 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
. L8 s' c" k* \7 N+ Y4 X家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。8 ^% ^7 Q. d& \. l
0 K' V: m( w# u4 I4 |5 b
Does Telus block any ports?
" }" E8 V' O2 a W* l! n- A( b0 J
The only packages with no blocked ports at this time are the Server packages.
8 r+ g$ \; n+ V8 z( ]$ j
; k, j! j& P5 W/ L/ \; i+ E( Q+ pThe Blocked ports currently are:
+ u) m: F. B0 C. C7 }* U. t
$ b$ s1 c4 L0 O# [/ c6 s- oTCP 21 (ftp)
+ l$ d4 [% `% v7 BCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
) U* E2 Q6 C% q! m/ j- E$ q! d4 l: @
0 [0 E- r: p$ [- w U! g, OTCP 25 (smtp); z" b' k+ h/ j: f u3 ~/ R# h
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
5 Q% q, R$ @1 ]" S: s" I9 @9 `$ D; r; f6 C: L5 `, w
TCP 80 (www)$ M3 y) B; Q; A v! d6 u
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.6 ^* o) G/ @1 C4 N" p8 B1 U
% N# k# `/ ]8 v" n
TCP 110 (pop3)" f- a% x1 X' X* S1 I- s& B7 W: b, F
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.2 T. ?5 Z7 S& b" l" j+ P
: ?1 m7 o3 E, g6 C }/ L- e3 hTCP 6667 (ircd)1 L7 Z( |6 T# } X0 n/ L9 M4 q
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
* e. l7 a3 f3 g2 D4 u
% y3 v7 r# k( f, bTCP/UDP 135-139 (dcom and netbios)
9 Z+ n; C/ G2 B& W# L9 }: U3 r2 ZThese ports are commonly exploited by worm viruses:
2 ?0 O/ J( g. N/ I2 B135 Windows RPC4 e5 S4 Y+ x9 Q5 j* F
136 PROFILE Naming System (basically unused)
( z/ G' f7 C' ^# q8 R- q% l137-139 Windows NetBios
6 Q* P$ t+ I6 Z7 W3 ^. w$ ^2 d4 k! q" B+ v9 a7 l1 T
TCP/UDP 445 (ms-ds)& E4 z5 B$ _; Y! \0 N5 G% x2 o
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.( {7 F5 A! {( C3 {$ H" L3 m2 W
. Q& c7 C3 R- \* L
TCP/UDP 1433-1434 (ms-sql)& ~- P8 ^8 y, T4 t B* I8 D. p# j
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|