Caff,

Akurat som sa zacal snazit riesit security trosku serioznejsie co ma ale prekvapuje ze mi nmap hlasi otvoreny port 1001 na oboch VPSkach obvzlast vzhladdom na iptables rules.

Toto je iptables -L output:

Chain INPUT (policy ACCEPT)
target     prot opt source               destination        
fail2ban-ssh  tcp  --  anywhere             anywhere             multiport dports ssh
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:ssh
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:http
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:https
ACCEPT     tcp  --  anywhere             anywhere             tcp dpt:smtp
DROP       all  --  anywhere             anywhere           

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination        

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination        

Chain fail2ban-ssh (1 references)
target     prot opt source               destination        
DROP       all  --  61.174.51.208        anywhere           
RETURN     all  --  anywhere             anywhere

A toto mi hlasi nmap z lokalneho PC:
Starting Nmap 6.00 ( http://nmap.org ) at 2014-02-15 20:00 CET
Nmap scan report for sifro.co (185.8.164.47)
Host is up (0.058s latency).
Not shown: 995 filtered ports
PORT     STATE SERVICE
22/tcp   open  ssh
25/tcp   open  smtp
80/tcp   open  http
443/tcp  open  https
1001/tcp open  unknown

Nmap done: 1 IP address (1 host up) scanned in 23.22 seconds

Vie mi niekto povedat WTF? resp. co robim zle?

Vdaka