BITAG (2024)

BITAG (1)

Port Blocking
A Broadband Internet Technical Advisory Group Technical Working Group Report.

Please direct comments on the substance of the report to comments@bitag.org.

*Suggested Citation: Broadband Internet Technical Advisory Group (BITAG), Port Blocking (2013), http://www.bitag.org/documents/Port-Blocking.pdf

ExecutiveSummary


The term “port blocking” refers to the practice of an Internet Service Provider (ISP) identifying Internet traffic by the combination of port number and transport protocol, and blocking it entirely. Port blocking thus affects the traffic associated with a particular combination of port number and transport protocol on that ISP, regardless of source or destination IP address. The practice can potentially prevent the use of particular applications altogether by blocking the ports those applications use. Port blocks can be deployed in a range of network locations, from where the ISP connects with other networks to datacenters and customer locations.
The Internet was built around the premise of an open and shared environment. Additionally, Internet standards assume all hosts on the global Internet can connect directly to each other, on any specified port number. The practical reality is that blocking of Internet port numbers, either in the short or long term, is a technique that has been used by both wireline and wireless network providers for various reasons for over a decade.

One of the original and enduring motivations for blocking ports is to prevent network attacks and abuse associated with particular application protocols. Some network and security administrators view port blocking as a critical tool for securing systems and information, and see it as part of the ISP’s mission to manage the security risk to its users from theft and destruction of personal information, business records, and other critical electronic forms of information. TCP port 25, used for sending email, is an example of a port that is blocked by some operators to prevent network abuse – such as spam email.

Port blocking has also been used to enforce ISPs’ terms of service. Likewise, port blocking was once viewed as a useful tool for managing capacity and bandwidth-intensive applications such as peer-to-peer file-sharing applications on enterprise and university networks. However, increased network capacity and a variety of developments in the application space have caused most residential ISPs to seek other ways of managing capacity. Finally, though rare, port blocking has at times been used to hinder competing applications, such as Voice over IP (VoIP).

Port blocking is among a set of tools and tactics (Network Address Translation (NAT) being the other major example) that can compromise the original intent of ports: to provide reliable local addresses so that end systems can manage multiple communications at once.

Port blocking can complicate application design and development and create uncertainty about whether applications will function properly when they are deployed. Port blocking can also cause applications to not function properly or “break” by preventing applications from using the ports they were designed to use. One of the outcomes of port blocking is an increase in the use of “port overloading.” Port overloading is a tactic whereby application developers will design applications to use a common port, in order to minimize the chance of a port blocking practice impacting the usability of that application.

Importantly, it may not be obvious to Internet users why an application affected by port blocking is not working properly, because the application may simply be unable to connect or fail silently. If error messages are provided, they may not contain specific details as to the cause of the problem. Users may seek assistance from the ISP’s customer service, online documentation, or other knowledgeable sources if they cannot diagnose the problem themselves. The fact that the problem could alternatively be caused by home networking equipment or a software-based port block complicates the process of diagnosis.

Users’ ability to respond to port blocking depends on their technical sophistication and the extent to which workarounds are available. Overcoming port blocking may require the user to install a software update, change a configuration setting, request an opt-out from the ISP, or to upgrade their level of service (for example from residential to business). If these options are not available, or if users or customers lack the knowledge or willingness to pursue them, users may be prevented from using the blocked application altogether, or they may have to switch to a different application or a different network (from wireless to wireline, for example).

Because port blocking can affect how particular Internet applications function, its use has the potential to be anti-competitive, discriminatory, otherwise motivated by non-technical factors, or construed as such. As a result, the Broadband Internet Technical Advisory Group (BITAG) has a number of suggested practices when it comes to port blocking:

  • ISPs should avoid port blocking unless they have no reasonable alternatives available for preventing unwanted traffic and protecting users. Further, if port blocking is deemed necessary, it should only be used for the purposes of protecting the implementing ISP’s network and users. Port blocking should not be used for ongoing capacity management, to enforce non-security terms of service, or to disadvantage competing applications.
  • ISPs that can reasonably provide to their users opt-out provisions or exceptions to their port blocking policies should do so. Whether opt-out provisions can be supported may depend on the particulars of the access network technology, the location port blocking is implemented in the network, administrative complexity, cost, and other factors.
  • ISPs should publicly disclose their port blocking policies. The information should be readily available to both customers and non-customers alike, and should be as informative and concise as possible. For example, port blocking policies could be provided on the ISP’s public facing website, on a page dedicated to summarizing or describing the respective ISP’s network management practices.

    For persistent port blocks the information should include: (1) port numbers, (2) transport protocol (e.g., TCP or UDP), (3) the application(s) normally associated with the port(s), (4) the direction of the block – whether inbound or outbound, (5) a brief description of the reason(s) for the block, and (6) if opt-out provisions are available and how to request such.

  • ISPs should make communications channels available for feedback about port blocking policies. Applications providers and consumers should have communications channels or other clear methods to discuss impacts caused by port blocking and to consider possible mitigations.
  • ISPs should revisit their port blocking policies on a regular basis and reassess whether the threats that required the port blocking rules continue to be relevant. Some security threats are permanent and some are transitory or short-lived. Items such as spam prevention by blocking TCP port 25 from the customer are expected to last quite some time, while others such as blocks to prevent certain types of malicious software may be temporary.
  • Port blocking (or firewall) rules of consumers’ devices should be user-configurable. It is recommended that the documentation provided with each unit inform the consumer that port blocking or firewall rules have been implemented, which ports are blocked by default, and how consumers can modify those rules.

*Suggested Citation: Broadband Internet Technical Advisory Group (BITAG), Port Blocking (2013), http://www.bitag.org/documents/Port-Blocking.pdf

BITAG (2024)
Top Articles
ETF versus Mutual Fund Taxes - Fidelity
Foreign Exchange Option Transaction
Mickey Moniak Walk Up Song
The UPS Store | Ship & Print Here > 400 West Broadway
Winston Salem Nc Craigslist
What are Dietary Reference Intakes?
Health Benefits of Guava
DENVER Überwachungskamera IOC-221, IP, WLAN, außen | 580950
The Idol - watch tv show streaming online
Raid Guides - Hardstuck
Mens Standard 7 Inch Printed Chappy Swim Trunks, Sardines Peachy
Animal Eye Clinic Huntersville Nc
978-0137606801
Yakimacraigslist
2021 Volleyball Roster
The Largest Banks - ​​How to Transfer Money With Only Card Number and CVV (2024)
Walgreens Bunce Rd
پنل کاربری سایت همسریابی هلو
Move Relearner Infinite Fusion
Sofia the baddie dog
UCLA Study Abroad | International Education Office
What Is a Yurt Tent?
13301 South Orange Blossom Trail
Cinema | Düsseldorfer Filmkunstkinos
By.association.only - Watsonville - Book Online - Prices, Reviews, Photos
2487872771
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Have you seen this child? Caroline Victoria Teague
Egg Crutch Glove Envelope
Six Flags Employee Pay Stubs
Sitting Human Silhouette Demonologist
#scandalous stars | astrognossienne
Litter-Robot 3 Pinch Contact & DFI Kit
Mgm Virtual Roster Login
Tamilyogi Ponniyin Selvan
Retire Early Wsbtv.com Free Book
Magicseaweed Capitola
Ksu Sturgis Library
Cheetah Pitbull For Sale
The Holdovers Showtimes Near Regal Huebner Oaks
Ferguson Employee Pipeline
Wilson Tattoo Shops
My Eschedule Greatpeople Me
My Gsu Portal
Hdmovie2 Sbs
Naomi Soraya Zelda
What Does the Death Card Mean in Tarot?
Noaa Duluth Mn
Booked On The Bayou Houma 2023
Varsity Competition Results 2022
Supervisor-Managing Your Teams Risk – 3455 questions with correct answers
Latest Posts
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 5937

Rating: 5 / 5 (50 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.