BITAG (2024)

BITAG (1)

Port Blocking
A Broadband Internet Technical Advisory Group Technical Working Group Report.

Please direct comments on the substance of the report to [email protected].

*Suggested Citation: Broadband Internet Technical Advisory Group (BITAG), Port Blocking (2013), http://www.bitag.org/documents/Port-Blocking.pdf

ExecutiveSummary


The term “port blocking” refers to the practice of an Internet Service Provider (ISP) identifying Internet traffic by the combination of port number and transport protocol, and blocking it entirely. Port blocking thus affects the traffic associated with a particular combination of port number and transport protocol on that ISP, regardless of source or destination IP address. The practice can potentially prevent the use of particular applications altogether by blocking the ports those applications use. Port blocks can be deployed in a range of network locations, from where the ISP connects with other networks to datacenters and customer locations.
The Internet was built around the premise of an open and shared environment. Additionally, Internet standards assume all hosts on the global Internet can connect directly to each other, on any specified port number. The practical reality is that blocking of Internet port numbers, either in the short or long term, is a technique that has been used by both wireline and wireless network providers for various reasons for over a decade.

One of the original and enduring motivations for blocking ports is to prevent network attacks and abuse associated with particular application protocols. Some network and security administrators view port blocking as a critical tool for securing systems and information, and see it as part of the ISP’s mission to manage the security risk to its users from theft and destruction of personal information, business records, and other critical electronic forms of information. TCP port 25, used for sending email, is an example of a port that is blocked by some operators to prevent network abuse – such as spam email.

Port blocking has also been used to enforce ISPs’ terms of service. Likewise, port blocking was once viewed as a useful tool for managing capacity and bandwidth-intensive applications such as peer-to-peer file-sharing applications on enterprise and university networks. However, increased network capacity and a variety of developments in the application space have caused most residential ISPs to seek other ways of managing capacity. Finally, though rare, port blocking has at times been used to hinder competing applications, such as Voice over IP (VoIP).

Port blocking is among a set of tools and tactics (Network Address Translation (NAT) being the other major example) that can compromise the original intent of ports: to provide reliable local addresses so that end systems can manage multiple communications at once.

Port blocking can complicate application design and development and create uncertainty about whether applications will function properly when they are deployed. Port blocking can also cause applications to not function properly or “break” by preventing applications from using the ports they were designed to use. One of the outcomes of port blocking is an increase in the use of “port overloading.” Port overloading is a tactic whereby application developers will design applications to use a common port, in order to minimize the chance of a port blocking practice impacting the usability of that application.

Importantly, it may not be obvious to Internet users why an application affected by port blocking is not working properly, because the application may simply be unable to connect or fail silently. If error messages are provided, they may not contain specific details as to the cause of the problem. Users may seek assistance from the ISP’s customer service, online documentation, or other knowledgeable sources if they cannot diagnose the problem themselves. The fact that the problem could alternatively be caused by home networking equipment or a software-based port block complicates the process of diagnosis.

Users’ ability to respond to port blocking depends on their technical sophistication and the extent to which workarounds are available. Overcoming port blocking may require the user to install a software update, change a configuration setting, request an opt-out from the ISP, or to upgrade their level of service (for example from residential to business). If these options are not available, or if users or customers lack the knowledge or willingness to pursue them, users may be prevented from using the blocked application altogether, or they may have to switch to a different application or a different network (from wireless to wireline, for example).

Because port blocking can affect how particular Internet applications function, its use has the potential to be anti-competitive, discriminatory, otherwise motivated by non-technical factors, or construed as such. As a result, the Broadband Internet Technical Advisory Group (BITAG) has a number of suggested practices when it comes to port blocking:

  • ISPs should avoid port blocking unless they have no reasonable alternatives available for preventing unwanted traffic and protecting users. Further, if port blocking is deemed necessary, it should only be used for the purposes of protecting the implementing ISP’s network and users. Port blocking should not be used for ongoing capacity management, to enforce non-security terms of service, or to disadvantage competing applications.
  • ISPs that can reasonably provide to their users opt-out provisions or exceptions to their port blocking policies should do so. Whether opt-out provisions can be supported may depend on the particulars of the access network technology, the location port blocking is implemented in the network, administrative complexity, cost, and other factors.
  • ISPs should publicly disclose their port blocking policies. The information should be readily available to both customers and non-customers alike, and should be as informative and concise as possible. For example, port blocking policies could be provided on the ISP’s public facing website, on a page dedicated to summarizing or describing the respective ISP’s network management practices.

    For persistent port blocks the information should include: (1) port numbers, (2) transport protocol (e.g., TCP or UDP), (3) the application(s) normally associated with the port(s), (4) the direction of the block – whether inbound or outbound, (5) a brief description of the reason(s) for the block, and (6) if opt-out provisions are available and how to request such.

  • ISPs should make communications channels available for feedback about port blocking policies. Applications providers and consumers should have communications channels or other clear methods to discuss impacts caused by port blocking and to consider possible mitigations.
  • ISPs should revisit their port blocking policies on a regular basis and reassess whether the threats that required the port blocking rules continue to be relevant. Some security threats are permanent and some are transitory or short-lived. Items such as spam prevention by blocking TCP port 25 from the customer are expected to last quite some time, while others such as blocks to prevent certain types of malicious software may be temporary.
  • Port blocking (or firewall) rules of consumers’ devices should be user-configurable. It is recommended that the documentation provided with each unit inform the consumer that port blocking or firewall rules have been implemented, which ports are blocked by default, and how consumers can modify those rules.

*Suggested Citation: Broadband Internet Technical Advisory Group (BITAG), Port Blocking (2013), http://www.bitag.org/documents/Port-Blocking.pdf

BITAG (2024)
Top Articles
Spirit Airlines’ Fate May Lie in Untested Deal With Debtholders
Frequently Asked Questions | Boursin Cheese
Payyourtix Turner
Andi Eskin
Craigslist Cincinati
Ubg365
Silver Spring, MD to Nanuet, NY Bus
Www.metaquest/Device Code
No Hard Feelings Showtimes Near Amc Classic Pekin 14
Dr Abiose Land O Lakes
How are investment banks changing?
Craigslist Tn Free Stuff
Phoenix Craigslit
Aldi Vs Costco: All Your Questions Answered
Craigslist Santa Fe New Mexico
Unblocked Games6969: A World Of Unrestricted Gaming Fun - Unblocked Hub
Apartments / Housing For Rent near Trenton, NJ - craigslist
‘Mom is sleeping,’ victim’s child said at Long Branch murder scene, witness testifies
craigslist: panama city, FL jobs, apartments, for sale, services, community, and events
Bobby Fairchild Gamefarm Prices
Acts 16 Nkjv
Technische Informatica | Studeren bij hogeschool Saxion | Hogeschool Saxion
How Long A Funeral Home Can Hold A Body? And 6 Related Questions
Ncsu Starrez
Theater + Tickets - Phoenix Theatres Savoy 16 + IMAX - Phoenix Theatres Entertainment
The Patch Bel Air
What Is Preggophilia — Make Personality
What Day Is May 12 2023
Check out this EN competition: Encore - Atlanta - Showdown - DI/DII
Stellaris Wargoal
Sams La Habra Gas Price
R+L Carriers Tracking | Instant Shipment Information.
Jessica Ann Ussery Wiki
Filmy4 Web.com
Txfbins
Wal-Mart 2516 Directory
The Hub.fcagroup.com Login Page
Hoover Uh72625 Parts Diagram
Savannah Riddle Marshall Tx
University of Kentucky · Uk Turfland Clinic Pharmacy · 2195 Harrodsburg Rd, Room T1636, Lexington, KY 40504-3504 · Pharmacy
Vinyl record sales continue resurgence
Spectral Silt Rlcraft
Qpublic Pierce County Ga
'Saw X': Release Date, Cast, Trailer, and Everything We Know So Far
Craigslist Centre Alabama
Tighe Hamilton Hudson Ma Obituary
northern virginia apartments / housing for rent - craigslist
2011 Hyundai Sonata 2 4 Serpentine Belt Diagram
Sams Manage Credit Card
Ncqa Report Cards
Oppenheimer Showtimes Near Cinemark Denton
Latest Posts
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 5937

Rating: 5 / 5 (50 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.