Hi
For several weeks I took unusual risks, culminating in Firewall upgrade Firewall from 3.0.14.xxx to 3.0.22.349 (which went better than I feared).
Meanwhile the world did not stand still, and my ISP (TalkTalk) swapped out BT hardware from the local phone exchange, and installed their own. For the previous year I was on a standard fixed 2.2 Mbps service, but with the new hardware I got a new VARIABLE service of “MAX ADSL with Inter-Ratio Profile”, which upon power-up (before “connection” and submission of password etc.) determines how small a share I will get of the country’s bandwidth - so now my download is any one of several discrete values between 1728 and 2016 Kbps, and upload between 128 and 384 Kbps.
I noticed strange messages from 255.255.255.255., which I had never seen before. I did not know if this was due to the new equipment and service from TalkTalk, or if it was due to the Firewall upgrade, but I was too busy with risky experiments and decided to investigate later.
Last weekend I restored the system image captured before I took risks, eliminating any damage I may have caused, and then replaced the restored 3.0.14.xxx with 3.0.22.349. I then started investigating; I added logging to IP Out to see if 255.255.255.255 was banging away of its own accord, or if it was answering something, and saw that svchost was initiating the transactions which surprised me, and really horrified me when I realised this appeared to be sending a 255.255.255.255 broadcast around the world.
I do not know why source 255.255.255.255 has recently appeared, and as a matter of interest would appreciate advice upon why, e.g. :-
- New hardware or Software at TalkTalk;
- New upgrade of Firewall which detects/logs what previously went unseen;
- svchost has detected a change of internet/protection, and is trying to beat the system;
- something else.
Question 5)
Why is the first action “Asked” in the image Fire_Events_StartUp.gif ? It never asked me. On every occasion, immediately the modem told the ISP my password and the connection was established, the very first message is IGMP, and the action was always logged as “Asked”, but it never asked me, there was never any pop-up, and the internet responses started within 1 second. This seems to me an error in the log. Also, where is the Asked rule - the ONLY ask I can see in Application rules is the final rule for the email client.
I have now temporarily enhanced my stealth by new Network Global Rules (Global_Rules_Query.gif) pending any suggestions and advice. I am pleased to say that almost nothing is knocking at my door so far after 5 hours with two dynamic IP addresses - but I have had some good days in the past.
I am also pleased to say that with tighter stealth I can still receive emails, and still purchase from Play.com on a secured link, and if you can read this I can still post on my favourite forum !!!
My changes to the Stealth Wizard rules are :-
To exclude 255.255.255.255 from what is allowed by IP Out from Any etc.
To change the final Block and Log from IP IN to IP In/Out so the above IP Out 255.255.255.255 is caught
To preceed everything with a Block and Log of Multicast 224.0.0.22
To add a ICMP PORT UNREACHABLE Rule. As it stands this is redundant.
Question 6)
If ICMP PORT UNREACHABLE is changed to ALLOW, would it improve operation for a solitary P.C. that is not behind a corporate firewall, and would it be a useful enhancement to the Stealth Wizard “FRAGMENTATION NEEDED”. I ask this because I found these quotes on
http://en.wikipedia.org/wiki/PMTU_blackhole#Problems_with_PMTUD which states :-
‘Many “security” devices incorrectly block all ICMP messages’ (including FRAGMENTATION) and
“However, in order for TCP to operate most efficiently, ICMP unreachables (type 3) should be permitted.”
Question 7)
Is it safe to ALLOW ICMP PORT UNREACHABLE ? I ask because somewhere (so many Google links, so little time) I read that a message from 255.255.255.255 could be via an anonymous proxy server, which suggests to me a hacker covering his tracks.
I am very surprised to observe that now I have tighter stealth, svchost has a tantrum. It still sends a solitary UDP from port 138 to port 138 at 720 Second intervals, just like it used to,
BUT the 1932 Second interval sequence has changed,
instead of sending a solitary Port 138 to Port 138 message that caused 3 or 4 “Destination Unreachable” internet responses which the Firewall blocked,
svchost now reacts to the IP OUT block by repeating itself 6 times at 2 Second intervals, and to double its chances every other attempt is instead from Port 137 to Port 137.
This unexpected reaction of 6 attempts instead of 1 tells me that svchost is reacting to the change of protection, which is why I posed (3) above as a possibility.
HOW does svchost know. Now the Firewall blocks its IP OUT, svchost makes 6 desperate attempts at getting a response, but when the inbound response was blocked just once was enough - did svchost have a secret backdoor though which it could see the answer that should have been blocked ?
I hope there is a mundane explanation, but would appreciate expert assurance - hence my provocative title.
Regards
Alan
[attachment deleted by admin]