10-29-2007
Error: No Route to host...urgent {socket() connection}
hello,
I am doing Socket programming..
when I am establishing a socket connection using TCP protocol ...I am getting
Error :: No route to host. at the client side during connect() call...........that it is returning -1.
So I thing problem lies here......but what to do now...
So for just checking the connection I am tried with ping and telnet:::
when I am doing ping 192.9.100.113.......... i.e server ip its working fine...
and when using telnet...[root@localhost /]# telnet 192.9.100.113
Trying 192.9.100.113...
telnet: connect to address 192.9.100.113: No route to host
telnet: Unable to connect to remote host: No route to host..
then also same problem
So, where is the problem and how to solve it.....please tell me in detail....
thanks & regards
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
We need to add our remote office to our linux routing table.
Our internal office ip addresses are all in the range of 198.9.200.x
with an subnet mask of 255.255.255.0
the remote office has ip addresses in the range of 192.168.0.0 and also a subnet mask of 255.255.255.0
when i use the... (3 Replies)
Discussion started by: progressdll
3 Replies
2. UNIX for Dummies Questions & Answers
I not able to ping outside the internet. i am able to ping my 192. ip address. when i try to ping a 68. ip address i get no route to host. what should i do to correct this issue. I have sco openserver 5.05 (6 Replies)
Discussion started by: scoman2
6 Replies
3. Red Hat
I get below error when using telnet and ssh ??
Why ? the ip address of linux server is 10.155.25.22 =tstgcota ??
# netstat -rn
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
192.168.75.0 0.0.0.0 255.255.255.0 U 0 0... (6 Replies)
Discussion started by: chuikingman
6 Replies
4. Programming
Hello,
My program should connect to a server. here's the code :
int main(int argc, char *argv){
int sock = socket(AF_INET, SOCK_STREAM, 0);
if(sock == -1){
perror("socket()");
exit(errno);
}
printf("retour socket = %d",sock);
struct sockaddr... (1 Reply)
Discussion started by: nowayy
1 Replies
5. AIX
Hi,
I have a system with network interfaces en0 and en1
en0:
physical ip: 1.1.1.10
virtual ip1: 192.168.100.11
virtual ip2: 192.168.100.12
en1:
physical ip: 1.1.1.20
virtual ip1: 192.168.100.20
virtual ip2: 192.168.100.21
default gateway ist 192.168.100.254
when I open a... (12 Replies)
Discussion started by: funksen
12 Replies
6. IP Networking
I have a unix machine that operates some CNC machines, I need to hook up my windows machine through core ftp to load programs onto the box.
The card i need to route to for the FTP on unix is tu1
I need to check the routing tables on the unix box to see which IP address will automatically... (2 Replies)
Discussion started by: moticulus
2 Replies
7. UNIX for Dummies Questions & Answers
A linux box is supposed to emailing the results of backups to the windows exchange server, but nothing arrives. it never has, as the muppet who set up the Windows domain knew nothing about linux. I know only slightly more than that...
pretty sure sendmail is the daemon running to handle mail. it... (0 Replies)
Discussion started by: Noewon
0 Replies
8. UNIX for Advanced & Expert Users
Hi,
I have installed RHEL4 using vmware workstation..
Host OS: Windows XP
Guest OS: RHEL4
Pls refer step 17 & 18 in below link...
ORACLE-BASE - Red Hat Enterprise Linux 4 and Centos 4 Installation
1) If i choose to assign IP automatically (using DHCP) means, i am able to connect RHEL4... (3 Replies)
Discussion started by: thomasraj87
3 Replies
9. Red Hat
Hi All,
I am new to Redhat Enterprise Linux 6 version. I am facing an issue with my lab server which is having RHEL6
lab1:root> uname -a
Linux lab1 2.6.32-358.18.1.el6.x86_64 #1 SMP Fri Aug 2 17:04:38 EDT 2013 x86_64 x86_64 x86_64 GNU/Linux
I am getting this error for every 18 minutes 30... (0 Replies)
Discussion started by: go2suresh1979
0 Replies
10. Shell Programming and Scripting
In program, I want to telnet the ports present in telnet.txt file and capture screenshot of open port which is opened on new terminal.
Problems:
Escape character is '^]' and Connection closed by foreign host.
Loop is not working properly. It only take one ports and closed the connection.
... (9 Replies)
Discussion started by: sk151993
9 Replies
LEARN ABOUT DEBIAN
sa-check_spamd
SA-CHECK_SPAMD.RAW(1) User Contributed Perl Documentation SA-CHECK_SPAMD.RAW(1)
NAME
sa-check_spamd - spamd monitoring script for use with Nagios, etc.
SYNOPSIS
sa-check_spamd [options]
Options:
-c secs, --critical=secs Critical ping response threshold
-h, -?, --help Print usage message
-H hostname, --hostname=hostname Hostname of spamd service to ping
-p port, --port=port Port of spamd service to ping
--socketpath=path Connect to given UNIX domain socket
-t secs, --timeout=secs Max time to wait for a ping response
-v, --verbose Verbose debug output
-V, --version Output version info
-w secs, --warning=secs Warning ping response threshold
DESCRIPTION
The purpose of this program is to provide a tool to monitor the status of "spamd" server processes. spamd is the daemonized version of the
spamassassin executable, both provided in the SpamAssassin distribution.
This program is designed for use, as a plugin, with the Nagios service monitoring software available from http://nagios.org. It might be
compatible with other service monitoring packages. It is also useful as a command line utility or as a component of a custom shell script.
OPTIONS
Options of the long form can be shortened as long as the remain unambiguous (i.e. --host can be used instead of --hostname).
-c secs, --critical=secs
Critical ping response threshold in seconds. If a spamd ping response takes longer than the value specified (in seconds) the program
will exit with a value of 2 to indicate the critical status.
This value must be at least as long as the value specified for warning and less than the value specified for timeout.
-h, -?, --help
Prints this usage message and exits.
-H hostname, --hostname=hostname
The hostname, or IP address, of the spamd service to ping. By default the hostname localhost is used. If --socketpath is set this
value will be ignored.
-p port, --port=port
The port of the spamd service to ping. By default port 783 (the spamd default port number) is used. If --socketpath is set this value
will be ignored.
--socketpath=path
Connect to given UNIX domain socket. Use instead of a hostname and TCP port. When set, any hostname and TCP port specified will be
ignored.
-t secs, --timeout=secs
The maximum time to wait for a ping response. Once exceeded the program will exit with a value of 2 to indicate the critical status.
The default timeout value is 45 seconds. The timeout must be no less than 1 second.
This value must be greater than the values specified for both the critical and warning values.
-v, --verbose
Display verbose debug output on STDOUT.
-V, --version
Display version info on STDOUT.
-w secs, --warning=secs
Warning ping response threshold in seconds. If a spamd ping response takes longer than the value specified (in seconds), and does not
exceed the critical threshold value, the program will exit with a value of 1 to indicate the warning staus.
This value must be no longer than the value specified for critical and less than the value specified for timeout.
EXIT CODES
The program will indicate the status of the spamd process being monitored by exiting with one of these values:
0 OK: A spamd ping response was received within all threshold times.
1 WARNING: A spamd ping response exceeded the warning threshold but not the critical threshold.
2 CRITICAL: A spamd ping response exceeded either the critical threshold or the timeout value.
3 UNKNOWN: An error, probably caused by a missing dependency or an invalid configuration parameter being supplied, occurred in the
sa-check_spamd program.
SEE ALSO
spamc(1) spamd(1) spamassassin(1)
PREREQUISITES
"Mail::SpamAssassin" version 3.1.1 or higher (3.1.6 or higher recommended)
AUTHOR
Daryl C. W. O'Shea, DOS Technologies <spamassassin@dostech.ca>
LICENSE
sa-check_spamd is distributed under the Apache License, Version 2.0, as described in the file "LICENSE" included with the Apache
SpamAssassin distribution and available at http://www.apache.org/licenses/LICENSE-2.0
perl v5.14.2 2014-02-14 SA-CHECK_SPAMD.RAW(1)