 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
- \0 {0 _; I$ ` V/ d家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
: P& A4 g. `+ e8 A6 [# D& g3 M% j- E; w4 y
Does Telus block any ports? + R, u: G& a( q6 r
1 m& n7 c& { _* X- Z5 E& k
The only packages with no blocked ports at this time are the Server packages.
- _2 ~; s) c$ L0 ^- n, L1 W- f' P" f
2 d7 c6 [9 k7 @6 \5 |The Blocked ports currently are:
! F x8 z+ q! E5 t7 o8 z: G2 ^* x; n. r& N; M" n, q4 O
TCP 21 (ftp)2 k( }! `' l/ v/ V. C9 v& L' [
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
3 P$ l+ u8 z' M( p; j8 \: X3 ]6 E: D
TCP 25 (smtp)
) t6 S% E9 Q, d. A7 L7 L+ J; ]5 wCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
+ f' R) Z6 y; x% F* z# N: @3 \# g `( |7 U R ~
TCP 80 (www)
9 [" j |! b" iCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.+ Y: v. T. Y* L7 z( z; G) t! x
6 P& s1 b. ?1 N" u% ?" w DTCP 110 (pop3)/ g3 q- z' \$ L) \+ r1 }
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.4 A! d" \; Z) N% U) T H y
, J/ u+ |( a* O; i
TCP 6667 (ircd)$ @0 A6 G, O8 H! u& n- O9 G
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.; E" p7 h* ~5 t+ `# @4 A( E
1 s5 R2 P( d, kTCP/UDP 135-139 (dcom and netbios)6 A- V4 D3 ~, d( d! e: x
These ports are commonly exploited by worm viruses:
' ~0 m! U1 Y7 u1 \135 Windows RPC
2 ~% S7 i( D* f9 g0 N136 PROFILE Naming System (basically unused)- X2 S% r6 Z2 @' u7 Y, r
137-139 Windows NetBios T C6 \2 l: y# g/ i( b
, J8 g+ p v r% b' \) E
TCP/UDP 445 (ms-ds)( V. Q V+ @* u' I% a$ O; ?1 b, ]# {4 @( _
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.+ o/ y8 e4 }& D9 ]( I7 s. D
! n' u8 @ m! [+ s' ^$ cTCP/UDP 1433-1434 (ms-sql)
8 i5 n0 g# K. i/ F8 W( g: B- g( y9 b" ?Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|