Connecting into fc3

David Fletcher fm_maillists at ntlworld.com
Tue Dec 7 22:01:29 UTC 2004


On Saturday 27 Nov 2004 12:45 am, Alexander Dalloz wrote:
> Am Fr, den 26.11.2004 schrieb David Fletcher um 23:12:
> > I've got two machines here, one running RH9 and the other running FC3.
> >
> > I can use ssh or WebMin to connect to the RH9 machine from the FC3
> > machine. I use firestarter to open the required port. And I have CUPS
> > configured to print from the FC3 machine to the printer on the RH9
> > machine.
> >
> > But I cannot get a connection the other way around. Even when I try
> > switching the firewall off. And I know that WebMin is running on FC3
> > because I can log in using localhost. The only communication I have
> > achieved from the RH9 to the FC3 machine is ping. It just seems to be
> > completely ignore everything else.
> >
> > Dave Fletcher
>
> From RH9 run "nmap -vvv -sS FC3_host_IP" to see which ports say
> something.
> On the FC3 machine run "iptables -nvL" to see what your firewall setup
> says. With "netstat -tualpen" you can list services listening.
>
> Alexander

Alexander,

I've now done a little reading and hopefully a little learning about this, 
taken the advice of the RHCE who runs the server for us at work, and still it 
won't work! The only contact I can get to work with this machine is ping.

Here are the current listings from the nmap and iptables again:-

>From the RH9 machine:-
[root at boss root]# nmap -vvv -sS 192.168.2.100

Starting nmap V. 3.00 ( www.insecure.org/nmap/ )
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
Host james.18sn55fy (192.168.2.100) appears to be up ... good.
Initiating SYN Stealth Scan against james.18sn55fy (192.168.2.100)
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
Adding open port 111/tcp
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
Adding open port 22/tcp
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
Adding open port 1025/tcp
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => 
Operation not permitted
The SYN Stealth Scan took 6 seconds to scan 1601 ports.
Interesting ports on james.18sn55fy (192.168.2.100):
(The 1598 ports scanned but not shown below are in state: closed)
Port       State       Service
22/tcp     open        ssh
111/tcp    open        sunrpc
1025/tcp   open        NFS-or-IIS

Nmap run completed -- 1 IP address (1 host up) scanned in 6 seconds
[root at boss root]#



and from the FC3 machine:-
Chain INPUT (policy ACCEPT 32866 packets, 19M bytes)
 pkts bytes target     prot opt in     out     source               
destination         

Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
 pkts bytes target     prot opt in     out     source               
destination         

Chain OUTPUT (policy ACCEPT 31379 packets, 4813K bytes)
 pkts bytes target     prot opt in     out     source               
destination         


As you can see I've cleared out all the rules, and set the policies to ACCEPT. 
This machine web browses OK so the network interface is working, but still I 
can't get webmin on it to respond remotely. I've tried changing the listening 
address of webmin to 20000 which still worked locally but not through the LAN 
from this machine.

Any ideas about what else to try?

Thanks

Dave Fletcher




More information about the fedora-list mailing list