I recently started installing home networks for a living, but I've
been doing PC tech work on-and-off for years. A colleague and I were
debating the value of installing a firewall (either hardware or
software) for a customer who had Win98, Trend Micro PC-Cillin
Anti-Virus (seems to run faster on old systems than Norton AV), and
Spy Sweeper. The user regularly installs Win98 updates, and both
PC-Cillin and Spy Sweeper were set to auto-scan more than once per
week and auto-update. A cable modem was recently directly connected
to the PC for broadband. While in that customer's home, we noticed
that the browser had only 3 sites in its history, and along with the
user's comments, it seemed that it was used for a limited number of
safe online activities at reputable sites, none of which involve
banking or other security-critical tasks. Let's say that the
anti-virus and anti-spyware were strong enough to keep those problems
out, even though we all know that's not entirely true. The user has
no other computers and doesn't plan to expand. What risks are posed
to a this type of user by not having a firewall?
It's my understanding that intruders would normally start with a port
scan to reveal vulnerable PCs, and that the user's PC would pop up,
since it has nothing to stealth the ports. Then the intruder would
use a known Win98 vulnerability to install a rootkit to keep access.
I've heard that Win98 is inherently insecure (more so than XP), but I
don't know whether Windows Updates will take care of that. I also
don't know how an intruder could install a rootkit without setting off
the A/V or A/S software. Also, can an intruder remotely undermine A/V
and A/S without putting detectable malware on the system? I presume
that files can be seen remotely without any uploads, but since most of
the software (except the security software) is old, CD keys that might
lie in the registry would be of little value to the attacker. The
processor is old, so it would also be of little value. It seems that
the most valuable part of the machine would be the broadband
connection, possibly for DDoS attacks. But that all involves putting
detectable .EXEs on the user's drive, doesn't it? Again, I realize
that many attackers might use recent viruses or spyware to avoid A/V
and A/S detection, but let's assume that the A/V and A/S are doing a
good job. I've never worn a black hat, so I've only read about what's
going on from vague technology articles. I don't want to
over-recommend to price-conscious customers, but I don't want to leave
them vulnerable either. Please explain the risks in terms of how an
attacker avoids the A/V and A/S and what bad things they have the
capability to do. A couple decent examples are enough. If you
explain how the A/V or A/S is disabled, then no further explanation is
necessary, since the possibilities for "bad things" become endless.
Please provide your search strategy or Web links to backup your
answer. |
Request for Question Clarification by
sublime1-ga
on
07 Nov 2005 18:47 PST
fungicord...
From what you've described, this particular user is not at
great risk, since he does limited "surfing". I haven't seen
a lot in the current news about port hacking as a method
currently in vogue, as it were. Most trojans these days
seem to come from hidden downloads initiated on malicious
sites, which a sparse surfer is unlikely to come across,
and yes, these would leave visible evidence, though I'd
recommend the use of the free WinPatrol program to alert
the user of their inclusion in the Startup areas for
Windows, and an AV program which scans for such hidden
downloads as file activity, such as AntiVir's Guard
component.
Since both AntiVir and WinPatrol, as well as a slew of
very effective anti-spyware programs, are free, I can't
think of a good reason not to install them on any and
every broadband connection, including a system which
is only used for minimal surfing. ZoneAlarm provides
a free firewall which will stealth all the ports, as
well, so why not include that as a standard install?
A previous answer I provided details how to configure
a "bulletproof" system using freeware. I would consider
it standard procedure for configuring broadband systems.
It contains links to all the freeware I've mentioned
here, and more:
http://answers.google.com/answers/threadview?id=568868
Let me know if this satisfies your interest in asking
this question, or what else you need to know...
sublime1-ga
|
Clarification of Question by
fungicord-ga
on
07 Nov 2005 20:12 PST
sublime-ga:
I would agree that port hacking has become less common, likely because
of the prevalence of hardware firewalls in routers. It's also less
common because infecting people with spyware and viruses has become so
easy. On average, users have become more mainstream and less savvy
about their PCs. But I'm not sure the old-school techniques went
away. After installing Norton Personal Firewall on my system, I
received a couple port scan detections over the course of a year--but
then I use my system a lot. Plenty of sites still mention port scans
and firewalls though. Symantec's free Security Check
http://security.symantec.com/default.asp?productid=symhome&langid=ie&venid=sym
offers a port scan as part of its routine. You mention Shields Up! at
https://www.grc.com/x/ne.dll?bh0bkyd2 in your "Assess your
vulnerability" section, which performs a port scan. That site also
lists common port scanners in its section title "Am I really in
danger?" http://www.grc.com/su-danger.htm. Is it paranoia? Maybe,
but an article with nothing to sell at
http://www.pcworld.com/news/article/0,aid,117557,00.asp is less than a
year old and says, in part, "...most home users don't have any
firewall protection in place. That leaves connected PCs exposed to all
manner of intrusion and attack." I'm trying to clarify "all manner" a
little bit.
As for installing extra free A/V programs, A/S programs, and software
firewalls, the disadvantage is that it all consumes system resources
(software firewalls are notorious for adding latency to Internet
connections). And when a Win98 machine has only 64MB or 128MB of RAM,
it needs all of the system resources it can get.
Sublime, if you can justify your answer with stat pages showing the
declining prevalence of port scanning or articles showing that
firewalls are overkill on non-networked PCs, or that show a firewall's
advantages as being limited to protection against people gaining
access to pull sensitive data or install viruses or spyware, you can
post it as an official answer.
|
Request for Question Clarification by
sublime1-ga
on
07 Nov 2005 22:16 PST
fungicord...
While I do believe that port-scanning is less popular these
days, and I'm also inclined to believe that businesses are
much more likely to be targeted than home users, I don't
mean to suggest that it doesn't pose enough of a threat to
take preventive measures. As I said, given the availability
of free and effective software firewalls such as ZoneAlarm,
I would consider it standard procedure to install a firewall
of some sort. The biggest threat facing a home user is
probably that of having their system become a middleman in
a DOS attack against a website by way of a planted trojan.
As for system resources, especially with Windows 98, I would
make it a standard recommendation to increase the RAM to 256MB.
RAM for computers which are likely to be running Windows 98
should be available pretty cheaply. Additionally, Windows 98
has a little-known setting which allows the OS to make better
use of available RAM: Right-click on the My Computer icon,
select Properties, go to the Performance tab, click on File
System under the Advanced Settings heading, and on the Hard
Disk tab, select Network Server as the typical role of this
computer. This and other tips can be seen on this page from
SpecterWeb:
http://specterweb.com/tips2.htm
With an increase in RAM, installing a free software firewall
such as ZoneAlarm is no big deal. If, however, the correct
RAM is difficult to come by, or, for some reason, the cost
is prohibitive, I would recommend using a hardware firewall
in the form of the Asante Router I recommended in the answer
I referred you to. This costs approximately $30, and may be
cheaper than additional RAM. In addition, it doesn't drain
system resources as a software firewall can do.
Let me know where this takes you...
sublime1-ga
|
Clarification of Question by
fungicord-ga
on
08 Nov 2005 23:42 PST
sublime,
I'm afraid we're veering into a discussion of how to upgrade a PC to
make it secure on the Net. That's not really my question.
Jibranilyas's comment started to move in the right direction, but the
only link he provided discussed what happens when a totally
unprotected PC gets infected with Sasser and other worms, which would
be squashed by the A/V. For an example of the type of information I'm
looking for, please consider something a knowledgeable friend said to
me regarding this issue:
A Win98 PC cannot be protected by a hardware firewall. Win98 does not
care about ports and is flawed such that the router must guess when a
port is needed for incoming traffic. For example, when a user opens
their email and it auto-checks every few minutes, Win98 will not tell
the router when incoming communications are expected and when to shut
down. So as long as Outlook periodically checks for mail, that port
will be open to every worm that scans the email port, and browsers
will leave port 80 open, etc. XP is port-aware, and when the user
isn't actively sending or receiving, the port is closed. A PC will
get infected using Win98. It's a lost cause.
This is in stark contrast to the comments from both you and
Jibranilyas with regard to port security. My friend could be wrong
though; I'm not sure. If you could verify his comments with Web
resources, that would qualify as a 5-star answer, even though it
doesn't address the original question. If you can refute his comments
with links, that would also qualify.
But otherwise, the question is still about the risks to a user's PC
from sources other than viruses and spyware when a firewall is not
installed. Alternately, the question is about the risks to a user's
PC from viruses and spyware that successfully go undetected by an
up-to-date A/V and A/S setup, or that undermine those tools without
removal (not including brand new viruses or spyware). Links or search
strategies are needed.
|
Request for Question Clarification by
sublime1-ga
on
09 Nov 2005 01:10 PST
I took the heart of your voluminous question to be:
"I don't want to over-recommend to price-conscious customers,
but I don't want to leave them vulnerable either."
Both jibranilyas-ga and I have provided you cost-effective
solutions to address this concern.
You seem to be trying to obtain proof that it's a "lost
cause", though to what end, I cannot comprehend.
I no longer have a Windows 98 installation with which
to experiment, so I can't currently prove to myself
that installing ZoneAlarm or a hardware firewall will
produce a stealth condition for all ports at Steve
Gibson's ShieldsUp! site, but I remember that being
the case when I used Windows 98.
You're interested in the risks of not having a firewall,
which is certainly researchable, but I'm personally more
interested in educating people that there's simply no
reason to be without a firewall.
Perhaps another researcher will take on your cause...
sublime1-ga
|
Clarification of Question by
fungicord-ga
on
09 Nov 2005 19:56 PST
frde-ga,
Your comment, "Due to weaknesses in MS's design, (about which Steve Gibson waxes
lyrical), software outside the network can probe ports on the
machine(s) and MAKE THE MACHINE DO WHAT IT TELLS IT TO DO."
This is what interests me. Clearly a machine that can be controlled
from afar has a serious weakness. When you say this, I think of all
of the MS Critical Security patches that have said something along the
line of, "...allowing complete control the machine, including
execution of code." I think of remote login capabilities, raising a
rogue user account to admin status, moving files, concatenating text
files in EXEs, etc. Are these the things that are made possible by a
lack of a firewall? The part I don't understand in the whole security
chain is how visibly closed ports or open ports create a
vulnerability. I'm certainly very much in favor of firewalls myself.
But this question was posted in an effort to educate myself a little
more as to exactly what leverage a missing firewall gives to an
intruder. I know that when an FTP client tries to connect to a
machine that is also running an FTP client, it simply doesn't connect,
regardless of an open port. If I open an email client and type a
user's home IP address in the POP3 server address, it doesn't connect
even if the user is checking their mail (assuming it's a regular user
with no servers running). I believe that the port exposure poses a
threat, but I don't know what threat. Frde, please expand on the
notion of probing ports for external control that I quoted from you.
|