Re: on to letsencrypt

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 19/04/2021 03:18, Jack Craig wrote:


On Fri, Apr 16, 2021 at 12:52 PM Doug H. <fedoraproject.org@xxxxxxxxxxx <mailto:fedoraproject.org@xxxxxxxxxxx>> wrote:

    On Fri, Apr 16, 2021, at 10:56 AM, Ed Greshko wrote:
    > On 16/04/2021 17:19, Ed Greshko wrote:
    > > On 16/04/2021 10:35, Jack Craig wrote:
    > >> First I get my static IP from AT&T actually a block of eight addresses of which only the first do they agree to pass through.
    > >>
    > >
    > > BTW, if you are hosting the DNS server and if your DNS server has the IP address of 108.220.213.121 then
    > > this could be a problem.

*
*
*would you expand on this comment? i think this is an issue,... thx..*

You removed the most important part of my comment.  Which was....

PORT   STATE  SERVICE VERSION
53/udp closed domain
53/tcp  closed domain

This mean you don't have a DNS server (bind, I assume) listening on the standard port 53
on the 108.220.213.121 interface.  That means that no system outside of your internals (10.0.0.x)
can query your DNS server.

If I "telnet" to port 53 (tcp) to my ISP's name server...

[egreshko@meimei ~]$ telnet 168.95.1.1 53
Trying 168.95.1.1...
Connected to 168.95.1.1.
Escape character is '^]'.
^]
telnet> close
Connection closed.

Yours?

[egreshko@meimei ~]$ telnet 108.220.213.121 53
Trying 108.220.213.121...
telnet: connect to address 108.220.213.121: Connection refused

Also note, that if I run "nmap -A -T4 -p53 168.95.1.1 53" I get

PORT   STATE SERVICE VERSION
53/tcp open  domain  (generic dns response: NOTIMP)
| fingerprint-strings:
|   DNSVersionBindReqTCP:
|     version
|_    bind

Or if I run "nmap -A -T4 -p53 -sU 168.95.1.1" a UDP scan

PORT   STATE SERVICE VERSION
53/udp open  domain  (generic dns response: NOTIMP)
|_dns-recursion: Recursion appears to be enabled
| fingerprint-strings:
|   DNSVersionBindReq:
|     version
|     bind
|   NBTStat:
|     CKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
|_    root-servers

These nmap command need to be run from the outside.  I think there are websites which allow
you to run nmap against your own systems.



--
Remind me to ignore comments which aren't germane to the thread.

_______________________________________________
users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/users@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure



[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux