Jump to content

Ports 5060, 5190, 5220, 5222, 5298, 5353, 5678, 16384-16834


debianuser

Recommended Posts

I would say every port you open is another opportunity for a hacker. When you make the decision to open up for IM clients you will need to make sure that the users aren't running vulnerable clients. You would also need to consider what could get into or out of your network when using the IM client normally.

Link to comment
Share on other sites

for the most part, the only reason to open up those ports (incoming) would be to allow users to receive pictures/files. Since there are ways around this (email, imageshack) that have plenty of server-side scanners for malware, etc, I'd say don't do it. If it is a personal environment that you have complete control over, do what you'd like.

Out of curiosity, does anyone know if using a client like Gaim or Trillian lowers the number of ports you have to open up for receiving if you use multiple clients? We know it saves memory, if nothng else.

Link to comment
Share on other sites

Out of curiosity, does anyone know if using a client like Gaim or Trillian lowers the number of ports you have to open up for receiving if you use multiple clients? We know it saves memory, if nothng else.

i'm going to guess that the questions you're trying to ask is whether you can use a multi-protocol client so that you don't have to use as many ports.

as you mentioned, it probably requires less memory if you have many protocols in one client, instead of a client for each messenger service. More than anything else though it's neater to have them all in one app.

the problem about opening ports is that it still needs access to whatever port each protocol uses. So if you have msn and aim on at the same time, they both need the same access as what the regular msn and aim clients use (ignoring things like protocols that can use a http method so that they only requre port 80)

Link to comment
Share on other sites

one of the good ways to avoid having vulnerable client software is through obscurity.

The attacker would expect the client to be (for example) MSN Messanger, and since he can't tell what it actually his he has to take an assumption. If you (as a system administrator) force people to use a more obscurer less well known/used client (For example aMSN) then it's quite possible that his attack will fail and he won't have a clue why... Until he asks some one what program they are using of course.

I think you should make it a policy not to tell any one out side the company what software you are actually running in side the network.

Link to comment
Share on other sites

If you really want to supply your network this stuff, set up your own IM server. I'm sure you can relay the traffic from that one server to another one on the internet.

Your firewall rule will be tighter, more spcific. People will still not be able to do direct downloads from eachother which is almost certainly a plus, and if you do end up getting hacked, well, it's just that one machine...

If you're in a financial institution or some other area that requires you keep records of stuff, well that just became a lot easier too.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...