Comodo Firewall

Comodo Firewall

am 03.07.2007 00:18:45 von shaun_j_thomas

Hi all,
I recently read several reports on Comodo Firewall and looked into the
company behind the product (security firm who sale security certicates
and other services). However, apart from reading reports made by
others is it possible to monitor the effectiveness of the firewall
and, if so, how could this be done?

Any advice would be most welcome.

ST.

Re: Comodo Firewall

am 03.07.2007 01:05:17 von Kayman

wrote in message
news:1183414725.345810.27160@c77g2000hse.googlegroups.com...
> Hi all,
> I recently read several reports on Comodo Firewall and looked into the
> company behind the product (security firm who sale security certicates
> and other services). However, apart from reading reports made by others...

In short, what do the reports from 'others' reveal?

> ...is it possible to monitor the effectiveness of the firewall
> and, if so, how could this be done?

It can't be done, 3rd party PFW's aren't effective, they give you a wrong
sense of security.

> Any advice would be most welcome.

Steer away from 3rd party PFW's.

Re: Comodo Firewall

am 03.07.2007 02:55:25 von Sebastian Gottschalk

shaun_j_thomas@yahoo.co.uk wrote:

> Hi all,
> I recently read several reports on Comodo Firewall and looked into the
> company behind the product (security firm who sale security certicates
> and other services). However, apart from reading reports made by
> others is it possible to monitor the effectiveness of the firewall
> and, if so, how could this be done?


Trivial: take any advanced rootkit analysis tool that shows kernel hooks.
You'll find that, even when not installing the application control crap,
Comodo happily hooks NtCreateFile, NtRegistryOpen, NtCreateProcess,
NtOpenProcess and some more, as well as various user-mode routines. Yikes,
such a shitload should never be installed on any production machine!

Re: Comodo Firewall

am 03.07.2007 04:15:16 von unknown

Post removed (X-No-Archive: yes)

Re: Comodo Firewall

am 03.07.2007 04:36:50 von Sebastian Gottschalk

Bart Bailey wrote:

> In Message-ID:<5etl46F39hs4uU1@mid.dfncis.de> posted on Tue, 03 Jul 2007
> 02:55:25 +0200, Sebastian G. wrote: Begin
>
>> Trivial: take any advanced rootkit analysis tool that shows kernel hooks.
>
> Suggestion: IceSword - http://tinyurl.com/2f9osa

IceSword only shows hooks created via modified SSDT entries (which is
sufficient in this case). But generally I'd recommend System Virginity
Verifier, which also checks for binary patches and some kernel objects.

(Before you ask: Yes, I've seen some "security" software patching function
prologues.)