UPNP/SSDP

G

Guest

Well I had to disable UPNP SSDP due to a taskbar problem, but I've heard that everyone should have this service disabled..

I ask why.

And.. won't I need this service enabled? there are many UPnP devices? Won't my PC ask me for this service? Anyway, should I keep it disabled?

please help me
 
D

David H. Lipman

If you have to ask -- keep it disabled.

Dave




| Well I had to disable UPNP SSDP due to a taskbar problem, but I've heard that everyone
should have this service disabled..
|
| I ask why.
|
| And.. won't I need this service enabled? there are many UPnP devices? Won't my PC ask me
for this service? Anyway, should I keep it disabled?
|
| please help me
 
F

francis gerard

Jotenko said:
Well I had to disable UPNP SSDP due to a taskbar problem, but I've heard
that everyone should have this service disabled..

I ask why.

And.. won't I need this service enabled? there are many UPnP devices?
Won't my PC ask me for this service? Anyway, should I keep it disabled?

please help me

the SSDP service 'discovers' and enumerates UPnP-compliant devices on your
network, and the UPnP service dynamically configures these devices (on the
fly) to work with UPnP-aware windows applications

an example of this would be a LinkSys Broadband Router (UPnP device) and MSN
Messenger (UPnP application), in this example, MSN Messenger is able to
communicate to the UPnP service that it needs to dynamically open ports on
the router for whatever it's doing at the moment, ie, file transfers,
audio/video sessions, etc. rather useful if you ask me, instead of manually
configuring the router to permanently open a range of ports.

the fears about SSDP/UPnP are, like many things in life... overblown. i
have both services enabled, you can set them to Manual or Automatic, i
believe the default is Manual for both. if you don't have any UPnP devices
on your network (such as a UPnP-compliant router) and these services are set
to Manual, then they will only run if/when they are needed.

there is a caveat though, it does appear that one of the two services
occasionally causes a delay during logon, that is, the explorer shell takes
an extra minute or so to initialize. it's quite annoying because the
desktop (and some other startup processes) is in a frozen state during this
time, but if you're patient enough (who is these days, i know), then the
desktop suddenly comes to life after about 1min.
 
F

francis gerard

francis gerard said:
the SSDP service 'discovers' and enumerates UPnP-compliant devices on your
network, and the UPnP service dynamically configures these devices (on the
fly) to work with UPnP-aware windows applications

oh yeah, i forgot to mention that many early implementations of UPnP were
not compliant with the specification, so some UPnP devices, particularly
broadband routers (LinkSys and others) require a firmware update to make
UPnP discovery/control work properly, otherwise it can be frustrating when
one of your UPnP applications (like MSN Messenger) refuses to dynamically
open ports on the router to do file transfers, audio/video, etc.

tip - if you have a UPnP-compliant router and the services are enabled in
windows and you are using MSN Mesenger, you can verify that Messenger is
aware of the UPnP device by selecting Options from the Tools menu in
Messenger, then click on the Connection tab. the Connection Information
section at the bottom of that panel will say 'You are connected to the
Internet through a UPnP port restricted NAT' (NAT, Network Address
Translation, without getting into details, is how the router isolates your
internal network LAN from the Internet WAN) in the case of UPnP routers, i
strongly recommend that the latest firmware be installed, which should fix
any UPnP issues, the firmware can be downloaded from the router vendor's
website.
 
C

CZ

Re: UPnP

From:
http://techupdate.zdnet.com/techupdate/stories/main/Linksys_routers_and_DDoS.html

"I asked Gibson whether UPnP-compliance could be the answer to the sort of
on-the-fly port adjustments that he likes. Gibson responded,
"Firewall/routers with UPnP enabled by default will be the next major
security problem." Why? Systems on the inside of a UPnP-compliant firewall
are given the authority to dynamically change a port's status. However, the
difference between UPnP and the ZoneAlarm-sort of flexibility that Gibson
likes is that in the latter situation, the flexibility is hardwired to some
known problems. With UPnP, the dynamism is more encompassing of all ports.
Firewalls aren't simply for keeping the bad stuff out, but also for keeping
both bad and confidential stuff from getting out. Gibson cites the example
of e-mail borne viruses. "Once a virus is inside the firewall, nothing
prevents it from using UPnP to open up a port in your firewall and exposing
your network."
 
F

francis gerard

CZ said:
Re: UPnP

From:
http://techupdate.zdnet.com/techupdate/stories/main/Linksys_routers_and_DDoS.html

"I asked Gibson whether UPnP-compliance could be the answer to the sort of
on-the-fly port adjustments that he likes. Gibson responded,
"Firewall/routers with UPnP enabled by default will be the next major
security problem." Why? Systems on the inside of a UPnP-compliant firewall
are given the authority to dynamically change a port's status. However,
the difference between UPnP and the ZoneAlarm-sort of flexibility that
Gibson likes is that in the latter situation, the flexibility is hardwired
to some known problems. With UPnP, the dynamism is more encompassing of
all ports. Firewalls aren't simply for keeping the bad stuff out, but also
for keeping both bad and confidential stuff from getting out. Gibson cites
the example of e-mail borne viruses. "Once a virus is inside the firewall,
nothing prevents it from using UPnP to open up a port in your firewall and
exposing your network."


while i respect most of steve's (grc.com) thoughtful opinions and careful
research, at times he can be just a tad alarmist, particularly about
microsoft products, not without good reason though, i'm sure. he's even
more cynical about microsoft practices than i am... and that's saying a lot.
;-)

in any case, with regard to this topic of discussion, UPnP NAT Routers and
Firewalls...

a firewall and a NAT-based UPnP-compliant router are distinctly different
entities, the firewall does stateful inspection of packets traversing the
host's network interface(s), and if done at the application level, can
provide a reasonable level of protection against unsolicited inbound traffic
and block unauthorized outbound traffic, based on whatever application and
port rules have been configured.

the NAT router is a packet filter that routes packets b/w the LAN
interface(s) of each host on the internal network and the WAN gateway (the
internet in this case). the NAT, network address translation, functionality
provides the first level of security because the WAN interface is isolated
from the LAN interface(s) because private IPs are used on the internal LAN
side and are not routeable on the WAN (internet) side and vice versa.
because the router operates at the network level, it's not the job of a UPnP
NAT router to block the type of outgoing traffic (although some routers do
have this feature), the application-level firewall is intended for that
purpose. keep in mind, we're talking about consumer grade home-based
routers, not the industrial type used to route traffic on public networks,
like the internet.

so, to encapsulate what i'm trying to say, firewalls and routers are not the
same thing, and to have a reasonable level of protection against unsolicited
inbound traffic and block unauthorized outbound traffic, you should have
*both* a router and a firewall in place, but the application-level firewall
is more important to guard against the types of traffic leaving your
machine, that perhaps shouldn't be.

as for UPnP, i like the idea that an application can dynamically open/close
ports, that's certainly better than leaving ports open when not in use, and
not such a pain in the arse when, on the other hand, you are required to
manually configure your router to open a port to allow application X to work
properly. the firewall can take care of the rest, ie, deciding whether or
not application X is allowed to open ports. you realize that with a
firewall in place, the UPnP component of Windows does not even see the
request to change a port's status on the router unless the firewall has
allowed the application to do so in the first place.
 
C

CZ

Francis:

Most end user firewalls are stateless (or primarily so)

Generally, neither a NAT nor a router are referred to as packet filters. A
NAT does address translation and port matching per a port table, a router
routes packets between two interfaces per a routing table, and a packet
filter makes a forward/discard decision based on info in the packet headers.

Not exactly.
Private IP addresses are routable, as I do it frequently in test scenarios.
It depends upon the routers routing table.
IMO, re: a NAT-router, a router port accepts the packet, passes it to the
NAT (which makes an address change), then the packet is compared to the
router's routing table and is sent to the designated router port.
A key issue here is that outside initiated inbound packets with the WAN port
address are dropped by the NAT (as they do not have a match in the NAT's
port table), not by the router.
And, an outside initiated inbound packet with a private IP address would not
be picked up by the router.

Agreed, except that I would want more than just an application gate type of
firewall (eg. ZA free) which does not also do packet filtering for outbound
packets (Sygate does both, ZA free does not). Actually, I find using ZA
free (an application gate f/w) together with BlackIce (an ID) to be a fairly
good end user f/w setup.
 
F

francis gerard

CZ said:
Francis:


Most end user firewalls are stateless (or primarily so)

not these days, ime, most modern 'end-user' firewalls are stateful,
otherwise it's just a glorified packet filter with a set of rules. the XP
built-in firewall, ZoneAlarm (free and Pro), among others all do stateful
packet inspection
Generally, neither a NAT nor a router are referred to as packet filters.

not true, NAT routers are considered a type of packet filter as they are
designed to Allow, Reject or Drop inbound/outbound *packets* based on IP
address and/or Port number. thus, a NAT router IS, technically speaking, a
type of of packet filter. a Router, on the other hand, does not typically
perform packet filtering, it's job is simply to route packets.
A NAT does address translation and port matching per a port table, a
router routes packets between two interfaces per a routing table, and a
packet filter makes a forward/discard decision based on info in the packet
headers.

a Router, when referring to the devices used to connect together public and
private networks, is a device that is designed to efficiently route
(forward) packets b/w the disparate networks, and they do this by 'talking'
(using ICMP protocols) to other routers to determine the best route, thus
they are constantly updating their routing tables. the key difference here
is that an internet Router dynamically adjusts its routing tables based on
complex rules and the state of the other networks (routers) that it's
connected to. it's job is fairly straightforward, but also complex in that
it must make complex decisions on the fly on how to most efficiently route
traffic in all directions, and then dynamically adjust itself if network
conditions change. a NAT router for broadband internet does not do this,
its routing tables are static.

a NAT router is, by definition, a router because it not only performs
address translation b/w the LAN-WAN interfaces, but it also forwards/routes
packets b/w the two interfaces according to rules configured in the NAT
router's *routing* table. the NAT router's routing table is not nearly as
complex as an internet router's would be, but still, it can be manually
configured to add new routes, although most people don't have a need to do
this, the NAT router auto-configures its routing table based on the IP
addresses assigned to the WAN and LAN interfaces. one could, for example,
add new static routes to the NAT's routing table that would enable the
router to route traffic b/w two or more private networks and the internet.
Not exactly.
Private IP addresses are routable, as I do it frequently in test
scenarios. It depends upon the routers routing table.

the private IP address range, 10.x.x.x/8, 172.16.x.x/12, 192.168.x.x/16 are
examples of private IP netblocks, they are intended to be used internally on
private networks (intranets), these addresses are NOT routable on public
networks, packets headered with a destination from the private address range
will be DROPPED by the internet gateway (router) the moment it leaves the
host on the internal network. the router is misconfigured if this does not
happen, but it would still have a difficult time for a packet destined for a
private network to traverse the internet since NO router on the internet
would route the packet.
IMO, re: a NAT-router, a router port accepts the packet, passes it to the
NAT (which makes an address change), then the packet is compared to the
router's routing table and is sent to the designated router port.

you mean the NAT router's port forwarding table (not routing table, that's
something different). the NAT router statefully inspects outgoing packets,
that is, it examines the packet headers of outgoing traffic, retains a log
of what host (port) solicited the outbound connection and then in-turn, maps
inbound connections to the the correct LAN ports.
A key issue here is that outside initiated inbound packets with the WAN
port address are dropped by the NAT (as they do not have a match in the
NAT's port table), not by the router.
And, an outside initiated inbound packet with a private IP address would
not be picked up by the router.

*unsolicited* inbound connections are dropped by the router, solicited
connections are forwarded to the appropriate port. private IPs, as
previously stated, are non-routable on the internet, so it's not something
the NAT router would have to deal with. however, there is nothing to
prevent the WAN interface on the NAT router from obtaining and using a
private IP address from the ISP. the NAT router doesn't care if the address
on the WAN inteface is from private or public netblock. so, it is possible
to have private IPs on both sides (interfaces) of the router, but then
packets destined for the internet will not get routed over the WAN interface
because the converse is also true, public IPs are not routable in the
private address space. this scenario can occur with some ISPs when the
ADSL/Cable modem is not able to obtain a valid external address from the
DHCP server (usually an authentication issue) b/w the subscriber's broadband
modem and the ISP. even more interesting is that the external address
assigned by the ISP has usually been NAT'd too, but that's beyond the scope
of this discussion.
Agreed, except that I would want more than just an application gate type
of firewall (eg. ZA free) which does not also do packet filtering for
outbound packets (Sygate does both, ZA free does not). Actually, I find
using ZA free (an application gate f/w) together with BlackIce (an ID) to
be a fairly good end user f/w setup.

when you refer to 'packet filtering on outbound packets', you are speaking
about an application-level firewall, right? ZAF is a stateful firewall, but
does not block outbound traffic based on source or content. the Pro version
does. however, ZoneAlarm (free edition) does perform outbound packet
inspection based on protocol, that's how it's able to block outbound traffic
on the NetBIOS ports, etc. i'm not familiar with BlackIce, aside from it's
ominous sounding name. XP SP2's firewall is stateful and monitors outbound
traffic at the application and protocol level.
 
D

David H. Lipman

Here is the CORRECT place to make this query... microsoft.public.upnp

Dave




| thanks, but could someone answer my questions?
|
|
| "David H. Lipman" wrote:
|
| > If you have to ask -- keep it disabled.
| >
| > Dave
| >
| >
| >
| >
| > | > | Well I had to disable UPNP SSDP due to a taskbar problem, but I've heard that everyone
| > should have this service disabled..
| > |
| > | I ask why.
| > |
| > | And.. won't I need this service enabled? there are many UPnP devices? Won't my PC ask
me
| > for this service? Anyway, should I keep it disabled?
| > |
| > | please help me
| >
| >
| >
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads


Top