Re: [Hampshire] unable to connect from one system to another…

Top Page

Reply to this message
Author: Stuart Sears
Date:  
To: hampshire
Subject: Re: [Hampshire] unable to connect from one system to another using ssh
On 17/02/10 12:08, Stephen Rowles wrote:
> On 02/17/2010 11:19 AM, Lisi wrote:
>> The IPs of the two active computers are 192.168.0.2 and 192.168.0.3. The
>> router is 192.168.0.1.
>>
>> I then tried the following (from 192.168.0.2):
>>
>> Tux:/home/lisi# netstat -atn
>> Active Internet connections (servers and established)
>> Proto Recv-Q Send-Q Local Address           Foreign Address         State
>> tcp        0      0 0.0.0.0:59782           0.0.0.0:*               LISTEN
>> tcp        0      0 127.0.0.1:1004          0.0.0.0:*               LISTEN
>> tcp        0      0 0.0.0.0:111             0.0.0.0:*               LISTEN
>> tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN
>> tcp        0      0 127.0.0.1:631           0.0.0.0:*               LISTEN
>> tcp        0      0 0.0.0.0:7741            0.0.0.0:*               LISTEN
>> tcp        0      0 192.168.0.2:43311       92.122.211.37:1935
>> ESTABLISHED
>> tcp6       0      0 :::22                   :::*                    LISTEN
>> tcp6       0      0 ::1:631                 :::*                    LISTEN
>> Tux:/home/lisi# ps -ef | grep sshd
>> root      2341     1  0 06:38 ?        00:00:00 /usr/sbin/sshd
>> root     15602 15392  0 11:08 pts/1    00:00:00 grep sshd
>> Tux:/home/lisi#

>>
>> If I have understood correctly, that is a bit worrying. (The ESTABLISHED
>> one.) So have I understood? I hope that I have not. ;-0.


it's not that alarming, assuming your local IP is 192.168.0.2 (that
certainly is not a publicly-accessible address). It most likely just
means that you've established a tcp connection out to 92.122.211.37

Incidentally, without the 'n' arg, netstat will (attempt to) give you
hostnames, rather than IP addresses, which may be of interest

>>
>> If it _is_ ominous, I can block that IP. But I presumably need to close some
>> open ports as well?
>>
>> Lisi
>>
>
> To know if it is ominous or not, the command fuser is your friend :)
>
> You can run fuser to find out what process the connection is to, you
> might find it is a simple MSN connection, or something else expected.
>
> For example in my machine, finding out what process is using tcp port 22
> (n for namespace of tcp, you can use udp and others too, v for verbose
> output):
>
> ]# fuser -vn tcp 22
>                       USER        PID ACCESS COMMAND
> 22/tcp:              root       1888 F.... sshd

>
> Hope that helps.

alternatively, as root, netstat can tell you this as well

netstat -atpn is your friend here

netstat -tulpn will give tcp and udp services (in this case -tlpn would
be fine) plus the process name that is running on that port.
Not always perfect (for some apps here it just says 'python', for example)

...
tcp 0 0 x.x.x.x:38052 x.x.x.:8001 ESTABLISHED 3849/konversation
...

although the fuser trick is also sometimes handy.

lsof (ls open files) can do this too - all established TCP connections:
# lsof -i TCP -s TCP:ESTABLISHED

or for a specific port:
# lsof -i TCP:38052
...
COMMAND    PID   USER   FD   TYPE DEVICE SIZE/OFF NODE NAME
konversat 3849 stuart   15u  IPv4 220155      0t0  TCP
x.x.x.x:38052->remote.host.name:vcom-tunnel (ESTABLISHED)
...


Regards,

Stuart
--
Stuart Sears RHCA etc.
"It's today!" said Piglet.
"My favourite day," said Pooh.