 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, * M4 L- \% W; |7 }+ M5 f" S9 Z
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
- J2 d* U; E" q" p1 U! \+ W. W
- c; O6 k& A7 i! XDoes Telus block any ports?
8 Y7 N9 K/ ], | \/ {) {% n: s1 r: R6 z& \1 P
The only packages with no blocked ports at this time are the Server packages. % b' Q0 r4 [8 ?: Z4 c
9 A9 m! F& w4 J6 D4 ?The Blocked ports currently are:& H! K; e' B$ n6 Z. J l8 I
1 E, E6 W7 R' C- \% o
TCP 21 (ftp)
4 h* @3 o, t1 g# |9 ?$ K1 M4 I0 U1 VCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.& V1 Z2 y% e) T1 r4 R
" P' H* D. X+ w8 C& p3 l0 m1 uTCP 25 (smtp)
; J# U+ }5 U1 w/ \' ACustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
+ e7 C. b/ ^- z3 L+ d4 i
+ @# {- S- q) T" Q3 lTCP 80 (www)
) g7 I0 t# i4 N ]/ l; v4 FCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
, ?5 q* V' c# Z' k1 ]( P8 H" Y, G( z+ y7 C! n% F @
TCP 110 (pop3) m( O2 h& L1 V* `
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
. H0 u- H" {' H/ U0 C) E! q3 ?3 J" D
TCP 6667 (ircd)5 s5 g6 N. d [$ r( }
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
% e& q) w- z8 ]6 p% A8 F2 B
2 D5 b# @, T0 W4 A/ ^TCP/UDP 135-139 (dcom and netbios)
w: I; b e. Z( E/ F. ?These ports are commonly exploited by worm viruses:2 _ m" ^# ]5 `: U% u9 }
135 Windows RPC
% F4 r5 I( ?3 a136 PROFILE Naming System (basically unused)4 M+ n$ ?- Q0 e* E
137-139 Windows NetBios( r' P& D( L" V, K3 R1 W3 E+ P
. v! B# K: Z6 B+ V/ D4 ^
TCP/UDP 445 (ms-ds)
; `4 A$ U! M: u& c4 KMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
+ i8 f% Q8 `% I" M2 ~0 J: f, _& }9 O' N5 l7 `) a9 ^
TCP/UDP 1433-1434 (ms-sql)
6 k" j# @; B' @! }/ d8 b5 jMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|