Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Re: [suse-security] nmap -> 3306/tcp filtered
From: Backhausen, Sven (sbackhausenntcg.de)
Date: Mon Jun 16 2003 - 02:04:42 CDT
Am Sam, 2003-06-14 um 16.47 schrieb Sebastian Rose:
This is normal if your firewall-policy is to drop unwanted packets.
nmap sends a tcp packet with the syn-flag set and expects either an ack
(port is "open") or an reset packet ("closed").
nmap sees that the host is up because port 22 is open but it doesn't
receive anything from port 3306. So, port 3306 is "filtered".
> Hi List,
> I'm using SuSe 8.0 as firewall/gateway. From another location i tried nmap
> checking open ports.
> nmap shows:
> 22/tcp open <-- ok, right...
> 3306/tcp filtered <-- ?
> I did not found any program or process listening or using
> that port... (lsof,netstat,usw.)
> google told me about problems with firewall rules. Using reject means that
> nmap interprets something on that port caused by an SYN-Packet.
> But there is no rule on port 3306 in my handwritten iptables config.
> S. Rose
> Check the headers for your unsubscription address
> For additional commands, e-mail: suse-security-helpsuse.com
> Security-related bug reports go to securitysuse.de, not here
Check the headers for your unsubscription address
For additional commands, e-mail: suse-security-helpsuse.com
Security-related bug reports go to securitysuse.de, not here