Hello guys,
I am running CentOS 5.5 on a dedicated server.
I have looked at following tutorials: http://www.tonybhimani.com/2007/12/31/openfire-jabberxmpp-server-on-centos-mini- howto/
I have followed the following steps.
Install Java jre.
java version "1.6.0_23"
Java™ SE Runtime Environment (build 1.6.0_23-b05)
Java HotSpot™ Client VM (build 19.0-b09, mixed mode, sharing)
Downloaded openfire-3.6.4-1.i386.rpm
Installed it using** rpm -ivh openfire-3.6.4-1.i386.rpm**
Installation successful
Started openfire using: /etc/init.d/openfire start
[root@server bin]# /etc/init.d/openfire start
Starting openfire:
[root@server bin]# /etc/init.d/openfire status
openfire is running
Opened all the required the ports using iptables
RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 5222 --state NEW -j ACCEPT
RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 7777 --state NEW -j ACCEPT
RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 9090 --state NEW -j ACCEPT
RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 9091 --state NEW -j ACCEPT
ran command:** iptables-restore < /etc/sysconfig/iptables**
I even did: service iptables restart
Restarted openfire, and I can verify that it’s running.
daemon 6197 1.6 1.6 213852 34056 ? Sl 11:12 0:05 /opt/openfire/jre/bin/java -server -DopenfireHome=/opt/openfire -Dopenfire.lib.dir=/opt/openfire/lib -classpath /opt/openfire/lib/startup.jar
Check http:// :9090… fails, does not load.
Check open ports using nmap
9090/tcp open zeus-admin
Check http:// :9090 again… fails
Open /opt/openfire/conf/openfire.xml
server ip
Restart openfire…
Check http:// :9090… fails
Have I missed a step? What’s wrong here? I’ve been looking at this for hours…
Please help, thank you in advance.
wroot
January 29, 2011, 1:25pm
#2
zeus-admin on port 9090? Can this be some other program already using this port?
I thought zeus-admin was openfire admin? I am not sure… how do I check/get rid of it
One interesting thing to note, is that it seems I can access http://localhost:9090/index.jsp through ssh… I can tell the server is running, but I can’t access it outside. I guess it’s a firewall issue.
Chain INPUT (policy ACCEPT)
target prot opt source destination
RH-Firewall-1-INPUT all – anywhere anywhere
Chain FORWARD (policy ACCEPT)
target prot opt source destination
RH-Firewall-1-INPUT all – anywhere anywhere
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain RH-Firewall-1-INPUT (2 references)
target prot opt source destination
ACCEPT all – anywhere anywhere
ACCEPT icmp – anywhere anywhere icmp any
ACCEPT esp – anywhere anywhere
ACCEPT ah – anywhere anywhere
ACCEPT udp – anywhere 224.0.0.251 udp dpt:mdns
ACCEPT udp – anywhere anywhere udp dpt:ipp
ACCEPT tcp – anywhere anywhere tcp dpt:ipp
ACCEPT all – anywhere anywhere state RELATED,ESTABLISHED
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:ftp-data
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:ftp
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:ssh
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:smtp
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:domain
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:http
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:pop3
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:imap
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:https
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:smtps
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:imaps
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:pop3s
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:mysql
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:20081
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:20082
ACCEPT udp – anywhere anywhere state NEW udp dpt:domain
REJECT all – anywhere anywhere reject-with icmp-host-prohibited
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:xmpp-client
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:cbt
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:websm
ACCEPT tcp – anywhere anywhere state NEW tcp dpt:xmltec-xmlmail
After commenting out REJECT all – anywhere anywhere reject-with icmp-host-prohibited, I can now successfully connect.
akrherz
February 1, 2011, 11:38pm
#7
Hello,
by doing that, you probably have no firewall. The issue is the ordering I think. Move that reject to the bottom of your ipchains.