On 23/06/2021 11:55, Robert McBroom via users wrote:
On 6/21/21 11:41 PM, Gordon Messmer wrote:
On 6/21/21 6:17 AM, Robert McBroom via users wrote:
@RobertPC ~]# mount -v -t nfs [fd2e:cb3b:f005::ec1]:/mnt/HD/HD_a2/mcstuffy /mnt/mcstuffy
mount.nfs: timeout set for Mon Jun 21 06:42:25 2021
mount.nfs: trying text-based options 'vers=4.2,addr=fd2e:cb3b:f005::ec1,clientaddr=fd2e:cb3b:f005::ec1'
mount.nfs: mount(2): Connection refused
1: Is the nfs port open on ipv6? Use "ss -ln | grep :2049" and look for a listening port with an IPv6 address, like:
tcp LISTEN 0 64 [::]:2049 [::]:*
2: Does your firewall allow access to port 2049 on IPv6? Use "firewall-cmd --list-services" and look for "nfs", or use "ip6tables -L" and look for the input chain for your default zone (possibly IN_public_allow).
BusyBox v1.30.1 (2020-09-04 02:41:28 UTC) built-in shell (ash)
Enter 'help' for a list of built-in commands.
root@MyCloudEX2Ultra ~ # ss -ln | grep :2049
-sh: ss: not found
root@MyCloudEX2Ultra ~ # firewall-cmd --list-services
-sh: firewall-cmd: not found
root@MyCloudEX2Ultra ~ # help
Built-in commands:
------------------
. : [ [[ alias bg break cd chdir command continue echo eval exec
exit export false fg getopts hash help history jobs kill let
local printf pwd read readonly return set shift source test times
trap true type ulimit umask unalias unset wait
root@MyCloudEX2Ultra ~ # ip6tables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
tcp anywhere anywhere tcp dpt:22 state NEW recent: SET name: SSH side: source mask: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
SSHBFATK tcp anywhere anywhere tcp dpt:22 state NEW recent: UPDATE seconds: 600 hit_count: 201 name: SSH side: source mask: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
Chain FORWARD (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain SSHBFATK (1 references)
target prot opt source destination
LOG all anywhere anywhere limit: avg 5/min burst 5 LOG level info prefix "SSH: Detect brute force atk! "
DROP all anywhere anywhere
root@MyCloudEX2Ultra ~ # cat /etc/hosts
127.0.0.1 localhost localhost.localdomain
192.168.1.239 MyCloudEX2Ultra MyCloudEX2Ultra
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
And you may also want to run nmap, as root, from your fedora system
nmap -sS -6 The-IPV6-address-here
and just to be sure of IPv4
nmap -sS The-IPV4-address-here
--
Remind me to ignore comments which aren't germane to the thread.
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure