abclinuxu.cz AbcLinuxu.cz itbiz.cz ITBiz.cz HDmag.cz HDmag.cz abcprace.cz AbcPráce.cz
AbcLinuxu hledá autory!
Inzerujte na AbcPráce.cz od 950 Kč
Rozšířené hledání
×
dnes 14:00 | Nová verze

Komunita kolem Linuxu From Scratch (LFS) vydala Linux Linux From Scratch 8.0 a Linux From Scratch 8.0 se systemd. Nové verze knih s návody na instalaci vlastního linuxového systému ze zdrojových kódů přichází především s Glibc 2.25 a GCC 6.3.0. Současně bylo oznámeno vydání verze 8.0 knih Beyond Linux From Scratch (BLFS) a Beyond Linux From Scratch se systemd.

Ladislav Hagara | Komentářů: 0
dnes 11:11 | Nová verze

Byla vydána verze 0.10.0 webového prohlížeče qutebrowser (Wikipedie). Přehled novinek v příspěvku na blogu. Vývojáři qutebrowseru kladou důraz na ovladatelnost pomocí klávesnice a minimální GUI. Inspirovali se prohlížečem dwb a rozšířeními pro Firefox Vimperator a Pentadactyl. Prohlížeč qutebrowser je naprogramován v Pythonu a využívá PyQt5. Zdrojové kódy jsou k dispozici na GitHubu pod licencí GNU GPL 3.

Ladislav Hagara | Komentářů: 9
včera 16:22 | Nová verze

Po pěti měsících od vydání Waylandu a Westonu 1.12.0 oznámil Bryce Harrington (Samsung) vydání Waylandu 1.13.0 a Westonu 2.0.0.

Ladislav Hagara | Komentářů: 0
24.2. 13:37 | Bezpečnostní upozornění

Společnost Cloudflare (Wikipedie) na svém blogu potvrdila bezpečnostní problém s její službou. V požadovaných odpovědích od reverzní proxy byla odesílána také data z neinicializované paměti. Útočník tak mohl získat cookies, autentizační tokeny, data posílaná přes HTTP POST a další citlivé informace. Jednalo se o chybu v parsování HTML. Zneužitelná byla od 22. září 2016 do 18. února 2017. Seznam webů, kterých se bezpečnostní problém potenciálně týká na GitHubu.

Ladislav Hagara | Komentářů: 1
24.2. 08:22 | Nová verze

Byla vydána první beta verze Ubuntu 17.04 s kódovým názvem Zesty Zapus. Ke stažení jsou obrazy Kubuntu, Lubuntu, Ubuntu Budgie, Ubuntu GNOME, Ubuntu Kylin, Ubuntu Studio a Xubuntu. Dle plánu by Ubuntu 17.04 mělo vyjít 13. dubna 2017.

Ladislav Hagara | Komentářů: 51
23.2. 17:53 | Bezpečnostní upozornění

Google na svém blogu věnovaném počítačové bezpečnost informuje o nalezení "reálného" způsobu generování kolizí hašovací funkce SHA-1. Podrobnosti a zdrojové kódy budou zveřejněny do 90 dnů. Již dnes lze ale na stránce SHAttered nalézt 2 pdf soubory, jejichž obsah se liší a SHA-1 otisk je stejný (infografika).

Ladislav Hagara | Komentářů: 39
23.2. 17:51 | Nová verze

Vyšla nová verzia open source software na správu a automatizáciu cloudových datacentier Danube Cloud 2.4. Danube Cloud je riešenie postavené na SmartOS, ZFS, KVM a zónach. Obsahuje vlastnosti ako integrovaný monitoring, DNS manažment, zálohy, a samozrejme rozsiahlu dokumentáciu.

dano | Komentářů: 12
23.2. 17:46 | Pozvánky

V Plzni se 3. až 5. března 2017 uskuteční AIMTEChackathon. Je to akce pro vývojáře, grafiky, webdesignéry i veřejnost. Akci provází zajímavé přednášky IT odborníků. Více o programu a možnosti přihlášení na stránkách akce.

cuba | Komentářů: 0
23.2. 01:00 | Nová verze

Známý šifrovaný komunikátor Signal od verze 3.30.0 již nevyžaduje Google Play Services. Autoři tak po letech vyslyšeli volání komunity, která dala vzniknout Google-free forku LibreSignal (dnes již neudržovaný). Oficiální binárky jsou stále distribuované pouze přes Google Play, ale lze použít neoficiální F-Droid repozitář fdroid.eutopia.cz s nezávislými buildy Signalu nebo oficiální binárku stáhnout z Google Play i bez Google účtu

… více »
xm | Komentářů: 8
22.2. 23:14 | Nová verze

Po třech týdnech od vydání první RC verze byla vydána první stabilní verze 17.01.0 linuxové distribuce pro routery a vestavěné systémy LEDE (Linux Embedded Development Environment), forku linuxové distribuce OpenWrt. Přehled novinek v poznámkách k vydání. Dotazy v diskusním fóru.

Ladislav Hagara | Komentářů: 8
Jak se stavíte k trendu ztenčování přenosných zařízení (smartphony, notebooky)?
 (13%)
 (2%)
 (72%)
 (3%)
 (10%)
Celkem 715 hlasů
 Komentářů: 66, poslední 22.2. 18:57
    Rozcestník

    Dotaz: RaspberryPi: Timeout při mountovani NFS

    19.1.2015 09:47 Hrabosh | skóre: 26 | blog: HBlog | Brno
    RaspberryPi: Timeout při mountovani NFS
    Přečteno: 327×
    Zdravím,

    bylo nebylo, měl jsem server s Debianem, na kterým běží NFS. K němu se připojují klienti (muj pracovní desktop) a RaspberryPi, který dělá automatické zálohy. Všechno beželo v síti 192.168.1.x ...

    ... pak jsme se přestěhovali. Po zapnutí server nabootoval a všechno se zdálo OK. Po zapnutí Raspberry se ale už nepřipojily NFS sdílení ze serveru. Ale z desktopu všechno fungovalo, jako dřív. Pak nám zapojili Internet přes WiFi a tímpádem mám na střeše něco jako Microtik, co funguje jako router a vnitřní sít má nastavenou na 192.168.1.x ...

    .. díky tomu jsem změnil nastavení své sítě na 192.168.8.x, abych neměl bordel ve směrování. Změnil jsem IP adresy serveru (pro vnitřní síť), a přenastavil DHCP server, aby přiděloval klientům adresy z 192.168.8.x. Změnil jsem adresy v exportu a v hosts.allow ...

    .. z desktopu si teď NFS sdílení normálně připojím, ale z Raspberry ne. Skončí to timeoutem. Zkoušel jsem se dívat do logů na server, ale nevidím tam žádnou chybu ani snahu Raspberry o připojení. Připojování (úspěšné) desktopu v logu vidím.

    ... napadá někoho, co zkontrolovat a jak pátrat dál?

    díky, Zb.
    To jsem psal já ... to není bordel, to je modulární!

    Řešení dotazu:


    Odpovědi

    19.1.2015 11:03 mhepp
    Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
    A /etc/fstab jsi zmenil? ;-)

    Zkus rekurzivni grep stareho rozsahu adres v /etc. Treba jsi na neco zapomnel. Pokud ne, tak napis, co rika tcpdump...
    19.1.2015 18:42 Hrabosh | skóre: 26 | blog: HBlog | Brno
    Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
    FSTAB jsem měnil :-) Dokonce jsem je porovnával na Raspberry vs. desktop a jsou stejný.

    Tímhle příkazem jsem se snažil o připojení:
    root@Raspberry:~# mount -v 192.168.8.254:/mnt/storage
    mount.nfs: timeout set for Mon Jan 19 17:40:28 2015
    mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
    mount.nfs: prog 100003, trying vers=3, prot=6
    mount.nfs: trying 192.168.8.254 prog 100003 vers 3 prot TCP port 2049
    mount.nfs: prog 100005, trying vers=3, prot=17
    mount.nfs: portmap query retrying: RPC: Timed out
    mount.nfs: prog 100005, trying vers=3, prot=6
    mount.nfs: portmap query failed: RPC: Timed out
    mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
    mount.nfs: prog 100003, trying vers=3, prot=6
    mount.nfs: portmap query retrying: RPC: Timed out
    mount.nfs: prog 100003, trying vers=3, prot=17
    mount.nfs: portmap query failed: RPC: Timed out
    mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
    mount.nfs: prog 100003, trying vers=3, prot=6
    mount.nfs: portmap query retrying: RPC: Timed out
    mount.nfs: prog 100003, trying vers=3, prot=17
    mount.nfs: portmap query failed: RPC: Timed out
    mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
    mount.nfs: prog 100003, trying vers=3, prot=6
    mount.nfs: portmap query retrying: RPC: Timed out
    mount.nfs: prog 100003, trying vers=3, prot=17
    mount.nfs: portmap query failed: RPC: Timed out
    mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
    mount.nfs: prog 100003, trying vers=3, prot=6
    mount.nfs: portmap query retrying: RPC: Timed out
    mount.nfs: prog 100003, trying vers=3, prot=17
    mount.nfs: portmap query failed: RPC: Timed out
    mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
    mount.nfs: prog 100003, trying vers=3, prot=6
    mount.nfs: portmap query retrying: RPC: Timed out
    mount.nfs: prog 100003, trying vers=3, prot=17
    mount.nfs: portmap query failed: RPC: Timed out
    mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
    mount.nfs: prog 100003, trying vers=3, prot=6
    mount.nfs: portmap query retrying: RPC: Timed out
    mount.nfs: prog 100003, trying vers=3, prot=17
    mount.nfs: portmap query failed: RPC: Timed out
    mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
    mount.nfs: prog 100003, trying vers=3, prot=6
    mount.nfs: portmap query retrying: RPC: Timed out
    mount.nfs: prog 100003, trying vers=3, prot=17
    mount.nfs: portmap query failed: RPC: Timed out
    mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
    mount.nfs: prog 100003, trying vers=3, prot=6
    mount.nfs: portmap query retrying: RPC: Timed out
    mount.nfs: prog 100003, trying vers=3, prot=17
    mount.nfs: portmap query failed: RPC: Timed out
    mount.nfs: Connection timed out
    
    A tohle je tcpdump na serveru:
    DebServer:~# tcpdump -i eth0 -n "src host 192.168.8.15 or dst host 192.168.8.15"
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
    18:38:31.576481 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [S], seq 2753227116, win 14600, options [mss 1460,sackOK,TS val 4879814 ecr 0,nop,wscale 5], length 0
    18:38:31.576908 ARP, Request who-has 192.168.8.15 tell 192.168.8.254, length 28
    18:38:31.577453 ARP, Reply 192.168.8.15 is-at b8:27:eb:c7:9e:03, length 46
    18:38:31.577505 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [S.], seq 1699708128, ack 2753227117, win 14480, options [mss 1460,sackOK,TS val 38336853 ecr 4879814,nop,wscale 6], length 0
    18:38:31.578198 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4879814 ecr 38336853], length 0
    18:38:31.580351 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4879814 ecr 38336853], length 60
    18:38:31.580555 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [.], ack 61, win 227, options [nop,nop,TS val 38336854 ecr 4879814], length 0
    18:38:36.583103 ARP, Request who-has 192.168.8.254 tell 192.168.8.15, length 46
    18:38:36.583181 ARP, Reply 192.168.8.254 is-at 00:50:fc:32:aa:54, length 28
    18:38:36.607803 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [P.], seq 1:33, ack 61, win 227, options [nop,nop,TS val 38338111 ecr 4879814], length 32
    18:38:36.608597 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [.], ack 33, win 457, options [nop,nop,TS val 4880317 ecr 38338111], length 0
    18:38:36.608965 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [F.], seq 61, ack 33, win 457, options [nop,nop,TS val 4880317 ecr 38338111], length 0
    18:38:36.609294 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [F.], seq 33, ack 62, win 227, options [nop,nop,TS val 38338111 ecr 4880317], length 0
    18:38:36.610098 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [.], ack 34, win 457, options [nop,nop,TS val 4880317 ecr 38338111], length 0
    18:38:36.612227 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [S], seq 108985776, win 14600, options [mss 1460,sackOK,TS val 4880317 ecr 0,nop,wscale 5], length 0
    18:38:36.612495 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [S.], seq 3189092813, ack 108985777, win 14480, options [mss 1460,sackOK,TS val 38338112 ecr 4880317,nop,wscale 6], length 0
    18:38:36.613213 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [.], ack 1, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 0
    18:38:36.614121 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [P.], seq 1:45, ack 1, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 44: NFS request xid 3915526125 40 null
    18:38:36.614299 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [.], ack 45, win 227, options [nop,nop,TS val 38338112 ecr 4880318], length 0
    18:38:36.614544 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 38338112 ecr 4880318], length 28: NFS reply xid 3915526125 reply ok 24 null
    18:38:36.615222 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [.], ack 29, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 0
    18:38:36.615471 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [F.], seq 45, ack 29, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 0
    18:38:36.615685 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [F.], seq 29, ack 46, win 227, options [nop,nop,TS val 38338113 ecr 4880318], length 0
    18:38:36.616479 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [.], ack 30, win 457, options [nop,nop,TS val 4880318 ecr 38338113], length 0
    18:38:36.623339 IP 192.168.8.15.51162 > 192.168.8.254.111: UDP, length 56
    18:38:37.624634 IP 192.168.8.15.51162 > 192.168.8.254.111: UDP, length 56
    18:38:38.626110 IP 192.168.8.15.51162 > 192.168.8.254.111: UDP, length 56
    18:38:39.636368 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [S], seq 3224079441, win 14600, options [mss 1460,sackOK,TS val 4880620 ecr 0,nop,wscale 5], length 0
    18:38:39.636664 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [S.], seq 1179209341, ack 3224079442, win 14480, options [mss 1460,sackOK,TS val 38338868 ecr 4880620,nop,wscale 6], length 0
    18:38:39.637345 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4880620 ecr 38338868], length 0
    18:38:39.638108 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4880620 ecr 38338868], length 60
    18:38:39.638271 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [.], ack 61, win 227, options [nop,nop,TS val 38338868 ecr 4880620], length 0
    18:38:41.644090 IP 192.168.8.254.111 > 192.168.8.15.51162: UDP, length 28
    18:38:41.644873 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 51162 unreachable, length 64
    18:38:46.656309 IP 192.168.8.254.111 > 192.168.8.15.51162: UDP, length 28
    18:38:46.657121 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 51162 unreachable, length 64
    18:38:49.646623 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4881621 ecr 38338868], length 0
    18:38:49.666498 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [S], seq 2646766983, win 14600, options [mss 1460,sackOK,TS val 4881623 ecr 0,nop,wscale 5], length 0
    18:38:49.666790 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [S.], seq 3180317476, ack 2646766984, win 14480, options [mss 1460,sackOK,TS val 38341375 ecr 4881623,nop,wscale 6], length 0
    18:38:49.667612 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4881623 ecr 38341375], length 0
    18:38:49.668255 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4881623 ecr 38341375], length 60
    18:38:49.668417 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [.], ack 61, win 227, options [nop,nop,TS val 38341376 ecr 4881623], length 0
    18:38:49.683797 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [.], ack 62, win 227, options [nop,nop,TS val 38341380 ecr 4881621], length 0
    18:38:51.676646 IP 192.168.8.254.111 > 192.168.8.15.51162: UDP, length 28
    18:38:51.677502 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 51162 unreachable, length 64
    18:38:56.692942 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38343132 ecr 4881621], length 32
    18:38:56.693773 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [R], seq 3224079503, win 0, length 0
    18:38:59.677871 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4882624 ecr 38341376], length 0
    18:38:59.683407 IP 192.168.8.15.56896 > 192.168.8.254.111: UDP, length 56
    18:38:59.716373 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [.], ack 62, win 227, options [nop,nop,TS val 38343888 ecr 4882624], length 0
    18:39:00.683761 IP 192.168.8.15.56896 > 192.168.8.254.111: UDP, length 56
    18:39:01.685006 IP 192.168.8.15.56896 > 192.168.8.254.111: UDP, length 56
    18:39:01.709202 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38344386 ecr 4882624], length 32
    18:39:01.709887 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [R], seq 2646767045, win 0, length 0
    18:39:02.707022 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [S], seq 3184613553, win 14600, options [mss 1460,sackOK,TS val 4882927 ecr 0,nop,wscale 5], length 0
    18:39:02.707301 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [S.], seq 1491964470, ack 3184613554, win 14480, options [mss 1460,sackOK,TS val 38344635 ecr 4882927,nop,wscale 6], length 0
    18:39:02.708129 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4882927 ecr 38344635], length 0
    18:39:02.708790 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4882927 ecr 38344635], length 60
    18:39:02.708949 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [.], ack 61, win 227, options [nop,nop,TS val 38344636 ecr 4882927], length 0
    18:39:06.729882 IP 192.168.8.254.111 > 192.168.8.15.56896: UDP, length 28
    18:39:06.730658 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 56896 unreachable, length 64
    18:39:11.749830 IP 192.168.8.254.111 > 192.168.8.15.56896: UDP, length 28
    18:39:11.750548 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 56896 unreachable, length 64
    18:39:12.717268 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4883928 ecr 38344636], length 0
    18:39:12.722661 IP 192.168.8.15.52285 > 192.168.8.254.111: UDP, length 56
    18:39:12.757108 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [.], ack 62, win 227, options [nop,nop,TS val 38347148 ecr 4883928], length 0
    18:39:13.724045 IP 192.168.8.15.52285 > 192.168.8.254.111: UDP, length 56
    18:39:14.725291 IP 192.168.8.15.52285 > 192.168.8.254.111: UDP, length 56
    18:39:15.746921 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [S], seq 2636641934, win 14600, options [mss 1460,sackOK,TS val 4884231 ecr 0,nop,wscale 5], length 0
    18:39:15.747195 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [S.], seq 16293083, ack 2636641935, win 14480, options [mss 1460,sackOK,TS val 38347895 ecr 4884231,nop,wscale 6], length 0
    18:39:15.747910 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4884231 ecr 38347895], length 0
    18:39:15.748675 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4884231 ecr 38347895], length 60
    18:39:15.748833 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [.], ack 61, win 227, options [nop,nop,TS val 38347895 ecr 4884231], length 0
    18:39:16.766039 IP 192.168.8.254.111 > 192.168.8.15.56896: UDP, length 28
    18:39:16.766790 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 56896 unreachable, length 64
    18:39:21.790383 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38349406 ecr 4883928], length 32
    18:39:21.791195 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [R], seq 3184613615, win 0, length 0
    18:39:25.757180 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4885232 ecr 38347895], length 0
    18:39:25.762683 IP 192.168.8.15.52774 > 192.168.8.254.111: UDP, length 56
    18:39:25.793870 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [.], ack 62, win 227, options [nop,nop,TS val 38350407 ecr 4885232], length 0
    18:39:26.763924 IP 192.168.8.15.52774 > 192.168.8.254.111: UDP, length 56
    18:39:26.810722 IP 192.168.8.254.111 > 192.168.8.15.52285: UDP, length 28
    18:39:26.811452 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52285 unreachable, length 64
    18:39:27.765318 IP 192.168.8.15.52774 > 192.168.8.254.111: UDP, length 56
    18:39:28.787315 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [S], seq 3390959618, win 14600, options [mss 1460,sackOK,TS val 4885535 ecr 0,nop,wscale 5], length 0
    18:39:28.787627 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [S.], seq 2156693596, ack 3390959619, win 14480, options [mss 1460,sackOK,TS val 38351155 ecr 4885535,nop,wscale 6], length 0
    18:39:28.788423 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4885535 ecr 38351155], length 0
    18:39:28.789086 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4885535 ecr 38351155], length 60
    18:39:28.789243 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [.], ack 61, win 227, options [nop,nop,TS val 38351155 ecr 4885535], length 0
    18:39:31.838905 IP 192.168.8.254.111 > 192.168.8.15.52285: UDP, length 28
    18:39:31.839705 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52285 unreachable, length 64
    18:39:36.863265 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38353174 ecr 4885232], length 32
    18:39:36.864097 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [R], seq 2636641996, win 0, length 0
    18:39:38.797570 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4886536 ecr 38351155], length 0
    18:39:38.802966 IP 192.168.8.15.44476 > 192.168.8.254.111: UDP, length 56
    18:39:38.834611 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [.], ack 62, win 227, options [nop,nop,TS val 38353667 ecr 4886536], length 0
    18:39:39.804460 IP 192.168.8.15.44476 > 192.168.8.254.111: UDP, length 56
    18:39:40.805707 IP 192.168.8.15.44476 > 192.168.8.254.111: UDP, length 56
    18:39:41.827194 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [S], seq 1319031536, win 14600, options [mss 1460,sackOK,TS val 4886839 ecr 0,nop,wscale 5], length 0
    18:39:41.827464 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [S.], seq 1594023728, ack 1319031537, win 14480, options [mss 1460,sackOK,TS val 38354415 ecr 4886839,nop,wscale 6], length 0
    18:39:41.828198 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4886839 ecr 38354415], length 0
    18:39:41.828847 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4886839 ecr 38354415], length 60
    18:39:41.829008 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [.], ack 61, win 227, options [nop,nop,TS val 38354415 ecr 4886839], length 0
    18:39:41.879510 IP 192.168.8.254.111 > 192.168.8.15.52285: UDP, length 28
    18:39:41.880223 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52285 unreachable, length 64
    18:39:46.895757 IP 192.168.8.254.111 > 192.168.8.15.52774: UDP, length 28
    18:39:46.896601 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52774 unreachable, length 64
    18:39:51.837476 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4887840 ecr 38354415], length 0
    18:39:51.842987 IP 192.168.8.15.53567 > 192.168.8.254.111: UDP, length 56
    18:39:51.875375 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [.], ack 62, win 227, options [nop,nop,TS val 38356927 ecr 4887840], length 0
    18:39:51.916091 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38356937 ecr 4886536], length 32
    18:39:51.916735 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [R], seq 3390959680, win 0, length 0
    18:39:52.844243 IP 192.168.8.15.53567 > 192.168.8.254.111: UDP, length 56
    18:39:53.845597 IP 192.168.8.15.53567 > 192.168.8.254.111: UDP, length 56
    18:39:54.867339 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [S], seq 2240372835, win 14600, options [mss 1460,sackOK,TS val 4888143 ecr 0,nop,wscale 5], length 0
    18:39:54.867669 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [S.], seq 3791063078, ack 2240372836, win 14480, options [mss 1460,sackOK,TS val 38357675 ecr 4888143,nop,wscale 6], length 0
    18:39:54.868466 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4888143 ecr 38357675], length 0
    18:39:54.869129 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4888143 ecr 38357675], length 60
    18:39:54.869288 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [.], ack 61, win 227, options [nop,nop,TS val 38357675 ecr 4888143], length 0
    18:39:56.936406 IP 192.168.8.254.111 > 192.168.8.15.52774: UDP, length 28
    18:39:56.937130 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52774 unreachable, length 64
    18:40:01.952637 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38359446 ecr 4887840], length 32
    18:40:01.953494 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [R], seq 1319031598, win 0, length 0
    18:40:04.877619 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4889144 ecr 38357675], length 0
    18:40:04.882999 IP 192.168.8.15.44848 > 192.168.8.254.111: UDP, length 56
    18:40:04.916114 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [.], ack 62, win 227, options [nop,nop,TS val 38360187 ecr 4889144], length 0
    18:40:05.033639 IP 192.168.8.15.42414 > 74.125.136.188.5228: Flags [P.], seq 2403489553:2403489582, ack 1359725540, win 10100, options [nop,nop,TS val 3514673 ecr 2823099368], length 29
    18:40:05.094240 IP 74.125.136.188.5228 > 192.168.8.15.42414: Flags [P.], seq 1:30, ack 29, win 358, options [nop,nop,TS val 2823999490 ecr 3514673], length 29
    18:40:05.110013 IP 192.168.8.15.42414 > 74.125.136.188.5228: Flags [.], ack 30, win 10100, options [nop,nop,TS val 3514679 ecr 2823999490], length 0
    18:40:05.884248 IP 192.168.8.15.44848 > 192.168.8.254.111: UDP, length 56
    18:40:06.885520 IP 192.168.8.15.44848 > 192.168.8.254.111: UDP, length 56
    18:40:06.976983 IP 192.168.8.254.111 > 192.168.8.15.52774: UDP, length 28
    18:40:06.977647 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52774 unreachable, length 64
    18:40:07.907357 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [S], seq 2680357298, win 14600, options [mss 1460,sackOK,TS val 4889447 ecr 0,nop,wscale 5], length 0
    18:40:07.907627 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [S.], seq 3083730774, ack 2680357299, win 14480, options [mss 1460,sackOK,TS val 38360934 ecr 4889447,nop,wscale 6], length 0
    18:40:07.908360 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4889447 ecr 38360934], length 0
    18:40:07.909134 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4889447 ecr 38360934], length 60
    18:40:07.909296 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [.], ack 61, win 227, options [nop,nop,TS val 38360935 ecr 4889447], length 0
    18:40:11.997317 IP 192.168.8.254.111 > 192.168.8.15.44476: UDP, length 28
    18:40:11.998163 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44476 unreachable, length 64
    18:40:17.021488 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38363213 ecr 4889144], length 32
    18:40:17.022280 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [R], seq 2240372897, win 0, length 0
    18:40:17.917632 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4890448 ecr 38360935], length 0
    18:40:17.923007 IP 192.168.8.15.40182 > 192.168.8.254.111: UDP, length 56
    18:40:17.956855 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [.], ack 62, win 227, options [nop,nop,TS val 38363447 ecr 4890448], length 0
    18:40:18.924395 IP 192.168.8.15.40182 > 192.168.8.254.111: UDP, length 56
    18:40:19.925643 IP 192.168.8.15.40182 > 192.168.8.254.111: UDP, length 56
    18:40:20.947375 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [S], seq 4156425691, win 14600, options [mss 1460,sackOK,TS val 4890751 ecr 0,nop,wscale 5], length 0
    18:40:20.947646 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [S.], seq 2423865039, ack 4156425692, win 14480, options [mss 1460,sackOK,TS val 38364194 ecr 4890751,nop,wscale 6], length 0
    18:40:20.948397 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4890751 ecr 38364194], length 0
    18:40:20.949022 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4890751 ecr 38364194], length 60
    18:40:20.949183 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [.], ack 61, win 227, options [nop,nop,TS val 38364195 ecr 4890751], length 0
    18:40:22.041863 IP 192.168.8.254.111 > 192.168.8.15.44476: UDP, length 28
    18:40:22.042551 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44476 unreachable, length 64
    18:40:27.062172 IP 192.168.8.254.111 > 192.168.8.15.44476: UDP, length 28
    18:40:27.062927 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44476 unreachable, length 64
    18:40:30.958528 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4891752 ecr 38364195], length 0
    18:40:30.964028 IP 192.168.8.15.50439 > 192.168.8.254.111: UDP, length 56
    18:40:30.997614 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [.], ack 62, win 227, options [nop,nop,TS val 38366707 ecr 4891752], length 0
    18:40:31.965414 IP 192.168.8.15.50439 > 192.168.8.254.111: UDP, length 56
    18:40:32.082343 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38366978 ecr 4890448], length 32
    18:40:32.083172 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [R], seq 2680357360, win 0, length 0
    18:40:32.966681 IP 192.168.8.15.50439 > 192.168.8.254.111: UDP, length 56
    18:40:37.098734 IP 192.168.8.254.111 > 192.168.8.15.53567: UDP, length 28
    18:40:37.099517 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 53567 unreachable, length 64
    18:40:42.119085 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38369487 ecr 4891752], length 32
    18:40:42.119819 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [R], seq 4156425753, win 0, length 0
    18:40:47.135230 IP 192.168.8.254.111 > 192.168.8.15.53567: UDP, length 28
    18:40:47.136082 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 53567 unreachable, length 64
    18:40:50.036130 IP 192.168.8.15.68 > 192.168.8.254.67: BOOTP/DHCP, Request from b8:27:eb:c7:9e:03, length 300
    18:40:50.037200 IP 192.168.8.254.67 > 192.168.8.15.68: BOOTP/DHCP, Reply, length 300
    18:40:52.151695 IP 192.168.8.254.111 > 192.168.8.15.53567: UDP, length 28
    18:40:52.152608 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 53567 unreachable, length 64
    18:40:57.171909 IP 192.168.8.254.111 > 192.168.8.15.44848: UDP, length 28
    18:40:57.172729 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44848 unreachable, length 64
    18:41:02.188121 IP 192.168.8.254.111 > 192.168.8.15.44848: UDP, length 28
    18:41:02.188979 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44848 unreachable, length 64
    18:41:07.208488 IP 192.168.8.254.111 > 192.168.8.15.44848: UDP, length 28
    18:41:07.209256 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44848 unreachable, length 64
    18:41:12.229213 IP 192.168.8.254.111 > 192.168.8.15.40182: UDP, length 28
    18:41:12.229992 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 40182 unreachable, length 64
    18:41:17.245487 IP 192.168.8.254.111 > 192.168.8.15.40182: UDP, length 28
    18:41:17.246261 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 40182 unreachable, length 64
    18:41:22.265326 IP 192.168.8.254.111 > 192.168.8.15.40182: UDP, length 28
    18:41:22.266160 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 40182 unreachable, length 64
    18:41:27.266016 ARP, Request who-has 192.168.8.254 tell 192.168.8.15, length 46
    18:41:27.266086 ARP, Reply 192.168.8.254 is-at 00:50:fc:32:aa:54, length 28
    18:41:27.285685 IP 192.168.8.254.111 > 192.168.8.15.50439: UDP, length 28
    18:41:27.286522 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 50439 unreachable, length 64
    18:41:32.305873 IP 192.168.8.254.111 > 192.168.8.15.50439: UDP, length 28
    18:41:32.306674 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 50439 unreachable, length 64
    18:41:37.322326 IP 192.168.8.254.111 > 192.168.8.15.50439: UDP, length 28
    18:41:37.323051 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 50439 unreachable, length 64
    ^C
    193 packets captured
    193 packets received by filter
    0 packets dropped by kernel
    
    To jsem psal já ... to není bordel, to je modulární!
    19.1.2015 18:50 Hrabosh | skóre: 26 | blog: HBlog | Brno
    Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
    Mimochodem tohle je příkaz z desktopu:
    GentooOnPhenomII hrabosh # mount -v 192.168.8.254:/mnt/storage
    mount.nfs: timeout set for Mon Jan 19 18:47:35 2015
    mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254'
    mount.nfs: prog 100003, trying vers=3, prot=6
    mount.nfs: trying 192.168.8.254 prog 100003 vers 3 prot TCP port 2049
    mount.nfs: prog 100005, trying vers=3, prot=17
    mount.nfs: trying 192.168.8.254 prog 100005 vers 3 prot UDP port 42976
    
    A tcpdump:
    DebServer:~# tcpdump -i eth0 -n "src host 192.168.8.1 or dst host 192.168.8.1"
    tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
    listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes
    18:45:38.185148 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [S], seq 171002076, win 14600, options [mss 1460,sackOK,TS val 6666885 ecr 0,nop,wscale 7], length 0
    18:45:38.185457 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [S.], seq 1840938392, ack 171002077, win 14480, options [mss 1460,sackOK,TS val 38443499 ecr 6666885,nop,wscale 6], length 0
    18:45:38.185576 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666886 ecr 38443499], length 0
    18:45:38.185811 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 115, options [nop,nop,TS val 6666886 ecr 38443499], length 60
    18:45:38.185973 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [.], ack 61, win 227, options [nop,nop,TS val 38443499 ecr 6666886], length 0
    18:45:38.188570 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [P.], seq 1:33, ack 61, win 227, options [nop,nop,TS val 38443500 ecr 6666886], length 32
    18:45:38.188711 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [.], ack 33, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 0
    18:45:38.188842 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [F.], seq 61, ack 33, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 0
    18:45:38.188944 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [S], seq 1728122381, win 14600, options [mss 1460,sackOK,TS val 6666889 ecr 0,nop,wscale 7], length 0
    18:45:38.189165 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [S.], seq 334187119, ack 1728122382, win 14480, options [mss 1460,sackOK,TS val 38443500 ecr 6666889,nop,wscale 6], length 0
    18:45:38.189294 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 0
    18:45:38.189495 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [P.], seq 1:45, ack 1, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 44: NFS request xid 1055388326 40 null
    18:45:38.189639 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [.], ack 45, win 227, options [nop,nop,TS val 38443500 ecr 6666889], length 0
    18:45:38.189997 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 38443500 ecr 6666889], length 28: NFS reply xid 1055388326 reply ok 24 null
    18:45:38.190088 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [.], ack 29, win 115, options [nop,nop,TS val 6666890 ecr 38443500], length 0
    18:45:38.190209 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [F.], seq 45, ack 29, win 115, options [nop,nop,TS val 6666890 ecr 38443500], length 0
    18:45:38.190321 IP 192.168.8.1.45961 > 192.168.8.254.111: UDP, length 56
    18:45:38.190640 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [F.], seq 29, ack 46, win 227, options [nop,nop,TS val 38443500 ecr 6666890], length 0
    18:45:38.190732 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [.], ack 30, win 115, options [nop,nop,TS val 6666891 ecr 38443500], length 0
    18:45:38.192848 IP 192.168.8.254.111 > 192.168.8.1.45961: UDP, length 28
    18:45:38.193036 IP 192.168.8.1.36934 > 192.168.8.254.42976: UDP, length 40
    18:45:38.193555 IP 192.168.8.254.42976 > 192.168.8.1.36934: UDP, length 24
    18:45:38.193859 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [F.], seq 33, ack 62, win 227, options [nop,nop,TS val 38443501 ecr 6666889], length 0
    18:45:38.193968 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [.], ack 34, win 115, options [nop,nop,TS val 6666894 ecr 38443501], length 0
    18:45:38.194266 IP 192.168.8.1.693 > 192.168.8.254.42976: UDP, length 40
    18:45:38.194717 IP 192.168.8.254.42976 > 192.168.8.1.693: UDP, length 24
    18:45:38.194860 IP 192.168.8.1.693 > 192.168.8.254.42976: UDP, length 132
    18:45:38.201342 IP 192.168.8.254.42976 > 192.168.8.1.693: UDP, length 60
    18:45:38.201562 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [S], seq 4070763372, win 14600, options [mss 1460,sackOK,TS val 6666902 ecr 0,nop,wscale 7], length 0
    18:45:38.201867 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [S.], seq 229387312, ack 4070763373, win 14480, options [mss 1460,sackOK,TS val 38443503 ecr 6666902,nop,wscale 6], length 0
    18:45:38.201944 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666902 ecr 38443503], length 0
    18:45:38.202159 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [P.], seq 1:97, ack 1, win 115, options [nop,nop,TS val 6666902 ecr 38443503], length 96
    18:45:38.202317 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [.], ack 97, win 227, options [nop,nop,TS val 38443503 ecr 6666902], length 0
    18:45:38.204815 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [P.], seq 1:33, ack 97, win 227, options [nop,nop,TS val 38443504 ecr 6666902], length 32
    18:45:38.204956 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [.], ack 33, win 115, options [nop,nop,TS val 6666905 ecr 38443504], length 0
    18:45:38.205091 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [F.], seq 97, ack 33, win 115, options [nop,nop,TS val 6666905 ecr 38443504], length 0
    18:45:38.205192 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [S], seq 2670145583, win 14600, options [mss 1460,sackOK,TS val 6666905 ecr 0,nop,wscale 7], length 0
    18:45:38.205412 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [S.], seq 499348534, ack 2670145584, win 14480, options [mss 1460,sackOK,TS val 38443504 ecr 6666905,nop,wscale 6], length 0
    18:45:38.205524 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666906 ecr 38443504], length 0
    18:45:38.205721 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 1:45, ack 1, win 115, options [nop,nop,TS val 6666906 ecr 38443504], length 44: NFS request xid 2064517340 40 null
    18:45:38.205864 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [.], ack 45, win 227, options [nop,nop,TS val 38443504 ecr 6666906], length 0
    18:45:38.206230 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 38443504 ecr 6666906], length 28: NFS reply xid 2064517340 reply ok 24 null
    18:45:38.206336 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [.], ack 29, win 115, options [nop,nop,TS val 6666906 ecr 38443504], length 0
    18:45:38.206803 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [F.], seq 33, ack 98, win 227, options [nop,nop,TS val 38443504 ecr 6666905], length 0
    18:45:38.206875 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 45:89, ack 29, win 115, options [nop,nop,TS val 6666907 ecr 38443504], length 44: NFS request xid 2081294556 40 null
    18:45:38.206990 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [.], ack 34, win 115, options [nop,nop,TS val 6666907 ecr 38443504], length 0
    18:45:38.207319 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 29:57, ack 89, win 227, options [nop,nop,TS val 38443505 ecr 6666907], length 28: NFS reply xid 2081294556 reply ok 24 null
    18:45:38.207472 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 89:233, ack 57, win 115, options [nop,nop,TS val 6666907 ecr 38443505], length 144: NFS request xid 2098071772 140 fsinfo fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD548F2F730C
    18:45:38.208875 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 57:141, ack 233, win 243, options [nop,nop,TS val 38443505 ecr 6666907], length 84: NFS reply xid 2098071772 reply ok 80 fsinfo rtmax 65536 rtpref 65536 wtmax 65536 wtpref 65536 dtpref 4096
    18:45:38.209241 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 233:377, ack 141, win 115, options [nop,nop,TS val 6666909 ecr 38443505], length 144: NFS request xid 2114848988 140 pathconf fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39ED8000000C242BD545BC27E0C
    18:45:38.209633 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 141:201, ack 377, win 260, options [nop,nop,TS val 38443505 ecr 6666909], length 60: NFS reply xid 2114848988 reply ok 56 pathconf linkmax 32000 namemax 255  chownres  keepcase
    18:45:38.209952 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 377:521, ack 201, win 115, options [nop,nop,TS val 6666910 ecr 38443505], length 144: NFS request xid 2131626204 140 getattr fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39E10010000C242BD54D5AE880C
    18:45:38.210284 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 201:317, ack 521, win 277, options [nop,nop,TS val 38443505 ecr 6666910], length 116: NFS reply xid 2131626204 reply ok 112 getattr DIR 40777 ids 1000/6 sz 4096
    18:45:38.210665 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 521:665, ack 317, win 115, options [nop,nop,TS val 6666911 ecr 38443505], length 144: NFS request xid 2148403420 140 fsinfo fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD544FAE930C
    18:45:38.211005 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 317:401, ack 665, win 294, options [nop,nop,TS val 38443505 ecr 6666911], length 84: NFS reply xid 2148403420 reply ok 80 fsinfo rtmax 65536 rtpref 65536 wtmax 65536 wtpref 65536 dtpref 4096
    18:45:38.211354 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 665:809, ack 401, win 115, options [nop,nop,TS val 6666911 ecr 38443505], length 144: NFS request xid 2165180636 140 getattr fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39E10010000C242BD54A8DFA70C
    18:45:38.212328 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 401:517, ack 809, win 310, options [nop,nop,TS val 38443506 ecr 6666911], length 116: NFS reply xid 2165180636 reply ok 112 getattr DIR 40777 ids 1000/6 sz 4096
    18:45:38.216102 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 809:977, ack 517, win 115, options [nop,nop,TS val 6666916 ecr 38443506], length 168: NFS request xid 2181957852 164 fsstat fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD5482AFF70C
    18:45:38.217558 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 517:605, ack 977, win 327, options [nop,nop,TS val 38443507 ecr 6666916], length 88: NFS reply xid 2181957852 reply ok 84 fsstat tbytes 1426807054336 fbytes 78634078208 abytes 6161989632
    18:45:38.221446 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 977:1145, ack 605, win 115, options [nop,nop,TS val 6666921 ecr 38443507], length 168: NFS request xid 2198735068 164 fsstat fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD54A9CC380D
    18:45:38.221826 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 605:693, ack 1145, win 344, options [nop,nop,TS val 38443508 ecr 6666921], length 88: NFS reply xid 2198735068 reply ok 84 fsstat tbytes 1426807054336 fbytes 78634078208 abytes 6161989632
    18:45:38.222384 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 1145:1313, ack 693, win 115, options [nop,nop,TS val 6666922 ecr 38443508], length 168: NFS request xid 2215512284 164 fsstat fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD54EDA2460D
    18:45:38.222733 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 693:781, ack 1313, win 361, options [nop,nop,TS val 38443508 ecr 6666922], length 88: NFS reply xid 2215512284 reply ok 84 fsstat tbytes 1426807054336 fbytes 78634078208 abytes 6161989632
    18:45:38.262545 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [.], ack 781, win 115, options [nop,nop,TS val 6666963 ecr 38443508], length 0
    18:45:42.212461 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [P.], seq 2064324282:2064325232, ack 246402904, win 331, options [nop,nop,TS val 6670912 ecr 1553629620], length 950
    18:45:42.212617 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [P.], seq 950:1002, ack 1, win 331, options [nop,nop,TS val 6670912 ecr 1553629620], length 52
    18:45:42.212786 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [P.], seq 1002:1231, ack 1, win 331, options [nop,nop,TS val 6670913 ecr 1553629620], length 229
    18:45:42.230519 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [.], ack 950, win 698, options [nop,nop,TS val 1553689645 ecr 6670912], length 0
    18:45:42.231740 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [.], ack 1002, win 698, options [nop,nop,TS val 1553689646 ecr 6670912], length 0
    18:45:42.231881 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [.], ack 1231, win 705, options [nop,nop,TS val 1553689647 ecr 6670913], length 0
    18:45:42.308686 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [P.], seq 1:657, ack 1231, win 705, options [nop,nop,TS val 1553689723 ecr 6670913], length 656
    18:45:42.308834 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [P.], seq 657:706, ack 1231, win 705, options [nop,nop,TS val 1553689723 ecr 6670913], length 49
    18:45:42.308989 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [.], ack 657, win 331, options [nop,nop,TS val 6671009 ecr 1553689723], length 0
    18:45:42.309143 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [.], ack 706, win 331, options [nop,nop,TS val 6671009 ecr 1553689723], length 0
    ^C
    74 packets captured
    74 packets received by filter
    0 packets dropped by kernel
    
    To jsem psal já ... to není bordel, to je modulární!
    19.1.2015 19:10 Zdenek 'Mst. Spider' Sedlak | skóre: 37 | blog: xMstSpider
    Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
    rpcinfo -p <nfs_server>, showmount -e <nfs_server> - rpi vs desktop? Je tam rozdil?
    19.1.2015 20:24 Hrabosh | skóre: 26 | blog: HBlog | Brno
    Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
    DebServer:~# rpcinfo -p
       program vers proto   port  service
        100000    4   tcp    111  portmapper
        100000    3   tcp    111  portmapper
        100000    2   tcp    111  portmapper
        100000    4   udp    111  portmapper
        100000    3   udp    111  portmapper
        100000    2   udp    111  portmapper
        100024    1   udp  46375  status
        100024    1   tcp  57985  status
        100003    2   tcp   2049  nfs
        100003    3   tcp   2049  nfs
        100003    4   tcp   2049  nfs
        100227    2   tcp   2049
        100227    3   tcp   2049
        100003    2   udp   2049  nfs
        100003    3   udp   2049  nfs
        100003    4   udp   2049  nfs
        100227    2   udp   2049
        100227    3   udp   2049
        100021    1   udp  44137  nlockmgr
        100021    3   udp  44137  nlockmgr
        100021    4   udp  44137  nlockmgr
        100021    1   tcp  37419  nlockmgr
        100021    3   tcp  37419  nlockmgr
        100021    4   tcp  37419  nlockmgr
        100005    1   udp  34853  mountd
        100005    1   tcp  33688  mountd
        100005    2   udp  32876  mountd
        100005    2   tcp  58310  mountd
        100005    3   udp  42976  mountd
        100005    3   tcp  38721  mountd
    
    Raspberry:
    root@Raspberry:~# showmount -e 192.168.8.254
    Export list for 192.168.8.254:
    /mnt/nfs     192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
    /var/www     192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
    /mnt/suplik  192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
    /mnt/storage 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
    
    
    Desktop:
    GentooOnPhenomII hrabosh # showmount -e 192.168.8.254
    Export list for 192.168.8.254:
    /mnt/nfs     192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
    /var/www     192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
    /mnt/suplik  192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
    /mnt/storage 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1
    
    Vypadá to stejně, akorát na desktopu to bylo vygenerovaný okamžitě, na Raspberry to trvalo tak 4s. 192.168.8.1 je Desktop, 192.168.8.15 je Raspberry.
    To jsem psal já ... to není bordel, to je modulární!
    19.1.2015 20:32 Hrabosh | skóre: 26 | blog: HBlog | Brno
    Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
    rpcinfo raspberry:
    root@Raspberry:~# rpcinfo -p 192.168.8.254
       program vers proto   port  service
        100000    4   tcp    111  portmapper
        100000    3   tcp    111  portmapper
        100000    2   tcp    111  portmapper
        100000    4   udp    111  portmapper
        100000    3   udp    111  portmapper
        100000    2   udp    111  portmapper
        100024    1   udp  46375  status
        100024    1   tcp  57985  status
        100003    2   tcp   2049  nfs
        100003    3   tcp   2049  nfs
        100003    4   tcp   2049  nfs
        100227    2   tcp   2049
        100227    3   tcp   2049
        100003    2   udp   2049  nfs
        100003    3   udp   2049  nfs
        100003    4   udp   2049  nfs
        100227    2   udp   2049
        100227    3   udp   2049
        100021    1   udp  44137  nlockmgr
        100021    3   udp  44137  nlockmgr
        100021    4   udp  44137  nlockmgr
        100021    1   tcp  37419  nlockmgr
        100021    3   tcp  37419  nlockmgr
        100021    4   tcp  37419  nlockmgr
        100005    1   udp  34853  mountd
        100005    1   tcp  33688  mountd
        100005    2   udp  32876  mountd
        100005    2   tcp  58310  mountd
        100005    3   udp  42976  mountd
        100005    3   tcp  38721  mountd
    
    rpcnfo desktop:
    GentooOnPhenomII hrabosh # rpcinfo -p 192.168.8.254
       program vers proto   port  service
        100000    4   tcp    111  portmapper
        100000    3   tcp    111  portmapper
        100000    2   tcp    111  portmapper
        100000    4   udp    111  portmapper
        100000    3   udp    111  portmapper
        100000    2   udp    111  portmapper
        100024    1   udp  46375  status
        100024    1   tcp  57985  status
        100003    2   tcp   2049  nfs
        100003    3   tcp   2049  nfs
        100003    4   tcp   2049  nfs
        100227    2   tcp   2049  nfs_acl
        100227    3   tcp   2049  nfs_acl
        100003    2   udp   2049  nfs
        100003    3   udp   2049  nfs
        100003    4   udp   2049  nfs
        100227    2   udp   2049  nfs_acl
        100227    3   udp   2049  nfs_acl
        100021    1   udp  44137  nlockmgr
        100021    3   udp  44137  nlockmgr
        100021    4   udp  44137  nlockmgr
        100021    1   tcp  37419  nlockmgr
        100021    3   tcp  37419  nlockmgr
        100021    4   tcp  37419  nlockmgr
        100005    1   udp  34853  mountd
        100005    1   tcp  33688  mountd
        100005    2   udp  32876  mountd
        100005    2   tcp  58310  mountd
        100005    3   udp  42976  mountd
        100005    3   tcp  38721  mountd
    
    ... tam je rozdíl.
    To jsem psal já ... to není bordel, to je modulární!
    20.1.2015 13:48 Hrabosh | skóre: 26 | blog: HBlog | Brno
    Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
    Problém je někde v síti! Když jsem Raspberrymu staticky přidělil adresu 192.168.8.1 jako mívá desktop, tak všechny ty showmounty a rpcinfa vypsaly informace okmažitě a připojení NFS funguje.
    To jsem psal já ... to není bordel, to je modulární!
    20.1.2015 20:30 Hrabosh | skóre: 26 | blog: HBlog | Brno
    Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS

    Funguje! Stačilo udělat pro Raspberry záznam v /etc/hosts. Přitom všude používám IP adresu...

    To jsem psal já ... to není bordel, to je modulární!
    19.1.2015 22:02 camenic
    Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
    modularni bordel
    20.1.2015 14:18 mhepp | skóre: 22
    Rozbalit Rozbalit vše Re: RaspberryPi: Timeout při mountovani NFS
    Hele, neštvi. Až budeš umět dobře položit dotaz, tak můžeš kritizovat.

    Založit nové vláknoNahoru

    Tiskni Sdílej: Linkuj Jaggni to Vybrali.sme.sk Google Del.icio.us Facebook

    ISSN 1214-1267   www.czech-server.cz
    © 1999-2015 Nitemedia s. r. o. Všechna práva vyhrazena.