cyagon

Members
  • Content Count

    5
  • Joined

  • Last visited

About cyagon

  • Rank
    Newbie

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Can also confirm the problem with the newest 5.4x Kernel. The prior 5.4x kernel worked without problems for me (im using it because of the newest btrfs features). It boots up normally, SSH is up for a few seconds until the connection fails and my HC1 and becomes unreachable. It also has current problems when you apply the HC1 DTB via armbian-config, then it will not boot either.
  2. Hello, Since debian buster switched to nftables as default, when i want to use the ufw-firewall, the following happens: root@homecloud:~# ufw enable Command may disrupt existing ssh connections. Proceed with operation (y|n)? y ERROR: problem running ufw-init ip6tables-restore v1.8.3 (nf_tables): unknown option "--icmpv6-type" Error occurred at line: 36 Try `ip6tables-restore -h' or 'ip6tables-restore --help' for more information. Problem running '/etc/ufw/before6.rules' root@homecloud:~# I installed both iptables and nftables, and also tried the buster-backports versions of both programs, same issue. When i run the ufw-check-requirements script, i get this: root@homecloud:~# /usr/share/ufw/check-requirements Has python: pass (binary: python2.7, version: 2.7.16, py2) Has iptables: pass Has ip6tables: pass Has /proc/net/dev: pass Has /proc/net/if_inet6: pass This script will now attempt to create various rules using the iptables and ip6tables commands. This may result in module autoloading (eg, for IPv6). Proceed with checks (Y/n)? y == IPv4 == Creating 'ufw-check-requirements'... done Inserting RETURN at top of 'ufw-check-requirements'... done TCP: pass UDP: pass destination port: pass source port: pass ACCEPT: pass DROP: pass REJECT: pass LOG: pass hashlimit: pass limit: pass ctstate (NEW): pass ctstate (RELATED): pass ctstate (ESTABLISHED): pass ctstate (INVALID): pass ctstate (new, recent set): pass ctstate (new, recent update): pass ctstate (new, limit): pass interface (input): pass interface (output): pass multiport: pass comment: pass addrtype (LOCAL): pass addrtype (MULTICAST): pass addrtype (BROADCAST): pass icmp (destination-unreachable): pass icmp (source-quench): pass icmp (time-exceeded): pass icmp (parameter-problem): pass icmp (echo-request): pass == IPv6 == Creating 'ufw-check-requirements6'... done Inserting RETURN at top of 'ufw-check-requirements6'... done TCP: pass UDP: pass destination port: pass source port: pass ACCEPT: pass DROP: pass REJECT: pass LOG: pass hashlimit: pass limit: pass ctstate (NEW): pass ctstate (RELATED): pass ctstate (ESTABLISHED): pass ctstate (INVALID): pass ctstate (new, recent set): pass ctstate (new, recent update): pass ctstate (new, limit): pass interface (input): pass interface (output): pass multiport: pass comment: pass icmpv6 (destination-unreachable): FAIL error was: ip6tables v1.8.3 (nf_tables): unknown option "--icmpv6-type" Try `ip6tables -h' or 'ip6tables --help' for more information. icmpv6 (packet-too-big): FAIL error was: ip6tables v1.8.3 (nf_tables): unknown option "--icmpv6-type" Try `ip6tables -h' or 'ip6tables --help' for more information. icmpv6 (time-exceeded): FAIL error was: ip6tables v1.8.3 (nf_tables): unknown option "--icmpv6-type" Try `ip6tables -h' or 'ip6tables --help' for more information. icmpv6 (parameter-problem): FAIL error was: ip6tables v1.8.3 (nf_tables): unknown option "--icmpv6-type" Try `ip6tables -h' or 'ip6tables --help' for more information. icmpv6 (echo-request): FAIL error was: ip6tables v1.8.3 (nf_tables): unknown option "--icmpv6-type" Try `ip6tables -h' or 'ip6tables --help' for more information. icmpv6 with hl (neighbor-solicitation): FAIL error was: ip6tables v1.8.3 (nf_tables): unknown option "--icmpv6-type" Try `ip6tables -h' or 'ip6tables --help' for more information. icmpv6 with hl (neighbor-advertisement): FAIL error was: ip6tables v1.8.3 (nf_tables): unknown option "--icmpv6-type" Try `ip6tables -h' or 'ip6tables --help' for more information. icmpv6 with hl (router-solicitation): FAIL error was: ip6tables v1.8.3 (nf_tables): unknown option "--icmpv6-type" Try `ip6tables -h' or 'ip6tables --help' for more information. icmpv6 with hl (router-advertisement): FAIL error was: ip6tables v1.8.3 (nf_tables): unknown option "--icmpv6-type" Try `ip6tables -h' or 'ip6tables --help' for more information. ipv6 rt: pass FAIL: check your kernel and that you have iptables >= 1.4.0 root@homecloud:~# Could this be a kernel issue with the standard 4.14 kernel? because i have no issues with the 5.1 dev kernel: root@homecloud:~# /usr/share/ufw/check-requirements Has python: pass (binary: python2.7, version: 2.7.16, py2) Has iptables: pass Has ip6tables: pass Has /proc/net/dev: pass Has /proc/net/if_inet6: pass This script will now attempt to create various rules using the iptables and ip6tables commands. This may result in module autoloading (eg, for IPv6). Proceed with checks (Y/n)? y == IPv4 == Creating 'ufw-check-requirements'... done Inserting RETURN at top of 'ufw-check-requirements'... done TCP: pass UDP: pass destination port: pass source port: pass ACCEPT: pass DROP: pass REJECT: pass LOG: pass hashlimit: pass limit: pass ctstate (NEW): pass ctstate (RELATED): pass ctstate (ESTABLISHED): pass ctstate (INVALID): pass ctstate (new, recent set): pass ctstate (new, recent update): pass ctstate (new, limit): pass interface (input): pass interface (output): pass multiport: pass comment: pass addrtype (LOCAL): pass addrtype (MULTICAST): pass addrtype (BROADCAST): pass icmp (destination-unreachable): pass icmp (source-quench): pass icmp (time-exceeded): pass icmp (parameter-problem): pass icmp (echo-request): pass == IPv6 == Creating 'ufw-check-requirements6'... done Inserting RETURN at top of 'ufw-check-requirements6'... done TCP: pass UDP: pass destination port: pass source port: pass ACCEPT: pass DROP: pass REJECT: pass LOG: pass hashlimit: pass limit: pass ctstate (NEW): pass ctstate (RELATED): pass ctstate (ESTABLISHED): pass ctstate (INVALID): pass ctstate (new, recent set): pass ctstate (new, recent update): pass ctstate (new, limit): pass interface (input): pass interface (output): pass multiport: pass comment: pass icmpv6 (destination-unreachable): pass icmpv6 (packet-too-big): pass icmpv6 (time-exceeded): pass icmpv6 (parameter-problem): pass icmpv6 (echo-request): pass icmpv6 with hl (neighbor-solicitation): pass icmpv6 with hl (neighbor-advertisement): pass icmpv6 with hl (router-solicitation): pass icmpv6 with hl (router-advertisement): pass ipv6 rt: pass All tests passed root@homecloud:~# And the ufw-firewall can be enabled without issue. Currently, the solution for the odroidxu4 with the standard 4.14 kernel is to switch from iptables-nft (nftables as backend) to iptables-legacy as described here: https://wiki.debian.org/nftables update-alternatives --set iptables /usr/sbin/iptables-legacy update-alternatives --set ip6tables /usr/sbin/ip6tables-legacy Is there a way to fix it so nftables can be used with the standard 4.14 kernel? Sincerely, cyagon
  3. Thank you so much I think im going with the HC1. Sincerely, cyagon
  4. Thank you, @Igor_K! One problem could be the E2E encryption feature of NC13, since the HC1 doesnt have hardware-encryption and the RK3328 of the ROCK64 is still pretty new. @tkaiser, do you have any informations about this? Which board would you prefer? I would love to hear your opinion on this. Sincerely, cyagon
  5. Hello, I want to build myself a tiny nas. I want to run both Nextcloud and gitea (git server) on it. Which would you prefer? #### ODroid HC1 - Board with power supply = 54,50$ - Case = 4,00$ - Shipping = 17,40$ - Total = 75.90$ Total with german customs fees = 72,85€ #### Rock64 2GB - Board = 34.95$ - Power Supply = 6,99$ - JMS578 USB-to-SATA Cable= 9,99$ - Shipping = 11.99$ - Total = 63.92$ Total with german customs fees = 61,83 € For help i would be grateful. Sincerely, cyagon