[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

I can't connect to my computer



i installed a hamm system (Scientific Workstation) and can't connect to it. 
Neither ping, telnet nor smtp or something else works. It's like there is
no network installed. But it is, I, sitting at the computer, can connect to any other machine, I can browse the web, send email or do other stuff that sends 
something back to the machine. Can anybody tell me what's going on here?
The hostname is kik.informatik.fh-dortmund.de. Feel free to scan it or whatever
might lead to an answer.

At first I thought about hosts.deny and hosts.allow, but they look innocent:
$ cat /etc/hosts.allow
# /etc/hosts.allow: list of hosts that are allowed to access the system.
#                   See the manual pages hosts_access(5), hosts_options(5)
#                   and /usr/doc/netbase/portmapper.txt.gz
#
# Example:    ALL: LOCAL @some_netgroup
#             ALL: .foobar.edu EXCEPT terminalserver.foobar.edu
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper. See portmap(8)
# and /usr/doc/netbase/portmapper.txt.gz for further information.
#

ALL: ALL

$ cat /etc/hosts.deny 
# /etc/hosts.deny: list of hosts that are _not_ allowed to access the system.
#                  See the manual pages hosts_access(5), hosts_options(5)
#                  and /usr/doc/netbase/portmapper.txt.gz
#
# Example:    ALL: some.host.name, .some.domain
#             ALL EXCEPT in.fingerd: other.host.name, .other.domain
#
# If you're going to protect the portmapper use the name "portmap" for the
# daemon name. Remember that you can only use the keyword "ALL" and IP
# addresses (NOT host or domain names) for the portmapper. See portmap(8)
# and /usr/doc/netbase/portmapper.txt.gz for further information.
#
# The PARANOID wildcard matches any host whose name does not match its
# address.
ALL: PARANOID

Then I thought maybe there's a firewall installed. But the only references to
ipfwadm I could find in the startup files are for preventing IP spoofed 
connections.

Here's my inetd.conf, maybe it defaults to something weird which I don't
recognize:

$ cat /etc/inetd.conf 
# /etc/inetd.conf:  see inetd(8) for further informations.
#
# Internet server configuration database
#
#
# Lines starting with "#:LABEL:" or "#<off>#" should not
# be changed unless you know what you are doing!
#
# If you want to disable an entry so it isn't touched during
# package updates just comment it out with a single '#' character.
#
# Packages should modify this file by using update-inetd(8)
#
# <service_name> <sock_type> <proto> <flags> <user> <server_path> <args>
#
#:INTERNAL: Internal services
#echo           stream  tcp     nowait  root    internal
#echo           dgram   udp     wait    root    internal
#chargen        stream  tcp     nowait  root    internal
#chargen        dgram   udp     wait    root    internal
discard         stream  tcp     nowait  root    internal
discard         dgram   udp     wait    root    internal
daytime         stream  tcp     nowait  root    internal
daytime         dgram   udp     wait    root    internal
time            stream  tcp     nowait  root    internal
time            dgram   udp     wait    root    internal

#:STANDARD: These are standard services.
ftp             stream  tcp     nowait  root    /usr/sbin/tcpd  /usr/sbin/in.ftpd
telnet          stream  tcp     nowait  root    /usr/sbin/tcpd  /usr/sbin/in.telnetd

#:BSD: Shell, login, exec and talk are BSD protocols.
shell           stream  tcp     nowait  root    /usr/sbin/tcpd  /usr/sbin/in.rshd
login           stream  tcp     nowait  root    /usr/sbin/tcpd  /usr/sbin/in.rlogind
exec            stream  tcp     nowait  root    /usr/sbin/tcpd  /usr/sbin/in.rexecd
ntalk           dgram   udp     wait    root    /usr/sbin/tcpd  /usr/sbin/in.ntalkd
talk            dgram   udp     wait    root    /usr/sbin/tcpd  /usr/sbin/in.talkd

#:MAIL: Mail, news and uucp services.

#:INFO: Info services
finger          stream  tcp     nowait  nobody  /usr/sbin/tcpd  /usr/sbin/in.fingerd
ident           stream  tcp     nowait  nobody  /usr/sbin/identd        identd -i

#:BOOT: Tftp service is provided primarily for booting.  Most sites
# run this only on machines acting as "boot servers."
#tftp           dgram   udp     wait    nobody  /usr/sbin/tcpd  /usr/sbin/in.tftpd /boot
#bootps         dgram   udp     wait    root    /usr/sbin/bootpd        bootpd -i -t 120

#:RPC: RPC based services
#mountd/1       dgram   rpc/udp wait    root    /usr/sbin/tcpd  /usr/sbin/rpc.mountd
#rstatd/1-3     dgram   rpc/udp wait    root    /usr/sbin/tcpd  /usr/sbin/rpc.rstatd
#rusersd/2-3    dgram   rpc/udp wait    root    /usr/sbin/tcpd  /usr/sbin/rpc.rusersd
#walld/1        dgram   rpc/udp wait    root    /usr/sbin/tcpd  /usr/sbin/rpc.rwalld

#:HAM-RADIO: amateur-radio services

#:OTHER: Other services
saft    stream  tcp     nowait  root    /usr/sbin/tcpd  /usr/sbin/sendfiled
smtp   stream  tcp     nowait  root    /usr/sbin/tcpd  /usr/sbin/in.smtpd


route prints:
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
localnet        *               255.255.255.0   U     0      0       11 eth0
127.0.0.0       *               255.0.0.0       U     0      0        2 lo
default         ki.informatik.f 0.0.0.0         UG    1      0       51 eth0

ifconfig prints:
lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Bcast:127.255.255.255  Mask:255.0.0.0
          UP BROADCAST LOOPBACK RUNNING  MTU:3584  Metric:1
          RX packets:60 errors:0 dropped:0 overruns:0 frame:0
          TX packets:60 errors:0 dropped:0 overruns:0 carrier:0
          Collisions:0 

eth0      Link encap:Ethernet  HWaddr 00:00:92:90:90:D5  
          inet addr:193.25.19.98  Bcast:193.25.19.255  Mask:255.255.255.0
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:10800 errors:0 dropped:0 overruns:0 frame:0
          TX packets:7288 errors:0 dropped:0 overruns:0 carrier:0
          Collisions:0 
          Interrupt:11 Base address:0xe000 


Thanks for your help


Reply to: