Am Sam, 2003-06-14 um 16.47 schrieb Sebastian Rose: This is normal if your firewall-policy is to drop unwanted packets. nmap sends a tcp packet with the syn-flag set and expects either an ack (port is "open") or an reset packet ("closed"). nmap sees that the host is up because port 22 is open but it doesn't receive anything from port 3306. So, port 3306 is "filtered". Sven
Hi List,
I'm using SuSe 8.0 as firewall/gateway. From another location i tried nmap checking open ports.
nmap shows: 22/tcp open <-- ok, right... 3306/tcp filtered <-- ?
I did not found any program or process listening or using that port... (lsof,netstat,usw.)
google told me about problems with firewall rules. Using reject means that nmap interprets something on that port caused by an SYN-Packet. But there is no rule on port 3306 in my handwritten iptables config.
Regards S. Rose
-- Check the headers for your unsubscription address For additional commands, e-mail: suse-security-help@suse.com Security-related bug reports go to security@suse.de, not here