On 6/23/21 12:59 AM, Gordon Messmer wrote:
On 6/22/21 8:55 PM, Robert McBroom via users wrote:
On 6/21/21 11:41 PM, Gordon Messmer wrote:
On 6/21/21 6:17 AM, Robert McBroom via users wrote:
@RobertPC ~]# mount -v -t nfs
[fd2e:cb3b:f005::ec1]:/mnt/HD/HD_a2/mcstuffy /mnt/mcstuffy
mount.nfs: timeout set for Mon Jun 21 06:42:25 2021
mount.nfs: trying text-based options
'vers=4.2,addr=fd2e:cb3b:f005::ec1,clientaddr=fd2e:cb3b:f005::ec1'
mount.nfs: mount(2): Connection refused
1: Is the nfs port open on ipv6? Use "ss -ln | grep :2049" and look
for a listening port with an IPv6 address, like:
tcp LISTEN 0 64 [::]:2049 [::]:*
2: Does your firewall allow access to port 2049 on IPv6? Use
"firewall-cmd --list-services" and look for "nfs", or use "ip6tables
-L" and look for the input chain for your default zone (possibly
IN_public_allow).
root@MyCloudEX2Ultra ~ # ss -ln | grep :2049
-sh: ss: not found
In that case you probably only have busybox's netstat, and I don't
know what flags it supports. Try "netstat -tln" and if that doesn't
work maybe "netstat -ln" to get a list of the listening ports.
root@MyCloudEX2Ultra ~ # ip6tables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
tcp anywhere anywhere tcp dpt:22 state
NEW recent: SET name: SSH side: source mask:
ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
SSHBFATK tcp anywhere anywhere tcp dpt:22 state
NEW recent: UPDATE seconds: 600 hit_count: 201 name: SSH side: source
mask: ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
The system's input chain should allow NFS traffic on IPv6 by virtue of
the ACCEPT policy. That suggests that the NFS service isn't listening
on an IPv6 network socket.
_______________________________________________
@MyCloudEX2Ultra ~ # netstat -tln
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 0.0.0.0:54553 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:46363 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:36507 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:2812 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:56864 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:8000 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:2049 0.0.0.0:* LISTEN
tcp 0 0 192.168.1.239:49154 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:9091 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:3688 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:3306 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:53291 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN
tcp 0 0 192.168.1.239:5357 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:37969 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:7575 0.0.0.0:* LISTEN
tcp6 0 0 ::1:2812 :::* LISTEN
tcp6 0 0 :::34109 :::* LISTEN
tcp6 0 0 :::445 :::* LISTEN
tcp6 0 0 :::8543 :::* LISTEN
tcp6 0 0 :::56864 :::* LISTEN
tcp6 0 0 :::49152 :::* LISTEN
tcp6 0 0 :::8001 :::* LISTEN
tcp6 0 0 :::8002 :::* LISTEN
tcp6 0 0 :::8003 :::* LISTEN
tcp6 0 0 :::6600 :::* LISTEN
tcp6 0 0 :::3689 :::* LISTEN
tcp6 0 0 :::139 :::* LISTEN
tcp6 0 0 fe80::200:c0ff:fe3:5357 :::* LISTEN
tcp6 0 0 :::4430 :::* LISTEN
tcp6 0 0 :::111 :::* LISTEN
tcp6 0 0 :::80 :::* LISTEN
tcp6 0 0 :::21 :::* LISTEN
tcp6 0 0 :::22 :::* LISTEN
@RobertPC ~]# mount -v -t nfs -o vers=3,proto=tcp6
[2600:1702:4860:9dd0::2d]:/mnt/HD/HD_a2/mcstuffy /mnt/mcstuffy
mount.nfs: timeout set for Thu Jun 24 23:30:20 2021
Created symlink
/run/systemd/system/remote-fs.target.wants/rpc-statd.service →
/usr/lib/systemd/system/rpc-statd.service.
mount.nfs: trying text-based options
'vers=3,proto=tcp6,addr=2600:1702:4860:9dd0::2d'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query failed: RPC: Program not registered
mount.nfs: trying text-based options
'vers=3,proto=tcp6,addr=2600:1702:4860:9dd0::2d'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query failed: RPC: Program not registered
mount.nfs: trying text-based options
'vers=3,proto=tcp6,addr=2600:1702:4860:9dd0::2d'
mount.nfs: prog 100003, trying vers=3, prot=6
mount.nfs: portmap query failed: RPC: Program not registered
mount.nfs: requested NFS version or transport protocol is not supported
_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure