On 2010-08-06 19:36, John Sessoms wrote:

Hardware firewall won't stop "phone home" behaviour, will it?

I think it should if you tell it to.

Hmmm, that can be really tricky due to what's generically known as "application level gateways". Please excuse the massive oversimplification to follow ...

Basically, a number of network protocols require what I'll call ancillary connections. For example, when you FTP into a computer, it opens an FTP connection and you communicate with it over that connection.

When you send over that connection a command to download a file, both ends keep the original connection open for your "FTP command line", and they also open another connection for the file transfer. The firewalls know about this protocol behavior, and accommodate it by silently opening a temporary (ephemeral) hole in the firewall for that secondary (ancillary) connection for the FTP file transfer.

A variety of common Internet protocols exhibit similar behavior, and the firewalls know about them. As a "convenience", they often provide similar "silent leaking" logic for many different protocols, as described above.

These sorts of "convenience" features can allow "phone homes" to egress your network unreported by subverting some unrelated protocol.

That's one of the reasons that I run a hardware router, a hardware IPS (I get it free because I help write the IPS code), and I also have firewall software installed on my systems ... the (software) firewall on the host is the only one I can thoroughly rely on to stop phone homes. And the only reason for that is that I have it configured to always alert me when a program tries to send data out the network port and require my acquiescence (it has a white list, of course, which is a risk).

I won't even get into the ways that the nefarious can leverage normal protocols, ports, and hosts to do their misdeeds in ways that would require blocking essentially all, for example, Web or email traffic, to completely prevent the egress.

Powerful, flexible technologies confer powerful, flexible capabilities and often (at least imply) onerous responsibilities. Those capabilities can be used for good or evil, and will probably be used for both, if the technology is prevalent enough. Acceptance of the responsibilities is optional. Some people choose not to accept the responsibility and are thus unconstrained.

--
Thanks,
DougF (KG4LMZ)

--
PDML Pentax-Discuss Mail List
[email protected]
http://pdml.net/mailman/listinfo/pdml_pdml.net
to UNSUBSCRIBE from the PDML, please visit the link directly above and follow 
the directions.

Reply via email to