Re: Test: USB to Ethernet 10Gbit (bazmek) + 10gbit PCI-E síťovka
Napsal: sob 30. srp 2025, 00:01
Jestli se ten Realtek 8157 (Cablematters) nějak zahřívá? Při 1gbit téměř vůbec. Zkoušel jsem 5gbit, 2,5gbit, ani jedno nejde. Čekám na kabel. Doufám, že mi bude stačit UTP CAT6 na 5gbit, je to tak? Oproti tomu má CAT7 S/FTP stínění, to bude tloušťka. Délka kabelů jednotky metrů, 10m, maximálně třeba jeden kus 20m. Aktuálně používám 10m CAT 5E.
Škoda že nemám jak změřit ten bazmek, ale možná vyhrabu nějaký průchozí (aliexpress) měřák napětí+proud pro usb-a, ale pochybuju že skrz něj půjde usb 3.1.
Na tomhle jsem zatím skončil, nedaří se mi nikde sehnat ty linux-headers (kernel-headers), i kdybych je měl stáhnout manuálně pomocí wget. Bez nich nejde DKMS ovladač, ani od Realteku. Problém je, že, repository, odkud by se to mělo stáhnout.. zkouším různě ty první dva mirrory, pak ty 4 další (ale zkusil jsem i debian 9 mirror).
Vyhazuje to chyby ohledně klíčů
Zkoušel jsem podle návodu nainstalovat keyring ("dpkg -i freexian-archive-keyring_2022.06.08_all.deb","dpkg -i debian-archive-keyring_2023.4_all.deb"), následně
"apt-get install debian-keyring debian-archive-keyring", potom importovat klíče... etc.. ne tyhle 2 nebo 4 klíče se mi nedaří přidat. Zkoušel jsem
apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 9D6D8F6BC857C906 AA8E81B4331F7F50 8B48AD6246925553 7638D0442B90D010
sudo gpg --homedir /tmp --no-default-keyring --keyring /usr/share/keyrings/R.gpg --keyserver keyserver.ubuntu.com --recv-keys 9D6D8F6BC857C906 AA8E81B4331F7F50 8B48AD6246925553 7638D0442B90D010
obojí zdánlivě proběhně.. tedy importy klíčů, dám apt update a pořád stejná chyba
klíče (tam jsou)
(apt-get -y install linux-headers-$(uname -r))
Škoda že nemám jak změřit ten bazmek, ale možná vyhrabu nějaký průchozí (aliexpress) měřák napětí+proud pro usb-a, ale pochybuju že skrz něj půjde usb 3.1.
Kód: Vybrat vše
apt-get -y install linux-headers-$(uname -r)
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Unable to locate package linux-headers-4.4.218.x86_64.1
E: Couldn't find any package by glob 'linux-headers-4.4.218.x86_64.1'
E: Couldn't find any package by regex 'linux-headers-4.4.218.x86_64.1'
Kód: Vybrat vše
#deb https://apt.readynas.com/packages/readynasos 6.10.9 updates apps main
# deb http://mirrors.kernel.org/debian jessie main
# deb http://security.debian.org/ jessie/updates main
#deb [trusted=yes] http://archive.kernel.org/debian-archive/debian jessie main
#deb [trusted=yes] http://archive.kernel.org/debian-archive/debian jessie-backports main
#deb [trusted=yes] http://archive.debian.org/debian-security jessie/updates main
#deb [trusted=yes] http://deb.freexian.com/extended-lts jessie main contrib non-free
# Debian 9 (stretch) archived main sources
#deb http://archive.debian.org/debian stretch main contrib non-free
#deb-src http://archive.debian.org/debian stretch main contrib non-free
# Stretch proposed updates (was still active at end-of-life)
#deb http://archive.debian.org/debian stretch-proposed-updates main contrib non-free
#deb-src http://archive.debian.org/debian stretch-proposed-updates main contrib non-free
# Stretch backports sloppy (last used after regular backports were frozen)
#deb http://archive.debian.org/debian stretch-backports-sloppy main contrib non-free
#deb-src http://archive.debian.org/debian stretch-backports-sloppy main contrib non-free
# Stretch security updates (signed and archived)
#deb http://archive.debian.org/debian-security stretch/updates main contrib non-free
#deb-src http://archive.debian.org/debian-security stretch/updates main contrib non-free
Kód: Vybrat vše
Get:14 http://archive.kernel.org/debian-archive/debian jessie/main amd64 Packages [6,818 kB]
Reading package lists... Done
W: GPG error: http://archive.debian.org/debian-security jessie/updates InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 9D6D8F6BC857C906 NO_PUBKEY AA8E81B4331F7F50
E: Failed to fetch https://apt.readynas.com/packages/readynasos/dists/6.10.9/InRelease 403 Forbidden [IP: 65.9.95.126 443]
E: The repository 'https://apt.readynas.com/packages/readynasos 6.10.9 InRelease' is not signed.
N: Updating from such a repository can't be done securely, and is therefore disabled by default.
N: See apt-secure(8) manpage for repository creation and user configuration details.
W: GPG error: http://archive.kernel.org/debian-archive/debian jessie-backports InRelease: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 8B48AD6246925553 NO_PUBKEY 7638D0442B90D010
W: GPG error: http://archive.kernel.org/debian-archive/debian jessie Release: The following signatures couldn't be verified because the public key is not available: NO_PUBKEY 8B48AD6246925553
"apt-get install debian-keyring debian-archive-keyring", potom importovat klíče... etc.. ne tyhle 2 nebo 4 klíče se mi nedaří přidat. Zkoušel jsem
apt-key adv --keyserver keyserver.ubuntu.com --recv-keys 9D6D8F6BC857C906 AA8E81B4331F7F50 8B48AD6246925553 7638D0442B90D010
sudo gpg --homedir /tmp --no-default-keyring --keyring /usr/share/keyrings/R.gpg --keyserver keyserver.ubuntu.com --recv-keys 9D6D8F6BC857C906 AA8E81B4331F7F50 8B48AD6246925553 7638D0442B90D010
obojí zdánlivě proběhně.. tedy importy klíčů, dám apt update a pořád stejná chyba
klíče (tam jsou)
Kód: Vybrat vše
/etc/apt/trusted.gpg
--------------------
pub 2048R/D553259A 2011-11-07
Key fingerprint = 3FBF 3EDE 529F 0CC6 9E4A 5539 B7F0 2108 D553 259A
uid RAIDiator Release Key <admin@readynas.com>
sub 2048R/49CC3A8D 2011-11-07
pub 2048R/FC1E91BC 2019-11-01
Key fingerprint = 8537 634F 316C F987 0FA7 E460 4ADF F040 FC1E 91BC
uid Egnyte Hybrid Services <support@egnyte.com>
sub 2048R/0388F2FA 2019-11-01
/etc/apt/trusted.gpg.d/app-pihole.gpg
-------------------------------------
pub 4096R/E52FD71E 2018-05-03
Key fingerprint = 9E33 47DC 587B 518F 57E2 6A9F 8114 1B44 E52F D71E
uid ReadyNAS Xtras <xtras@rnxtras.com>
sub 4096R/4C0C1D0C 2018-05-03
sub 4096R/F0B16ADC 2018-05-03
/etc/apt/trusted.gpg.d/debian-archive-bookworm-automatic.asc
------------------------------------------------------------
pub 4096R/350947F8 2023-01-21 [expires: 2031-01-19]
Key fingerprint = B8B8 0B5B 623E AB6A D877 5C45 B7C5 D7D6 3509 47F8
uid Debian Archive Automatic Signing Key (12/bookworm) <ftpmaster@debian.org>
sub 4096R/2643E131 2023-01-21 [expires: 2031-01-19]
/etc/apt/trusted.gpg.d/debian-archive-bookworm-security-automatic.asc
---------------------------------------------------------------------
pub 4096R/AEC0A8F0 2023-01-21 [expires: 2031-01-19]
Key fingerprint = 05AB 9034 0C0C 5E79 7F44 A8C8 254C F3B5 AEC0 A8F0
uid Debian Security Archive Automatic Signing Key (12/bookworm) <ftpmaster@debian.org>
sub 4096R/216EC7A8 2023-01-21 [expires: 2031-01-19]
/etc/apt/trusted.gpg.d/debian-archive-bookworm-stable.asc
---------------------------------------------------------
pub 0C/8783D481 2023-01-23
Key fingerprint = 4D64 FEC1 19C2 0290 67D6 E791 F8D2 585B 8783 D481
uid Debian Stable Release Key (12/bookworm) <debian-release@lists.debian.org>
/etc/apt/trusted.gpg.d/debian-archive-bullseye-automatic.asc
------------------------------------------------------------
pub 4096R/8DD47936 2021-01-17 [expires: 2029-01-15]
Key fingerprint = 1F89 983E 0081 FDE0 18F3 CC96 73A4 F27B 8DD4 7936
uid Debian Archive Automatic Signing Key (11/bullseye) <ftpmaster@debian.org>
sub 4096R/386FA1D9 2021-01-17 [expires: 2029-01-15]
/etc/apt/trusted.gpg.d/debian-archive-bullseye-security-automatic.asc
---------------------------------------------------------------------
pub 4096R/4AAD5C5D 2021-01-17 [expires: 2029-01-15]
Key fingerprint = AC53 0D52 0F2F 3269 F5E9 8313 A484 4904 4AAD 5C5D
uid Debian Security Archive Automatic Signing Key (11/bullseye) <ftpmaster@debian.org>
sub 4096R/BBB6E853 2021-01-17 [expires: 2029-01-15]
/etc/apt/trusted.gpg.d/debian-archive-bullseye-stable.asc
---------------------------------------------------------
pub 4096R/0D6C9793 2021-02-13 [expires: 2029-02-11]
Key fingerprint = A428 5295 FC7B 1A81 6000 62A9 605C 66F0 0D6C 9793
uid Debian Stable Release Key (11/bullseye) <debian-release@lists.debian.org>
/etc/apt/trusted.gpg.d/debian-archive-buster-automatic.asc
----------------------------------------------------------
pub 4096R/3CBBABEE 2019-04-14 [expires: 2027-04-12]
Key fingerprint = 80D1 5823 B7FD 1561 F9F7 BCDD DC30 D7C2 3CBB ABEE
uid Debian Archive Automatic Signing Key (10/buster) <ftpmaster@debian.org>
sub 4096R/22F3D138 2019-04-14 [expires: 2027-04-12]
/etc/apt/trusted.gpg.d/debian-archive-buster-security-automatic.asc
-------------------------------------------------------------------
pub 4096R/CAA96DFA 2019-04-14 [expires: 2027-04-12]
Key fingerprint = 5E61 B217 265D A980 7A23 C5FF 4DFA B270 CAA9 6DFA
uid Debian Security Archive Automatic Signing Key (10/buster) <ftpmaster@debian.org>
sub 4096R/E562B32A 2019-04-14 [expires: 2027-04-12]
/etc/apt/trusted.gpg.d/debian-archive-buster-stable.asc
-------------------------------------------------------
pub 4096R/77E11517 2019-02-05 [expires: 2027-02-03]
Key fingerprint = 6D33 866E DD8F FA41 C014 3AED DCC9 EFBF 77E1 1517
uid Debian Stable Release Key (10/buster) <debian-release@lists.debian.org>
/etc/apt/trusted.gpg.d/freexian-archive-extended-lts.gpg
--------------------------------------------------------
pub 4096R/69055D5A 2018-05-28 [expires: 2027-12-05]
Key fingerprint = AB59 7C4F 6F33 80BD 4B2B EBC2 A073 10D3 6905 5D5A
uid Extended LTS Repository <sysadmin@freexian.com>
/etc/apt/trusted.gpg.d/freexian-archive-php.gpg
-----------------------------------------------
pub 4096R/05636A88 2020-08-14 [expires: 2027-12-06]
Key fingerprint = 1357 09AE 1EB2 77A4 6E71 5726 20DC 56A1 0563 6A88
uid PHP LTS <php-support@freexian.com>


