@kieran, @Skalman thanks guys, you rock
Luckily, I’m root though
Ok, some more data points: nmap seemed to contradict netstat, as the former indicated ipv4-only-apache, and the latter ipv6-only-apache listening (truncated output):
nmap 192.168.0.10
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
netstat -antp
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
[…]
tcp6 0 0 :::80 :::* LISTEN 901/apache2
I wasn’t aware of ss, but interpret its output (asterisk) to mean ipv4/ipv6
ss -tln
State Recv-Q Send-Q Local Address:Port Peer Address:Port Process
[...]
LISTEN 0 511 *:80 *:*
Anyway, locally on the machine, I can connect with both, ipv4 and ipv6 address.
Basically, as you hinted, I needed to confirm that the connection is blocked inbound.
And indeed (tshark) :
4 3.521678144 192.168.0.16 → 192.168.0.10 TCP 74 39910 → 80 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=2754146134 TSecr=0 WS=128
5 3.521739439 192.168.0.10 → 192.168.0.16 ICMP 102 Destination unreachable (Communication administratively filtered)
Same for IPv6, and same if I create a test server (nc -l -p 81) and telnet to it:
17 5.798550353 192.168.0.16 → 192.168.0.10 TCP 74 42350 → 81 [SYN] Seq=0 Win=64240 Len=0 MSS=1460 SACK_PERM=1 TSval=2755290359 TSecr=0 WS=128
18 5.798709605 192.168.0.10 → 192.168.0.16 ICMP 102 Destination unreachable (Communication administratively filtered)
So, I guess this tells me that that incoming connections are indeed blocked, but I don’t know by what
iptables -L is empty, and nft is not installed (and I didn’t knowingly do anything in that direction). I did upgrade to Byzantium a while back.
I have a feeling it will be something very simple, or embarrassing. Probably both