 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, & @! d8 p+ s D" c5 E
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
, l% E2 y: P1 x7 X& S3 A$ y4 R/ d5 G0 l' w! n* E3 R- N$ x
Does Telus block any ports? # g+ g0 d1 d" B8 z( Q( F" }
3 v/ M4 [* m0 o! T z% s7 R1 b- ~
The only packages with no blocked ports at this time are the Server packages.
k6 G% B. ?! e
, y- s6 ` e( B- z8 w9 r* Z" A6 W zThe Blocked ports currently are:+ W$ ?8 O! |$ W8 ]
g* H, F" y; y- O9 Y$ ~TCP 21 (ftp)
5 w: t( K# M$ G8 b3 ~Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.; ~, M; ?! n6 u% h) _6 q
3 b4 P) o1 v" o; m5 r5 b
TCP 25 (smtp)# ~1 @2 j, n" @4 I: f& d1 S
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.( y, S# U2 X/ d* O/ m# Z
; j8 y8 V' L6 W3 d* e8 x. N6 ]
TCP 80 (www)
4 Y% f( M7 O3 B4 K5 r0 a3 p+ ?Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched. X# ]. s# Q& I/ [# h# U; x' z" u
& `+ P2 `! L3 q" i# A$ R6 C j
TCP 110 (pop3). S7 J' S; u1 O$ F) T/ z5 u( `
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
$ r5 F; V/ Q8 p9 m6 M
- w. X! {) m) G) pTCP 6667 (ircd)
8 j9 f; b& H- J7 {" JCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
9 R# D% {, o. A6 _, U# F& d3 f
TCP/UDP 135-139 (dcom and netbios)
* x" N. G, U7 ]3 f9 P& PThese ports are commonly exploited by worm viruses:
: S3 U8 U9 d# ^135 Windows RPC, V! G6 c! {- T- d5 k* O
136 PROFILE Naming System (basically unused)/ [2 r9 f5 x8 k5 x: x( @" n
137-139 Windows NetBios
% b8 N3 J+ A2 @4 y
4 ]: X- c x2 P% ]4 i( Q+ X2 ZTCP/UDP 445 (ms-ds)- J; h5 k( P9 j, |# O
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
6 E; c1 C3 O6 F& W& Z' i/ c% `# W8 n0 c
TCP/UDP 1433-1434 (ms-sql)
8 e: j5 ?6 l8 ~* a) ^/ |9 pMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|