在ubuntu上运行的apache/应用程序未响应连接请求
我在我的ubuntu系统上运行apache服务器,但当我尝试使用IE、chrome、postman通过windows系统访问时,我得到了错误消息(网站处于联机状态,但未响应连接尝试) 我已经在我的ubuntu系统上完成了tcpdump,下面是我的日志 (10.223.186.65是我的windows系统的ip,10.223.197.177是我的linux系统的ip) wget 10.223.197.177:80(在同一个ubuntu系统中运行良好)在ubuntu上运行的apache/应用程序未响应连接请求,ubuntu,ubuntu-16.04,Ubuntu,Ubuntu 16.04,我在我的ubuntu系统上运行apache服务器,但当我尝试使用IE、chrome、postman通过windows系统访问时,我得到了错误消息(网站处于联机状态,但未响应连接尝试) 我已经在我的ubuntu系统上完成了tcpdump,下面是我的日志 (10.223.186.65是我的windows系统的ip,10.223.197.177是我的linux系统的ip) wget 10.223.197.177:80(在同一个ubuntu系统中运行良好) Apache正在端口80上运行,但我仍然无法在
Apache正在端口80上运行,但我仍然无法在浏览器上获得输出,我尝试了chrome和IE。我在另一个ubuntu系统上有类似的设置,运行良好。我知道问题在我的ubuntu系统上,但无法跟踪。有人能帮我调试我面临的问题吗?有人在任何时候遇到过同样的问题吗?你已经验证了Apache正在运行(通过本地系统的
netstat
和wget
),您已经开始执行数据包捕获,以验证ARP是否正常工作以及TCP数据包是否到达目的地。请竖起大拇指。)
当数据包到达目的地但没有应答时,通常有两个根本原因:
httpd.conf
文件,并确保您的访问控制设置正确。不考虑安全性,它应该是这样的(从默认的CentOS安装):
#此语句将允许每个人访问
#一旦他们能够通过TCP访问web服务器。
要求所有授权
另外,请查看Apache日志(它们可能在
下的httpd.conf
文件中设置,否则它们应该在/var/log/
下的某个位置)。检查尝试连接时是否有任何错误消息-如果有Apache配置阻止访问,您应该在日志中看到它
关于网络,假设您的Apache访问控制设置正确,检查是否有东西在丢弃数据包。查看是否启用了任何防火墙规则:sudo ufw status
。如果您这样做,您可以尝试使用sudoufwdisable
禁用防火墙,这将刷新Ubuntu框中的所有防火墙规则,尽管它们会在重新启动时返回
*为Ubuntu UFW而不是CentOS iptables命令进行编辑。是的,iptable规则有问题。我现在更新了规则,它可以正常工作了
sudo tcpdump -i ens2f0 'port 80'
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on ens2f0, link-type EN10MB (Ethernet), capture size 262144 bytes
18:38:07.437762 IP 10.223.186.65.49279 > 10.223.197.177.http: Flags [S], seq 1024624045, win 65535, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:08.442487 IP 10.223.186.65.49279 > 10.223.197.177.http: Flags [S], seq 1024624045, win 65535, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:10.442214 IP 10.223.186.65.49279 > 10.223.197.177.http: Flags [S], seq 1024624045, win 65535, options [mss 1460,nop,nop,sackOK], length 0
18:38:22.291090 IP 10.223.186.65.49287 > 10.223.197.177.http: Flags [S], seq 4095681508, win 65535, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:23.297443 IP 10.223.186.65.49287 > 10.223.197.177.http: Flags [S], seq 4095681508, win 65535, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:25.297053 IP 10.223.186.65.49287 > 10.223.197.177.http: Flags [S], seq 4095681508, win 65535, options [mss 1460,nop,nop,sackOK], length 0
18:38:33.501498 IP 10.223.186.65.49288 > 10.223.197.177.http: Flags [S], seq 2981170598, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:34.510766 IP 10.223.186.65.49288 > 10.223.197.177.http: Flags [S], seq 2981170598, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:36.511607 IP 10.223.186.65.49288 > 10.223.197.177.http: Flags [S], seq 2981170598, win 8192, options [mss 1460,nop,nop,sackOK], length 0
18:38:39.849683 IP 10.223.186.65.49290 > 10.223.197.177.http: Flags [S], seq 2142699807, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:40.056095 IP 10.223.186.65.49291 > 10.223.197.177.http: Flags [S], seq 2881184651, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:40.562896 IP 10.223.186.65.49292 > 10.223.197.177.http: Flags [S], seq 951667956, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:42.807829 IP 10.223.186.65.49290 > 10.223.197.177.http: Flags [S], seq 2142699807, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:43.056197 IP 10.223.186.65.49291 > 10.223.197.177.http: Flags [S], seq 2881184651, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:43.560534 IP 10.223.186.65.49292 > 10.223.197.177.http: Flags [S], seq 951667956, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0
18:38:48.806808 IP 10.223.186.65.49290 > 10.223.197.177.http: Flags [S], seq 2142699807, win 8192, options [mss 1460,nop,nop,sackOK], length 0
18:38:49.052968 IP 10.223.186.65.49291 > 10.223.197.177.http: Flags [S], seq 2881184651, win 8192, options [mss 1460,nop,nop,sackOK], length 0
18:38:49.568802 IP 10.223.186.65.49292 > 10.223.197.177.http: Flags [S], seq 951667956, win 8192, options [mss 1460,nop,nop,sackOK], length 0
sudo netstat -anp | grep apache
tcp6 0 0 :::5000 :::* LISTEN 6094/apache2
tcp6 0 0 :::80 :::* LISTEN 6094/apache2
tcp6 0 0 :::35357 :::* LISTEN 6094/apache2
unix 2 [ ACC ] STREAM LISTENING 40684 6094/apache2 /var/run/apache2.6094.0.1.sock
unix 2 [ ACC ] STREAM LISTENING 40685 6094/apache2 /var/run/apache2.6094.0.2.sock
unix 2 [ ACC ] STREAM LISTENING 40686 6094/apache2 /var/run/apache2.6094.0.3.sock
unix 2 [ ACC ] STREAM LISTENING 40687 6094/apache2 /var/run/apache2.6094.0.4.sock