Stealthing problems

Discussion in 'other firewalls' started by Diprivan, Jul 29, 2007.

Thread Status:
Not open for further replies.
  1. Diprivan

    Diprivan Registered Member

    Joined:
    Mar 25, 2006
    Posts:
    66
    I am connected to broadband and using a D-Link DSL-502T modem router. I also have ZAP 7.0 installed.
    I have just done the ShieldsUp test with the following results:
    GRC Port Authority Report created on UTC: 2007-07-29 at 21:39:02

    Results from scan of ports: 0, 21-23, 25, 79, 80, 110, 113,
    119, 135, 139, 143, 389, 443, 445,
    1002, 1024-1030, 1720, 5000

    0 Ports Open
    19 Ports Closed
    7 Ports Stealth
    ---------------------
    26 Ports Tested

    NO PORTS were found to be OPEN.

    Ports found to be STEALTH were: 0, 21, 79, 119, 389, 1720, 5000

    Other than what is listed above, all ports are CLOSED.

    TruStealth: FAILED - NOT all tested ports were STEALTH,
    - NO unsolicited packets were received,
    - NO Ping reply (ICMP Echo) was received.

    Why are so many ports unstealthed? Should I be concerned? What do I need to do to pass ShieldsUP?
    Thanks
     
  2. TopperID

    TopperID Registered Member

    Joined:
    Oct 1, 2004
    Posts:
    1,527
    Location:
    London
    If you made sure you were not granting server rights in ZAP's program control section and disconnected your Router's FW, you should pass all the stealth tests.

    But if you have a hardware FW in your router you will be testing that at ShieldsUp and not ZAP. So you need to look at your router's configuration.
     
  3. Kerodo

    Kerodo Registered Member

    Joined:
    Oct 5, 2004
    Posts:
    7,779
    As long as none of them show up as OPEN, then there really is no problem. However, with the router, and ZA on top of that, you should be showing stealth. Not sure what's going on there, something to investigate I guess, but no cause for alarm. CLOSED is secure...
     
  4. Diprivan

    Diprivan Registered Member

    Joined:
    Mar 25, 2006
    Posts:
    66
    Just had a reply from D-Link:

    'Having performed this test on the DSL-502T Generation II we have found
    the same situation. I have escalated this situation to the correct
    personnel, which could be corrected in the future firmware releases.
    Ways in which you can stealth are to try entering in non existent IP
    Address on your Network to the DMZ port'.

    Looks like I will be in the market for a new router!
     
  5. zapjb

    zapjb Registered Member

    Joined:
    Nov 15, 2005
    Posts:
    3,517
    Location:
    USA - Back in a real State in time for a real Pres
    Hard to believe D-Link is that careless. Careless enough to have a product or CSR reporting those results.
     
  6. beads

    beads Registered Member

    Joined:
    Jun 1, 2005
    Posts:
    49
    If it really bothers you block those really obvious ports like 137-139, et. al. at the broadband router. There really is no real reason that you'd need them in the first place with a home setup.
     
Loading...
Thread Status:
Not open for further replies.