 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
" Y) y# C1 g8 {) ?6 s. Q7 m家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
/ w: d+ r4 W9 j3 x. C8 E9 J# a8 n+ D# u* S+ I
Does Telus block any ports?
$ {1 l8 X# D% ~' J: s* S
" k' g4 q! ~- U5 J$ N( I6 h# RThe only packages with no blocked ports at this time are the Server packages. , x: [: @6 H, d1 T O4 C( Z# }
+ u `: S5 p3 ?$ n+ ]The Blocked ports currently are:2 N2 ?$ ?: C$ k4 U
# O( ?* l. q) |% F- v$ `
TCP 21 (ftp)! b) X; P) @& i6 G t: z6 ~2 z6 s5 j& y
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
8 L9 ~% f6 U5 a# J
# Y4 T7 s0 P3 w' ]6 |7 Z x& UTCP 25 (smtp)
& O+ ~4 r) l T* g* e0 }3 Y# pCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
3 s" G& N1 M9 P2 [8 o3 N
7 [; c5 L4 B8 Z- `TCP 80 (www)
7 L4 E+ v) l$ }( {; TCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
- I5 A2 U) A$ X" b9 u( f* ?$ A7 s0 w6 @4 F* Z
TCP 110 (pop3)# U8 a, O* R: T `8 Z
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.2 `& n% X% y d; C, B' U8 I9 o
1 U6 c/ s& v; t- W3 Q/ J' YTCP 6667 (ircd)
- N7 G& q9 m2 gCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
P9 Z9 x* f+ B$ i1 T$ Z
0 k& p0 l; i. h/ R( c, c/ rTCP/UDP 135-139 (dcom and netbios)7 [: P- _% [8 F8 [/ M9 h
These ports are commonly exploited by worm viruses:
; b5 ^7 I$ m+ `& a/ H' x' @" v) d0 \- Q1 y135 Windows RPC* I x3 b3 i0 F+ R
136 PROFILE Naming System (basically unused)$ f) R* o, s. f, O
137-139 Windows NetBios
! D5 M; |6 e4 {# v/ ?" i) ]5 j: K1 q2 X/ U, d- z( @! g
TCP/UDP 445 (ms-ds)
. B W+ ^% J i! h3 X5 l) RMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.* Q! D1 v& I+ p8 G. F9 S6 l
. e) a2 E6 X& x1 v1 @
TCP/UDP 1433-1434 (ms-sql)
: }* N6 W! j% {& WMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|