What's the Truth About the Vista Firewall?

by Preston Gralla

There's been a lot of heat, but little light, in the discussion over whether Microsoft has crippled the firewall in Vista. From what I can gather, it appears that they've made a big mistake in turning off a vital firewall feature.

6 Comments

Rmeister0
2006-05-11 06:32:37
I think that last paragraph, for me, would be "I don't want to have to buy a second firewall". Heck, if I did I'd just turn the Vista firewall off completely and use the third party product.


I think Microsoft is screwed whichever way they go: include a proper software firewall and annoy a lot of third-party security vendors; don't include a proper firewall, and piss off a bunch of customers who now have to buy one or go without.


The thing is, the consumer versions really need the outbound firewall.

Bryan
2006-05-13 17:28:46
Why, exactly, do people want outbound firewalls? (I'll shorten that to 'OBF').


Really. Stop and think about this for a minute. If malware is running on your system, against your wishes ... it has probably already attained Admin privs. So it can shut off the OBF. Bottom line, you are depending on an already compromised network node to protect all the other network nodes. Not smart!


If you want an OBF for some other reason, such as privacy concerns ("I want to know when ProgramX does that call home thing"), then, yes, you're being reasonable again. You've set your sights on an attainable goal.


Re-think your assumptions. Basically, an OBF maintains a list of things that are permitted to network, disallowing anything that's not on the list until some approves it. OK ... if we're going to maintain such a list, why not keep a list of things that are allowed to execute instead? Now, you can keep programs you did not approve from running at all, and protect your own network node as well as all the others! (Remember, an OBF does nothing to prevent malware from damaging your computer; it just tries to stop malware from getting onto other computers. Which, as I already noted, is kinda silly.


Check out prevx for a system that keeps malware from running in the first place. It's a much better way to go!


(And no, I don't have any relationship with prevx other than that I use their software.)

Dave Bacher
2006-05-15 09:04:37
Administrative privlege is a phantom threat anyway.


At best, an outbound firewall can provide a warning that an attack is already under way. However, users are far more likely to blindly click "OK" than to read the warning -- most malware/spyware is installed via social engineering, and the user believes the application is doing what they want for it to do.


You don't need administrative access to do what most malware and spyware does -- you don't need it to read the user's mailbox, you don't need it to read their quicken/money files, and you don't need it to monitor keystrokes in the current session (and all of this goes for Linux and FreeBSD as well).


Using FireFox, browse to toolbar.google.com and install it. You'll find you don't need administrative rights to install it, and the page rank feature (if enabled) certainly allows them to know what sites you are browsing. It as easily could collect keystrokes.


Preventing outbound connection is like trying to put your finger in the dike -- the attacker can compromise Internet Explorer and FireFox, for example. They know these applications have permission, and they can use local IPC to communicate with them, which won't even be detected by a firewall program. They can send the data out via Internet Explorer or FireFox, in a background thread while the application is completely unimpacted.


When you put your finger in one hole, another hole opens.


As far as buying another firewall goes, Microsoft has to preserve the firewall market. The reason that they have to preserve it is that if they do something to eliminate it, they'll get hit with anti-trust again. It is a very fine line "how much do I provide" to have basic, adequate protection and not get slapped with a lawsuit by some heavy hitters (Symantec, etc.).

Devin L. Ganger
2006-05-16 09:59:54
Admin privileges are not a "phantom threat", Dave. True, a lot of malware can do damage -- ranging from petty to not horribly inconvenient -- as a non-priv user account...but there are whole classes of damage (usually more long-term) that can be prevented if the malware can't escalate to admin privs. Rootkits, for example.


There's an awful lot of current malware that relies on being run as a local admin in order to get installed and do what it needs to do. Neutering this capability isn't 100% protection, but no measure is. It does, however, nullify a lot of crap immediately and reduce the effectiveness of much of the rest.

Hey Kool Aid
2006-05-16 11:39:52
Point blank -user education and taking preventive measures is the key to keeping their one little machine protected. Just having anti-virus and anti-spyware isn't good enough if they don't ever update the virus definitions and strings. Your average user doesn't have a clue about the most commeon things like this.


I think Microsoft should include the Firewall on their Home Operating Systems with the default set to "Disable" and let the Home user decide whether to enable it or not. A home user would probably get angry if they can't get a program the just bought and installed to work properly because the firewall is blocking it.

Jennifer
2006-06-15 00:57:01
Our computer is connected to the internet almost 24/7 and we can simply not use a firewall to protect ourself. At minimum, any computer connected to the Internet needs to have all current patches to its operating system and browser installed as well as personal firewall, antivirus and anti-spyware software. A more complete solution is taking a layered approach to protect your security and privacy.


A firewall prevents some communications forbidden by the security policy, analogous to the function of firewalls in building construction. A firewall is also called a Border Protection Device (BPD). A firewall has the basic task of controlling traffic between different zones of trust. Typical zones of trust include the Internet (a zone with no trust) and an internal network (a zone with high trust).


My place for free firewalls is therefore:
http://www.freespamfilter.nl/uk/firewall.htm


They always have the latest and best firewalls available and have good reviews of all firewalls.


Jennifer