This site was blocked.
<p class="status-desc
| HTTPOptions:
| HTTP/1.0 404 Not Found
| Content-Length: 9
| Content-Type: text/plain
| Date: Wed, 20 Nov 2019 21:17:38 GMT
| Found
| RTSPRequest:
| HTTP/1.1 404 Not Found
| Content-Length: 9
| Content-Type: text/plain
| Date: Wed, 20 Nov 2019 21:17:38 GMT
| Found
| SIPOptions:
| HTTP/1.1 404 Not Found
| Content-Length: 9
| Content-Type: text/plain
| Date: Wed, 20 Nov 2019 21:17:33 GMT
| Found
2 services unrecognized despite returning data. If you know the service/version, please submit the following fingerprints at
Nmap Fingerprint Submitter 2.0 :
==============NEXT SERVICE FINGERPRINT (SUBMIT INDIVIDUALLY)==============
SF-Port5000-TCP:V=7.70%I=7%D=11/20%Time=5DD5AD6D%P=arm-unknown-linux-gnuea
...
SF:20404\x20Not\x20Found\r\nContent-Length:\x209\r\nContent-Type:\x20text/
SF:plain\r\nDate:\x20Wed,\x2020\x20Nov\x202019\x2021:17:38\x20GMT\r\n\r\nN
SF:ot\x20Found");
Device type: general purpose
Running: Linux 3.X|4.X
OS CPE: cpe:/o:linux:linux_kernel:3 cpe:/o:linux:linux_kernel:4
OS details: Linux 3.2 - 4.9
Network Distance: 1 hop
TRACEROUTE (using port 23/tcp)
HOP RTT ADDRESS
1 17.19 ms modemcable016.228-59-74.mc.videotron.ca (74.59.228.16)
OS and Service detection performed. Please report any incorrect results at Nmap OS/Service Fingerprint and Correction Submission Page .
Nmap done: 1 IP address (1 host up) scanned in 126.60 seconds
root@raspberrypi:/home/urouser#
Netstat plunt
netstat -plunt | egrep '80'
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 913/apache2
root@raspberrypi:/home/urouser# sudo netstat -plunt | egrep '443'
tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN 913/apache2
root@raspberrypi:/home/urouser#
sudo iptables -nL
Chain INPUT (policy DROP)
target prot opt source destination
ufw-before-logging-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-before-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-logging-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-reject-input all -- 0.0.0.0/0 0.0.0.0/0
ufw-track-input all -- 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP)
target prot opt source destination
ufw-before-logging-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-before-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-logging-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-reject-forward all -- 0.0.0.0/0 0.0.0.0/0
ufw-track-forward all -- 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
ufw-before-logging-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-before-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-after-logging-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-reject-output all -- 0.0.0.0/0 0.0.0.0/0
ufw-track-output all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-before-logging-input (1 references)
target prot opt source destination
Chain ufw-before-logging-output (1 references)
target prot opt source destination
Chain ufw-before-logging-forward (1 references)
target prot opt source destination
Chain ufw-before-input (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
ufw-logging-deny all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
DROP all -- 0.0.0.0/0 0.0.0.0/0 ctstate INVALID
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 12
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp spt:67 dpt:68
ufw-not-local all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT udp -- 0.0.0.0/0 224.0.0.251 udp dpt:5353
ACCEPT udp -- 0.0.0.0/0 239.255.255.250 udp dpt:1900
ufw-user-input all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-before-output (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
ufw-user-output all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-before-forward (1 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 3
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 11
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 12
ACCEPT icmp -- 0.0.0.0/0 0.0.0.0/0 icmptype 8
ufw-user-forward all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-after-input (1 references)
target prot opt source destination
ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:137
ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:138
ufw-skip-to-policy-input tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:139
ufw-skip-to-policy-input tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:445
ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:67
ufw-skip-to-policy-input udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:68
ufw-skip-to-policy-input all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
Chain ufw-after-output (1 references)
target prot opt source destination
Chain ufw-after-forward (1 references)
target prot opt source destination
Chain ufw-after-logging-input (1 references)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-after-logging-output (1 references)
target prot opt source destination
Chain ufw-after-logging-forward (1 references)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10 LOG flags 0 level 4 prefix "[UFW BLOCK] "
Chain ufw-reject-input (1 references)
target prot opt source destination
Chain ufw-reject-output (1 references)
target prot opt source destination
Chain ufw-reject-forward (1 references)
target prot opt source destination
Chain ufw-track-input (1 references)
target prot opt source destination
Chain ufw-track-output (1 references)
target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 ctstate NEW
Chain ufw-track-forward (1 references)
target prot opt source destination
Chain ufw-logging-deny (2 references)
...
Chain ufw-not-local (1 references)
target prot opt source destination
RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type LOCAL
RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type MULTICAST
RETURN all -- 0.0.0.0/0 0.0.0.0/0 ADDRTYPE match dst-type BROADCAST
ufw-logging-deny all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 10
DROP all -- 0.0.0.0/0 0.0.0.0/0
Chain ufw-user-input (1 references)
target prot opt source destination
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:22
ACCEPT udp -- 0.0.0.0/0 0.0.0.0/0 udp dpt:22
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:80
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 tcp dpt:443
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 multiport dports 80,443 /* 'dapp_WWW%20Full' */
Chain ufw-user-output (1 references)
target prot opt source destination
Chain ufw-user-forward (1 references)
target prot opt source destination
Chain ufw-user-logging-input (0 references)
target prot opt source destination
Chain ufw-user-logging-output (0 references)
target prot opt source destination
Chain ufw-user-logging-forward (0 references)
target prot opt source destination
Chain ufw-user-limit (0 references)
target prot opt source destination
LOG all -- 0.0.0.0/0 0.0.0.0/0 limit: avg 3/min burst 5 LOG flags 0 level 4 prefix "[UFW LIMIT BLOCK] "
REJECT all -- 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
Chain ufw-user-limit-accept (0 references)
target prot opt source destination
ACCEPT all -- 0.0.0.0/0 0.0.0.0/0
sudo ufw status
Status: active
To Action From
22 ALLOW Anywhere
80/tcp ALLOW Anywhere
443/tcp ALLOW Anywhere
WWW Full ALLOW Anywhere
22 (v6) ALLOW Anywhere (v6)
80/tcp (v6) ALLOW Anywhere (v6)
443/tcp (v6) ALLOW Anywhere (v6)
WWW Full (v6) ALLOW Anywhere (v6)
curl -vIL http://uroflowcanada.ddns.net
- Expire in 0 ms for 6 (transfer 0x604880)
...
- Expire in 50 ms for 1 (transfer 0x604880)
- Trying 74.59.228.16...
- TCP_NODELAY set
- Expire in 200 ms for 4 (transfer 0x604880)
- Connected to uroflowcanada.ddns.net (74.59.228.16) port 80 (#0)
HEAD / HTTP/1.1
Host: uroflowcanada.ddns.net
User-Agent: curl/7.64.0
Accept: /
< HTTP/1.1 200 OK
HTTP/1.1 200 OK
< Date: Wed, 20 Nov 2019 21:39:25 GMT
Date: Wed, 20 Nov 2019 21:39:25 GMT
< Server: Apache/2.4.38 (Raspbian)
Server: Apache/2.4.38 (Raspbian)
< Last-Modified: Mon, 18 Nov 2019 17:44:27 GMT
Last-Modified: Mon, 18 Nov 2019 17:44:27 GMT
< ETag: "c6-597a27fc0a42c"
ETag: "c6-597a27fc0a42c"
< Accept-Ranges: bytes
Accept-Ranges: bytes
< Content-Length: 198
Content-Length: 198
<
-
Connection #0 to host uroflowcanada.ddns.net left intact
root@raspberrypi:/home/urouser# curl -vIL https://uroflowcanada.ddns.net
-
Expire in 0 ms for 6 (transfer 0x37b880)
...
-
Expire in 50 ms for 1 (transfer 0x37b880)
-
Trying 74.59.228.16...
-
TCP_NODELAY set
-
Expire in 200 ms for 4 (transfer 0x37b880)
-
connect to 74.59.228.16 port 443 failed: Connection refused
-
Failed to connect to uroflowcanada.ddns.net port 443: Connection refused
-
Closing connection 0
curl: (7) Failed to connect to uroflowcanada.ddns.net port 443: Connection refused
root@raspberrypi:/home/urouser#
curl -vIL https://localhost
-
Expire in 0 ms for 6 (transfer 0x8ce880)
-
Trying ::1...
-
TCP_NODELAY set
-
Expire in 149990 ms for 3 (transfer 0x8ce880)
-
Expire in 200 ms for 4 (transfer 0x8ce880)
-
connect to ::1 port 443 failed: Connection refused
-
Trying 127.0.0.1...
-
TCP_NODELAY set
-
Expire in 149984 ms for 3 (transfer 0x8ce880)
-
Connected to localhost (127.0.0.1) port 443 (#0)
-
ALPN, offering h2
-
ALPN, offering http/1.1
-
successfully set certificate verify locations:
-
CAfile: none
CApath: /etc/ssl/certs
-
TLSv1.3 (OUT), TLS handshake, Client hello (1):
-
TLSv1.3 (IN), TLS handshake, Server hello (2):
-
TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
-
TLSv1.3 (IN), TLS handshake, Certificate (11):
-
TLSv1.3 (IN), TLS handshake, CERT verify (15):
-
TLSv1.3 (IN), TLS handshake, Finished (20):
-
TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
-
TLSv1.3 (OUT), TLS handshake, Finished (20):
-
SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
-
ALPN, server accepted to use http/1.1
-
Server certificate:
-
subject: CN=uroflowcanada.ddns.net
-
start date: Nov 12 17:52:07 2019 GMT
-
expire date: Feb 10 17:52:07 2020 GMT
-
subjectAltName does not match localhost
-
SSL: no alternative certificate subject name matches target host name 'localhost'
-
Closing connection 0
curl: (60) SSL: no alternative certificate subject name matches target host name 'localhost'
More details here: curl - SSL CA Certificates
curl failed to verify the legitimacy of the server and therefore could not
establish a secure connection to it. To learn more about this situation and
how to fix it, please visit the web page mentioned above.
root@raspberrypi:/home/urouser#