Airport Router Ports Not Stealthed

Ever since I updated my Airport Base Station with the latest firmware update "AirPort Base Station and Time Capsule Firmware Update 7.6.3, whenever I do a port scan with Shields Up via GRC.com to test the integrity of my Router Firewall, almost all of my ports show as closed, not stealthed. Whereas prior to this update all of my ports showed as stealthed. I have reset my AEBS on a few occasions and still the same issue. Oh, this issue is not limited to just my router. A few of my friends are having the same issue after they updated their Aiport Routers with this firmware update. Does anybody have any suggestions on how I should handle this or how I can notify Apple of this issue? Any help would be greatly appreciated. Thanks!!

Airport Extreme Base Station-OTHER

Posted on Mar 13, 2013 10:04 PM

Reply
11 replies

Mar 14, 2013 8:22 AM in response to Hobodork

I have the same problem. I was very pleased in the past to see that the whole display was green - meaning every port was stealthed. But after the update to 7.6.3 there are many blue ports - meaning they are closed.


Does anyone know why these changed? Is it possible to downgrade the firmware to get back to all green?


Thanks.

Mar 14, 2013 8:50 AM in response to Hobodork

You can revert to a previous firmware version temporarily. Do that and run the test again.


I am at a loss to explain since this is what I see while running Firmware 7.6.1 on my AEBS:


User uploaded file


User uploaded file


I am curious to know what changes downgrading results in for you, since it made no change in the Shields Up test that I could observe.


As far as I know Apple never offered "stealth mode" for any AEBS, and the only comment I recall reading was that they were not interested in implementing the feature. Where do you find it in AirPort Utility?

Mar 14, 2013 9:17 AM in response to John Galt

Hi John,

Airport Routers never offered an On/Off switch for Stealth mode. But whenever I used the standard/default setup for NAT, the port scan from Shields Up always showed the ports as Stealthed. And if it helps, i am using the lastest generation of the Airport Extreme Base Station. Also, I did try the downgrade bit but I got the same results as you did. Most of my ports show as closed vs stealthed in version 7.6.1. Something about the 7.6.3 update has changed everything even if I migrate back to 7.6.1. This stinks because it has always been stressed that we need to keep our Mac's updated across the board, Yet firmware 7.6.3 has messed the NAT firewall. Anyone know how I can get in touch with Apple directly to notify them of this issue?

Mar 14, 2013 9:26 AM in response to Hobodork

Thanks. The results I showed are also using the latest AEBS, but if you downgrade the firmware it stands to reason whatever functions you enjoyed in the past would be restored.


This is a mystery. Send Apple your feedback. They definitely read Feedback submissions, but you will not get a response, and as I wrote the last I heard was that this feature will not be implemented.


Try contacting Steve Gibson. He might have an explanation and there is a chance you will get one from him vs. none from Apple. If he does please post a follow-up.

Mar 28, 2013 8:35 AM in response to Hobodork

I had the same problem as you with my Airport Extreme Base station. When I was on 7.6.1, all of the service ports showed a stealth status. When I updated to 7.6.3 firmware, most of the ports reported closed instead of stealth (I would say 95% closed is a good guesstimate). I rolled back to the 7.6.1 firmware, and now the ports are back to showing stealth again. I noticed in another thread that even when you rolled back to 7.6.1 that your ports are still showing closed...not stealth. Weird.


One difference might be in my particular setup: I have set a default host IP address to a non-existent IP address (which essentially will forward all non-solicited requests to that IP address, and force a non-response to those unsolicited requests). I use this to keep my AEBS from responding to ping requests. To do this in Airport Utility, go to Network Tab, click on 'Network Options' and in the field for the default host, type in an IP address that is outside the DHCP range of addresses.


Hope this helps.

May 8, 2013 3:08 PM in response to Hobodork

I thought I'd mention this because I've seen the confusion between the Airport firmware upgrade and loss of stealth in ShieldsUP! in a couple of threads.


Steve recently changed the way ShieldsUP! detects stealth. It now detects an ICMP Destination Ureachable returned message and, argueably correctly, interprets the port as Closed rather than Stealth.


Steve also mentioned on today's Security Now (#403) that you might see wierd results because some routers out there on may drop ICMP packets if too many are received too frequently.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Airport Router Ports Not Stealthed

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.