 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, : c3 {% J5 V a% E( L" Q6 B4 [3 ~
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
, s" o# ~( k M1 @7 o* E% |9 u6 P" v8 ]+ f! M# z( b
Does Telus block any ports?
! w* u" S4 P( y4 @9 u
/ n3 Q- [) [2 a2 U V/ H& b. GThe only packages with no blocked ports at this time are the Server packages.
- Z& Q& O+ J1 }+ n% c7 C. V! A8 ~5 B6 O G" e/ z8 C+ K9 E# O
The Blocked ports currently are:( T0 Y% s3 p) K7 R( L
1 Q1 z: Q: o" O6 \# [2 x# T" G9 B# U
TCP 21 (ftp)
( F) J1 i9 u( x6 R( d3 r$ E' `Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files." M# v5 a/ y) `6 ^0 k4 E+ l v
# z$ `; O4 {/ J/ Y) ]TCP 25 (smtp)
6 K Z( ]5 G4 X) B5 W. r/ nCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
0 ?8 Y5 u" ~4 L& O! `" S2 | d9 }% i6 r- L- i9 Q
TCP 80 (www)
9 v+ A* n$ }6 Z+ ?4 H0 i% R6 u7 j+ VCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
, E: ?. I4 ]' C) C& y2 F }# z& r& y" D
TCP 110 (pop3)% Y$ d5 i4 H8 _' d8 _5 I) @) J# u
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
' c4 }1 w7 j/ {7 W. y& O8 C, J' U# f# y. \6 t$ \, X; t7 J, v. D8 z
TCP 6667 (ircd)# Q3 `/ o8 ^4 x0 e! C2 q( s
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.; y3 d- D1 Z# Q: r6 n D
, m5 [: ?8 ?% I$ R O+ C- FTCP/UDP 135-139 (dcom and netbios)
; t# k p- h8 Z7 X, ^/ s# uThese ports are commonly exploited by worm viruses:
h" ^6 c% K5 ?; N( C. a135 Windows RPC
+ H! ?' N% w# L0 c4 d7 h136 PROFILE Naming System (basically unused)
0 f4 j3 }2 E9 a137-139 Windows NetBios
+ i2 w% g( P4 I; C
& A# s7 Y; [* O( eTCP/UDP 445 (ms-ds); B+ M! J. l' o3 z. x9 I' d
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.7 A$ `1 t" v* ]2 p5 }- f
( W: v3 |. Y) C! s9 r
TCP/UDP 1433-1434 (ms-sql)
! ~3 R5 Y$ |8 f5 A, TMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|