• Content Count

  • Joined

  • Last visited

About lampra

  • Rank
    Advanced Member

Recent Profile Visitors

1041 profile views
  1. Not sure if this is applicable on armbian or if it could fit your case but maybe you could use extroot overlay. Take a look here in the case of openwrt.
  2. Not sure if it's the same issue but i can't also connect to cubietruck (after update to armbian 5.85) via ssh, webmin, apache, node-red. Though I can connect via ftp and wireguard works!! I am away now so logs will be available next Saturday.
  3. Try to add the following in the watchdog.service file. For me it works ControlGroup=cpu:/
  4. Just updated to v5.73 and no handshakes are reported from wireguard though the connections are up and running. Does anyone else experiences the same issue? root@cubietruck:~# systemctl status wg-quick@wg0 ● wg-quick@wg0.service - WireGuard via wg-quick(8) for wg0 Loaded: loaded (/lib/systemd/system/wg-quick@.service; enabled; vendor preset: enabled) Active: active (exited) since Wed 2019-01-30 00:34:12 EET; 1h 34min ago Docs: man:wg-quick(8) man:wg(8) Process: 1034 ExecStart=/usr/bin/wg-quick up wg0 (code=exited, status=0/SUCCESS) Main PID: 1034 (code=exited, status=0/SUCCESS) Jan 30 00:34:05 cubietruck systemd[1]: Starting WireGuard via wg-quick(8) for wg0... Jan 30 00:34:09 cubietruck wg-quick[1034]: [#] ip link add wg0 type wireguard Jan 30 00:34:09 cubietruck wg-quick[1034]: [#] wg setconf wg0 /dev/fd/63 Jan 30 00:34:09 cubietruck wg-quick[1034]: [#] ip address add dev wg0 Jan 30 00:34:10 cubietruck wg-quick[1034]: [#] ip link set mtu 1420 up dev wg0 Jan 30 00:34:12 cubietruck systemd[1]: Started WireGuard via wg-quick(8) for wg0. root@cubietruck:~# wg interface: wg0 public key: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX= private key: (hidden) listening port: XXXXXX peer: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX= endpoint: XXX.XXX.XXX.XXX:XXXXXX allowed ips: transfer: 10.84 KiB received, 10.79 KiB sent persistent keepalive: every 24 seconds peer: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX= endpoint: XXX.XXX.XXX.XXX:XXXXXX allowed ips: transfer: 2.23 KiB received, 804 B sent persistent keepalive: every 24 seconds peer: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX= endpoint: XXX.XXX.XXX.XXX:XXXXXX allowed ips: transfer: 1.19 KiB received, 3.20 KiB sent persistent keepalive: every 24 seconds root@cubietruck:~# wg show wg0 latest-handshakes XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX= 0 YYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYYY= 0 ZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ= 0
  5. You could simply use systemctrl stop ethervpn (i think thats the service name check with top or htop) and then systemctrl disable ethervpn and that is it. If you want to completely wipe the installation then go to /user/local and delete the vpnserver folder and also delete the /etc/init.d/vpnserver file and you are done!
  6. ok thank you. By the way, On a similar installation on cubietruck I see that kernel sysrq(-trigger) is not present. Do you know if this is the intended kernel build behaviour?
  7. No, i use telnet just to check that port 22 is open
  8. Hi, Updated to 5.70 next on Opi pc and after 2 days I cant login via ssh and i get: ssh_exchange_identification: Connection closed by remote host Some times ssh login just hangs. As I am not near the machine, is there any way to remotely reboot the Opi pc without ssh access? ps: I am sure that the machine is working as wireguard is working fine and I can ping the machine as well as telnet port 22!
  9. I don't know why, but I had similar issues with wireguard on cubietruck and on opi pc. It was mostly a matter of headers in my case. Even with armbian config I was not able to install the headers some times and on other occasions DKMS was not able to install wireguard. My workarounds are: 1. check manually apt (eg apt-cache search linux-headers-xxxx) for the correct header package (stable or next or whatever) for your board and kernel from armbian repo and manually install them. Then try to install wireguard with dkms. 2. If this does not work, install the headers, get the source of wireguard (check the wireguard webpage for manual installation) make & and make install and this should work even if you encounter erros during make. This is really trivial, just two commands as root!!
  10. Hi, I have a quectel ec 20 4g modem and I want to install it on espressobin. There seems to be some low cost solderless products like this or this. Is there any suggestion for SIM Card adapter?
  11. I recently came across the same issue with systemd-resolved after upgrading an old laptop to bionic. I just disabled systemd-resolved and installed unbound. Maybe this is bionic specific (works fine on debian stretch for me).
  12. Well the module is compiled and installation finishes but when I am trying to use wireguard it fails and the output seems to point to wrong or missing kernel headers # wg-quick up wg0 [#] ip link add wg0 type wireguard RTNETLINK answers: Operation not supported Unable to access interface: Protocol not supported What i noticed is that after installation, a new folder is created in /lib/modules/ where wireguard.ko is placed $ ls /lib/modules/ 4.17.7 4.17.7-mvebu64 $ ls /lib/modules/4.17.7/extra/ wireguard.ko
  13. Compilation from source also not working:
  14. Am I missing something? I tried to install wireguard in the prebuild images but i failed using the linux-headers-next-mvebu64 package. Today I compiled a mainline image with headers installed but I still fail to install wireguard. Here is the log I have read in this that we need to call make scripts. Here is the output Edit: Diagnostics
  15. Did you stop network-manager and checked the /etc/network/interfaces file contents? what is the output of these commands: