 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, * p5 d2 L2 W% h& R2 h7 g, U
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
/ {' ?. z3 A& c' L- g" t( ?0 E3 n/ c# w( P4 l1 K0 v k! X
Does Telus block any ports? * w3 T* R- L: G9 C" A
6 |) K/ B1 H9 r: t
The only packages with no blocked ports at this time are the Server packages. / y1 G0 [" ]% o5 y/ `5 M
1 p& h# q- o6 E8 \/ o
The Blocked ports currently are:
, K0 s. U! e W/ G4 e/ R8 L9 L* G4 ]: c W
TCP 21 (ftp)
& ^/ P0 z% [/ v3 g u }- pCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
. _( p% ? [ H7 Q6 v" I9 D
# E: n* x- B" ~, v% J/ s" ZTCP 25 (smtp)+ |( u. N- @1 s; ? h4 S( |
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
4 }9 w: `1 _5 {# j, M
- o' q' B' l, ]- V6 F7 Z# @$ e+ r1 h. oTCP 80 (www)
% M" ~: r1 m- f/ g! U$ \2 ?. sCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
) E( n* k3 l6 c8 _; t+ |4 V8 ?" E, v7 F/ q) Z( g
TCP 110 (pop3)
0 n' R' E# }0 y: v. H& `Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
) z+ {/ w/ b% g- v l7 u9 V
" w! Y# v: h4 y& v. m+ ETCP 6667 (ircd)6 [! r, e( J% O/ N. W, \
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
, J8 |8 t+ b4 \, V$ \5 S( _/ E- x* F6 N
TCP/UDP 135-139 (dcom and netbios)% l+ n; N' ~. g9 o! ]- Z
These ports are commonly exploited by worm viruses:
* j/ J8 a& ^7 ]135 Windows RPC: T9 i: M+ P) R
136 PROFILE Naming System (basically unused)5 c$ y6 l i9 ~: H' L2 g! U$ K
137-139 Windows NetBios
( M @0 _& e- K5 U- T9 b# o) ]1 y4 h; w! k; ?# W
TCP/UDP 445 (ms-ds)% T& V! y0 W% Z$ t( e
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
" L. F2 F" y7 o& L) m( H0 ^" y+ G0 |+ A& {& X6 X4 ~
TCP/UDP 1433-1434 (ms-sql)
0 D1 \: c. h0 d4 p* n2 e2 ?Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|