On Saturday 27 Nov 2004 12:45 am, Alexander Dalloz wrote: > Am Fr, den 26.11.2004 schrieb David Fletcher um 23:12: > > I've got two machines here, one running RH9 and the other running FC3. > > > > I can use ssh or WebMin to connect to the RH9 machine from the FC3 > > machine. I use firestarter to open the required port. And I have CUPS > > configured to print from the FC3 machine to the printer on the RH9 > > machine. > > > > But I cannot get a connection the other way around. Even when I try > > switching the firewall off. And I know that WebMin is running on FC3 > > because I can log in using localhost. The only communication I have > > achieved from the RH9 to the FC3 machine is ping. It just seems to be > > completely ignore everything else. > > > > Dave Fletcher > > From RH9 run "nmap -vvv -sS FC3_host_IP" to see which ports say > something. > On the FC3 machine run "iptables -nvL" to see what your firewall setup > says. With "netstat -tualpen" you can list services listening. > > Alexander Alexander, I've now done a little reading and hopefully a little learning about this, taken the advice of the RHCE who runs the server for us at work, and still it won't work! The only contact I can get to work with this machine is ping. Here are the current listings from the nmap and iptables again:- >From the RH9 machine:- [root@boss root]# nmap -vvv -sS 192.168.2.100 Starting nmap V. 3.00 ( www.insecure.org/nmap/ ) sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted Host james.18sn55fy (192.168.2.100) appears to be up ... good. Initiating SYN Stealth Scan against james.18sn55fy (192.168.2.100) sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted Adding open port 111/tcp sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted Adding open port 22/tcp sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted Adding open port 1025/tcp sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted sendto in send_tcp_raw: sendto(3, packet, 40, 0, 192.168.2.100, 16) => Operation not permitted The SYN Stealth Scan took 6 seconds to scan 1601 ports. Interesting ports on james.18sn55fy (192.168.2.100): (The 1598 ports scanned but not shown below are in state: closed) Port State Service 22/tcp open ssh 111/tcp open sunrpc 1025/tcp open NFS-or-IIS Nmap run completed -- 1 IP address (1 host up) scanned in 6 seconds [root@boss root]# and from the FC3 machine:- Chain INPUT (policy ACCEPT 32866 packets, 19M bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 31379 packets, 4813K bytes) pkts bytes target prot opt in out source destination As you can see I've cleared out all the rules, and set the policies to ACCEPT. This machine web browses OK so the network interface is working, but still I can't get webmin on it to respond remotely. I've tried changing the listening address of webmin to 20000 which still worked locally but not through the LAN from this machine. Any ideas about what else to try? Thanks Dave Fletcher