I installed LMCE-1404-20151124002031655-i386 on Nov 27, 2015 using what used to be a standard install- dual nics, nvidia graphics. Sarah loaded, my SqueezeBox was found and installed correctly- that's all I tested that worked.
What didn't work is ssh or remote access of the web admin pages. I opened the web admin pages from the core and opened the "outside access" page from the left hand menu. Enabling remote access on ports 80, 8080 and ssh on 22 did not allow me to remotely access the core. I manually added rules using the advanced pages- both as a core input and as NAT preforwarding to both 192.168.80.1 and 127.0.0.1, but no success. I did the rules separately, so the different rule types separately, so there was no overlap of firewall commands. Only disabling the firewall (IPv4 only, btw, I did not test IPv6) allowed me access- even then, no ssh.
If it matters, I also tried sshing out of the core and was not able to do that either. Doing some generic searching led me to looking at the installed keys ("ssh-add -l") and these possible solutions:
http://stackoverflow.com/questions/17846529/could-not-open-a-connection-to-your-authentication-agentAs for me, I'm dumping 14.04 and changing to 12.04.
Edit: Same applies to 12.04. I am able to access the web admin pages remotely only after disabling the firewall. I am not able to ssh into the box from either externally or internally (x.x.80.x address) without or without the firewall enabled.
I mean this with any implied criticism or sarcasm- there seem to be very few of us with firewall issues. Is that from most using older versions or am I doing something fairly unique with the firewall? That is, do most rely on another device (router, etc ) for the firewall, or do you not do any port forwarding/ssh at the core? I ask because if there is a better (read: more mainstream) approach, I'm more than happy to change.
iptables -nvL:
Chain INPUT (policy DROP 4 packets, 160 bytes)
pkts bytes target prot opt in out source destination
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x3F/0x29
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x3F/0x3F
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x3F/0x00
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x06/0x06
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x03/0x03
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x11/0x01
0 0 DROP tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcpflags: 0x3F/0x37
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 mark match 0x1
1978 425K ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 /* Allow_Loopback */
854 185K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED /* Allow_Established */
285 41433 ACCEPT udp -- eth1 * 0.0.0.0/0 0.0.0.0/0 /* Allow_DHCP */
1078 225K ACCEPT udp -- eth0 * 0.0.0.0/0 0.0.0.0/0 /* Allow_DHCP */
13 780 ACCEPT all -- eth1 * 192.168.80.0/24 0.0.0.0/0 /* Allow_Local_Network */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 127.0.0.1 tcp dpt:80 /* Remote_Access */
0 0 ACCEPT udp -- * * 0.0.0.0/0 127.0.0.1 udp dpt:80 /* Remote_Access */
0 0 ACCEPT tcp -- * * 0.0.0.0/0 127.0.0.1 tcp dpt:22 /* SSH */
0 0 ACCEPT udp -- * * 0.0.0.0/0 127.0.0.1 udp dpt:22 /* SSH */
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- lo lo 0.0.0.0/0 0.0.0.0/0 /* Allow_Loopback */
3757 1411K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED /* Allow_Established */
100 6032 ACCEPT all -- eth1 * 192.168.80.0/24 0.0.0.0/0 /* Allow_Local_Network */
Chain OUTPUT (policy ACCEPT 4825 packets, 708K bytes)
pkts bytes target prot opt in out source destination