At 03:35 PM 6/20/2003 -0400, Alan Bort wrote: >I tried to send this mail as HTML, but the list rejected it... :-(
Actually, this is a :-) . Many of us find the clutter of html formatting burdensome ... you'll encounter a lot of this as you get more familiar with linux ... so you will see that many Linux-related lists reject html-formatted mail. And even on ones that do not reject it, experienced members (that is, the people who *answer* questions) will often complain about it. [apache stuff deleted] > > > > > > > FTP: I can't have access to anyone of the machines > > trough > > > > FTP. I am > > > >having some troubles with the config... what should I configuree > > > >again... what are the files that I should edit. When trying to connect > > > >it just says conection refused.. nothing else. I'm having troubles with > > > >this. I use xinet.d's pro-ftpd. > > > > > > "Connection Refused" most likely means that nothing is listening on the > > ftp > > > port. Or it could mean that the particular IP addresses you are > > connecting > > > from are disallowed. Or, just barely possible, you could have a firewall > > > rule in place that blocks access. > > But the daemon is running (at least it should) I'll check when I get home. > > > > > > I surmise that you run ftp the usual way, through inetd (in your case, > > > xinetd). > > Yes. I do. > > > > > > Use "netstat -l" to verify that something is listening on port 21. > > I'm not at home right now. But I will ASAP. >It does not show it. I see the problem now... but how do I solve it??? Unfortunately (for this purpose, anyway), I do not use xinetd here. I use inetd, so I cannot tell you how to configure xinetd to listen for incoming ftp requests. Possibly someone else here will jump in with the solution If not, or while you are waiting, I'd suggest reading over the man page for xinetd (and any other docs ... they are usually in /usr/share/doc) to see what you missed. >Thanks. > > > > > > > Check the xinetd configuration file to make sure it is listening on that > > port. > > HOW? I have in /etc/xinetd.d/pro-ftpd.conf the line disable=no. That should > > be enough... right? As I said above, I have no idea. But since nothing is listening on port 21, this is surely your problem. The queries about hosts_access and iptables are irrelevant to this problem. > > > > > > > > Check hosts.allow and hosts.deny to see if they interfere with access. > > Nothing wrong there. >In fact NOTHING there at all. They are blank. > > > > > > > Check your firewall ruleset (probably with "iptables -nvL", if you run a > > > 2.4.x kernel) to see if there are any rules that DENY access. > > I tried #service iptables stop and still didn't work. > >Ok... this is going to be long... > >here is the output of iptables -nvL > >[EMAIL PROTECTED] /etc]# iptables -nvL >Chain INPUT (policy DROP 0 packets, 0 bytes) >pkts bytes target prot opt in out source >destination > 0 0 DROP all -- * * 0.0.0.0/0 >0.0.0.0/0 state INVALID > 4 176 ACCEPT all -- * * 192.168.23.114 >0.0.0.0/0 >18034 2264K ACCEPT all -- * * 192.168.23.0/24 >0.0.0.0/0 > 0 0 ACCEPT all -- * * 10.129.2.155 >0.0.0.0/0 > 3 232 ICMPACCEPT icmp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 > 10 600 REJECT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:113 reject-with tcp-reset > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:22 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:25 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:53 > 0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 udp dpt:53 > 17 4597 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:80 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:443 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:110 >334K 501M ACCEPT all -- eth1 * 0.0.0.0/0 >0.0.0.0/0 state ESTABLISHED > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpts:1024:65535 state RELATED > 0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 udp dpts:1024:65535 state RELATED > 0 0 DROP all -- * * 0.0.0.0/0 >0.0.0.0/0 state INVALID > 0 0 ACCEPT all -- * * 192.168.23.114 >0.0.0.0/0 > 0 0 ACCEPT all -- * * 192.168.23.0/24 >0.0.0.0/0 > 0 0 ACCEPT all -- * * 10.129.2.155 >0.0.0.0/0 > 0 0 ICMPACCEPT icmp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 > 0 0 REJECT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:113 reject-with tcp-reset > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:20 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:21 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:22 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:25 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:53 > 0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 udp dpt:53 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:80 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:443 > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpt:110 > 0 0 ACCEPT all -- eth1 * 0.0.0.0/0 >0.0.0.0/0 state ESTABLISHED > 0 0 TCPACCEPT tcp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 tcp dpts:1024:65535 state RELATED > 0 0 ACCEPT udp -- eth1 * 0.0.0.0/0 >0.0.0.0/0 udp dpts:1024:65535 state RELATED > > >Chain FORWARD (policy DROP 0 packets, 0 bytes) >pkts bytes target prot opt in out source >destination >86306 36M ACCEPT all -- !eth1 * 0.0.0.0/0 >0.0.0.0/0 >73152 20M ACCEPT all -- * * 0.0.0.0/0 >0.0.0.0/0 state RELATED,ESTABLISHED > 0 0 ACCEPT all -- !eth1 * 0.0.0.0/0 >0.0.0.0/0 > 0 0 ACCEPT all -- * * 0.0.0.0/0 >0.0.0.0/0 state RELATED,ESTABLISHED > > >Chain OUTPUT (policy ACCEPT 794155 packets, 49858689 bytes) >pkts bytes target prot opt in out source >destination > > >Chain ICMPACCEPT (2 references) >pkts bytes target prot opt in out source >destination > 0 0 ACCEPT icmp -- * * 0.0.0.0/0 >0.0.0.0/0 icmp type 0 > 0 0 ACCEPT icmp -- * * 0.0.0.0/0 >0.0.0.0/0 icmp type 3 > 0 0 ACCEPT icmp -- * * 0.0.0.0/0 >0.0.0.0/0 icmp type 0 > 0 0 ACCEPT icmp -- * * 0.0.0.0/0 >0.0.0.0/0 icmp type 3 > >Chain TCPACCEPT (16 references) >pkts bytes target prot opt in out source >destination > 5 240 ACCEPT tcp -- * * 0.0.0.0/0 >0.0.0.0/0 tcp flags:0x0216/0x022 limit: avg 5/sec burst 10 > 12 4357 ACCEPT tcp -- * * 0.0.0.0/0 >0.0.0.0/0 tcp flags:!0x0216/0x022 > 0 0 ACCEPT tcp -- * * 0.0.0.0/0 >0.0.0.0/0 tcp flags:0x0216/0x022 limit: avg 5/sec burst 10 > 0 0 ACCEPT tcp -- * * 0.0.0.0/0 >0.0.0.0/0 tcp flags:!0x0216/0x022 >[EMAIL PROTECTED] /etc]# > > >Now: I start that iptables configuration with this script (at boot time) > >[EMAIL PROTECTED] /etc]# cat /root/firewall >#!/bin/bash >#Comandos para la configuración del FireWall de Data Systems. Version 2 >echo "## -- Iniciando Script de Firewall -- ##" > > >#Masquerade from internal Net to External net >iptables -P FORWARD DROP >iptables -A POSTROUTING -t nat -o eth1 -s 192.168.23.0/24 -j SNAT >--to-source 192.168.23.103 >iptables -A FORWARD -i ! eth1 -j ACCEPT >iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT > > >echo " #---Creating Accept Chains---#" >iptables -P INPUT DROP > > >#TCPACCEPT - Check for SYN-Floods before letting TCP-Packets in >iptables -N TCPACCEPT >iptables -A TCPACCEPT -p tcp --syn -m limit --limit 5/s --limit-burst 10 >-j ACCEPT >iptables -A TCPACCEPT -p tcp ! --syn -j ACCEPT > > >#inbound ICMP >iptables -N ICMPACCEPT >iptables -A ICMPACCEPT -p icmp --icmp-type echo-reply -j ACCEPT >iptables -A ICMPACCEPT -p icmp --icmp-type destination-unreachable -j >ACCEPT > > >#Kill invalid packets (Not established, related or new) >iptables -A INPUT -m state --state INVALID -j DROP > > >#Packets from internal net >iptables -A INPUT -s 192.168.23.114 -j ACCEPT >iptables -A INPUT -s 192.168.23.0/24 -j ACCEPT > > >echo " #---Packets from EXTERNAL net---#" >iptables -A INPUT -s 10.129.2.155 -j ACCEPT > > >#Filter ICMP >iptables -A INPUT -i eth1 -p icmp -j ICMPACCEPT > > >#silently reject ident >iptables -A INPUT -i eth1 -p tcp --dport 113 -j REJECT --reject-with >tcp-reset > > >echo " #---Enabling Public Services---#" >#ftp-data >iptables -A INPUT -i eth1 -p tcp --dport 20 -j TCPACCEPT > > >#ftp >iptables -A INPUT -i eth1 -p tcp --dport 21 -j TCPACCEPT > > >#ssh >iptables -A INPUT -i eth1 -p tcp --dport 22 -j TCPACCEPT > > >#telnet >#iptables -A INPUT -i eth1 -p tcp --dport 23 -j TCPACCEPT > >#smtp >iptables -A INPUT -i eth1 -p tcp --dport 25 -j TCPACCEPT > >#DNS >iptables -A INPUT -i eth1 -p tcp --dport 53 -j TCPACCEPT >iptables -A INPUT -i eth1 -p udp --dport 53 -j ACCEPT > >#HTTP >iptables -A INPUT -i eth1 -p tcp --dport 80 -j TCPACCEPT > >#HTTPS >iptables -A INPUT -i eth1 -p tcp --dport 443 -j TCPACCEPT > >#POP3 >iptables -A INPUT -i eth1 -p tcp --dport 110 -j TCPACCEPT > >echo " #---Allowing established, related connections in---#" > >iptables -A INPUT -i eth1 -m state --state ESTABLISHED -j ACCEPT >iptables -A INPUT -i eth1 -p tcp --dport 1024:65535 -m state --state >RELATED -j TCPACCEPT >iptables -A INPUT -i eth1 -p udp --dport 1024:65535 -m state --state >RELATED -j ACCEPT >echo "## -- Script Loaded -- ##" >exit >[EMAIL PROTECTED] /etc]# > >I've tested this configuration befor many times and never had any >problems with ftp. Do you mean you have run other ftp *servers* with this ruleset in place, or that you have run ftp clients successfully? They are quite different problems. >What else should I post?. I don't think you ever told us the basics: what Linux distro and version, what kernel ("uname -a"). Routing does not seem relevant to your immediate problems, but whenever networking it involved, it pays to include the routing table and an explanation of the basic networking setup (see below for more on this). And since your initial message did mention Linux hosts "A" and "B", it would help at least to know *which* host we are now talking about ... as I say below, I *think* it is "B" from before. >Iptables version: iptables v1.2.1a >proFTPD version: proftpd-1.2.9rc1 > >Anything else? > >Oh, ifconfig -a: > >[EMAIL PROTECTED] /root]# ifconfig -a >eth0 Link encap:Ethernet HWaddr 00:00:F8:23:5A:62 > inet addr:192.168.23.114 Bcast:192.168.23.255 >Mask:255.255.255.0 > UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 > RX packets:444047 errors:0 dropped:0 overruns:0 frame:0 > TX packets:387507 errors:0 dropped:0 overruns:0 carrier:0 > collisions:4693 txqueuelen:100 > RX bytes:165587659 (157.9 Mb) TX bytes:149730653 (142.7 Mb) > Interrupt:15 Base address:0x8400 > > >eth1 Link encap:Ethernet HWaddr 08:00:2B:C3:C1:0E > inet addr:10.200.1.236 Bcast:10.200.1.239 >Mask:255.255.255.240 > UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 > RX packets:1239679 errors:1 dropped:0 overruns:0 frame:1 > TX packets:1113085 errors:0 dropped:0 overruns:0 carrier:0 > collisions:409 txqueuelen:100 > RX bytes:1495321451 (1426.0 Mb) TX bytes:194423028 (185.4 Mb) > Interrupt:10 Base address:0x8480 > > >lo Link encap:Local Loopback > inet addr:127.0.0.1 Mask:255.0.0.0 > UP LOOPBACK RUNNING MTU:16436 Metric:1 > RX packets:24 errors:0 dropped:0 overruns:0 frame:0 > TX packets:24 errors:0 dropped:0 overruns:0 carrier:0 > collisions:0 txqueuelen:0 > RX bytes:1571 (1.5 Kb) TX bytes:1571 (1.5 Kb) Hmmm ... since this machine has 2 NICs, I assume it is "B" from your prior message (the one that "A" uses to access the Internet). Since both interfaces use private (RFC1918 non-routable) IP addresses, it would help to know which is your external, which your internal interface.I could infer this from your routing table ("netstat -nr" is one way to list it), but you didn't include that. For purposes of troubleshooting ftp on "B", this next part is irrelevant ... but I don't quite see how "A" is accessing the Internet through "B". That is, I do not understand your NAT'ing setup, probably because I do not know what the address "192.168.23.103" in your SNAT rule refers to. >netstat -l outputs this: > >[EMAIL PROTECTED] /root]# netstat -l >Active Internet connections (only servers) >Proto Recv-Q Send-Q Local Address Foreign Address >State >tcp 0 0 *:sunrpc *:* >LISTEN >tcp 0 0 *:http *:* >LISTEN >tcp 0 0 *:32789 *:* >LISTEN >tcp 0 0 *:32790 *:* >LISTEN >tcp 0 0 *:ssh *:* >LISTEN >tcp 0 0 *:32791 *:* >LISTEN >tcp 0 0 *:6010 *:* >LISTEN >udp 0 0 *:talk *:* >udp 0 0 *:sunrpc *:* >Active UNIX domain sockets (only servers) >Proto RefCnt Flags Type State I-Node Path >unix 2 [ ACC ] STREAM LISTENING 978 /dev/gpmctl > > >Samba is not realy that important. In fact smaba is not important at >all. as long as I have FTP working. Note from the above that nothing is listening on the SMB ports either. But since you say Samba is, now, "not realy that important", I won't go into that. >I hope the information was better this time... I repeat... I'm noob >here... and I've never had any problems with ftp servers before. In what contexts have you previously run ftp servers? Any that ran through inetd or xinetd? - To unsubscribe from this list: send the line "unsubscribe linux-newbie" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.linux-learn.org/faqs