By Seán Boran
This article is a part of a series of tests on Personal Firewalls / Intrusions Detection Systems. Refer to 1 for an introduction to Personal Firewalls, risks, tips on 'hardening' your Windows even without a firewall, a feature comparison and a summary of analyses.
This report focuses on VirusMD
Key criteria in choosing a Personal Firewall are:
How did we test firewall/intrusion detection effectiveness?
a) Ping and accessing shares to and from the test host.
b) A powerful, well known 'remote control' trojan (Netbus Pro v2.1) 3 was installed on the system on a non standard port (to make detection more difficult), the Netbus server started and attempts made to connect from a remote system.
c) The telnet server was enabled on the Win2k test PC. It was then attempted to connect to this service remotely. It is not recommended that you enable telnet, we do this purely for testing purposes.
d) An nmap 2 scan was run against each product (see below), to check that incoming ports were effectively blocked. With no firewall installed, the test PC (Win2k sp1) presented nmap (nmap -sT -P0 -O IP_ADDR) with the following ports:
Port State Protocol Service
7/tcp open echo
9/tcp open discard
13/tcp open daytime
17/tcp open qotd
19/tcp open chargen
23/tcp open telnet
135/tcp open loc-srv
139/tcp open netbios-ssn
445/tcp open microsoft-ds
1025/tcp open listen
No OS matches for host
VirusMD Firewall 4 v1.1 tested on Win2k SP1.
Cost is not listed on the website, but it is available for download.
None of our tests were blocked or logged.
Perhaps useful to the advanced user who just wants to protect a small number of ports.
Difficult to recommend.
Seán Boran is an IT security consultant based in Switzerland and the author of the online IT Security Cookbook.
© Copyright 2000, Seán Boran, All Rights Reserved Last Update: 10 octobre, 2001 |