 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较,
- E& k$ ?* h7 u家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
$ o8 _+ u+ P, D, J; E& Z, Z6 O% u5 H X+ a9 d% T$ L% v0 C, D( Y! ?
Does Telus block any ports? ' t& ?# c* E, E5 v z
# R i8 d, A3 z5 H- u6 i
The only packages with no blocked ports at this time are the Server packages. ; g$ J3 `. t" C" x
, Z$ B9 B' N: E0 ]; SThe Blocked ports currently are:
5 P8 w7 Y7 Y# y# t( H( x7 g6 P6 e/ k O7 o$ C. d" S6 J
TCP 21 (ftp)
/ D) z2 O- n5 m9 NCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.- ~+ V3 a+ K% ` H2 o2 r) }# H
0 H/ x3 r( V% D; f4 ^3 \' }' }
TCP 25 (smtp)
; ?" E- H( B: d- I: u/ Q8 OCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
! J9 Y: X0 i* y1 h: b0 f! k6 i
, u7 L' w: R- ~0 g0 V% ?3 [TCP 80 (www)/ t- b0 b4 U9 k4 a% c7 n, }4 k' n* Z
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.% j" S$ i1 W) {) S8 g/ P7 [
& l. I Q+ P' i0 m
TCP 110 (pop3)3 ^+ u+ I. d% u2 y/ r& \
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam." A( X* O- J$ j$ N
9 e, q! N/ b. N+ w4 MTCP 6667 (ircd)1 t2 H! {! x5 g2 b
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
3 @ v% c5 r" z& U9 n# o9 q1 p! N2 F5 P+ J$ F, G# C
TCP/UDP 135-139 (dcom and netbios)
* b# G" l# d- Q. J7 l& Q' L! LThese ports are commonly exploited by worm viruses:
, O) H* c; J6 j7 t2 O* x135 Windows RPC' f3 z: n4 ]) w& H! n
136 PROFILE Naming System (basically unused)+ h+ _: L/ Q) Q2 B+ s# E- X
137-139 Windows NetBios
- N4 S) i0 @; J' r" R) k7 _
0 C$ \% R c C. p9 ]TCP/UDP 445 (ms-ds)
; _. ]& \( `( C) F6 eMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.! c( x+ B$ S/ Y/ s1 d
' }0 g/ @4 p/ s; i# F0 ?" T' G8 M
TCP/UDP 1433-1434 (ms-sql)
* a5 ]( ~# w/ L6 mMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|