[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
ISP port blocking practice
Yes.
Owen
On Oct 23, 2009, at 2:19 PM, Lee Riemer wrote:
> Isn't blocking any port against the idea of Net Neutrality?
>
> Justin Shore wrote:
>> Owen DeLong wrote:
>>> Blocking ports that the end user has not asked for is bad.
>>
>> I was going to ask for a clarification to make sure I read your
>> statement correctly but then again it's short enough I really don't
>> see any room to misinterpret it. Do you seriously think that a
>> typical residential user has the required level of knowledge to
>> call their SP and ask for them to block tcp/25, tcp & udp/1433 and
>> 1434, and a whole list of common open proxy ports? While they're
>> at it they might ask the SP to block the C&C ports for Bobax and
>> Kraken. I'm sure all residential users know that they use ports
>> 447 and 13789. If so then send me some of your users. You must be
>> serving users around the MIT campus.
>>
>>> Doing it and refusing to unblock is worse.
>>
>> How you you propose we pull a customer's dynamically-assigned IP
>> out of a DHCP pool so we can treat it differently? Not all SPs use
>> customer-facing AUTH. I can think of none that do for CATV though
>> I'm sure someone will now point an oddball SP that I've never heard
>> of before.
>>
>>> Some ISPs have the even worse practice of blocking 587 and a few
>>> even
>>> go to the horrible length to block 465.
>>
>> I would call that a very bad practice. I haven't personally seen a
>> mis-configured MTA listening on the MSP port so I don't think they
>> can make he claim that the MSP port is a common security risk. I
>> would call tcp/587 a very safe port to have traverse my network. I
>> think those ISPs are either demonstrating willful ignorance or
>> marketing malice.
>>
>>> A few hotel gateways I have encountered are dumb enough to think
>>> they can block TCP/53
>>> which is always fun.
>>
>> The hotel I stayed in 2 weeks ago that housed a GK class I took had
>> just such a proxy. It screwed up DNS but even worse it completely
>> hosed anything trying to tunnel over HTTP. OCS was dead in the
>> water. My RPC-over-HTTP Outlook client couldn't work either.
>> Fortunately they didn't mess with IPSec VPN or SSH. Either way it
>> didn't matter much since the network was unusable (12 visible APs
>> from room, all on overlapping 802.11b/g channels). The average
>> throughput was .02Mbps.
>>
>>> Lovely for you, but, not particularly helpful to your customers
>>> who may actually want to use some of those services.
>>
>> I take a hard line on this. I will not let the technical ignorance
>> of the average residential user harm my other customers. There is
>> absolutely no excuse for using Netbios or MS-SQL over the Internet
>> outside of an encrypted tunnel. Any user smart enough to use a
>> proxy is smart enough to pick a non-default port. Any residential
>> user running a proxy server locally is in violation of our AUP
>> anyway and will get warned and then terminated. My filtering helps
>> 99.99% of my userbase. The .001% that find this basic security
>> filter intolerable can speak with their wallets. They can find
>> themselves another provider if they want to use those ports or pay
>> for a business circuit where we filter very little on the
>> assumption they as a business have the technical competence to
>> handle basic security on their own. (The actual percentage of
>> users that have raised concerns in the past 3 years is .0008%. I
>> spoke with each of them and none decided to leave our service.)
>>
>> We've been down the road of no customer-facing ingress ACLs. We've
>> fought the battles of getting large swaths of IPs blacklisted
>> because of a few users' technical incompetence. We've had large
>> portions of our network null-routed in large SPs. Then we got our
>> act together and stopped acting like those ISPs who we all love to
>> bitch about, that do not manage their customer traffic, and are
>> poor netizens of this shared resource we call the Internet. Our
>> problems have all but gone away. Our residential and business users
>> no longer call in on a daily basis to report blacklisting
>> problems. We no longer have reachability issues with networks that
>> got fed up with the abuse coming from our compromised users and
>> null-routed us. I stand by our results as proof that what we're
>> doing is right. Our customers seem to agree and that's what matters.
>>
>> Justin
>>
>>
>>