Advertisement
panzon

Untitled

Aug 29th, 2016
71
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.20 KB | None | 0 0
  1. ssh -v -l ec2-user -i PaasBBVA.pem 52.88.176.74
  2. OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
  3. debug1: Reading configuration data /etc/ssh/ssh_config
  4. debug1: /etc/ssh/ssh_config line 56: Applying options for *
  5. debug1: Connecting to 52.88.176.74 [52.88.176.74] port 22.
  6. debug1: Connection established.
  7. debug1: permanently_set_uid: 0/0
  8. debug1: identity file PaasBBVA.pem type -1
  9. debug1: identity file PaasBBVA.pem-cert type -1
  10. debug1: Enabling compatibility mode for protocol 2.0
  11. debug1: Local version string SSH-2.0-OpenSSH_6.6.1
  12. ssh_exchange_identification: read: Connection reset by peer
  13. [root@ip-172-31-33-98 ec2-user]# ssh -v -l ec2-user -i PaasBBVA.pem ip-172-31-41-20.us-west-2.compute.internal
  14. OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
  15. debug1: Reading configuration data /etc/ssh/ssh_config
  16. debug1: /etc/ssh/ssh_config line 56: Applying options for *
  17. debug1: Connecting to ip-172-31-41-20.us-west-2.compute.internal [172.31.41.20] port 22.
  18. debug1: Connection established.
  19. debug1: permanently_set_uid: 0/0
  20. debug1: identity file PaasBBVA.pem type -1
  21. debug1: identity file PaasBBVA.pem-cert type -1
  22. debug1: Enabling compatibility mode for protocol 2.0
  23. debug1: Local version string SSH-2.0-OpenSSH_6.6.1
  24. ssh_exchange_identification: read: Connection reset by peer
  25. [root@ip-172-31-33-98 ec2-user]# ssh -v -l ec2-user -i PaasBBVA.pem 172.31.41.20
  26. OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
  27. debug1: Reading configuration data /etc/ssh/ssh_config
  28. debug1: /etc/ssh/ssh_config line 56: Applying options for *
  29. debug1: Connecting to 172.31.41.20 [172.31.41.20] port 22.
  30. debug1: Connection established.
  31. debug1: permanently_set_uid: 0/0
  32. debug1: identity file PaasBBVA.pem type -1
  33. debug1: identity file PaasBBVA.pem-cert type -1
  34. debug1: Enabling compatibility mode for protocol 2.0
  35. debug1: Local version string SSH-2.0-OpenSSH_6.6.1
  36. ssh_exchange_identification: read: Connection reset by peer
  37. [root@ip-172-31-33-98 ec2-user]# ssh -v -l ec2-user -i PaasBBVA.pem ec2-52-88-176-74.us-west-2.compute.amazonaws.com
  38. OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
  39. debug1: Reading configuration data /etc/ssh/ssh_config
  40. debug1: /etc/ssh/ssh_config line 56: Applying options for *
  41. debug1: Connecting to ec2-52-88-176-74.us-west-2.compute.amazonaws.com [172.31.41.20] port 22.
  42. debug1: Connection established.
  43. debug1: permanently_set_uid: 0/0
  44. debug1: identity file PaasBBVA.pem type -1
  45. debug1: identity file PaasBBVA.pem-cert type -1
  46. debug1: Enabling compatibility mode for protocol 2.0
  47. debug1: Local version string SSH-2.0-OpenSSH_6.6.1
  48. ssh_exchange_identification: read: Connection reset by peer
  49. [root@ip-172-31-33-98 ec2-user]# iptables -L -n
  50. Chain INPUT (policy ACCEPT)
  51. target prot opt source destination
  52. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
  53. ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0
  54. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  55. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:22
  56. OS_FIREWALL_ALLOW all -- 0.0.0.0/0 0.0.0.0/0
  57. REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
  58.  
  59. Chain FORWARD (policy ACCEPT)
  60. target prot opt source destination
  61. DOCKER-ISOLATION all -- 0.0.0.0/0 0.0.0.0/0
  62. DOCKER all -- 0.0.0.0/0 0.0.0.0/0
  63. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
  64. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  65. ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
  66. REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-host-prohibited
  67.  
  68. Chain OUTPUT (policy ACCEPT)
  69. target prot opt source destination
  70.  
  71. Chain DOCKER (1 references)
  72. target prot opt source destination
  73.  
  74. Chain DOCKER-ISOLATION (1 references)
  75. target prot opt source destination
  76. RETURN all -- 0.0.0.0/0 0.0.0.0/0
  77.  
  78. Chain OS_FIREWALL_ALLOW (1 references)
  79. target prot opt source destination
  80. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2049
  81. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:4001
  82. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8443
  83. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8444
  84. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:8053
  85. ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:8053
  86. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:24224
  87. ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:24224
  88. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2224
  89. ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:5404
  90. ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:5405
  91. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:9090
  92. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:10250
  93. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:80
  94. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:443
  95. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:10255
  96. ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:10255
  97. ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 state NEW udp dpt:4789
  98. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2379
  99. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2380
  100. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:9000
  101. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2224
  102. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:2224
  103. ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:24224
  104. [root@ip-172-31-33-98 ec2-user]#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement