Hi
I have an issue with changing port 80 from FILTERED to OPEN to renew a lets encrypt certificate !
I did all I could and running out of ideas !!! anyone can help ?
from outside network:
nmap -Pn -p80,443 my_ip_adress
PORT STATE SERVICE
80/tcp filtered http
443/tcp open https
1- check if httpd is listening on port 80
ss -tlnp | grep :80
LISTEN 512 51 *:80 : users:((“httpd”,pid=2332,fd=4))
AND
systemctl status httpd
httpd[860]: Server configured, listening on: port 443, port 80
2-check VirtualHost
<VirtualHost *:80>
ServerName MY_DOMAIN
DocumentRoot /var/www/MY_DOMAIN/public_html
ErrorLog /var/log/httpd/error.log
CustomLog /var/log/httpd/requests.log combined
RewriteEngine on
RewriteCond %{SERVER_NAME} = MY_DOMAIN
RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,NE,R=permanent]
3- check hosting provider firewall
edge firewall → disabled
4- iptables configuration
iptables -S
-P INPUT ACCEPT
-P FORWARD DROP
-P OUTPUT ACCEPT
-N DOCKER
-N DOCKER-ISOLATION-STAGE-1
-N DOCKER-ISOLATION-STAGE-2
-N DOCKER-USER
-A FORWARD -j DOCKER-ISOLATION-STAGE-1
-A FORWARD -j DOCKER-USER
-A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -o docker0 -j DOCKER
-A FORWARD -i docker0 ! -o docker0 -j ACCEPT
-A FORWARD -i docker0 -o docker0 -j ACCEPT
-A DOCKER-ISOLATION-STAGE-1 -i docker0 ! -o docker0 -j DOCKER-ISOLATION-STAGE-2
-A DOCKER-ISOLATION-STAGE-1 -j RETURN
-A DOCKER-ISOLATION-STAGE-2 -o docker0 -j DROP
-A DOCKER-ISOLATION-STAGE-2 -j RETURN
-A DOCKER-USER -j RETURN
iptables -L INPUT -v -n
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
5- firewalld configuration
firewall-cmd --list-all
public (active)
target: default
icmp-block-inversion: no
interfaces: eth0
sources:
services: cockpit dhcpv6-client ftp http https ssh
ports: 20-21/tcp 40000-40100/tcp 8080/tcp 8042/tcp 4242/tcp 3306/tcp 3000/tcp 8090/tcp 513/tcp 5222/tcp 5223/tcp 5228/tcp 4443/tcp 5443/tcp 8443/tcp 5000/tcp 80/tcp
protocols:
forward: yes
masquerade: no
forward-ports:
source-ports:
icmp-blocks:
rich rules:
6- SELinux configuration
sestatus
SELinux status: enabled
SELinuxfs mount: /sys/fs/selinux
SELinux root directory: /etc/selinux
Loaded policy name: targeted
Current mode: enforcing
Mode from config file: enforcing
Policy MLS status: enabled
Policy deny_unknown status: allowed
Memory protection checking: actual (secure)
Max kernel policy version: 33
httpd_can_network_connect (on,on) Allow httpd to can network connect
with setenforce 0
same problem !