Comodo Firewall Wishlist v5[Closed]

https://forums.comodo.com/comodo_firewall/comodo_firewall_3_windows_vista_and_x64_compatibility_current_release_date-t6927.0.html

The BETA version of CFP V3 is out. Release date for the producti9on version hasn’t been announced, but shouldn’t be too far off.

Ewen :slight_smile:

I love the V3 Beta, what i would want to see after using the beta version for over 6 days is that there should be a config option to switch between novice and expert configurations in the GUI.

Maybe an option to look up the defense+ details for an application on a common internet server automatically and decide the course of action rather than force user intervention. (on demand through user config maybe)

You might want to consider a look up to find the URL name rather than have the IP and port as requested by the application… on user demand Comodo could get ther info and provide ip/url info through the browser.

Well… these are just suggestions… you know best if that is feasible or not in V3 RC.

But the V3 Beta has really come out well… Great going!

trying v3 beta at the moment, and I´d really like to see port 993 (imaps) predefined in My Port Sets under Pop3/smtp and thus under email client predefined rules.
Had to configure it manually.
I know that it´s not too common, but these are those little things which make people choose different firewalls.

Hope that someone from comodo staff will hear my little request.

Well at least some form of update to the application whitelist every week/month or something?

I think it was Melih who stated that will that will come with cpf 3. The reason why they haven’t for 2.4.x is because they’ve been busy on version 3 (obviously).

was you referring to my post?

Yes :stuck_out_tongue:

After many years with Sygate Personal FW, I’m on my second day with Comodo and so far its basically fine. Hopefully, the multiple pop ups that come up every time I open my email app or AdMuncher is engaged will stop soon.

I write with a couple of suggestions:

  1. The email receipt that comes after registering with User Support includes the user’s full password. That’s really quite a shocking practice, especially for a company focused on internet security.

  2. It would be helpful if the check box on the permission pop ups were moved to the right over by the arrows, to save time and body parts. In fact, even better would be making it so the user could employ a combination of keystroke, tab and Enter to complete each popup.

Welcome to the forum, romath.

If I remember correctly, AdMuncher uses internal connections called loopback. Just disable the checking option and they’ll disappear. Security > Advanced > Miscellaneous > Configure > Enable both skip loopback checks. One thing to be careful of is that AdMuncher almost acts like a proxy server. If it is a proxy server then you might want to keep the default options for security. Check out CFP’s help file for more info.

Thanks. I think your first recollection is correct. At least, AdM is not set up as a proxy by the user, vs. something like Proxomitron, where one has to enter the IP address in the browser’s preferences. Here’s the closest thing I could find on the AdM site:

“Why does my firewall say Ad Muncher is making “server” and outbound connections?
This is just how Ad Muncher filters your browser’s transfers; when your browser tries to connect to a web server, it is instead connected to the local Ad Muncher program (hence why it is creating a listening (“server”) connection). Ad Muncher then connects out to the original target of the browser, which accounts for the outbound connections.”

Later followup: Comodo brings up a series of AdMuncher-related warnings every so often, usually about seven. I click the box and arrow for the first two or three, and the rest disappear. This has happened a few times today.

Is there any IDS? I wish to have an IDS in CFP like some other Firewalls have. Better to have both signature and non-sig based IDS( if I am correct in understanding IDS).

[attachment deleted by admin]

Not to be critical but the NIPS in Comodo is fairly primitive compared to Kerio’s NIPS.
The NIPS in Kerio not only detects and prevent most Port and Network scans but it can also detect malware code in the form of trojan attacks and vulnerability attacks, not to mention that you can download and add your own rules from Snort if you want to…
That being said, I would love Comodo to include this kind of NIPS on futurre versions. (:LGH)

I apologize for not going thru the whole 17 pages of this thread. Here are my 2 cents

  1. Intrusion Prevention System (IPS) features:
    Expand the “Protocol Analysis” feature to allow for signature based detections, preferably Snort style format.
    Why? If I have open ports for a web server , I need to be able to block certain malformed http requests or attack attempts. Also, I am running a bit-torrent client, and IMHO, it is only a matter of time before somebody comes up with an exploit for that protocol. (Yes, I am that paranoid. And yes, I have Snort running on my pc chewing up 250MB of memory).
    Even without any open ports, there is still, I believe, a good case to be made for signature based IPS. There are other personal firewalls which implement this feature.
    This could be expanded to include signatures to detect and block network worms from trusted zones for example.

2. Ability to close active connections.
Not sure if it is implemented in CFP 3 (CFP 3 crashes when viewing active connections bug)
Also more info on the connection, e.g, uptime, data transferred, status, etc …

3. Improved logging
I don’t know where to start:
view logs in real time
sort by ip, port, application, etc…
an option to include packet headers in the logs or even a full packet dump
log to syslog or mysql
export to text, csv or comma separated

4. Traffic analysis report
web sites visited, how much BT data transferred, etc …

This is trully a wonderfull feature to have!!!

@MasterTB

The NIPS in Kerio not only detects and prevent most Port and Network scans but it can also detect malware code in the form of trojan attacks and vulnerability attacks, not to mention that you can download and add your own rules from Snort if you want to.... That being said, I would love Comodo to include this kind of NIPS on futurre versions.

Amen to that, Kerio (R.I.P) was fun while it lasted, from the days of the best firewall ever made: Tiny Personal Firewall 2.1.5 to Kerio 4.x where you can add snort rules by editing the .rlk files in the config directory. Unfortunately it is all but dead. Hopefully Comodo can fill the void

Don’t know if its possible to be honest but something that tells you when a website is attempting to send you to web sites via redirects, as I have found certain websites in history that i have never been to at all

  1. A simple check box to unconditionally allow an application and any associated activity.

  2. A simple way to enter allowed MAC addresses, and all activity that originates from them.

100% Agree. I need to know what the rules are for.

Same was suggested here and here (point 3 by memo1337, reply #70), after doing a quick search.

Version 3, which is still in BETA, allows you to give a uswer defined name to each and every rule you create.

Ewen :slight_smile: