first off, DISCLAIMER: I am NOT a Cisco Certified Network Administrator, nor am I a Networking Engineer; Additionally, being a Gulf War disabled, PTSD'd, depressed, et al. Veteran, I have the additional difficulty assimilating complex information. So, those whom would choose to cavil at my ignorance and/or lack of understanding need not respond; also those whom have cut the 99 rungs below them and who would scoff at those attempting to climb and being unable to reach that 100th ladder rung, also need not respond. I seek understanding of what I believe is a complex situation.
I am using a WISP modem and ddwrt-configured router that makes VPN connections through the WISP modem.
Note, that with VPN service disconnected, Shields Up shows my IP per the WISP provider, and displays at 100% stealth, no response to pings, no open ports, etc.
However, when making use of the VPN connectivity, my IP is shown as from one of the ISPs(servers w/i VPN service) and displays results altogether different:
All tested display:
1. Ping Reply: RECEIVED (FAILED)
2. Solicited TCP Packets: RECEIVED (FAILED)
other displays are either/or
3. OPEN port 443 or CLOSED ports 89[SU/MIT Telnet Gateway], and 90[DNSIX Securit Attribute Token Map]
{of the hundreds of connection options w/i the VPN provider, this only represents a handful of servers tested}
What could, (giving a slight benefit of doubt that these are somehow needed) be the reason(s) for these insecure types of connections?
or
What nefarious(incompetent?) reasons might these ports be left visible/responsive?
What questions else-wise could be formed to understand these results?
Note, this particular VPN provider, which may not necessarily be related to the ISPs being used within it, was recently purchased by a well-known MALWARE software company; so I am uncertain of the above results have always been in effect, or arose since said purchase.
I Whole-heartedly Thank those whom take the time to respond thoughtfully
I am using a WISP modem and ddwrt-configured router that makes VPN connections through the WISP modem.
Note, that with VPN service disconnected, Shields Up shows my IP per the WISP provider, and displays at 100% stealth, no response to pings, no open ports, etc.
However, when making use of the VPN connectivity, my IP is shown as from one of the ISPs(servers w/i VPN service) and displays results altogether different:
All tested display:
1. Ping Reply: RECEIVED (FAILED)
2. Solicited TCP Packets: RECEIVED (FAILED)
other displays are either/or
3. OPEN port 443 or CLOSED ports 89[SU/MIT Telnet Gateway], and 90[DNSIX Securit Attribute Token Map]
{of the hundreds of connection options w/i the VPN provider, this only represents a handful of servers tested}
What could, (giving a slight benefit of doubt that these are somehow needed) be the reason(s) for these insecure types of connections?
or
What nefarious(incompetent?) reasons might these ports be left visible/responsive?
What questions else-wise could be formed to understand these results?
Note, this particular VPN provider, which may not necessarily be related to the ISPs being used within it, was recently purchased by a well-known MALWARE software company; so I am uncertain of the above results have always been in effect, or arose since said purchase.
I Whole-heartedly Thank those whom take the time to respond thoughtfully