Vadim Smirnov

Forum Replies Created

Viewing 15 posts - 1,261 through 1,275 (of 1,393 total)
  • Author
    Posts
  • in reply to: WinPKFilter: Double packets handling #5750
    Vadim Smirnov
    Keymaster

      NDIS_FLAGS_DONT_LOOPBACK and NDIS_FLAGS_SKIP_LOOPBACK prevents the packet from being indicated back. However, these flags are OS/NDIS specific. You can see some details here http://www.ndis.com/papers/loopback.htm

      in reply to: rules #5757
      Vadim Smirnov
      Keymaster

        Could you please post the rule you have created and short description what it is supposed to do, probably there is something wrong with it.

        in reply to: WinPkFilter: Duplicate packets #5747
        Vadim Smirnov
        Keymaster

          Why only TCP/IP adapters can be filtered?

          It is by driver design. However, driver can be extended to work below other protocols in addition to TCP/IP.

          For example, you can add some flag to internal structure of packet in driver code and when program try send non TCP/IP packet to stack, driver can detect this by flag and just drop this packet…

          TCP/IP is the primary protocol in the meantime and WinpkFilter main purpose is modification of it’s behaviour on different ways (firewall, NAT, VPN and etc…). Filtering absolutely all protocols on the system would cause a real mess and perfomance degradation (protocols can be joint into the stacks in the form of IM drivers, like the bridge you have mentioned).

          in reply to: WinPkFilter: Duplicate packets #5745
          Vadim Smirnov
          Keymaster

            WinpkFilter driver works between TCP/IP stack and it’s bound adapters, it does not filter non TCP/IP interfaces. As I understand you miss packets which are routed by network bridge and never reach TCP/IP stack. This is just how it should work.

            However, driver can be modified to additionally support filtering between the bridge and real network interfaces below the bridge, it just requires some modifications in driver itself. If you own Source Code license you can easily do required modifications yourself, I think it should be enough to add network bridge protocol name to the list of filtered protocols.

            in reply to: WinPkFilter: Duplicate packets #5741
            Vadim Smirnov
            Keymaster

              Could you please provide more details? What OS you have expirienced this behaviour with? Is it incoming or outgoing ARP request? What network media do you use. Have you seen four response packets in WinpkFilter of using any network sniffer?

              in reply to: Tunnel traffic through windows firewall – operating "in #5740
              Vadim Smirnov
              Keymaster

                Where can I get the “virtual network interface” you mentioned ? Is it part of windows ?

                Windows has built-in virtual loopback adapter, but you can make your own using one of the DDK samples.

                in reply to: WinCE support? #5737
                Vadim Smirnov
                Keymaster

                  In the meantime WinCE is not supported. There is a chance that it will be supported in the future if there is enough interest to this.

                  Vadim Smirnov
                  Keymaster

                    Hello Roelof,

                    WinpkFilter drivers works on the bottom of the Windows network stack (below TCP/IP), but application layer of Windows XP firewall works on the top of network stack (otherwise it won’t be able to control applications network access). So I don’t think that there is any easy solution to this problem.

                    However, may be setting up the virtual network interface, disabling Windows firewall for it and bridging it to the real network interface using WinpkFilter can solve the problem. It’s just the first idea, may be some other tricks are also possible…

                    Hope it helps…

                    in reply to: How to properly detect PPP/RAS adapter #5734
                    Vadim Smirnov
                    Keymaster

                      You can also use medium type. See parameters passed/returned to/from NdisOpenAdapter: SelectedMediumIndex, MediumArray.

                      in reply to: LHMON: Different data size in Send and Receive #5728
                      Vadim Smirnov
                      Keymaster

                        There is also a chance that you system is heavily loaded and user mode application can’t read driver log fast enough. In this case driver’s internal packet log is overloaded and it may drop some data blocks.

                        in reply to: FTP server behind Net Firewall #5733
                        Vadim Smirnov
                        Keymaster

                          When you set High Security level then only packets are passed only there is a corresponding allow rule exists. So there is no wonder that your packets were blocked.

                          If you server works as an Internet Gateway using 3rd Stealth Level for the external card would be enough, by default all outgoing connnections are allowed but all incoming packets are blocked unless they belong to one of the locally established connections. However, this mode is strict enough, so some complex protocols which use multiply streams may have problems with it. If you use any of them you’d better use Stealth Level 2 or even Stealth Level 1.

                          High Security level is the best mode for the stand alone server which provides some certain services, like HTTP, FTP, e-mail and etc..

                          in reply to: NeT Firewall remote administration #5735
                          Vadim Smirnov
                          Keymaster

                            What a problems do you have when configuring firewall through Terminal Server Client session? The only possible problem is running the multiply instances of MMC console, because only one instance can work normally with firewall engine.

                            For the server environment I would recommend to run firewall as a service, starting MMC console only when you need to make some connfiguration changes. This would save you a lot of system resources.

                            in reply to: FTP server behind Net Firewall #5730
                            Vadim Smirnov
                            Keymaster

                              I’m not sure but I think the problem is that LeechFTP uses passive FTP mode (bot connections are established by client).

                              In this case:

                              1) client sends command PASV to server.
                              2) server start listening newly allocated port and responses with command PORT with its number.
                              3) client connects to this port => data channel is established.

                              I would recommend you to try some other FTP clients to check this issue, an example integrated into Windows http://ftp.exe. If I remember fine then explorer and IE also uses passive mode by default, but http://ftp.exe does not.

                              in reply to: NeT Firewall is 2.3.0 – Update from 2.2 #5729
                              Vadim Smirnov
                              Keymaster
                                in reply to: LHMON: Different data size in Send and Receive #5726
                                Vadim Smirnov
                                Keymaster

                                  Localhost Monitor works at TDI level, so there are no actual packets there, but blocks of data instead. Some blocks can be splitted or merged, probably this is what you’ve expirienced…

                                Viewing 15 posts - 1,261 through 1,275 (of 1,393 total)