OK - this is really strange. So it looks like the requests ARE getting to the machine in questions.
I started the tcpdump running on the machine that I can't get to, and then tried to ssh to it from another machine. Here is what I got:
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on en1, link-type EN10MB (Ethernet), capture size 65535 bytes
21:35:58.418821 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [P.], seq 2643580038:2643580086, ack 244818113, win 65535, options [nop,nop,TS val 1031800779 ecr 570693060], length 48
21:35:58.570763 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [P.], seq 48:96, ack 1, win 65535, options [nop,nop,TS val 1031800780 ecr 570693060], length 48
21:35:58.717140 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [P.], seq 0:96, ack 1, win 65535, options [nop,nop,TS val 1031800781 ecr 570693060], length 96
21:35:58.922653 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [P.], seq 96:144, ack 1, win 65535, options [nop,nop,TS val 1031800784 ecr 570693060], length 48
21:35:59.097116 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [.], ack 49, win 65535, options [nop,nop,TS val 1031800785 ecr 570693491], length 0
Obviously there is more, but I presume you were really just wondering if the packets were getting there.
Just a simple ping from another machine generated this:
21:42:27.267131 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [.], ack 5457, win 65535, options [nop,nop,TS val 1031804664 ecr 570697363], length 0
21:42:27.271214 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [.], ack 5553, win 65535, options [nop,nop,TS val 1031804664 ecr 570697363], length 0
21:42:28.254981 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [.], ack 5633, win 65535, options [nop,nop,TS val 1031804674 ecr 570697373], length 0
21:42:29.264729 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [.], ack 5713, win 65535, options [nop,nop,TS val 1031804684 ecr 570697383], length 0
21:42:30.273959 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [.], ack 5793, win 65535, options [nop,nop,TS val 1031804694 ecr 570697393], length 0
21:42:31.284764 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [.], ack 5873, win 65535, options [nop,nop,TS val 1031804704 ecr 570697403], length 0
21:42:31.774844 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [P.], seq 5568:5616, ack 5873, win 65535, options [nop,nop,TS val 1031804709 ecr 570697403], length 48
21:42:31.786414 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [.], ack 5921, win 65535, options [nop,nop,TS val 1031804709 ecr 570697410], length 0
21:42:31.789495 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [.], ack 6065, win 65535, options [nop,nop,TS val 1031804709 ecr 570697410], length 0
21:42:31.790608 IP 192.168.1.52.4414 > 192.168.1.71.ssh: Flags [.], ack 6129, win 65535, options [nop,nop,TS val 1031804710 ecr 570697410], length 0
The machine doing the pinging was receiving the response:
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
Does this help at all? I assume that at this point we can conclude that the traffic is being
actively refused as opposed to not getting there.
Confusing since there is no firewall enabled.