>I have chucked the issue but my recollectuion is that the magazine 
>(British edition) tested IPNet Sentry - which *is* a firewall - and 
>IPNetRouter, with which it is usually sold and the two used together. The 
>performance was actually worse than Apple's own firewall, although that 
>of course is OSX only.

I'd be interested in knowing what they tested for. I thought IPNetRouter 
in OS X was nothing more then a nice front end to ipfw in OS X. In other 
words, I wouldn't have expected it to do any worse (or better) then 
Apple's firewall solution (which is also just a nice front end to ipfw). 
I guess I was mistaken and IPNetRouter is an entirely self contained IP 
solution.

I don't know much about the OS X version of IPNetSentry. I used IPNS on 
my iMac for a while back when they first released it. It didn't do much 
except report periodically that someone was trying to access ports on my 
iMac (which of course could have safely gone ignored since I wasn't 
running anything on the machine that used those ports anyway... this was 
back with OS 8.x).

>Seems to me that the risks are pretty moderate for dial-up users, but 
>potentially much greater when permanently connected via cable. At the 
>least I would like to see all ports stealthed. Sustainable Software's 
>offering does not offer that protection.

That's odd... I ran IPNetRouter for a long time at work, and it always 
stealthed all ports that I did not specifically open for forward.

However, if they checked for port stealth while using IPNetSentry, AND 
they complained that was a failed feature, then they simply didn't 
understand what IPNetSentry does. Last I knew, it wasn't supposed to 
stealth ports, instead, it acted as a honey pot to allow hack attempts to 
be isolated and then drop entirely off the network from them. A honey pot 
is when a firewall deliberatly leaves a typical intrusion point open for 
monitor. That way, script kiddies will hit the honey pot, the firewall 
logs the IP, and then ignores all traffic of any kind from that IP for 
whatever duration the admin tells it. These are useful when you have to 
leave certain ports open for services (such as a web host), and you don't 
know in advance what IP addresses will be used to access the services 
(such as when hosting a public web site), but you want to be able to have 
a better chance of stopping people that appear to be up to no good.

-chris
<http://www.mythtech.net>

___________________________________________________________________________
To unsubscribe send a mail message with a SUBJECT line of "unsubscribe" to
<[EMAIL PROTECTED]>  or  <[EMAIL PROTECTED]>

Reply via email to