 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, 3 s7 }; o5 R& J0 F
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
9 i3 N7 k, ~) R1 k4 G
, W% s5 \4 A& t9 k( @( v, y. k, vDoes Telus block any ports?
k4 r4 i8 z5 |1 z, X3 U( w
: x6 d" c& Q z2 N' n- x4 OThe only packages with no blocked ports at this time are the Server packages.
% e& S; N+ M9 I; |1 b1 k d' n7 B% k8 |; f: l* m3 n6 {- o1 f: r
The Blocked ports currently are:& G, T8 c0 o6 p) A8 j. {' W) Z$ Q
/ h( f V6 N" j0 ^# xTCP 21 (ftp)
# ] J- p1 B% p. Q" NCustomers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
* Z0 C# {$ G* k5 I: m
2 q: p0 }, u* a2 p% STCP 25 (smtp)
e6 _' x: A$ y' ]2 pCustomers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.( [8 ~' o# v# o* F! m5 k/ M
1 T$ r. I0 o/ G4 {$ F% Q- X. r1 Q
TCP 80 (www). S# u8 @- l! ]. X0 z+ p+ E
Customers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.
1 c6 p) |( i% Z z* j* j
+ ^1 T3 `9 t$ I$ LTCP 110 (pop3): C6 e& O7 G7 s# n( l) v3 z
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
/ O8 q$ d, Z/ U" G/ |. S$ X4 `0 d
TCP 6667 (ircd)4 i& ^9 l; ^" R
Customers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.
: i) t r5 [9 j" Y n2 @1 _! p M6 H) V( y
TCP/UDP 135-139 (dcom and netbios)
7 B9 v# Q$ ~2 C! xThese ports are commonly exploited by worm viruses:* l% P8 x _- R% R, z' l# {
135 Windows RPC
# X& W [5 v' \/ P! T136 PROFILE Naming System (basically unused)
+ r" ]: b' {' i; H137-139 Windows NetBios
' X1 z3 [) q6 v* J0 U
' h+ ?' a j/ ?" ]# x$ Y" iTCP/UDP 445 (ms-ds)
& ?; W' l9 A; P+ a4 h; P$ o/ x5 RMicrosoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
( \& H5 R o4 h0 F* |
0 V/ c ~. F# e1 R% @% J2 F& HTCP/UDP 1433-1434 (ms-sql)
! H+ C O& P5 }& |" g+ ~/ F; MMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|