 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, `; C& z$ |# C4 S0 R3 t) b
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。+ @1 k+ r" y- g6 ?. M. ~
2 x/ i8 y: s* l2 S- a
Does Telus block any ports?
5 J5 ] V2 S2 n5 A, v2 ^ R
: [3 K$ k8 F$ C& N) `( S; CThe only packages with no blocked ports at this time are the Server packages.
! `2 J+ W8 m D: K
; l# W; f! D8 ]* d& D) v! hThe Blocked ports currently are:
/ q; C R% J; \; a' q2 W' S4 _* V2 \6 O7 a- k8 X
TCP 21 (ftp)) [8 k- H! h% q9 R+ V" z# H
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
, c& [2 J* ]2 s; I
' v) }4 X: C% d1 |( w3 Y7 {TCP 25 (smtp)
: a. \; X/ k$ r; t( o5 ? ]4 s4 }; F+ aCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
9 v6 g; U! n( \0 U- a% O5 Z8 Y5 L% j" |% A+ r3 A! n1 I l0 N
TCP 80 (www)" L( [+ F/ P4 ^% Y
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
- I$ I8 Z; s. \ |$ C9 [& [' t' N/ a2 x3 X8 A7 g
TCP 110 (pop3)
6 W! T* g% M l6 C( sCustomers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam." T s) i: f0 E; v1 A
$ j6 {4 i1 V, E# i. n1 \
TCP 6667 (ircd). U0 M" b: {' E8 H" j+ h! b
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
4 w: ?& F) B# H" u2 L3 D1 `2 D5 p2 d
+ Z; G: |& r3 ^* I/ }6 q- VTCP/UDP 135-139 (dcom and netbios)
/ x5 | ~& F% { v- h SThese ports are commonly exploited by worm viruses:
0 x8 r9 c) y+ \135 Windows RPC0 \/ r8 Z! x6 N! o
136 PROFILE Naming System (basically unused)1 t ?( g$ i/ e G
137-139 Windows NetBios" I% d, X K3 {7 s
+ {; L8 q8 @. I) uTCP/UDP 445 (ms-ds)% c, C3 @3 A- u) V6 j; A6 K7 m
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
6 `+ r" E/ i8 J9 }6 g! U( U5 t$ @2 q
6 w# |, x/ {3 f$ }0 s B) vTCP/UDP 1433-1434 (ms-sql)- ?* Q& e/ S2 d, P+ z) c
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|