Results from a port scan, I'm a little confused...

InlineFive

Diamond Member
Sep 20, 2003
9,599
2
0
I just ran a quick scan with nmap on my work firewall for the heck of it and all of the UDP ports came up as open|filtered. Is this normal and are they really stealthed?
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
IIRC, filtered means stealthed. I never worry much about that, I hope for "closed" results.
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
I just ran a quick scan with nmap on my work firewall for the heck of it and all of the UDP ports came up as open|filtered. Is this normal and are they really stealthed?

What kind of firewall is it? I remember the instructor at SANS this year talking about older versions of some firewalls that would basically open every port to do their proxy thing, so a port scan would show everything open and the firewall company was just like "yea, so?". I don't think that's true any more, but you never know if you're running something like a Checkpoint.

Are you scanning from inside our outside, that would make a big diff.

Not that much of a difference. Sure more things would be open, hopefully just a few like http proxy, ssh, ftp, maybe ntp, but it definately shouldn't include ALL UDP ports.
 

InlineFive

Diamond Member
Sep 20, 2003
9,599
2
0
Originally posted by: Nothingman
What kind of firewall is it? I remember the instructor at SANS this year talking about older versions of some firewalls that would basically open every port to do their proxy thing, so a port scan would show everything open and the firewall company was just like "yea, so?". I don't think that's true any more, but you never know if you're running something like a Checkpoint.

Brand spanking new Sonicwall TZ-170. The only WAN acception is port 443 to my IP only for remote management.

I'm thinking that coming up as open|filtered might be standard speech in nmap for stealthed as I was scanning a friends's router yesterday and it had the same result.
 

Nothinman

Elite Member
Sep 14, 2001
30,672
0
0
I'm thinking that coming up as open|filtered might be standard speech in nmap for stealthed as I was scanning a friends's router yesterday and it had the same result.

Possibly, UDP has no connection information like TCP so basically you just send a packet and listen for an ICMP unreachable message back and if you don't get one you mark it down as open or filtered since you got no reply saying it was closed. I didn't think nmap showed them by default thought.