According to the port library used for Windows services, port 123 belongs to the Network Time Protocol. Provides time synchronization between computers and network systems
It should not be assigned to another protocol
The Windows Time System service maintains date and time synchronization on all computers on a network running Windows XP or later and Windows Server 2003 or later. This service uses the Network Time Protocol (NTP) to synchronize the clocks of the computers
and thus assign a precise clock value and timestamp, for network validation and for resource access requests. The implementation of NTP and the integration of time providers make Windows Time a reliable and scalable time service for your company. For computers
that are not joined to a domain, you can configure Windows Time to synchronize the time with an external source time. If this service is disabled, the time settings on local computers will not be synchronized with a time service in the Windows domain or with
an externally configured time service. Windows Server 2003 uses NTP. NTP also runs on UDP port 123. The Windows 2000 version of this service uses Simple Network Time Protocol (SNTP). SNTP also runs on UDP port 123.
When the Windows Time Service uses a Windows domain configuration, it requires domain controller location and authentication services. Therefore, the ports for Kerberos and DNS are required.
System service name:
W32Time
Application protocol: NTP
Protocol: UDP
Ports: 123
Application protocol: SNTP
Protocol: UDP
Ports: 123
Source: https://support.microsoft.com/en-us/help/832017...
Glad To help
I don't think you're understanding the issue. NTP servers run on port 123. That isn't in question, nor is it a problem. When a Windows PC queries an NTP server, the destination port is necessarily 123, the port the NTP server is listening on. However, Windows
is also setting the source port - the port the Windows PC is waiting for a response from the server on - to 123. The problem is that some ISPs (notably AT&T) block incoming traffic on port 123, so responses from NTP servers are lost.
Typically, client requests use random, high numbered source ports:
"NTP is a UDP -based service. NTP servers use well-known port 123 to talk to each other and to NTP clients. NTP clients use random ports above 1023. As with DNS , you can tell the difference between:
- An NTP client-to-server query - source port above 1023, destination port 123.
- An NTP server-to-client response - source port 123, destination port above 1023.
- An NTP server-to-server query or response - source and destination ports both 123."
https://docstore.mik.ua/orelly/networking/firewall/ch08\_13.htm
As noted, port 123 is used for both source and destination for server to server queries, but Windows is just acting as a client, not a server.
NTP is a UDP -based service. NTP servers use well-known port 123 to talk to each other and to NTP clients. NTP clients use random ports above 1023. As with DNS , you can tell the difference between: An NTP client-to-server query - source port above 1023,
destination port 123. An NTP server-to-client response - source port 123, destination port above 1023. An NTP server-to-server query or response - source and destination ports both 123. docstore.mik.ua/orelly/networking/firewall/ch08_13.htm
NTP is a UDP -based service. NTP servers use well-known port 123 to talk to each other and to NTP clients. NTP clients use random ports above 1023. As with DNS , you can tell the difference between: An NTP client-to-server query -
source port above 1023, destination port 123. An NTP server-to-client response - source port 123, destination port above 1023. An NTP server-to-server query or response - source and destination ports both 123. docstore.mik.ua/orelly/networking/firewall/ch08_13.htm