(email) server connection problem : Help
Mark Moellering
mark at msen.com
Mon Jun 20 17:20:12 UTC 2011
I am Running a mail server (postfix / dovecot) on FreeBSD 8.1
I have 6 different domain names configured with 6 different ip addresses.
I cannot log into the server via either ssl for email or ssh on the two
domains that are .org and .info
The connection is refused. Here is an example copied from a console;
shell$ ssh -l LoginName mail.anadarkohs60.com
The authenticity of host 'mail.domain_4.com(xx.yy.zzb.174)' can't be
established.
DSA key fingerprint is {snip}
Are you sure you want to continue connecting (yes/no)? no
Host key verification failed.
shell$ ssh -l LoginName mail.domain_3.org
ssh: connect to host mail.domain_3.org port 22: Connection refused
shell$
My guess is that it might be sshguard but I see nothing in the logfiles.
I can ping to the TLD, mx records, etc check out. Everything works
except for my .org and .info domain
Any help is greatly appreciated. I hope it is one of those simple
things I missed.
Thanks in advance
Mark Moellering
734.644.4757
Here is my hosts file;
<<<<<<< current version
::1 localhost
127.0.0.1 localhost mail.main_domain.net
xx.yy.zza.69 mail.main_domain.net mail
xx.yy.zzb.100 mail.domain_1.com
xx.yy.zzb.249 mail.domain_2.com
xx.yy.zzb.62 mail.domain_3.org
xx.yy.zzb.174 mail.domain_4.com
xx.yy.zzb.180 mail.domain_5.info
=======
# $FreeBSD: src/etc/hosts,v 1.16.34.1.4.1 2010/06/14 02:09:06 kensmith Exp $
#
# Host Database
Here is my pf.conf
#PF Firewall Configuration File
#Definitions
interface="rl0"
table <attacks> persist file "/etc/attackers"
table <sshguard> persist
scrub in all
#lock all traffic out of the server
block in on $interface
#block ssh and other attacks using sshguard
block in quick on $interface from <sshguard> to any label "ssh attack"
#allow ping, et al
pass in on $interface proto icmp from any to $interface
#allow in ssh , syslogd , ntp, http and https
pass in on $interface proto tcp from any to $interface port 22
pass in on $interface proto udp from any to $interface port 514
pass in on $interface proto udp from any to $interface port 123
#pass in on $interface proto tcp from any to $interface port 80
#pass in on $interface proto tcp from any to $interface port 443
# allow outgoing connections
pass out on $interface proto { tcp, udp, icmp } all keep state
# allow e-mail / smtp (port 25)
pass in on $interface proto tcp from any to $interface port 25
pass in on $interface proto tcp from any to $interface port 110
pass in on $interface proto tcp from any to $interface port 995
pass in on $interface proto tcp from any to $interface port 587
pass in on $interface proto tcp from any to $interface port 465
#Block addresses trying to break in
block drop in on $interface from <attacks> to any
More information about the freebsd-questions
mailing list