Guest +Bob+ Posted February 19, 2009 Posted February 19, 2009 On Wed, 18 Feb 2009 13:49:42 -0500, Jack the Ripper <Jack@Rripper.com> wrote: <span style="color:blue"> >Is this suppose to be some kind of a joke here, because you seem serious?</span> You sure post under a lot of different names. Is that a joke? Quote
Guest Jack the Ripper Posted February 19, 2009 Posted February 19, 2009 Re: Microsoft Windows Vista includes a two-way firewall. TO THETOP +Bob+ wrote:<span style="color:blue"> > On Wed, 18 Feb 2009 13:49:42 -0500, Jack the Ripper <Jack@Rripper.com> > wrote: > <span style="color:green"> >> Is this suppose to be some kind of a joke here, because you seem serious?</span> > > You sure post under a lot of different names. Is that a joke? </span> You didn't answer the question. Therefore, I know that you don't know what you are talking about. Quote
Guest Jack the Ripper Posted February 19, 2009 Posted February 19, 2009 Re: Microsoft Windows Vista includes a two-way firewall. TO THETOP +Bob+ wrote:<span style="color:blue"> > On Wed, 18 Feb 2009 19:59:31 -0500, "FromTheRafters" > <erratic@nomail.afraid.org> wrote: > <span style="color:green"> >> Thanks for the link, although I'm not sure why you posted it >> here. This poster seemed to imply that there is middle >> ground to cover for programs that you trust to play your >> video files, yet don't trust to access the internet for >> instance. My point is that there is no middle ground - if >> you don't trust it to access the internet, don't have it on >> your system (who knows what other horrible things it could >> be doing that you aren't aware of). </span> > > Nonsense. I run programs that have no need to access the Internet - at > least not unless I want them too. They aren't intrinsically evil > programs, but they also don't need to do internet access unless there > is a specific need for it. </span> Nonesense, you either know what is running on the computer or you don't. If you trust the program, then you should have no problems in allowing that program to access the Internet. If you don't trust the program, then you shouldn't have the program on the computer period. It's as simple as that, and it doesn't take a rocket scientist to figure it out. <span style="color:blue"> > <span style="color:green"> >> In the case of foistware/malware, there is no reason to >> assume outbound filtering would catch it in egression. </span> > > Some is very sharp (in an evil sense) and no doubt will sneak through. > THen again, some isn't and will be easily trapped. This is like having > a dead bolt on your front door - some thieves are sharp enough to pick > such a lock and will get in. Most will not and move on to easier prey.</span> No, some are sharp in a technical sense, and the developer of the exploit knew where the holes are at, while some are still learning and have to practice on someone before moving to bigger game. Quote
Guest Sam Hobbs Posted February 19, 2009 Posted February 19, 2009 "mayayana" <mayayaXXna@rcXXn.com> wrote in message news:%23FbIbxdkJHA.1340@TK2MSFTNGP06.phx.gbl...<span style="color:blue"> > > Complicating matters, Microsoft shrouds a number of > services in the svchost.exe process, which can run in > multiple instances. So if you allow svchost through the > firewall it's not so easy to know exactly what you're > allowing. And ZA can't differentiate between the actual > processes running under the svchost "hat".</span> Actually it is possible to determine what each instance of svchost is doing. WMI can show what is executed by each instance and you can use the Task Manager interactively to determine that information (you probably need to modify the view to show the columns). The sysinternals site in Microsoft has a process monitor that can show the information. The ZoneAlarm people are technical enough that they could hook each instance of svchost if necessary. Quote
Guest Sam Hobbs Posted February 19, 2009 Posted February 19, 2009 "FromTheRafters" <erratic@nomail.afraid.org> wrote in message news:%23gqTT1ikJHA.4912@TK2MSFTNGP04.phx.gbl...<span style="color:blue"> > > My point is that there is no middle ground - if you don't trust it to > access the internet, don't have it on your system (who knows what other > horrible things it could be doing that you aren't aware of).</span> Using that logic, most users of SQL Server should not use it. SQL Server can communicate over a network, including the network, but Microsoft recommends not allowing SQL Server to access the internet unless there is a need for it. I think the MBSA suggests closing the SQL Server ports if they are open. MySQL is worse, unless they fixed it in the past few years. It does, or at least did, require access to the internet in order to communicate among processes in a single system. I think it used localhost and therefore perhaps it is possible to configure firewalls to only allow localhost but that is still more than what you are suggesting to allow, correct? Quote
Guest Jack the Ripper Posted February 19, 2009 Posted February 19, 2009 Re: Microsoft Windows Vista includes a two-way firewall. TO THETOP FromTheRafters wrote:<span style="color:blue"> > "Jack the Ripper" <Jack@Rripper.com> wrote in message > news:%235XoHyhkJHA.1172@TK2MSFTNGP04.phx.gbl...<span style="color:green"> >> FromTheRafters wrote:<span style="color:darkred"> >>> "John Doe" <jdoe@usenetlove.invalid> wrote in message >>> news:6dTml.10887$hc1.1606@flpi150.ffdc.sbc.com... >>>> "FromTheRafters" <erratic@nomail.afraid.org> wrote: >>>> >>>>> "Richard Mueller [MVP]" wrote >>>>>> "FromTheRafters" <erratic@nomail.afraid.org> wrote >>>>>>> "I.C. Greenfields" <none@nospam.net> wrote >>>>>>>> Some of us want to choose what "gets out" and what >>>>>>>> doesn't. >>>>>>>> And this info doesn't work since there is nowhere to >>>>>>>> make such >>>>>>>> a change in the Windows Firewall window that comes >>>>>>>> up. >>>>>>>> Configure it - HOW? Can someone explain how it's >>>>>>>> configured to >>>>>>>> actually work without being a programmer writing >>>>>>>> strange >>>>>>>> unknown confusing rules for everything that wants to >>>>>>>> connect to >>>>>>>> the net? If not, can someone recommend a good free >>>>>>>> easy to >>>>>>>> use two-way FireWall like ZoneAlarm that's >>>>>>>> compatible with >>>>>>>> Vista? Thanks. >>>>>>>> >>>>>>>> >>>>>>>> http://www.vistastic.com/2007/03/09/window...ound-filtering/ >>>>>>>> I bet you didn't know that Microsoft Windows Vista >>>>>>>> includes a >>>>>>>> two-way firewall. >>>>>>> Windows Firewall with Advanced Security includes an >>>>>>> API that >>>>>>> allows services, applications, and installers to >>>>>>> write their own >>>>>>> ticket through the firewall. In other words, they can >>>>>>> add >>>>>>> themselves to the exclusions list. >>>>>>> >>>>>>> http://msdn.microsoft.com/en-us/library/aa366453(VS.85).aspx >>>> Thanks for the information. >>>> >>>>>>> So, it doesn't really do what most people think it >>>>>>> does. >>>>>>> >>>>>>> The key to not having programs make outbound >>>>>>> connections, or >>>>>>> opening up ports for receiving unsolicited inbound >>>>>>> traffic, is >>>>>>> to not run those programs on >>>>>>> the machine. >>>>>>> >>>>>>> Third party firewalls don't make it that easy - but >>>>>>> they don't >>>>>>> make it much >>>>>>> harder either. They provide the illusion that they >>>>>>> can stop >>>>>>> outbound traffic. >>>> Apparently the makers of ZoneAlarm fixed such a problem >>>> by >>>> preventing ZoneAlarm from being shut down. After that , >>>> I have never >>>> heard an authoritative claim that an application snuck >>>> through >>>> ZoneAlarm. >>>> >>>>>> Which is why I never use the Windows firewall. Every >>>>>> app thinks >>>>>> they are special and should be able to contact big >>>>>> brother with >>>>>> news about me and retrieve info on things they feel I >>>>>> need. Some >>>>>> companies are especially bad. I know because I don't >>>>>> use Windows >>>>>> firewall so I see the requests and deny them. Over the >>>>>> years it >>>>>> seems to have gotten much worse. >>>>> I think it comes down to trust. If you don't trust a >>>>> program - >>>>> don't execute it. If you do trust it, let it do >>>>> whatever it is >>>>> programmed to do. >>>> Sounds like a symptom of the ones and zeros disease. >>> When there is no "grey area" ones and zeroes describe >>> things accurately.</span> >> http://www.securityfocus.com/infocus/1839/1</span> > > Thanks for the link, although I'm not sure why you posted it > here. This poster seemed to imply that there is middle > ground to cover for programs that you trust to play your > video files, yet don't trust to access the internet for > instance. My point is that there is no middle ground - if > you don't trust it to access the internet, don't have it on > your system (who knows what other horrible things it could > be doing that you aren't aware of). There is no problem > having an API that allows a program you have given > permission to execute the ability to configure your > firewall. You indicated your trust when you installed or > executed the program.</span> If one doesn't trust the program in this case, then one shouldn't have it on the machine. Who has time to be playing Russian roulette, because that's what is happening when one starts playing that game? Those programs are smart enough to find other ways of punching out by piggy-backing off of other legit processes running on the machine. <span style="color:blue"> > > In the case of foistware/malware, there is no reason to > assume outbound filtering would catch it in egression. > Houdini demonstrated that a safe isn't designed to keep a > person locked in . When he repeatedly managed to escape > from them, it didn't cause the manufacturers to redesign > their safes to be escape proof. You just have to work within > the safe's specifications. > </span> Malware can have several back doors and other means to punch its way out, undetected. You know, a malware maker can set-up a honey-pot situation sort of speaking, where as, they expose the exploit and let it be seen so that it can be caught, giving someone a false sense of accomplishment that they caught it. In the meantime, they are being back-doored somewhere else, undetected. Quote
Guest Jack the Ripper Posted February 19, 2009 Posted February 19, 2009 Re: Microsoft Windows Vista includes a two-way firewall. TO THETOP Sam Hobbs wrote:<span style="color:blue"> > "mayayana" <mayayaXXna@rcXXn.com> wrote in message > news:%23FbIbxdkJHA.1340@TK2MSFTNGP06.phx.gbl...<span style="color:green"> >> >> Complicating matters, Microsoft shrouds a number of >> services in the svchost.exe process, which can run in >> multiple instances. So if you allow svchost through the >> firewall it's not so easy to know exactly what you're >> allowing. And ZA can't differentiate between the actual >> processes running under the svchost "hat".</span> > > Actually it is possible to determine what each instance of svchost is > doing. WMI can show what is executed by each instance and you can use > the Task Manager interactively to determine that information (you > probably need to modify the view to show the columns). The sysinternals > site in Microsoft has a process monitor that can show the information. > > The ZoneAlarm people are technical enough that they could hook each > instance of svchost if necessary. > </span> Look man, those users using ZA (home users most likely) or any other personal FW solutions are not savvy enough to find a hidden process, because I have talked with them in other NG(s) including ZA users about using PE, how to use it and they couldn't find a thing, probably looking right at it in their face. Quote
Guest Jack the Ripper Posted February 19, 2009 Posted February 19, 2009 Re: Microsoft Windows Vista includes a two-way firewall. TO THETOP Sam Hobbs wrote:<span style="color:blue"> > "FromTheRafters" <erratic@nomail.afraid.org> wrote in message > news:%23gqTT1ikJHA.4912@TK2MSFTNGP04.phx.gbl...<span style="color:green"> >> >> My point is that there is no middle ground - if you don't trust it to >> access the internet, don't have it on your system (who knows what >> other horrible things it could be doing that you aren't aware of).</span> > > Using that logic, most users of SQL Server should not use it. SQL Server > can communicate over a network, including the network, but Microsoft > recommends not allowing SQL Server to access the internet unless there > is a need for it. I think the MBSA suggests closing the SQL Server ports > if they are open. > </span> If someone is in communications with SQL server from a SQL Server management standpoint remotely, then they are behind a network FW doing it in a LAN situation or a VPN solution it's over the Internet. With SQL server 2005 and now 2008 using CLR for even the express editions let alone the server editions of SQL Server, SQL server can be in communications with another SQL Server as a client over the Internet, which has nothing to do with TCP port 1434 I think it is, by means of queue processing. http://www.eggheadcafe.com/articles/20040703.asp So ports are open on SQL server and a FW, if a remote Internet client solution calls for it and one knows how to protect SQL server. Quote
Guest Root Kit Posted February 19, 2009 Posted February 19, 2009 On Wed, 18 Feb 2009 20:52:49 -0800, "Sam Hobbs" <Gateremovethis@SamHobbs.org> wrote: <span style="color:blue"> >"FromTheRafters" <erratic@nomail.afraid.org> wrote in message >news:%23gqTT1ikJHA.4912@TK2MSFTNGP04.phx.gbl...<span style="color:green"> >> >> My point is that there is no middle ground - if you don't trust it to >> access the internet, don't have it on your system (who knows what other >> horrible things it could be doing that you aren't aware of).</span> > >Using that logic, most users of SQL Server should not use it. SQL Server can >communicate over a network, including the network, but Microsoft recommends >not allowing SQL Server to access the internet unless there is a need for >it. I think the MBSA suggests closing the SQL Server ports if they are open.</span> I'm convinced that's configurable and therefore doesn't need a PFW to "control" it. <span style="color:blue"> >MySQL is worse, unless they fixed it in the past few years. It does, or at >least did, require access to the internet in order to communicate among >processes in a single system. I think it used localhost and therefore >perhaps it is possible to configure firewalls to only allow localhost but >that is still more than what you are suggesting to allow, correct?</span> Since when did localhost reside on the Internet? Quote
Guest +Bob+ Posted February 19, 2009 Posted February 19, 2009 On Wed, 18 Feb 2009 23:33:13 -0500, Jack the Ripper <Jack@Rripper.com> wrote: <span style="color:blue"> >+Bob+ wrote:<span style="color:green"> >> On Wed, 18 Feb 2009 13:49:42 -0500, Jack the Ripper <Jack@Rripper.com> >> wrote: >> <span style="color:darkred"> >>> Is this suppose to be some kind of a joke here, because you seem serious?</span> >> >> You sure post under a lot of different names. Is that a joke? </span> > >You didn't answer the question. Therefore, I know that you don't know >what you are talking about.</span> Seems like you are the one avoiding the question. Why do you post under so many different monikers? Quote
Guest Root Kit Posted February 19, 2009 Posted February 19, 2009 On Wed, 18 Feb 2009 19:59:31 -0500, "FromTheRafters" <erratic@nomail.afraid.org> wrote: <span style="color:blue"> >My point is that there is no middle ground - if >you don't trust it to access the internet, don't have it on >your system (who knows what other horrible things it could >be doing that you aren't aware of). </span> Agreed. <span style="color:blue"> >There is no problem having an API that allows a program you >have given permission to execute the ability to configure your >firewall. You indicated your trust when you installed or >executed the program.</span> Exactly. People tend to forget that configuring the firewall requires proper privileges. Configuring the windows firewall programmatically requires admin or at least network admin rights. If you run/install a program as administrator YOU are responsible. That's what an administrator account is all about and what most people don't understand. Quote
Guest +Bob+ Posted February 19, 2009 Posted February 19, 2009 On Wed, 18 Feb 2009 23:41:00 -0500, Jack the Ripper <Jack@Rripper.com> wrote: <span style="color:blue"> >+Bob+ wrote:<span style="color:green"> >> On Wed, 18 Feb 2009 19:59:31 -0500, "FromTheRafters" >> <erratic@nomail.afraid.org> wrote: >> </span></span> <span style="color:blue"><span style="color:green"> >> Nonsense. I run programs that have no need to access the Internet - at >> least not unless I want them too. They aren't intrinsically evil >> programs, but they also don't need to do internet access unless there >> is a specific need for it. </span> > >Nonesense, you either know what is running on the computer or you don't.</span> I know what's running. <span style="color:blue"> > If you trust the program, then you should have no problems in allowing >that program to access the Internet. If you don't trust the program, >then you shouldn't have the program on the computer period.</span> Your opinion, not mine. Many people disagree with you. <span style="color:blue"> >It's as simple as that, and it doesn't take a rocket scientist to figure >it out.</span> Certainly no one will ever mistake you for a scientist as you are incapable of objectively analyzing anything. Quote
Guest Root Kit Posted February 19, 2009 Posted February 19, 2009 On Wed, 18 Feb 2009 22:54:30 -0500, +Bob+ <nomailplease@example.com> wrote: <span style="color:blue"> >Nonsense. I run programs that have no need to access the Internet - at >least not unless I want them too. </span> How do you know? Did you code them yourself? Or did you thoroughly investigate exactly what they are doing online? - Or are you just assuming that it must be bad? <span style="color:blue"> >They aren't intrinsically evil >programs, but they also don't need to do internet access unless there >is a specific need for it.</span> If a program does something against your will or policy and this is not programmatically configurable it is by definition malicious. <span style="color:blue"><span style="color:green"> >>In the case of foistware/malware, there is no reason to >>assume outbound filtering would catch it in egression. </span> > >Some is very sharp (in an evil sense) and no doubt will sneak through. >THen again, some isn't and will be easily trapped. This is like having >a dead bolt on your front door - some thieves are sharp enough to pick >such a lock and will get in. Most will not and move on to easier prey.</span> Are we debating trustworthy security measures or trial-and-error approaches? Quote
Guest Sam Hobbs Posted February 19, 2009 Posted February 19, 2009 "Jack the Ripper" <Jack@Rripper.com> wrote in message news:OM2Q6ClkJHA.5980@TK2MSFTNGP06.phx.gbl...<span style="color:blue"> > Sam Hobbs wrote:<span style="color:green"> >> "mayayana" <mayayaXXna@rcXXn.com> wrote in message >> news:%23FbIbxdkJHA.1340@TK2MSFTNGP06.phx.gbl...<span style="color:darkred"> >>> >>> Complicating matters, Microsoft shrouds a number of >>> services in the svchost.exe process, which can run in >>> multiple instances. So if you allow svchost through the >>> firewall it's not so easy to know exactly what you're >>> allowing. And ZA can't differentiate between the actual >>> processes running under the svchost "hat".</span> >> >> Actually it is possible to determine what each instance of svchost is >> doing. WMI can show what is executed by each instance and you can use the >> Task Manager interactively to determine that information (you probably >> need to modify the view to show the columns). The sysinternals site in >> Microsoft has a process monitor that can show the information. >> >> The ZoneAlarm people are technical enough that they could hook each >> instance of svchost if necessary. >></span> > > Look man, those users using ZA (home users most likely) or any other > personal FW solutions are not savvy enough to find a hidden process, > because I have talked with them in other NG(s) including ZA users about > using PE, how to use it and they couldn't find a thing, probably looking > right at it in their face.</span> I said nothing about users. I said "ZoneAlarm people", not ZoneAlarm users. Quote
Guest Sam Hobbs Posted February 19, 2009 Posted February 19, 2009 "Root Kit" <b__nice@hotmail.com> wrote in message news:r2tpp4pg39qpald3h3b42cvgv92gu45hm6@4ax.com...<span style="color:blue"> > On Wed, 18 Feb 2009 20:52:49 -0800, "Sam Hobbs" > <Gateremovethis@SamHobbs.org> wrote: ><span style="color:green"> >>"FromTheRafters" <erratic@nomail.afraid.org> wrote in message >>news:%23gqTT1ikJHA.4912@TK2MSFTNGP04.phx.gbl...<span style="color:darkred"> >>> >>> My point is that there is no middle ground - if you don't trust it to >>> access the internet, don't have it on your system (who knows what other >>> horrible things it could be doing that you aren't aware of).</span> >> >>Using that logic, most users of SQL Server should not use it. SQL Server >>can >>communicate over a network, including the network, but Microsoft >>recommends >>not allowing SQL Server to access the internet unless there is a need for >>it. I think the MBSA suggests closing the SQL Server ports if they are >>open.</span> > > I'm convinced that's configurable and therefore doesn't need a PFW to > "control" it.</span> The statement made by FromTheRafters did not make an exception for anything that can be configured. <span style="color:blue"><span style="color:green"> >>MySQL is worse, unless they fixed it in the past few years. It does, or at >>least did, require access to the internet in order to communicate among >>processes in a single system. I think it used localhost and therefore >>perhaps it is possible to configure firewalls to only allow localhost but >>that is still more than what you are suggesting to allow, correct?</span> > > Since when did localhost reside on the Internet?</span> Any software that uses localhost can use and/or be used by thousands of other IP addresses, simply by changing the IP address or domain name. Localhost is just an IP address (127.0.0.1); it is nothing more than an IP address. What I am saying is that use of MySQL requires that MySQL be allowed access to the internet, unless that has been changed in the past few years. Some firewalls probably provide the ability to limit internet access to just the localhost but localhost is the internet. MySQL uses RPC for inter-process communication and RPC is an internet protocol. RPC is also used by DCOM but only for inter-system communication. See: http://en.wikipedia.org/wiki/Localhost Quote
Guest FromTheRafters Posted February 19, 2009 Posted February 19, 2009 "+Bob+" <nomailplease@example.com> wrote in message news:fnlpp4tu7ej6omqg0mq9qdic9vb47k61t1@4ax.com...<span style="color:blue"> > On Wed, 18 Feb 2009 19:59:31 -0500, "FromTheRafters" > <erratic@nomail.afraid.org> wrote: ><span style="color:green"> >>Thanks for the link, although I'm not sure why you posted >>it >>here. This poster seemed to imply that there is middle >>ground to cover for programs that you trust to play your >>video files, yet don't trust to access the internet for >>instance. My point is that there is no middle ground - if >>you don't trust it to access the internet, don't have it >>on >>your system (who knows what other horrible things it could >>be doing that you aren't aware of).</span> > > Nonsense. I run programs that have no need to access the > Internet - at > least not unless I want them too. They aren't > intrinsically evil > programs, but they also don't need to do internet access > unless there > is a specific need for it.</span> Nice argument - they don't need to unless they need to. <span style="color:blue"><span style="color:green"> >>In the case of foistware/malware, there is no reason to >>assume outbound filtering would catch it in egression.</span> > > Some is very sharp (in an evil sense) and no doubt will > sneak through.</span> Yes, which is why I feel PFW's outbound filters are very nearly useless. The malware is running on the same machine the filtering is. A dedicated external device would be a different matter. While filtering on an external device makes sense, it doesn't follow that the same software running on the machine it hopes to protect makes any sense. Inbound filtering can help keep things out (to some extent), but once you have untrustworthy programs running on the local machine - it's "game over". <span style="color:blue"> > THen again, some isn't and will be easily trapped.</span> Some, yes. So having additional software running all the time so that some of the less adept malwares that want access to the internet can be caught in the act is something you value, then by all means filter away. I think it is better to choose what programs are allowed to run. <span style="color:blue"> > This is like having > a dead bolt on your front door - some thieves are sharp > enough to pick > such a lock and will get in. Most will not and move on to > easier prey.</span> Actually it is more like having a "loop and hook" on the door with a sign saying "Protected by Titanium locking mechanism". Quote
Guest FromTheRafters Posted February 19, 2009 Posted February 19, 2009 "Sam Hobbs" <Gateremovethis@SamHobbs.org> wrote in message news:E54361D4-189B-4A05-9A80-62599967A850@microsoft.com...<span style="color:blue"> > "FromTheRafters" <erratic@nomail.afraid.org> wrote in > message news:%23gqTT1ikJHA.4912@TK2MSFTNGP04.phx.gbl...<span style="color:green"> >> >> My point is that there is no middle ground - if you don't >> trust it to access the internet, don't have it on your >> system (who knows what other horrible things it could be >> doing that you aren't aware of).</span> > > Using that logic, most users of SQL Server should not use > it.</span> Absolutely, if they don't trust it they shouldn't use it. <span style="color:blue"> > SQL Server can communicate over a network, including the > network, but Microsoft recommends not allowing SQL Server > to access the internet unless there is a need for it.</span> A user's need, not a program's need. If the program needed it, do you think they would have it user configurable? <span style="color:blue"> > I think the MBSA suggests closing the SQL Server ports if > they are open. > > MySQL is worse, unless they fixed it in the past few > years. It does, or at least did, require access to the > internet in order to communicate among processes in a > single system. I think it used localhost and therefore > perhaps it is possible to configure firewalls to only > allow localhost but that is still more than what you are > suggesting to allow, correct?</span> Localhost? Internet? Not even a LAN. So, your firewall heard your computer talking to itself? Basically my point is that users shouldn't feel the need to run untrustworthy programs and then attempt to mitigate the consequences. Quote
Guest FromTheRafters Posted February 19, 2009 Posted February 19, 2009 "Sam Hobbs" <Gateremovethis@SamHobbs.org> wrote in message news:29772EAC-EC0E-4D9B-9362-7CBFEAF57848@microsoft.com...<span style="color:blue"> > "Root Kit" <b__nice@hotmail.com> wrote in message > news:r2tpp4pg39qpald3h3b42cvgv92gu45hm6@4ax.com...<span style="color:green"> >> On Wed, 18 Feb 2009 20:52:49 -0800, "Sam Hobbs" >> <Gateremovethis@SamHobbs.org> wrote: >><span style="color:darkred"> >>>"FromTheRafters" <erratic@nomail.afraid.org> wrote in >>>message >>>news:%23gqTT1ikJHA.4912@TK2MSFTNGP04.phx.gbl... >>>> >>>> My point is that there is no middle ground - if you >>>> don't trust it to >>>> access the internet, don't have it on your system (who >>>> knows what other >>>> horrible things it could be doing that you aren't aware >>>> of). >>> >>>Using that logic, most users of SQL Server should not use >>>it. SQL Server can >>>communicate over a network, including the network, but >>>Microsoft recommends >>>not allowing SQL Server to access the internet unless >>>there is a need for >>>it. I think the MBSA suggests closing the SQL Server >>>ports if they are open.</span> >> >> I'm convinced that's configurable and therefore doesn't >> need a PFW to >> "control" it.</span> > > The statement made by FromTheRafters did not make an > exception for anything that can be configured.</span> I consider configurable items to be items you are (or at least should be) aware of. For instance, an earlier version of media player would fire up IE to access a website whos URL was contained in the media file. When they made this configurable, they regained my trust somewhat. Why should I make an exception for anything that can be configured when that very configuration is what that trust hinges upon? I really didn't expect that uttering a security platitude would be so much like poking a stick into a beehive. I thought the API thing would cause readers to gasp and exclaim "Doesn't that defeat the whole purpose of an outbound firewall!?". The idea is to not compromise the machine. Once you have compromised the machine then how much can you trust what other applications on that same machine are telling you? I'm not invested in this in any way, so if a user wants to stop consent.exe from accessing the internet because he or she doesn't think it should need to - then they can if it makes them happy. If you want to execute programs that you trust a little bit - go right ahead. Cripple it to your heart's content with additional applications if that is what you like to do. Just don't disable a better firewall just because it doesn't do some nearly useless function that you think you need. Quote
Guest FromTheRafters Posted February 19, 2009 Posted February 19, 2009 "Jack the Ripper" <Jack@Rripper.com> wrote in message news:%23nDJk9kkJHA.1288@TK2MSFTNGP02.phx.gbl...<span style="color:blue"> > FromTheRafters wrote:</span> <span style="color:blue"><span style="color:green"> >> Thanks for the link, although I'm not sure why you posted >> it here. This poster seemed to imply that there is middle >> ground to cover for programs that you trust to play your >> video files, yet don't trust to access the internet for >> instance. My point is that there is no middle ground - if >> you don't trust it to access the internet, don't have it >> on your system (who knows what other horrible things it >> could be doing that you aren't aware of). There is no >> problem having an API that allows a program you have >> given permission to execute the ability to configure your >> firewall. You indicated your trust when you installed or >> executed the program.</span> > > If one doesn't trust the program in this case, then one > shouldn't have it on the machine.</span> Yes. Say someone sends you a supposedly "freeware" program. Once you click past that pesky EULA thingy and install the program you find it "phones home" - (your trusty firewall catches it) so its just gotta be spying on you. You set a rule to stop this behavior. Turns out that it was legitimate "adware" or more correctly "advertising supported software". You have defeated the advertisements (which you agreed to in the EULA) and have also defeated the ability to be notified of critical security vulnerabilities in the software. ....or was it really spyware? No mention in the EULA of any umbilical cord to the mother ship (as if anybody actually reads them). You install the program and it sends banking information to a criminal organization - without the firewall alerting to anything untoward. Bottom line, you had no reason to trust the program in either case. Your filters didn't save you, in fact in the first case your filters retrograded security. <span style="color:blue"> > Who has time to be playing Russian roulette, because > that's what is happening when one starts playing that > game?</span> With a six shooter loaded with five bullets. style_emoticons/) <span style="color:blue"> > Those programs are smart enough to find > other ways of punching out by piggy-backing off of other > legit processes running on the machine.</span> Ah, so that was the point of the URL http://www.securityfocus.com/infocus/1839/1 . <span style="color:blue"><span style="color:green"> >> In the case of foistware/malware, there is no reason to >> assume outbound filtering would catch it in egression. >> Houdini demonstrated that a safe isn't designed to keep a >> person locked in . When he repeatedly managed to escape >> from them, it didn't cause the manufacturers to redesign >> their safes to be escape proof. You just have to work >> within the safe's specifications.</span> > > Malware can have several back doors and other means to > punch its way out, undetected.</span> A person trying to get into a safe is living outside the box. Malware running on a machine is living inside, and the box wasn't designed to keep escape artists from getting out. Having other security software inside the box is not as effective as having security outside the box (a real firewall) - even Houdini couldn't escape from within a locked safe if the safe had locked chains wrapped around the outside . <span style="color:blue"> > You know, a malware maker can set-up a honey-pot situation > sort of speaking, where as, they expose the exploit and > let it be seen so that it can be caught, giving someone a > false sense of accomplishment that they caught it.</span> Yes, or this could be just the side effect of having a blended threat. Three ingress methods, one of which gets caught out by a PFW. <span style="color:blue"> > In the meantime, they are being back-doored somewhere > else, undetected.</span> Yes, in which case the PFW user has had his paranoia misplaced. He should be more wary of what he allows to execute rather than to try to control or detect what actions the malware is taking. Quote
Guest FromTheRafters Posted February 19, 2009 Posted February 19, 2009 "Root Kit" <b__nice@hotmail.com> wrote in message news:fdupp4dnjupmimcdm5lc2nr16brfks73ia@4ax.com...<span style="color:blue"> > On Wed, 18 Feb 2009 19:59:31 -0500, "FromTheRafters" > <erratic@nomail.afraid.org> wrote: ><span style="color:green"> >>My point is that there is no middle ground - if >>you don't trust it to access the internet, don't have it >>on >>your system (who knows what other horrible things it could >>be doing that you aren't aware of).</span> > > Agreed. ><span style="color:green"> >>There is no problem having an API that allows a program >>you >>have given permission to execute the ability to configure >>your >>firewall. You indicated your trust when you installed or >>executed the program.</span> > > Exactly. People tend to forget that configuring the > firewall requires > proper privileges. Configuring the windows firewall > programmatically > requires admin or at least network admin rights. If you > run/install a > program as administrator YOU are responsible. That's what > an > administrator account is all about and what most people > don't > understand.</span> I was looking for an analogy, the best I could come up with is those instances where someone doesn't want their admins to have access to a command prompt. If you can't trust your admins with a command prompt - they shouldn't be admins in the first place. If you can't trust a program, you shouldn't execute it. Quote
Guest FromTheRafters Posted February 19, 2009 Posted February 19, 2009 "mayayana" <mayayaXXna@rcXXn.com> wrote in message news:%23FbIbxdkJHA.1340@TK2MSFTNGP06.phx.gbl...<span style="color:blue"><span style="color:green"> > ><span style="color:darkred"> >> >Apparently the makers of ZoneAlarm fixed such a problem >> >by >> >preventing ZoneAlarm from being shut down.</span> >> >> What makes you believe shutting it down is the only >> possible way to >> circumvent it? And why would malware writers choose a >> method which >> makes you as a user suspicious to what is going on. No, >> no. They will >> of course just circumvent your illusionware why letting >> you continue >> to believe all is fine and well. >></span> > > That's quite a strong statement to make, implying > that 2-way firewalls are basically useless. If you're > going to claim that you should provide some evidence > and explanation. Otherwise you're just adding confusion.</span> Maybe Jack meant to post this to you rather than to me. http://www.securityfocus.com/infocus/1839/1 <span style="color:blue"> > In my experience, ZA has no trouble blocking unauthorized > software from going online</span> Why are you running unauthorized software? <span style="color:blue"> > There is a wrinkle, though, > with XP. XP, and NT systems in general, are a security > risk > in that they're designed as corporate workstations, with > various vulnerable network-related services that are > unnecessary on Win9x but are typically running, and may > even be critical, on NT (RPC, for example.)</span> What they call "attack surface" - NT has more attack surface with more security, W9x has lesser attack surface with almost no security. [...] Quote
Guest mayayana Posted February 19, 2009 Posted February 19, 2009 > Actually it is possible to determine what each instance of svchost is doing.<span style="color:blue"> > WMI can show what is executed by each instance and you can use the Task > Manager interactively to determine that information (you probably need to > modify the view to show the columns). The sysinternals site in Microsoft</span> has<span style="color:blue"> > a process monitor that can show the information. > > The ZoneAlarm people are technical enough that they could hook each</span> instance<span style="color:blue"> > of svchost if necessary. ></span> That would be nice, but they haven't done it that I know of. Maybe there are better options than ZA out there, though. I haven't looked into what's available for XP and/or Vista. Quote
Guest Jack the Ripper Posted February 19, 2009 Posted February 19, 2009 Re: Microsoft Windows Vista includes a two-way firewall. TO THETOP +Bob+ wrote:<span style="color:blue"> > On Wed, 18 Feb 2009 23:33:13 -0500, Jack the Ripper <Jack@Rripper.com> > wrote: > <span style="color:green"> >> +Bob+ wrote:<span style="color:darkred"> >>> On Wed, 18 Feb 2009 13:49:42 -0500, Jack the Ripper <Jack@Rripper.com> >>> wrote: >>> >>>> Is this suppose to be some kind of a joke here, because you seem serious? >>> You sure post under a lot of different names. Is that a joke? </span> >> You didn't answer the question. Therefore, I know that you don't know >> what you are talking about.</span> > > Seems like you are the one avoiding the question. Why do you post > under so many different monikers? </span> If it was any of your business as to what I do, how I do it, when I do it or why I do it, that would be one thing. But since its none of your business as to what I am doing and I don't answer to you, then your question means absolutely nothing to me concerning this. Quote
Guest Jack the Ripper Posted February 19, 2009 Posted February 19, 2009 Re: Microsoft Windows Vista includes a two-way firewall. TO THETOP Sam Hobbs wrote:<span style="color:blue"> > "Jack the Ripper" <Jack@Rripper.com> wrote in message > news:OM2Q6ClkJHA.5980@TK2MSFTNGP06.phx.gbl...<span style="color:green"> >> Sam Hobbs wrote:<span style="color:darkred"> >>> "mayayana" <mayayaXXna@rcXXn.com> wrote in message >>> news:%23FbIbxdkJHA.1340@TK2MSFTNGP06.phx.gbl... >>>> >>>> Complicating matters, Microsoft shrouds a number of >>>> services in the svchost.exe process, which can run in >>>> multiple instances. So if you allow svchost through the >>>> firewall it's not so easy to know exactly what you're >>>> allowing. And ZA can't differentiate between the actual >>>> processes running under the svchost "hat". >>> >>> Actually it is possible to determine what each instance of svchost is >>> doing. WMI can show what is executed by each instance and you can use >>> the Task Manager interactively to determine that information (you >>> probably need to modify the view to show the columns). The >>> sysinternals site in Microsoft has a process monitor that can show >>> the information. >>> >>> The ZoneAlarm people are technical enough that they could hook each >>> instance of svchost if necessary. >>></span> >> >> Look man, those users using ZA (home users most likely) or any other >> personal FW solutions are not savvy enough to find a hidden process, >> because I have talked with them in other NG(s) including ZA users >> about using PE, how to use it and they couldn't find a thing, probably >> looking right at it in their face.</span> > > I said nothing about users. I said "ZoneAlarm people", not ZoneAlarm users.</span> You make no sense none whatsoever. If one using the ZA application, then one is a user of ZA. style_emoticons/ Quote
Guest Jack the Ripper Posted February 19, 2009 Posted February 19, 2009 Re: Microsoft Windows Vista includes a two-way firewall. TO THETOP +Bob+ wrote:<span style="color:blue"> > On Wed, 18 Feb 2009 23:41:00 -0500, Jack the Ripper <Jack@Rripper.com> > wrote: > <span style="color:green"> >> +Bob+ wrote:<span style="color:darkred"> >>> On Wed, 18 Feb 2009 19:59:31 -0500, "FromTheRafters" >>> <erratic@nomail.afraid.org> wrote: >>></span></span> > <span style="color:green"><span style="color:darkred"> >>> Nonsense. I run programs that have no need to access the Internet - at >>> least not unless I want them too. They aren't intrinsically evil >>> programs, but they also don't need to do internet access unless there >>> is a specific need for it. </span> >> Nonesense, you either know what is running on the computer or you don't.</span> > > I know what's running. > > <span style="color:green"> >> If you trust the program, then you should have no problems in allowing >> that program to access the Internet. If you don't trust the program, >> then you shouldn't have the program on the computer period.</span> > > Your opinion, not mine. Many people disagree with you. > > <span style="color:green"> >> It's as simple as that, and it doesn't take a rocket scientist to figure >> it out.</span> > > Certainly no one will ever mistake you for a scientist as you are > incapable of objectively analyzing anything. > > </span> You are an idiot. Why I bother with you is beyond me? Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.