D
Deleted member 30996
Guest
Last night I was looking at a security forum and saw someone mention Steve Gibson's Shields Up port scanner site. I know all about Steve Gibson and don't frequent his site, but thought what could it hurt to run an outside scan on the ISP provided cable modem. So I did:
It went into more detail on another page, the Background and Additional Information section of which I found of some interest. I cannot vouch for validity of it:
I have a port 0 rule in my pf ruleset that I've carried over from my Win98 days when using ConSeal PC Firewall:
My NetGear commercial router will not accept that rule returning port 0 not a valid port IIRC. My cable modem belongs to Spectrum and I've never been able to gain access to the workings of it. The closest I've gotten was a look inside that indicated there is a password that is changed daily.
I've never had a return on port 0 so I used google-fu on it. It came back with several results, some indicating port 0 used in DDOS attacks and one report of a comment made about it in response to an article on the InfoSec Handlers Diary Blog:
Akamai... Now who could be using that? Microsoft?
I believe so... I've posted before about when I entered that port 0 rule into the Win10Pro firewall it blocked Windows Update.
I don't have a Windows box anymore, port 0 is closed on the modem, if a packet got past the modem and the router firewall it wouldn't get past my pf port 0 rule. So this anti-climatic in some sense. For me.
What about you? Are you running a server? Are you counting ports from TCP 1-65535 and UDP 1-65535? Do you block port 0? Is it of any concern to you? Should it be?
You decide.
z3r0trust.medium.com
*Link Fixed 1-10-22*
There is a .pdf entitled "The Curious Case of Port 0" that goes into some depth of the DDOS aspect of it using The Gobbler port scanner, which has been ported to OpenBSD. I won't post the link to download the .pdf.
I'm not concerned, but wanted to bring it to your attention. I will be keeping my port 0 rule and not much else I can do about it.
Code:
GRC Port Authority Report created on UTC: 2021-08-12 at 10:19:12
Results from scan of ports: 0-1055
0 Ports Open
1 Ports Closed
1055 Ports Stealth
---------------------
1056 Ports Tested
NO PORTS were found to be OPEN.
The port found to be CLOSED was: 0
Other than what is listed above, all ports are STEALTH.
TruStealth: FAILED - NOT all tested ports were STEALTH,
- NO unsolicited packets were received,
- NO Ping reply (ICMP Echo) was received.
It went into more detail on another page, the Background and Additional Information section of which I found of some interest. I cannot vouch for validity of it:
Port Authority Database
Port 0
Name:
<nil>
Purpose:
Not a valid port number.
Description:
"Port Zero" does not officially exist. It is defined as an invalid port number. But valid Internet packets can be formed and sent "over the wire" to and from "port 0" just as with any other ports.
Related Ports:
-
Background and Additional Information:
The designers of the original Berkeley UNIX "Sockets" interface, upon which much of the technology and practice we use today is based, set aside the specification of "port 0" to be used as a sort of "wild card" port. When programming the Sockets interface, the provision of a zero value is generally taken to mean "let the system choose one for me". Programmers who specify "port 0" know that it is an invalid port. They are asking the operating system to pick and assign whatever non-zero port is available and appropriate for their purpose.
As a result of this programming convention, there has traditionally been no way for Internet Sockets programmers to generate or receive "port 0" Internet traffic. So port zero was set aside and never defined or used. Although times and technology have changed dramatically, port zero has remained something of an unexplored "no mans's land".
However, with the widespread and growing availability of operating systems offering the "Raw Socket" programming interface — which provides the means for deliberately generating port zero packets — the presence and security of "port zero" is of growing importance.
I have a port 0 rule in my pf ruleset that I've carried over from my Win98 days when using ConSeal PC Firewall:
Code:
### Block to and from port 0
block quick proto { tcp, udp } from any port = 0 to any
block quick proto { tcp, udp } from any to any port = 0
My NetGear commercial router will not accept that rule returning port 0 not a valid port IIRC. My cable modem belongs to Spectrum and I've never been able to gain access to the workings of it. The closest I've gotten was a look inside that indicated there is a password that is changed daily.
I've never had a return on port 0 so I used google-fu on it. It came back with several results, some indicating port 0 used in DDOS attacks and one report of a comment made about it in response to an article on the InfoSec Handlers Diary Blog:
One of our diary readers, Troy, has let us know that he has seen on a number of occasions TCP Port 0 traffic coming from an Akamai caching server farm. If you know why the people over at Akamai are using TCP port 0, or indeed have a packet capture we could examine the please let us know via the contact form.
Akamai... Now who could be using that? Microsoft?
I believe so... I've posted before about when I entered that port 0 rule into the Win10Pro firewall it blocked Windows Update.
I don't have a Windows box anymore, port 0 is closed on the modem, if a packet got past the modem and the router firewall it wouldn't get past my pf port 0 rule. So this anti-climatic in some sense. For me.
What about you? Are you running a server? Are you counting ports from TCP 1-65535 and UDP 1-65535? Do you block port 0? Is it of any concern to you? Should it be?
You decide.

Socket Programming & the Bizarre TCP/IP Port 0 Saga
*Note: This article was originally published by the author on February 23, 2020.

*Link Fixed 1-10-22*
There is a .pdf entitled "The Curious Case of Port 0" that goes into some depth of the DDOS aspect of it using The Gobbler port scanner, which has been ported to OpenBSD. I won't post the link to download the .pdf.
I'm not concerned, but wanted to bring it to your attention. I will be keeping my port 0 rule and not much else I can do about it.
Last edited by a moderator: