Yes, that's why you go and exclude it from the NX protection. Quite easy really.
My Computer>Properties -> Advanced -> Performance>Settings -> Data Execution Prevention Then either completely disable it. Or make exceptions for it. Easy! Nothing broken! =) ~ > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:hlds- > [EMAIL PROTECTED] On Behalf Of Peter Aldrich > Sent: Monday, June 28, 2004 11:48 AM > To: [EMAIL PROTECTED] > Subject: [hlds] Windows XP SP2 > > No sure how this will effect anyone but here you go.... > > > Windows XP SP2 is big step forward in security--but it can break things > > June 7, 2004 > John McCormick > > Takeaway: > Learn about the plethora of security enhancements that Microsoft has > included in windows XP Service Pack 2, as well as how these security > features could impair the functionality of some applications. > > The release of Service Pack 2 for Windows XP will mark a milestone in the > life of this operating system. Microsoft is pulling out all the stops to > improve security. So much so, in fact, that it will cause many > problems-because SP2 will de-emphasize backward compatibility with legacy > systems and code for the sake of security. Administrators need to know in > advance just what SP2 will mean for the Windows XP systems on their > networks. > > -------------------------------------------------------------------------- > -- > ---- > > Based on Service Pack 2 RC1 > The information in this article is based on Windows XP Service Pack 2, > Release Candidate 1. There could be a few minor changes to the software in > the final release, but nearly everything you read here will still apply. > > > -------------------------------------------------------------------------- > -- > ---- > > Details > Windows XP SP2 will dramatically improve the default security > configuration > for XP in nearly every area from e-mail to Web browsing to increased > protection against the ubiquitous buffer overrun. But, all of these > security > improvements won't come without some considerable pain. ZDNetUK reports > that > Microsoft admits that as many as one application in 10 will experience > problems due to the upgrade (I consider that a conservative estimate). > > Here are some of the most important security changes that are part of XP > SP2: > > The Internet Connection Firewall is now enabled by default, which should > improve security for SOHO users. However, in a corporate environment it > could cause problems for users trying to connect to network resources. The > firewall will also now activate much earlier in the boot cycle, even > before > the network stack is enabled. On shutdown, it will now remain active until > after the stack is disabled. > The Messenger service is now disabled by default. > A pop-up ad blocker has been turned on by default. > A unified security application called the Windows Security Center has been > added (for more information on this feature, see this News.com article). > It > is supposed to bring all of the most basic security configuration > information into one easy-to-manage place that will show whether your > firewall is enabled, if your antivirus software is working, and if you > have > the latest software updates installed. > NX support is added to Windows XP. NX (no execute) will allow NX-enabled > CPUs to mark certain areas of memory as non-executable; that is, any code > pushed into those areas (perhaps by malware such as Blaster or other > viruses) will just sit there, unable to run and therefore will be rendered > harmless. This will harden the OS against the notorious buffer overrun > threats. NX is currently only supported for AMD's K8 and Intel's Itanium > processors, but 32- and 64-bit support for this important security feature > is expected in most future processor releases. > DCOM (the Distributed Component Object Model) gets a new set of > restrictions > in the form of an access control list for nearly every action of any COM > server. There will also be a more detailed set of COM permissions, which > will allow administrators to fine-tune COM permission policies. > There is improved port management. It will no longer be up to the > application to close ports after it is finished. Before, if a developer > left > out the closing routine or the application crashed, a port could remain > open > and leave XP open to attack. SP2 encourages port management with an > application white list that only a user with administrator privileges can > alter. Placing an application (such as a peer-to-peer program) on the > white > list causes ports to be managed automatically. Such applications can also > now be run as a regular user rather than needing local administrator > privileges to open ports in ICF. > New RPC restrictions help tighten communications. The XP SP2 changes in > this > area let administrators fine-tune RPC services. This granular control over > RPC will allow you to specify that a port be used for RPC even if the > application is not on the white list. There are a lot of changes for RPC, > including a new RestrictRemoteClients registry key that by default blocks > most, but not all, remote anonymous access to RPC interfaces on the system. > The RPC interface restriction will require an RPC caller to perform > authentication, which makes it much more difficult to attack an interface, > and helps mitigate against Trojan attacks. > Potential problems > The NX protection mentioned above is an excellent example of something > that > is definitely a powerful improvement from the security standpoint. However, > NX has already been reported to have caused considerable problems (at > least > in the 64-bit version). The biggest problem will come for applications > that > use just-in-time code creation. On the other hand, the .NET Framework > common > language runtime code already supports NX as implemented in SP2. > > RPC changes are the most likely to wreak havoc with existing applications. > In the pre-SP2 Windows XP implementation, there are literally scores of > RPC-based services running, all of which provide a window for attack. That > changes dramatically with SP2. > > Because of the change in port management, if an application needs to open > ports but doesn't use stateful filtering, administrators installing it > need > to place the program on the white list. With the built-in firewall enabled > by default, IPv4-application inbound connections for audio and video, such > as for MSN or Windows Messenger, need to have their port opening and > closing > managed automatically. Inbound services connections (IPv4) will require > some > changes to configuration and/or code. Services that listen on fixed ports > should ask users if the service should be permitted to open the port in > ICF > and, if so, the service should use the INetFwV4OpenPort API to alter ICF > rules. > > Another problem is the fact that Microsoft won't be offering this service > patch to those who hold pirated copies of Windows XP, which is reasonable > enough, but there are a lot of illegal copies out there, especially in the > Far East where a lot of worms get a quick foothold in the Internet. SP2 > will > apparently check Product IDs looking for known pirated copies and will not > install on systems with bad Product IDs. This is understandable, but will > reduce the overall effectiveness of the security upgrade. > > A lot of the potential problems posed by SP2 are beyond the control of > administrators. Some programming code for custom applications will have to > be rewritten, but at least now you know what to look for when problems > come > up, rather than deploying XP SP2 and finding out that it breaks your most > important line-of-business application. > > > -------------------------------------------------------------------------- > -- > ---- > > Further reading > This report can only scratch the surface of such a major overhaul to an > operating system. For more information see: > > XP SP2 Preview > XP SP2 RC1 Fact Sheet > XP SP2 RC1 Release Notes > XP SP2 Developer Notes > > -------------------------------------------------------------------------- > -- > ---- > > Final word > I expect to hear screams of pain as people deploy SP2 and discover that > legacy applications no longer work, but those are probably the same people > who complain so loudly (and legitimately) that Microsoft doesn't deploy > secure systems. > > Nearly every security expert knew that, at some point, Microsoft would be > forced to bite the bullet and take a big compatibility hit in order to > solidify operating system soft spots-many of which are due to legacy code > support. Plus, the XP SP2 changes will force developers to produce more > secure applications and not just take advantage of a permissive Windows OS > to write code that doesn't pay attention to security. > > Of course, I would never recommend that anyone deploy such a major upgrade > widely the day it hits the street. You should install SP2 on a testing > network (or at least a single testing system) as soon as possible, and > begin > compatibility testing for your specific applications. > > Those of you who have the budgetary luxury of being able to conduct even > more extensive testing and want to get a leg up on evaluating XP SP2 even > before final release should check out the Technical Preview Program, which > makes SP2 RC1 generally available for testing by IT professionals (not > just > those on the beta list). The initial download, which doesn't include any > support other than some Microsoft-sponsored newsgroups, requires Windows > XP > to be installed already. English and German versions of the update are now > available and are about 270 MB in size. > > As soon as you feel comfortable that Windows XP SP2 will not cause a > significant interruption for users (or you have fixed the issues that > would > lead to a potential interruption), then you should deploy SP2 company-wide. > It is an important upgrade that can only improve the security of your > network. > > > -------------------------------------------------------------------------- > -- > ---- > > > > _______________________________________________ > To unsubscribe, edit your list preferences, or view the list archives, > please visit: > http://list.valvesoftware.com/mailman/listinfo/hlds _______________________________________________ To unsubscribe, edit your list preferences, or view the list archives, please visit: http://list.valvesoftware.com/mailman/listinfo/hlds

