Hopefully this ever arrives before I have died: [Wayback/Archive] Support – ThinkMods
Mod Setup Guide Manual Schematic ExpressCard to NVMe (TM-E2M-V1) [Wayback]
Via [Wayback/Archive] ThinkMods: ExpressCard NVMe Adapter | Indiegogo.
Posted by jpluimers on 2023/06/30
Hopefully this ever arrives before I have died: [Wayback/Archive] Support – ThinkMods
Mod Setup Guide Manual Schematic ExpressCard to NVMe (TM-E2M-V1) [Wayback]
Via [Wayback/Archive] ThinkMods: ExpressCard NVMe Adapter | Indiegogo.
Posted in Hardware, LifeHacker, Power User, ThinkPad | Leave a Comment »
Posted by jpluimers on 2023/06/26
[Wayback] 150629 UM IM SM Tzerra M NL.pdf – Remeha
Installatie-, gebruikers- en servicehandleiding Condenserende gaswandketels Tzerra M 15s Plus – 24/28c Plus – 25s Plus – 35s Plus – 35/40c Plus
–jeroen
Posted in Hardware, LifeHacker, Power User | Leave a Comment »
Posted by jpluimers on 2023/05/28
I would really like to try out a system based on the interesting [Wayback/Archive] ASRock Rack ALTRAD8U-1L2T is a mATX Motherboard for up to 128 Cores specs from the PDF and ServeTheHome images below:
ASRock AMPERE ALTRADBU-1L2T Product ASRock Rack Ampere Altra Family deep microATX motherboard Power source Supports ATX PSU or 12V DC-in Form Factor Deep Micro-ATX (9.6″ x 10.5″) Processor System CPU
Chipset1 Socket (LGA-4926) Ampere® Altra®/Altra® Max processor
System on chipMemory Capacity 8 DDR4 288-pin DIMM Slots (1DPC); Supports:
RDIMM up to 256GB each, max. 3200MHz.
LRDIMM up to 256GB each, max. 3200MHzExpansion PCIe slots Others
SLOT7: PCIe4 x16
SLOT6: PCIe4 x16
SLOT5: PCIe4 x16
SLOT4: PCIe4 x16
4 SlimSAS (PCIe4 x8)
2 OCuLink (PCIe4 x4)Storage M.2
SATA port2 M.2 M-key (PCIe4 x4), supports 2280 form factor
N/ANetwork RJ45 2 RJ45 (10GbE) by Intel® X550
1 RJ45 (1GbE) by Intel® i210Management BMC
Dedicated IPMIASPEED AST2500: IPMI 2.0
1 RJ45 via Realtek RTL8211EI/O USB
COM port6 USB3.2 Gen1 ports: 4 rear Type-A, 2 via 19-pin header
1 (9-pin) headerDisplay Video 1 DB15 (VGA), 1 (15-pin) header Security TPM Supports 13-pin (SPI) TPM modules
Posted in AArch64/arm64, ARM, Assembly Language, Development, Hardware, Power User, Software Development | Leave a Comment »
Posted by jpluimers on 2023/05/22
From [Wayback/Archive] De Leukste Wifinaam van 2021 | NPO Radio 2:
- It hurts when IP
- Modem Talking
- Boogie WonderLAN
- AIVD afluisterplantenbak
- WiFinal Countdown
- Ichbinwifidu
- Michiel de Router
- Ziggo Stardust
- Drop it like it’s hotspot
- Draadlozing
- WhyTellMeFi
- Lekker Wifi
- Wifi Soerjadi
- Jodelawifi
My related blog posts:
–jeroen
Posted in Conventions, Development, Fun, Naming Conventions, Network-and-equipment, Power User, Software Development, WiFi | Leave a Comment »
Posted by jpluimers on 2023/05/01
I’ve had a JVC RX-7020V Audio Video Control Receiver/Amplifier for quite a while, but forgot to post links, so here they are:
Posted in Hardware, Home Audio/Video, JVC, Power User | Leave a Comment »
Posted by jpluimers on 2023/04/24
It was great while it lasted, so be sure to order within the next 12 months as [Wayback/Archive] PC Engines apu platform EOL:
PC Engines apu platform EOL The end is near ! After a long production run, AMD will accept last orders for the SOC used in our apu2/3/4/5/6 boards by end of June 2023. apu phase-out We will do a life-time buy for a quantity of the AMD SOC and some other key components. We are willing to schedule customer shipments through end of June 2024. There is a 26 week lead time on the AMD SOC, expect limited supply until late 2023. First ordered, first served. Binding orders may be required for large quantities.New products ? Despite having used considerable quantities of AMD processors and Intel NICs, we don’t get adequate design support for new projects. In addition, the x86 silicon currently offered is not very appealing for our niche of passively cooled boards. After about 20 years of WRAP, ALIX and APU, it is time for me to move on to different things. Thank you ! I would like to thank all of our customers for their business, and sometimes patience.
–jeroen
Posted in APU, Hardware, Network-and-equipment, pfSense, Power User, routers | Leave a Comment »
Posted by jpluimers on 2023/04/14
Some notes, as in 2021, I started to see a lot of LED lights (often even LED string lights) being able to automatically do 6 hour on and 18 hour off in a 24 hour cycle to conserve battery usage and improve convenience.
Below are some links, as I might want to create such a circuit myself, maybe even with some solar charging. I’m especially interested to power these off 18650 Li-Ion batteries of which I wrote before (especially as you can easily salvage them from laptop or even e-bike battery packs).
Links via [Wayback/Archive] chip timer 6 hour per 24 hours – Google Search and [Wayback/Archive] microcontroller 6 hour on 18 off timer – Google Search:
–jeroen
Posted in 18650, Batteries, Hardware, Li-Ion, LifeHacker, Power User | Leave a Comment »
Posted by jpluimers on 2023/04/13
MikroTik switches and routers are very flexible to configure, as everything is done through [Wayback/Archive] RouterOS settings.
This means that given enough ports, you can split a physical switch into logical switches. This can be very convenient when you run multiple networks without VLAN.
Earlier this week, I already wrote about Torching a specific port on a MikroTik switch or router running RouterOS which involved turning off hardware acceleration off for specific ports in order to have the flow through the underlying switch chip prohibiting torch and filter features.
For splitting noticing which ports are connected to which switch chip is also important: splitting works best if you can configure each logical switch to exclusively use network ports on one switch chip.
This post was to both research how to configure this, and if my MikroTik devices would allow for hardware acelleration.
Here are some links that should help me with configuring (via [Wayback/Archive] mikrotik split switch in two – Google Search):
–jeroen
Posted in Development, Hardware, MikroTik, Network-and-equipment, Power User, RouterOS, routers, Scripting, Software Development | Leave a Comment »
Posted by jpluimers on 2023/04/11
On most recent [Wayback/Archive] RouterOS configurations of MikroTik Routers and Switches, running [Wayback/Archive] Torch a port will show zero traffic when they are part of a bridge configuration. The same holds for the Packet Sniffer.
The reason is that these bridges have hardware acceleration turned on, which makes all traffic go through the switch chip instead of the device CPU. Torch works on the CPU level, so won’t show hardly any traffic except for some configuration stuff (depending on the combination of switch chip and CPU type).
This is not documented in the Torch documentation, but it is documented in the Packet Sniffer documentation.
Further reading:
Note: Unicast traffic between Wireless clients with client-to-client forwarding enabled will not be visible to sniffer tool. Packets that are processed with hardware offloading enabled bridge will also not be visible (unknown unicast, broadcast and some multicast traffic will be visible to sniffer tool).
As the ethernet ports are marked as S(laves) in the tables, I would assume that they are member ports of bridges and “hardware acceleration” is enabled (the value of hw in the respective rows of /interface bridge port is set to yes). So any frames which pass through these ports to other ports of the same switch chip are counted by the switch chip counters, but as they never get to the CPU, the torch cannot see them.
Consider the following scenario, you setup a bridge and have enabled hardware offloading in order to maximize the throughput for your device, as a result your device is working as a switch, but you want to use Sniffer or Torch tools for debugging purposes, or maybe you want to implement packet logging.
/interface bridge add name=bridge1 /interface bridge port add bridge=bridge1 hw=yes interface=ether1 learn=yes add bridge=bridge1 hw=yes interface=ether2 learn=yes
When running Sniffer or Torch tool to capture packets you might notice that barely any packets are visible, only some unicast packets, but mostly broadcast/multicast packets are captured, while the interfaces report that much larger traffic is flowing through certain interfaces than the traffic that was captured. Since RouterOS v6.41 if you add two or more Ethernet interfaces to a bridge and enable Hardware Offloading, then the switch chip will be used to forward packets between ports. To understand why only some packets are captured, we must first examine how the switch chip is interconnected with the CPU, in this example we can use a block diagram from a generic 5-Port Ethernet router:Generic Ethernet router
For this device each Ethernet port is connected to the switch chip and the switch chip is connected to the CPU using the CPU port (sometimes called the switch-cpu port). For packets to be visible in Sniffer tools, the packet must be sent from an Ethernet port to the CPU port, this means that the packet must be destined to the CPU port (destination MAC address of the packet matches the bridge’s MAC address) or the packet’s MAC address has not be learnt (packet is flooded to all ports), this behavior is because of MAC learning·The switch chip keeps a list of MAC addresses and ports called the Hosts table· Whenever a packet needs to be forwarded, the switch chip checks the packet’s destination MAC address against the hosts table to find which port should it use to forward the packet. If the switch chip cannot find the destination MAC address, then the packet is flooded to all ports (including the CPU port). In situations where packet is supposed to be forwarded from, for example, ether1 to ether2 and the MAC address for the device behind ether2 is in the hosts table, then the packet is never sent to the CPU and therefore will not be visible to Sniffer or Torch tool..
Packets with a destination MAC address that has been learned will not be sent to the CPU since the packets are not not being flooded to all ports. If you do need to send certain packets to the CPU for packet analyser or for Firewall, then it is possible to copy or redirect the packet to the CPU by using ACL rules. Below is an example how to send a copy of packets that are meant for
4C:5E:0C:4D:12:4B:/interface ethernet switch ruleadd copy-to-cpu=yes dst-mac-address=4C:5E:0C:4D:12:4B/FF:FF:FF:FF:FF:FF ports=ether1 switch=switch1Note: If the packet is sent to the CPU, then the packet must be processed by the CPU, this increases the CPU load.
The following script is used to associate IP address of directly connected stations to physical port of the switch.
Warning: Running this script will make the CPU go to 100% for about 30-40 seconds, so please run the script when needed or by using scheduler.
–jeroen
Posted in Development, Hardware, MikroTik, Power User, RouterOS, routers, Scripting, Software Development | 1 Comment »
Posted by jpluimers on 2023/04/07
A while after I got a new smartphone, I noticed that when my MacBook was connected over Wi-Fi to the mobile hotspot of my Android phone, the Tunnelblick connections over OpenVPN to my family members would not work. A telnet from the Android phone to the OpenVPN TCP port 1194 woud succeed, but not from the MacBook. Connecting from the phone using JuiceSSH to the OpenSSH endpoints at those family members would work too, so I was a bit flabbergasted.
In the end this seems to be a set of coincidences that fails in this particular setup, but I am not totally aware why.
The solution was to both re-configure the APN (Access Point Name) the smartphone uses to connect to the internet from ipv4/ipv6 to ipv4, and to reboot the phone.
For Dutch provider KPN Mobile, the APN is named internet and apparently changed default to ipv4/ipv6 without properly supporting ipv4. Note the configuration parameters are all lowercase, although they should be written IPv4 and IPv6.
Here are a few posts that got me on the right track (all via [Wayback/Archive] openvpn fails over android hotspot – Google Search):
Solved me, I had to change APN setting from IPv6 to IPv4.
Probleem gevonden…. APN van KPN staat op ipv4/ipv6Ik krijg dus alleen een ipv6 ip nummer, dat verbindt geen ipv4 vpn server.APN van KPN veranderd in ipv4 en hij doet het weer
Dit is eenvoud op te lossen door je Android in te stellen op IPv4 only. Standaard staat dit op IPv4/IPv6 en kiest je telefoon automatisch IPv6.
Note that sometimes the MTU can cause similar failures:
For posterity, would like to post that the error was on account of incorrect MTU size setting on the TCP packet in the router. The size was set to 1452 bytes instead of 1492 bytes. Because of that the SSL/TLS packet was fragmented and the server ACK was not received. On changing the MTU size, everything works perfectly!
Note too: some links to check for OpenVPN responding are below.
Various sites with (often different) APNs that KPN mobile supports:
advancedinternet APN without mentioning the firewall you need)There are quite a few APNs, some with firewall and/or proxy and/or compression, some with external IP address (which means your smartphone really needs a firewall).
–jeroen
Posted in Android Devices, Hardware, Network-and-equipment, OpenVPN, Power User, VPN | Leave a Comment »