Solved

Ports question

Posted on 2009-07-11
2
195 Views
Last Modified: 2012-05-07
Hello!
I want to double check something...If I have a CLOSED port 113...would it mean that noone can connect to me using that port even if they try?If so-then I have nothing to worry about,right?
I run a web and mail server on my PC...Is there any NEED for port 113 NOT being stealth?
And should I stealth port 113 or just leave it closed?
0
Comment
Question by:abrodski
2 Comments
 
LVL 6

Accepted Solution

by:
microbolt earned 500 total points
ID: 24833295
You can safely ignore it showing as closed.

Port 113 is often left visible by firewalls since 113 is the IDENT port.

IDENT is used when you connect to mail servers, or to IRC servers, to find out "who" is using the service. With IDENT filtered, your ISP mail server (unlikely) or IRC server (likely) may refuse your request or take a long time to respond as it waits for a closed/open response.

It is possible to remove IDENTD as showing up as a port by reconfiguring your firewall to over-ride the default rules. As above, if IDENTD is filtered in this way, IRC and mail servers may not work properly.

You can also decide that IDENTD is safe, since just having it visible does not mean there is anything that can be exploited on your side, and live with the less than "perfect" results.
0
 
LVL 12

Expert Comment

by:Steve
ID: 24833315
to check which ports you have open on your machine use GRC's port checking application :

https://www.grc.com/x/ne.dll?bh0bkyd2

it will test the common ports and report what is open and what isnt..

but you are correct.. 113 is NOT required for mail..

0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now