 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
( l5 t& \1 O- }% g家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。, y; h5 o! _4 E, k. X
6 i# |) [4 _! w5 ]) D% VDoes Telus block any ports?
2 q2 |$ G' B0 S' W ^& Z# z% P' s m" E9 ^; S
The only packages with no blocked ports at this time are the Server packages.
. H2 i- E4 B+ v3 C3 }0 D! w g; J
* c3 d5 @6 b! J, L0 }The Blocked ports currently are:
$ r6 N8 N" A* l1 }7 V& U y
C0 @& ? C% J cTCP 21 (ftp)3 M Y1 I/ S/ Z9 v3 f* D
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
8 I8 U& z/ ]: e* `
# r" @4 I% U! PTCP 25 (smtp)% }" A/ U/ [. M) u9 x3 x
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.% z, y7 \+ ?; O t0 b
7 Q. X5 R: `6 c* x2 ^! x; x' T5 H9 I
TCP 80 (www)
8 i x" D, ^; O! t) SCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
! ~: v% s% f/ m* S" b8 {; _
/ S% x& I% p* ?; Z3 t3 R# ITCP 110 (pop3)
1 C6 f: J- b) f1 N- qCustomers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
' s+ l, D2 q6 `2 R0 J2 p
# J4 |/ ]& W: r( M( \4 B8 eTCP 6667 (ircd)' j* Y# g) _ G
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
" ^3 L1 [/ v7 Q0 k) ]( A; U g: o3 ]9 o+ R3 j& ?' b
TCP/UDP 135-139 (dcom and netbios)
- Q# W8 b9 }! A! y4 \$ ^- OThese ports are commonly exploited by worm viruses:
! I2 {- I( j7 u4 ?7 l5 x" x5 j: T. C" D135 Windows RPC: e# q& r! a2 k# u" v( I, y' T8 d1 |
136 PROFILE Naming System (basically unused)0 c; W, r4 e! N0 R* q: k+ ?& m5 j
137-139 Windows NetBios
* L1 W7 r- U# i" _* e
3 ~, Z4 Y, C* [ ^TCP/UDP 445 (ms-ds)
@8 J6 s: t% }3 G+ b1 RMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.( _$ B+ @ x7 L! Z
7 X2 R, i* M$ `% J! h7 sTCP/UDP 1433-1434 (ms-sql)3 V+ j! @* d& J+ v0 h2 r: l8 @
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|