 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, 4 j/ h* b6 N9 X. `. n4 O
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
+ F6 r, y3 R* k& X8 v
, r' M* v/ Q3 r0 S4 DDoes Telus block any ports?
q" D# G& l3 \9 L2 V% I! a6 ~; T/ u8 R& w7 N$ }, O) ~* \# E
The only packages with no blocked ports at this time are the Server packages.
4 B. W# S# C* t L5 [4 L, Q
. N3 E+ u, _' e% f2 n& @4 N# A0 [7 ZThe Blocked ports currently are:) |2 n1 u, K. F/ |8 }5 m2 z8 \3 [
5 o$ d. x0 `+ S' {+ R8 b3 jTCP 21 (ftp). K% \* U2 N$ Y5 T8 N* d$ w6 j
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
g/ _* t3 z$ {# E2 o
( z) n u! A, g: y& g0 XTCP 25 (smtp)
/ D, L( t" [1 J" T- S2 ]( aCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.% q' c; x# Z2 B: D' E: u5 z
, f6 G# ~/ t( [5 ?: p. d
TCP 80 (www); X1 \) K. G' s
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
) V% j7 ~ E2 H5 B# s5 d" i' O! y" S5 N( k' H, E8 [: ~
TCP 110 (pop3): e S7 e' F* A" `) f7 a- J# f0 n6 H
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
; O; y# q8 Q: r1 W
2 b& N& t7 N( \# U QTCP 6667 (ircd)
) S% u8 ?# M! o5 YCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.: j& o! B6 t$ H$ o- J& G
8 w, N) W; R" F% q9 W- r* jTCP/UDP 135-139 (dcom and netbios)
$ [% L: J$ H5 X% d, fThese ports are commonly exploited by worm viruses:
8 s" M4 y5 |" {9 N( z" K135 Windows RPC
5 m b* |5 x% p6 g+ P4 f9 W136 PROFILE Naming System (basically unused)
- K& h" }) K s$ ]' [137-139 Windows NetBios
0 s! ?7 F& [( k5 l1 ?: _
* C) W( T$ g+ j# w L- STCP/UDP 445 (ms-ds)3 }! ~0 y d9 h$ _1 h/ y
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
t( a: L. P/ E+ f" C) t& p0 B F/ k
) f0 E2 F* H9 Z! dTCP/UDP 1433-1434 (ms-sql)" X, q5 e2 I# R. n9 @- l
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|