Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Windows XP SP2s Firewall Will Be in Your Face

    Written by

    Larry Seltzer
    Published December 18, 2003
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      As we reported recently, Microsoft just released a document going into more detail about the features expected in the upcoming Service Pack 2 for Windows XP. The company on Thursday released a beta of SP2 and will ship for real well into 2004. SP2 is basically about security enhancements to Windows, such as the improved Internet Connection Firewall (ICF).

      The information in this document is important and in all likelihood reflects the way things will turn out. But everyone should recognize that this document is a beta document for an almost-beta set of programs, and we have to assume there will be differences as the tests of SP2 proceed. Future changes will be reported at a particular MSDN link: The Microsoft Security Developer Center.

      In a previous column, I mentioned that the Internet Connection Firewall will be turned on by default under SP2. Ports not actually being used will be shut by default.

      In addition, both RPC and DCOM have been restructured to diminish the possibility of attack and to let the administrator control access rights. Microsoft frequently points out that users with ICF enabled were not vulnerable to Blaster.

      The new ICF can be enabled and disabled on a per-interface basis. For instance, you might leave it off for the Ethernet connection, but enable it for your wireless network. You can also make global changes across all interfaces. Through a new UI, command line programs, or programmatically, you can open static ports and perform other configurations, such as basic ICMP options. Logging has been improved to include dropped packets and successful connections.

      Beyond just opening a port, you can also restrict its traffic to particular subnets. This feature will be employed by default in some cases, for instance for file sharing and UPnP, both of which will be restricted to the local subnet. This feature should block a lot of attacks that come through the average residential broadband connection. Still, it does leave open the possibility that an otherwise compromised system (for instance one infected with a Sobig-like worm) could compromise other systems on the local subnet. Still, its one more worthy tool under the belt.

      Next page: More New ICF Features.

      More New ICF Features

      …”>

      SP2s Internet Connection Firewall will include a new lockdown feature, tentatively called “Shielded Mode,” which blocks all unsolicited inbound traffic. In other words, you could get the data for a Web page in response to an HTTP request, but no incoming HTTP requests would be allowed. Turning something like this on clearly will stop some programs from running, but its meant for times when you suspect there have been compromises on the network and you need to deal with them, not as a normal mode of operation.

      There will be a new ICF Permissions List to which an administrator may add a trusted application. When an application on this list needs to open a port, ICF will open it automatically.

      In earlier versions, apps had to call APIs to open the ports. When the application closes, Windows closes the port, relieving the application of the need to do so. Using the Permissions list means that the application need not be run in a security context sufficient to open a port, i.e. with the administrator. The application can run with relatively-low privileges.

      If a computer is joined to a domain, you can set up more than one ICF profile for it, with different sets of restrictions. The settings for when youre inside the domain might be more permissive, on the assumption that the network is protected; and when youre not on the domain, such as when youre on the road dialing into the Internet, the policy could be more restrictive.

      Incidentally, the standard ICF is IPv4 only; Microsofts IPv6 stack comes with an ICF of its own in the Windows XP Advanced Networking Pack. That ICF was always on by default.

      At boot time, prior to SP2, there is a gap between when the network has started and when ICF begins effective filtering, which creates a window of vulnerability. SP2 adds a new feature called boot-time policy to perform filtering from the earliest points. The system can still perform DNS and DHCP queries and communicate with a domain controller, but other operations are restricted. If ICF is disabled, so is boot-time policy, but it cannot be configured.

      Why, you might ask, didnt Microsoft do all this to begin with?

      The reason is that turning on a stateful inspection firewall causes some applications to break, and thats something Microsoft has always worked hard to avoid.

      In the document, Microsoft is pretty open with the fact that there will be application problems in the default configuration of SP2. This means that there will be problems with Windows that didnt occur in the past. The world has changed.

      At the same time, some folks might say that the world changed long ago where it comes to security, and Microsoft didnt change fast enough. Theyd have a fair point.

      Version 1 of ICF was little more than an item on a feature chart for Windows. Sure, they had the firewall in there because security is important and Microsoft needed to give everyone with Windows some way to protect themselves. But they couldnt bring themselves to go into the deep end of security and make the tough decisions that will put a real barrier against attacks, which at the same time would also increase the security burden on Microsoft.

      Lets hope Microsoft will take up that burden by helping customers to work within restricted environments and not to toss protections aside when they become inconvenient.

      Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983.

      More from Larry Seltzer

      Larry Seltzer
      Larry Seltzer
      Larry Seltzer has been writing software for and English about computers ever since—,much to his own amazement— He was one of the authors of NPL and NPL-R, fourth-generation languages for microcomputers by the now-defunct DeskTop Software Corporation. (Larry is sad to find absolutely no hits on any of these +products on Google.) His work at Desktop Software included programming the UCSD p-System, a virtual machine-based operating system with portable binaries that pre-dated Java by more than 10 years.For several years, he wrote corporate software for Mathematica Policy Research (they're still in business!) and Chase Econometrics (not so lucky) before being forcibly thrown into the consulting market. He bummed around the Philadelphia consulting and contract-programming scenes for a year or two before taking a job at NSTL (National Software Testing Labs) developing product tests and managing contract testing for the computer industry, governments and publication.In 1991 Larry moved to Massachusetts to become Technical Director of PC Week Labs (now eWeek Labs). He moved within Ziff Davis to New York in 1994 to run testing at Windows Sources. In 1995, he became Technical Director for Internet product testing at PC Magazine and stayed there till 1998.Since then, he has been writing for numerous other publications, including Fortune Small Business, Windows 2000 Magazine (now Windows and .NET Magazine), ZDNet and Sam Whitmore's Media Survey.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.