 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
- ], a* v& o" x家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
4 h+ b- `5 ]7 M5 ^. }2 e9 `8 K/ o {6 b, j! ^
Does Telus block any ports? 4 d2 {5 F) `- m5 {3 J. e5 L v' S
9 y8 t$ m4 e; M, `
The only packages with no blocked ports at this time are the Server packages. 5 J5 y2 k9 ^+ p1 m* v& P, [: a
1 k2 P$ l6 [6 \+ @
The Blocked ports currently are:
' i' K* G/ y. J" A$ S. Z- n
; g% v; v5 F2 yTCP 21 (ftp)/ X9 e; y& [- {3 d0 V4 _" O
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
: C4 c6 P+ x9 A6 }+ v0 Q
2 }1 o7 r8 ?- n! j2 U% x6 J, jTCP 25 (smtp). t3 _0 _7 h7 H, A# G5 ]. ~
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
# E; K/ n2 V* U. f5 m# Y. n% t8 S1 F+ H# ^) Y' M8 D. D; n
TCP 80 (www)8 ^. x* s ]; d8 c0 ^/ y
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
! l2 \+ U# I+ K/ s
8 z9 X1 Z$ U( ^# JTCP 110 (pop3)
/ D! s7 H+ _! A, w0 t) BCustomers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
C7 K6 Z e5 `1 ?, r( \, L
3 X+ _; _4 C3 l' `; Z% i( T- a1 bTCP 6667 (ircd)
7 r. @2 [- W* L/ j, `4 q$ lCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
) y' {- H3 x" ~" G" f
/ c7 s/ I+ ]& X+ @" l/ ?: eTCP/UDP 135-139 (dcom and netbios)
' }; a% `. S" X& O) G# ^These ports are commonly exploited by worm viruses:$ n* y7 M1 C: t" x5 E
135 Windows RPC. h4 N! u/ f, K0 k% V7 w4 K; p
136 PROFILE Naming System (basically unused)
; R; a( h | c137-139 Windows NetBios4 d8 Y3 \# U& Y+ N% F5 |( u+ @
) D* T; P. b- f- T) Z5 e2 `
TCP/UDP 445 (ms-ds). U1 ]5 S. F/ r# V; \/ I+ C7 X
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.+ Y$ \+ P/ A- @
7 p ~; N- G( O7 m! rTCP/UDP 1433-1434 (ms-sql)
' \% D3 r4 Z7 H. T2 H8 B* NMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|