Jump to content

Ok GRC com shields up page reports every port on my ASUS router as Stealth except port 443 HTTPS,...


G+_Golden Retriever
 Share

Recommended Posts

Ok GRC.com shields up page reports every port on my ASUS router as Stealth except port 443 HTTPS, quote GRC "this is a very bad port to have open unless you are actively doing web Commerce"

 

At first I was looking at my router and trying to figure out how to stealth this port, then it occurred to me that a Web browser tab could be active on one of my 3 cell phones or 2 laptops my smart TV or even this tablet I am composing this message on.

 

So I want to test this, I can turn off every device but one " I have to have at least one device open in order to run the test" but I don't know if simply shutting the device off will allow the router to close the port or if I need to reboot the router each time before running the test, any suggestions or if you think I'm barking up the wrong tree please say that as well with any suggestions you may have as to why I have this port open.

 

http://GRC.com

Link to comment
Share on other sites

And just to clarify, yes, you were barking up the wrong tree from my understanding of your original question. The port was not open because one of your devices inside the network was connected to something outside. It was open because the router was allowing connections from the outside to connect to a service the router was providing.

 

It could also happen (though not the case this time) if your router was allowing connections to a server or service on a computer inside your network.

Link to comment
Share on other sites

Ben Tyger In addition to tcp 445 (SMB) these ports should also not be open and are related to it.

 

NetBios services:

NETBIOS Name Service (TCP/UDP: 137)

NETBIOS Datagram Service (TCP/UDP: 138)

NETBIOS Session Service (TCP/UDP: 139)

 

What is truly worry some about 445 & 137-139 is they accept udp connections which means the connection can be spoofed.

Link to comment
Share on other sites

Ben Tyger I'd say that's probably true.......but it can't be relied upon.

 

And it also bad practice to push the security of the network on to outside forces -- just to claim I don't have to worry about it because someone else is handling it.

 

It's bad because you have no control or say so in what is done -- the company could decide to open everything up (because it costs, too, much or they just don't want to bother with it anymore) and now you are completely open to attack.

Link to comment
Share on other sites

 Share

×
×
  • Create New...