 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
5 Z# B9 ?3 b4 u0 b& \6 @4 Y5 N家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
. u6 }; e# L: E+ t/ h% U" ^+ a0 r& E' K# K
Does Telus block any ports? 5 e- [# q" P( G& P5 @6 p6 V- G' O3 p
/ J2 l# M- d! h/ y( n0 Y
The only packages with no blocked ports at this time are the Server packages. ' B, i }; [/ _) x" g
- ]2 T8 G0 g, U3 p4 x1 GThe Blocked ports currently are:- G, T" d H) O
; l/ w! Y7 Z0 C2 }
TCP 21 (ftp) {" s4 @1 x% @2 p! A: c
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.6 [" i0 }7 [4 T. f) ]) B
. ], r7 d. V( l$ DTCP 25 (smtp)
( L# I [! V v `+ kCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.9 K8 j3 T( k1 A t! D: M1 b
5 q0 C, T- O* uTCP 80 (www)
7 |$ ~! D! T8 sCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
% u& e9 g% h, b" o7 E: m7 I
# i5 Q( V0 D' G, U; I: p' uTCP 110 (pop3)
4 N2 v% z4 S+ \ l0 cCustomers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.% g8 y/ R D2 b- C% A+ E. p
+ e9 |8 b) W9 u- cTCP 6667 (ircd): m4 M6 `, j+ ]
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
& w; S9 |% K; Y( i; s2 v
& ?& U! g) `6 Y) z# a) S5 y% E, \TCP/UDP 135-139 (dcom and netbios)
6 U( L' e$ L3 Q, f1 O" c9 u7 EThese ports are commonly exploited by worm viruses:
" s' @% ]7 }, D/ N5 m& t, z4 h1 w135 Windows RPC
2 ~" _. K8 j6 J, `+ r, z, n136 PROFILE Naming System (basically unused)
0 z% @3 j, t, j3 Q3 a137-139 Windows NetBios
% [. Y; h0 |& n" }: K. y; b3 r1 Y
TCP/UDP 445 (ms-ds)# Q9 w; o" F+ e* i: ~6 V" i- F* S
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
2 D7 U9 x- c& `9 k% Y2 X4 T9 ^
$ s1 b# ]& c0 iTCP/UDP 1433-1434 (ms-sql)# W* X3 ]% D" v0 |# u
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|