G+_Golden Retriever Posted June 13, 2017 Share Posted June 13, 2017 Ok GRC.com shields up page reports every port on my ASUS router as Stealth except port 443 HTTPS, quote GRC "this is a very bad port to have open unless you are actively doing web Commerce" At first I was looking at my router and trying to figure out how to stealth this port, then it occurred to me that a Web browser tab could be active on one of my 3 cell phones or 2 laptops my smart TV or even this tablet I am composing this message on. So I want to test this, I can turn off every device but one " I have to have at least one device open in order to run the test" but I don't know if simply shutting the device off will allow the router to close the port or if I need to reboot the router each time before running the test, any suggestions or if you think I'm barking up the wrong tree please say that as well with any suggestions you may have as to why I have this port open. http://GRC.com Link to comment Share on other sites More sharing options...
G+_todd zimmerman Posted June 13, 2017 Share Posted June 13, 2017 Just wondering: is 443 open for remote management via WAN connection? If that's the case, just turn off WAN Admin. Otherwise, 443 might be open for ASUS's AICloud "feature". You might be able to turn off AICloud, but I'm not sure (I don't use this " feature") Link to comment Share on other sites More sharing options...
G+_William L. DeRieux IV Posted June 13, 2017 Share Posted June 13, 2017 Tod Sage Also per Steve Gibson....turn off UPNP (as this could do it, too). Link to comment Share on other sites More sharing options...
G+_Golden Retriever Posted June 13, 2017 Author Share Posted June 13, 2017 todd zimmerman AIcloud was the culprit thanks Todd Link to comment Share on other sites More sharing options...
G+_Golden Retriever Posted June 13, 2017 Author Share Posted June 13, 2017 William L. DeRieux IV did that a long time ago Link to comment Share on other sites More sharing options...
G+_David Peach Posted June 14, 2017 Share Posted June 14, 2017 And just to clarify, yes, you were barking up the wrong tree from my understanding of your original question. The port was not open because one of your devices inside the network was connected to something outside. It was open because the router was allowing connections from the outside to connect to a service the router was providing. It could also happen (though not the case this time) if your router was allowing connections to a server or service on a computer inside your network. Link to comment Share on other sites More sharing options...
G+_William L. DeRieux IV Posted June 14, 2017 Share Posted June 14, 2017 David Peach It's called port forwarding (which upnp can used by a device to set it up without user intervention) -- and this was not the case, the router had opened the port for itself and not a local device. Link to comment Share on other sites More sharing options...
G+_Ben Tyger Posted June 14, 2017 Share Posted June 14, 2017 I think there may be a port mixup. 443 is HTTPS. There are lots of legitimate reasons to have this open if you are running any type of webserver. The really dangerous port Steve was talking about in recent SN shows was port 445 (SMB). Link to comment Share on other sites More sharing options...
G+_William L. DeRieux IV Posted June 14, 2017 Share Posted June 14, 2017 Ben Tyger In addition to tcp 445 (SMB) these ports should also not be open and are related to it. NetBios services: NETBIOS Name Service (TCP/UDP: 137) NETBIOS Datagram Service (TCP/UDP: 138) NETBIOS Session Service (TCP/UDP: 139) What is truly worry some about 445 & 137-139 is they accept udp connections which means the connection can be spoofed. Link to comment Share on other sites More sharing options...
G+_Ben Tyger Posted June 14, 2017 Share Posted June 14, 2017 Most US ISPs block 445 & 137-139 from the outside coming on most consumer grade networks. Link to comment Share on other sites More sharing options...
G+_William L. DeRieux IV Posted June 14, 2017 Share Posted June 14, 2017 Ben Tyger I'd say that's probably true.......but it can't be relied upon. And it also bad practice to push the security of the network on to outside forces -- just to claim I don't have to worry about it because someone else is handling it. It's bad because you have no control or say so in what is done -- the company could decide to open everything up (because it costs, too, much or they just don't want to bother with it anymore) and now you are completely open to attack. Link to comment Share on other sites More sharing options...
G+_Ben Tyger Posted June 14, 2017 Share Posted June 14, 2017 William L. DeRieux IV Oh I agree. I bet if the ISPs didn't do that, the US's numbers would have been horrible. Link to comment Share on other sites More sharing options...
Recommended Posts