Quote:
Originally Posted by MensaWater
What does iptables show for port 22 and/or ssh service? Most rules aren't set to "block" but rather to "allow" specific things. That is to say you wouldn't necessarily see your home IP blocked iptables but might instead see your tethered IP (or the range that contains it) as "allowed" meaning everything else would be "blocked".
Another possibility is that your ISP is blocking outbound port 22 from your home network. Can you do ssh to anywhere else from home network? If this is the case you could setup an alternate port (e.g. 20022) on sshd on the server then test from home.
|
The weird thing is that I'm able to log into SSH with my home IP if I restart my server and I log into it RIGHT after it boot ups. I have like a 60 sec grace period.
This is what I get with this command "iptables -L -n".
Chain INPUT (policy ACCEPT)
target prot opt source destination
cphulk all -- 0.0.0.0/0 0.0.0.0/0
cP-Firewall-1-INPUT all -- 0.0.0.0/0 0.0.0.0/0
acctboth all -- 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy ACCEPT)
target prot opt source destination
cP-Firewall-1-INPUT all -- 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
acctboth all -- 0.0.0.0/0 0.0.0.0/0
Chain acctboth (2 references)
target prot opt source destination
tcp -- 209.126.116.174 0.0.0.0/0 tcp dpt:80
tcp -- 0.0.0.0/0 209.126.116.174 tcp spt:80
tcp -- 209.126.116.174 0.0.0.0/0 tcp dpt:25
tcp -- 0.0.0.0/0 209.126.116.174 tcp spt:25
tcp -- 209.126.116.174 0.0.0.0/0 tcp dpt:110
tcp -- 0.0.0.0/0 209.126.116.174 tcp spt:110
icmp -- 209.126.116.174 0.0.0.0/0
icmp -- 0.0.0.0/0 209.126.116.174
tcp -- 209.126.116.174 0.0.0.0/0
tcp -- 0.0.0.0/0 209.126.116.174
udp -- 209.126.116.174 0.0.0.0/0
udp -- 0.0.0.0/0 209.126.116.174
all -- 209.126.116.174 0.0.0.0/0
all -- 0.0.0.0/0 209.126.116.174
all -- 0.0.0.0/0 0.0.0.0/0
Chain cP-Firewall-1-INPUT (2 references)
target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:993
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2082
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2078
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:53
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:21
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:443
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2077
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:26
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8080
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:143
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:995
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:110
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:25
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2086
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2087
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2095
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:465
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2096
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:3306
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2083
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:53
Chain cphulk (1 references)
target prot opt source destination
DROP all -- 182.100.67.114 0.0.0.0/0 state NEW TIME until date 2015-06-16 20:34:03 UTC