Skip to content
This repository has been archived by the owner on Aug 7, 2020. It is now read-only.

Error starting TCP server on port 443 #36

Closed
ghost opened this issue Nov 29, 2014 · 15 comments
Closed

Error starting TCP server on port 443 #36

ghost opened this issue Nov 29, 2014 · 15 comments

Comments

@ghost
Copy link

ghost commented Nov 29, 2014

hey i get this error on most networks " Error starting TCP server on port 443. Check that you have the necessary permissions (i.e. root), no other servers are running and the correct network interface is set in Responder.conf. " and sometimes its a different port. can someone help?

@digininja
Copy link

Do you have permissions, are you running as root?

Is anything else listening on that port? Use netstat -antp to see.
On 29 Nov 2014 16:10, "Zaxscdvf" [email protected] wrote:

hey i get this error on most networks " Error starting TCP server on port
443. Check that you have the necessary permissions (i.e. root), no other
servers are running and the correct network interface is set in
Responder.conf. " and sometimes its a different port. can someone help?


Reply to this email directly or view it on GitHub
#36.

@ghost
Copy link
Author

ghost commented Nov 29, 2014

i am root and i used the command

netstat -antp
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:389 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:3141 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:587 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:143 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:88 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:1433 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 3594/python
tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN 2727/stunnel4
tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 3594/python
tcp 0 0 192.168.1.9:54543 24.244.53.16:80 ESTABLISHED 3311/gnome-panel
tcp 0 1 192.168.69.143:34512 24.244.53.16:80 FIN_WAIT1

@digininja
Copy link

I can see stunnel listening on port 443 so that will stop responder
starting a listener on it.
On 29 Nov 2014 16:59, "Zaxscdvf" [email protected] wrote:

i am root and i used the command

netstat -antp
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:389 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:3141 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:587 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:143 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:88 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:1433 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 3594/python

tcp 0 0 0.0.0.0:443 0.0.0.0:* LISTEN 2727/stunnel4

tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 3594/python

tcp 0 0 192.168.1.9:54543 24.244.53.16:80 ESTABLISHED 3311/gnome-panel
tcp 0 1 192.168.69.143:34512 24.244.53.16:80 FIN_WAIT1


Reply to this email directly or view it on GitHub
#36 (comment).

@ghost
Copy link
Author

ghost commented Nov 29, 2014

how do i stop the stunnel from listening on port 443?

@digininja
Copy link

Shut it down
On 29 Nov 2014 17:04, "Zaxscdvf" [email protected] wrote:

how do i stop the stunnel from listening on port 443?


Reply to this email directly or view it on GitHub
#36 (comment).

@ghost
Copy link
Author

ghost commented Nov 29, 2014

ya what command

@ghost
Copy link
Author

ghost commented Nov 29, 2014

i dont know shit by the way.

@digininja
Copy link

Quick and dirty

kill -9 2727
On 29 Nov 2014 17:07, "Zaxscdvf" [email protected] wrote:

ya what command


Reply to this email directly or view it on GitHub
#36 (comment).

@ghost
Copy link
Author

ghost commented Nov 29, 2014

k thanks

@ghost
Copy link
Author

ghost commented Nov 29, 2014

ah shit didnt work ran the netstat again, so do i have to kill all those then?

Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:389 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:3141 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:587 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:143 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:88 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:1433 0.0.0.0:* LISTEN 3892/python
tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 3892/python
tcp 0 0 192.168.1.9:39855 74.125.25.147:443 ESTABLISHED 3676/iceweasel
tcp 0 0 192.168.1.9:44582 216.58.216.163:443 ESTABLISHED 3676/iceweasel
tcp 0 0 192.168.1.9:41803 192.30.252.88:443 ESTABLISHED 3676/iceweasel
tcp 0 0 192.168.1.9:60129 199.59.150.11:443 ESTABLISHED 3676/iceweasel
tcp 0 0 192.168.1.9:45896 216.58.216.161:443 ESTABLISHED 3676/iceweasel
tcp 0 0 192.168.1.9:47292 192.30.252.128:443 TIME_WAIT -
tcp 0 0 192.168.1.9:37807 74.125.25.94:80 ESTABLISHED 3676/iceweasel
tcp 1 0 192.168.1.9:54543 24.244.53.16:80 CLOSE_WAIT 3311/gnome-panel
tcp 0 0 192.168.1.9:59548 74.125.25.84:443 ESTABLISHED 3676/iceweasel
tcp 0 0 192.168.1.9:45869 54.236.195.137:443 TIME_WAIT -
tcp 0 0 192.168.1.9:60254 74.125.25.94:443 ESTABLISHED 3676/iceweasel
tcp 0 0 192.168.1.9:53289 216.58.216.160:443 ESTABLISHED 3676/iceweasel
tcp 0 0 192.168.1.9:51133 216.58.216.160:80 ESTABLISHED 3676/iceweasel

@digininja
Copy link

The fourth column says what port is being listened on, the number/name at
end is what is listening and it's process ID. With that you can see what is
listening on that port and kill if you want to
On 29 Nov 2014 17:11, "Zaxscdvf" [email protected] wrote:

ah shit didnt work ran the netstat so do i have to kill all those then?

Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:389 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:3141 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:587 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:139 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:110 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:143 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:80 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:21 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:88 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:25 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:1433 0.0.0.0:* LISTEN 3892/python

tcp 0 0 0.0.0.0:445 0.0.0.0:* LISTEN 3892/python

tcp 0 0 192.168.1.9:39855 74.125.25.147:443 ESTABLISHED 3676/iceweasel

tcp 0 0 192.168.1.9:44582 216.58.216.163:443 ESTABLISHED 3676/iceweasel

tcp 0 0 192.168.1.9:41803 192.30.252.88:443 ESTABLISHED 3676/iceweasel

tcp 0 0 192.168.1.9:60129 199.59.150.11:443 ESTABLISHED 3676/iceweasel

tcp 0 0 192.168.1.9:45896 216.58.216.161:443 ESTABLISHED 3676/iceweasel

tcp 0 0 192.168.1.9:47292 192.30.252.128:443 TIME_WAIT -

tcp 0 0 192.168.1.9:37807 74.125.25.94:80 ESTABLISHED 3676/iceweasel

tcp 1 0 192.168.1.9:54543 24.244.53.16:80 CLOSE_WAIT 3311/gnome-panel
tcp 0 0 192.168.1.9:59548 74.125.25.84:443 ESTABLISHED 3676/iceweasel

tcp 0 0 192.168.1.9:45869 54.236.195.137:443 TIME_WAIT -

tcp 0 0 192.168.1.9:60254 74.125.25.94:443 ESTABLISHED 3676/iceweasel

tcp 0 0 192.168.1.9:53289 216.58.216.160:443 ESTABLISHED 3676/iceweasel

tcp 0 0 192.168.1.9:51133 216.58.216.160:80 ESTABLISHED 3676/iceweasel


Reply to this email directly or view it on GitHub
#36 (comment).

@ghost
Copy link
Author

ghost commented Nov 29, 2014

k

@lgandx
Copy link
Contributor

lgandx commented Nov 29, 2014

Closing this issue since it looks like it was resolved. Thx digninja.

@lgandx lgandx closed this as completed Nov 29, 2014
@limited-root
Copy link

my netstat output is:
tcp6 0 0 :::443 :::* LISTEN
how could i kill it to make responder work for ssl?

@hktalent
Copy link

#124 #36 #45

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants