moz wrote:gstark wrote:breaching your firewall from within by sending out a signal on a port, and telling the firewall that it's ok to accept incoming packets on any particular port.
So they allow people to send packets to their computer. Gosh.
Now you're being obtuse.
When a packet is sent from a computer through a firewall to a remote host, even though you may have closed off a port for incoming packets, the fact that an outgoing packet has used that port is enough authority for most firewalls to then begin accepting incoming packets on that port. That original outgoing packet, from a PC within the domain, starts the chain.
That's how many DDOS attacks work, using compromised PCs. Your PC may be safe, but are you sure that every other computer that you permit to use your facilities is?
As for illegal content, at this stage there is little to no effective monitoring of that that I know of
That you know of.
Interesting qualification.
There have been several instances in Oz where sites have been closed, and a couple of prosecutions too.
In terms of copyright violations, they are going after those who serve data, rather than those who consume it. If that guy upstairs sets up a server issuing illegal music or movies, sy, that will be traceable back to your IP. Likewise if they're hosting something like kiddie porn.
Or even looking at it.
Whether your connection is full speed, dial-up, or anything in between is simply not relevant. Can you absolutely, unequivocably, without any shadow of a doubt tell us that there is nobody using your connection that is doing something illegal?
I certainly cannot for mine, and mine is reasonably locked down. If you think you can, then there's only one person that I think you're fooling.
- the legal attention has all been to stuff on hard disks,
When they look at your hard disk, it's already too late. They're looking at content and probable content sources in the first instance. If they see a significant body of copyright material coming from an IP address (or subnet) then they're going to be looking at that source and talking with the owner of that subnet.
If they're looking at your hard disk, then they've already taken court orders to your ISP because they've obtained your name and address from the ISP using those court orders. The fact that they have these court orders means they already have a large body of evidence that the court has accepted suggesting a problem with the IP address in question.
which means that at worst I'm up for the content of my firewall logs. Sure, if they really worked at it they might be able to incriminate me that way, but they'd be trying to get their signal through the huge number of illegal file-sharing PCs on the system.
Everything is always traceable to a pair of end-point IP addresses.
That you believe that you may be immune doesn't make it so. Sorry.
Even with the noise of file sharing PCs, they will still be able to identify servers because of the frequency with which some IP addresses will appear in various tyoes of transaction logs. Your firewall logs are irrelevant; they'll be looking at their own monitoring of the networks and perhaps your ISP logs.
When was the last time that your hardware firewall asked you for that permission?
It doesn't, but that's not what hardware firewalls are for. My machine has a software firewall for that.
Fine. But whom else uses your network? What is their security like? Are they running secure firewalls, in the same way that you are? If you don't know who those people are, how do you know what security levels they're running?
How up to date is their malware protection?
And are they only running the free version of the AV software that came with their PC? And which expired 18 months ago?
Your belief that their systems might be up to date and secure does not make that so, either.
Which was the point of my post.
So all the stuff about sending spam and viruses getting onto my copmuter through the firewall was just decoration? In Most ISPs (including Optus)
At no point did I say that you would get this stuff
through the firewall. Please go back to your original point, which was you seeing no problems with permitting yourself to open up your wireless LAN to all and sundry.
That means that anything hazardous will be coming from
within your subnet, not from outside.
As we have seen, if there is a stranger anywhere within your subnet who has a compromised system, depending upon the nature of compromises that are in place, there will be a risk to your system.
And no firewall will protect you against some of the issues that have been identified in Windows' vatious versions.
block mail relay ports and insist that you use their mail servers.
Yes, Optus does, and many others do.
And many others do not. None of the last four ISPs that I have used do this, and in fact I simply cannot use one that does, because I do run my own servers.
But mostly, they will only block a selective number of ports - those used by known server services: 80, 25, 21, 119, 110, etc.
Many other ports remain open. I was working at one office not so long ago that had their network locked down.
Very securely.
So they thought.
So sending spam is actually quite hard (viz, I can filter it by MAC without my flatmates noticing).
I could have from within this securely locked down site, had I so desired. I reckon I could from within an Optus site too. It's not exactly hard to breach most of these measures that are put in place.
Trying to serve illegal content through my firewall would be a touch tedious,
So yu'ree agreeing that it's not out of the question.
Then why are you arguing with me, when you accept that it's a posibility.
Being tedious is not something for you or me to judge: if somebody wants something badly enough, they will truly jump through hops to get it, and your value jusgement as to tediiousness is not relevant.
To date, almost all the users have not even tried to do anything naughty, they just play on the web like nice children. The occasional attempt to share files has only once made me ban the MAC. Of course, if they're a Mac user they will have changed it and come straight back on, but since they're no longer file sharing I don't care.
How do you know they're not filesharing?
How do you know what they're doing, without monitoring every packet they're seeing?