 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, $ i. K8 U" z) z, y5 l* e: G% P$ @
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。1 ]% G8 p- V) j7 F
2 p/ H- ]8 o: O; d! H1 |3 NDoes Telus block any ports?
- ?& ^) V- W4 J. M+ V( R" D: B* v
: T" Z, \* P& n- j- bThe only packages with no blocked ports at this time are the Server packages. ( w: a H8 W8 s0 Q y: h v; X
9 v Q6 F2 M" @7 h1 a8 r, V LThe Blocked ports currently are:" A- M$ D" U2 M% j( B
' j" M+ s) c( ~# kTCP 21 (ftp)
* d! e0 ^& A; aCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
/ L- T# a. r7 V' G; O2 {3 l1 w$ V8 X; [4 J
TCP 25 (smtp)+ a4 F; d4 b3 I) ~2 Z- E. D
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
' K7 `. b. Y& K1 E3 K( q: v: F! G/ g2 ?
TCP 80 (www)/ x/ O3 \% t7 U0 F/ `( E
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.+ j# D( r( j4 b2 n: `- K! J
& W% m2 F4 P7 l1 m* K ]. N4 g
TCP 110 (pop3). T8 K% @" h! z% D S" y+ t
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
5 \( [5 R) `1 n, i, J$ O
9 a) |7 W5 M w sTCP 6667 (ircd)
) ~( P; u/ `8 A% xCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.; W8 C/ l- s2 g% t: N, `. I/ U/ P$ w
, a2 n8 F$ C+ v' r5 i/ O
TCP/UDP 135-139 (dcom and netbios)
8 i( p& H' C+ b. b* _; o5 G- mThese ports are commonly exploited by worm viruses:1 a" X9 b/ D( Z# w+ U# ~
135 Windows RPC2 ]8 }6 i3 x2 p& c, r4 i2 K1 K+ u& b$ {
136 PROFILE Naming System (basically unused)
( f# i0 l* v% {, i3 A+ Z137-139 Windows NetBios7 g! M$ I$ ]- P
2 E9 X" ~) ~! h0 w
TCP/UDP 445 (ms-ds)
' |7 N1 y2 Q. {: p6 T, b) o: gMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
1 P, C, ?8 {! @$ W$ M% t+ g4 D& j# h/ Y
+ W* X/ v% ?: }! g4 G* s' [. fTCP/UDP 1433-1434 (ms-sql)
* Q9 ]/ p' i# j" GMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|