QNAP VM and fixed IP address …

What a drama! I found no way to assign the Windows 10 VM host a fixed IP address inside the QNAP Virtualisation Station. I was excercising the virtual switch and software switch settings up and down – to no avail. Finally I found the reason of this treason: Since the Windows VM was migrated from Parallels Desktop (via Virtual Box) it still had two other network cards in its belly. Of course, they were hidden in the Device Manager. But as they had this one fixed IP address already configured, it was not possible to add it to the new VirtIO interface. Once I had made these two other network cards visible, I deleted them and – voilá – the fixed IP address now could be assigned to the VirIO interface without any trouble. Before, only DHCP would work. Maybe this information helps someone who is also trying to get a VM with fixed IP addresses set up in QNAP virtualisation station.

colormunki Photo CD for MacOS not readable

I wanted to make sure I still can install colormunki Photo from the original CD, which I own(ed). I use an external CD-ROM drive for that purpose. Here on my Mac OS Catalina, it wouldn’t work. The Finder wasn’t showing any CD, disc utility would show there is something on the CD, but it was not possible to mount it.


The occurring error was:
„Could not mount (com.apple.DiskManagement.disenter error 49153)“.

So I tried google and came across the online Archive for the original CD:

The result was the same – same error, no success. So I was continuing my search and came across the following website which described the exactly same error and hinted on the possible reason:

Apple_HFS format may be the issue!“

And so it is – I connected my external CD drive to an older MacMini running Mac OS El Capitan. There was no problem in mounting the CD and copying the Mac OS install kit of colormunki photo from it.

Fritz.box or RFC1918 address not reachable – from Safari!

For quite some time my Safari wouldn’t connect to my internet gateway, which is a Fritz!Box 7590, running with the IP No chance to get to the admin interface, even though it was no problem at all from other systems. I didn’t put any effort into it since I could always connect from my iPad. Strange enough, the Mac OS Safari wouldn’t even show an error, but only say it couldn’t connect as if the target was not available at all.

But today I thought better of it – and found a way to make it work. Ok, how did I get there? I first installed Mozilla Firefox, and this browser had no problem connecting to the internet gateway – it only showed a warning that this site uses a self-signed certificate which is not trusted. So I downloaded the certificate in the Firefox browser (clicking the lock sign and downloading the PEM formatted certificate). Then I started keychain access on my Mac and did the drag and drop of the PEM cert into the keychain. Just make sure that you have selected Keychains = System and Category = Certificates. Thus the Cert started to appear in keychain, I double-clicked it and changed the trust to „trust all“. Authorized the changes and then started up Safari again.

What happened? Safari now had no issue to reach the Fritz!Box admin page! Great, success!

Hacking the Whitebox from MacOS Catalina

I still had such a TP-Link router in my vaults which once contributed usage metrics to the SamKnows EU project. Since I don’t want to operate it any longer, I thought of changing the router firmware to either the original TL-WR1043ND or a DD-WRT firmware.

This link provides a great walkthrough how to get it done:


Unfortunately it turned out that my MacBook doesn’t have telnet available anymore, after the upgrade to MacOS Catalina. Thus I had to install it first and chose to compile telnet from source for the MacOS Catalina:

Step-by-Step Installing telnet on MacOS Catalina. I chose to compile from source.

If I were just to install DD-WRT from the original firmware of the TL-WR1043ND V1.8 I would probably go after this description:

Installing the DD-WRT firmware again.

Everything went smoothly, now after updating I can reach the TP-Link router via web interface and first should enter a new root password for security.

Changing the defaults – Scrollout F1

Scrollout F1 is my major defence against all incoming spam waves. Using it for quite some time now, easily hosted at Hetzner, I have tweaked around some of the settings. Here I will document the change I needed to make to send email from my Mac OS infrastructure outgoing through the Scrollout F1 appliance.

Header View of Scrollout F1

Unfortunately, after updating the Scrollout Appliance once again (by entering

/var/www/bin/update.sh force

I ran into the following error when trying to send email:

This is the mail system at host my.mailserver.

I'm sorry to have to inform you that your message could not
be delivered to one or more recipients. It's attached below.

For further assistance, please send mail to postmaster.

If you do so, please include this problem report. You can
delete your own text from the attached returned message.

                  The mail system

<target@mailaddress.somewhere>: host my.mailserver [] said: 530-5.7.0
   Must issue a STARTTLS command first 530 5.7.0 For assistance, see
   Admin or contact +49351XXXXXXX. Please provide the following
   information in your problem report: Time: (Mar 09 22:24:08), Client:
   (, Server: (my.mailserver). (in reply to MAIL FROM
Reporting-MTA: dns; my.mailhost
X-Postfix-Queue-ID: AFDDA182DF3F0
X-Postfix-Sender: rfc822; me@myaddress
Arrival-Date: Sat,  9 Mar 2019 22:24:07 +0100 (CET)

The solution was a bit quirky, but I at least found out, that this problem can be resolved by changing a setting in main.cf of postfix. The line


would have to be changed into


Once I changed it, the sending out of email did work again. Until, I used the Scrollout F1 frontend to change some settings. Then I was back at the start because postfix was running with TLS security level ENCRYPT again. So I thought that somewhere in F1 the defaults must be buried, and voilá, I found the following:

grep -rnw '/var/' -e 'smtpd_tls_security_level=encrypt'
/var/www/cfg/agresivity/9/master.cf:26: -o smtpd_tls_security_level=encrypt
/var/www/cfg/agresivity/5/master.cf:34: -o smtpd_tls_security_level=encrypt
/var/www/cfg/agresivity/10/master.cf:26: -o smtpd_tls_security_level=encrypt
/var/www/cfg/agresivity/2/master.cf:34: -o smtpd_tls_security_level=encrypt
/var/www/cfg/agresivity/8/master.cf:27: -o smtpd_tls_security_level=encrypt
/var/www/cfg/agresivity/4/master.cf:34: -o smtpd_tls_security_level=encrypt
/var/www/cfg/agresivity/6/master.cf:34: -o smtpd_tls_security_level=encrypt
/var/www/cfg/agresivity/1/master.cf:34: -o smtpd_tls_security_level=encrypt
/var/www/cfg/agresivity/7/master.cf:27: -o smtpd_tls_security_level=encrypt
/var/www/cfg/agresivity/3/master.cf:34: -o smtpd_tls_security_level=encrypt

Means I found the defaults! Different ones for different protection levels ..

I changed the settings in these default files from „encrypt“ to „may“. Now the setting remain even when I change the configuration through the web frontend of F1 …

Still migrating to Mac OS Mojave …

Since I moved my Promise Pegasus storage to the new Mac (which still runs High Sierra), I had to find a way to use Time Machine from my old MacMini. The old one still runs El Capitan. I read about the new File Sharing feature and created a folder which was shared and had under „Advanced Options“ the „Share as a Time Machine backup destination“ turned on. Still, I couldn’t select this target folder on my old MacMini.

After reading the discussion at apple.com, I thought I should enable AFP too, which I had disabled before. Then it looked like this:

File Sharing Details – Advanced Options 

As the Apple Discussions article described, you should connect to the Backup folder via AFP. But Finder (Command+K) wouldn’t allow me to do so. So I found out that I didn’t have AFP enabled at all, you have to select it in the major window for File Sharing as you can see in the following screen shot:

MacOS -> System Preferences -> Sharing

Thus I went to „Options“ and enabled both SMB and AFP to allow my old MacMini with MacOS El Capitan to use the TimeMachine feature from MacOS HighSierra (or Mojave in the near future).

MacOS -> System Preferences -> Sharing -> Options

After enabling AFP, I was able to connect to the shared folder and afterwards select the folder from the newer MacOS to backup my older MacOS based MacMini.

TimaMachine on MacOS El Capitan now uses the backup folder
from the MacOS HighSierra/Mojave

Scan to Shared Folder via SMB on MacOS HighSierra – Kyocera (M6526cidn)

Today I set up my system with Mac OS High Sierra and again encountered issues while using my Kyocera printer to scan to a folder on my Mac.

The initial steps were to enable file sharing via SMB (without encryption!) and then set up the Kyocera as discussed in several blogs.

Finally when it was working, I noticed that it would save everything under the username I have chosen, but all other users were not able to open the scanned files. So, that was the typical user – group – rights issue in a SMB connection. What solved my issue was posted on a website and reads:

Firstly enable ACL permissions for SMB shares with the following command.

sudo defaults write /Library/Preferences/SystemConfiguration/com.apple.smb.server AclsEnabled -bool YES

Then set up inheritance permissions on the parent holder with the following command. This should recursively go through your share and apply the relevant permissions.

sudo chmod -R +a "group:REPLACE_WITH_YOURGROUP_NAME:allow readattr,writeattr,readextattr,writeextattr,readsecurity,list,search,add_file,add_subdirectory,delete_child,file_inherit,directory_inherit" REPLACE_WITH_PATH_TO_PARENT_SHARED_FOLDER

This worked perfectly for me! Now I am happy to use the scanning to folder function safely on my Kyocera.

Restore iCal Calendar Entries

I had shared this family calendar and forgotten about it … until I used it again to enter several appointments. Unfortunately, one family member thought that was a mistake and they had to be deleted. Which let me scratch my head, how I could restore those calendar entries either on Mac OS or in iOS.

First, I remembered that the calendar affected was an iCloud calendar. Second, Google delivered the following KB article upon searching:


And yes! This worked flawlessly. I was able to fetch a backup from just after midnight (12:35 AM, at first got afraid that no backup was available, until I checked that 12:35 AM is right after midnight, here in Germany we would say 0:35 hrs … ) and restore the calendar content. That worked and I had all my appointments back. Easy, wasn’t it?

PS: If your lost entries were not from an iCloud calendar, then you might try this solution:


AntiSpam with spamtrainer on Mac OS Server – El Capitan

So I am still running Mac OS El Capitan Server Edition on my Mac Mini. Recently, the Spam that comes through, has increased again and I wondered if there is any mechanism to implement AntiSpam in Mac OS X.

The Apple Knowledge Base only gives this article:
which is not exactly what I wanted.

Looking further, I came across these links, which proved helpful at the end:


According to that site the software will do this:

  • spamtrainer assists Mac OS X Server mail services administrators in updating and maintaining their SpamAssassin bayes database.
  • spamtrainer will read the designated HAM and SPAM mailboxes, update the SpamAssassin databases and delete mail that has been learned from.

After downloading the spamtrainer installation script and installing it I did the following:

Check the proper setup of junkmail / nojunkmail

sudo serveradmin settings mail:imap | grep junk


 mail:imap:junk_mail_userid = "junkmail"
 mail:imap:not_junk_mail_userid = "notjunkmail"

When running spamtrainer now right away, it complains:

Either there is no mailbox called No GUID found for user: junkmail in the mailpartition or it has never been fed with mail.

Either there is no mailbox called No GUID found for user: notjunkmail in the mailpartition or it has never been fed with mail.

So I go an create those users. Starting the Server.app plus adding the needed network accounts „junkmail“ and „notjunkmail“. Further I edit access so that these accounts only have access to the Mail service. Now I add these accounts to Mail so that I have access to them.

Now, finally, when I run


it does what it should.

Using the install option I can also have it run as plist item.

>> /usr/local/sbin/spamtrainer -i

Checking if there is a startup item for 'learn_junk_mail' or 'spamtrainer'

There IS a plist for sa_learn.pl

... and it is ENABLED

If you want to use 'spamtrainer' it is RECOMMENDED that this be disabled

Would you like me to disable it for you (yes/no)


'learn_junk_mail and/or sa_learn.pl' item has been disabled'

You can ignore 'No such process' error messages

There IS NO plist for spamtrainer

if you want to use 'spamtrainer' it is recommended that this be added

Would you like me to enable it for you (yes/no)


What time would you like spamtrainer to run (24-hour format)?

Please enter the hour (1)


Please enter the minutes (0)


Would you like SPAM/HAM messages to be deleted after the learn process? (n)


Would you like to log bayes stats into /var/log/spamtrainer.log? (n)


If you would you like to have spamtrainer mail you a report after it runs, then please enter an e-mail address. Enter for no (n)


Enter name of mail store with SPAM/HAM mailboxes? Enter for default (default)

Enter name of mailbox with SPAM? Enter for default (junkmail)

Enter name of mailbox with HAM? Enter for default (notjunkmail)

A plist with the following parameters for 'spamtrainer' has been prepared

/usr/local/sbin/spamtrainer -m myemail@myemaildomain.domain -d -l

It will run each day at 05:00:00

Would you like to add and enable it? (yes/no)


The following launchd plist item for 'spamtrainer' has been enabled'

/usr/local/sbin/spamtrainer -m myemail@myemaildomain.domain -d -l

It will run each day at 05:00:00

That is all for installation, now let me see if it does what it should!