 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
$ h3 @; P& t1 n! M( y, v家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。* s/ U. Y3 B; L5 k
" I/ \& ~5 s9 e" J0 z2 J
Does Telus block any ports? " t1 O$ x4 N) w! x5 e0 Y) k
" G9 b$ d- u, Q \: u& C8 t( n
The only packages with no blocked ports at this time are the Server packages. 8 _0 X- [2 n4 h0 o3 r. A- h
2 z8 P* h8 y. G9 f+ f4 p3 g
The Blocked ports currently are:* P1 I, T% [2 P: i# V7 C( v
- b8 O1 B+ k! k, N& gTCP 21 (ftp); T9 D" c9 t1 `2 r8 h* f
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.2 ]# k- ]( \* {7 w
6 z0 ?9 h+ {, K f4 g* ?- }TCP 25 (smtp)+ D5 _0 \: |3 o+ s7 U3 R' a
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
) |9 s0 V- W6 H2 b8 n. \% z( `1 t; \: z/ z8 L2 h) Z
TCP 80 (www)
& r' S4 Y0 m5 \4 P# G+ t! @Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
$ M8 b- V7 Y5 p$ T! b+ E) f
# Z/ c9 e0 O4 {* X) ^8 I: uTCP 110 (pop3)
2 _7 @$ l4 M" Q, S& vCustomers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.: E; X, A3 P( |" \; r
" p7 S, t, ]1 OTCP 6667 (ircd); _; b0 u3 e# w X* p* ~
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
0 n5 q4 R# F+ h& J: a0 v( T) B! v# u3 V5 j! v; B; l
TCP/UDP 135-139 (dcom and netbios)4 D1 ?) O1 K$ P3 y# t( }1 B$ y
These ports are commonly exploited by worm viruses:/ k6 a5 q: v, J. I& L5 @
135 Windows RPC
3 J* h# W" S: g( e8 a( [136 PROFILE Naming System (basically unused)% ~% i1 @! E& Y8 ^8 A! V
137-139 Windows NetBios+ l+ e9 f8 {7 W0 f
& K K8 U/ C, w9 C1 l
TCP/UDP 445 (ms-ds)3 ~- ^' w: X. c3 w$ A0 a) r+ z
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
6 t# v* ~, j& J# p( i( \2 {; S- J; O( J% s( j& @* T5 W- @7 f$ r
TCP/UDP 1433-1434 (ms-sql)" G$ D: w2 X, K- ]
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|