 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, + a/ e/ K+ D! I+ x4 L' y
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
# |0 o" V8 u, d+ p. F! `$ L# d, L6 O3 s: T% U2 M; d
Does Telus block any ports?
- k) \- M, F( ~2 X( J- H; u; Z( I
. o$ }( W. U2 l$ ?( r6 [/ E8 ~& NThe only packages with no blocked ports at this time are the Server packages.
! ?3 t9 L, @2 O' f
* s4 ^2 g% x# D6 {* Z, @/ qThe Blocked ports currently are:; V! O0 i' E S- F4 W0 f
9 w) c7 C r, x- M l' |$ w: e( U
TCP 21 (ftp)$ g9 |* a* r. [# @3 U+ F5 d
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.# A3 w" e8 f" v% n
3 ~7 ?- d0 s& `6 [% x% }. ] v
TCP 25 (smtp)
5 Y1 t' ^ s0 U W& a9 O& wCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.* H) M4 Z! [8 o( V5 }
/ ~( ?( t+ S( d0 ?- Z( |( Q
TCP 80 (www)- }2 @) ?8 }+ Y* G% t
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
- ?* A1 \. x b# y' j. a, V
5 m1 ~7 Z, @7 v: j. v0 g% X8 |8 {TCP 110 (pop3)6 K( R# \6 y B, o/ l0 G# i
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.$ h( o3 K. q2 O* f1 u
& e/ V0 s' m# ]( ~% MTCP 6667 (ircd)4 X# {# t) f* @) {
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.9 g. F# P" m( x8 L) j
2 q" f/ p0 T( o% h* |TCP/UDP 135-139 (dcom and netbios)
) f; O) R8 U, T) w/ mThese ports are commonly exploited by worm viruses:
$ T/ \" U* Z8 t3 d2 y* K! Z5 b: Q135 Windows RPC
! \6 w7 x& v# }136 PROFILE Naming System (basically unused)
* a/ Q2 B9 D0 S! F5 h7 J& n$ o! \137-139 Windows NetBios
) j8 p- h! C+ _$ N; J7 e8 J
, G7 n- Q" H6 k' r5 q! kTCP/UDP 445 (ms-ds)
2 N; b8 ?2 A" w2 wMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
. W. D4 c- L( g) r; u- G% _8 k$ s. @7 s$ x
TCP/UDP 1433-1434 (ms-sql)* ?1 o) N* X$ {- \& G0 R: F# i
Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|