查看: 3384|回复: 6
收起左侧

推荐一个comodo官方论坛的讨论帖子

[复制链接]
rcbblgy
发表于 2007-9-16 14:57:19 | 显示全部楼层 |阅读模式
http://forums.comodo.com/leak_testingattacksvulnerability_research/warning_this_firewall_does_not_protect_anyone_it_is_easy_to_bypass-t12265.0.html

为了防止产生误导,我就不把原帖转过来了,官方的egemen做了很详细的答复,看过后会对这个防火墙有新的理解,至少对使用上有一定的帮助。
jpzy
发表于 2007-9-16 15:34:09 | 显示全部楼层
看着很费劲啊!
似乎是说当装了VPC以后,Comodo不会拦截VPC系统的网络数据包!
rcbblgy
 楼主| 发表于 2007-9-16 17:01:23 | 显示全部楼层
主要是看egemen在后来的解释。
rcbblgy
 楼主| 发表于 2007-9-16 17:05:04 | 显示全部楼层
……
I think it is time to explain how it works a little more.
There are 2 types of rules in 3.0.  Application rules and global rules.

Application rules are used to handle all application based traffic. i.e. the traffic that applications in your computer generate.

Global rules are used to filter both the application based  and non-application based traffic.

For outgoing connections, first application based rules are applied, if passed, then global rules are  applied.
For incoming connections, first global rules are applied. If  passed, then application based rules are applied.

If the traffic is the routed traffic,  it is considered applicationless, hence only the global rules are applied. If the traffic is applicationless, there is no "application is trying to connect to the Internet" popup.

Rule handling :
Rules are applied from top to bottom. So the first rule which matches the  packet is applied.

Yes there are. The traffic generated by your computer is bound by application rules hence the SPI. In your case, it is the routed traffic hence only the global rules are applied.


Here are some test scenarios to better see CFP in action:

Operating System: Windows XP SP2, 32 bit
VM : VMWare (bridged networking)
Host OS : Windows XP x64

CFP 3.0
----------
Firewall->Advanced->Attack Detection Settings->Monitor other ndis protocols than TCPIP is ENABLED(requires a restart, not necessary if you are using Windows Vısta or XP 64 bit)

Scenario 1 :

One example default CFP configuration, normally has the following GLObAL Rules

1 - ALLOW IP OUT FROM ANY TO ANY WHERE PROTOCOL IS ANY
2- BLOCK IP IN/OUT FROM ANT TO ANY WHERE PROTOCOL IS ANY

the Virtual Machine will be able to connect to the internet successfully. Why?

1 - CFP 3.0 sees the traffic being SENT(BRIDGED) from VM to the bridged network adapter
2 - CFP 3.0 checks where this traffic comes from and sees that it is a routed traffic
3 - Routed traffic can not be generated by an application inside the PC where CFP is operating so it applies only the GLOBAL rules.
4 - The rule 1 allows the outgoing requests thus the traffic is allowed.

Some points to clarify :

Q - Does this mean if I am in a network, by default, my internet connection can be shared with other PCs without any further configuration?
A - No. In a LAN, you will be invisible to the other PCs because unlike this VM example, your computer will reject any incoming packets because of the global rule 2.


Scenario 2

GLOBAL RULES :

1- BLOCK IP IN/OUT FROM MAC XX-XX-XX-XX-XX-XX TO ANY WHERE PROTOCOL IS ANY
2- ALLOW IP OUT FROM ANY TO ANY WHERE PROTOCOL IS ANY
3- BLOCK IP IN/OUT FROM ANT TO ANY WHERE PROTOCOL IS ANY

where XX-XX-XX-XX-XX-XX  is the MAC address of the adapter INSIDE the VM.

If the the VM tries to connect, then

1 - CFP 3.0 sees the traffic being SENT(BRIDGED) from VM to the bridged network adapter
2 - CFP 3.0 checks where this traffic comes from and sees that it is a routed traffic
3 - Routed traffic can not be generated by an application inside the PC where CFP is operating so it applies only the GLOBAL rules.
4 - The rule 1 matches request thus the traffic is BLOCKED.

Note that this will only BLOCK the VM but not the real operating system.

You can use your logical reasoning to create a set of global rules which can do the same.

for example,
BLOCK the traffic NOT FROM MY ETHERNET Adapter or
OR
ALLOW the traffic from MY ETHERNET ADAPTER
BLOCK the rest

etc etc. it is upto your reasoning.

ı have tested all these scenarios personally and did not see any problems.

with CFP you can filter based on layer 2 address. Layer2 protocols like ARP/RARP are not supported. We believe MAC address based filtering should do good enough in the environments where CFP is intended to operate.

For me to be able to understand your case properly, you need to list your rules in exact order as they appear. Note that if you dont enter a description for a rule, CFP automatically generates one for showing in the grids. So if you can use them to post your rules, that would be better.


Hope this helps,
Egemen

[ 本帖最后由 rcbblgy 于 2007-9-16 17:06 编辑 ]
rcbblgy
 楼主| 发表于 2007-9-16 17:11:21 | 显示全部楼层
VM就是红字中的router traffic,所以只有全局规则起作用,而全局规则中默认有一条允许所有向外连接,所以可以直接访问网络。但VPC似乎不同,好像是内核通信的,有自己的驱动,按官方解释这个不在“防火墙”的管辖范围内,应该由HIPS在安装驱动时拦截。
comicosmos
发表于 2007-9-16 23:25:36 | 显示全部楼层
都是高手啊,跟他们学到好多东西。把这个帖子顶起来,让更多人学习
ktango
发表于 2007-9-16 23:41:53 | 显示全部楼层
Wilders Security都有这个问题的讨论,有兴趣的兄弟可以叁考以下结连
http://www.wilderssecurity.com/showthread.php?t=184573
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-4-30 13:19 , Processed in 0.218928 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表