Vista Firewall to be Crippled 365
UltimaGuy writes "The firewall in Windows Vista will, by default, have half its protection turned off because that is what enterprise customers have requested, according to the software giant. The firewall will be set to only block incoming traffic even though it will be capable of blocking outgoing traffic. Microsoft also claims that configuring the Vista firewall to block outgoing connections from rogue applications and malware will require a varying degree of technical knowledge, depending on each user's security requirements."
So? (Score:5, Insightful)
Given the vast number of home users MS has, this would seem to make sense. Really, how many *average* home users know what ports their programs use? Further, how many of those customers will want to fight with their firewall to get things working before they get frustrated and just turn it off? Turning the firewall off is far worse than having a firewall that only blocks inbound connections.
I do hope that MS continues to allow you the ability to work with the firewall on an application level. It's much simpler to browse to "program xyz" and tell the firewall to allow whatever ports this program needs. Determining and then defining UPD vs TCP and ranges of ports is just not going to work for most non-technical people.
Lastly, I think the request of the larger corporate customers and government makes sense. They don't want to micro-manage their machines.
I don't understand the complaint here. MS is listening to their customers. Supposedly that is a good thing for a business to do, of course there is a limit. Secondly MS probably doesn't have a smoother way to make managing the firewall any easier than anyone else out there. It's a tough problem, especially for non-technical users.
Half So? (Score:5, Insightful)
But I have to ask, what is the point of Microsoft splitting Vista into however many different versions if not to have a granular response to problems like this? Many of XPs problems are related to its homogeneity...
Re:Half So? (Score:2)
I like the point you raise.
Re:Half So? (Score:2, Insightful)
So you mean, like, the firewall is actually doing its job?
Re:Half So? (Score:5, Insightful)
The GP doesn't indicate if that was the case or not, but I know that when I used ZoneAlarm, I never even once denied an application access.
I am willing to bet good money that in 90% of typical homes, the users accept everything. Or they deny one thing once which they should have accepted, which breaks some functionality. They then "learn the lesson" and accept everything from then on, including whatever malware they may have.
Come to think of it, I have never heard of a success story where someone got infected, but micromanaging the firewall prevented the infection from creating havoc. I'm sure they exist, but I doubt they are common.
Re:Half So? (Score:5, Insightful)
Prompts to ask whether certain traffic should be allowed are not are idiotic if the person you are asking doesn't know. Most users don't know, care, want to know, or wish to have to care what a UDP port is. You can call them "ignorant morons" for this if you like, they probably don't care waht you think of them either. Regardless, if ZoneAlarm derives it's "security" by asking such users to make technical security decisions, it's not adding anything. I've not used ZoneAlarm, but have used Norton. Because I have much more knowledge than most of their users would be expected to, I actually do know what the prompts were talking about. So I know for sure they weren't providing enough information to know whether to allow the traffic or not.
I could write you a program that pops up a prompt every 30 seconds or so. This propmt will say "Flang the Zip-Zop-zoodle?". If you click "OK", nothing will happen. If you click "Cancel" it will kill a randomly selected process (which could be malware after all). After the first day, do you think you'll hit "cancel" much? This script will add exactly as much value as the "security suites" I have seen.
ZoneAlarm fails horribly GUI-wise (Score:3, Informative)
The user cares and understands why ZoneAlarm is there: he does not want his system infected. The problem is that the user does n
Re:Half So? (Score:2, Interesting)
The point is to confuse customers and to unnecessarily inflate the price of the more "advanced" version... as if leaving out features actually saves Microsoft money in producing it.
Many of XPs problems are related to its homogeneity...
Exactly what I've been saying for years. We need to get more Windows distributions. Maybe a "Debian" version. A "RedH
Re:Half So? (Score:3, Insightful)
No, actually, the point is that you don't know the first thing about pricing, and, to quote a famous thinker "since when did ignorance become a point of view?"
The classic example of pricing schemse such as this is in pocket calculators where an entire line of calculators use the same chip and the only difference is the number
Re:So? (Score:3, Interesting)
Re:So? (Score:5, Insightful)
Re:So? (Score:3, Interesting)
They shouldn't need to. Their firewall software should do it for them. Currently, whenever my firewall sees an app try to use a closed port, it throws up a dialog telling me what app is trying to open what port, and asks me if I want to always allow it, deny it, or only allow it this one time. That's really very little hassle in getting things set up correctly.
Lastly, I think the request of the larger corporate customers and government
Re:So? (Score:2)
Including any relevent firewall rules. Quite possibly including preventing the end user from being able to change these rules at all.
This move does nothing for them when the first thing they do on receipt of the computer is wipe the drive and intall their in-house "flavor".
How many "enterprise cust
Re:So? (Score:2)
Agreed, and I hate Micro$loth. You could be like Norton/Mcaffee/ZoneAlarm etc. and make it such that your firewall is too stupid to understand that your WAN IP addy might change and simply block all traffic when DHCP refreshes(it happens so often that now the first things I teach my techs is how to disable them to show the customer they ARE connected and running and need to deal with the
Which MS OS? (Score:2)
What's going on?
Re:So? (Score:2)
That does seem possible; see this page [microsoft.com] for more detals on the Vista firewall (including screenshots). The configuration wizard lets you configure both inbound and outbound except
Re:So? (Score:5, Insightful)
Re:So? (Score:5, Interesting)
Re:So? (Score:5, Insightful)
Which is why the default configuration is so important. Let's put this in perspective shall we...
Enterprise company A wants outgoing connections open and have the resources to configure them.
Home customer B doesn't have a clue.
Microsoft's solution....
We go with A because they are paying more money than B not because it is the "right" thing to do.
B.
Re:So? (Score:2, Interesting)
Home Customer Y just wants their version of Vista to work, rather than deal with shit popping up when they try to access something on the Internet.
Enterprise Company Z wants their version of Vista to work also, even if it means having that version tailored to their specific needs.
Will both of these versions have the same settings? Who knows, lets wait and see when Vista comes out, since Microsoft seems to change their minds a lot. And lets be realistic, even if the
Re:So? (Score:5, Insightful)
There is no reason that you couldn't reverse your analogy...Be really restictive for home users, because enterprise users will have someone who is capable of opening the needed ports. Configuring a firewall is easy, if you have a baseline of technical knowledge.
I think the big reason why they left the restrictions low by default is not because they thought that enterprise users were too stupid to figure out how to change the settings, but because they thought home users were too stupid to change the settings. Think about it. Dad's Turbo Tax program won't e-file. Mom's "Sims II" won't autopatch. Juniors games won't play online. They'll be calling MS tech support every two days, and be mad as hell, forcing MS to "patch" the firewall down to somethign that won't piss off the average user.
Re:So? (Score:2)
I'm all about micro-managing my connections through a hardware firewall, but that seems pretty darn effective for everyone who doesn't care to read hardware manuals to send a picture to grandma. It's amazing how pissed off some
Re:So? (Score:4, Funny)
I'd rather screw someone my own age thank you.
Re:So? (Score:2)
Agreed. However, isn't it high time they learned? And who better to explain it to them than the "consumer-friendly" folks at Microsoft? Either that, or they sure better teach their consumers how NOT to end up with a zombie machine. It seems only fair that, one way or another, education should be part of the deal.
Re:So? (Score:3, Insightful)
Re:So? (Score:4, Insightful)
Re:So? (Score:3, Insightful)
Well of course they shouldn't have to.
Ideally the PC would be just like any other appliance. However, that "ideal" depends on your parents (and everybody else) receiving a built-in secure operating system with their PC. Therein lies the problem. Until Microsoft ships one of those, I'm s
Re:So? (Score:4, Insightful)
Re:So? (Score:2)
That may be true, but I for one don't mind if those people are forced to learn a little bit before putting a potential spam host on the internet. We don't accept the ignorance argument for allowing people to use public roads.
Granted a rouge system on the internet isn't capable of killing anyone; but the inconvience of having to read a dialog box and click a button to allow outbound connections for a particu
Re:So? (Score:5, Insightful)
Reality is if outbound connections are blocked they are just going to click Yes every time they are asked to allow a connection. This is exactly how ActiveX malware became so popular. All blocking outbound is going to do is create more problems for people like us when mom or grandma calls up because their new PC doesn't work. It won't stop botnets or any other malware.
Re:So? (Score:5, Insightful)
Re:So? (Score:3, Insightful)
in my experience, windows auto-update has solved more problems than anything else, and the rest came from the lack of unix-level file permissions. firewalls are (very) nice and all...but they're too easily toasted with email-borne viruses and the like, which would become the weapon of choice if better firewalls came into play. it was the soggy unupdated system pool and the "click here to hose your computer!" IE buttons that really caused the current mess, imho.
Re:So? (Score:3, Insightful)
That meme needs to die. NTFS has always had unix-level file permissions, plus ACLs and more. Windows ME was a long time ago. The problem is email clients that allow a user to execute an attached program or script with the same action that one uses to view a document, not anything to do with file permissions, or with the Windows OS.
Given that users are willing to extract an executable from a password-protected zip file and run it blindly, answeri
Re:So? (Score:4, Insightful)
1993 called [wikipedia.org], it wants its meme back.
(Ok, I'll grant you, the Win9x series was a joke, but it's dead now; *please* can we trash MS for things they're doing wrong now, rather than last decade?)
Re:So? (Score:3, Insightful)
They cannot modify firewall settings if they're running as regular user. If they're running as admin, then UAC will display a dialog box requesting permissions before modifying them. Either way is better than silent modifications possible as admin in XP SP2.
Naked... (Score:3, Insightful)
[yes] [no] [cryptic help page]
-M
Half its protections turned off? (Score:3, Insightful)
Blocking outbound by default is mostly going to protect the rest of the internet from your owned box spamming/ddosing/etc them. (I guess you're outbound connection could get hosed too).
On a side note, from TFA Yes MS, its hard to setup properly - thats why you have to have it turned on by default
At least it's better then Apple's Firewall [apple.com] (turned off by default, PITA to block outbound traffic).
Re:Half its protections turned off? (Score:3, Interesting)
get it? the 8-pending-connection limit is imo a much saner way to limit the damage a contaminated box can do.
Re:Half its protections turned off? (Score:2)
Re:Half its protections turned off? (Score:2)
On a side note, from TFA
Yes MS, its hard to setup properly - thats why you have to have it turned on by default
Except that your "average user" will then be trapped into allowing everything to send outbound traffic because of the constant and annoying interrupts. What it really n
Re:Half its protections turned off? (Score:2, Funny)
You could always block this traffic in the firewall.
Re:Half its protections turned off? (Score:2)
Good point. But knowing our "friends" at Redmond, they'd write it into the firewall to make sure you couldn't block it. Of course someone would find out, they'd sue, Microsoft would stall it in the courts for about 5 years before finally acquiescing, and by then it would become ubiquitous and no one would disable it voluntarily except geeks who don't trust MS.
Re:Half its protections turned off? (Score:2)
An outbound protection however has the ability to avoid malware / trojans most people are loading their computer with to "phone home". And once a connection is established, traffic can go both ways...
I now have an RSS feed to OSNews that it seems get the news b
Re:Half its protections turned off? (Score:2)
Doesn't matter since Apple laughs in the face of malware. Turning a firewall on would mean it expects fire.
Scripted Install (Score:5, Insightful)
Re:Scripted Install (Score:2, Insightful)
And lastly, in regard to the outbound blocking: Shouldn't a properly configured workstation have established user rights restrictions limiting the likelihood of rogue software installation either deliberately or clandestinely?
And...
Wait! Why would enterprise customers even care about the
Re:Scripted Install (Score:2)
The short answer is "no".
The long answer is that people typically take the base and try to tweak as few things as possible to get it to work. It makes better business sense to ship with the icons in their default place, for example, than waste time and money to decide to individually place each one.
Most corporations keep the Windows firewall off anyway, so this isn't a big change.
Re:Scripted Install (Score:2)
Cuts Both Ways (Score:5, Funny)
So, if Microsoft listens to their customers, they make slashdotters angry but if they block bittorrent, they make slashdotters angry.
I think that I'm starting to get this...
Re:Cuts Both Ways (Score:2)
M$ does not exist to make
Re:Cuts Both Ways (Score:5, Funny)
Re:Cuts Both Ways (Score:2)
The difference is that your average BitTorrent user can configure a firewall. Your average Windows user *can't*.
Re:Cuts Both Ways (Score:5, Insightful)
This however is a very sensible move.
Honestly, I have the knowledge to deal with my own firewall rules, hell, I just the other day had to wrestle iptables and the nfs deamons to play nice so my kickstart server would work right.
I still think outbound filtering is a royal pain in my ass. I mean sure its pretty easy to remember to open incomming ports but... outgoing? Now every time I use a new peice of software, I have to figure out what ports it wants to connect out to?
Ugh. Thats fine for a server, and... in fact, I use it on my colo box. However... on a desktop, where a user expects to pick up a new peice of software and play with it on a fairly regular basis?
No fucking way.
Good job microsoft. You made a very sensible decision. Now if they would just come over to the free software movement and GPL windows, that would be awesome.
-Steve
MS is right. (Score:5, Funny)
Atleast the incoming is blocked like it should be, it would be nice if there was a way to flash bright red so obnoxiously, and make the user think for a second. Like how firefox makes you wait before clicking yes. Possibly by moving the yes button around and saying "YOU PROBABLY DONT WANT TO ALLOW THIS" and then repeat. "ARE YOU ABSOLUTELY POSITIVE"
then deny it regardless of what the user says
Re:MS is right. (Score:2)
Re:MS is right. (Score:2)
How about if a rootkit was included to over ride certain checks etc. It gets to be a real problem very quickly.
Crippled is an exaggeration (Score:5, Insightful)
Re:Crippled is an exaggeration (Score:2)
Entreprise customers? (Score:5, Insightful)
Huh? (Score:2)
The lead says that "enterprise customers" want outbound opened up by default.
The rest of the story justifies the decision based on allowing individuals access to the outside world without having to figure out outbound firewall config.
Ny guess: they screwed up the user interface and cross-coupled certain permissions so that the most common configuration requires entering the more advanced configuration panes, rather than the selection of a cartoon icon on the basic configuration p
Aren't there 7 versions of Vista? (Score:5, Insightful)
its target market, rather than letting the desires of the Fortune 500 wag my
mother's machine in a less than completely safe way? Given the world's recent
experience with various forms of malware, erring on the side of safety certainly seems to be justified.
In all honesty... (Score:2, Insightful)
Re:In all honesty... (Score:2)
Re:In all honesty... (Score:4, Insightful)
The point is that there is no one solution to security. You need to have a layered approach (i.e. hardware, software, policies, etc.). Placing a router in front of you and the Internet isn't enough. Corporate networks do have a lot more in the way of the user and the Internet. Thus, the reason they don't want a lot of ports being blocked from the user desktop perspective; they've already got ACL's, firewalls, etc. to block what they want blocked.
Turning this feature on will cause a firestorm of help desk tickets at the corporate level and cause your phone and mine to ring off the hook with calls from clueless relatives trying to figure out why they can't go online. IMHO I think it is a good decision for the right reasons.
Re:In all honesty... (Score:2)
If they don't understand how to set up a firewall properly, they probably don't know how to set up PPPOE on their router without even being given the proper information by their ISP.
Re:In all honesty... (Score:2)
The sad truth is that they don't, hence the plethora of botnets run by scumbags. The sheeple tend to plug their PCs right into their cable/dsl modems. Many (though not all) of the broadband providers are guilty of facilitating this by handing out cheap modems that don't double as firewall/routers.
Re:In all honesty... (Score:3, Interesting)
Oh, I don't know, because 85% of all system intrusions are inside jobs? Heck with the Internet, protect me from my company's network...
Why? (Score:5, Insightful)
One would expect that Entreprise customers could set this anyway they want via Group Policy
Re:Why? (Score:5, Informative)
You'd be surprised at the number of companies that are still running Win2K domain servers, Novell or NT Domains for their core. I've run into several, including quite a few who still have Win98 boxes on the network as single-purpose terminals.
Workstations migrate in to an environment much quicker than servers do, so the companies see WinXP much faster than they can upgrade to Win2003.
The majority of companies that I have talked to about Windows Firewall have it disabled totally. They have real firewalls at the gateways and per-machine firewalls can be a totaly nightmare in a Windows environment.
-Charles
crippled? (Score:5, Insightful)
Seriously, though... blocking incoming traffic is more than half that battle. It is my understanding that blocking outgoing traffic is mainly useful after your system has been compromised.
You know a software is off to a bad start (Score:3, Funny)
Inbound is the important one. (Score:5, Insightful)
Who here, honestly blocks outgoing traffic too on their home networks? I could, but I don't bother. Why? I run a tight enough ship to know that there won't be weird traffic going out, and I can't be bothered with the extra admin needed to keep everything happy and working.
Re:Inbound is the important one. (Score:2)
Then why the all the versions? (Score:5, Interesting)
But to not a have a 1 button "Protect me on the internets" button for grandma? That's MS effectively selling off its consumer base to big corporations at their request.
=Tod
Re:Then why the all the versions? (Score:2)
It might well be the business version which wants a very restricted set of services on by default...
Maybe whilst they are at it Microsoft could think of things like only turning on the wireless service
Makes sense (Score:5, Insightful)
2) The biggest culprit for applications that call home is Microsoft, and the Windows firewall doesn't block Microsoft applications anyway. (The biggest reason I have a 3rd-party firewall is to block outgoing connections from IE, Explorer, and Windows Media player)
3) Serious attacks come from incoming connections (or Trojans, which a traditional firewall can't stop anyway.) so this doesn't matter for them.
The only perfect firewall (Score:2)
Now if there was only a firewall plugin to block outbound apostrophes in "it's".
This will be fine (Score:3, Insightful)
Already have firewalls (Score:2, Insightful)
Eh? how is "normal"=="crippled"? (Score:5, Insightful)
what's wrong with INBOUND:BLOCK ALL - OUTBOUND:ALLOW ALL?
every NAT/router/firewall/shiny magic internet thing i;ve seen, oh, in the last 7 eons of mankind's glorious history is set up just so.
Re:Eh? how is "normal"=="crippled"? (Score:2)
Re:Eh? how is "normal"=="crippled"? (Score:2)
I've supplied firewall/routers (SOHO type) to people preconfigured to only allow the usual suspects out and deny all other packets. (Out tends to be web,mail,ftp and whatever else is requested, everything inbound is blocked as standard and some can be opened). I also put full instructions (with screenshot examples) to open up other protocols and a copy of the custom config file on CD together with the router...
Home Admin (Score:2, Interesting)
Real? (Score:2)
A non-issue (or at least it should be so) (Score:3, Insightful)
On a technical side however, I don't see why this is a yes-or-no proposition. What would prevent the installer to ask a question like: "Do you want the firewall to block outgoing traffic? Yes/No" (with some blurb explaining to non-geeks why they might/might not need it, what implications it might have, and how to change one's decision later on).
Half crippled by choice (Score:2, Funny)
Doesn't matter (Score:3, Informative)
Second, I HOPE AND PRAY that they FINALLY add a "delay" to the "allow application to open connection" button. There's almost no current malware that does NOT create a thread to check in 5 ms intervals whether one of those allow-request windows is open and answer it in the prefered way for the malware before opening a connection, to make sure they get permissions.
If this loophole isn't closed, any MS-firewall in learning mode is as good as no firewall at all. Actually it would be worse, because it gives you a false sense of security where there is none.
Vapor Firewall (Score:2, Funny)
at least the "object file system" promised in Cairo will be there. won't it?
I also hear they will be shipping the stability promised in Window 95
time to start lining up at Fry's
No firewall changes in patches!! (Score:2)
This is probably for their OEM customers... (Score:5, Insightful)
OEM customers (e.g., Dell, HP, Gateway, etc) often ship their PCs with dozens of what I call "shovel-ware" (trial versions of useless software that OEMs pile on heaps on the desktop). Often this shovel-ware likes to call home occasionally to notify you of "new updates available for download" and other such nonsense.
I'm sure it's very embarrasing (and costly) to the OEMs when they get support calls from their own customers when the microsoft outbound firewall blocks the shovelware and flashes up a dialog box. So they probably just asked microsoft to ship the firewall so that the outbound firewall doesn't validate the application (which makes it too easy for end users to "accidentally" disable the shovelware and too easy for experienced users to get a list of all the shovelware polluting their machines from the "allowed" list and uninstall it). Of course microsoft doesn't want to have too many configs out there, so they just make this the default setting out of the box.
</TINFOILHAT>
Sure microsoft is listening to their customers, it's just their OEM customers...
Something still rotten in the state of Redmond (Score:2)
Good idea! (Score:2, Insightful)
Sarcasm!
Neutrality in Slashdot (Score:4, Insightful)
That said, I strongly detest the wording of this headline and the tagline below it. Especially from CmdrTaco.
When I read the topic in RSS, I thought that some features would be removed from the exisitng firewall, or that some key features would require a paid subscription to be activated. When I read the summary, however, I realized that was not the case. The attitude on slashdot towards Microsoft (as well as any other non-OSS business model that seems to work) is jaded and negative enough without being given a predisposition via headlines like this.
The summary in 1.5: Negative, misleading headlines need to go.
So, mod me down for offtopic, mod me down for Troll, mod me down for Redundant. My Karma can take it. Or, if you agree, mod the other way
The real question for this is... (Score:2)
I'm all for it. (Score:5, Interesting)
ps - Other AV programs probably do this, but in case anyone's interested the firewall built into McAfee VirusScan Enterprise v8 blocks SMTP and IRC communication outbound by default unless the executable firing up the communication belongs to a specific set of known email and IRC clients. Good times...
A little sensationalist? (Score:3, Insightful)
So it's not really crippled, it can be configured for outbound protection. Maybe the "varying degree of technical knowledge" implies that it's not as straightforward as a nice GUI configuration window and hence "crippled" in that respect.
Saying it is "crippled" would imply that the outbound protection code exists, but it is permanently disabled, i.e. not configurable at all.
Sensational headline is just plain wrong (Score:5, Insightful)
The headline is just wrong. The Vista firewall is no more "crippled" than iptables is "crippled" in Fedora. Microsoft is making the default behavior identical to the XP firewall, but getting bidirectional port filtering/blocking is merely a matter of turning it on. The whole "requiring various degrees of technical expertise" is a ridiculous red herring coming from a website where Linux users constantly preach their technical superiority to the common lowly user. Pardon me, would you like some elitism with that pedantic whine?
For the vast majority of users, bidirectional firewalling is overkill. For those who want it, it can be turned on. This isn't a story, it's propaganda masquerading as news. I swear, Microsoft tries to improve things (adding the ability to do outbound blocking), and all
Microsoft is the competitor, not the enemy. Quit making this whole crusade a personal affair and this silly anti-MS bias will disappear.
Thank you! (Score:5, Interesting)
On a daily basis, I get calls from users of Norton Internet Security or McAfee Security Center (or whaever "I don't know, whatever came with my computer") who, for some reason, can't get Internet Explorer/Outlook Express to work. They don't know what a firewall *is* let alone how to configure it.
If I suggest they turn of that firewall and try it, everything is suddenly happy again.
Many of them don't understand. "It worked fine yesterday/last week/last year and I haven't changed anything..."
I specifically despise the Norton firewall as it seems to be the most popular problem causer.
I am glad that Microsoft isn't turning this feature on by default because many clueless lusers will accidentally block the programs that they're trying to use and then not understand why it doesn't work anymore.
Frequently these users try to blame us at the ISP, not realizing that it's their own fault. Firewalls are my most frequent frustration, and I'm glad this one will behave the way it will.
Re:Port blocking is not enough (Score:2)
I do find it curious that people get all hyperventilative over something that ipf and iptables is usually set to do by default on 99.something% of the servers (that is block anything you don't specifically allow for inbound traffic). The only exception
typo: (Score:2)
"Vista may allow ports from 0-65535 outbound, but it seems an easily remedied thing"