LINUX.ORG.RU

История изменений

Исправление CYB3R, (текущая версия) :

Зашёл по ssh, чтобы посмотреть iptables. И тут случилась настоящая магия:

$ > ssh 192.168.1.101
ssh: connect to host 192.168.1.101 port 22: No route to host

$ > nmap -Pn 192.168.1.101

Starting Nmap 6.01 ( http://nmap.org ) at 2012-11-14 14:42 MSK
Nmap scan report for brobuntu (192.168.1.101)
Host is up (0.011s latency).
Not shown: 989 closed ports
PORT     STATE    SERVICE
21/tcp   filtered ftp
22/tcp   open     ssh
23/tcp   filtered telnet
53/tcp   filtered domain
111/tcp  filtered rpcbind
135/tcp  filtered msrpc
139/tcp  filtered netbios-ssn
256/tcp  filtered fw1-secureremote
587/tcp  filtered submission
995/tcp  filtered pop3s
1723/tcp filtered pptp

Nmap done: 1 IP address (1 host up) scanned in 3.64 seconds

$ > ssh 192.168.1.101
golovin@192.168.1.101's password: 
Welcome to Ubuntu 12.04.1 LTS (GNU/Linux 3.2.0-32-generic x86_64)

 * Documentation:  https://help.ubuntu.com/

Last login: Wed Nov 14 14:02:13 2012
golovin@brobuntu:~$ exit
выход
Connection to 192.168.1.101 closed.

$ > nmap 192.168.1.101

Starting Nmap 6.01 ( http://nmap.org ) at 2012-11-14 14:43 MSK
Nmap scan report for brobuntu (192.168.1.101)
Host is up (0.022s latency).
Not shown: 999 closed ports
PORT   STATE SERVICE
22/tcp open  ssh

Nmap done: 1 IP address (1 host up) scanned in 0.63 seconds
Насколько я помню, iptables на этой машине вообще не трогал. Команда ничего не выдаёт:
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         

Исходная версия CYB3R, :

Зашёл по ssh, чтобы посмотреть iptables. И тут случилась настоящая магия:

$ > ssh 192.168.1.101
ssh: connect to host 192.168.1.101 port 22: No route to host
$ > nmap -Pn 192.168.1.101

Starting Nmap 6.01 ( http://nmap.org ) at 2012-11-14 14:42 MSK
Nmap scan report for brobuntu (192.168.1.101)
Host is up (0.011s latency).
Not shown: 989 closed ports
PORT     STATE    SERVICE
21/tcp   filtered ftp
22/tcp   open     ssh
23/tcp   filtered telnet
53/tcp   filtered domain
111/tcp  filtered rpcbind
135/tcp  filtered msrpc
139/tcp  filtered netbios-ssn
256/tcp  filtered fw1-secureremote
587/tcp  filtered submission
995/tcp  filtered pop3s
1723/tcp filtered pptp

Nmap done: 1 IP address (1 host up) scanned in 3.64 seconds
$ > ssh 192.168.1.101
golovin@192.168.1.101's password: 
Welcome to Ubuntu 12.04.1 LTS (GNU/Linux 3.2.0-32-generic x86_64)

 * Documentation:  https://help.ubuntu.com/

Last login: Wed Nov 14 14:02:13 2012
golovin@brobuntu:~$ exit
выход
Connection to 192.168.1.101 closed.
$ > nmap 192.168.1.101

Starting Nmap 6.01 ( http://nmap.org ) at 2012-11-14 14:43 MSK
Nmap scan report for brobuntu (192.168.1.101)
Host is up (0.022s latency).
Not shown: 999 closed ports
PORT   STATE SERVICE
22/tcp open  ssh

Nmap done: 1 IP address (1 host up) scanned in 0.63 seconds
Насколько я помню, iptables на этой машине вообще не трогал. Команда ничего не выдаёт:
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination