 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, ( D* D7 c# M0 m8 J6 I2 a
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
* `/ J: H1 l0 `) U1 c2 r/ B( C* X z! V' T& j# x3 g& ?
Does Telus block any ports?
- L& o* h! O* a/ N. v: j. b. B3 L' k4 c. w$ d* N5 h7 n) W
The only packages with no blocked ports at this time are the Server packages.
( n# ^8 V' S$ N; |& `
4 r. Z9 F; p+ n7 u3 [& _/ R q4 PThe Blocked ports currently are:
; W3 f( T* c* X# H1 R( Q: r4 [8 ? O
; _; N$ T# [ n hTCP 21 (ftp)# Z8 d O# R, N( _5 [* {
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.% K* }/ @" ~1 X) K9 r
7 }* T+ a5 d: Z, J2 O" Z
TCP 25 (smtp)* w* c. O7 d+ f) _3 ]3 x4 t9 a
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
9 Q/ X0 R. @: V: X6 I, o% l3 }) [9 s
a& j! {% Q& m% `TCP 80 (www)9 r; b, |; [( M8 D
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.6 [9 D5 t# f0 n. P
* N1 Z% X9 Q. d- y/ R6 m5 ~1 T
TCP 110 (pop3)! R1 h" p: Q8 F! @% r+ a1 |" [+ C
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.$ P; A3 e7 l& W0 n( O- Q( }3 w( P
# ^( }) @8 r _TCP 6667 (ircd)) i; L6 a0 ^; l) `+ {1 ~
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
( ]( q# c( a" b& f6 G R! v! ?% [! d
6 p! N1 |) q( e* ]TCP/UDP 135-139 (dcom and netbios)/ Y) c; N" _6 A+ D
These ports are commonly exploited by worm viruses:
1 d$ f5 i$ x. K0 {& w9 G135 Windows RPC7 M& j+ j$ K3 k4 [$ t
136 PROFILE Naming System (basically unused)
) a5 }5 T1 a+ |# Z7 O/ g137-139 Windows NetBios
( q- i! f- ]2 {+ g) `7 n
2 f. s# v2 }0 Q' rTCP/UDP 445 (ms-ds)
0 H3 {: c L+ b9 gMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.7 J& p5 ^- ?, }% r
# F' M% n: \5 I# bTCP/UDP 1433-1434 (ms-sql)
9 e; a7 ~# m8 V' gMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|