 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, ' J' D* I) v. q4 m9 c# U. W8 \8 J
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。- v) e9 Y6 p; u. K4 A/ B7 V
7 D) R5 s% R1 H0 J- a+ E# R# HDoes Telus block any ports?
1 J, V, F3 T1 b$ D' R& @; h+ |8 q7 L, Q. C$ G) B1 l$ X% s6 D
The only packages with no blocked ports at this time are the Server packages.
, \ C2 f$ ]/ q+ u' y9 m% |: s) F! f
The Blocked ports currently are:2 u- l3 z. y8 F$ @- B2 ?- q- A
& T0 r- M% `2 ?. GTCP 21 (ftp)2 \0 Q! c* B2 v, w: {
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
( r, d0 q+ F: U7 b- B9 ?9 F5 l- A: A; K. A, Y6 s7 k! j" ?& E
TCP 25 (smtp)
0 G) ^% p$ y! iCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
( ^' D: ]0 N+ x1 v, u
! q+ B1 B4 y& |3 R3 `6 `7 g. cTCP 80 (www)4 @9 A& ~# h: C& Q% n9 J% \
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
, {. s. H" {1 z4 ~
" M6 _5 m5 y% T9 `+ }TCP 110 (pop3)7 H/ i* ]( j9 t& Z
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
2 ^* {5 a; h; e/ b" ^+ v) w/ D1 U+ _$ _' F6 U) ]
TCP 6667 (ircd)
! `' |9 {1 V3 X8 i( f& M' ZCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
& Y; N/ G) f# c0 v* Q6 T4 n+ ~* i; X4 b" Z) K6 f8 b7 L M% Q
TCP/UDP 135-139 (dcom and netbios)5 G" q1 G2 L8 T& L$ {
These ports are commonly exploited by worm viruses:
# p1 O$ ~( h5 Q0 ?+ z- F6 d* o135 Windows RPC
$ Y0 k& L, \: o' X( H; J( t136 PROFILE Naming System (basically unused)
' ]6 H. I, e7 f) K6 q137-139 Windows NetBios
+ F; z- s: r, `4 H9 E
9 O& i( u# ^3 p1 T/ mTCP/UDP 445 (ms-ds)7 P! y! k7 F3 ^. c( o& k9 G
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
! h- Q( E. _: b/ @
8 d4 g, j; k- r. G2 W- uTCP/UDP 1433-1434 (ms-sql)* d( r. J, H1 D4 z7 z `( E( K
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|