 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, 5 w1 Y: k2 F9 ^( D6 _, w
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
; B% l K f) h1 u9 a4 s
- u& D) t! D- P2 e; Q9 ~* EDoes Telus block any ports?
- I. h7 b9 P2 ?: f: M$ \
4 s% [( d% A9 _1 KThe only packages with no blocked ports at this time are the Server packages.
4 [0 r0 B, L9 p" f6 P7 q1 t
/ _$ Y. v! s. U0 F+ d# Z* Q" |The Blocked ports currently are:
! P& |$ q" d+ @7 q5 e2 T
1 J2 v+ C4 J% K+ Z' D9 uTCP 21 (ftp)
6 h+ D4 P- c7 G, I. {Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
1 m" i k5 h3 t, q% ?9 b
4 M+ n! ^% i7 b" ]0 P# [, m5 b1 X1 yTCP 25 (smtp)
6 `# E# O/ V! ], k7 _5 K" _Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
9 A* b1 _- i3 [3 r; f+ u/ N3 _4 R) Y2 }% a1 i3 s- g
TCP 80 (www)
& s8 ]8 ? d, Z$ R0 a' w- L5 nCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
7 e( {" ~, g( j
|8 n: V, ?7 ~ n5 DTCP 110 (pop3)
) m2 A2 z: q6 J9 G- i6 J! SCustomers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
- H8 t# A% N4 ~9 t* n) u2 x$ ^6 A. [
TCP 6667 (ircd)9 |2 y! a6 `9 G2 F8 p
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.* K! G0 ?5 ]0 k) M0 G1 X( ]( j: v
8 Q2 B- D: w. F" G/ T
TCP/UDP 135-139 (dcom and netbios)) |: e1 {' _) d! I4 a' Y
These ports are commonly exploited by worm viruses:
% T9 }' w" y$ D; o135 Windows RPC8 c: B: q8 B) L) C. B/ q+ O7 ?
136 PROFILE Naming System (basically unused)
: t8 a9 ]( n; E2 i- v6 h6 ?1 u& y+ ^( N137-139 Windows NetBios8 _- I; B; K* b5 J+ j9 p& o
) `/ @0 [6 d4 v i$ U& QTCP/UDP 445 (ms-ds)2 ^9 ?! ]6 a2 ~( |& o8 |& W/ B
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
; N3 r8 l6 U& W: x$ i ~# z% m/ ^3 ^& w% w! K; ^' W# ~ k3 y
TCP/UDP 1433-1434 (ms-sql)
' g; {* U; s' zMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|