 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
n8 y8 t* l* y) p7 N0 q家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。5 s/ P/ c7 s* p1 s) D0 V! y
( E _# \$ E7 k; L2 m$ {/ Y, E2 `9 K( aDoes Telus block any ports?
4 R% F' G4 p7 f: `7 s7 h/ ]. n7 L% q: T2 F" u/ h* W
The only packages with no blocked ports at this time are the Server packages. ( E1 D6 r( N( V% x& T5 S$ g
* V8 J1 n( A$ C2 F, M, BThe Blocked ports currently are:( b; n g& B+ [7 y: ~, c5 ^) N z
- @ E0 z9 e9 m( _; G! C t* h
TCP 21 (ftp)3 B9 H4 m4 @, z8 @% t
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.; f2 m3 T' C* u. W
2 V' {3 w5 p: I g2 b' K' ~TCP 25 (smtp)
1 J' ^* G& v* G3 J4 z. LCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
% c r1 K5 o3 s1 \4 h# a8 i8 d# D. k' O. O/ h
TCP 80 (www)
$ L5 b ^) b9 f5 V- qCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
8 ?' [0 E$ C D/ p8 ?
/ q2 F0 [: N5 Q& p& C* _6 iTCP 110 (pop3)
$ x i3 p" F( T; @; t% ?! ^Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam., }' o" F; {* W5 q% x0 B
$ D$ ^, U* ^5 J j; S2 b" f
TCP 6667 (ircd)$ }& s7 p3 _0 ]1 g! @
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.6 e4 {# _" F# o1 S9 m/ P1 H) M5 i
) K( G2 f0 J/ p# x$ Z7 m
TCP/UDP 135-139 (dcom and netbios). |$ `1 w* h# U6 P4 m! M
These ports are commonly exploited by worm viruses:
9 ^% J1 p4 o- y135 Windows RPC
' }' j, [9 |5 |136 PROFILE Naming System (basically unused)
4 e; E3 z# Z5 M% ?) T# Z. \# _2 B137-139 Windows NetBios
( ^9 U+ h: ]" m' {. \# Y" U C# W. B; _' U% ~ \* k8 L
TCP/UDP 445 (ms-ds)
8 h0 n; B$ m$ O& u9 O$ R2 C5 eMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.- _4 r+ t4 |' O, E. A$ c
- g4 m: }$ B" h9 D4 kTCP/UDP 1433-1434 (ms-sql)1 Y% p6 B5 s* E% N! ]! C8 ]. y& H% t
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|