Hi!
This is a problem which I had since fc12.
My firewall settings doesn't seem to take.
I have successfully set up ssh on my laptop(Fedora 15 desktop edition), and I am able to ssh in to that computer from my workstation(Fedora 15 KDE). But it doesen't work the other way around.
Code:
#nmap [LAPTOP IP]
Host is up (0.017s latency).
Not shown: 998 closed ports
PORT STATE SERVICE
22/tcp open ssh
111/tcp open rpcbind
#nmap [WORKSTATION IP]
Host is up (0.0016s latency).
Not shown: 997 closed ports
PORT STATE SERVICE
23/tcp open telnet
80/tcp open http
9000/tcp open cslistener
#nmap localhost (on workstation)
Starting Nmap 5.50 ( http://nmap.org ) at 2011-09-23 00:15 CEST
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000012s latency).
rDNS record for 127.0.0.1: localhost.localdomain
Not shown: 996 closed ports
PORT STATE SERVICE
22/tcp open ssh
25/tcp open smtp
111/tcp open rpcbind
631/tcp open ipp
The strange thing is that the output from scanning the workstation is the same regardless of my firewall settings.
I tried:
- Disabling firewall settings
Disabling SELINUX
Stopping both iptables and ip6tables services
It doesent make a difference.
This is the status of iptables (With firewall enabled)
Quote:
Table: filter
Chain INPUT (policy ACCEPT)
num target prot opt source destination
1 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
2 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
3 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
4 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
5 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:21
6 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
7 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80
8 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:3483
9 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:3483
10 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:9000
11 ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:9000
12 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:9090
13 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:9092
14 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain FORWARD (policy ACCEPT)
num target prot opt source destination
1 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
2 ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
3 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
4 ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
5 REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
Chain OUTPUT (policy ACCEPT)
num target prot opt source destination
|
And this is ip6tables
Quote:
Table: filter
Chain INPUT (policy ACCEPT)
num target prot opt source destination
1 ACCEPT all ::/0 ::/0 state RELATED,ESTABLISHED
2 ACCEPT icmpv6 ::/0 ::/0
3 ACCEPT all ::/0 ::/0
4 ACCEPT all ::/0 ::/0
5 ACCEPT tcp ::/0 ::/0 state NEW tcp dpt:21
6 ACCEPT tcp ::/0 ::/0 state NEW tcp dpt:22
7 ACCEPT tcp ::/0 ::/0 state NEW tcp dpt:80
8 ACCEPT udp ::/0 ::/0 state NEW udp dpt:3483
9 ACCEPT tcp ::/0 ::/0 state NEW tcp dpt:3483
10 ACCEPT tcp ::/0 ::/0 state NEW tcp dpt:9000
11 ACCEPT udp ::/0 ::/0 state NEW udp dpt:9000
12 ACCEPT tcp ::/0 ::/0 state NEW tcp dpt:9090
13 ACCEPT tcp ::/0 ::/0 state NEW tcp dpt:9092
14 REJECT all ::/0 ::/0 reject-with icmp6-adm-prohibited
Chain FORWARD (policy ACCEPT)
num target prot opt source destination
1 ACCEPT all ::/0 ::/0 state RELATED,ESTABLISHED
2 ACCEPT icmpv6 ::/0 ::/0
3 ACCEPT all ::/0 ::/0
4 ACCEPT all ::/0 ::/0
5 REJECT all ::/0 ::/0 reject-with icmp6-adm-prohibited
Chain OUTPUT (policy ACCEPT)
num target prot opt source destination
|
Does this make sense to anyone?