Comodo Firewall Wishlist v5[Closed]

Sorry for every bullet point already mentioned in the (veeeery) long thread before…

  1. A “game mode”. A popup or something like that, which pops up in front of the game instead staying in the background. It’s much easier then to allow/disallow specific traffic/programs/components.

  2. A possibility to lock out specific components from the component list. For example, some copyprotections (BF2) use randomly generated child-programs every time the grogram is started, that component appears as new in the component list, filling it up. That makes it impossible to ever put the component list from “learning mode” to “on”.

  3. A “re-apply-button” for network rules. As everybody knows, sometimes the rules are not fully applied and some programs simply don’t work; after double-clicking a network rule and simply clicking the ok-button everythings works fine. A “re-apply-button” would shorten this.

Hi Everyone,

I’m new to Comodo Personal Firewall, which I just downloaded yesterday. So far, it’s a nice application, and it could be even much better with some minor programming efforts. I’m a former Sygate Personal Firewall user and I must say, there are some nice features from Sygate that must be included in Comodo. Here is my wish-list for Comodo:

  1. Optional and adjustable Logs for “History”, “Rules Modiified”, “Security Alerts”, and more. The logs should be able to be modified by size in bytes, fully viewable at any time, capturing all activity, and the “History Log” should include every connection with all details (In/Out Port, IP address, etc). There should be an export to html option as well, and the logs should be accessible in two ways: from Comodo itself, or from the file which is saved in it’s directory. An option to ‘clear’ the log is also essential.

  2. The ability to include all combinations of Port details in one single advanced rule. Here is an example:

Suppose I wish to Block the following Incoming TCP Ports:

53,1024-2050,5000,40000-5000

In Sygate, this was done by simply typing in the above, without having to create two or more separate rules. In Comodo, this can’t be done in one rule. If I’m wrong, please correct me. Thanks.

2) The ability to include all combinations of Port details in one single advanced rule. Here is an example:

Suppose I wish to Block the following Incoming TCP Ports:

53,1024-2050,5000,40000-5000

In Sygate, this was done by simply typing in the above, without having to create two or more separate rules. In Comodo, this can’t be done in one rule. If I’m wrong, please correct me.

In Comodo, you don’t have to do this in one (or any number) rule. There are NO incoming connections allowed by the default Network Monitor rules (see that bottom Block & Log IP In/Out Any/Any rule?); if you want to Allow something Inbound access, you have to create a rule to do so, above that bottom Block rule.

In transitioning from Sygate, it may help you to have a look at some of the tutorials here:
https://forums.comodo.com/index.php/topic,6167.0.html especially those discussing how CFP works.

Hope that helps,

LM

LM,

I realize that all incoming connections are already blocked by Comodo using that default “Block IP Incoming/Outgoing” rule. I was only using ‘incoming’ as an example to illustrate my point being, in Comodo, it is not possible to create my “Port” example in one rule. Two (or more) rules must be used, whereas in Sygate, this can be accomplished in one rule.

Example: Block the following Incoming, or outgoing, TCP or UDP Ports:

53,1024-2050,5000,40000-50000

With Comodo, the following three steps (or rules) are requried:

  1. “Set of Ports” box checked: 53,5000
  2. “A Port Range” box checked: Start Port: 1024 End Port: 2050
  3. “A Port Range” box checked: Start Port: 40000 End Port: 50000

With Sygate, this is accomplished using one step (or rule):

  1. 53,1024-2050,5000,40000-50000

So, the issue I am stressing is convenience and efficiency. It would be nice for Comdo, already an excellent product, to include this possibility.

Thanks for the reply and useful link.

Regards,

Eugene

G’day,

This can be done in V3 by creating a port set (which can be almost any combination of ports) and then referencing the port set in a rule.

Cheers,
Ewen :slight_smile:

Wow, fantastic! When was V3 released? I’m asking because I just recently downloaded the latest version (2.4.18.184) only 2 days ago from Comodo’s website and this is the version I am now using. Is V3 currently available on the standard link that Comodo provides on their website, or is there another source for obtaining it? Link please? :slight_smile: Thanks for the update Ewen!

Best Regards,

Eugene

Eugene,

v3 is still in Beta testing; it’s not available from the main website. It is available here in the forums… https://forums.comodo.com/cfp_beta_corner/cfp_308214_beta_is_now_available_for_download-t11950.0.html

While this release doesn’t seem to be causing too many serious problems, it is still a Beta product, and cannot be recommended for use on a system where stability matters. If you choose to do so, it can only be at your own risk (make sure you have backups), and for the purpose of providing bug-finding feedback to help create a more stable, solid product.

Take a look at the Beta Corner to get an idea of what others are experiencing.

https://forums.comodo.com/cfp_beta_corner-b40.0/

LM

The thing I’d like to see is a plugin for Bluetack Internet Security Solutions’ (B.I.S.S. - http://www.bluetack.co.uk/ ) Block list for blocking masses of IP addresses. More can be found about their Blocklist Manager at Bluetack Internet Security Solutions

Alasdair.

A thing that i, and i think many more with me, would like to see is a simple way to allow the private network access smb-shares. A simple checkbox or something…
You can do it now, but theres so much klicketi-klicks!

(S)

Thank you LM!

Before I install it, there is one question. The size of the file went from 7.7MB (V2.4) to 17.5MB (V3). Is this due to mostly optional installations (plugins, other), or is it necessary to install the full 17.5MB? If a full install is required, then it is a bit surprising that an additional 10MB was needed to fine tune V2.4 to V3, adding the new features and improvements. What does this large increase in file size primarily consist of? Thanks again!

Regards,

Eugene

I think the majority of it goes to the full HIPS integration. As of this BETA, it’s not modular, although I think the final one will be. So at this point it’s all or nothing… :wink:

LM

Will:
DNS resolution in pop-up notifications.

also be in the V3 release? (sorry not to read all posts… it could be in there somewhere already)

I think making a dedicated page where people can see which wishes are already there and can vote on the wishes, would be very helpful to decide which wishes should get in a new release.

Ciao!

Ok, so I have some things to add and will post here instead of starting a new thread (if a mod wants to move my post from “Impressions <-> Suggestions…” (https://forums.comodo.com/feedbackcommentsannouncementsnews/impressions_suggestions-t12288.0.html) here I guess that would be helpful).

Before I make further suggestions, I have a suggestion for this wishlist. At ~19 pages long, it is somewhat ineffective. A sticky listing, each suggestion (not repeated) with comments from the developers on the status would be much more productive since there would be no duplicate posts and an easy overview for the designers. (hope this is not OT since this is a whishlist for the firewall not the wishlist…hmmmm)

//
// So, here some more findings/suggestions:
//

// There is a major security flaw with the firewall. When it starts, the system is not protected and there is no indication for the user. Seems like a design flaw since once the application is loaded, the services should be active?!

// Was thinking about the application security and wondered why there is no checksum file included so the integrity of the program can be checked?

// At times the program will ask for confirmation despite the fact that rules exist already

// The constant pop-ups are irritating and should allow detailed configuration instead of confirming each port. We could sacrifice the multiple messages for that since I see no benefit other than the user clicking one too many times allowing malware to connect

// Learning mode for the application monitor

// When a rule is modified/removed, the application list goes back to the top, it should stay at current position and only correct otherwise configuration become tedious at best…

// Log alert display is buggy since the summary page shows one high severity alert while the log contains multiple entries (it may refer to today but is misleading and wrong when looking at the log information for “today”)

// The “News” only lead to this forum. Don’t think I found a setting for an RSS feed, would be nice though (hint…)

// Just when I looked at the firewall to see if I forgot something, the slider was missing on the summary page, minimizing & maximizing seems to have restored it…Ok, it happened again…grrrrr…Just disappears for no reason…hmmm (XP/SP2)

// The tray icon should indicate firewall status, maybe color the border according to security setting (fade green to red)…Disabled firewall should warn

// Import function for rules created with other firewalls

// The component monitor should use a database with descriptions of known DLLs or at least highlighting them green (not too original, I know…)

Hope this is somewhat useful… :■■■■

G’day,

// There is a major security flaw with the firewall. When it starts, the system is not protected and there is no indication for the user. Seems like a design flaw since once the application is loaded, the services should be active?!

When the system is first booted, there are several kernel level components that are loaded well before the GUI is invoked, not the least of these is the stateful packet inspection engine (this is the guts of the firewall). Whether the services or the GUI is active yet or not is a moot point, as the SPI driver is active.

The above is valid for both V2 and V3 Beta.

Cheers,
Ewen :slight_smile:

I guess I am going to check one of these days whether it works or not (trust but verify). What I know for sure is that while Kerio uses services for the firewall, until the Kerio interface is loaded, the system is NOT protected. Maybe jumping to conclusions though right now I am busy with Comodo’s cryptographic verification system which causes a popup each time an application wants to connect to the same friggin port despite deleting previous rules (scared of ever updating IE), clicking ok with remember multiple times…ugh

I would really like to see a lightweight rule based comodo (:TNG)
I know it’s not for normal user, but having messed constantly with Kerio, Tiny, ipfw, and mikrotik has got me frustrated upon comodo. I don’t even know how to open a port from outside for specific interface :smiley: ipfw and mikrotik is strictly rule based, while kerio and tiny has capability to turn off its automatic detection and revert to my rules.

You can check sample script from here http://www.pcc-services.com/iptables.html

So, what I need just put a configuration script, and comodo runs it. That’s all. I don’t need any kind of interface. Notepad editing script will do for me (:WIN) Just give me the engine to run it (:AGL)

Haven’t tried v3 beta so I don’t know how this has changed from v2, and haven’t gone through all the suggestions here so I’m not completely sure if it’s already been suggested, but still my two cents…

A lot of beginner users seem to have problems with getting too many popups and they might end up changing to another more user-friendly (and crappier) firewall. (Case in mind.) I know there’s a set-and-forget tutorial in the FAQ but it would make sense that the beginner users should be the least likely to being forced to resort to support (forums), whereas the power users won’t have problems with doing research if they want to for greater security. But making a completely set-and-forget configuration as default doesn’t look like a good idea to me either.

I’d go for including a configuration wizard during the installation, it would ask the user how much annoyance (vs. security) he’s willing to accept, and it would consequently turn some settings on or off. If a beginner user feels a firewall is too annoying he’s more likely to uninstall it than to fiddle with the advanced options…
(:SAD)

Additional optional configuration wizzards could also be included for usual tasks such as opening ports for P2P clients etc., and all wizards should also be accessible at any time after the installation.

(:WIN)

I must agree with prd0…keep Version 3 of Comodo Firewall under 10mb file size, and make it lightweight with mostly advanced rules configuration, and not too ‘automatic’. Make the more elegant features ‘optional’ installments for those who wish to have them. As I said in my previous post, 17 mb is a large increase from what it was. Update the ‘help’ file with some useful tutorials.

Eugene

Additional optional configuration wizzards could also be included for usual tasks such as opening ports for P2P clients etc., and all wizards should also be accessible at any time after the installation.

i think that´s a superb suggestion, with the additon a wizard for smb-foldershare

(V)

I wish CFP allowed user modification of the the drives checked by KNown Apps checker. It only checks drive C:. Most of my software is on other drives because of the frequency of wibndows crashes.

macbeans