 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, : W$ Y/ J" g- f: l w% T8 p
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。' W9 M( u$ K! e$ o. i. P& r+ G0 _% |
: ^0 _4 F! C7 T' }Does Telus block any ports?
: |" Q4 x8 [0 X5 j* G7 L$ G" |; N' f I" e# q" x8 K3 c# ]8 C
The only packages with no blocked ports at this time are the Server packages.
( S/ a9 K) M( j! M
2 l2 `* \$ {. |6 H9 w# [9 O) ~8 ]6 dThe Blocked ports currently are:& ~, L) z+ z$ P S. E8 w7 V( D: ~
" b1 Y+ d9 n. H
TCP 21 (ftp). J7 G1 w& W$ C' Z& X3 p
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.& z; U$ S& S6 W$ t( r$ T2 {; ?" N
9 q- A0 b: f" q! R
TCP 25 (smtp)# j6 T1 l" w1 i" U+ x; W& q
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
( V7 o+ }6 ?6 x% L
% @' p/ v5 Y( B* L/ ~* @TCP 80 (www) M1 P8 F t& P, e0 J
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
* A1 q* R- g" X2 {
' G4 g5 J' [: F( w: YTCP 110 (pop3)
, p5 ?# R( u ZCustomers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
/ T3 t" t/ O. t' \. {# k; I9 m' R1 n- T
TCP 6667 (ircd)
7 ]5 I; s7 s1 @3 yCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.6 w: z5 c; p0 o8 H
+ V; g. M2 Y t4 m+ n* e2 U9 H& q
TCP/UDP 135-139 (dcom and netbios)
* z; X& f5 G z; K, {5 @$ mThese ports are commonly exploited by worm viruses:
~: L+ O6 R0 J+ q/ A1 P1 @135 Windows RPC
* \; I* j; w3 @' C136 PROFILE Naming System (basically unused) W! ?* p2 S5 r# w; w1 L4 _
137-139 Windows NetBios) ^. {( u6 D# n' R, Q
8 M* P' p9 e, K5 w4 W4 L( x
TCP/UDP 445 (ms-ds)
. A& q R* H r' K2 d8 k3 mMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
2 n, d; d) C& X8 L# b8 q, {# v( o
TCP/UDP 1433-1434 (ms-sql)
, q" g, Q4 k+ O) \Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|