Microsoft Spin on Windows Firewall

In case you’ve never seen it, here’s Microsoft spin (published in TechNet Magaine as “Deconstructing Common Security Myths”) on why it doesn’t matter that Windows Firewall doesn’t filter outbound connections:

[b]Myth: Host-Based Firewalls Must Filter Outbound Traffic to be Safe.[/b] Speaking of host firewalls, why is there so much noise about outbound filtering? Think for a moment about how ordinary users would interact with a piece of software that bugged them every time a program on their computer wanted to communicate with the Internet. What would such a dialog box look like? "The program NotAVirus.exe wants to communicate on port 34235/tcp to address 207.46.225.60 on port 2325/tcp. Do you want to permit this?" Ugh! How would your grandmother answer that dialog box? Thing is, your grandmother just got an e-mail with an attachment that promises some rather sexy naked dancing pigs. Then this crazy dialog box appears. We promise: when the decision is between being secure and watching some naked dancing pigs, the naked dancing pigs win every time. The fact is, despite everyone’s best efforts, outbound filtering is simply ignored by most users. They just don’t know how to answer the question. So why bother with it? Outbound filtering is too easy to bypass, too. No self-respecting worm these days will try to communicate by opening its own socket in the stack. Rather, it’ll simply wait for the user to open a Web browser, then hijack that connection. You’ve already given the browser permission to communicate, and the firewall has no idea that a worm has injected traffic into the browser’s stream. Outbound filtering is only useful on computers that are already infected. And in that case, it’s too late—the damage is done. If instead you do the right things to ensure that your computers remain free of infection, outbound filtering does nothing for you other than, perhaps, to give you a false sense of being more secure. Which, in our opinion, is worse than having no security at all.

Is it any wonder that security is so bad in Microsoft products?

Wow. I can’t believe MS really wrote this…

(L)

False Sense?

Microsoft… Stick with the OS!

Cheers,
Josh

“Outbound filtering is too easy to bypass, too. No self-respecting worm these days will try to communicate by opening its own socket in the stack. Rather, it’ll simply wait for the user to open a Web browser, then hijack that connection. You’ve already given the browser permission to communicate, and the firewall has no idea that a worm has injected traffic into the browser’s stream.”

There’s something called HIPS and it will warn you about the worm accessing your browser… 88)
I guess they’re still thinking in the AV era?


“Outbound filtering is only useful on computers that are already infected. And in that case, it’s too late—the damage is done. If instead you do the right things to ensure that your computers remain free of infection, outbound filtering does nothing for you other than, perhaps, to give you a false sense of being more secure.
Which, in our opinion, is worse than having no security at all.”

People make mistakes. So, they infect their PC by mistake. Outbound protection will sure stop the infection from getting worse than it already is. Maybe to the point where you can actually control it.

They obviously haven’t researched more and don’t realize that Firewalls have evolved now. Like Comodo Firewall went from a Traditional Firewall, To a Firewall/HIPS Product. I agree that a using just a Firewall and no HIPS is not a good idea in our days, But their statement is wrong and maybe someone could suggest Comodo to them?

Cheers,
Josh

“What would such a dialog box look like? “The program NotAVirus.exe wants to communicate on port 34235/tcp to address 207.46.225.60 on port 2325/tcp. Do you want to permit this?””

Like this maybe? Not so bad. ;D

[attachment deleted by admin]

To be fair, that article was from May 2006 - nearly 3 years ago, but is indicative of their attitude towards security at that poinbt in time.

I think that even MS are more aware of the need for outbound security now.

Cheers,
Ewen :slight_smile:

Based on what? Windows Live Firewall continues to be one of the lowest rated of all firewalls.

John

Firewall Challenge, Results and comments

Comodo Internet Security, rated 90%, Level 10+, Very good

Windows Live OneCare, rated 5%, Level 1, Not recommended
One of the worst products tested, March 2008
(Windows Firewall {XP} wasn’t even tested)

“So, what does it mean if the product fails even the most basic tests
of our challenge? It means that it is unable to do what its vendor
claims it can. Such a product can hardly protect you against the
mentioned threats.”

ROFL. I did say they were more aware. I didn’t say they had done anything about it. :wink:

At least they have stopped publishing drivel of the sort you linked to.

LOL. They undoubtedly have new drivel to publish.

Cheers,
Ewen :slight_smile:

  • The drivel I quoted is still published on the Microsoft webpile.
  • If Microsoft really is more aware, then continuing to deliver such a terrible firewall is even more inexcusable.
  • I see no evidence that Microsoft really is more aware.

Microsoft Security is an oxymoron.

“Friends don’t let friends use Microsoft security products.”

Not only outbound security. MS is replacing OneCare with its free 2009 “Morro”…the quality of it…we’ll see…but at least they’re taking a step in the right direction. :slight_smile:

Mystifying average users and grandmothers appear to be a widespread fallacy :frowning:

Thing is, your grandmother just got an e-mail with an attachment that promises some rather sexy naked dancing pigs. Then this crazy dialog box appears. We promise: when the decision is between being secure and watching some naked dancing pigs, the naked dancing pigs win every time. The fact is, despite everyone’s best efforts, outbound filtering is simply ignored by most users. They just don’t know how to answer the question. So why bother with it?

I was able to find only another related bibliographic reference in support of the above mentioned quote. :a0

On a related account it looks like vista firewall implemented an allow by default outbound filtering ???

We have discovered that though Vista's outbound firewall is 'on' by default, all outbound connects that do not match a rule are allowed. In the default configuration, there are no outbound 'block' rules, only allow rules. In other words, even though [the Windows Firewall outbound protection is] on, it is not doing anything."

An oxymoron indeed :frowning:

On the other hand the recent introduction of Vista UAC would be somewhat among the lines of bug them every time although before final release there was an effort to reduce the nagging. :-X

In 2006 this article was viable , but not now because Firewalls become much more modern and harder to bypass ( HIPS , Self Defense …) remember Bifrost firewall bypasser system ? , with Hips it simply doesnt work but it is very effective.

I doubt it, based on both past performance and current products.

GiantAnti-Spyware was a very good product, so when Microsoft acquired Giant, I had high hopes when it morphed into Windows Defender, but Microsoft ■■■■■■■ up the interface, and it’s now so poor at detection that I no longer recommend it.

I likewise had high hope for Windows Live OneCare, got involved as a beta tester, but eventually gave up on it in disgust. (The on-line Safety Scanner is based on the same technology.)

Twice burned, thrice shy – I’ll be surprised if the upcoming free Microsoft anti-virus turns out to be a high-grade product – I’d have to see glowing reports over time before I would even take the time to try it.

John

I don’t think that article was valid even back in 2006 (if ever) – there were a number of better software firewalls available that included outbound filtering, which had long since been established as a valid approach to security.

That article reflected Microsoft’s ■■■■-poor attitude and performance on security, an attitude and performance that hasn’t really changed all that much (witness Windows Live OneCare) notwithstanding all its subsequent spin on security.

“A leopard cannot change its spots.”

John

I completely understand the article. I know people who still say, “I have anti-virus, and so I’m safe.” Despite the “enlightened” microsoft bashing, newbies CLICK ON EVERYTHING! A pure firewall with outbound connection protection needs a good HIPS that most people won’t, or don’t want to learn how to use. Then you get lead to behaviour based blockers like threatfire which can be good for a newbie.

The upcoming Threatcast and expanded whitelist will help the newbies out a lot. :slight_smile:

this is exactly the reason i will finally be able to recommend CIS to “newbies” when it finally comes out of BETA that is.
(V)

Ya, and maybe one day they will actually get it right.