What You Should Know About Firewalls

March 8, 2008 – 3:37 PM

Scott Rolf knows trouble when he sees it. An IT director for a law firm near Cleveland, Ohio, Rolf was asked by a friend to check out the new Web site the friend had put up on a DSL-connected Web server. Rolf did more than just visit his friend’s site; he quickly found that the server lacked any sort of firewall protection. It took less than five minutes for Rolf to exploit a well-known Windows NT vulnerability and e-mail to his friend a complete listing of files and directories from the server’s hard disk.

“He called me a few minutes later and said ‘Holy cow, what do I do?’ He was at work and couldn’t turn the server off,” Rolf laughs. “I think he went out and bought a Linksys firewall box.”

As the name implies, a firewall acts as a barrier between your PC and the Internet. Firewalls not only prevent unauthorized access to your PC or network, they also hide your Internet-connected PC from view.

Firewalls have long been a fixture at large companies, which must secure their networks against determined attackers. But the dangerous surge in e-mail- and Web-borne threats–including viruses, worms, hijacks, and increasingly aggressive spyware–means that home PCs require this protection as well.

Don’t believe me? Consider this. According to the Internet Storm Center, a typical unprotected PC will come under attack within 20 minutes of being connected to the Internet. That is not a misprint. In less time than it takes most people to shower and get dressed in the morning, your PC will probably attract some form of unwelcome advance.

Johannes Ullrich, chief technology officer at the Internet Storm Center, says the situation is so bad that a newly connected PC won’t have time to download all the Windows patches needed to make it secure before malicious software has found and infected it. The time to attack is even shorter for PCs on high-speed university networks and cable or DSL services. Hackers specifically target these addresses–much the way car thieves target Honda Accords–for their high bandwidth and always-on nature. It’s a digital catch-22. The better your connection, the bigger your risk.

Fired Up

Alas, it seems that too few people have well-meaning–if overly inquisitive–friends like Rolf. Alan Paller, director of research for The SANS Institute, an organization dedicated to Internet security issues, says most home users don’t have any firewall protection in place. That leaves connected PCs exposed to all manner of intrusion and attack.

The good news for cable and DSL customers is that firewalls are cheaper to buy and easier to use than ever. And adoption is picking up, according to forecasts by In-Stat/MDR, a market research firm. Sales of consumer firewalls are expected to rise from $455 million in 2003 to $1.8 billion in 2007, in part because firewall functions are being built into all sorts of consumer network gear.

“I don’t even think there are any routers that don’t have basic firewall protection,” says Ullrich.

Firewalls actually come in two distinct flavors: software applications that run in the background, and hardware devices that plug in between your modem and one or more PCs. Both types hide your PC’s presence from other systems, prevent unauthorized access from external sources, and keep tabs on network traffic across the firewall.

While software applications can be less expensive–Microsoft has improved the firewall software in Windows XP (newsweb sites) Service Pack 2, and both ZoneAlarm and Sygate Personal Firewall are free for download–a hardware firewall usually does a better job for broadband users. (For more on software firewalls, see the accompanying story “Internal Defense.”)

“Users really like them because they are simpler to use than software firewalls, and they don’t have any [performance] impact on their computer,” Ullrich says. “The other advantage of a hardware firewall is if you happen to install some sort of malware on your system, it cannot take out your firewall. However, malware frequently disables antivirus checkers and software firewalls.”

If you’re networked, you probably haven’t bought a separate hardware firewall box. Rather, your wireless access point or network router that links multiple PCs can have firewall capability conveniently included. The $85 Netgear WGT624 108Mbps Wireless Firewall Router is a high-speed 802.11g Wi-Fi access point, router, and firewall that offers excellent protection against and tracking of external threats. Similar Wi-Fi products include the $85 D-Link DI-624 and the $70 to $80 Linksys WRT54G.

In the wired arena, firewall-capable routers include the Netgear FVS318NA VPN Firewall router with eight-port switch, about $100, and the Linksys BEFSX41 Instant Broadband EtherFast Cable/DSL Firewall Router, about $70, which provides four ethernet ports.

Matt Neely, a computer security expert for a major financial firm, says you can find bare-bones firewall devices for even less. “You can get a decent one on sale for 10 or 20 bucks,” says Neely. “They make a great gift. I give them out like candy on the holidays.”

What They Do, What They Don’t

Don’t make the mistake of buying a firewall and thinking your security problems are solved. Firewalls may be great at stopping unwanted intrusions, but they often do little or nothing to detect virus-laden e-mails or stop intrusive adware and spyware. You’ll want separate antivirus and spyware checkers to stymie these threats. What’s more, hardware firewalls usually won’t manage outbound traffic, which means a piece of spyware can freely send data from your PC to a server on the Internet.

So what do hardware firewalls do exactly? More than anything, they stymie inquisitive software that pings, sniffs, and queries IP addresses in the hopes of finding a wide-open system. To do this, hardware firewalls employ numerous functions. Among them:

Network address translation: Every system on the Internet needs an IP address–like a phone number for computers–which is used to forge links with other systems across the network. NAT foils unauthorized connections by giving PCs behind the firewall a set of private addresses, while presenting to the world a single, public address. The switcheroo makes it difficult for others to reach through the firewall to an individual PC.

Port management: By default, most hardware firewalls close unsolicited access to all ports (akin to doors in a hallway) on your connected PC. So if a piece of software locks onto your IP address and tries to form a connection with TCP port 80 (used for Web connections) or TCP port 25 (used for outbound e-mail), the firewall would ignore the request. As far as the inquiring software can tell, there is simply nothing there. By the same token, firewalls can let you open specific ports (an action known as port forwarding), so a multiplayer game can link up with other systems across the Internet or a Web camera can send a video stream to view on the Internet.

Stateful packet inspection: An important security feature, SPI digs deep into the packets used to encapsulate data traversing the network. The result: A firewall can do more than simply prohibit packets from a specific source and take action based on the content or behavior of packets. For instance, an SPI firewall can tell if an incoming packet was unsolicited (and therefore, unwanted) or if it arrived in response to a request from the local network (in which case it would be allowed through).

Virtual private networking: A method for establishing encrypted, point-to-point connections across the Internet, VPNs are widely used among businesses for giving remote employees access to local networks. The problem is, a good firewall will block the encrypted connection between the remote device and the local VPN software. Firewalls with VPN support can pass through these encrypted links.

Activity logging and alerts: One area where hardware firewalls can vary greatly is in their ability to track, record, and report the activity fielded by the device. If you need finely detailed information about network activity, make sure to check reviews for products that offer the most comprehensive and useable activity logging and alerting features.

Content and URL filtering: Firewalls can also offer higher-level features–for instance, blocking access to URLs with a specified string of letters in their URL (think “XXX”) or to any sites that fall outside of a list of accepted Web domain names.

PC security expert Neely suggests pairing a hardware firewall with a free software firewall application, such as ZoneLabs’ ZoneAlarm. Software firewalls can detect which applications are trying to send data over the Internet and prompt users to allow or disallow the activity. So when a previously unknown program asks for Internet access, you can dig down and see if that application might actually be spyware. Adjustable alert levels mean you can flag every access for review or simply allow all traffic through by default. Also, hardware firewalls can’t plug into analog modems, which means a software firewall is the best option for most dial-up Internet users.

The good news is, firewalls really work. I tested my setup (a D-Link DI-624 wireless router) using the ShieldsUp port test service at Steve Gibson’s Web site. I clicked the All Service Ports button, and the remote server performed a comprehensive scan of all the ports at my IP address. The scan took just over a minute and revealed that all of my ports–with one exception–had been stealthed. That is, my firewall had rendered them invisible, so that any computer trying to open ports on my machine’s IP address would get no reply. Port 113 on my system was marked as closed, meaning a remote machine would know a live system is out there, but it would be unable to gain entry.

So will all users someday have PCs protected by firewalls? If Scott Rolf has his way, absolutely.

“I preach it so loudly that most of them already have a firewall, and if they don’t I’ve given them ZoneAlarm.”

http://story.news.yahoo.com/news?tmpl=story&u=/ttpcworld/20040826/tc_techtues_pcworld/117557&cid=1740&ncid=1729

Virus targets 64-bit Windows

March 8, 2008 – 3:36 PM

Virus writers have unleashed the first program that infects 64-bit Windows files, antivirus firm Symantec said Monday.

The virus, dubbed W64.Shruggle by Symantec, seems mainly to be an experiment to test the concept of a 64-bit infecter and is not actively spread, said Alfred Huger, senior director of security at Symantec.

“The most interesting thing about this is that virus writers are already developing for the 64-bit platform,” he said.

Symantec got a copy of the virus from an antivirus newsgroup the company monitors, Huger said. The virus, even if released on the Internet, would not spread, he added, because the Windows software that the program exploits has not yet been released by Microsoft. Some developers are trying out the 64-bit extensions for Windows, but the software is still being tested. The virus will not run on 32-bit versions of Windows, such as Windows 2000 and Windows XP, owned by the vast majority of Microsoft users.

“This is for the future, when this stuff comes out of beta,” Huger said.

That a virus for 64-bit Windows has been developed so early is somewhat ironic, since 64-bit processors such as AMD’s Opteron have specific features to boost the security of Windows PCs. That protection is targeted at worms and other attacks that, unlike e-mail viruses, are triggered without having to trick users.

While the digital pest is little threat, it does indicate that virus writers are thinking ahead. Such “proof of concept” programs tend to be aimed at identifying vulnerabilities, not exploiting them. Other recent viruses targeted at new platforms include two programs that aimed to infect the Symbian and Windows CE operating systems used by many smart phones.

“They prove that there is a viable threat,” Huger said.

http://news.com.com/Virus%20targets%2064-bit%20Windows/2100-1002_3-5320803.html

Does RAM Latency Matter?

March 8, 2008 – 3:35 PM

System memory is often the forgotten cousin among components when you’re building a new PC. A lot of PC builders just buy whatever’s out there, as long as it works in their systems. Some enthusiasts take the opposite route. They get expensive ultra-high-frequency or low-latency memory, hoping it will give them a big performance boost. Most major memory manufacturers now offer special low-latency memory. Kingston has a low-latency line of their HyperX DDR400 RAM. Crucial offers a high-performance line called Ballistix. OCZ Technologies has sold specialized low-latency RAM for a long time. And an “LL” designation shows up in Corsair’s XMS memory line to indicate this characteristic.

You can pay from 30 to 100 percent more for these low-latency offerings, but are they worth the extra money? We examine the effects of low-latency memory on two high-end systems to determine its value to PC builders.

http://www.extremetech.com/article2/0,1558,1637763,00.asp

Keylogging Trojans Spreading Via Email

March 8, 2008 – 3:34 PM

A very nasty trend is developing in the world of malware. At risk is your credit card number, social security number and, indeed, your entire identity.

Criminals are distributing spam emails which purport to link to details of a fictitious credit card order. If someone clicks that link and is running a Windows operating system that has not been patched recently, the page linked in the email will install a trojan onto the PC. The trojan acts as a keylogger, making a log of every key pressed on the keyboard. Someone could log into the trojan and retrieve the log. From that log, the attacker could discover passwords, account numbers and any number of other personal details.

By now, many internet users know better than to fall for so-called “phishing” scams. A phishing scam attempts to trick a victim into providing account numbers and passwords by having them log into an account at what appears to be their bank. In fact, the phisher’s site usually is a mock-up that looks identical to the bank but has no other relationship to it.

This new scam doesn’t require even that much effort. While many people would not be fooled by a phishing attempt, plenty of people would at least click the link to see the details of the fictitious order. If nothing else, it may appear to be an honest mistake made by a legitimate company. If your computer has not been patched for security flaws, simply loading the page is all that is required to install this keylogging trojan. Unfortunately, even being up-to-date on security patches may not be enough as there are plenty of unfixed bugs in Windows. To learn how to protect yourself against this sort of auto-installing malware, read my article on how to prevent a browser hijacking (mirror).

http://www.spywareinfo.net/aug18,2004#trojan

E-mail viruses getting smarter

March 8, 2008 – 3:33 PM

Computer viruses spread by e-mail are growing more sophisticated as virus writers and spammers are thought to be joining forces in an effort to make smarter bugs, a computer security group said Tuesday.

New York-based MessageLabs, which scans client e-mails for viruses to block, said it picked apart some 5.6 billion e-mails from January to June this year and found one in 12 contained some sort of virus that penetrated firewalls meant to block them.

MessageLabs typically scans about 50 million customer e-mails daily, and its customers include major government and corporate entities from the British government to The Bank Of New York and Japanese technology giant Fujitsu.

While the number of e-mails sent globally was not covered by the study, the problem of computer viruses can be massive. They can overload computers with messages, automatically reboot systems and sometimes disable them.

In August last year, the MSBlast worm spread rapidly around the world, infecting some 230,000 to 300,000 computers, based on estimates from sources ranging from U.S.-based Symantec to Moscow’s Kaspersky Labs.

Soon after, a worm called Sobig.F raced around the globe crashing e-mail networks. At that time, America Online said it blocked 23.2 million copies of Sobig.F, and MessageLabs said about one in 17 e-mails were infected by the virus.

A separate MessageLabs study in the first six months of 2003 showed that one in 208 e-mails contained a virus, up from one in 392 for the first six months of 2002.

MessageLabs said it believes the biggest e-mail security threat during the first half of 2004 was closer cooperation between virus writers and spammers, writers of unsolicited messages that often advertise products or get people to spend money.

The reason the two groups are getting together is profit, MessageLabs has learned through monitoring chat rooms to infiltrate the secretive world of virus writers and spammers.

With the recent proliferation of software blocking spam, the spammers are paying virus writers to create viruses that attach to their e-mails and circumvent the spam blockers.

MessageLabs said its employees who monitor chat rooms have learned that virus writers and spam writers are increasingly exchanging messages about joining ranks.

“There is little or no monetary profit to be gained from simply distributing viruses, but when you combine the capabilities of a virus and the profit that can be earned from spam, suddenly you have an altogether more materialistic proposition,” MessageLabs said in its report.

MessageLabs said its belief about the increasing cooperation was based both on its research through its clients and on industry research.

http://news.com.com/E-mail+viruses+getting+smarter/2100-7349_3-5314020.html