Announcement

Collapse
No announcement yet.

Tiny (?) Personal Firewall

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #16
    Originally posted by Gurm
    I'm using a little thing called a router. All my ports are blocked as effectively as (or MORE effectively than) with a "software firewall", with no CPU resources taken or network slowdown observed.

    And the best part? It was no more expensive than a so-called "software firewall" and serves the dual purpose of being a router.

    - Gurm
    Routers are not firewalls. If one port is open, you're not protected. I don't know what router you have, but some have some form of NAT which helps and/or a (mini) stateful firewall (like Cisco's).

    It's good to put a router to offload your firewall, but it's not a firewall.

    Comment


    • #17
      A lot routers have firewalls as well as mine does.
      Chief Lemon Buyer no more Linux sucks but not as much
      Weather nut and sad git.

      My Weather Page

      Comment


      • #18
        What do you define as a "firewall" here? AFAIK most routers have in "hardware":

        -NAT
        -port forwarding of all incoming ports blocked by default unless specifically enabled by port number/range to point to an individual LAN-side IP address/machine
        -all outgoing ports go straight out
        -no response to pings

        Does this do everything that a software firewall does? Or do software firewall also catch stuff that's going out on unapproved ports as well as coming in? (Or am I talking crap here - I don't really do networks)
        DM says: Crunch with Matrox Users@ClimatePrediction.net

        Comment


        • #19
          Well this what my netgear DG834G does

          True Firewall with Stateful Packet Inspection (SPI) & Intrusion Control, Denial of Service (DoS), Virtual Private Network (VPN) pass-through

          Still use a software firewall combined with this though.
          Chief Lemon Buyer no more Linux sucks but not as much
          Weather nut and sad git.

          My Weather Page

          Comment


          • #20
            Originally posted by GNEP
            What do you define as a "firewall" here? AFAIK most routers have in "hardware":

            -NAT
            -port forwarding of all incoming ports blocked by default unless specifically enabled by port number/range to point to an individual LAN-side IP address/machine
            -all outgoing ports go straight out
            -no response to pings

            Does this do everything that a software firewall does? Or do software firewall also catch stuff that's going out on unapproved ports as well as coming in? (Or am I talking crap here - I don't really do networks)
            Router: brick wall - you can make holes in it
            Firewall: automatic sliding doors - it looks closed all the time but it will allow some stuff in (following your rules)

            Comment


            • #21
              The Pit,

              With my previous firewall I had *all* ports blocked unless said otherwise by a specific rule for a specific application.
              "For every action, there is an equal and opposite criticism."

              Comment


              • #22
                Originally posted by TransformX
                The Pit,

                With my previous firewall I had *all* ports blocked unless said otherwise by a specific rule for a specific application.
                That's the way any real firewall works: block everything unless specified.

                If it doesn't, it ain't a firewall

                Comment


                • #23
                  And then there is everyone else, who doesn't want to spend 6 months configuring a complex peice of software to handle everything they do with the internet.

                  I use a linux box as a NAT gateway/semi-firewall. It does the job.
                  80% of people think I should be in a Mental Institute

                  Comment


                  • #24
                    Originally posted by rugger
                    And then there is everyone else, who doesn't want to spend 6 months configuring a complex peice of software to handle everything they do with the internet.

                    I use a linux box as a NAT gateway/semi-firewall. It does the job.
                    Why 6 months ?
                    Just say "block everything unless a specific rule exists" and then "ask me" for anything else.
                    Run all your networking applications and 2-3 hours later you can disable the "ask me" and be a happy.

                    Stupid ? Maybe.
                    Effective ? You bet !
                    "For every action, there is an equal and opposite criticism."

                    Comment


                    • #25
                      Originally posted by TransformX
                      Why 6 months ?
                      Just say "block everything unless a specific rule exists" and then "ask me" for anything else.
                      Run all your networking applications and 2-3 hours later you can disable the "ask me" and be a happy.

                      Stupid ? Maybe.
                      Effective ? You bet !
                      Effective against what? Trogan software and viruses are much better dealt with by a good virus scanner. Incoming connections are much better filltered by a NAT gateway

                      This doesn't even begin to describe the basic problem that running your own firewall ussually is. Unless you are particularly careful in setting up your system, your firewall will run at the same permission level as your programs are. This means that the firewall will be trivial for any program who wishes to do so to defeat.

                      Then there is the issue of "ET Phone home" programs. If you have programs that do this on your system, that contact internet hosts for no legitimate reasons, you have a greater problem then just the "phoning home". If you can't trust a program to access the network, how can you trust it on your computer at all where it has access to all your data.

                      As for blocking ICMP echo requests, I can't really see where all the obsession over using that is. Granted, if you are being attacked with ICMP echo requests, it would be wise to block them. But other then that, ICMP echo is a useful diagnostic and should be left running.
                      80% of people think I should be in a Mental Institute

                      Comment


                      • #26
                        Sometimes you can’t use HW firewalls in front of the PC.
                        In my case, I am a client in a bigger WLAN network (1.0 Mbps).
                        The ISP owns the server, about 3 Km away from me and I have only a connection from an outdoor antenna to my PC.
                        No way to insert a router.
                        The only way, except changing to ADSL/Cable, is:

                        ---Antenna---Local Server PC with radio card----Router/Firewall-----Computer(s).

                        People here use this setting. But I can’t, yet.
                        ZoneAlarm works fine for me.

                        I Tried the Norton Internet Security 2004. What a system load, slow down…

                        Fred H
                        It ain't over 'til the fat lady sings...
                        ------------------------------------------------

                        Comment


                        • #27
                          Originally posted by rugger
                          your firewall will run at the same permission level as your programs are. This means that the firewall will be trivial for any program who wishes to do so to defeat.
                          Tiny firewall runs as a service and controlls even the system trying to connect to the nic...

                          Then there is the issue of "ET Phone home" programs. If you have programs that do this on your system, that contact internet hosts for no legitimate reasons, you have a greater problem then just the "phoning home". If you can't trust a program to access the network, how can you trust it on your computer at all where it has access to all your data.
                          WinDVD and other proggies love connecting to the net for some reason, so I block them. Outlook express loves connecting to the net to show you rubbish someone sent in HTML, so I block all ports except for 25 and 110...

                          As for blocking ICMP echo requests, I can't really see where all the obsession over using that is. Granted, if you are being attacked with ICMP echo requests, it would be wise to block them. But other then that, ICMP echo is a useful diagnostic and should be left running.
                          If I don't return pings, I'm simple not there... Ever thought about it ?
                          If in doubt, CNN and Yahoo don't (or didn't) return pings as well.
                          "For every action, there is an equal and opposite criticism."

                          Comment


                          • #28
                            Originally posted by Fred H

                            I Tried the Norton Internet Security 2004. What a system load, slow down…

                            Fred H
                            yup, NIS is a reeeking POS!!
                            If there's artificial intelligence, there's bound to be some artificial stupidity.

                            Jeremy Clarkson "806 brake horsepower..and that on that limp wrist faerie liquid the Americans call petrol, if you run it on the more explosive jungle juice we have in Europe you'd be getting 850 brake horsepower..."

                            Comment


                            • #29
                              Originally posted by TransformX
                              Tiny firewall runs as a service and controlls even the system trying to connect to the nic...
                              Nope, any program running with adminstrator preferences can disable/remove any service it feels like.

                              Originally posted by TransformX

                              WinDVD and other proggies love connecting to the net for some reason, so I block them. Outlook express loves connecting to the net to show you rubbish someone sent in HTML, so I block all ports except for 25 and 110...
                              Hmmm, thats actually not a bad use (outlook express). But if you are worried about html sent to you, it would probably be better to filter your inbound email to remove image tags.

                              Originally posted by TransformX

                              If I don't return pings, I'm simple not there... Ever thought about it ?
                              If in doubt, CNN and Yahoo don't (or didn't) return pings as well.
                              Haha, of course your still there, and only the dumbest of people would think that you disappeared simply because you are not responding to ICMP echo. Putting your hands over your ears and shouting "I'm not hear, I am not listening" is not likely to be a significant deterrant to most hackers and hacking software.

                              The only reason big sites like CNN and Yahoo block pings is that icmp echo makes a simple way to do DOS attacks on large sites. On a normal users connection, there is no point because if the smaller connections we use a trivial to use any DOS attack on.
                              80% of people think I should be in a Mental Institute

                              Comment


                              • #30
                                When was the last time you've monitored your inbound connections ?
                                When was the last time you've identified a port scanner probing your computer ?
                                I've seen it more than a few times. The good news on my side are that all those probes were left without answer, as if I'm not there.

                                About shutting down services, show me the trojan/virus that knows each and every firewall process to shut it down without the user noticing...

                                Once again, so far so good. If people use my computer and let sh!t like gator or whatever install itself, my firewall keeps it locked outside of the net so it can't grow or spam or do anything.
                                Once I change my firewall's status to "ask me", I see if there are any unwanted "guests" asking for permissions to do whatever so I I eliminate them with extreme prejudice.
                                "For every action, there is an equal and opposite criticism."

                                Comment

                                Working...
                                X