鲜花( 87) 鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, 1 M" Z: C2 Z& a+ y: S. {8 @
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
4 t3 Z- {+ m+ K9 O! q* @4 [& v
+ p: a& K1 l& M3 G9 h, tDoes Telus block any ports? " r3 u+ ^9 j9 g
3 O) C& C1 N" Y6 U
The only packages with no blocked ports at this time are the Server packages.
5 B! Y/ {9 b& u! z5 c
$ [* V+ g2 Q6 J" S, v1 V# ZThe Blocked ports currently are:
$ E$ q) o4 t: A% _' K0 r2 [
* U+ E* r' b8 O( UTCP 21 (ftp)1 [" Y! B6 e+ m9 U2 H) M) d$ a
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.' q) a* U1 n. v; X% U( A
' ^/ ~* \7 e( v' S) o
TCP 25 (smtp)
K; p7 i+ l2 r+ l: zCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
9 [2 b3 O) v2 Z0 s# V/ ~, }& F
9 O5 z$ q6 ^; `* G) A! YTCP 80 (www)
) }! t8 `# W% a! r+ l( \' @Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.! C' J0 Y8 u0 M3 @# t4 I/ _8 b
; F) Q7 G# P! H# _% ~. E
TCP 110 (pop3)0 Y L5 G- |6 T: H% V! C( V; J2 [
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
5 l1 u$ j2 {$ i) q
5 ^" ? B, \5 ^; L. g d1 aTCP 6667 (ircd)- Z4 L3 ~1 o3 h4 d+ I: a. m5 f& z
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
8 q, ]7 V& b6 e! E0 L1 }0 a3 \4 F5 W
1 M: n/ P! ~; f% Y' a9 b; w" l( |TCP/UDP 135-139 (dcom and netbios)
) N; E/ s* V2 f! ?These ports are commonly exploited by worm viruses:1 H4 T" ~/ h C9 |# m2 X
135 Windows RPC( I P- P3 \, {. {+ I+ N2 z
136 PROFILE Naming System (basically unused)$ X8 y, [3 W3 H( \6 e! F( Q2 {: A
137-139 Windows NetBios) Q; m5 W0 E/ a- d$ q8 R
; b( Q% ?2 c' ^) B& r+ uTCP/UDP 445 (ms-ds)
. @( v1 ], ]' p K7 AMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
( W7 q, Z7 Q5 H a2 g8 i1 m! A, R8 M
TCP/UDP 1433-1434 (ms-sql)
% d* Q9 [# {, v9 P3 |' N& CMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|