

* Check Point Deployment Shell is not listed in Programs and Features.
* You do not have sufficient access to uninstall Check Point Deployment Shell.
* A file required for this uninstallation to complete could not be run.
* An error has occurred. Not all of the files were successfully uninstalled.
* Another process that is using the file stops Check Point Deployment Shell being uninstalled.
* Files and folders of Check Point Deployment Shell can be found in the hard disk after the uninstallation.

Check Point Deployment Shell cannot be uninstalled due to many other problems. An incomplete uninstallation of Check Point Deployment Shell may also cause many problems. So, it’s really important to completely uninstall Check Point Deployment Shell and remove all of its files.

How to Uninstall Check Point Deployment Shell Completley?

Method 1: Uninstall Check Point Deployment Shell via Programs and Features.

When a new piece of program is installed on your system, that program is added to the list in Programs and Features. When you want to uninstall the program, you can go to the Programs and Features to uninstall it. So when you want to uninstall Check Point Deployment Shell, the first solution is to uninstall it via Programs and Features.

Steps:

a. Open Programs and Features.

Windows Vista and Windows 7

Click Start, type uninstall a program in the Search programs and files box and then click the result.

search uninstall a program windows7

Windows 8, Windows 8.1 and Windows 10

Open WinX menu by holding Windows and X keys together, and then click Programs and Features.

Win X menu Windows 10

b. Look for Check Point Deployment Shell in the list, click on it and then click Uninstall to initiate the uninstallation.

uninstall

Method 2: Uninstall Check Point Deployment Shell with its uninstaller.exe.

Most of computer programs have an executable file named uninst000.exe or uninstall.exe or something along these lines. You can find this files in the installation folder of Check Point Deployment Shell.

Steps:

a. Go to the installation folder of Check Point Deployment Shell.

b. Find uninstall.exe or unins000.exe.

unins000

c. Double click on its uninstaller and follow the wizard to uninstall Check Point Deployment Shell.

Method 3: Uninstall Check Point Deployment Shell via System Restore.

System Restore is a utility which comes with Windows operating systems and helps computer users restore the system to a previous state and remove programs interfering with the operation of the computer. If you have created a system restore point prior to installing a program, then you can use System Restore to restore your system and completely eradicate the unwanted programs like Check Point Deployment Shell. You should backup your personal files and data before doing a System Restore.

Steps:

a. Close all files and programs that are open.

b. On the desktop, right click Computer and select Properties. The system window will display.

c. On the left side of the System window, click System protection. The System Properties window will display.

System protection

d. Click System Restore and the System Restore window will display.

system properties system restore

e. Select Choose a different restore point and click Next.

restore system files and settings

f. Select a date and time from the list and then click Next. You should know that all programs and drivers installed after the selected date and time may not work properly and may need to be re-installed.

choose a restore point

g. Click Finish when the «Confirm your restore point» window appears.

confirm your restore point

h. Click Yes to confirm again.

windows 7 restore finish confirm

Method 4: Uninstall Check Point Deployment Shell with Antivirus.

Nowadays, computer malware appear like common computer applications but they are much more difficult to remove from the computer. Such malware get into the computer with the help of Trojans and spyware. Other computer malware like adware programs or potentially unwanted programs are also very difficult to remove. They usually get installed on your system by bundling with freeware software like video recording, games or PDF convertors. They can easily bypass the detection of the antivirus programs on your system. If you cannot remove Check Point Deployment Shell like other programs, then it’s worth checking whether it’s a malware or not. Click and download this malware detect tool for a free scan.

Method 5: Reinstall Check Point Deployment Shell to Uninstall.

When the file required to uninstall Check Point Deployment Shell is corrupted or missing, it will not be able to uninstall the program. In such circumstance, reinstalling Check Point Deployment Shell may do the trick. Run the installer either in the original disk or the download file to reinstall the program again. Sometimes, the installer may allow you to repair or uninstall the program as well.

Method 6: Use the Uninstall Command Displayed in the Registry.

When a program is installed on the computer, Windows will save its settings and information in the registry, including the uninstall command to uninstall the program. You can try this method to uninstall Check Point Deployment Shell. Please carefully edit the registry, because any mistake there may make your system crash.

Steps:

a. Hold Windows and R keys to open the Run command, type in regedit in the box and click OK.

windows7 regedit

b. Navigate the following registry key and find the one of Check Point Deployment Shell:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionUninstall

c. Double click on the UninstallString value, and copy its Value Data.

uninstallstring

d. Hold Windows and R keys to open the Run command, paste the Value Data in the box and click OK.

e. Follow the wizard to uninstall Check Point Deployment Shell.

Method 7: Uninstall Check Point Deployment Shell with Third-party Uninstaller.

The manual uninstallation of Check Point Deployment Shell requires computer know-how and patience to accomplish. And no one can promise the manual uninstallation will completely uninstall Check Point Deployment Shell and remove all of its files. And an incomplete uninstallation will many useless and invalid items in the registry and affect your computer performance in a bad way. Too many useless files also occupy the free space of your hard disk and slow down your PC speed. So, it’s recommended that you uninstall Check Point Deployment Shell with a trusted third-party uninstaller which can scan your system, identify all files of Check Point Deployment Shell and completely remove them. Download this powerful third-party uninstaller below.

chrootVPN

Checkpoint R80+ VPN client chroot wrapper

VPN client chroot’ed Debian setup/wrapper

for Debian/Ubuntu/RedHat/CentOS/Fedora/Arch/SUSE/Gentoo/Slackware/Void/Deepin/KaOS/Pisi/Kwort/Clear/NuTyx Linux based hosts

Checkpoint R80.10 and up

https://github.com/ruyrybeyro/chrootvpn

Rui Ribeiro 2022-2023

Tiago Teles @ttmx — Contributions for Arch Linux

💥Nominated for best tool of the year 2022 at Checkpoint user forums💥

voting URL http://surveymonkey.com/r/3FF28GL

Description

This script downloads the Mobile Access Portal Agent (CShell) and the SSL Network Extender (SNX) CheckPoint installation scripts from the firewall/VPN we intend to connect to, and installs them in a chrooted environment.

Being SNX still a 32-bits binary together with the multiples issues of satisfying cshell_install.sh requirements, a chroot is used in order to not to corrupt (so much) the Linux user desktop, and yet still tricking snx / cshell_install.sh into «believing» all the requirements are satisfied; e.g. both SNX and CShell behave on odd ways ; furthermore, Fedora and others already deprecated 32-bit packages necessary for SNX ; the chroot setup is built to counter some of those behaviours and provide a more secure setup.

Whilst the script supports several Linux distributions as the host OS, it still uses Debian 11 for the chroot «light container».

CShell CheckPoint Java agent needs Java (already in the chroot) and X11 desktop rights. The binary SNX VPN client needs a 32-bits environment. The SNX binary, the CShell agent/daemon (and Java) install and run under chrooted Debian. The Linux host runs Firefox (or another browser).

resolv.conf, VPN IP address, routes and X11 «rights» «bleed» from the chroot directories and kernel shared with the host to the host Linux OS.

The Mobile Access Portal Agent, unlike the ordinary cshell_install.sh official setup, runs with its own non-privileged user which is different than the logged in user. In addition, instead of adding the localhost self-signed Agent certificate to a user personal profile as the official setup does, this script install a server-wide global Firefox policy file instead when possible. Notably when Firefox is a snap, or the distribution already has a default Firefox policy file, a new policy won’t be installed.

As long the version of the Debian/RedHat/SUSE/Arch distribution is not at the EOL stage, chances are very high the script will run successfully. Void, Gentoo, Slackware, Deepin,NuTyx,Pisi/Kwort and KaOS variants are not so thoroughly tested. Have a look near the end of this document, for the more than 110 recent versions/distributions successfully tested.

INSTRUCTIONS

For the stable release, download rpm or deb file from the last release.

  • First time installing, run it as:

      vpn.sh -i --vpn=FQDN_DNS_name_of_VPN
    
  • accept localhost certificate in brower if not Firefox or if Firefox is a snap

    https://localhost:14186/id

  • visit web VPN page aka Mobile Access Portal for logging in

  • To launch it any time after installation or a reboot

  • the script tries to launch itself upon user xorg login via XDG. To have an automatic launch, if vpn.sh was installed via rpm or deb, add to /etc/sudoers

      your_user ALL=(ALL:ALL) NOPASSWD: /usr/bin/vpn.sh
    
  • Whilst it is recommended having Firefox already installed, for deploying via this script a Firefox policy for automagically accepting the self-signed Mobile Access Portal Agent X.509 certificate, if it is not present a already a policy, you can install a Firefox policy any time doing:

  • If /opt/etc/vpn.conf is present the above script settings will be ignored. vpn.conf is created upon first installation. Thus, for reinstalling, you can run:

  • For delivering the script to other users, you can fill up VPN and VPNIP variables at the beginning of the script. They can then install it as:

USAGE

vpn.sh [-l][-f FILE][-c DIR|—chroot=DIR][—proxy=proxy_string][—vpn=FQDN] -i|—install

vpn.sh [-f FILE][-o FILE|—output=FILE][-c|—chroot=DIR] start|stop|restart|status

vpn.sh [-f FILE][-c DIR|—chroot=DIR] [uninstall|rmchroot]

vpn.sh [-f FILE][-o FILE|—output=FILE] disconnect|split|selfupdate|fixdns

vpn.sh -h|—help

vpn.sh -v|—version

Option Function
—install -i install mode — creates chroot
—chroot -c changes default chroot /opt/chroot directory
—help -h shows this help
—version -v script version
—file -f alternate conf file. Default /opt/etc/vpn.conf
—vpn selects VPN DNS full name at install time
—proxy proxy to use in apt inside chroot ‘http://user:pass@IP’
—output -o redirects ALL output for FILE
—silent -s special case of output, no arguments
-l gets snx/cshell_install.sh from cwd directory, if present
—portalurl custom prefix path other than / and sslvpn
Command Function
start         starts CShell daemon
stop          stops CShell daemon
restart       restarts CShell daemon
status        checks if CShell daemon is running
disconnect    disconnects VPN/SNX session from the command line
split         splits tunnel VPN — use only after session is up
uninstall     deletes chroot and host file(s)
rmchroot      deletes chroot
selfupdate    self-updates this script if new version available
fixdns        tries to fix resolv.conf
policy tries to install a Firefox policy

For debugging/maintenance:

vpn.sh -d|—debug
vpn.sh sudoers
vpn.sh [-c DIR|—chroot=DIR] shell|upgrade

vpn.sh shell

Options Function
—debug -d bash debug mode on
shell      bash shell inside chroot
upgrade    OS upgrade inside chroot
sudoers installs in /etc/sudoers sudo permission for the user
log shows CShell Jetty logs
taillog follows/tail CShell Jetty logs

This script can be downloaded running:

  • git clone https://github.com/ruyrybeyro/chrootvpn/blob/main/vpn.sh
  • wget https://raw.githubusercontent.com/ruyrybeyro/chrootvpn/main/vpn.sh
  • curl https://raw.githubusercontent.com/ruyrybeyro/chrootvpn/main/vpn.sh -O

KNOWN FEATURES

  • The Web page of Mobile access portal has to open in a browser and allow login with or without this script/SNX/CShell installed;

  • The user installing/running the script has to got sudo rights (for root);

  • For the CShell daemon to start automatically upon the user XDG login, the user must be able to sudo /usr/bin/vpn.sh or /usr/local/bin/vpn.sh without a password;

  • The CShell daemon writes over X11; if VPN is not working when called/installed from a ssh session, or after logging in, start/restart the script using a X11 graphical terminal;

  • The script/chroot is not designed to allow automatic remote deploying of new versions of both CShell (or SNX?)-apparently this functionality is not supported for Linux clients. If the status command of this script shows CShell or SNX new versions remotely, uninstall, and install the chroot setup again;

  • For (re)installing newer versions of SNX/CShell delete the chroot with vpn.sh uninstall and vpn -i again; after the configurations are saved in /opt/etc/vpn.conf, vpn -i is enough;

  • The CShell daemon runs with a separate non-privileged user, and not using the logged in user;

  • if using Firefox, is advised to have it installed before running this script;

  • if Firefox is reinstalled, better uninstall and (re)install vpn.sh, for the certificate policy file to be (re)deployed, or run:

  • if TZ is not set before the script or edited, default time is TZ=’Europe/Lisbon’;

  • if having issues connecting to VPN after first installation/OS upgrade, reboot;

  • if having DNS issues in Debian/Ubuntu/Parrot right at the start of the install, reboot and (re)start installation;

  • If after login, the web Mobile Portal is asking to install software, most of the time, either the CShell daemon is not up, or the Firefox policy was not installed or Firefox is a snap. do vpn.sh start and visit https://localhost:14186/id

  • Linux rolling releases distributions must be fully up to date before installing any new packages. Bad things can happen and will happen running this script if packages are outdated;

  • At least Arch after kernel(?) updates seem to occasionally need a reboot for the VPN to work;

  • If having the error «Check Point Deployment Shell internal error» run vpn.sh uninstall and install again with vpn.sh -i

  • When installing in Clear Linux, if Error: cannot aquire lock file persists, kill swupd

  • CShell runs an https server at localhost:14186, so in a minimalist distribution such as Alpine, you shan’t forget to setup the lo interface.

SCREENS

The following screens show actions to be performed after running the script.

  1. Accepting localhost certificate in Firefox at https://localhost:14186/id IF a policy not applied or Firefox is installed as a snap. This is done only once in the browser after each chroot (re)installation.

If the certificate is not accepted manually or via a policy installed by vpn.sh, Mobile Portal will complain about lack of installed software, whether CShell and SNX are running or not.

This is an image
This is an image

  1. Logging in into Mobile Portal VPN. If using a double factor auth PIN, write the regular password followed by the PIN.

This is an image

Select «Continue sign in» and «Continue» if logged in in other device/software.

This is an image

First time logging in, select Settings:

This is an image

And: «automatically» and «Network mode». This only needs to be done ONCE, the first time you login into the Mobile Portal.

This is an image

Then press Connect to connect to the firewall.

This is an image

The negotiation of a connection takes a (little) while.

This is an image

First and each time after reinstalling the chroot/script, «Trust server» has to be selected.

This is an image

The signature must be accepted too. It will happen several times if there is a cluster solution.

This is an image

Finally, the connection is established. The user will be disconnected then upon timeout, closing the tab/browser, or pressing Disconnect.

This is an image

Split tunneling

For creating temporarily a split tunnel on the client side, only after the VPN is up:

If the VPN is giving «wrong routes», deleting the default VPN gateway might not be enough, so there is a need to fill in routes in the SPLIT variable, by default at /opt/etc/vpn.conf, or if before installing for the first time, at the beginning of the vpn.sh script.

The SPLIT variable accepts the following directives:

Command Function
flush         cleans all routes given the VPN interface
+ROUTE        for adding a route via VPN
-ROUTE       for deleting a route via VPN

Example: split VPN with Internet access, and private addresses via VPN

  • dropping all VPN routes

  • adding a route to 10.0.0.0/8 via the VPN

  • adding a route to 192.168.0.0/16 via the VPN

  • adding a route to 172.16.0.0/12 via the VPN

         SPLIT="flush +10.0.0.0/8 +192.168.0.0/16 +172.16.0.0/12"
    

Example: Deleting default gateway given by the VPN, and adding a new route:

  • dropping the VPN default gateway

  • adding a route to 10.0.0.0/8 via the VPN

         SPLIT="-0.0.0.0/1 +10.0.0.0/8"
    

Beware of NDAs and policies around manipulating VPN routes.

Relevant CheckPoint Linux support pages

SSL Network Extender https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk65210#Linux%20Supported%20Platforms

How to install SSL Network Extender (SNX) client on Linux machines https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk114267

Mobile Access Portal Agent Prerequisites for Linux https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk119772

Mobile Access Portal and Java Compatibility https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk113410

Mobile Access Portal Agent for Mozilla Firefox asks to re-install even after it was properly installed https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk122576&partition=Advanced&product=Mobile

Unable to connect with SSL Network Extender on Linux machine https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk114521

Check Point Remote Access Solutions — Gateway-Based Access https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk67820

Remote Access FAQ covering IPSec and HTTPS portal based VPN solutions (needs a CheckPoint login) https://supportcenter.checkpoint.com/supportcenter/portal?action=portlets.SearchResultMainAction&eventSubmit_doGoviewsolutiondetails=&solutionid=sk166032

see also Unix SE post: VPN SSL Network Extender in Firefox https://unix.stackexchange.com/questions/450131/vpn-ssl-network-extender-in-firefox

COMPATIBILITY

Tested with:

chroot’ed ver release arch
Debian 11 Bullseye i386
Debian 12 Bookworm i386

with the following x86_64 hosts:

Alpine version
Alpine (1) 3.16.2
Arch based version
AaricKDE
AmOs
Arch
ArchBang 2022.07.02
Archcraft 2022.06.08
ArchEx 220206
ArchLabs
ArchMan 2022.07.02
ArchMan 2022.08.20
Arco 22.06.07
Big 2022-07-15
Bluestar 6.0.5
cachyOS
EndeavourOS 2022.06.32
EndeavourOS 22.7 Artemis neo
EndeavourOS 22.9
EndeavourOS 22.12
FreedomOS
Garuda 220614
Garuda 220717
Garuda 221017
Mabox 22.06
Mabox 22.08
Mabox 22.12
Manjaro 21.2.6.1
Manjaro 22.0
Peux OS 22.06
RebornOS
SalientOS 21.06
Xero 2022.09
Clear version
Clear OS 36010 Desktop
Debian based version
antiX 21 Grup Yorum
antiX 22 Grup Yorum
Armbian 22.08 Jammy
B2D/OB2D 2023 1.0.1
Backbox 8
Bodhi 6.0.0
Bodhi 7.0.0
BOSS 9 (urja)
BunsenLabs 10.5 (Lithium)
BunsenLabs 11 (Beryllium)
Condres OS 1.0
Crowz 4.0
cutefishOS
DragonOS 22.04 R27
Debian 10 Buster
Debian 11 Bullseye
Debian 12 Bookworm
Debian Edu 11.3
Deepin 20.6
Deepin 20.8
Deepin 23
Devuan 4.0 Chimaera
Devuan 5.0 Daedalus
Diamond LinuxTT Gen5+
Drauger OS 7.6 Strigoi
Elementary OS 6.1 Jolnir
Elive 3.8.30
Emmabuntüs DE4 1.01
Emmabuntüs DE4 1.02
Enso OS 0.4
Escuelas 7.6
Exe 20220306 Chimaera
EXERGOS RED 22
ExTix Deepin 20.6
ExTix Deepin 22.6
Feren OS 2022.04
Freespire 82
Gnuinos 4.0 Chimaera
Greenie 20.04
HamoniKR 5.0 Hanla
Kaisen 2.1
Kaisen 2.2
Kali 2022.2
Kali 2022.3
Kanotix64 Silverfire
KDE neon 5.25
Kubuntu 20.04 LTS
Kubuntu 22.04 LTS
Kubuntu 22.10
LinuxFx 11
Lite 6.0 Fluorite
Lliurex 21
Loc-OS 22
Lubuntu 20.04 LTS
Lubuntu 22.04 LTS
Lubuntu 22.10
Makulu 2022-06.10 Shift
MAX 11.5
Mint 20.2 Uma
Mint 21 Vanessa
Mint 21.2 Vanessa
MX 21.1 Wildflower
MX 21.2
Neptune 7 («Faye»)
Neptune 7.5
Netrunner 21.01 (“XOXO”)
Nitrux 2.4.1
Nova Desktop 8.0
PakOS 2021-05
Pardus 21.2 Yazılım Merkezi
Pardus 21.4
Parrot 5.0.1 Electro Ara
Pearl 11 MATE Studio
Peppermint OS 2022-05-22
Pop!_OS 22.04 LTS
Primtux 7
PureOS 10.0 (Byzantium)
Q4OS 4.10 Gemini
Q4OS 4.8 Gemini
Refracta 11.0 Chimaera
Robo 12.07
Robo 12.08
Robo 12.09
Rhino Remix
Runtu 20.04.1
Runtu 22.04
Septor 2022
Shark
SolydXK10
Sparky 7 (Orion-Belt) 2022.7
Spiral 11
SysLinuxOS 11 filadelfia
Trisquel 10.0.1 Nabia
Ubuntu 18.04 Bionic Beaver LTS
Ubuntu 20.04 Focal Fossa LTS
Ubuntu 22.04 Jammy Jellyfish LTS
Ubuntu 22.10 Kinetic Kudu
Ubuntu 23.04 Lunar Lobster
Ubuntu Budgie 22.04
Ubuntu Budgie 22.10
Ubuntu Kylin 22.04.1
Ubuntu Mate 20.04.4 LTS
Ubuntu Mate 22.04 LTS
Ubuntu Mate 22.10
Ubuntu Studio 22.10
Ubuntu Unity 22.04.1 LTS
Ubuntu Unity 22.10
Uruk 3 (Nannar)
WattOS R12
Voyager 22.04 LTS
Voyager 22.10
Xubuntu 20.04 LTS
Xubuntu 22.04 Jammy Jellyfish LTS
Xubuntu 22.10
Zentyal Server 7.0
Zevenet CE 5.12.2
Zorin OS 16.1
Zorin OS 16.2
Gentoo based version
Gentoo 2.8
Redcore 2102
Redcore 2201 Hardened (Rastaban)
Calculate 22.0.1
Calculate 23
Mandriva based version
ALT k 10.0
ALT k 10.1
OpenMandriva Lx 4.3
OpenMandriva Lx 5.0
OpenMandriva 23.01 ROME
NuTyx version
NuTyx 22.10
Pisi version
Pisi 2.3.1 (Nar)
KaOS version
KaOS 2022.10
Kwort version
Kwort 4.4
RedHat based version
Alma 8.6 Tiger
Alma 8.7
Alma 9.0 Emerald Puma
Alma 9.1
BlueOnyx 9.0
BlueOnyx 9.1
CentOS 8
CentOS 9 stream
EulixOS 1.0.1
EulixOS 1.1
Euro 8.6 Kyiv
Euro 8.7 Brussels
Euro 9.0
Euro 9.1
Fedora 23
Fedora 36
Fedora 37
Fedora 38
Mageia 8 mga8
Mageia 9
Miracle 8.4 (Peony)
Miracle 9.0
Navy Enterprise 8.6 r1
Nobara 36
Nobara 37
NST 36
openEuler 22.03 LTS
openEuler 22.09
Oracle 8.6
Oracle 8.7
Oracle 9.0
Oracle 9.1
PCLinuxOS 2022.07.10 (2)
RHEL 8
RHEL 8.7
RHEL 9.0 Plow
RHEL 9.1
risiOS 36
Rocky 8.6 Green Obsidian
Rocky 8.7
Rocky 9.0
Rocky 9.1
ROSA 12.2 Fresh Desktop
Springale 8
Springale 9.0 (Parma)
Slackware based version
Absolute
Slackware 15.0
Slackware 15.1-current
Salix OS 15.0
Slackel 7.3 Openbox (2)
Zenwalk 221106
SUSE based version
SLES 15-SP4
openSUSE 15.3 Leap
openSUSE 15.4 Leap
Gecko 153.x STATIC Cinnamon
Gecko 154.x STATIC Cinnamon
Kamarada 15.3
Regata OS 22 Discovery
Void based version
AgarimOS
Void 2021-09-30
Void 2022-10-01

(1) — implementation for advanced users/VMs

(2) — no /etc/resolv.conf from VPN

Понравилась статья? Поделить с друзьями:
  • Check nrpe error receiving data from daemon
  • Check nrpe error could not complete ssl handshake
  • Check ncd read error 3
  • Check injection megane 2 ошибка перевод
  • Check id error tl866