Linux services troubleshooting. If you cannot connect to your service.. When you start service, check that it says ok (most services say that when starting.

Slides:



Advertisements
Similar presentations
A “Dynamic” Firewall Jon Hillier Oxford University/ eScience Centre.
Advertisements

IP Masquerading Homes and Businesses: When you only have one IP but you have LOTS of machines.
1 Topic 2 – Lesson 4 Packet Filtering Part I. 2 Basic Questions What is packet filtering? What is packet filtering? What elements are inside an IP header?
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
Copyright GeneGo CONFIDENTIAL »« MetaCore TM (System requirements and installation) Systems Biology for Drug Discovery.
SIS - Security Lab Introductory Session University of Pittsburgh 2006.
Securing Network using Linux. Lesson Outline Setting up a secure system TCP Wrapper configuration Firewalls in Linux Authentication Systems –NIS –Kerberos.
Chapter Apache Installation in Linux- Mandrake. Acknowledgment The following information has been obtained directly from
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Apache : Installation, Configuration, Basic Security Presented by, Sandeep K Thopucherela, ECE Department.
A short two-part talk introducing: Basic Linux/Unix system administration (CentOS/RHEL5) General Computer/Network security … for the G53SEC module. Nick.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
TCP Sockets Reliable Communication. TCP As mentioned before, TCP sits on top of other layers (IP, hardware) and implements Reliability In-order delivery.
ADMINISTRATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
The Network Management Lab pc pc pc pc pc Virtual Servers Your Laptop.
LANDesk Management Gateway
The Linux Operating System Lecture 7: Tonga Institute of Higher Education.
Chapter 10 Networking and the Internet ITSC 1458.
Review Security Hardening IPTables SELinux. Today Installations and updates – Rpm command and packages Apache “Issue Ownership”
Linux kernel security Professor: Mahmood Ranjbar Authors: mohammad Heydari Mahmood ZafarArjmand Zohre Alihoseyni Maryam Sabaghi.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
Linux Security LINUX SECURITY. Firewall Linux Security Internet Database Application Web Server Firewall.
Wireless Networks and the NetSentron By: Darren Critchley.
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
Windows Vista Inside Out Chapter 22 - Monitoring System Activities with Event Viewer Last modified am.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Chapter 19 TELNET and Rlogin.
Linux Services Muhammad Amer. 2 xinetd Programs  In computer networking, xinetd, the eXtended InterNET Daemon, is an open-source super-server daemon.
Linux Security. See who's logged in 1) w (more information) 2) who (less information)
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Other useful commands netstat ps tail kill. netstat Print network connections, routing tables, interface statistics, masquerade connections, and multicast.
Linux Security. Module 13 – Linux Security ♦ Overview Linux is more prone today to security loopholes and attacks, both inside and outside the network.
Linux Exercise. Download and Install the latest CentOS version and latest Ubuntu/Fedora OS. Configure a unique Host Name and a permanent IP Address for.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Dictionary Attack Chien-Chung Shen
Linux Overview Why Linux ? Not-so-ancient history –Torvalds, Linus Torvalds, 002 the Helsinki University, as a student, low budget, work home –rapid and.
Internet Services.  Basically, an Internet Service can be defined as any service that can be accessed through TCP/IP based networks, whether an internal.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
SIS - Security Lab Introductory Session University of Pittsburgh 2008.
1 Tips for the assignment. 2 Socket: a door between application process and end- end-transport protocol (UDP or TCP) TCP service: reliable transfer of.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Linux Operations and Administration Chapter Twelve Configuring a Mail Server.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
Role Of Network IDS in Network Perimeter Defense.
Day 15 Apache. Being a web server Once your system is correctly connected to the network, you could be a web server. –When you go to a web site such as.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
How to fix Error code 0x80072ee2 in Windows 8.1? Fix%20%20Update%20Error%200x80072EE2%20in%20Windows%20 8.1,%20Windows%2010!%20-%20Fix%20PC%20Errors.htm.
Apache Web Server v. 2.2 Reference Manual Chapter 2 Starting Apache.
1 E-Site - FTP Services Setup / install guide. 2 About FTP services can run on any desired port(s) Runs as a windows service Works for all sites installed.
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
Understanding POP3 / IMAP Created by : Ashish Shah, J. M. Patel College of Commerce 1.
Troubleshooting Directories and Files Debugging
An Analysis on NAT Security
Enumeration.
FIREWALL configuration in linux
Backdoor Attacks.
Two FTP connections from different hosts
Lab 1 introduction, debrief
IS3440 Linux Security Unit 6 Using Layered Security for Access Control
Contact QuickBooks File Doctor
Information Security Session October 24, 2005
Lab 7 - Topics Establishing SSH Connection Install SSH Configure SSH
has many aspects that work together to give people almost instant communication from any computer on the internet to any other computer There.
OPS235: Configuring a Network Using Virtual Machines – Part 2
Network hardening Chapter 14.
Troubleshooting ip Chapter 5e.
Presentation transcript:

Linux services troubleshooting

If you cannot connect to your service.. When you start service, check that it says ok (most services say that when starting in CENTos). Rarely service might say ok and not start. ~]# service httpd start Starting httpd: [ OK ] ~]# If you try to connect to service and it’s not responding properly, first check with ps that process has started. Using ps with following switches and with the help of grep should show some results. /etc/init.d/apache2 start in Ubuntu/Debian

ps xaufw | grep –i httpd ~]# ps xaufw | grep -i httpd root pts/2 S+ 08:33 0:00 \_ grep -i httpd root ? Ss 08:30 0:00 /usr/sbin/httpd apache ? S 08:30 0:00 \_ /usr/sbin/httpd apache ? S 08:30 0:00 \_ /usr/sbin/httpd apache ? S 08:30 0:00 \_ /usr/sbin/httpd If you can see your service, next thing to check is if network ports are open. They can be checked with netstat command.

If your using root –user, you can use command netstat –antpu Using same command with basic user rights gives output which doesn’t have PID/Program information. Using netstat –antpu with basic user account: ~]$ netstat -antpu (No info could be read for "-p": geteuid()=537 but you should be root.) Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp : :* LISTEN - tcp 0 0 ::1:3307 :::* LISTEN - tcp 0 0 :::80 :::* LISTEN - tcp 0 0 :::22 :::* LISTEN - tcp ::ffff: :22 ::ffff: :1043 ESTABLISHED – Using netstat –antpu with root -user account: ~]# netstat -antpu Active Internet connections (servers and established) Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name tcp : :* LISTEN 15980/0 tcp 0 0 ::1:3307 :::* LISTEN 15980/0 tcp 0 0 :::80 :::* LISTEN 21438/httpd tcp 0 0 :::22 :::* LISTEN 1485/sshd tcp ::ffff: :22 ::ffff: :1043 ESTABLISHED 21401/2

If you can see your service in process list with ps and in netstatistics with netstat, then your service has started. To avoid firewalls blocking access to your service, try accessing service by using localhost as hostname. Localhost is machines local network name and it can be used from within server to access things locally. You can’t use localhost as hostname to access server from other machines in network. One of the ways trying to access your service is by using telnet. It doesn’t work with all programs but if it does you can see that your service is actually responding to incoming connections. Use telnet to debug by using following command: telnet localhost XX (where XX is port number of your application). Port number is easy to find with netstat. ~]# telnet localhost 80 Trying Connected to localhost.localdomain ( ). Escape character is '^]'. In this example above httpd server (apache) responded to connection attempts. If we know that it responds we can check firewall / security settings next.

Iptables and SELinux Iptables is modern firewall used in our CENTos servers. If you haven’t added your application port to iptables list, firewall will in most cases block your access to service from network. You can disable iptables firewall with command iptables -F If your running your server outside lab enviroment, disabling firewall isn’t recommended. If you left SELinux enabled during installion, you will find yourself facing some mysterious problems. SELinux does block most of suspicious activity and should therefore be disabled in our lab course. Command to disable SELinux when system is running is setenforce 0 When you want to disable SELinux permanently, find and edit file /etc/selinux/config There are some good commented instructions how to do it inside that file. Just change line saying SELINUX=enforcing to SELINUX=disabled

Checking log files Commonly all services write information to logs when software is started. This information for the most of the services can be found from /var/log –directory. Some services for example Apache does have it’s own logs written under /var/log/httpd –directory. Use tail command to see last log entries. You can follow new incoming entries automatically by issuing command tail –f /var/log/logname & If you still can’t solve your services problems with the instructions above, ask instructor!