Comments on selecting ephemeral ports

  • Authors:
  • Mark Allman

  • Affiliations:
  • International Computer Science Institute, Berkeley, CA, USA

  • Venue:
  • ACM SIGCOMM Computer Communication Review
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Careless selection of the ephemeral port number portion of a transport protocol's connection identifier has been shown to potentially degrade security by opening the connection up to injection attacks from "blind" or "off path" attackers--or, attackers that cannot directly observe the connection. This short paper empirically explores a number of algorithms for choosing the ephemeral port number that attempt to obscure the choice from such attackers and hence make mounting these blind attacks more difficult.