LinuxQuestions.org
Did you know LQ has a Linux Hardware Compatibility List?
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Server
User Name
Password
Linux - Server This forum is for the discussion of Linux Software used in a server related context.

Notices



Reply
 
Search this Thread
Old 04-08-2008, 03:40 AM   #1
fakie_flip
Senior Member
 
Registered: Feb 2005
Location: san antonio, texas
Distribution: Fedora 64 bit RAID0 + LUKS, CentOS (server), Backtrack, Gentoo Hardened
Posts: 1,441

Rep: Reputation: 81
mount: mount to NFS server '192.168.0.3' failed: System Error: Connection refused.


That's the error I get. I am trying to mount a /home on nfs to /mnt/debian_home on the client computer.

Code:
[root@localhost ~]# mount -a
mount: mount to NFS server '192.168.0.3' failed: System Error: Connection refused.
[root@localhost ~]#
Here are my configuration files on the client. I highlighted with red the two computers.

Code:
[root@localhost ~]# cat /etc/fstab
/dev/md0                /                       ext3    defaults        1 1
/dev/md2                /home                   ext3    defaults        1 2
tmpfs                   /dev/shm                tmpfs   defaults        0 0
devpts                  /dev/pts                devpts  gid=5,mode=620  0 0
sysfs                   /sys                    sysfs   defaults        0 0
proc                    /proc                   proc    defaults        0 0
/dev/md1                swap                    swap    defaults        0 0
/dev/sda1               /mnt/sda1               ntfs-3g defaults        0 0
/dev/sdb1               /mnt/sdb1               ntfs-3g defaults        0 0
192.168.0.3:/home       /mnt/debian_home        nfs     rw,hard,intr    0 0
[root@localhost ~]# cat /etc/hosts*
# Do not remove the following line, or various programs
# that require network functionality will fail.
127.0.0.1       localhost.localdomain   localhost       localhost
::1     localhost6.localdomain6 localhost6
192.168.0.3     debian  debian-server
#
# hosts.allow   This file contains access rules which are used to
#               allow or deny connections to network services that
#               either use the tcp_wrappers library or that have been
#               started through a tcp_wrappers-enabled xinetd.
#
#               See 'man 5 hosts_options' and 'man 5 hosts_access'
#               for information on rule syntax.
#               See 'man tcpd' for information on tcp_wrappers
#

portmap : 192.168.0.3
ALL:ALL
#
# hosts.allow   This file contains access rules which are used to
#               allow or deny connections to network services that
#               either use the tcp_wrappers library or that have been
#               started through a tcp_wrappers-enabled xinetd.
#
#               See 'man 5 hosts_options' and 'man 5 hosts_access'
#               for information on rule syntax.
#               See 'man tcpd' for information on tcp_wrappers
#
#
# hosts.deny    This file contains access rules which are used to
#               deny connections to network services that either use
#               the tcp_wrappers library or that have been
#               started through a tcp_wrappers-enabled xinetd.
#
#               The rules in this file can also be set up in
#               /etc/hosts.allow with a 'deny' option instead.
#
#               See 'man 5 hosts_options' and 'man 5 hosts_access'
#               for information on rule syntax.
#               See 'man tcpd' for information on tcp_wrappers
#
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow.  In particular
# you should know that NFS uses portmap!
#

portmap : ALL
#
# hosts.deny    This file contains access rules which are used to
#               deny connections to network services that either use
#               the tcp_wrappers library or that have been
#               started through a tcp_wrappers-enabled xinetd.
#
#               The rules in this file can also be set up in
#               /etc/hosts.allow with a 'deny' option instead.
#
#               See 'man 5 hosts_options' and 'man 5 hosts_access'
#               for information on rule syntax.
#               See 'man tcpd' for information on tcp_wrappers
#
#
# The portmap line is redundant, but it is left to remind you that
# the new secure portmap uses hosts.deny and hosts.allow.  In particular
# you should know that NFS uses portmap!
#
[root@localhost ~]#
Here are my configuration files on the server.

Code:
chris@debian:~$ cat /etc/hosts
127.0.0.1 localhost debian
127.0.1.1 debian

# The following lines are desirable for IPv6 capable hosts
::1 ip6-localhost ip6-loopback
fe00::0 ip6-localnet
ff00::0 ip6-mcastprefix
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
ff02::3 ip6-allhosts
192.168.0.1 fedora-desktop
chris@debian:~$ cat /etc/exports
# /etc/exports: the access control list for filesystems which may be exported
#               to NFS clients.  See exports(5).
#
# Example for NFSv2 and NFSv3:
# /srv/homes       hostname1(rw,sync) hostname2(ro,sync)
#
# Example for NFSv4:
# /srv/nfs4        gss/krb5i(rw,sync,fsid=0,crossmnt)
# /srv/nfs4/homes  gss/krb5i(rw,sync)
#

/home 192.168.0.1(rw,sync,subtree_check)
chris@debian:~$
Now I am trying to make it work.

Code:
chris@debian:~$ sudo /etc/init.d/nfs-kernel-server restart && sudo /etc/init.d/nfs-common restart && sudo /etc/init.d/portmap restart && sudo exportfs -ar
Stopping NFS kernel daemon: mountd nfsd.
Unexporting directories for NFS kernel daemon....
Exporting directories for NFS kernel daemon....
Starting NFS kernel daemon: nfsd mountd.
Stopping NFS common utilities: idmapd statd.
Starting NFS common utilities: statd idmapd.
Stopping portmap daemon....
Starting portmap daemon....
chris@debian:~$
Code:
[root@localhost ~]# mount -a
mount: mount to NFS server '192.168.0.3' failed: System Error: Connection refused.
[root@localhost ~]#
Code:
[root@localhost ~]# !nmap
nmap -p 0-65535 debian-server

Starting Nmap 4.52 ( http://insecure.org ) at 2008-04-08 02:40 CDT
Interesting ports on debian (192.168.0.3):
Not shown: 65523 closed ports
PORT     STATE SERVICE
22/tcp   open  ssh
110/tcp  open  pop3
113/tcp  open  auth
139/tcp  open  netbios-ssn
143/tcp  open  imap
445/tcp  open  microsoft-ds
631/tcp  open  ipp
656/tcp  open  unknown
901/tcp  open  samba-swat
993/tcp  open  imaps
1310/tcp open  unknown
2049/tcp open  nfs
2226/tcp open  unknown
MAC Address: 00:A0:C9:A3:3A:05 (Intel - Hf1-06)

Nmap done: 1 IP address (1 host up) scanned in 2.961 seconds
[root@localhost ~]# mount -t nfs 192.168.0.3:/home /mnt/debian_home
mount: mount to NFS server '192.168.0.3' failed: System Error: Connection refused.
[root@localhost ~]# iptables -L
Chain INPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     tcp  --  ns2.gvtc.com         anywhere            tcp flags:!FIN,SYN,RST,ACK/SYN 
ACCEPT     udp  --  ns2.gvtc.com         anywhere            
ACCEPT     tcp  --  ns1.gvtc.com         anywhere            tcp flags:!FIN,SYN,RST,ACK/SYN 
ACCEPT     udp  --  ns1.gvtc.com         anywhere            
ACCEPT     all  --  anywhere             anywhere            
ACCEPT     icmp --  anywhere             anywhere            limit: avg 10/sec burst 5 
DROP       all  --  255.255.255.255      anywhere            
DROP       all  --  anywhere             default             
DROP       all  --  anywhere             anywhere            state INVALID 
LSI        all  -f  anywhere             anywhere            limit: avg 10/min burst 5 
INBOUND    all  --  anywhere             anywhere            
INBOUND    all  --  anywhere             192.168.0.1         
INBOUND    all  --  anywhere             192.168.1.109       
INBOUND    all  --  anywhere             192.168.0.255       
LOG_FILTER  all  --  anywhere             anywhere            
LOG        all  --  anywhere             anywhere            LOG level info prefix `Unknown Input' 

Chain FORWARD (policy DROP)
target     prot opt source               destination         
ACCEPT     icmp --  anywhere             anywhere            limit: avg 10/sec burst 5 
TCPMSS     tcp  --  anywhere             anywhere            tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 
OUTBOUND   all  --  anywhere             anywhere            
ACCEPT     tcp  --  anywhere             192.168.0.0/24      state RELATED,ESTABLISHED 
ACCEPT     udp  --  anywhere             192.168.0.0/24      state RELATED,ESTABLISHED 
LOG_FILTER  all  --  anywhere             anywhere            
LOG        all  --  anywhere             anywhere            LOG level info prefix `Unknown Forward' 

Chain OUTPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     tcp  --  192.168.1.109        ns2.gvtc.com        tcp dpt:domain 
ACCEPT     udp  --  192.168.1.109        ns2.gvtc.com        udp dpt:domain 
ACCEPT     tcp  --  192.168.1.109        ns1.gvtc.com        tcp dpt:domain 
ACCEPT     udp  --  192.168.1.109        ns1.gvtc.com        udp dpt:domain 
ACCEPT     all  --  anywhere             anywhere            
DROP       all  --  255.255.255.255      anywhere            
DROP       all  --  anywhere             default             
DROP       all  --  anywhere             anywhere            state INVALID 
OUTBOUND   all  --  anywhere             anywhere            
OUTBOUND   all  --  anywhere             anywhere            
LOG_FILTER  all  --  anywhere             anywhere            
LOG        all  --  anywhere             anywhere            LOG level info prefix `Unknown Output' 

Chain INBOUND (4 references)
target     prot opt source               destination         
ACCEPT     tcp  --  anywhere             anywhere            state RELATED,ESTABLISHED 
ACCEPT     udp  --  anywhere             anywhere            state RELATED,ESTABLISHED 
ACCEPT     all  --  192.168.0.2          anywhere            
ACCEPT     all  --  debian               anywhere            
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:distinct 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:distinct 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpts:7881:7889 
ACCEPT     udp  --  anywhere             anywhere            udp dpts:7881:7889 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:ssh 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:ssh 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:http 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:http 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpts:27960:27969 
ACCEPT     udp  --  anywhere             anywhere            udp dpts:27960:27969 
ACCEPT     tcp  --  anywhere             anywhere            tcp dpt:quake 
ACCEPT     udp  --  anywhere             anywhere            udp dpt:quake 
ACCEPT     tcp  --  192.168.0.0/24       anywhere            tcp dpt:sunrpc 
ACCEPT     udp  --  192.168.0.0/24       anywhere            udp dpt:sunrpc 
ACCEPT     tcp  --  192.168.0.0/24       anywhere            tcp dpt:nfs 
ACCEPT     udp  --  192.168.0.0/24       anywhere            udp dpt:nfs 
LSI        all  --  anywhere             anywhere            

Chain LOG_FILTER (5 references)
target     prot opt source               destination         

Chain LSI (2 references)
target     prot opt source               destination         
LOG_FILTER  all  --  anywhere             anywhere            
LOG        tcp  --  anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/SYN limit: avg 1/sec burst 5 LOG level info prefix `Inbound ' 
DROP       tcp  --  anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/RST limit: avg 1/sec burst 5 LOG level info prefix `Inbound ' 
DROP       tcp  --  anywhere             anywhere            tcp flags:FIN,SYN,RST,ACK/RST 
LOG        icmp --  anywhere             anywhere            icmp echo-request limit: avg 1/sec burst 5 LOG level info prefix `Inbound ' 
DROP       icmp --  anywhere             anywhere            icmp echo-request 
LOG        all  --  anywhere             anywhere            limit: avg 5/sec burst 5 LOG level info prefix `Inbound ' 
DROP       all  --  anywhere             anywhere            

Chain LSO (0 references)
target     prot opt source               destination         
LOG_FILTER  all  --  anywhere             anywhere            
LOG        all  --  anywhere             anywhere            limit: avg 5/sec burst 5 LOG level info prefix `Outbound ' 
REJECT     all  --  anywhere             anywhere            reject-with icmp-port-unreachable 

Chain OUTBOUND (3 references)
target     prot opt source               destination         
ACCEPT     icmp --  anywhere             anywhere            
ACCEPT     tcp  --  anywhere             anywhere            state RELATED,ESTABLISHED 
ACCEPT     udp  --  anywhere             anywhere            state RELATED,ESTABLISHED 
ACCEPT     all  --  anywhere             anywhere            
[root@localhost ~]#

Last edited by fakie_flip; 04-08-2008 at 05:02 AM.
 
Old 04-10-2008, 01:28 AM   #2
fukawi2
Member
 
Registered: Oct 2006
Location: Melbourne, Australia
Distribution: ArchLinux, ArchServer, Fedora, CentOS
Posts: 448

Rep: Reputation: 34
1) Turn iptables off on both boxes for testing and see what happens.
2) On the server, run netstat -l and look at the "Active Internet Connections" section.
 
  


Reply


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
error: ** server can't find 79.20.168.192.in-addr.arpa: REFUSED mamtasahai1 Linux - General 17 05-07-2014 06:33 AM
on boot mount: RPC: remote system error - connection refused overlinx Linux - Networking 0 10-02-2006 11:51 AM
mount to NFS server '192.168.12.43' failed: server is down. hemant kumar tiwari General 1 06-07-2006 10:09 AM
mount to NFS server '192.168.1.13' failed: server is down rblampain Linux - Networking 2 01-14-2005 02:19 AM
mount -t //192.168.0.1/mnt /mnt/windows -o password='' generates error broadsoft Linux - Networking 3 08-07-2003 05:51 AM


All times are GMT -5. The time now is 08:00 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
identi.ca: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration