Posts by ikogan

    1. You should be able to reconfigure which card is enabled and how they're used in the Network section under Interfaces.
    2. I would make sure that the speed is not related to your WiFi and it really depends on your hardware. Crappy hard drives will be crappy, etc.
    3. Linux does not support HFS+ by default. You'll need to do some pretty exciting hackery to get it working http://askubuntu.com/questions…untu-without-access-to-os. I don't know if it'll work with OMV's GUI though.
    4. Are you running OMV in a VM? A VM in OMV? I tend to run VMs bridged so they appear as machines on the LAN rather than having to deal with individual port forwarding on the host.

    So, you would need to set your permissions on the server. The fun thing about NFS is that it doesn't really do any ID mapping by default. So the UID your user(s) have on your NAS have to match the UID your user(s) have on your laptop. I'm not sure if there's a way to perform UID mapping with NFS. In addition, NFS does not do any kind of encryption or server authorization by default so it's pretty trivial for someone to connect to the NAS as your user and see your files simply by having a machine on the network that has a user with the same UID as the one on your NAS. If you don't have "root_squash" on, it gets even worse.


    If you're running Ubuntu, I'd recommend using SSHFS instead. You should just be able to use the "Connect to Server" menu item and type "ssh://${username}@192.168.10.27". If you want to mount it like you are now, look into https://help.ubuntu.com/community/SSHFS. I typically use NFS for server to server communication only, and even then, with Kerberos.

    So what is the status of the raid (cat /proc/mdstat)? Does it list a raid? If it does, you can try to assemble it first, then delete it from the web GUI. If you want to just destroy it, you can do that by wiping the first few sectors of the drive. The first trick is to get OMV's web GUI to not see it as part of the raid and I would imagine that depends on what /proc/mdstat says. You can also `grep md127 /etc/openmedivault/config.xml` to see what OpenMediaVault is configured with.

    I'm not sure what's causing your bond0 to show up. It's possible that for there to be a bond1 there must be a bond0, so it creates one for that reason? Perhaps try deleting bond1 first, reboot, and then see what you get?

    run "grep -R bond /etc" and see what shows up in there. Here's what I get:


    Right, what did you to create bond0? I don't know if I can help you disable it unless I know how it's enabling in the first place. Linux boots with all network interfaces disabled and no bonding interfaces. Then, something, a script or a tool, turns things on a sets things up. There are a lot of ways that could be happening so I need to know how it started in the first place.


    /etc/sysconfig is, I believe, a Red Hat way of configuring networking and Debian (upon which OMV is based) doesn't do that. My system doesn't have an /etc/sysconfig at all. My guess is that you followed some instructions designed for Red Hat and that's what's causing the confusion.

    The torrent daemon runs as the "debian-transmission" user. That user will need to have access to whatever directory he's trying to download to. However, when it creates files, it'll create them owned by it. I would recommend using FACLs to set this up. Let's pretend you want these files to go into "/data/torrent/downloads". I would put your friend's user into some group, I'll call it "Torrenters" and then do:


    chown -R nobody:Torrenters /data/torrent/downloads
    chmod -R u+rwX,g+rwX,o-rwX /data/torrent/downloads
    setfacl -R -m u:debian-transmission:rwX /data/torrent/downloads
    setfacl -R -m d:u:debian-transmission:rwX /data/torrent/downloads
    setfacl -R -m d:g:Torrenters:rwX /data/torrent/downloads


    What this does is the following:
    - Set the ownership of the download directory to be owned by no user and the Torrenters group
    - Set the directory to be readable (r), writable (w), and executable (X) by the owner user and groups and no one else.
    - Add a File Access Control entry that gives the user (u) debian-transmission read, write, and execute on that directory.
    - Add a File Access Control entry that will default (d) to giving the user (u) debian-transmission read (r), write (w), and execute (X) on any new files or directories created in that directory.
    - Add a File Access Control entry that will default (d) to giving the group (g) Torrenters read (r), write (w), and execute (x) on any new files and directories created in that directory.


    Note that "-R" makes it recursive, so all of the contents will receive these settings and using a capitol X instead of a lowercase x means that only those files that are already executable will be granted these new executable permissions (including directories). This is a useful way of setting execute only on those files where it's necessary. So with the default ACLs, if you create a new regular file or you torrent a regular file, it will not be executable by anyone. As soon as you "chmod +x" it, it should be executable by everyone with the proper default ACL.

    Are you rebooting the system? Because none of these commands are permanent. You need to change the OpenMediaVault config and/or /etc/network/interfaces.

    Indeed I'm terrified of losing the hardware controller and thus losing the RAID because it's stored in the thing's BIOS or something. Or those fake hardware RAID controllers, or weird Linux driver incompatibilities. Machines these days are fast enough to do RAID in software quite well, especially if you do something like ZFS.

    According to `lsusb`:



    However, you might be right that the BIOS runs the USB device at 1.0 and it only flips it to 2.0 once the kernel boots. That might make sense.