 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, ' a' \- p" P- N
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
y h) e r+ V. w1 @
) F1 q/ ], s* e7 k. z, ^ d' VDoes Telus block any ports?
' f( Z9 g* g& P; F( ?' Q( l7 f- i/ [4 T5 L' c
The only packages with no blocked ports at this time are the Server packages. 9 W- B4 ], ~, V3 S2 a4 L0 C. e0 T' W
& v5 V) x* e; Z% m/ e5 f
The Blocked ports currently are:
$ s# b/ x! H0 l. H6 I7 J9 ~
% q5 c) P6 Q) l; W2 K$ PTCP 21 (ftp)/ Q$ u6 z3 l# o$ L; B# E
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files./ F' G7 |& Q/ U" y& P: y) _& m* L6 J
5 Z4 g3 M0 W# H( m% G$ x
TCP 25 (smtp)
2 x; y4 [# y6 Z5 i5 \) sCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam." S1 D) B4 s8 M$ E5 J6 B
4 q h9 N5 M# r2 x5 ?
TCP 80 (www)
! F& t, {- u9 h9 z6 g0 o, i* \, vCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
- J& k. ?+ S1 u P4 G- {. U2 C, V
) v2 L7 K. D: G. H$ B7 d aTCP 110 (pop3): O+ L/ X. I8 ?' [$ c. d. J
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
, E) x& B+ u5 L& b# q' Q2 r" A1 ~& |
* P- Z8 q4 Z$ ^# mTCP 6667 (ircd)$ |$ I) v7 Q: P" Y9 t
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.0 `& d$ u5 C& o @% q% n
9 X5 [$ f& ^3 T% {7 G! D+ Z5 F
TCP/UDP 135-139 (dcom and netbios). d( A2 ^! u0 N% F" A) ? I
These ports are commonly exploited by worm viruses:) w5 N/ s( H( N7 {& }
135 Windows RPC
1 h, _* a! Z+ ?9 a3 B- c0 u6 l136 PROFILE Naming System (basically unused)
0 G. h( a! Q/ v% s137-139 Windows NetBios3 N: }5 m! d% `, p& I
/ G, ~2 g' @4 C# I" m9 s
TCP/UDP 445 (ms-ds)
3 j7 [* |' F( hMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
0 h" V( D1 ~9 y& V; @$ \2 n
4 G/ [8 `/ l5 `; w [1 OTCP/UDP 1433-1434 (ms-sql)
/ U0 g8 Y4 s0 H( R3 BMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|