tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
21:51:28.605301 IP broadband-1.1.1.1.nationalcablenetworks.ru.3485 > primcs.ru.3000: Flags [S], seq 2505514229, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0
21:51:28.605367 IP primcs.ru.3000 > broadband-1.1.1.1.nationalcablenetworks.ru.3485: Flags [R.], seq 0, ack 2505514230, win 0, length 0
21:51:28.606680 IP broadband-1.1.1.1.nationalcablenetworks.ru.3486 > primcs.ru.3000: Flags [S], seq 3417019021, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0
21:51:28.606714 IP primcs.ru.3000 > broadband-1.1.1.1.nationalcablenetworks.ru.3486: Flags [R.], seq 0, ack 3417019022, win 0, length 0
21:51:28.840350 IP broadband-1.1.1.1.nationalcablenetworks.ru.3487 > primcs.ru.3000: Flags [S], seq 4138683250, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0
21:51:28.840427 IP primcs.ru.3000 > broadband-1.1.1.1.nationalcablenetworks.ru.3487: Flags [R.], seq 0, ack 4138683251, win 0, length 0
21:51:29.122574 IP broadband-1.1.1.1.nationalcablenetworks.ru.3485 > primcs.ru.3000: Flags [S], seq 2505514229, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0
21:51:29.122637 IP primcs.ru.3000 > broadband-1.1.1.1.nationalcablenetworks.ru.3485: Flags [R.], seq 0, ack 1, win 0, length 0
21:51:29.122812 IP broadband-1.1.1.1.nationalcablenetworks.ru.3486 > primcs.ru.3000: Flags [S], seq 3417019021, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0
21:51:29.122836 IP primcs.ru.3000 > broadband-1.1.1.1.nationalcablenetworks.ru.3486: Flags [R.], seq 0, ack 1, win 0, length 0
21:51:29.324499 IP broadband-1.1.1.1.nationalcablenetworks.ru.3487 > primcs.ru.3000: Flags [S], seq 4138683250, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0
21:51:29.324561 IP primcs.ru.3000 > broadband-1.1.1.1.nationalcablenetworks.ru.3487: Flags [R.], seq 0, ack 1, win 0, length 0
21:51:29.726143 IP broadband-1.1.1.1.nationalcablenetworks.ru.3486 > primcs.ru.3000: Flags [S], seq 3417019021, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0
21:51:29.726203 IP primcs.ru.3000 > broadband-1.1.1.1.nationalcablenetworks.ru.3486: Flags [R.], seq 0, ack 1, win 0, length 0
21:51:29.726226 IP broadband-1.1.1.1.nationalcablenetworks.ru.3485 > primcs.ru.3000: Flags [S], seq 2505514229, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0
21:51:29.726245 IP primcs.ru.3000 > broadband-1.1.1.1.nationalcablenetworks.ru.3485: Flags [R.], seq 0, ack 1, win 0, length 0
21:51:29.827079 IP broadband-1.1.1.1.nationalcablenetworks.ru.3487 > primcs.ru.3000: Flags [S], seq 4138683250, win 65535, options [mss 1460,nop,wscale 1,nop,nop,sackOK], length 0
21:51:29.827163 IP primcs.ru.3000 > broadband-1.1.1.1.nationalcablenetworks.ru.3487: Flags [R.], seq 0, ack 1, win 0, length 0
^C
18 packets captured
18 packets received by filter
0 packets dropped by kernel
root@primcs.ru:~# netstat -ltpn
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN 709/sshd
tcp 0 0 127.0.0.1:3000 0.0.0.0:* LISTEN 10423/ruby
tcp6 0 0 :::22 :::* LISTEN 709/sshd
tcp6 0 0 ::1:3000 :::* LISTEN 10423/ruby
root@primcs:~# tcpdump -i eth0 port 3000
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel
Chain INPUT (policy ACCEPT 1074K packets, 118M bytes)
pkts bytes target prot opt in out source destination
56 48019 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:80
14 31476 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp spt:3000
1075K 119M ufw-before-logging-input all -- * * 0.0.0.0/0 0.0.0.0/0
1075K 119M ufw-before-input all -- * * 0.0.0.0/0 0.0.0.0/0
1075K 119M ufw-after-input all -- * * 0.0.0.0/0 0.0.0.0/0
1074K 118M ufw-after-logging-input all -- * * 0.0.0.0/0 0.0.0.0/0
1074K 118M ufw-reject-input all -- * * 0.0.0.0/0 0.0.0.0/0
1074K 118M ufw-track-input all -- * * 0.0.0.0/0 0.0.0.0/0
...
Chain OUTPUT (policy ACCEPT 45357 packets, 8525K bytes)
pkts bytes target prot opt in out source destination
52 2774 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
18 1138 ACCEPT tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:3000
1) А правило "-P OUTPUT ACCEPT" - все-таки лучше разрешить? :)
2) Что значит не доступен извне? У меня есть правила работающие для доступа к приложению, и для коннекта по ssh к нему. Вроде все решено, или что-то еще может быть?)