Re: port collisions

Mark Horton (mark@cbosgd.ATT.COM)
Sun, 18 May 86 00:16:45 edt

>As far as I've found, this belief that some ports are secure while
>others aren't is only implemented by Berkekley Unix. Since other IP
>implementations do not necessarily honor this belief, there is no
>security in using *secure* ports unless your network consists
>exclusively of machines running Berkelely Unix.

I wouldn't even go that far. Even if your network is all based on
the UNIX conventions (the System V product is the same at Berkeley)
you still don't really have much security. You have to trust the
super users of all the systems on your network, and keep the cable
physically secure. There are enough cheap PCs running UNIX these
days that any user with a PC can break in with a little cleverness.

Many protocols depend on higher levels of security, e.g. FTP uses
a password on every connection. I won't claim that there aren't
security problems here, either, but the point is that for many
applications, magic numbers like 255 or 1024 don't mean much.
As far as I'm concerned, I can choose any 16 bit number. In fact,
our current protocol being developed uses port 1624 and we're
quite happy. Nonetheless, I hope to reserve the port number
to avoid a possible random future collision. Of course, we will
have some sort of management decision about publishing our protocol
before we can publish it.


This archive was generated by hypermail 2.0b3 on Thu Mar 09 2000 - 14:36:07 GMT