Solved

Ports question

Posted on 2009-07-11
2
201 Views
Last Modified: 2012-05-07
Hello!
I want to double check something...If I have a CLOSED port 113...would it mean that noone can connect to me using that port even if they try?If so-then I have nothing to worry about,right?
I run a web and mail server on my PC...Is there any NEED for port 113 NOT being stealth?
And should I stealth port 113 or just leave it closed?
0
Comment
Question by:abrodski
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
microbolt earned 500 total points
ID: 24833295
You can safely ignore it showing as closed.

Port 113 is often left visible by firewalls since 113 is the IDENT port.

IDENT is used when you connect to mail servers, or to IRC servers, to find out "who" is using the service. With IDENT filtered, your ISP mail server (unlikely) or IRC server (likely) may refuse your request or take a long time to respond as it waits for a closed/open response.

It is possible to remove IDENTD as showing up as a port by reconfiguring your firewall to over-ride the default rules. As above, if IDENTD is filtered in this way, IRC and mail servers may not work properly.

You can also decide that IDENTD is safe, since just having it visible does not mean there is anything that can be exploited on your side, and live with the less than "perfect" results.
0
 
LVL 12

Expert Comment

by:Steve
ID: 24833315
to check which ports you have open on your machine use GRC's port checking application :

https://www.grc.com/x/ne.dll?bh0bkyd2

it will test the common ports and report what is open and what isnt..

but you are correct.. 113 is NOT required for mail..

0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article investigates the question of whether a computer can really be cleaned once it has been infected, and what the best ways of cleaning a computer might be (in this author's opinion).
Part One of the two-part Q&A series with MalwareTech.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question