[ale] how can a firewalled PC POSSIBLY be attacked?
Matthew
simontek at gmail.com
Tue Jan 22 21:27:08 EST 2013
Just cause you have a firewall, doesn't mean that nothing can beat it. Can
people still steal your car when you put on an alarm? Phil put a good
answer up though.
On Tue, Jan 22, 2013 at 9:15 PM, Phil Turmel <philip at turmel.org> wrote:
> On 01/22/2013 08:28 PM, Ron Frazier (ALE) wrote:
> > The discussion on vpn's and security at Emory prompted me to ask
> > this. This was prompted by some statements in another thread that a
> > PC could be in danger if attached to unfiltered lan ports on Emory's
> > network.
> >
> > Assume you have a PC connected directly to the internet. It doesn't
> > matter if it's linux, windows, mac, or android. I'm speaking in
> > conceptual terms. Assume the PC is not running any server type
> > programs, so it is not listening on any ports. Assume no one is
> > browsing to potentially malicious web pages, or even any web pages.
> > The PC is just sitting there idling. Assume the PC has firewall
> > software running. The firewall's only job is to drop all packets
> > that are not part of a response to an inquiry that this PC has
> > issued. I don't want to debate, at this point, the pros and cons
> > of dropping all packets or operating in stealth mode.
> >
> > My question is, conceptually speaking, how can this PC POSSIBLY be
> > vulnerable to any remote attack? How could anything phase it?
>
> Because a software firewall is *software*, and it is part of a
> closed-source operating system that is opaque to audits. Said operating
> system has a history of alternate paths in its kernel that permit
> various packet types to reach the OS in spite of the firewall.
>
> Third-party firewalls couldn't close the loopholes either, as the hooks
> offered by MS for their use saw packets only after the loopholes' hook.
>
> I don't remember all the details, but I believe bypasses that caused the
> most trouble were part of the remote procedure call subsystem. I
> believe MS has since closed that one. But there's no way to know what
> MS still has, not to mention any exploitable flaws that remain.
>
> > Then, how does the answer change depending on whether it is linux,
> > windows, mac, or android.
>
> Windows and MacOS have network protocol stacks with unpublished source
> code, and so have no independent audit of what happens to packets within
> them.
>
> Linux and the public 'BSDs have published source code that can be
> audited. Linux is known to apply its packet filtering algorithms as
> close to the drivers as possible.
>
> > Finally, if it were behind a hardware firewall, or router, how could
> > any unwanted packets get on the lan?
>
> They generally can't, without an invitation. NAT relies upon outbound
> requests from a connection-oriented protocol (like TCP) to establish a
> return path. If the firewall is NATted, only packets that have been
> "invited" to return can get in.
>
> If the firewall is not a NAT, there's more opportunities for directed
> packets to get into the LAN, but the firewall's packet filters will
> still be applied before Windows sees the packets. It's holes don't
> apply in that case.
>
> Of course, most modern attacks are in the browser (or mail client),
> where a user, by loading a malicious page (or attachment), gives an
> attacker many invitations to deliver packets to the target machine.
> Here again, the auditable nature of open source software tends to expose
> flaws that an attacker would use to escape the browser's boundaries, and
> again to obtain elevated privileges.
>
> Windows is simply *not safe* to browse the internet with a direct
> connection, and only slightly safer behind a physical firewall.
>
> Phil
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
--
SimonTek
912-398-6704
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20130122/7d201562/attachment.html>
More information about the Ale
mailing list