 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
) x/ ~( Y- R7 I7 {# Q家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。, ~$ d0 ]6 W/ X' B9 |2 _8 [: ]" d4 y
/ l" I! P0 [ b5 U* z$ r7 b1 J$ }
Does Telus block any ports? 9 ?4 U2 P$ j. w- n
8 |) \8 |" j& J
The only packages with no blocked ports at this time are the Server packages.
N% d% I) ]7 W" b/ Q% }# V/ j% `) _* Q* E
, l6 b1 F) W& k( U3 e. t, dThe Blocked ports currently are:
! F0 U; j t0 \- X, H& y+ ^& I- s" G7 s
TCP 21 (ftp)
% S6 O0 |$ J q# P* Y; R, _$ VCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
0 Y( Q, P, D$ J5 z7 b# s" ~2 W& T+ F( |( x9 W
TCP 25 (smtp), Z9 m& l; {+ @* C* I
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.& q; _! A K; {8 l
# w$ O e( Q5 L( ^) x
TCP 80 (www)
8 C2 V: K6 [; { sCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
: ?& R# j K( l, B" ?
% j8 ]( c7 k% c2 a3 r: fTCP 110 (pop3)* B( s/ @- _7 c E5 @' O% X& Y
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.) f$ i4 ], I/ ~
+ S" H% i/ _# c, ]) ^' dTCP 6667 (ircd)
5 y4 x) H, [8 u% w9 NCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.0 j# {5 F1 ?' g% C# V9 v7 X
+ k# e2 V7 M2 [$ L. }; n1 w9 p" @TCP/UDP 135-139 (dcom and netbios); C0 a6 ~7 W7 A; h( g8 m
These ports are commonly exploited by worm viruses:
6 V7 K6 }" X0 \' [- s: G135 Windows RPC
: p0 l8 n; w' o4 m) y! ^) [% }136 PROFILE Naming System (basically unused). M* w7 U# q0 f& \
137-139 Windows NetBios
: o2 F) E% Y* u" g+ A; t1 G8 q6 x/ `
4 \# B' N+ L9 b' c+ LTCP/UDP 445 (ms-ds)- p' u) O& o1 s+ u. C3 [2 P; Y; }
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.6 S5 D5 w$ |+ ~' D4 K. U6 @
" a- N7 p* S- J% j- u4 X4 V% ]; [
TCP/UDP 1433-1434 (ms-sql)
6 S! U! ^" `& x. }) ^& dMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|