Forum Moderators: open

Message Too Old, No Replies

Ports 1433 and 1434

Is it a security risk to access these ports?

         

woop01

7:07 pm on May 20, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



I was recently 'reprimanded' by my DSL provider that I am opening their customers to a security risk because of my demand that they reinstate access to ports 1433 and 1434. Obviously, I use these ports to access an SQL server using the client tools. The gentleman I spoke with said I should find another way to manage the SQL server.

I have never had problems with this before with any of six other ISPs. Is it normal to manage an SQL server through port 1433/1434 using Enterprise Manager or am I doing something really stupid by keeping those ports open on the server?

Krapulator

8:43 pm on May 20, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



It is a significant risk to have these ports open to the internet. Anyone scanning your ports will quickly realise what's on offer here.

Your hosting company should offer some kind of VPN connection to allow you to connect securely to their network before you can use the client tools.

moltar

9:01 pm on May 20, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



I am not sure if I am understanding this correctly... Did your ISP close outgoing ports or incoming ports, or both?

If your database if offsite, and you accessed it with the DSL connection in question, then it really cannot create any damage. You are connecting to a remote port.

If you host the SQL server somewhere else on the same DSL network, but somewhere remote, then closing those ports for outsides still should let you in, since you are technically on the same network.

If both client and SQL server are on the same machine, then you closing any in/out ports should not affect you at all.

I am kind of confused here :)

woop01

12:00 am on May 21, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



The blocked all traffic going through ports 1433 and 1434.

moltar

12:04 am on May 21, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Outgoing blocking of the traffic cannot affect security of the users on your side of network in any way.

woop01

12:07 am on May 21, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



I got them to open it back up for me. The tech support guys were useless for two day, five phone calls, and three supervisors. I asked to be transfered to customer service and told them I'm cancelling the DSL and wanted to know if there were any fees. Within ten minutes they got the ports back open for us.

(this is the 5th time I've seen customer service reps beat the heck out of what tech support can do)

gregpakes

10:34 am on May 22, 2005 (gmt 0)

10+ Year Member



If you monitor the ports with an IDS AND keep SQL Server up to date (service packs) then you should be fine.

I have 1433 and 1434 open on my server and it regularly gets hit by the various worms - but my IDS detects it and blocks the traffic.

mattglet

1:01 pm on May 22, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



... Until you get hit with a worm that IDS does not identify.

aspdaddy

7:41 pm on May 23, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



>Is it normal to manage an SQL server through >port 1433/1434 using Enterprise Manager

Definetely not - use a VPN or remote access to the server. If you publish those ports you are telling the world you have a database to hack.

Balloon

4:57 pm on Jun 6, 2005 (gmt 0)

10+ Year Member



But where does that end - surely if you have a VPN port open, you're inviting people to hack your VPN. If you have RDP open, you're inviting people to hack your Remote Desktop?!

Sorry to confuse the issue - just playing devil's advocate!

(personally, I use a VPN, and to add a little confusion I run SQL Server on a different port).

aspdaddy

10:41 pm on Jun 7, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



>surely if you have a VPN port open, you're inviting people to hack your VPN

Sure you can send different protocols and read the responses and figure it out but certain SQL attacks such as slammer look for port 1433.

See the following article for info:
SQL Server and deadly Port 1433 idiots

The vpn method does conceal the actual protocols being supported to some extent.

fischermx

10:53 pm on Jun 7, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



Woop1,

I've had problems with IT network idiots denying access to those ports.

There was a big slammer virus 3 years ago, that affected unpatched SQL Server systems, which had put a bad reputation on those ports.

The real thing is that the risk is only if the person running SQL Server don't know what he's doing and leave the server unpatched.

Anyway, to stop leading with idiotics, just change the ports!, that's a five-minutes work.

Ask your local ISP which range of ports are open to use and choose two of them.
That's what I did.

aspdaddy

9:16 am on Jun 8, 2005 (gmt 0)

WebmasterWorld Senior Member 10+ Year Member



fischermx,
That is true - All the experts agree that most attacks happen in the time window between just before the fix is deployed by the vendor and when its actually installed by customers.

That is why closing the ports works best! - least privelage policy.

Romeo

9:59 am on Jun 8, 2005 (gmt 0)

10+ Year Member



There are 2 different things:
-- blocking ports ISP wide
-- putting up a machine running services on specific ports

All those machines which don't run any service on a specific port xyz are safe. Where there is no exploitable service, there is no attack vector. If only a few customers are using a specific port, it would make no sense for an ISP to block that port xyz within their entire network.

It is another question if it would be wise to start a service which might show some vulnerabilities now and then on a server box visible to the internet and let that port open for the public to try and poke around.
So to answer the original question "is it a security risk keeping those ports open on the server": yes, it is, as it may attract all kind of unwanted probing/scripting/exploiting/hacking activities.

To have an IDS is good. An additional measure could be to put a firewall in front of that machine, which would let only a few trusted IP addresses talk to that port and reject all others.
Another possibility is to generally close the port in the server's firewall and run the communications to that service through an SSH tunnel. Or using VPN, as others mentioned already.

Just configuring desired services to other ports may help to escape an ISP wide port blocking but does not help security-wise ("security through obscurity"): any port scanning will show the new ports open and it would be no problem to remotely identify the services on these new ports.

Regards,
R.