 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
1 a2 f9 p U% @家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。6 | W+ c# s0 p6 i- S5 C
& @# P. M$ ~3 m4 [$ x
Does Telus block any ports?
1 B( u: d; M* x1 V8 u) L& j/ g, L% y, g( n7 K
The only packages with no blocked ports at this time are the Server packages.
4 |' e0 s* Y& _" A. Q3 {" S3 I4 _9 Z/ y
The Blocked ports currently are:
3 k$ C- o7 B" f; F6 w1 `; I& k7 L% d* s$ N+ }* R+ |
TCP 21 (ftp)
9 I7 E# l4 z9 p+ k; D# f3 zCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
. Y8 L+ D/ H* I* x G% c8 c* R
) `, r8 N2 I' {/ ^0 z% ]8 _TCP 25 (smtp)
1 _# h3 G; j6 E2 VCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
% S- r7 A6 W/ P* T2 d# @7 D$ H& o5 K1 Y, W7 Z# R
TCP 80 (www)
) y Z5 J z- n& {6 f: mCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
/ ~+ p" v2 [& I' _( o
- ~; s- N6 E. t2 [! eTCP 110 (pop3)
5 h/ i7 w% u# y6 O; z+ m; I" ACustomers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam., v$ [4 _( ?! q/ V1 u
0 y" {! L' G- ]3 d2 q
TCP 6667 (ircd)) j1 X/ u4 a# i" N3 w
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.% D% F H# A9 Q `* r) i! t' h% D6 {
4 r8 `; Y$ s# o. ~& XTCP/UDP 135-139 (dcom and netbios)
' j# c( Y/ k4 n9 p! ` H! \$ lThese ports are commonly exploited by worm viruses:
5 d: L' v$ E6 P; @- Z& b! M0 n135 Windows RPC) G! _! u+ a5 g( N
136 PROFILE Naming System (basically unused)
7 B! h9 D% f. C* x" V% r) B137-139 Windows NetBios
2 |% D$ i7 w* Q5 X n8 A8 y8 y3 b: } p* a5 C7 Z- x
TCP/UDP 445 (ms-ds)1 w- S. n- _' j& u1 C4 L# K
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.8 O& M+ D# M0 I& |
& }; F8 ~+ I0 }) | J6 M: \TCP/UDP 1433-1434 (ms-sql)/ s& p( B/ k( f/ P; J5 I
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|