 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
1 H$ c* N2 E2 C: h7 s1 U* [" z# C/ P8 ]家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
5 I- J4 W8 R3 w1 C e4 r3 R
* A3 C5 m% c( L, R) Z" f9 @Does Telus block any ports?
, y: ~6 K w) \: ~) m# A
+ {' T3 B1 m( r& o5 F4 P8 wThe only packages with no blocked ports at this time are the Server packages. : g! h, r7 y9 @. ~1 h- D
+ O$ N% O) B u5 X1 X/ uThe Blocked ports currently are:3 f/ C0 T1 X) I5 P- \% g* q0 r/ U" l
; w) j6 ~( i. ?0 Y/ m- ^( b
TCP 21 (ftp)# p/ K. ? S% Z+ I
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.! k# N4 k5 e4 z" K( _! }! F
9 V( g z |3 `6 C& E! vTCP 25 (smtp)" ~+ o& F9 H/ c# z
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.- h7 x2 H5 {8 b* q' N5 l1 S
) \4 i% U3 w2 Z. _" |, Y. [; w) I/ qTCP 80 (www)& D9 W' _3 N9 G0 I
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
; m; q4 D3 N n( x7 {9 L( s
4 V2 o2 F% I. S4 C/ m. ITCP 110 (pop3)& g4 x" t% U0 J @9 s" R' _
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.* x* T( D6 |6 ^! ]# F
" k0 I1 f( M: c$ Y/ d2 }TCP 6667 (ircd)
9 q2 t2 n" |3 Y6 XCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.& s3 c$ ~; j6 T1 z
+ x( n- V+ i* o' {) ?5 O7 fTCP/UDP 135-139 (dcom and netbios)
9 N. [; A5 N" P7 H. T1 v7 h- \/ mThese ports are commonly exploited by worm viruses:
0 ]& g7 I: e4 @135 Windows RPC
5 ]) X) h9 e- p# ^! A136 PROFILE Naming System (basically unused)
) f9 @6 Z- I+ z137-139 Windows NetBios
5 n& m1 y1 |: v/ Q1 m/ n1 v/ O. t, S0 t5 a
TCP/UDP 445 (ms-ds)
- h, y' k* Y: gMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.4 e' W. F" W7 t4 h$ B" {
7 S! _" M/ y8 {% A' o8 G {! Z* YTCP/UDP 1433-1434 (ms-sql)- s- y2 {' W* m" s4 n$ C) k& J
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|