 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, ' I5 S2 [; c$ b
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。7 ?8 _+ r+ q! E3 i, V/ x9 t2 m
2 b' V3 G L5 FDoes Telus block any ports?
" k& V9 h* `$ S
4 n( l+ Z2 \ E: u) k: s5 j: b8 bThe only packages with no blocked ports at this time are the Server packages. # m* D; y0 q! n
% B4 I. d5 j( T. J* ?( ~The Blocked ports currently are:, K+ T1 _5 c b% z
! T8 E! G# l0 U* Y& ^% g1 q
TCP 21 (ftp)
6 @4 b. ^3 f+ _0 ?; tCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
|+ P( N4 L0 K7 k8 q) A7 G% w. t! r9 a6 ]% R9 k& C; L/ u( K7 D
TCP 25 (smtp)3 |4 Z! g6 C, G
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
9 }* W+ D$ q g: E+ B& |: G4 X6 Q% K/ L9 B: ?
TCP 80 (www)
, w% W* o* S& P' q, g. ACustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
+ U+ G& `& B7 H( ?. P) u* `4 F8 H6 M% i5 z+ Q h
TCP 110 (pop3)9 @7 h# C0 t5 {2 u
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
$ ?9 X) N4 { C6 _# E. J, A
. h3 }: I c( U! C1 Q* c" ]TCP 6667 (ircd)
- ^ k1 _0 _4 d7 T7 }+ bCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
) e( E- W2 s9 d1 B% I+ s4 _- h- x+ e8 _0 z% b) ~" J
TCP/UDP 135-139 (dcom and netbios)% W6 S/ S1 {! e, n1 U* T/ W0 D
These ports are commonly exploited by worm viruses:
5 n* @8 }- Z! @" h0 p/ O0 \/ f135 Windows RPC3 f& A4 W8 a0 n/ ^% j
136 PROFILE Naming System (basically unused)
: Z5 a1 G3 t, T. ?1 c137-139 Windows NetBios. T. w* s; L3 Q% }$ P! _
3 q, e0 X6 u8 ]TCP/UDP 445 (ms-ds)
) n. }) L3 v+ y2 P, a e6 Y+ BMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.2 U. V3 t. v6 K% |' m0 y% Q- f
4 ^+ r/ H2 Z9 p$ N- w
TCP/UDP 1433-1434 (ms-sql)$ Q, J; c5 d4 Z% F3 _1 A$ Z0 D
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|