 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
$ s; G* D( L+ h- W8 M家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。$ w1 Y) U I% d
1 m+ J+ Z; L0 q0 NDoes Telus block any ports?
" a, }; i( F* i% I3 \7 m' g, G7 f! m7 t
The only packages with no blocked ports at this time are the Server packages.
f; f+ w6 D- b! y9 P+ e( f
; @/ ~2 N- E4 p$ TThe Blocked ports currently are: \. t0 T& R+ R. n J
9 O0 C z4 K8 g7 c0 PTCP 21 (ftp)
: o! z" Y) T) h. f, d2 DCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
3 e2 t' n# ?" ]+ ?7 p/ o5 T9 A, t# K) p4 t# c9 h( v1 [( N/ c6 J4 n7 W2 t
TCP 25 (smtp) M6 N |4 l1 X! Z) @% p$ l! U# r5 H% g- q
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
# ~$ D8 J: ]$ ~% ~, A4 C; z
" ]& ~- R$ ?* F7 l4 h9 lTCP 80 (www)5 W6 k8 |' x/ Q4 A1 ?- l
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.+ x# n, x7 |1 A% [! p
4 b( T7 z' {( _$ J4 y" x: h0 p$ ]' eTCP 110 (pop3)9 {- o& }, h: C5 i# G
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.+ O! ` i- ^& y+ f. G
, D# N" f, t# OTCP 6667 (ircd)
) x2 |* a6 b2 C6 W8 c: ?/ j* o- r+ lCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.0 Z. D3 g6 N' ]
2 y7 W6 p: d f& B1 `* N5 Q/ @% F: q
TCP/UDP 135-139 (dcom and netbios)# B# M, n$ n. L% F `- E7 r
These ports are commonly exploited by worm viruses:1 x- C9 A0 [7 Q' p+ `) \5 S
135 Windows RPC1 s _- l9 G2 ~: F9 `$ z/ C( Y6 J
136 PROFILE Naming System (basically unused)
4 b2 k5 X; {) B9 E2 \6 _) H! X137-139 Windows NetBios- _$ W1 r2 o, X/ V
8 w" r, N% \; d3 J
TCP/UDP 445 (ms-ds)
7 i. v# E' l/ l8 ?1 o& lMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
$ W' t: _6 Z7 y
% q* [* X q+ I, I: b/ k+ RTCP/UDP 1433-1434 (ms-sql)9 M" k- i4 n7 W, d, ?1 N6 w7 P
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|