![]() Ssh: connect to host port 80: Cannot assign requested ssh -p 80 -v -oConnectTimeout=5ĭebug1: connect to address 142.250.184.142 port 80: Connection timed outĭebug1: connect to address 2a00:1450:4017:80c::200e port 80: Cannot assign requested address Ssh_exchange_identification: Connection closed by remote ssh -p 80 -v -oConnectTimeout=3ĭebug1: connect to address 2a00:1450:4017:80b::200e port 80: Cannot assign requested address Ssh: connect to host port 80: Cannot assign requested ssh -p 80 ![]() Ssh: connect to host port 23: Cannot assign requested ssh -oConnectTimeout=3 -v -p 80ĭebug1: Connecting to port 80.ĭebug1: connect to address 172.217.169.206 port 80: Connection timed outĭebug1: connect to address 2a00:1450:4017:807::200e port 80: Cannot assign requested address OpenSSH_7.9p1 Debian-10+deb10u2, OpenSSL 1.1.1g ĭebug1: Connecting to port 23.ĭebug1: connect to address 172.217.169.206 port 23: Connection timed outĭebug1: connect to address 2a00:1450:4017:80b::200e port 23: Cannot assign requested address Google / Yahoo search /home ]# ssh -oConnectTimeout=3 -v -p 23 ![]() As often this is useful, if you don't have access to the CISCO / Juniper or other (networ) / firewall equipment which is setting the boundaries and security port restrictions between networks and servers.īelow is example on how to use ssh client to test port connectivity to lets say the Internet, i.e. If you're lucky to have the ssh onboard you can use telnet in same manner as netcat or the swiss army knife (nmap) network mapper tool to test whether remote service TCP / port is opened or not. ![]() I do have experience with such environments myself and thus it is pretty daunting stuff so in best case you can use something like a simple ssh client if you're lucky and the CentOS / Redhat / Suse Linux whatever distro has openssh-client package installed. If you work on PCI high security environment servers in isolated local networks where each package installed on the Linux / Unix system is of importance it is pretty common that some basic stuff are not there in most cases it is considered a security hole to even have a simple telnet installed on the system. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |