Nmap Development mailing list archives
Re: Port state nmap
From: Daniel Miller <bonsaiviking () gmail com>
Date: Tue, 1 Jul 2014 07:09:30 -0500
On Fri, Jun 27, 2014 at 8:36 AM, Maurice Sanders <m.sanders () i-fourc com> wrote:
Hi, I read in the documentation about the port states. Eg I have te following closed port when accessing a server from the outside: 119/tcp closed nntp System administrator says the port is blocked on the FW, but according your documentation the port is still accessible, only no application is listening to it. Can you give me some more details/info. Met vriendelijke groet / With kind regards, [cid:image008.jpg@01CF7441.586BCDB0]< http://www.i-fourc.nl/users/maurice-sanders>
Maurice, The "closed" port state indicates that a RST was received in response to a SYN packet to that port, but it does not necessarily follow that the RST originated from the host that you are scanning. A firewall could send the response on its behalf, preventing access to the host on that port. In other words, a firewall does not always simply drop traffic, but sometimes responds in order to stop communication. The response could also have been an ICMP message (e.g. Port Unreachable or Administratively Prohibited). If you know of a port that is open to the host, you can check which ports the firewall is blocking in this manner by using the firewalk NSE script ( http://nmap.org/nsedoc/scripts/firewalk.html) or by checking Nmap's XML output for the reason_ttl attribute, which shows how many hops were left on the response packet when it arrived; if some packets have higher TTLs, then they were sent by a closer system, i.e. a firewall between you and the scanned host. Dan _______________________________________________ Sent through the dev mailing list http://nmap.org/mailman/listinfo/dev Archived at http://seclists.org/nmap-dev/
Current thread:
- Port state nmap Maurice Sanders (Jul 01)
- Re: Port state nmap Daniel Miller (Jul 01)
