WinXP Firewall

  • Thread starter Thread starter Aido
  • Start date Start date
A

Aido

Hiya Peoples.
I'm new to this Newgroup, So forgive me if this topic has been done to
Death.
I'd like to know how effective the WinXP Firewall is. Any info would be
appreciated.

Aido.
 
Sorry.
My specs are: Laptop running WinXP pro, P4 2g, 512k ram, Nvidia 128meg
graphics.

Aido.
 
Hi Aido

The XP firewall works one-way only - it monitors access to your PC, but not does not monitor outgoing access from your PC to the Internet. Personally I use ZoneAlarm - www.zonelabs.com - with the XP firewall disabled.
 
Hi Aido,

This configuration never let me down since I installed WinXP
- The WinXP firewall (it is good and it is SO VERY easy to use)
- AdAware from Lavasoft (free edition)
- EZ-Antivirus (extremely light on resources)
I never had a virus, I was never hacked, I never had any problem whatsoever.
 
But, do you know if your machine is hacking others, joining in DOS attacks
etc.? ZoneAlarm would let you know. That is why SP2 (when it comes out) is
going to have a two way firewall.

Most knowledgeable DO think this is important!
 
Crusty (-: Old B@stard :-) said:
But, do you know if your machine is hacking others, joining in DOS attacks
etc.? ZoneAlarm would let you know. That is why SP2 (when it comes out) is
going to have a two way firewall.

Do you remember ewhere you got this information? I ask because the public
documentation for SP2 only shows changes for inbound connections with no
added functionality for outbound. Here is an excerpt from that document:

ICF provides protection for PCs that are connected to a network by
preventing unsolicited inbound connections through TCP/IP version 4 (IPv4).
 
Greetings --

WinXP's built-in firewall is fine at stopping incoming attacks, and
hiding your ports from probes. It doesn't give you any alarms to tell
you that it is working, though. What WinXP's firewall also does not
do, is protect you from any Trojans or spyware that you might download
and install inadvertently. It doesn't monitor out-going traffic at
all, much less block (or at least ask you about) the bad or the
questionable out-going packets. It "assumes" that any applications
sending out-going data are doing what _you_ want them to do.

ZoneAlarm, Kerio, or Sygate are all much better, and are much more
easily configured, and there are a free versions of each readily
available. Even Symantec's Norton Personal Firewall is superior,
although it does take a heavier toll of performance then do ZoneAlarm,
Kerio, or Sygate.


Bruce Chambers

--
Help us help you:



You can have peace. Or you can have freedom. Don't ever count on
having both at once. -- RAH
 
Wow! I will have to look again. I believe it was a link that one of the
MVP's posted in response to another's post.

I will feel foolish if I read it wrong (-:
 
In
Aido said:
I'd like to know how effective the WinXP Firewall is. Any info
would be appreciated.


It's OK, but it has two disadvantages compared to other choices;
it isn't configurable, and it monitors incoming traffic only.

For that reason, I prefer other choices, such as the free version
of ZoneAlarm.
 
Greetings --

Here's how the built-in firewall is being modified in SP2:

Internet Connection Firewall in SP2
ICF for SP2 will include a host of new features. This paper will
discuss five of them that will have some impact on existing
applications:

1.. On by default. Prior to SP2, Windows XP shipped with ICF
disabled by default; users either needed to run a wizard or navigate
through the Network Connections folder to enable ICF. By enabling ICF
by default, the computer will be protected from many network based
attacks. For example, if ICF had been enabled by default the recent
Blaster attack would have been greatly reduced in impact, regardless
of whether users were up to date with patches. This may have an impact
on existing applications if the application does not work with
stateful filtering by default.
2.. Boot time security. In earlier versions of Windows there is a
window of time between when the network stack started and when ICF
provided protection. Consequently, a packet could have been received
and delivered to a service without ICF filtering it, potentially
exposing the computer to vulnerabilities. In SP2, the firewall driver
has a static rule called a boot-time policy to perform stateful
filtering. This will allow the computer to perform basic networking
tasks such as DNS and DHCP and communicate with a Domain Controller to
obtain policy. Once the firewall service is running, it will load and
apply the run-time ICF policy and remove the boot-time filters. This
change should increase system security without affecting applications.
3.. Application white list. Prior to SP2, applications needed to
call the ICF APIs to enable the necessary listening ports to be open
to send and receive messages. This proved difficult in peer-to-peer
situations when the port was not known in advance. Further, it was up
to the application to close the hole in the firewall, which could lead
to unnecessary openings in the firewall should the application
terminate unexpectedly. Additionally, these holes could only be opened
by applications running in the security context of a local
administrator. In SP2, an application that needs to listen to the
network can be added to the Application White List. An application on
the white list will have the necessary listening hole created
automatically. By having an application on the white list, only
necessary ports are opened, and they are only opened for the duration
that the application is listening on it. This prevents an application
from opening up a port it's not using and either deliberately or
inadvertently exposing another application or service to network
traffic from that port. Further, this also allows applications
listening to the network to run as a regular user. Applications that
work with stateful filtering do not need to be placed on the white
list. Only administrators can add an application to the white list.
4.. RPC support. In earlier versions of Windows, ICF blocked RPC
communication, causing functions such as file and print sharing and
remote administration to fail. This was because the RPC process image
filename was the same for many RPC servers (svchost.exe). SP2 enables
granular control of which RPC services have the ability to traverse
ICF. When opening a port, a caller may claim that the port is to be
used for RPC. ICF will only accept this claim if the caller is running
in the Local System, Network Service, or Local Service security
contexts. ICF supports a profile level flag that enables RPC ports to
be opened even if the caller is not on the Application White List:
PrivilegedRpcServerPermission. By having granularity, administrators
can control which RPC services are exposed to the network, limiting
communication to only those who need it.
5.. "Shielded" mode. In the event a malicious application that finds
and exploits a vulnerability in one of the listening Windows services
is threatening users, SP2 introduces a setting to ICF, code-named
"shielded" mode. This mode enables users to easily protect themselves
by switching ICF to prevent all unsolicited inbound traffic until a
patch is available, without having to reconfigure the firewall. When
in this operation mode, the computer cannot listen for requests that
originate from the network. Outgoing connections are the only
connections that succeed. Any API call to open up a static hole will
be allowed and the configuration stored, but it will not be applied
until the ICF operational mode switches back to normal operation.
The entire document:

http://msdn.microsoft.com/security/default.aspx?pull=/library/en-us/dnwxp/html/securityinxpsp2.asp


Bruce Chambers

--
Help us help you:



You can have peace. Or you can have freedom. Don't ever count on
having both at once. -- RAH
 
Thanks for the info peoples, It's been very informitive.
I had been running Sygate, But the trial time has expired & I haven't
yet updated it, Just wanted to know more about the WinXP firewall first.
I was told by an ex-hacker I did some work for that it's one of the best
out there, He said that Zone Alarm is crap, He's hacked through it in about
5 mins, Sygate took about 1/2hr, He said that any hacker that can't get in
with in 5 mins will ussually try somewhere else.

Aido.
 
Aido;
You betcha! Read your other post already. See my other reply to your
other post @ microsoft.public.windowsxp.help_and_support
;o)
Whatever blows your skirt up. Keep having fun.
 
Back
Top