 鲜花( 87)  鸡蛋( 1)
|
之前发过一个帖子有关Telus, Shaw 的比较, ' M7 v- S; H9 L# R
家用Telus 已经封锁了不少端口。 也随时不通知下说锁就锁, 非常讨厌。
" p$ W# ?& K( ~" P; h/ O; n6 u9 n% q9 P! G) O' W6 x4 p
Does Telus block any ports?
* d* Z- H0 O! q) y' b- p( L5 R1 E4 J
3 O6 f; i) q* TThe only packages with no blocked ports at this time are the Server packages.
4 H% W( ]# w0 A) p1 }4 @! B' Q% ^1 ^( c+ i+ I
The Blocked ports currently are:
/ B% l/ ]* U1 y( n2 d3 h# W, w
" D, q: S g1 jTCP 21 (ftp)5 h# N. L8 t* M4 [3 H
Customers running an FTP server will no longer be able to have Internet users connect to their server. Many customers computers are used as FTP servers to store illegal files.
0 `; z# b! G {: q' ~; V( K! }: O( O* u; Z2 s) r
TCP 25 (smtp)" T- M& q+ o8 G/ y2 l5 ?, [4 K
Customers running a SMTP mail server will no longer be able to receive email requests. Also, Telus users will not be able to connect to non-Telus smtp servers on port 25. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.
; U1 M% e% v P2 o
+ N8 S- `* O" b1 V% `TCP 80 (www)
8 w d1 u J. l5 SCustomers running a Web server will no longer be able to have Internet users connect to their server. Common exploit on old Window IIS server and Linux boxes that are not properly patched.: g$ {5 `& h% b) W1 f# a, _
2 u! [# d1 }3 ]TCP 110 (pop3)& f/ M, {* l5 w1 J
Customers running a POP mail server will no longer be able to have Internet users connect to the server. Prevent mail servers that operate as an open relay. Open relays are used without a customer?s knowledge to sends millions of pieces of Spam.7 a. M3 w! [( ?( B" u C
% v5 K% ], `" N1 vTCP 6667 (ircd)
- t1 ]8 e, b x( A$ P: ?( k& U# h" BCustomers running a IRC server (Internet Relay Chat) will no longer be able to have Internet users connect to the server.* m# q2 S1 a- L) d$ ^
* e: Q0 r! b: K5 \TCP/UDP 135-139 (dcom and netbios)# J5 i _2 J) f/ A
These ports are commonly exploited by worm viruses:
]% M* q' ~1 S3 [: f, C/ o5 g135 Windows RPC' x+ K* O H1 T. T$ f* k6 y
136 PROFILE Naming System (basically unused)
+ j' u9 A: I# q" F, ^0 C( Z137-139 Windows NetBios8 S! u9 M6 Q3 t+ a
+ W$ ]( \# _ E" @8 d. FTCP/UDP 445 (ms-ds)) n/ O3 P3 F$ e) K5 A( `
Microsoft Directory Services - Customers that allow legitimate Internet users access to their computers will loose this ability. This allows hackers to directly connect to a Windows based computer and gain total control over the OS.
3 M6 \- ~8 B! y1 a( Z, V; X q X* l; e! `3 ~4 ?6 p' Y9 ^5 w* L
TCP/UDP 1433-1434 (ms-sql)
R3 I: K& S1 | L5 L& EMicrosoft SQL server - Customer running an SQL server will no long be able to have Internet user connect to their server. There are several worm viruses that exploit holes in SQL server. |
|