 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
1 B( T! \+ [8 q5 j$ s7 ^家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。8 I* q9 i3 l% u* f4 Y: s5 J
, {0 R1 _! _+ p9 S3 t
Does Telus block any ports? 6 A1 v; Y$ _' @, r: K- [# L4 @# Y9 r
+ K2 L! N' b4 E' kThe only packages with no blocked ports at this time are the Server packages. ( F6 i u6 a' ^, ~
9 m% X$ p+ T+ R" Y! r: [
The Blocked ports currently are:
: ?# M6 b8 w& H D# A( d# X
! g8 D% s; E. q6 r8 V( H$ X* uTCP 21 (ftp)/ F5 F; [8 [' w2 c- ]
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
# M# O1 p7 O# @& e- R7 D3 \4 {# h: ^( K5 |" a' w/ M0 \
TCP 25 (smtp)3 X6 R v( d9 W1 a
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.# q/ N1 M( a; `/ ^" o- ~% j
* t1 Z& ] { V# G5 d, q, p% ]) \7 B
TCP 80 (www)+ c% q/ t1 `4 l9 g0 u/ i3 V
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.8 k/ e! p1 _4 m$ S8 G: ~
1 \+ |" H/ t4 ]4 K7 f& |2 C% s
TCP 110 (pop3)
1 ?' u7 ]+ d) s* JCustomers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.: \% c+ c+ g& o( X! w- t
1 S- j2 O( c% h
TCP 6667 (ircd)# t0 T+ ^& x! S# \( `
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
/ f) D( Z9 S1 v/ R- s
9 |: D4 l4 R: kTCP/UDP 135-139 (dcom and netbios) C8 h) L8 h; z, w
These ports are commonly exploited by worm viruses:
0 [& U5 n& w2 j: _1 P1 n* p3 J135 Windows RPC+ Y& [7 u. |2 L! r
136 PROFILE Naming System (basically unused)
+ g0 ~+ G1 F& \6 j' C* Q6 f) R8 x: I: y137-139 Windows NetBios
" i2 A2 g5 `- o1 p& a
( Z* `5 O( g7 v3 ^3 mTCP/UDP 445 (ms-ds)
) A9 O3 N! o [& Y' R' k7 w0 IMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
) c8 Y% U& a" J& T) R& v5 e) a" C/ S" V
TCP/UDP 1433-1434 (ms-sql)
4 J3 v q0 R! a$ G X% v$ aMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|