Summary: NetBIOS, MS-SQL, lpd, other ports (135, 137-179, 445, 515, 593, 1433, 1434) are blocked at the campus border to protect against scans and certain attacks and worms. This affects users who use certain Microsoft Windows functions from off-campus (such as Exchange or shared files).
As of 8 a.m., November 5, 2002, Microsoft Windows NetBIOS and certain other well-known Microsoft Windows ports became unavailable from off campus. Certain ports are blocked at the UCI campus border to protect campus systems from common hostile scans and certain types of attacks and Internet worms. The decision to block these ports was made in consultation with with UCI School Computing Coordinators (SCCs). The Office of Information Technology (OIT) had placed these restrictions in order to protect campus computers from unauthorized access to these ports.
At this same time, a campus VPN service became available which allows authorized users to by-pass the blocked ports. Users of Cox cable modems and of AT&T broadband services have had NetBIOS ports blocked by their ISP for some time now. The campus VPN service also offers help to these users.
| Port Blocked | Date |
| MS-SQL TCP Port 1433 | 22 May, 2002 |
| MS-SQL UDP port 1434 | 07 October, 2002 |
| lpd tcp port 515 | late 2001 |
| Microsoft Windows NetBIOS and certain other well-known Microsoft Windows ports (including 135, 137-139, and 445) | November 5, 2002 |
| Microsoft Windows port 593 | July 18, 2003 |
NetBIOS ports are required for certain Windows network functions such as file sharing. But these ports also provide information about your computer which can be exploited by attackers, and also contain vulnerabilities which are widely used to break into systems and exploit them in various ways. Because they are used for file sharing, these ports can be used to get to data on your computer by unauthorized individuals.
Ports Blocked
Where are the ports blocked?
Where are the ports NOT blocked?
NetBIOS ports 137, 138, and 139 are sometimes called "Scanner Bait" ports (and lately, 445 is getting scanned a lot also), because when detected by hacker scanners offer an enticing target. Scanners--which are freely downloadable from the Internet--seek out and locate Windows file and printer shares. Malicious computer vandals leave these scanners running 24 hours a day, collecting IP addresses that look vulnerable or have Windows shares to try to exploit. UCInet is scanned constantly by such scanners. If your IP address is one selected, these vandals "map" that shared file or hard drive onto their local drive letters to gain access to your computer's files. (For more information on this, visit the Web pages on this subject created by Steve Gibson, Gibson Research Corporation, at http://grc.com/su-danger.htm )
Internet Security Systems (ISS) says on one Web page discussing port 139 that it, "is the single most dangerous port on the Internet. All "File and Printer Sharing" on a Windows machine runs over this port. About 10% of all users on the Internet leave their hard disks exposed on this port. This is the first port hackers want to connect to."
But beyond just the NetBIOS ports, this blockade extends to all Microsoft ports documented in the Internet Assigned Numbers Authority (IANA) port registry. Most security experts block all of these ports--inbound and outbound-- through a firewall, unconditionally. The reason for this is that new vulnerabilities are continually being discovered which are exploited through these ports and it is unrealistic to expect all campus computers to be fully patched against these exploits 100% of the time. As an example, the so-called Slammer worm hindered the operation of hundreds of thousands of computers, slowed Internet traffic and disrupted thousands of A.T.M. terminals during the weekend of January 24th through the 26th, 2003. This worm, which exploited weaknesses in UDP port 1434 (used by Microsoft SQL software) even compromised machines at Microsoft Corporation itself.
If you are affected because you mount campus shares from off-campus, the campus VPN service provided by OIT will allow you to continue to mount the shares. On-campus file-sharing is not affected, and the VPN is not required for that. The VPN service provides an authenticated way for you to bypass the port blocking on the border router, and encrypts the traffic so no one can watch your traffic and pick out passwords or other sensitive information.
More information on the VPN service is available at http://www.oit.uci.edu/security/vpn.html Remote logins may be done using W2k's Terminal Services or XP's Remote Desktop.