Společnost IBM představila server IBM LinuxONE Emperor 5 poháněný procesorem IBM Telum II.
Byla vydána verze 4.0 multiplatformního integrovaného vývojového prostředí (IDE) pro rychlý vývoj aplikaci (RAD) ve Free Pascalu Lazarus (Wikipedie). Přehled novinek v poznámkách k vydání. Využíván je Free Pascal Compiler (FPC) 3.2.2.
Podpora Windows 10 končí 14. října 2025. Připravovaná kampaň Konec desítek (End of 10) může uživatelům pomoci s přechodem na Linux.
Již tuto středu proběhne 50. Virtuální Bastlírna, tedy dle římského číslování L. Bude L značit velikost, tedy více diskutujících než obvykle, či délku, neboť díky svátku lze diskutovat dlouho do noci? Bude i příští Virtuální Bastlírna virtuální nebo reálná? Nejen to se dozvíte, když dorazíte na diskuzní večer o elektronice, softwaru, ale technice obecně, který si můžete představit jako virtuální posezení u piva spojené s učenou
… více »Český statistický úřad rozšiřuje Statistický geoportál o Datový portál GIS s otevřenými geografickými daty. Ten umožňuje stahování datových sad podle potřeb uživatelů i jejich prohlížení v mapě a přináší nové možnosti v oblasti analýzy a využití statistických dat.
Kevin Lin zkouší využívat chytré brýle Mentra při hraní na piano. Vytváří aplikaci AugmentedChords, pomocí které si do brýlí posílá notový zápis (YouTube). Uvnitř brýlí běží AugmentOS (GitHub), tj. open source operační systém pro chytré brýle.
Jarní konference EurOpen.cz 2025 proběhne 26. až 28. května v Brandýse nad Labem. Věnována je programovacím jazykům, vývoji softwaru a programovacím technikám.
Na čem aktuálně pracují vývojáři GNOME a KDE Plasma? Pravidelný přehled novinek v Týden v GNOME a Týden v KDE Plasma.
Před 25 lety zaplavil celý svět virus ILOVEYOU. Virus se šířil e-mailem, jenž nesl přílohu s názvem I Love You. Příjemci, zvědavému, kdo se do něj zamiloval, pak program spuštěný otevřením přílohy načetl z adresáře e-mailové adresy a na ně pak „milostný vzkaz“ poslal dál. Škody vznikaly jak zahlcením e-mailových serverů, tak i druhou činností viru, kterou bylo přemazání souborů uložených v napadeném počítači.
Řešení dotazu:
root@Raspberry:~# mount -v 192.168.8.254:/mnt/storage mount.nfs: timeout set for Mon Jan 19 17:40:28 2015 mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254' mount.nfs: prog 100003, trying vers=3, prot=6 mount.nfs: trying 192.168.8.254 prog 100003 vers 3 prot TCP port 2049 mount.nfs: prog 100005, trying vers=3, prot=17 mount.nfs: portmap query retrying: RPC: Timed out mount.nfs: prog 100005, trying vers=3, prot=6 mount.nfs: portmap query failed: RPC: Timed out mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254' mount.nfs: prog 100003, trying vers=3, prot=6 mount.nfs: portmap query retrying: RPC: Timed out mount.nfs: prog 100003, trying vers=3, prot=17 mount.nfs: portmap query failed: RPC: Timed out mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254' mount.nfs: prog 100003, trying vers=3, prot=6 mount.nfs: portmap query retrying: RPC: Timed out mount.nfs: prog 100003, trying vers=3, prot=17 mount.nfs: portmap query failed: RPC: Timed out mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254' mount.nfs: prog 100003, trying vers=3, prot=6 mount.nfs: portmap query retrying: RPC: Timed out mount.nfs: prog 100003, trying vers=3, prot=17 mount.nfs: portmap query failed: RPC: Timed out mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254' mount.nfs: prog 100003, trying vers=3, prot=6 mount.nfs: portmap query retrying: RPC: Timed out mount.nfs: prog 100003, trying vers=3, prot=17 mount.nfs: portmap query failed: RPC: Timed out mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254' mount.nfs: prog 100003, trying vers=3, prot=6 mount.nfs: portmap query retrying: RPC: Timed out mount.nfs: prog 100003, trying vers=3, prot=17 mount.nfs: portmap query failed: RPC: Timed out mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254' mount.nfs: prog 100003, trying vers=3, prot=6 mount.nfs: portmap query retrying: RPC: Timed out mount.nfs: prog 100003, trying vers=3, prot=17 mount.nfs: portmap query failed: RPC: Timed out mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254' mount.nfs: prog 100003, trying vers=3, prot=6 mount.nfs: portmap query retrying: RPC: Timed out mount.nfs: prog 100003, trying vers=3, prot=17 mount.nfs: portmap query failed: RPC: Timed out mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254' mount.nfs: prog 100003, trying vers=3, prot=6 mount.nfs: portmap query retrying: RPC: Timed out mount.nfs: prog 100003, trying vers=3, prot=17 mount.nfs: portmap query failed: RPC: Timed out mount.nfs: Connection timed outA tohle je tcpdump na serveru:
DebServer:~# tcpdump -i eth0 -n "src host 192.168.8.15 or dst host 192.168.8.15" tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 18:38:31.576481 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [S], seq 2753227116, win 14600, options [mss 1460,sackOK,TS val 4879814 ecr 0,nop,wscale 5], length 0 18:38:31.576908 ARP, Request who-has 192.168.8.15 tell 192.168.8.254, length 28 18:38:31.577453 ARP, Reply 192.168.8.15 is-at b8:27:eb:c7:9e:03, length 46 18:38:31.577505 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [S.], seq 1699708128, ack 2753227117, win 14480, options [mss 1460,sackOK,TS val 38336853 ecr 4879814,nop,wscale 6], length 0 18:38:31.578198 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4879814 ecr 38336853], length 0 18:38:31.580351 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4879814 ecr 38336853], length 60 18:38:31.580555 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [.], ack 61, win 227, options [nop,nop,TS val 38336854 ecr 4879814], length 0 18:38:36.583103 ARP, Request who-has 192.168.8.254 tell 192.168.8.15, length 46 18:38:36.583181 ARP, Reply 192.168.8.254 is-at 00:50:fc:32:aa:54, length 28 18:38:36.607803 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [P.], seq 1:33, ack 61, win 227, options [nop,nop,TS val 38338111 ecr 4879814], length 32 18:38:36.608597 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [.], ack 33, win 457, options [nop,nop,TS val 4880317 ecr 38338111], length 0 18:38:36.608965 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [F.], seq 61, ack 33, win 457, options [nop,nop,TS val 4880317 ecr 38338111], length 0 18:38:36.609294 IP 192.168.8.254.111 > 192.168.8.15.58495: Flags [F.], seq 33, ack 62, win 227, options [nop,nop,TS val 38338111 ecr 4880317], length 0 18:38:36.610098 IP 192.168.8.15.58495 > 192.168.8.254.111: Flags [.], ack 34, win 457, options [nop,nop,TS val 4880317 ecr 38338111], length 0 18:38:36.612227 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [S], seq 108985776, win 14600, options [mss 1460,sackOK,TS val 4880317 ecr 0,nop,wscale 5], length 0 18:38:36.612495 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [S.], seq 3189092813, ack 108985777, win 14480, options [mss 1460,sackOK,TS val 38338112 ecr 4880317,nop,wscale 6], length 0 18:38:36.613213 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [.], ack 1, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 0 18:38:36.614121 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [P.], seq 1:45, ack 1, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 44: NFS request xid 3915526125 40 null 18:38:36.614299 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [.], ack 45, win 227, options [nop,nop,TS val 38338112 ecr 4880318], length 0 18:38:36.614544 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 38338112 ecr 4880318], length 28: NFS reply xid 3915526125 reply ok 24 null 18:38:36.615222 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [.], ack 29, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 0 18:38:36.615471 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [F.], seq 45, ack 29, win 457, options [nop,nop,TS val 4880318 ecr 38338112], length 0 18:38:36.615685 IP 192.168.8.254.2049 > 192.168.8.15.59787: Flags [F.], seq 29, ack 46, win 227, options [nop,nop,TS val 38338113 ecr 4880318], length 0 18:38:36.616479 IP 192.168.8.15.59787 > 192.168.8.254.2049: Flags [.], ack 30, win 457, options [nop,nop,TS val 4880318 ecr 38338113], length 0 18:38:36.623339 IP 192.168.8.15.51162 > 192.168.8.254.111: UDP, length 56 18:38:37.624634 IP 192.168.8.15.51162 > 192.168.8.254.111: UDP, length 56 18:38:38.626110 IP 192.168.8.15.51162 > 192.168.8.254.111: UDP, length 56 18:38:39.636368 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [S], seq 3224079441, win 14600, options [mss 1460,sackOK,TS val 4880620 ecr 0,nop,wscale 5], length 0 18:38:39.636664 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [S.], seq 1179209341, ack 3224079442, win 14480, options [mss 1460,sackOK,TS val 38338868 ecr 4880620,nop,wscale 6], length 0 18:38:39.637345 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4880620 ecr 38338868], length 0 18:38:39.638108 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4880620 ecr 38338868], length 60 18:38:39.638271 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [.], ack 61, win 227, options [nop,nop,TS val 38338868 ecr 4880620], length 0 18:38:41.644090 IP 192.168.8.254.111 > 192.168.8.15.51162: UDP, length 28 18:38:41.644873 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 51162 unreachable, length 64 18:38:46.656309 IP 192.168.8.254.111 > 192.168.8.15.51162: UDP, length 28 18:38:46.657121 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 51162 unreachable, length 64 18:38:49.646623 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4881621 ecr 38338868], length 0 18:38:49.666498 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [S], seq 2646766983, win 14600, options [mss 1460,sackOK,TS val 4881623 ecr 0,nop,wscale 5], length 0 18:38:49.666790 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [S.], seq 3180317476, ack 2646766984, win 14480, options [mss 1460,sackOK,TS val 38341375 ecr 4881623,nop,wscale 6], length 0 18:38:49.667612 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4881623 ecr 38341375], length 0 18:38:49.668255 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4881623 ecr 38341375], length 60 18:38:49.668417 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [.], ack 61, win 227, options [nop,nop,TS val 38341376 ecr 4881623], length 0 18:38:49.683797 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [.], ack 62, win 227, options [nop,nop,TS val 38341380 ecr 4881621], length 0 18:38:51.676646 IP 192.168.8.254.111 > 192.168.8.15.51162: UDP, length 28 18:38:51.677502 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 51162 unreachable, length 64 18:38:56.692942 IP 192.168.8.254.111 > 192.168.8.15.51304: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38343132 ecr 4881621], length 32 18:38:56.693773 IP 192.168.8.15.51304 > 192.168.8.254.111: Flags [R], seq 3224079503, win 0, length 0 18:38:59.677871 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4882624 ecr 38341376], length 0 18:38:59.683407 IP 192.168.8.15.56896 > 192.168.8.254.111: UDP, length 56 18:38:59.716373 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [.], ack 62, win 227, options [nop,nop,TS val 38343888 ecr 4882624], length 0 18:39:00.683761 IP 192.168.8.15.56896 > 192.168.8.254.111: UDP, length 56 18:39:01.685006 IP 192.168.8.15.56896 > 192.168.8.254.111: UDP, length 56 18:39:01.709202 IP 192.168.8.254.111 > 192.168.8.15.44184: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38344386 ecr 4882624], length 32 18:39:01.709887 IP 192.168.8.15.44184 > 192.168.8.254.111: Flags [R], seq 2646767045, win 0, length 0 18:39:02.707022 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [S], seq 3184613553, win 14600, options [mss 1460,sackOK,TS val 4882927 ecr 0,nop,wscale 5], length 0 18:39:02.707301 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [S.], seq 1491964470, ack 3184613554, win 14480, options [mss 1460,sackOK,TS val 38344635 ecr 4882927,nop,wscale 6], length 0 18:39:02.708129 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4882927 ecr 38344635], length 0 18:39:02.708790 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4882927 ecr 38344635], length 60 18:39:02.708949 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [.], ack 61, win 227, options [nop,nop,TS val 38344636 ecr 4882927], length 0 18:39:06.729882 IP 192.168.8.254.111 > 192.168.8.15.56896: UDP, length 28 18:39:06.730658 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 56896 unreachable, length 64 18:39:11.749830 IP 192.168.8.254.111 > 192.168.8.15.56896: UDP, length 28 18:39:11.750548 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 56896 unreachable, length 64 18:39:12.717268 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4883928 ecr 38344636], length 0 18:39:12.722661 IP 192.168.8.15.52285 > 192.168.8.254.111: UDP, length 56 18:39:12.757108 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [.], ack 62, win 227, options [nop,nop,TS val 38347148 ecr 4883928], length 0 18:39:13.724045 IP 192.168.8.15.52285 > 192.168.8.254.111: UDP, length 56 18:39:14.725291 IP 192.168.8.15.52285 > 192.168.8.254.111: UDP, length 56 18:39:15.746921 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [S], seq 2636641934, win 14600, options [mss 1460,sackOK,TS val 4884231 ecr 0,nop,wscale 5], length 0 18:39:15.747195 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [S.], seq 16293083, ack 2636641935, win 14480, options [mss 1460,sackOK,TS val 38347895 ecr 4884231,nop,wscale 6], length 0 18:39:15.747910 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4884231 ecr 38347895], length 0 18:39:15.748675 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4884231 ecr 38347895], length 60 18:39:15.748833 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [.], ack 61, win 227, options [nop,nop,TS val 38347895 ecr 4884231], length 0 18:39:16.766039 IP 192.168.8.254.111 > 192.168.8.15.56896: UDP, length 28 18:39:16.766790 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 56896 unreachable, length 64 18:39:21.790383 IP 192.168.8.254.111 > 192.168.8.15.48391: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38349406 ecr 4883928], length 32 18:39:21.791195 IP 192.168.8.15.48391 > 192.168.8.254.111: Flags [R], seq 3184613615, win 0, length 0 18:39:25.757180 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4885232 ecr 38347895], length 0 18:39:25.762683 IP 192.168.8.15.52774 > 192.168.8.254.111: UDP, length 56 18:39:25.793870 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [.], ack 62, win 227, options [nop,nop,TS val 38350407 ecr 4885232], length 0 18:39:26.763924 IP 192.168.8.15.52774 > 192.168.8.254.111: UDP, length 56 18:39:26.810722 IP 192.168.8.254.111 > 192.168.8.15.52285: UDP, length 28 18:39:26.811452 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52285 unreachable, length 64 18:39:27.765318 IP 192.168.8.15.52774 > 192.168.8.254.111: UDP, length 56 18:39:28.787315 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [S], seq 3390959618, win 14600, options [mss 1460,sackOK,TS val 4885535 ecr 0,nop,wscale 5], length 0 18:39:28.787627 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [S.], seq 2156693596, ack 3390959619, win 14480, options [mss 1460,sackOK,TS val 38351155 ecr 4885535,nop,wscale 6], length 0 18:39:28.788423 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4885535 ecr 38351155], length 0 18:39:28.789086 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4885535 ecr 38351155], length 60 18:39:28.789243 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [.], ack 61, win 227, options [nop,nop,TS val 38351155 ecr 4885535], length 0 18:39:31.838905 IP 192.168.8.254.111 > 192.168.8.15.52285: UDP, length 28 18:39:31.839705 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52285 unreachable, length 64 18:39:36.863265 IP 192.168.8.254.111 > 192.168.8.15.58488: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38353174 ecr 4885232], length 32 18:39:36.864097 IP 192.168.8.15.58488 > 192.168.8.254.111: Flags [R], seq 2636641996, win 0, length 0 18:39:38.797570 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4886536 ecr 38351155], length 0 18:39:38.802966 IP 192.168.8.15.44476 > 192.168.8.254.111: UDP, length 56 18:39:38.834611 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [.], ack 62, win 227, options [nop,nop,TS val 38353667 ecr 4886536], length 0 18:39:39.804460 IP 192.168.8.15.44476 > 192.168.8.254.111: UDP, length 56 18:39:40.805707 IP 192.168.8.15.44476 > 192.168.8.254.111: UDP, length 56 18:39:41.827194 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [S], seq 1319031536, win 14600, options [mss 1460,sackOK,TS val 4886839 ecr 0,nop,wscale 5], length 0 18:39:41.827464 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [S.], seq 1594023728, ack 1319031537, win 14480, options [mss 1460,sackOK,TS val 38354415 ecr 4886839,nop,wscale 6], length 0 18:39:41.828198 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4886839 ecr 38354415], length 0 18:39:41.828847 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4886839 ecr 38354415], length 60 18:39:41.829008 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [.], ack 61, win 227, options [nop,nop,TS val 38354415 ecr 4886839], length 0 18:39:41.879510 IP 192.168.8.254.111 > 192.168.8.15.52285: UDP, length 28 18:39:41.880223 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52285 unreachable, length 64 18:39:46.895757 IP 192.168.8.254.111 > 192.168.8.15.52774: UDP, length 28 18:39:46.896601 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52774 unreachable, length 64 18:39:51.837476 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4887840 ecr 38354415], length 0 18:39:51.842987 IP 192.168.8.15.53567 > 192.168.8.254.111: UDP, length 56 18:39:51.875375 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [.], ack 62, win 227, options [nop,nop,TS val 38356927 ecr 4887840], length 0 18:39:51.916091 IP 192.168.8.254.111 > 192.168.8.15.36454: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38356937 ecr 4886536], length 32 18:39:51.916735 IP 192.168.8.15.36454 > 192.168.8.254.111: Flags [R], seq 3390959680, win 0, length 0 18:39:52.844243 IP 192.168.8.15.53567 > 192.168.8.254.111: UDP, length 56 18:39:53.845597 IP 192.168.8.15.53567 > 192.168.8.254.111: UDP, length 56 18:39:54.867339 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [S], seq 2240372835, win 14600, options [mss 1460,sackOK,TS val 4888143 ecr 0,nop,wscale 5], length 0 18:39:54.867669 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [S.], seq 3791063078, ack 2240372836, win 14480, options [mss 1460,sackOK,TS val 38357675 ecr 4888143,nop,wscale 6], length 0 18:39:54.868466 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4888143 ecr 38357675], length 0 18:39:54.869129 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4888143 ecr 38357675], length 60 18:39:54.869288 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [.], ack 61, win 227, options [nop,nop,TS val 38357675 ecr 4888143], length 0 18:39:56.936406 IP 192.168.8.254.111 > 192.168.8.15.52774: UDP, length 28 18:39:56.937130 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52774 unreachable, length 64 18:40:01.952637 IP 192.168.8.254.111 > 192.168.8.15.60551: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38359446 ecr 4887840], length 32 18:40:01.953494 IP 192.168.8.15.60551 > 192.168.8.254.111: Flags [R], seq 1319031598, win 0, length 0 18:40:04.877619 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4889144 ecr 38357675], length 0 18:40:04.882999 IP 192.168.8.15.44848 > 192.168.8.254.111: UDP, length 56 18:40:04.916114 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [.], ack 62, win 227, options [nop,nop,TS val 38360187 ecr 4889144], length 0 18:40:05.033639 IP 192.168.8.15.42414 > 74.125.136.188.5228: Flags [P.], seq 2403489553:2403489582, ack 1359725540, win 10100, options [nop,nop,TS val 3514673 ecr 2823099368], length 29 18:40:05.094240 IP 74.125.136.188.5228 > 192.168.8.15.42414: Flags [P.], seq 1:30, ack 29, win 358, options [nop,nop,TS val 2823999490 ecr 3514673], length 29 18:40:05.110013 IP 192.168.8.15.42414 > 74.125.136.188.5228: Flags [.], ack 30, win 10100, options [nop,nop,TS val 3514679 ecr 2823999490], length 0 18:40:05.884248 IP 192.168.8.15.44848 > 192.168.8.254.111: UDP, length 56 18:40:06.885520 IP 192.168.8.15.44848 > 192.168.8.254.111: UDP, length 56 18:40:06.976983 IP 192.168.8.254.111 > 192.168.8.15.52774: UDP, length 28 18:40:06.977647 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 52774 unreachable, length 64 18:40:07.907357 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [S], seq 2680357298, win 14600, options [mss 1460,sackOK,TS val 4889447 ecr 0,nop,wscale 5], length 0 18:40:07.907627 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [S.], seq 3083730774, ack 2680357299, win 14480, options [mss 1460,sackOK,TS val 38360934 ecr 4889447,nop,wscale 6], length 0 18:40:07.908360 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4889447 ecr 38360934], length 0 18:40:07.909134 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4889447 ecr 38360934], length 60 18:40:07.909296 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [.], ack 61, win 227, options [nop,nop,TS val 38360935 ecr 4889447], length 0 18:40:11.997317 IP 192.168.8.254.111 > 192.168.8.15.44476: UDP, length 28 18:40:11.998163 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44476 unreachable, length 64 18:40:17.021488 IP 192.168.8.254.111 > 192.168.8.15.53639: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38363213 ecr 4889144], length 32 18:40:17.022280 IP 192.168.8.15.53639 > 192.168.8.254.111: Flags [R], seq 2240372897, win 0, length 0 18:40:17.917632 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4890448 ecr 38360935], length 0 18:40:17.923007 IP 192.168.8.15.40182 > 192.168.8.254.111: UDP, length 56 18:40:17.956855 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [.], ack 62, win 227, options [nop,nop,TS val 38363447 ecr 4890448], length 0 18:40:18.924395 IP 192.168.8.15.40182 > 192.168.8.254.111: UDP, length 56 18:40:19.925643 IP 192.168.8.15.40182 > 192.168.8.254.111: UDP, length 56 18:40:20.947375 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [S], seq 4156425691, win 14600, options [mss 1460,sackOK,TS val 4890751 ecr 0,nop,wscale 5], length 0 18:40:20.947646 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [S.], seq 2423865039, ack 4156425692, win 14480, options [mss 1460,sackOK,TS val 38364194 ecr 4890751,nop,wscale 6], length 0 18:40:20.948397 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [.], ack 1, win 457, options [nop,nop,TS val 4890751 ecr 38364194], length 0 18:40:20.949022 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 457, options [nop,nop,TS val 4890751 ecr 38364194], length 60 18:40:20.949183 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [.], ack 61, win 227, options [nop,nop,TS val 38364195 ecr 4890751], length 0 18:40:22.041863 IP 192.168.8.254.111 > 192.168.8.15.44476: UDP, length 28 18:40:22.042551 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44476 unreachable, length 64 18:40:27.062172 IP 192.168.8.254.111 > 192.168.8.15.44476: UDP, length 28 18:40:27.062927 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44476 unreachable, length 64 18:40:30.958528 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [F.], seq 61, ack 1, win 457, options [nop,nop,TS val 4891752 ecr 38364195], length 0 18:40:30.964028 IP 192.168.8.15.50439 > 192.168.8.254.111: UDP, length 56 18:40:30.997614 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [.], ack 62, win 227, options [nop,nop,TS val 38366707 ecr 4891752], length 0 18:40:31.965414 IP 192.168.8.15.50439 > 192.168.8.254.111: UDP, length 56 18:40:32.082343 IP 192.168.8.254.111 > 192.168.8.15.41922: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38366978 ecr 4890448], length 32 18:40:32.083172 IP 192.168.8.15.41922 > 192.168.8.254.111: Flags [R], seq 2680357360, win 0, length 0 18:40:32.966681 IP 192.168.8.15.50439 > 192.168.8.254.111: UDP, length 56 18:40:37.098734 IP 192.168.8.254.111 > 192.168.8.15.53567: UDP, length 28 18:40:37.099517 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 53567 unreachable, length 64 18:40:42.119085 IP 192.168.8.254.111 > 192.168.8.15.49785: Flags [P.], seq 1:33, ack 62, win 227, options [nop,nop,TS val 38369487 ecr 4891752], length 32 18:40:42.119819 IP 192.168.8.15.49785 > 192.168.8.254.111: Flags [R], seq 4156425753, win 0, length 0 18:40:47.135230 IP 192.168.8.254.111 > 192.168.8.15.53567: UDP, length 28 18:40:47.136082 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 53567 unreachable, length 64 18:40:50.036130 IP 192.168.8.15.68 > 192.168.8.254.67: BOOTP/DHCP, Request from b8:27:eb:c7:9e:03, length 300 18:40:50.037200 IP 192.168.8.254.67 > 192.168.8.15.68: BOOTP/DHCP, Reply, length 300 18:40:52.151695 IP 192.168.8.254.111 > 192.168.8.15.53567: UDP, length 28 18:40:52.152608 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 53567 unreachable, length 64 18:40:57.171909 IP 192.168.8.254.111 > 192.168.8.15.44848: UDP, length 28 18:40:57.172729 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44848 unreachable, length 64 18:41:02.188121 IP 192.168.8.254.111 > 192.168.8.15.44848: UDP, length 28 18:41:02.188979 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44848 unreachable, length 64 18:41:07.208488 IP 192.168.8.254.111 > 192.168.8.15.44848: UDP, length 28 18:41:07.209256 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 44848 unreachable, length 64 18:41:12.229213 IP 192.168.8.254.111 > 192.168.8.15.40182: UDP, length 28 18:41:12.229992 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 40182 unreachable, length 64 18:41:17.245487 IP 192.168.8.254.111 > 192.168.8.15.40182: UDP, length 28 18:41:17.246261 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 40182 unreachable, length 64 18:41:22.265326 IP 192.168.8.254.111 > 192.168.8.15.40182: UDP, length 28 18:41:22.266160 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 40182 unreachable, length 64 18:41:27.266016 ARP, Request who-has 192.168.8.254 tell 192.168.8.15, length 46 18:41:27.266086 ARP, Reply 192.168.8.254 is-at 00:50:fc:32:aa:54, length 28 18:41:27.285685 IP 192.168.8.254.111 > 192.168.8.15.50439: UDP, length 28 18:41:27.286522 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 50439 unreachable, length 64 18:41:32.305873 IP 192.168.8.254.111 > 192.168.8.15.50439: UDP, length 28 18:41:32.306674 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 50439 unreachable, length 64 18:41:37.322326 IP 192.168.8.254.111 > 192.168.8.15.50439: UDP, length 28 18:41:37.323051 IP 192.168.8.15 > 192.168.8.254: ICMP 192.168.8.15 udp port 50439 unreachable, length 64 ^C 193 packets captured 193 packets received by filter 0 packets dropped by kernel
GentooOnPhenomII hrabosh # mount -v 192.168.8.254:/mnt/storage mount.nfs: timeout set for Mon Jan 19 18:47:35 2015 mount.nfs: trying text-based options 'hard,intr,rsize=8192,wsize=8192,vers=3,addr=192.168.8.254' mount.nfs: prog 100003, trying vers=3, prot=6 mount.nfs: trying 192.168.8.254 prog 100003 vers 3 prot TCP port 2049 mount.nfs: prog 100005, trying vers=3, prot=17 mount.nfs: trying 192.168.8.254 prog 100005 vers 3 prot UDP port 42976A tcpdump:
DebServer:~# tcpdump -i eth0 -n "src host 192.168.8.1 or dst host 192.168.8.1" tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes 18:45:38.185148 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [S], seq 171002076, win 14600, options [mss 1460,sackOK,TS val 6666885 ecr 0,nop,wscale 7], length 0 18:45:38.185457 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [S.], seq 1840938392, ack 171002077, win 14480, options [mss 1460,sackOK,TS val 38443499 ecr 6666885,nop,wscale 6], length 0 18:45:38.185576 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666886 ecr 38443499], length 0 18:45:38.185811 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [P.], seq 1:61, ack 1, win 115, options [nop,nop,TS val 6666886 ecr 38443499], length 60 18:45:38.185973 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [.], ack 61, win 227, options [nop,nop,TS val 38443499 ecr 6666886], length 0 18:45:38.188570 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [P.], seq 1:33, ack 61, win 227, options [nop,nop,TS val 38443500 ecr 6666886], length 32 18:45:38.188711 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [.], ack 33, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 0 18:45:38.188842 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [F.], seq 61, ack 33, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 0 18:45:38.188944 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [S], seq 1728122381, win 14600, options [mss 1460,sackOK,TS val 6666889 ecr 0,nop,wscale 7], length 0 18:45:38.189165 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [S.], seq 334187119, ack 1728122382, win 14480, options [mss 1460,sackOK,TS val 38443500 ecr 6666889,nop,wscale 6], length 0 18:45:38.189294 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 0 18:45:38.189495 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [P.], seq 1:45, ack 1, win 115, options [nop,nop,TS val 6666889 ecr 38443500], length 44: NFS request xid 1055388326 40 null 18:45:38.189639 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [.], ack 45, win 227, options [nop,nop,TS val 38443500 ecr 6666889], length 0 18:45:38.189997 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 38443500 ecr 6666889], length 28: NFS reply xid 1055388326 reply ok 24 null 18:45:38.190088 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [.], ack 29, win 115, options [nop,nop,TS val 6666890 ecr 38443500], length 0 18:45:38.190209 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [F.], seq 45, ack 29, win 115, options [nop,nop,TS val 6666890 ecr 38443500], length 0 18:45:38.190321 IP 192.168.8.1.45961 > 192.168.8.254.111: UDP, length 56 18:45:38.190640 IP 192.168.8.254.2049 > 192.168.8.1.46159: Flags [F.], seq 29, ack 46, win 227, options [nop,nop,TS val 38443500 ecr 6666890], length 0 18:45:38.190732 IP 192.168.8.1.46159 > 192.168.8.254.2049: Flags [.], ack 30, win 115, options [nop,nop,TS val 6666891 ecr 38443500], length 0 18:45:38.192848 IP 192.168.8.254.111 > 192.168.8.1.45961: UDP, length 28 18:45:38.193036 IP 192.168.8.1.36934 > 192.168.8.254.42976: UDP, length 40 18:45:38.193555 IP 192.168.8.254.42976 > 192.168.8.1.36934: UDP, length 24 18:45:38.193859 IP 192.168.8.254.111 > 192.168.8.1.57620: Flags [F.], seq 33, ack 62, win 227, options [nop,nop,TS val 38443501 ecr 6666889], length 0 18:45:38.193968 IP 192.168.8.1.57620 > 192.168.8.254.111: Flags [.], ack 34, win 115, options [nop,nop,TS val 6666894 ecr 38443501], length 0 18:45:38.194266 IP 192.168.8.1.693 > 192.168.8.254.42976: UDP, length 40 18:45:38.194717 IP 192.168.8.254.42976 > 192.168.8.1.693: UDP, length 24 18:45:38.194860 IP 192.168.8.1.693 > 192.168.8.254.42976: UDP, length 132 18:45:38.201342 IP 192.168.8.254.42976 > 192.168.8.1.693: UDP, length 60 18:45:38.201562 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [S], seq 4070763372, win 14600, options [mss 1460,sackOK,TS val 6666902 ecr 0,nop,wscale 7], length 0 18:45:38.201867 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [S.], seq 229387312, ack 4070763373, win 14480, options [mss 1460,sackOK,TS val 38443503 ecr 6666902,nop,wscale 6], length 0 18:45:38.201944 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666902 ecr 38443503], length 0 18:45:38.202159 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [P.], seq 1:97, ack 1, win 115, options [nop,nop,TS val 6666902 ecr 38443503], length 96 18:45:38.202317 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [.], ack 97, win 227, options [nop,nop,TS val 38443503 ecr 6666902], length 0 18:45:38.204815 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [P.], seq 1:33, ack 97, win 227, options [nop,nop,TS val 38443504 ecr 6666902], length 32 18:45:38.204956 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [.], ack 33, win 115, options [nop,nop,TS val 6666905 ecr 38443504], length 0 18:45:38.205091 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [F.], seq 97, ack 33, win 115, options [nop,nop,TS val 6666905 ecr 38443504], length 0 18:45:38.205192 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [S], seq 2670145583, win 14600, options [mss 1460,sackOK,TS val 6666905 ecr 0,nop,wscale 7], length 0 18:45:38.205412 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [S.], seq 499348534, ack 2670145584, win 14480, options [mss 1460,sackOK,TS val 38443504 ecr 6666905,nop,wscale 6], length 0 18:45:38.205524 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [.], ack 1, win 115, options [nop,nop,TS val 6666906 ecr 38443504], length 0 18:45:38.205721 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 1:45, ack 1, win 115, options [nop,nop,TS val 6666906 ecr 38443504], length 44: NFS request xid 2064517340 40 null 18:45:38.205864 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [.], ack 45, win 227, options [nop,nop,TS val 38443504 ecr 6666906], length 0 18:45:38.206230 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 1:29, ack 45, win 227, options [nop,nop,TS val 38443504 ecr 6666906], length 28: NFS reply xid 2064517340 reply ok 24 null 18:45:38.206336 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [.], ack 29, win 115, options [nop,nop,TS val 6666906 ecr 38443504], length 0 18:45:38.206803 IP 192.168.8.254.111 > 192.168.8.1.56148: Flags [F.], seq 33, ack 98, win 227, options [nop,nop,TS val 38443504 ecr 6666905], length 0 18:45:38.206875 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 45:89, ack 29, win 115, options [nop,nop,TS val 6666907 ecr 38443504], length 44: NFS request xid 2081294556 40 null 18:45:38.206990 IP 192.168.8.1.56148 > 192.168.8.254.111: Flags [.], ack 34, win 115, options [nop,nop,TS val 6666907 ecr 38443504], length 0 18:45:38.207319 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 29:57, ack 89, win 227, options [nop,nop,TS val 38443505 ecr 6666907], length 28: NFS reply xid 2081294556 reply ok 24 null 18:45:38.207472 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 89:233, ack 57, win 115, options [nop,nop,TS val 6666907 ecr 38443505], length 144: NFS request xid 2098071772 140 fsinfo fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD548F2F730C 18:45:38.208875 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 57:141, ack 233, win 243, options [nop,nop,TS val 38443505 ecr 6666907], length 84: NFS reply xid 2098071772 reply ok 80 fsinfo rtmax 65536 rtpref 65536 wtmax 65536 wtpref 65536 dtpref 4096 18:45:38.209241 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 233:377, ack 141, win 115, options [nop,nop,TS val 6666909 ecr 38443505], length 144: NFS request xid 2114848988 140 pathconf fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39ED8000000C242BD545BC27E0C 18:45:38.209633 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 141:201, ack 377, win 260, options [nop,nop,TS val 38443505 ecr 6666909], length 60: NFS reply xid 2114848988 reply ok 56 pathconf linkmax 32000 namemax 255 chownres keepcase 18:45:38.209952 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 377:521, ack 201, win 115, options [nop,nop,TS val 6666910 ecr 38443505], length 144: NFS request xid 2131626204 140 getattr fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39E10010000C242BD54D5AE880C 18:45:38.210284 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 201:317, ack 521, win 277, options [nop,nop,TS val 38443505 ecr 6666910], length 116: NFS reply xid 2131626204 reply ok 112 getattr DIR 40777 ids 1000/6 sz 4096 18:45:38.210665 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 521:665, ack 317, win 115, options [nop,nop,TS val 6666911 ecr 38443505], length 144: NFS request xid 2148403420 140 fsinfo fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD544FAE930C 18:45:38.211005 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 317:401, ack 665, win 294, options [nop,nop,TS val 38443505 ecr 6666911], length 84: NFS reply xid 2148403420 reply ok 80 fsinfo rtmax 65536 rtpref 65536 wtmax 65536 wtpref 65536 dtpref 4096 18:45:38.211354 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 665:809, ack 401, win 115, options [nop,nop,TS val 6666911 ecr 38443505], length 144: NFS request xid 2165180636 140 getattr fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39E10010000C242BD54A8DFA70C 18:45:38.212328 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 401:517, ack 809, win 310, options [nop,nop,TS val 38443506 ecr 6666911], length 116: NFS reply xid 2165180636 reply ok 112 getattr DIR 40777 ids 1000/6 sz 4096 18:45:38.216102 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 809:977, ack 517, win 115, options [nop,nop,TS val 6666916 ecr 38443506], length 168: NFS request xid 2181957852 164 fsstat fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD5482AFF70C 18:45:38.217558 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 517:605, ack 977, win 327, options [nop,nop,TS val 38443507 ecr 6666916], length 88: NFS reply xid 2181957852 reply ok 84 fsstat tbytes 1426807054336 fbytes 78634078208 abytes 6161989632 18:45:38.221446 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 977:1145, ack 605, win 115, options [nop,nop,TS val 6666921 ecr 38443507], length 168: NFS request xid 2198735068 164 fsstat fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD54A9CC380D 18:45:38.221826 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 605:693, ack 1145, win 344, options [nop,nop,TS val 38443508 ecr 6666921], length 88: NFS reply xid 2198735068 reply ok 84 fsstat tbytes 1426807054336 fbytes 78634078208 abytes 6161989632 18:45:38.222384 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [P.], seq 1145:1313, ack 693, win 115, options [nop,nop,TS val 6666922 ecr 38443508], length 168: NFS request xid 2215512284 164 fsstat fh Unknown/010006009693F3AAC3284FBCA7A0C89CA7C3B39EF0000000C242BD54EDA2460D 18:45:38.222733 IP 192.168.8.254.2049 > 192.168.8.1.694: Flags [P.], seq 693:781, ack 1313, win 361, options [nop,nop,TS val 38443508 ecr 6666922], length 88: NFS reply xid 2215512284 reply ok 84 fsstat tbytes 1426807054336 fbytes 78634078208 abytes 6161989632 18:45:38.262545 IP 192.168.8.1.694 > 192.168.8.254.2049: Flags [.], ack 781, win 115, options [nop,nop,TS val 6666963 ecr 38443508], length 0 18:45:42.212461 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [P.], seq 2064324282:2064325232, ack 246402904, win 331, options [nop,nop,TS val 6670912 ecr 1553629620], length 950 18:45:42.212617 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [P.], seq 950:1002, ack 1, win 331, options [nop,nop,TS val 6670912 ecr 1553629620], length 52 18:45:42.212786 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [P.], seq 1002:1231, ack 1, win 331, options [nop,nop,TS val 6670913 ecr 1553629620], length 229 18:45:42.230519 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [.], ack 950, win 698, options [nop,nop,TS val 1553689645 ecr 6670912], length 0 18:45:42.231740 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [.], ack 1002, win 698, options [nop,nop,TS val 1553689646 ecr 6670912], length 0 18:45:42.231881 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [.], ack 1231, win 705, options [nop,nop,TS val 1553689647 ecr 6670913], length 0 18:45:42.308686 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [P.], seq 1:657, ack 1231, win 705, options [nop,nop,TS val 1553689723 ecr 6670913], length 656 18:45:42.308834 IP 31.13.93.3.443 > 192.168.8.1.48672: Flags [P.], seq 657:706, ack 1231, win 705, options [nop,nop,TS val 1553689723 ecr 6670913], length 49 18:45:42.308989 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [.], ack 657, win 331, options [nop,nop,TS val 6671009 ecr 1553689723], length 0 18:45:42.309143 IP 192.168.8.1.48672 > 31.13.93.3.443: Flags [.], ack 706, win 331, options [nop,nop,TS val 6671009 ecr 1553689723], length 0 ^C 74 packets captured 74 packets received by filter 0 packets dropped by kernel
DebServer:~# rpcinfo -p program vers proto port service 100000 4 tcp 111 portmapper 100000 3 tcp 111 portmapper 100000 2 tcp 111 portmapper 100000 4 udp 111 portmapper 100000 3 udp 111 portmapper 100000 2 udp 111 portmapper 100024 1 udp 46375 status 100024 1 tcp 57985 status 100003 2 tcp 2049 nfs 100003 3 tcp 2049 nfs 100003 4 tcp 2049 nfs 100227 2 tcp 2049 100227 3 tcp 2049 100003 2 udp 2049 nfs 100003 3 udp 2049 nfs 100003 4 udp 2049 nfs 100227 2 udp 2049 100227 3 udp 2049 100021 1 udp 44137 nlockmgr 100021 3 udp 44137 nlockmgr 100021 4 udp 44137 nlockmgr 100021 1 tcp 37419 nlockmgr 100021 3 tcp 37419 nlockmgr 100021 4 tcp 37419 nlockmgr 100005 1 udp 34853 mountd 100005 1 tcp 33688 mountd 100005 2 udp 32876 mountd 100005 2 tcp 58310 mountd 100005 3 udp 42976 mountd 100005 3 tcp 38721 mountdRaspberry:
root@Raspberry:~# showmount -e 192.168.8.254 Export list for 192.168.8.254: /mnt/nfs 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1 /var/www 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1 /mnt/suplik 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1 /mnt/storage 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1Desktop:
GentooOnPhenomII hrabosh # showmount -e 192.168.8.254 Export list for 192.168.8.254: /mnt/nfs 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1 /var/www 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1 /mnt/suplik 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1 /mnt/storage 192.168.8.17,192.168.8.15,192.168.4.2,192.168.8.10,192.168.8.5,192.168.8.1Vypadá to stejně, akorát na desktopu to bylo vygenerovaný okamžitě, na Raspberry to trvalo tak 4s. 192.168.8.1 je Desktop, 192.168.8.15 je Raspberry.
root@Raspberry:~# rpcinfo -p 192.168.8.254 program vers proto port service 100000 4 tcp 111 portmapper 100000 3 tcp 111 portmapper 100000 2 tcp 111 portmapper 100000 4 udp 111 portmapper 100000 3 udp 111 portmapper 100000 2 udp 111 portmapper 100024 1 udp 46375 status 100024 1 tcp 57985 status 100003 2 tcp 2049 nfs 100003 3 tcp 2049 nfs 100003 4 tcp 2049 nfs 100227 2 tcp 2049 100227 3 tcp 2049 100003 2 udp 2049 nfs 100003 3 udp 2049 nfs 100003 4 udp 2049 nfs 100227 2 udp 2049 100227 3 udp 2049 100021 1 udp 44137 nlockmgr 100021 3 udp 44137 nlockmgr 100021 4 udp 44137 nlockmgr 100021 1 tcp 37419 nlockmgr 100021 3 tcp 37419 nlockmgr 100021 4 tcp 37419 nlockmgr 100005 1 udp 34853 mountd 100005 1 tcp 33688 mountd 100005 2 udp 32876 mountd 100005 2 tcp 58310 mountd 100005 3 udp 42976 mountd 100005 3 tcp 38721 mountdrpcnfo desktop:
GentooOnPhenomII hrabosh # rpcinfo -p 192.168.8.254 program vers proto port service 100000 4 tcp 111 portmapper 100000 3 tcp 111 portmapper 100000 2 tcp 111 portmapper 100000 4 udp 111 portmapper 100000 3 udp 111 portmapper 100000 2 udp 111 portmapper 100024 1 udp 46375 status 100024 1 tcp 57985 status 100003 2 tcp 2049 nfs 100003 3 tcp 2049 nfs 100003 4 tcp 2049 nfs 100227 2 tcp 2049 nfs_acl 100227 3 tcp 2049 nfs_acl 100003 2 udp 2049 nfs 100003 3 udp 2049 nfs 100003 4 udp 2049 nfs 100227 2 udp 2049 nfs_acl 100227 3 udp 2049 nfs_acl 100021 1 udp 44137 nlockmgr 100021 3 udp 44137 nlockmgr 100021 4 udp 44137 nlockmgr 100021 1 tcp 37419 nlockmgr 100021 3 tcp 37419 nlockmgr 100021 4 tcp 37419 nlockmgr 100005 1 udp 34853 mountd 100005 1 tcp 33688 mountd 100005 2 udp 32876 mountd 100005 2 tcp 58310 mountd 100005 3 udp 42976 mountd 100005 3 tcp 38721 mountd... tam je rozdíl.
Funguje! Stačilo udělat pro Raspberry záznam v /etc/hosts. Přitom všude používám IP adresu...
Tiskni
Sdílej: