 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, ) j+ L! w, h1 w: ^
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。- b: ?" Q- W. b3 g# b- j
4 {- I' G. M( k5 K0 | C- P7 ]Does Telus block any ports?
- f- C4 }% m' S# B, `% K4 i7 i
k: Q: W+ x; b; L3 r: K Q. DThe only packages with no blocked ports at this time are the Server packages. - {$ M* ~# U" g) ^7 x
. l$ i. H1 I0 }5 T8 Q4 uThe Blocked ports currently are:
) [. H; w4 x8 M9 b- X( i
\! [+ l& g" c" v* Z. FTCP 21 (ftp)
" I3 R6 A: T9 J. \- A1 cCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
. j0 Q/ G6 ^% U S5 B$ `( @# q
3 {) _0 R8 [' |# v% b: L# yTCP 25 (smtp)
! I. r: l0 I# p" t& ?& KCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.2 O. k# \- ]; M6 G& j8 E' o
; i+ D( }0 N( E1 E1 _4 C8 ZTCP 80 (www)
2 e. X1 W- T8 C' ZCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
6 h1 _# @0 r5 c( V) x
7 G- y7 _' j+ ?/ ?TCP 110 (pop3)/ P# n* Z0 `: l( E. }
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.) m; L% k' @! m) \1 a+ @( H6 g
3 f. M) r) [( g/ w/ h4 fTCP 6667 (ircd)* {" Y2 k+ ?& L3 m
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.* v8 z3 U+ F9 x" d( D, g( g) u- G
3 O- F6 k9 i$ `0 F3 hTCP/UDP 135-139 (dcom and netbios)
l4 W6 V: g! s: ?* XThese ports are commonly exploited by worm viruses:
$ R0 ]5 p) B# P+ H# W135 Windows RPC
4 }( l9 o! R% r& [$ v1 M136 PROFILE Naming System (basically unused)
3 `& @5 k4 K3 _1 M! E4 w( |' ~137-139 Windows NetBios
) r) d' z) ]7 ]7 q$ |* O5 F
4 S1 e- c0 R) v# Q5 F: MTCP/UDP 445 (ms-ds)
' L6 g+ n1 \0 h" Z9 g2 eMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.+ @( d3 J u- c2 ^. M, h
' R' t7 Q7 U8 m, P7 Z; m( G1 I
TCP/UDP 1433-1434 (ms-sql)
1 O1 F' t3 }* b/ E# K& v. r g4 kMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|