Vadim Smirnov

Forum Replies Created

Viewing 15 posts - 1,366 through 1,380 (of 1,495 total)
  • Author
    Posts
  • in reply to: WinPkFilter: Duplicate packets #5745
    Vadim Smirnov
    Keymaster

      WinpkFilter driver works between TCP/IP stack and it’s bound adapters, it does not filter non TCP/IP interfaces. As I understand you miss packets which are routed by network bridge and never reach TCP/IP stack. This is just how it should work.

      However, driver can be modified to additionally support filtering between the bridge and real network interfaces below the bridge, it just requires some modifications in driver itself. If you own Source Code license you can easily do required modifications yourself, I think it should be enough to add network bridge protocol name to the list of filtered protocols.

      in reply to: WinPkFilter: Duplicate packets #5741
      Vadim Smirnov
      Keymaster

        Could you please provide more details? What OS you have expirienced this behaviour with? Is it incoming or outgoing ARP request? What network media do you use. Have you seen four response packets in WinpkFilter of using any network sniffer?

        in reply to: Tunnel traffic through windows firewall – operating "in #5740
        Vadim Smirnov
        Keymaster

          Where can I get the “virtual network interface” you mentioned ? Is it part of windows ?

          Windows has built-in virtual loopback adapter, but you can make your own using one of the DDK samples.

          in reply to: WinCE support? #5737
          Vadim Smirnov
          Keymaster

            In the meantime WinCE is not supported. There is a chance that it will be supported in the future if there is enough interest to this.

            Vadim Smirnov
            Keymaster

              Hello Roelof,

              WinpkFilter drivers works on the bottom of the Windows network stack (below TCP/IP), but application layer of Windows XP firewall works on the top of network stack (otherwise it won’t be able to control applications network access). So I don’t think that there is any easy solution to this problem.

              However, may be setting up the virtual network interface, disabling Windows firewall for it and bridging it to the real network interface using WinpkFilter can solve the problem. It’s just the first idea, may be some other tricks are also possible…

              Hope it helps…

              in reply to: How to properly detect PPP/RAS adapter #5734
              Vadim Smirnov
              Keymaster

                You can also use medium type. See parameters passed/returned to/from NdisOpenAdapter: SelectedMediumIndex, MediumArray.

                in reply to: LHMON: Different data size in Send and Receive #5728
                Vadim Smirnov
                Keymaster

                  There is also a chance that you system is heavily loaded and user mode application can’t read driver log fast enough. In this case driver’s internal packet log is overloaded and it may drop some data blocks.

                  in reply to: FTP server behind Net Firewall #5733
                  Vadim Smirnov
                  Keymaster

                    When you set High Security level then only packets are passed only there is a corresponding allow rule exists. So there is no wonder that your packets were blocked.

                    If you server works as an Internet Gateway using 3rd Stealth Level for the external card would be enough, by default all outgoing connnections are allowed but all incoming packets are blocked unless they belong to one of the locally established connections. However, this mode is strict enough, so some complex protocols which use multiply streams may have problems with it. If you use any of them you’d better use Stealth Level 2 or even Stealth Level 1.

                    High Security level is the best mode for the stand alone server which provides some certain services, like HTTP, FTP, e-mail and etc..

                    in reply to: NeT Firewall remote administration #5735
                    Vadim Smirnov
                    Keymaster

                      What a problems do you have when configuring firewall through Terminal Server Client session? The only possible problem is running the multiply instances of MMC console, because only one instance can work normally with firewall engine.

                      For the server environment I would recommend to run firewall as a service, starting MMC console only when you need to make some connfiguration changes. This would save you a lot of system resources.

                      in reply to: FTP server behind Net Firewall #5730
                      Vadim Smirnov
                      Keymaster

                        I’m not sure but I think the problem is that LeechFTP uses passive FTP mode (bot connections are established by client).

                        In this case:

                        1) client sends command PASV to server.
                        2) server start listening newly allocated port and responses with command PORT with its number.
                        3) client connects to this port => data channel is established.

                        I would recommend you to try some other FTP clients to check this issue, an example integrated into Windows http://ftp.exe. If I remember fine then explorer and IE also uses passive mode by default, but http://ftp.exe does not.

                        in reply to: NeT Firewall is 2.3.0 – Update from 2.2 #5729
                        Vadim Smirnov
                        Keymaster
                          in reply to: LHMON: Different data size in Send and Receive #5726
                          Vadim Smirnov
                          Keymaster

                            Localhost Monitor works at TDI level, so there are no actual packets there, but blocks of data instead. Some blocks can be splitted or merged, probably this is what you’ve expirienced…

                            in reply to: LHMon: IP Address 0.0.0.0 ?? #5724
                            Vadim Smirnov
                            Keymaster

                              Could you please be a little bit more specific? What do you mean by stating “not always known”?

                              At the time of connection establishment the IP address was not specified explicitely. Just treat 0.0.0.0 as anyt local IP.

                              in reply to: LHMon: IP Address 0.0.0.0 ?? #5722
                              Vadim Smirnov
                              Keymaster

                                “IP Address 0.0.0.0” is just any local IP address (it’s not always known from which concrete IP the connection will work from at the time of connection establishment).

                                in reply to: Uninstalling NetFirewall (remotely) #5720
                                Vadim Smirnov
                                Keymaster

                                  Hmm, don’t you think that if you could disable/uninstall firewall remotely then this firewall won’t provide any security at all? If you have the proprietary rights on the remote system (administrator) then you can disable/uninstall firewall remotely (if it is configured to allow the connections you use for administrative purposes, otherwise you won’t be able to connect) or locally. Otherwise this is not possible.

                                Viewing 15 posts - 1,366 through 1,380 (of 1,495 total)