Hi there,
I’m having problems with my xrdp and xrdp seaman files, everything worked fine, but all of a sudden after a reboot it stopped working.
This is a new thread im staring from the
old one here since the problem is narrowed down.
Code:
sudo systemctl --failed
UNIT LOAD ACTIVE SUB DESCRIPTION
● piavpn.service loaded failed failed Private Internet Access daemon
● radarr.service loaded failed failed Radarr Daemon
● sonarr.service loaded failed failed Sonarr (NzbDrone) Daemon
● xrdp-sesman.service loaded failed failed xrdp session manager
● xrdp.service loaded failed failed xrdp daemon
LOAD = Reflects whether the unit definition was properly loaded.
ACTIVE = The high-level unit activation state, i.e. generalization of SUB.
SUB = The low-level unit activation state, values depend on unit type.
5 loaded units listed. Pass --all to see loaded but inactive units, too.
To show all installed unit files use 'systemctl list-unit-files'.
:~$ sudo systemctl status xrdp.service
● xrdp.service - xrdp daemon
Loaded: loaded (/lib/systemd/system/xrdp.service; enabled; vendor preset: enabled)
Active: failed (Result: exit-code) since Thu 2020-01-02 19:50:15 CET; 2min 29s ago
Docs: man:xrdp(8)
man:xrdp.ini(5)
Process: 1061 ExecStart=/usr/sbin/xrdp $XRDP_OPTIONS (code=exited, status=1/FAILURE)
Process: 1042 ExecStartPre=/bin/sh /usr/share/xrdp/socksetup (code=exited, status=0/SUCCESS)
Jan 02 19:50:14 rock systemd[1]: Starting xrdp daemon...
Jan 02 19:50:15 rock systemd[1]: xrdp.service: Control process exited, code=exited status=1
Jan 02 19:50:15 rock systemd[1]: xrdp.service: Failed with result 'exit-code'.
Jan 02 19:50:15 rock systemd[1]: Failed to start xrdp daemon
:~$ sudo systemctl status xrdp-sesman.service
● xrdp-sesman.service - xrdp session manager
Loaded: loaded (/lib/systemd/system/xrdp-sesman.service; enabled; vendor preset: enabled)
Active: failed (Result: exit-code) since Thu 2020-01-02 19:50:15 CET; 2min 37s ago
Docs: man:xrdp-sesman(8)
man:sesman.ini(5)
Process: 1065 ExecStop=/usr/sbin/xrdp-sesman $SESMAN_OPTIONS --kill (code=exited, status=1/FAILURE)
Process: 1015 ExecStart=/usr/sbin/xrdp-sesman $SESMAN_OPTIONS (code=exited, status=0/SUCCESS)
Main PID: 1024 (code=exited, status=0/SUCCESS)
Jan 02 19:50:14 rock xrdp-sesman[1015]: (1015)(547841312592)[DEBUG] Closed socket 5 (AF_INET6 ::1 port 3350)
Jan 02 19:50:14 rock xrdp-sesman[1024]: (1024)(547841312592)[INFO ] starting xrdp-sesman with pid 1024
Jan 02 19:50:14 rock xrdp-sesman[1024]: (1024)(547841312592)[INFO ] listening to port 3350 on 127.0.0.1
Jan 02 19:50:14 rock systemd[1]: Started xrdp session manager.
Jan 02 19:50:15 rock systemd[1]: Stopping xrdp session manager...
Jan 02 19:50:15 rock systemd[1]: xrdp-sesman.service: Control process exited, code=exited status=1
Jan 02 19:50:15 rock xrdp-sesman[1024]: (1024)(547841312592)[INFO ] shutting down sesman 1
Jan 02 19:50:15 rock xrdp-sesman[1024]: (1024)(547841312592)[DEBUG] Closed socket 7 (AF_INET6 ::1 port 3350)
Jan 02 19:50:15 rock systemd[1]: xrdp-sesman.service: Failed with result 'exit-code'.
Jan 02 19:50:15 rock systemd[1]: Stopped xrdp session manager.
To get things going, here are the outputs from xrdp.ini and xrdp-seaman.ini:
Code:
cat xrdp.ini
[Globals]
; xrdp.ini file version number
ini_version=1
; fork a new process for each incoming connection
fork=true
; tcp port to listen
port=3389
; 'port' above should be connected to with vsock instead of tcp
use_vsock=false
; regulate if the listening socket use socket option tcp_nodelay
; no buffering will be performed in the TCP stack
tcp_nodelay=true
; regulate if the listening socket use socket option keepalive
; if the network connection disappear without close messages the connection will be closed
tcp_keepalive=true
#tcp_send_buffer_bytes=32768
#tcp_recv_buffer_bytes=32768
; security layer can be 'tls', 'rdp' or 'negotiate'
; for client compatible layer
security_layer=negotiate
; minimum security level allowed for client
; can be 'none', 'low', 'medium', 'high', 'fips'
crypt_level=high
; X.509 certificate and private key
; openssl req -x509 -newkey rsa:2048 -nodes -keyout key.pem -out cert.pem -days 365
certificate=
key_file=
; set SSL protocols
; can be comma separated list of 'SSLv3', 'TLSv1', 'TLSv1.1', 'TLSv1.2'
ssl_protocols=TLSv1, TLSv1.1, TLSv1.2
; set TLS cipher suites
#tls_ciphers=HIGH
; Section name to use for automatic login if the client sends username
; and password. If empty, the domain name sent by the client is used.
; If empty and no domain name is given, the first suitable section in
; this file will be used.
autorun=
allow_channels=true
allow_multimon=true
bitmap_cache=true
bitmap_compression=true
bulk_compression=true
#hidelogwindow=true
max_bpp=32
new_cursors=true
; fastpath - can be 'input', 'output', 'both', 'none'
use_fastpath=both
; when true, userid/password *must* be passed on cmd line
#require_credentials=true
; You can set the PAM error text in a gateway setup (MAX 256 chars)
#pamerrortxt=change your password according to policy at http://url
;
; colors used by windows in RGB format
;
blue=009cb5
grey=dedede
#black=000000
#dark_grey=808080
#blue=08246b
#dark_blue=08246b
#white=ffffff
#red=ff0000
#green=00ff00
#background=626c72
;
; configure login screen
;
; Login Screen Window Title
#ls_title=My Login Title
; top level window background color in RGB format
ls_top_window_bg_color=009cb5
; width and height of login screen
ls_width=350
ls_height=430
; login screen background color in RGB format
ls_bg_color=dedede
; optional background image filename (bmp format).
#ls_background_image=
; logo
; full path to bmp-file or file in shared folder
ls_logo_filename=
ls_logo_x_pos=55
ls_logo_y_pos=50
; for positioning labels such as username, password etc
ls_label_x_pos=30
ls_label_width=60
; for positioning text and combo boxes next to above labels
ls_input_x_pos=110
ls_input_width=210
; y pos for first label and combo box
ls_input_y_pos=220
; OK button
ls_btn_ok_x_pos=142
ls_btn_ok_y_pos=370
ls_btn_ok_width=85
ls_btn_ok_height=30
; Cancel button
ls_btn_cancel_x_pos=237
ls_btn_cancel_y_pos=370
ls_btn_cancel_width=85
ls_btn_cancel_height=30
[Logging]
LogFile=xrdp.log
LogLevel=DEBUG
EnableSyslog=true
SyslogLevel=DEBUG
; LogLevel and SysLogLevel could by any of: core, error, warning, info or debug
[Channels]
; Channel names not listed here will be blocked by XRDP.
; You can block any channel by setting its value to false.
; IMPORTANT! All channels are not supported in all use
; cases even if you set all values to true.
; You can override these settings on each session type
; These settings are only used if allow_channels=true
rdpdr=true
rdpsnd=true
drdynvc=true
cliprdr=true
rail=true
xrdpvr=true
tcutils=true
; for debugging xrdp, in section xrdp1, change port=-1 to this:
#port=/tmp/.xrdp/xrdp_display_10
; for debugging xrdp, add following line to section xrdp1
#chansrvport=/tmp/.xrdp/xrdp_chansrv_socket_7210
;
; Session types
;
; Some session types such as Xorg, X11rdp and Xvnc start a display server.
; Startup command-line parameters for the display server are configured
; in sesman.ini. See and configure also sesman.ini.
[Xorg]
name=Xorg
lib=libxup.so
username=ask
password=ask
ip=127.0.0.1
port=-1
code=20
[X11rdp]
name=X11rdp
lib=libxup.so
username=ask
password=ask
ip=127.0.0.1
port=-1
xserverbpp=24
code=10
[Xvnc]
name=Xvnc
lib=libvnc.so
username=ask
password=ask
ip=127.0.0.1
port=-1
#xserverbpp=24
#delay_ms=2000
[console]
name=console
lib=libvnc.so
ip=127.0.0.1
port=5900
username=na
password=ask
#delay_ms=2000
[vnc-any]
name=vnc-any
lib=libvnc.so
ip=ask
port=ask5900
username=na
password=ask
#pamusername=asksame
#pampassword=asksame
#pamsessionmng=127.0.0.1
#delay_ms=2000
[sesman-any]
name=sesman-any
lib=libvnc.so
ip=ask
port=-1
username=ask
password=ask
#delay_ms=2000
[neutrinordp-any]
name=neutrinordp-any
lib=libxrdpneutrinordp.so
ip=ask
port=ask3389
username=ask
password=ask
; You can override the common channel settings for each session type
#channel.rdpdr=true
#channel.rdpsnd=true
#channel.drdynvc=true
#channel.cliprdr=true
#channel.rail=true
#channel.xrdpvr=true
I did create a ufw port forward for 3389, could that have messed up Iptables?
Here is seaman.ini:
Code:
cat sesman.ini
[Globals]
ListenAddress=127.0.0.1
ListenPort=3350
EnableUserWindowManager=true
UserWindowManager=startwm.sh
DefaultWindowManager=startwm.sh
[Security]
AllowRootLogin=true
MaxLoginRetry=4
TerminalServerUsers=tsusers
TerminalServerAdmins=tsadmins
; When AlwaysGroupCheck=false access will be permitted
; if the group TerminalServerUsers is not defined.
AlwaysGroupCheck=false
[Sessions]
;; X11DisplayOffset - x11 display number offset
; Type: integer
; Default: 10
X11DisplayOffset=10
;; MaxSessions - maximum number of connections to an xrdp server
; Type: integer
; Default: 0
MaxSessions=50
;; KillDisconnected - kill disconnected sessions
; Type: boolean
; Default: false
; if 1, true, or yes, kill session after 60 seconds
KillDisconnected=false
;; DisconnectedTimeLimit - when to kill idle sessions
; Type: integer
; Default: 0
; if not zero, the seconds before a disconnected session is killed
; min 60 seconds
DisconnectedTimeLimit=0
;; Policy - session allocation policy
; Type: enum [ "Default" | "UBD" | "UBI" | "UBC" | "UBDI" | "UBDC" ]
; Default: Xrdp:<User,BitPerPixel> and Xvnc:<User,BitPerPixel,DisplaySize>
; "UBD" session per <User,BitPerPixel,DisplaySize>
; "UBI" session per <User,BitPerPixel,IPAddr>
; "UBC" session per <User,BitPerPixel,Connection>
; "UBDI" session per <User,BitPerPixel,DisplaySize,IPAddr>
; "UBDC" session per <User,BitPerPixel,DisplaySize,Connection>
Policy=Default
[Logging]
LogFile=xrdp-sesman.log
LogLevel=DEBUG
EnableSyslog=1
SyslogLevel=DEBUG
;
; Session definitions - startup command-line parameters for each session type
;
[Xorg]
; Specify the path of non-suid Xorg executable. It might differ depending
; on your distribution and version. The typical path is shown as follows:
;
; Fedora 26 or later : param=/usr/libexec/Xorg
; Debian 9 or later : param=/usr/lib/xorg/Xorg
; Ubuntu 16.04 or later : param=/usr/lib/xorg/Xorg
; Arch Linux : param=/usr/bin/Xorg or param=Xorg
; CentOS 7 : param=/usr/bin/Xorg or param=Xorg
;
param=/usr/lib/xorg/Xorg
; Leave the rest paramaters as-is unless you understand what will happen.
param=-config
param=xrdp/xorg.conf
param=-noreset
param=-nolisten
param=tcp
param=-logfile
param=.xorgxrdp.%s.log
[Xvnc]
param=Xvnc
param=-bs
param=-nolisten
param=tcp
param=-localhost
param=-dpi
param=96
[Chansrv]
; drive redirection, defaults to xrdp_client if not set
FuseMountName=thinclient_drives
[SessionVariables]
PULSE_SCRIPT=/etc/xrdp/pulse/default.pa
This is my xrdp-seaman.log:
Code:
sudo cat xrdp-sesman.log
[sudo] password for padeem:
[20200102-18:19:12] [DEBUG] libscp initialized
[20200102-18:19:12] [DEBUG] Testing if xrdp-sesman can listen on 127.0.0.1 port 3350.
[20200102-18:19:12] [INFO ] starting xrdp-sesman with pid 1125
[20200102-18:19:12] [INFO ] listening to port 3350 on 127.0.0.1
[20200102-18:19:12] [DEBUG] Closed socket 5 (AF_INET6 ::1 port 3350)
[20200102-18:19:13] [INFO ] shutting down sesman 1
[20200102-18:19:13] [DEBUG] Closed socket 7 (AF_INET6 ::1 port 3350)
[20200102-18:36:57] [DEBUG] libscp initialized
[20200102-18:36:57] [DEBUG] Testing if xrdp-sesman can listen on 127.0.0.1 port 3350.
[20200102-18:36:57] [DEBUG] Closed socket 5 (AF_INET6 ::1 port 3350)
[20200102-18:36:57] [INFO ] starting xrdp-sesman with pid 1022
[20200102-18:36:57] [INFO ] listening to port 3350 on 127.0.0.1
[20200102-18:36:58] [INFO ] shutting down sesman 1
[20200102-18:36:58] [DEBUG] Closed socket 7 (AF_INET6 ::1 port 3350)
[20200102-19:24:57] [DEBUG] libscp initialized
[20200102-19:24:57] [DEBUG] Testing if xrdp-sesman can listen on 127.0.0.1 port 3350.
[20200102-19:24:57] [DEBUG] Closed socket 5 (AF_INET6 ::1 port 3350)
[20200102-19:24:57] [INFO ] starting xrdp-sesman with pid 5079
[20200102-19:24:57] [INFO ] listening to port 3350 on 127.0.0.1
[20200102-19:24:57] [INFO ] shutting down sesman 1
[20200102-19:24:57] [DEBUG] Closed socket 7 (AF_INET6 ::1 port 3350)
[20200102-19:27:56] [DEBUG] libscp initialized
[20200102-19:27:56] [DEBUG] Testing if xrdp-sesman can listen on 127.0.0.1 port 3350.
[20200102-19:27:56] [DEBUG] Closed socket 5 (AF_INET6 ::1 port 3350)
[20200102-19:27:56] [INFO ] starting xrdp-sesman with pid 1038
[20200102-19:27:56] [INFO ] listening to port 3350 on 127.0.0.1
[20200102-19:27:57] [INFO ] shutting down sesman 1
[20200102-19:27:57] [DEBUG] Closed socket 7 (AF_INET6 ::1 port 3350)
[20200102-19:31:56] [DEBUG] libscp initialized
[20200102-19:31:56] [DEBUG] Testing if xrdp-sesman can listen on 127.0.0.1 port 3350.
[20200102-19:31:56] [DEBUG] Closed socket 5 (AF_INET6 ::1 port 3350)
[20200102-19:31:56] [INFO ] starting xrdp-sesman with pid 3217
[20200102-19:31:56] [INFO ] listening to port 3350 on 127.0.0.1
[20200102-19:31:56] [INFO ] shutting down sesman 1
[20200102-19:31:56] [DEBUG] Closed socket 7 (AF_INET6 ::1 port 3350)
[20200102-19:33:11] [DEBUG] libscp initialized
[20200102-19:33:11] [DEBUG] Testing if xrdp-sesman can listen on 127.0.0.1 port 3350.
[20200102-19:33:11] [DEBUG] Closed socket 5 (AF_INET6 ::1 port 3350)
[20200102-19:33:11] [INFO ] starting xrdp-sesman with pid 1021
[20200102-19:33:11] [INFO ] listening to port 3350 on 127.0.0.1
[20200102-19:33:12] [INFO ] shutting down sesman 1
[20200102-19:33:12] [DEBUG] Closed socket 7 (AF_INET6 ::1 port 3350)
[20200102-19:45:31] [DEBUG] libscp initialized
[20200102-19:45:31] [DEBUG] Testing if xrdp-sesman can listen on 127.0.0.1 port 3350.
[20200102-19:45:31] [DEBUG] Closed socket 5 (AF_INET6 ::1 port 3350)
[20200102-19:45:31] [INFO ] starting xrdp-sesman with pid 3080
[20200102-19:45:31] [INFO ] listening to port 3350 on 127.0.0.1
[20200102-19:45:31] [INFO ] shutting down sesman 1
[20200102-19:45:31] [DEBUG] Closed socket 7 (AF_INET6 ::1 port 3350)
[20200102-19:50:14] [DEBUG] libscp initialized
[20200102-19:50:14] [DEBUG] Testing if xrdp-sesman can listen on 127.0.0.1 port 3350.
[20200102-19:50:14] [DEBUG] Closed socket 5 (AF_INET6 ::1 port 3350)
[20200102-19:50:14] [INFO ] starting xrdp-sesman with pid 1024
[20200102-19:50:14] [INFO ] listening to port 3350 on 127.0.0.1
[20200102-19:50:15] [INFO ] shutting down sesman 1
[20200102-19:50:15] [DEBUG] Closed socket 7 (AF_INET6 ::1 port 3350)
Xrdp.log is empty...
This are my iptables:
Code:
sudo iptables -L
Chain INPUT (policy DROP)
target prot opt source destination
ufw-before-logging-input all -- anywhere anywhere
ufw-before-input all -- anywhere anywhere
ufw-after-input all -- anywhere anywhere
ufw-after-logging-input all -- anywhere anywhere
ufw-reject-input all -- anywhere anywhere
ufw-track-input all -- anywhere anywhere
Chain FORWARD (policy DROP)
target prot opt source destination
ufw-before-logging-forward all -- anywhere anywhere
ufw-before-forward all -- anywhere anywhere
ufw-after-forward all -- anywhere anywhere
ufw-after-logging-forward all -- anywhere anywhere
ufw-reject-forward all -- anywhere anywhere
ufw-track-forward all -- anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ufw-before-logging-output all -- anywhere anywhere
ufw-before-output all -- anywhere anywhere
ufw-after-output all -- anywhere anywhere
ufw-after-logging-output all -- anywhere anywhere
ufw-reject-output all -- anywhere anywhere
ufw-track-output all -- anywhere anywhere
Chain ufw-after-forward (1 references)
target prot opt source destination
Chain ufw-after-input (1 references)
target prot opt source destination
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-ns
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:netbios-dgm
ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:netbios-ssn
ufw-skip-to-policy-input tcp -- anywhere anywhere tcp dpt:microsoft-ds
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootps
ufw-skip-to-policy-input udp -- anywhere anywhere udp dpt:bootpc
ufw-skip-to-policy-input all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST
Chain ufw-after-logging-forward (1 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "
Chain ufw-after-logging-input (1 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "
Chain ufw-after-logging-output (1 references)
target prot opt source destination
Chain ufw-after-output (1 references)
target prot opt source destination
Chain ufw-before-forward (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
ACCEPT icmp -- anywhere anywhere icmp time-exceeded
ACCEPT icmp -- anywhere anywhere icmp parameter-problem
ACCEPT icmp -- anywhere anywhere icmp echo-request
ufw-user-forward all -- anywhere anywhere
Chain ufw-before-input (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
ufw-logging-deny all -- anywhere anywhere ctstate INVALID
DROP all -- anywhere anywhere ctstate INVALID
ACCEPT icmp -- anywhere anywhere icmp destination-unreachable
ACCEPT icmp -- anywhere anywhere icmp time-exceeded
ACCEPT icmp -- anywhere anywhere icmp parameter-problem
ACCEPT icmp -- anywhere anywhere icmp echo-request
ACCEPT udp -- anywhere anywhere udp spt:bootps dpt:bootpc
ufw-not-local all -- anywhere anywhere
ACCEPT udp -- anywhere 224.0.0.251 udp dpt:mdns
ACCEPT udp -- anywhere 239.255.255.250 udp dpt:1900
ufw-user-input all -- anywhere anywhere
Chain ufw-before-logging-forward (1 references)
target prot opt source destination
Chain ufw-before-logging-input (1 references)
target prot opt source destination
Chain ufw-before-logging-output (1 references)
target prot opt source destination
Chain ufw-before-output (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED
ufw-user-output all -- anywhere anywhere
Chain ufw-logging-allow (0 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW ALLOW] "
Chain ufw-logging-deny (2 references)
target prot opt source destination
RETURN all -- anywhere anywhere ctstate INVALID limit: avg 3/min burst 10
LOG all -- anywhere anywhere limit: avg 3/min burst 10 LOG level warning prefix "[UFW BLOCK] "
Chain ufw-not-local (1 references)
target prot opt source destination
RETURN all -- anywhere anywhere ADDRTYPE match dst-type LOCAL
RETURN all -- anywhere anywhere ADDRTYPE match dst-type MULTICAST
RETURN all -- anywhere anywhere ADDRTYPE match dst-type BROADCAST
ufw-logging-deny all -- anywhere anywhere limit: avg 3/min burst 10
DROP all -- anywhere anywhere
Chain ufw-reject-forward (1 references)
target prot opt source destination
Chain ufw-reject-input (1 references)
target prot opt source destination
Chain ufw-reject-output (1 references)
target prot opt source destination
Chain ufw-skip-to-policy-forward (0 references)
target prot opt source destination
DROP all -- anywhere anywhere
Chain ufw-skip-to-policy-input (7 references)
target prot opt source destination
DROP all -- anywhere anywhere
Chain ufw-skip-to-policy-output (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain ufw-track-forward (1 references)
target prot opt source destination
Chain ufw-track-input (1 references)
target prot opt source destination
Chain ufw-track-output (1 references)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere ctstate NEW
ACCEPT udp -- anywhere anywhere ctstate NEW
Chain ufw-user-forward (1 references)
target prot opt source destination
Chain ufw-user-input (1 references)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
ACCEPT udp -- anywhere anywhere udp dpt:22
ACCEPT tcp -- anywhere anywhere tcp dpt:9091
ACCEPT udp -- anywhere anywhere udp dpt:9091
ACCEPT tcp -- anywhere anywhere tcp dpt:32400
ACCEPT udp -- anywhere anywhere udp dpt:32400
ACCEPT tcp -- anywhere anywhere tcp dpt:1198
ACCEPT udp -- anywhere anywhere udp dpt:1198
ACCEPT tcp -- anywhere anywhere tcp dpt:51413
ACCEPT udp -- anywhere anywhere udp dpt:51413
ACCEPT tcp -- anywhere anywhere tcp dpt:2234
ACCEPT udp -- anywhere anywhere udp dpt:2234
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh
ACCEPT tcp -- anywhere anywhere tcp dpt:3389
ACCEPT tcp -- anywhere anywhere tcp dpt:51413
ACCEPT udp -- anywhere anywhere udp dpt:51413
Chain ufw-user-limit (0 references)
target prot opt source destination
LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning prefix "[UFW LIMIT BLOCK] "
REJECT all -- anywhere anywhere reject-with icmp-port-unreachable
Chain ufw-user-limit-accept (0 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere
Chain ufw-user-logging-forward (0 references)
target prot opt source destination
Chain ufw-user-logging-input (0 references)
target prot opt source destination
Chain ufw-user-logging-output (0 references)
target prot opt source destination
Chain ufw-user-output (1 references)
target prot opt source destination
This is my system information:
Code:
System: Host: rock Kernel: 4.4.198-rockchip64 aarch64 bits: 32 Console: tty 0 Distro: Ubuntu 18.04.3 LTS
Machine: No /sys/class/dmi; using dmidecode: dmidecode is not installed.
CPU: 6 core (-MCP-) (ARM)
clock speeds: max: 1416 MHz 1: 1416 MHz 2: 1416 MHz 3: 1416 MHz 4: 1416 MHz 5: 1416 MHz 6: 1416 MHz
Graphics: Card: Failed to Detect Video Card!
Display Server: X.org 1.19.6 driver: N/A tty size: 151x49 Advanced Data: N/A out of X
Audio: Card-1 rockchip driver: es8316-codec Sound: ALSA v: k4.4.198-rockchip64
Card-2 HDMI-CODEC driver: HDMI-CODEC
Network: Card: Failed to Detect Network Card!
Drives: HDD Total Size: 4000.8GB (43.8% used)
ID-1: /dev/mmcblk1 model: N/A size: 123.7GB
ID-2: USB /dev/sda model: Expansion+_Desk size: 4000.8GB
Partition: ID-1: / size: 113G used: 22G (20%) fs: ext4 dev: /dev/mmcblk1p1
ID-2: /var/log size: 49M used: 24M (54%) fs: ext4 dev: /dev/zram0
ID-3: swap-1 size: 1.07GB used: 0.00GB (0%) fs: swap dev: /dev/zram1
Sensors: None detected - is lm-sensors installed and configured?
Info: Processes: 237 Uptime: 15:42 Memory: 726.0/3874.4MB Init: systemd Client: Shell (bash) inxi: 2.3.56
Any idea where i should go from here ? I have absolutely no idea this deep is new for me.
Thank you very much in advance!