Am Dienstag, 15. Oktober 2019, 19:23:57 CEST schrieb Andreas Günther: > > That I have seen today when I was reading your documentation today. > > When the firewall is correctly running in your view, so I have search the > refused connection at Icinga. Apart from the connection behavior on the > host, as just shown.
Hi, my problem isn't still solved. I have checked Icinga2 on the host and tested the same configuration on another KVM-Guest 192.168.200.7 in a seperate network 192.168.200.0 without any firewall with a Icinga client 192.168.200.2. There aren't any connections problems. On my Host Icinga is listening: # netstat -tlpn | grep 5665 tcp 0 0 0.0.0.0:5665 0.0.0.0:* LISTEN 3490/icinga2 My rules für tcp/5665 looks like 0 0 ACCEPT tcp -- * * 192.168.1.66 192.168.1.70 tcp dpt:5665 1 60 ACCEPT tcp -- * * 192.168.1.70 192.168.1.66 tcp dpt:5665 Now I try to get on the client the certificate from Icinga like mx:~ # openssl s_client -connect 192.168.1.66:5665 140635865412736:error:0200206F:system library:connect:Connection refused:../crypto/bio/b_sock2.c:110: 140635865412736:error:2008A067:BIO routines:BIO_connect:connect error:../crypto/bio/b_sock2.c:111: connect:errno=111 At the same time in the log of shorewall I see: neckar:/etc/shorewall # shorewall show log | grep '192.168.1.66' Oct 18 12:45:10 Shorewall:loc-fw:REJECT:IN=vmbr1 OUT= SRC=192.168.1.70 DST=192.168.1.66 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=44700 DF PROTO=TCP SPT=42882 DPT=5665 WINDOW=29200 RES=0x00 SYN URGP=0 The same from the host looks like neckar:/etc/shorewall # openssl s_client -connect 192.168.1.66:5665 CONNECTED(00000003) Can't use SSL_get_servername depth=1 CN = Icinga CA verify error:num=19:self signed certificate in certificate chain verify return:1 depth=1 CN = Icinga CA verify return:1 depth=0 CN = neckar.germany.com verify return:1 ... I don't believe anymore on a problem at Icinga, it is something with shorewall. But I don't know what. Could it have something to do with the options or missing options in interfaces? #ZONE INTERFACE OPTIONS net $NET_IF dhcp,routefilter,tcpflags loc $LOC_IF routeback,bridge Best regards Andreas
shorewall_dump.txt.bz2
Description: application/bzip
_______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users