 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
( v0 j) O% i; T# D家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
5 E1 n1 y2 u) t( p3 f! K
# E% Q1 {: C0 k* R$ X3 iDoes Telus block any ports? ( I" [! r6 `# ?( o
( k J5 j8 D9 Y) S; X1 i. A# j+ I: KThe only packages with no blocked ports at this time are the Server packages. 1 B4 g) m4 N) {7 ?) Z* w0 v0 D- w
6 I" g+ ?- L- M2 ~, g! k7 n
The Blocked ports currently are:* `( S2 H) A. q" J9 q& a/ n) y9 g ?
/ w; e; N4 ^# V M) o9 k
TCP 21 (ftp)
% U/ `+ Z( I6 j. s; E2 `: MCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
0 t9 Q, V" A4 }; K9 z' k: u$ i
' J( G Y# _* w% C' R& K2 J1 ZTCP 25 (smtp)
# S4 R* x3 x' ?, ?Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
7 ^2 [- s. c3 f T
9 K! Y( [" S+ V' V% OTCP 80 (www)7 p9 ~8 t! c& T7 \% O% s5 E
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
7 B9 E. x% O, S* |- K! u( [6 u" `" C& s ]8 b9 V/ x
TCP 110 (pop3)( {; l. m: G9 N+ n3 S/ |& y8 ` Q
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.- Z0 \) X2 O. O/ C$ Y
/ \- j# Q7 X# o% L( m& E- G; UTCP 6667 (ircd)$ F+ G7 i- j+ l3 l) @
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.9 |+ E: ~& I; ]6 H/ P. k' y
. J% f7 Z' [9 PTCP/UDP 135-139 (dcom and netbios)
# g; Z! Y$ P" E, g6 \# PThese ports are commonly exploited by worm viruses:
$ j- C" _9 x6 @" v135 Windows RPC" O( c6 Q- F! a- a: ^. g3 ?. Q5 O
136 PROFILE Naming System (basically unused)- S% V! r6 L0 A% P' ~( H4 Q# m+ M' |, _" |
137-139 Windows NetBios
- q/ t% p% ^/ p& g& @5 Z* p! m
/ j0 j5 c' _0 S+ K/ W1 B+ W1 DTCP/UDP 445 (ms-ds)
0 O3 A/ z2 q2 j0 x" YMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
2 q% [& m: R: q* P% Z
/ _* j. a/ o* {% v$ MTCP/UDP 1433-1434 (ms-sql)
) J+ M/ M: u0 @' ?# @Microsoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|