On 0, Holger Rauch <[EMAIL PROTECTED]> wrote: [snip] > So I did a "netstat -avi | grep 443" but that yielded nothing. So there is > no program that opened a socket on port 443 as the apache-ssl logs > suggest.
You seem to have made a couple of silly mistakes here.
netstat's -i switch is documented as 'display interface table' which
is not what you are trying to do. On my system:
# netstat -avi
Kernel Interface table
Iface MTU Met RX-OK RX-ERR RX-DRP RX-OVR TX-OK TX-ERR TX-DRP TX-OVR Flg
eth0 1500 022448895 0 0 0 2519734 0 0 0 BMRU
lo 16436 0 711339 0 0 0 711339 0 0 0 LRU
which is not what you are trying to grep. What you were trying to do
is this:
# netstat -a | grep 443
which also would not have worked, since you probably have 443 mapped
to https in /etc/services. So what you really wanted was this:
# netstat -a | grep https
tcp 0 0 *:https *:* LISTEN
is that what you were looking for? Even more likely what you wanted
was this:
# lsof -i | grep https
apache-ss 444 root 16u IPv4 220292 TCP *:https (LISTEN)
apache-ss 30808 root 16u IPv4 220292 TCP *:https (LISTEN)
apache-ss 30809 root 16u IPv4 220292 TCP *:https (LISTEN)
apache-ss 30810 root 16u IPv4 220292 TCP *:https (LISTEN)
apache-ss 30811 root 16u IPv4 220292 TCP *:https (LISTEN)
apache-ss 30812 root 16u IPv4 220292 TCP *:https (LISTEN)
which tells me that I have apache-ssl listening on this port, but I
suspect that it would tell you that you have something else
listening... maybe apache was already configured to listen there?
Tom
--
Tom Cook
Information Technology Services, The University of Adelaide
"That you're not paranoid does not mean they're not out to get you."
- Robert Waldner
Get my GPG public key:
https://pinky.its.adelaide.edu.au/tom.cook-at-adelaide.edu.au
pgpY82QGuUQLH.pgp
Description: PGP signature

