Solved

Ports question

Posted on 2009-07-11
2
199 Views
Last Modified: 2012-05-07
Hello!
I want to double check something...If I have a CLOSED port 113...would it mean that noone can connect to me using that port even if they try?If so-then I have nothing to worry about,right?
I run a web and mail server on my PC...Is there any NEED for port 113 NOT being stealth?
And should I stealth port 113 or just leave it closed?
0
Comment
Question by:abrodski
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
microbolt earned 500 total points
ID: 24833295
You can safely ignore it showing as closed.

Port 113 is often left visible by firewalls since 113 is the IDENT port.

IDENT is used when you connect to mail servers, or to IRC servers, to find out "who" is using the service. With IDENT filtered, your ISP mail server (unlikely) or IRC server (likely) may refuse your request or take a long time to respond as it waits for a closed/open response.

It is possible to remove IDENTD as showing up as a port by reconfiguring your firewall to over-ride the default rules. As above, if IDENTD is filtered in this way, IRC and mail servers may not work properly.

You can also decide that IDENTD is safe, since just having it visible does not mean there is anything that can be exploited on your side, and live with the less than "perfect" results.
0
 
LVL 12

Expert Comment

by:Steve
ID: 24833315
to check which ports you have open on your machine use GRC's port checking application :

https://www.grc.com/x/ne.dll?bh0bkyd2

it will test the common ports and report what is open and what isnt..

but you are correct.. 113 is NOT required for mail..

0

Featured Post

Now Available: Firebox Cloud for AWS and FireboxV

Firebox Cloud brings the protection of WatchGuard’s leading Firebox UTM appliances to public cloud environments. It enables organizations to extend their security perimeter to protect business-critical assets in Amazon Web Services (AWS).

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
google exe file 5 156
wild fly 8 startup error 2 42
TLS 1.0 & Windows 7 - How to disable? 16 124
Windows 10 GUEST Account 10 24
The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question