 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, 5 L9 e1 T4 X7 u. g
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。8 K5 t) Q: a0 D+ J! V" L
3 {) E- |3 ~$ g2 h2 P3 k) p
Does Telus block any ports? $ p9 S: K0 {- R0 @# h7 l
6 D- y9 h( d- f
The only packages with no blocked ports at this time are the Server packages. . `! p1 V$ n7 }4 G" C
$ C$ a$ R) F h
The Blocked ports currently are:2 e4 V! P6 a) Q' A! v
9 R* A( l8 d/ L9 O
TCP 21 (ftp)
: ~8 Z9 j. x$ x$ k1 y0 S5 r7 Z$ a4 lCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.& y3 U" \$ H9 Q) f5 Q5 Z. I/ n( {
- z, k: q5 ~" h* S y
TCP 25 (smtp)
4 E: K* F) I0 L( k8 s& Y5 @: jCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam./ a, I+ ?0 @8 \$ Y& A( r9 h
6 D8 L5 o8 q) L! ~8 g% M; J; P! `5 l+ P
TCP 80 (www)
$ N) y% h d* j) i- a! Y9 g) JCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.+ _0 J0 M/ R) b2 L
8 r$ j; M9 d% r' }9 Q
TCP 110 (pop3). G- u: x! W8 u! ?/ }' I9 }/ ]1 \
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.5 v: J6 @8 c Z0 r9 k9 M4 x
: i0 y; J4 T* Y
TCP 6667 (ircd)
! ?! e+ b7 { `0 V% C* J5 {1 gCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
% u& J2 R# V/ P; U/ O3 |( k+ g( ?: l9 s P4 l& U6 p
TCP/UDP 135-139 (dcom and netbios). I) ^* ~; r4 r. [6 C# Z& H& w# n+ r0 p
These ports are commonly exploited by worm viruses:
) {/ J: M/ U, G& p4 C# D4 h) a135 Windows RPC
5 C% } C0 O. t* T# H( m5 i s136 PROFILE Naming System (basically unused)0 s5 }& r8 g9 x- S# T0 D
137-139 Windows NetBios0 O! C% M" U; h6 ]8 g! {
) t; q% R( u7 W1 @1 w6 ?- w
TCP/UDP 445 (ms-ds)
% Q% e! J2 p+ ` ~Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
0 V) U+ ^! o$ J- |1 y, @, y2 x
+ H: o" s. [/ nTCP/UDP 1433-1434 (ms-sql)$ }+ r! \1 ^ ]' `) S( L
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|