 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, . i# l& Y& M5 G; v3 D
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
* f7 S; J* L8 l. r& M7 y% u
7 s3 Y9 v" @( Z7 ?( pDoes Telus block any ports? + Q* b$ S0 o+ d( Z7 @
8 l7 [" Q& [. ~8 N( D, Q: m0 mThe only packages with no blocked ports at this time are the Server packages. : f7 ]6 C: T* T6 ~: Q& ]
# M! Z, u' y' V( m4 \) v( n6 N2 R) wThe Blocked ports currently are:
% L9 R7 V' ?* i7 X4 `1 r4 H6 c
% i U# u- \- ?3 Q. u2 wTCP 21 (ftp)
9 W9 W" `8 }" Q5 u( UCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
' m# D, x5 E1 b8 [& R+ x. ^3 r2 m7 r# ?- i, N9 h
TCP 25 (smtp)8 ^% o" m# y9 D9 V8 N+ V5 U7 p: R( B8 }
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
3 g1 d/ @2 A& I% V/ L9 F; _# x ?- U6 p0 F0 j% T7 @- s7 T
TCP 80 (www)
, M+ @+ ] D0 ]' Q8 A4 K3 w4 x$ QCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
& G) y0 A& ]8 }' K/ }% h# Y N2 O6 D8 z
TCP 110 (pop3)
) I" x. G+ r- N" E: ECustomers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
5 ^4 Y- f9 h: O( d1 u, r; u
. E4 x# j, t4 ^" s) F* q jTCP 6667 (ircd); \5 Q' r1 q! Y! G9 F
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.2 ?7 K u$ H; F; | f
9 i0 b) _! }( u
TCP/UDP 135-139 (dcom and netbios). G( M& k p. W- T& ?$ C! d6 _
These ports are commonly exploited by worm viruses:+ G Y o# f" @* a, Q9 w
135 Windows RPC& ]2 X% ]& ~& P) V6 |! [1 x
136 PROFILE Naming System (basically unused)
" U; \' b9 H5 q! b6 L" o9 W- w8 O137-139 Windows NetBios
* G8 N. t: B- \8 j4 \
: b$ Y Z& X; G6 x9 p! ~9 wTCP/UDP 445 (ms-ds)
4 f; ^* x. E1 m) C: q Q9 nMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
, X5 [1 n8 ^' L6 ^
3 d/ I4 e* `* c4 R. N& RTCP/UDP 1433-1434 (ms-sql)
! k4 P: J$ l$ L9 O5 {& z7 Q8 M& ]Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|