Skip Navigation

Friday August 2nd, 2013

NetBIOS Blocked from UCI's Network

Summary: NetBIOS, MS-SQL, lpd, other ports (135, 137-179, 445, 515, 593, 1433, 1434) are blocked at the campus border to protect against scans and certain attacks and worms. This affects users who use certain Microsoft Windows functions from off-campus (such as Exchange or shared files).

 

NetBIOS and Special Ports Blocked

Related Information

As of 8 a.m., November 5, 2002, Microsoft Windows NetBIOS and certain other well-known Microsoft Windows ports became unavailable from off campus. Certain ports are blocked at the UCI campus border to protect campus systems from common hostile scans and certain types of attacks and Internet worms. The decision to block these ports was made in consultation with with UCI School Computing Coordinators (SCCs). The Office of Information Technology (OIT) had placed these restrictions in order to protect campus computers from unauthorized access to these ports.

At this same time, a campus VPN service became available which allows authorized users to by-pass the blocked ports. Users of Cox cable modems and of AT&T broadband services have had NetBIOS ports blocked by their ISP for some time now. The campus VPN service also offers help to these users.

Port Blocked Date
MS-SQL TCP Port 1433 22 May, 2002
MS-SQL UDP port 1434 07 October, 2002
lpd tcp port 515 late 2001
Microsoft Windows NetBIOS and certain other well-known Microsoft Windows ports (including 135, 137-139, and 445) November 5, 2002
Microsoft Windows port 593 July 18, 2003

What are NetBIOS Ports?

NetBIOS ports are required for certain Windows network functions such as file sharing. But these ports also provide information about your computer which can be exploited by attackers, and also contain vulnerabilities which are widely used to break into systems and exploit them in various ways. Because they are used for file sharing, these ports can be used to get to data on your computer by unauthorized individuals.

top of page

What ports will be blocked, and where?

Ports Blocked

Where are the ports blocked?

Where are the ports NOT blocked?

top of page

Is there really a problem with these ports?

Yes! While OIT realizes that it is inconvenient to some users that these ports are blocked, the majority of computers at UCI do not require them. Most people do not share files using Windows file sharing mechanisms. However, these ports are usually open on most Windows based computers. Unsuspecting members of the campus community have their computers hacked daily. The School Computer Coordinators (SCCs) are behind stopping this activity using the blockade.

NetBIOS ports 137, 138, and 139 are sometimes called "Scanner Bait" ports (and lately, 445 is getting scanned a lot also), because when detected by hacker scanners offer an enticing target. Scanners--which are freely downloadable from the Internet--seek out and locate Windows file and printer shares. Malicious computer vandals leave these scanners running 24 hours a day, collecting IP addresses that look vulnerable or have Windows shares to try to exploit. UCInet is scanned constantly by such scanners. If your IP address is one selected, these vandals "map" that shared file or hard drive onto their local drive letters to gain access to your computer's files. (For more information on this, visit the Web pages on this subject created by Steve Gibson, Gibson Research Corporation, at http://grc.com/su-danger.htm )

Internet Security Systems (ISS) says on one Web page discussing port 139 that it, "is the single most dangerous port on the Internet. All "File and Printer Sharing" on a Windows machine runs over this port. About 10% of all users on the Internet leave their hard disks exposed on this port. This is the first port hackers want to connect to."

But beyond just the NetBIOS ports, this blockade extends to all Microsoft ports documented in the Internet Assigned Numbers Authority (IANA) port registry. Most security experts block all of these ports--inbound and outbound-- through a firewall, unconditionally. The reason for this is that new vulnerabilities are continually being discovered which are exploited through these ports and it is unrealistic to expect all campus computers to be fully patched against these exploits 100% of the time. As an example, the so-called Slammer worm hindered the operation of hundreds of thousands of computers, slowed Internet traffic and disrupted thousands of A.T.M. terminals during the weekend of January 24th through the 26th, 2003. This worm, which exploited weaknesses in UDP port 1434 (used by Microsoft SQL software) even compromised machines at Microsoft Corporation itself.

top of page

So, tell me again, what is affected?

top of page

What can I do if I want to use shares?

If you are affected because you mount campus shares from off-campus, the campus VPN service provided by OIT will allow you to continue to mount the shares. On-campus file-sharing is not affected, and the VPN is not required for that. The VPN service provides an authenticated way for you to bypass the port blocking on the border router, and encrypts the traffic so no one can watch your traffic and pick out passwords or other sensitive information.

More information on the VPN service is available at http://www.oit.uci.edu/security/vpn.html Remote logins may be done using W2k's Terminal Services or XP's Remote Desktop.

top of page