TCP Dangerous File Transfer

Port 873 (rsync)

Learn about port 873 (rsync) - security risks, vulnerabilities, and common uses. Find devices with port 873 open.

Quick Info

Port Number
873
Protocol
TCP
Service
rsync
IANA Name
rsync

Service Description

Port 873 (TCP) is the standard port used by the rsync protocol. Rsync (remote sync) is a widely used utility for efficiently transferring and synchronizing files between computers and across networks. It is particularly effective for backups, mirroring, and data replication. The rsync protocol employs a delta-transfer algorithm, which minimizes data transfer by only sending the differences between the source and destination files. This is achieved by the sender breaking the file into blocks and calculating checksums for each block. The receiver then compares these checksums with its own local copies. Only blocks that differ are transmitted, significantly reducing network bandwidth usage, especially when dealing with large files or incremental changes. The rsync service typically runs in a client-server model, where an rsync server listens on port 873 for incoming connections from rsync clients. The protocol is designed to work over a network connection, often secured with SSH for encryption and authentication, but can also operate in a daemon mode directly listening on port 873 without encryption, which poses significant security risks.

The rsync protocol was developed by Andrew Tridgell and Paul Mackerras in the 1990s. Its design focuses on efficiency and reliability, making it a popular choice for various data management tasks. The protocol's strength lies in its ability to identify and transfer only the changed portions of files, optimizing bandwidth usage and reducing transfer times. Beyond simple file synchronization, rsync supports features like compression, encryption (when used with SSH), and preservation of file attributes (permissions, timestamps, etc.). The protocol's versatility has led to its integration into numerous backup and data management solutions, making it a core component of many system administration workflows.

## Firewall Recommendations

The decision to allow or block port 873 depends on whether you are using rsync in daemon mode. If you are not using rsync in daemon mode, port 873 should be blocked. If you must use rsync in daemon mode, it is strongly recommended to restrict access to trusted IP addresses only. A better practice is to tunnel rsync over SSH (port 22) instead of using the rsync daemon. This provides encryption and authentication, mitigating many of the security risks. When using rsync over SSH, port 873 does not need to be open. For rsync daemon mode, configure the rsync server with strong authentication mechanisms, such as usernames and passwords, and regularly review and update the server's configuration. Consider using IP address-based access control lists (ACLs) to limit which clients can connect to the rsync server. Regularly monitor the rsync server logs for any suspicious activity, such as failed login attempts or unauthorized file transfers. Ensure the rsync software is up-to-date with the latest security patches to address any known vulnerabilities. Disable anonymous access to prevent unauthorized users from accessing the server. If possible, avoid exposing the rsync daemon directly to the internet; use a VPN or SSH tunnel for remote access.

Security Information

Exposing the rsync daemon directly to the internet without proper authentication or encryption poses significant security risks. The rsync protocol, when running in daemon mode on port 873, can be vulnerable to unauthorized access, data breaches, and even remote code execution if misconfigured. Attackers can exploit weak or missing authentication mechanisms to gain access to the rsync server, potentially reading, modifying, or deleting sensitive data. A common attack vector involves attempting to list directories or transfer files without proper credentials. If the rsync server is configured to allow anonymous access or uses weak passwords, attackers can easily compromise the system. Furthermore, vulnerabilities in the rsync software itself, such as buffer overflows or format string bugs, can be exploited to execute arbitrary code on the server. The lack of built-in encryption in the default rsync daemon configuration means that data transmitted over port 873 is susceptible to eavesdropping if not tunneled through SSH or another secure channel. Therefore, it's crucial to implement strong authentication, restrict access based on IP addresses, and regularly update the rsync software to mitigate these risks.

Known Vulnerabilities

CVE Name Severity Description
CVE-2018-20431 Rsync: Out-of-bounds read in checksum comparison Medium Уязвимость чтения за пределами буфера в rsync при сравнении контрольных сумм может привести к раскрытию информации.
CVE-2017-15025 Rsync: Information disclosure Low Уязвимость раскрытия информации в rsync может позволить злоумышленнику получить конфиденциальную информацию.
CVE-2001-0926 Rsync: Remote command execution vulnerability High Старая уязвимость в rsyncd, позволяющая удаленное выполнение команд при неправильной конфигурации.

Common Software

  • rsync
  • Unison
  • Duplicati
  • FreeFileSync
  • Syncthing (с конфигурацией)
  • Bacula
  • rsnapshot
  • cwrsync
  • Allway Sync

Find devices with this port

Discover all devices with port 873 open in any country.

Search Port 873

Find all devices with port 873 open

ScaniteX scans millions of IPs to find devices with specific ports open. Perfect for security research and network auditing.

Start Mass Scanning