https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers
Ports are ports. There's nothing magical except some are used for certain functions, 80 and 443 being two obvious examples. An open and forwarded port is a vulnerability, especially if UPnP controls the door. Assume a program that asks for an open port, which UPnP agrees too. That program turns out to be a security mess that a hacker trainee could breech. You lose.
Any time you have an open and forwarded / listening port, you need to know about it and accept the risk, mitigating it as best you can. Sometimes it's just keeping the software behind the open port updated, such as OpenVPN server if a vulnerability is discovered. Some ports are PROBABLY ok if open, such as those normally associated with a slingbox. I never see attacks on those ports. I'm guessing the linux heritage of the slingbox and the lack of anything valuable to steal makes them low on the hacker hit-list. If port 22 is open and you have no certificate covering SSH access, you are facing uncertainty.
I have no hacker skills. This makes me even more cautious about risks, since they are all 100 foot tall boogymen to me. I'm even more concerned about the risks yet to be discovered than the ones reported today and in the past.
PS I'm writing a new a article about things that seemed like a good idea but weren't. This reply will end up as a bullet point in it. Thanks for asking the question.
My problem is that I have several game consoles that list several ports below 1024 for port forwarding. I need to use UPnP as they auto negotiate alternative ports when one console is already using them, so manual port forwarding is not an option.
Have a look at System Log > Port Forwarding whilst using your consoles to see what ports are actually being used.
Most of the information on the web about port forwarding for consoles is entirely incorrect. For example, many sites tell you to "forward" ports 53 and 80 which is obviously nonsense. What they should be saying is don't block outgoing traffic on port 53 and 80 (which you won't be doing unless you're connected to a corporate LAN).
Xbox Live requires the following ports to be open:
- Port 88 (UDP)
- Port 3074 (UDP and TCP)
- Port 53 (UDP and TCP)
- Port 80 (TCP)
- Port 500 (UDP)
- Port 3544 (UDP)
- Port 4500 (UDP)
Well that doesn't work. I've tested this in the past and when the default port is in use by the other console, the second console chooses a random port that can change all the time.
Even if it doesn't, it still throws up an error message when UPnP isn't functioning and rejects incoming connections, regardless if the port is forwarded or not. So UPnP is always a must unless the default port can be used.
They list it on the official help page for the Xbox: http://support.xbox.com/en-us/xbox-one/networking/network-ports-used-xbox-live
How can I know for sure what port is incoming and outgoing if this list is incorrect? I've also noticed that some games tend to use different ports than others.
Those must be outgoing. They are asking that you allow packets destined to those external ports to leave your network.
No sane person would require a gamer to have those ports listening for incoming packets.
Edit: For UPNPd to get access to the gateway's priveleged ports UPNPd would have be ran as root, which is batshit crazy. (or not)
That page is confusing...
The only part that seems to clarify is "You may have to make a configuration change to your firewall or network hardware, such as a router, for your Xbox One console to communicate with Xbox Live."
Their ports need to be open for you to connect to them (and you need to allow those packets out).
They do not need to connect to you.
Er, a TCP connection starts with a handshake. They keep their hands open, not you.
That's exactly my point. With UPnP enabled you can see what ports are being used and it won't be 53 or 80!Well that doesn't work. I've tested this in the past and when the default port is in use by the other console, the second console chooses a random port that can change all the time.
Even if it doesn't, it still throws up an error message when UPnP isn't functioning and rejects incoming connections, regardless if the port is forwarded or not. So UPnP is always a must unless the default port can be used.
Yeah, I know. However wrote that should be fired.They list it on the official help page for the Xbox: http://support.xbox.com/en-us/xbox-one/networking/network-ports-used-xbox-live
Er, we're talking about the ASUS router aren't we? In which case just about everything runs as the root user (albeit renamed to admin).Edit: For UPNPd to get access to the gateway's priveleged ports UPNPd would have be ran as root, which is batshit crazy. (or not)
Er, we're talking about the ASUS router aren't we? In which case just about everything runs as the root user (albeit renamed to admin).
I have a few applications that need to forward ports below 1024 through UPnP. I would like to know if there are any actual security risks involved with allowing that? Does it really matter if a computer is compromised what ports it can open and not?
Being blunt ... UPnP on a router that allows anyone to get inside your network is universally considered to be a security threat to the person who uses it. The only people who disagree are those who hack for profit (IE those who will happily steal from you and laugh about it) and those who don't know any better.But that's kind off the point why I'm asking this. I see no reason why a program that uses a port above 1024 can not have more vulnerabilities than a program that uses a port below 1024.
My problem is that I have several game consoles that list several ports below 1024 for port forwarding. I need to use UPnP as they auto negotiate alternative ports when one console is already using them, so manual port forwarding is not an option.
I saw many posts about forwarding ports below 1024 and most people never questioned the security impact when setting the internal minimal port to 1. I have used this setting for quite a while, but I was wondering if there were security implications.
If you don't believe me or think I'm just blowing smoke because I'm not a smart as some anonymous page you probably misunderstood, Google UPnP and security risk. Some things are a matter of opinion. Some things aren't. Look it up and figure it out for yourself.But that's kind off the point why I'm asking this. I see no reason why a program that uses a port above 1024 can not have more vulnerabilities than a program that uses a port below 1024.
My problem is that I have several game consoles that list several ports below 1024 for port forwarding. I need to use UPnP as they auto negotiate alternative ports when one console is already using them, so manual port forwarding is not an option.
I saw many posts about forwarding ports below 1024 and most people never questioned the security impact when setting the internal minimal port to 1. I have used this setting for quite a while, but I was wondering if there were security implications.
Being blunt ... UPnP on a router that allows anyone to get inside your network is universally considered to be a security threat to the person who uses it. The only people who disagree are those who hack for profit (IE those who will happily steal from you and laugh about it) and those who don't know any better.
Oh, you say, these are only people who will play games with my kids and keep them off my back ... even maybe the mfgr said it was OK.
Hackers of the world thank you and wish more were as enlightened as you.
For UPNPd to get access to the gateway's priveleged ports UPNPd would have be ran as root, which is batshit crazy. (or not)
There's a lot of bat-shirt insanity in current Firmware builds on common Router/AP's - the key fact that everything runs as a privileged user is one, and even then, there is no privilege separation between the HTTP user vs. the Samba user vs. OpenVPN or uPNPd - design issue, and one that isn't easy to fix overall...
Makes me all giddy for the even poorer security practices of the Internet of Things.
Welcome To SNBForums
SNBForums is a community for anyone who wants to learn about or discuss the latest in wireless routers, network storage and the ins and outs of building and maintaining a small network.
If you'd like to post a question, simply register and have at it!
While you're at it, please check out SmallNetBuilder for product reviews and our famous Router Charts, Ranker and plenty more!