 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, ! }4 z" M% Z, c+ q" }1 P, y
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。* H3 h( Q0 ~3 E! A! t+ H- C
+ a/ _3 h0 o$ @- \Does Telus block any ports? ' q0 B2 P0 B8 B. [
) }6 s7 r3 f: [( n0 N" cThe only packages with no blocked ports at this time are the Server packages.
. r5 Y( f. O6 Y* \+ l
7 i- n- S7 H. g8 \1 {) ]" b' M( cThe Blocked ports currently are:
' H+ ]: i* M9 {/ [6 B; g: K9 v4 b% A& ~8 o+ \( }
TCP 21 (ftp)
1 Z7 N# |& e/ P, R9 C3 z3 aCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
% @( W7 z: c! ? y8 S8 a
/ j) W: Y: K4 j' F6 T9 u9 |" p8 hTCP 25 (smtp): w, `: R9 G, q/ D; L2 k" `# t
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.8 |# D8 H" @/ t* c0 K( {4 j
) `8 u& S4 w+ g) D. X- T; D/ A/ {TCP 80 (www)
" W: }7 k3 E0 J* p& W- CCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
) c, h) ^+ F, c% E: E5 i7 o H/ d8 ^ t. u
TCP 110 (pop3); g# K/ o" i1 x* K. F! S
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.4 ?* t g3 l ]3 K8 T) j3 G
5 y8 }- F0 m7 s' D4 c* \9 ~
TCP 6667 (ircd)
. m/ L! `: V e0 T; l% ^9 @2 N9 SCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.9 y. \) K# j u0 _6 q
% `$ B( s7 d1 [% p
TCP/UDP 135-139 (dcom and netbios)+ c; q: ~1 D0 [* d7 h, f1 e
These ports are commonly exploited by worm viruses:
* T+ r& d! Y+ A$ a9 R9 |* U135 Windows RPC8 Z i- s" V$ z8 P& V
136 PROFILE Naming System (basically unused)
% ~% r* O% M8 b$ S/ U* A137-139 Windows NetBios$ X3 i2 [5 D9 D& m
! L8 j: ?" M1 u7 j7 G" g
TCP/UDP 445 (ms-ds)0 G. |* c$ G; v9 n" C# e+ w
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
0 Z8 m% j! x H/ B) L& |0 |, G, \5 p( o; ~, Z' @: @" [3 X
TCP/UDP 1433-1434 (ms-sql)
, a1 F' j7 P/ e7 GMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|