View Full Version : [ubuntu] How safe is an open port?
joshaman
March 23rd, 2009, 11:26 AM
Do I risk anything by allowing inbound connections through a high port, say 5000+? Can someone hack me using telnet through this port?
brian_p
March 23rd, 2009, 12:17 PM
Do I risk anything by allowing inbound connections through a high port, say 5000+?
The security of a service has nothing to do with the port number it is listening on.
Can someone hack me using telnet through this port?
That depends on how well you have secured the service.
joshaman
March 23rd, 2009, 12:39 PM
how well i secured the telnet service? how do i secure my service?
brian_p
March 23rd, 2009, 01:06 PM
how do i secure my service?
What service do you have in mind to be listening on this port?
joshaman
March 23rd, 2009, 01:13 PM
Transmission BT client.
brokenLockpick
March 23rd, 2009, 01:22 PM
Are you talking about leaving some port on your router open for use with Transmission?
brian_p
March 23rd, 2009, 01:28 PM
Transmission BT client.
Transmission is a secure application. It does not accept requests from telnet.
joshaman
March 23rd, 2009, 01:39 PM
brokenLockpick: yea - that's what I'm talking about.
brian_p: so the only way that an open port can be unsafe is if the service listening on the port can be hacked? I read that that was the deal but wasn't sure. Is there anything else I should be aware of? Some people talk about open ports as if they're holes in the security of a system.
Bachstelze
March 23rd, 2009, 01:46 PM
Some people talk about open ports as if they're holes in the security of a system.
Those people most likely know very little about security. It's just as you said: an open port is as much of a security risk as the aplication that listens on it. Maybe tomorrow a security vulnerability will be discovered in Transmission, and in that case, yes, the fact that you have it listening on a port will be a security flaw in your system.
Security is all about that: to which extent can you trust your software to be secure, and whether the risk of using it is more important than the benefits.
joshaman
March 23rd, 2009, 01:59 PM
thanks. That's great news.
I'm not familiar with telnet and don't understand it at all. That's mainly what I was worried about.
Bachstelze
March 23rd, 2009, 02:05 PM
I'm not familiar with telnet and don't understand it at all. That's mainly what I was worried about.
Basically, when someone will connect to your Transmission port using Telnet, Transmission will see just another incoming connection, and will send the exact same data than it would to another bittorrent client. Since this data is supposed to be interpreted by a bittorrent client and not displayed as text on a terminal, it will just look like gibberish on the Telnet client.
By the way, you can see this for yourself:
telnet 127.0.0.1 5555
(or whichever port you chose)
joshaman
March 23rd, 2009, 02:25 PM
Thanks for the info. i'll try that out when I'm at work later today.
I had a complete misconception of telnet. I was under the impression that anyone could gain remote access to my computer through any open port. The misinformation that's posted all over the internet by people who have no idea what they're talking about...
Thanks very much for clarifying.
bodhi.zazen
March 23rd, 2009, 04:31 PM
An open port is only as secure as the server using the port, in this case transmission.
I suggest you confine transmission with apparmor.
ccw
March 23rd, 2009, 06:50 PM
Thanks for the info. i'll try that out when I'm at work later today.
I had a complete misconception of telnet. I was under the impression that anyone could gain remote access to my computer through any open port. The misinformation that's posted all over the internet by people who have no idea what they're talking about...
Thanks very much for clarifying.
Having NEEDLESS open ports is a security risk. Basically the more services you have available, the more possibilities for intrusion.
Run what you need, and only what you need.
(And be mindful of your workplace's computer use policy)
The Cog
March 24th, 2009, 12:03 AM
The fear of open ports is windows think. Windows tends to have lots of open ports running all kinds of services. So a firewall is an easy way to block them off from attempted hacks. In contrast, Ubuntu installs with very few listening services so there isn't much "attack surface" for attackers to work on. So the only listening ports are the ones for programs / services that you installed and ran yourself.
telnet is a service that normally listens on port 23 and provides a text login like the console. It's regarded as insecure because it's not encrypted - a network monitor could pick out the password, as well as see everyting else the user is doing. And of course, attackers can just keep trying passwords till they get in. It's not installed on Ubuntu by default, and if you try to install it, a warning tells you it's not regarded as secure are you really sure (or something like that). SSH is the recommended service to install if you want to enable remote login, but make sure your passwords are all good strong ones first.
Bachstelze
March 24th, 2009, 12:05 AM
telnet is a service that normally listens on port 23 and provides a text login like the console. It's regarded as insecure because it's not encrypted - a network monitor could pick out the password, as well as see everyting else the user is doing. And of course, attackers can just keep trying passwords till they get in. It's not installed on Ubuntu by default, and if you try to install it, a warning tells you it's not regarded as secure are you really sure (or something like that). SSH is the recommended service to install if you want to enable remote login, but make sure your passwords are all good strong ones first.
True, but you're talking about the telnet server. It's irrelevant here, since we're talking about the telnet client, which can connect to all kinds of servers, not only telnet servers, and is a very useful tool to have on your system.
lovinglinux
March 24th, 2009, 02:34 AM
+1 for Apparmor
joshaman
March 24th, 2009, 02:35 AM
An open port is only as secure as the server using the port, in this case transmission.
I suggest you confine transmission with apparmor.
Thanks, I'll check it out.
lovinglinux
March 24th, 2009, 03:00 AM
Thanks, I'll check it out.
Introduction to AppArmor (http://ubuntuforums.org/showthread.php?t=1008906)
Transmission profile: http://ubuntuforums.org/showpost.php?p=5279341&postcount=6
Powered by vBulletin® Version 4.2.2 Copyright © 2025 vBulletin Solutions, Inc. All rights reserved.