I have issues between Comodo Firewall and an HP C5180 network printer. I would appreciate an expert second opinion. Issue summary:
- UDP Port Scan and DOS Attacks
- Excessive chatter on port 161
- Weird stuff on port 427
- Consequences of OLE Automation confusion
- system.exe tries nbname lookup on pop3 server
We have a small local area network with a population of PCs and users of various ages and abilities. Internet access is through a Netgear DG824Gv2 router. The router protects us against external attacks so our main interest in a Personal Firewall is to control/stop applications getting out without our knowledge/consent. Comodo has an excellent reputation in this regard so a couple of months ago we switched to it.
This was fine until we got the new printer. We have tried the HP printer s/w on two PCs so far. Both are running Windows 2000 Profession SP4 with up-to-date security patches etc. Comodo is the latest 2.4.18.184.
- UDP Port Scan and DOS Attacks
It seems the printer scans the PCs every six minutes. Increasing the UDP Flood threshold to 160 packets / second avoids DOS alerts. The incidence UDP Port Scan alert is also reduced. We’ve blocked outgoing connections while booting.
The alerts now only occur when the user logs in or the PC comes out of hibernation etc. Even with the Port Scan probing rate set to the maximum of 500 ports / second we can’t eliminate these alerts.
It looks like there is some start-up race condition that Comodo loses. Is there anything further we can do to avoid these alerts ?
- Excessive chatter on port 161
It seems the PC uses UDP port 161 on the printer for bi-directional communication. This isn’t needed for printing but is for scanning and device control such as checking ink levels.
We are astounded to observe that the HP s/w on the PC is continuous polling the printer. The s/w successively establishes short lived connections on ports 1000 through 4999 on a cycle of roughly 10 minutes.
We can stop the chatter by stopping the PML service. This isn’t Comodo’s fault but it is hardly convenient.
The Connections window in Comodo does not handle this very well. Connections are coming and going so fast that we can’t even estimate how many are active at any one time. The window update chews up a significant proportion of CPU.
- Weird Stuff on Port 427
UDP port 427 seems to be used by a Network Device Rediscovery Service. The HP s/w that handles this is hpqnrs08.exe. It needs both UDP Out and UDP In.
In addition to hpqnrs08.exe, Comodo reports that spoolsv.exe also uses port 427 to talk to the printer. We wonder how and why this is.
If we turn the printer off, the PC gets no response to its polls and so it tries an Internet address instead. Comodo reports both hpqnrs08.exe and spoolsv.exe sending UDP packets to 224.0.1.60:427 - an IANA mcast-net address.
We have defined our LAN as a trusted network and are prepared to give pretty much any program access to the LAN but not to the Internet proper. We now think Comodo does not actually support this idea very well.
Are we correct in deducing that once Comodo has blocked an attempt by some program (spoolsv.exe) to access the Internet (224.0.1.60:427 UDP out) it blocks all network access to and from the program (192.168.0.254:427 UDP in) ?
Are we correct in thinking the only way to unblock hpqnrs08.exe or spoolsv.exe again is to reboot the PC ? Once blocked we get four alerts per minute. This soon makes the Logs window awkward to use (we’ve had Comodo crash while trying to scroll down to the bottom of the log). A filter on the logs would be nice - one that ignored all repeats so we could more easily find the alert that was the origin of the blockage.
To work round these problems, we added rules allowing hpqnrs08.exe and spoolsv.exe access to any IP address on port 427. For good measure, we then blocked this traffic in the Netgear router. We are disconcerted to find the Netgear routing isn’t logging any blocked traffic. Is it that 224.0.1.60:427 isn’t a real IP address at all so the router does something special with it ?
- Consequences of OLE Automation Confusion
It would seem (from browsing the Comodo forums) that Comodo incorrectly reports programs trying to use OLE Automation to access the network indirectly.
We have found that the inbound traffic on port 427, where hpqnrs08.exe is acting as a server, leads to an OLE Automation alert for practically any program we run on the PC, including those we know damn well don’t use the network.
These alerts are crying wolf - we tend to just allow the traffic without paying much attention to precisely what we are allowing.
We think we’ve had both Internet browser and e-mail client blocked because of this. Killing the program and restarting seems to workaround the problem but this isn’t satisfactory for background programs that naive users don’t even know are there.
If Comodo claims avgcc is using OLE Automation to access the Internet through the svchost as parent of hpqnrs08 and the access is automatically denied after 120 seconds while the user is on a caffiene maintenance break, which of avgcc, svchost and hpqnrs08 are thereafter denied network access ?
If the user sees the alert and allows the traffic, the checking of the remember-this-setting box appears to have no effect. Is this observation correct ?
- system.exe tries nbname lookup on old ISP’s pop3 server
Since adding the printer to the LAN we have twice has a PC drop off the LAN completely after Comodo has blocked all network access to system.exe.
On the second occasion we found system.exe had tried to access the Internet while we had only given it permission to access the LAN. It had tried to access port 137, which is nbname and sounds a reasonable thing for system.exe to do. However the Internet address was that of the pop3 server of an old ISP that we still check because occasionally we get messages sent to the old e-mail address.
This is system.exe with parent system.exe and no OLE Automation funny business so it looks pretty suspicious to us but we wonder if Comodo isn’t mistaken.