• Quick note - the problem with Youtube videos not embedding on the forum appears to have been fixed, thanks to ZiprHead. If you do still see problems let me know.

Firewall question.

asthmatic camel

Illuminator
Joined
Apr 23, 2003
Messages
4,510
I've been unable to install zonealarm on one of my pcs and have tried a few different firewalls. All of them fail the Shields Up test from GRC by responding to ICMP requests. I've set a rule on the present firewall I'm using (Comodo) but, the same result is returned.

Any advice?
 
If you have a firewall already running then turn it off before installing and activating a different one (disconnect from the Internet first!). Multiple firewalls can clash with each other, so that's the first thing I'd check.
 
Thanks but, I've tried all that. Zonealarm is up and running on my other machine and effectively blocks ping requests. I can't install it on this one because the program tells me to use service manager to shut down the true vector application, which service manager can't find.

I'm not too worried as I'm behind a router but, I'd like to solve the problem if possible.
 
What OS is this PC running?

If it is XP then can you use the Windows firewall?
 
... I can't install it on this one because the program tells me to use service manager to shut down the true vector application, ...
I got the same error on the previous upgrade of ZA, there was some help on their forum but it didnt fix it for me so currently no firewall on one of my computers.
 
What OS is this PC running?

If it is XP then can you use the Windows firewall?

XP Pro. Trouble is that I get the same response from Grisoft using the Windows firewall. All the ports are effectively stealthed but, I still get the message that my machine is replying to ping requests. I don't like the Windows firewall anyway; the lack of configurability troubles me.

Normally I can solve these problems with a little googling but this time, I'm baffled.

ETA I've installed Sygate personal firewall instead and receive the same respone.
 
Last edited:
You need to uninstall zonealarm completely (true vector is a zonealarm component).

Go to add/remove programs and remove zonealarm (but you've probably already done that).

Make sure the 'Zone Labs' directory is deleted from the C:\Program Files directory.

Make sure that none of the following files exist in your Windows files structure:

DELETE:
1) C:\Documents and Settings\All Users\Start Menu\Programs\Zone Labs
2) C:\Program Files\Zone Labs
3) C:\WINDOWS\Internet Logs (Empty Contents)
4) C:\WINDOWS\Profiles\All Users\Start Menu\Programs\Zone Labs
5) C:\WINDOWS\Profiles\All Users\Start Menu\Programs\Startup\zonealarm (pro)
6) C:\WINDOWS\System32\vsdata.dll
7) C:\WINDOWS\System32\vsdatant.sys
8) C:\WINDOWS\System32\vsmonapi.dll
9) C:\WINDOWS\System32\vsnetutils.dll
10) C:\WINDOWS\System32\vspubapi.dll
11) C:\WINDOWS\System32\vsutil.dll
12) C:\WINDOWS\System32\Zone Labs
13) C:\WINDOWS\Temp (Empty Contents)


Try installing a firewall at this point (sygate is fine) - does it work? If not, try using a registry cleaner product (regclean or systemworks or something).
Then try again.
 
I've been unable to install zonealarm on one of my pcs and have tried a few different firewalls. All of them fail the Shields Up test from GRC by responding to ICMP requests. I've set a rule on the present firewall I'm using (Comodo) but, the same result is returned.

Any advice?
You can try logging into your router and blocking ICMP requests, though your ISP may have that feature turned on for test purposes. (In addition, some folks are not so sure ShieldsUp is as effective as claimed.)

When clicking the 'Test my shields' button, ShieldsUp will inform you about its attempt to contact the 'Hidden Internet Server' [sick] within your PC. Matter of fact, ShieldsUp will send a NQUERY NetBIOS UDP packet with Broadcast, Query and Request flags set. Upon receiving an answer (or not), ShieldsUp will determine if your Shields are 'up'.

This is - obviously - not a very accurate method.' And - also obviously - not really a 'Hidden Internet Server' either.

Now, there's a twist to this test. I set up a machine laden with vulnerabilities. Beginning from a few installed backdoors (BackOrifice, Sub7) and other vulnerabilities, I did not even spend the few minutes to close down the most obvious security holes. ShieldsUp, however, happily reported:
  • Unable to connect with NetBIOS to your computer. All attempts to get any information from your computer have FAILED. (This is very uncommon for a Windows networking-based PC.) Relative to vulnerabilities from Windows networking, this computer appears to be VERY SECURE since it is NOT exposing ANY of its internal NetBIOS networking protocol over the Internet.
Which is simply wrong. There is nothing I could have done to stop even unsophisticated intruders from attacking and breaking into my machine - a small script like ShieldsUp, however, is simply fooled by Windows' inconsistent behavior on UDP responses.

A textbox just below the results asks me to perform another check of my system, this time by probing my ports. A click on the button and I am there.

Again, the script presents me with a number of results. At this point, it starts probing my system with a number of connect() calls, which essentially seek to establish a connection to a few ports on my system. This time, oh wonder, it recognizes the fact that NetBIOS is open, but overlooks the installed Spyware and Backdoor programs.

It also gracefully overlooks a grave security problem I introduced by installing a freely available third party application which essentially allows anyone on the net to browse my machine's hard drives and down- and upload files.

I also had a web server installed. A small program which can be downloaded from download.com or similar sites allows my computer to export pictures to the net. My friends or casual visitors would then be able to browse this photo album with a regular web browser. The source code for said program is freely available. It's a very short program which basically implements a 'crippled' web server and some extra features. After reading the source code, I am sure there is not much an attacker could exploit.

GRCs 'nanoprobes' diligently connect() to the server and then wander on. The port test, however, tells me my HTTP port is closed. Strange. Very strange. A look at the logs I am sniffing from this connection shows my web server responded - still the test program reports it to be closed. I repeated the exercise with both Windows and Unix based web servers and got an overall hit rate of less than thirty percent. In other words, more than often the test program would not detect my open web server.

There is no such thing as 'stealth' on the Internet. Ports are either open (they respond accordingly), closed (they do not respond accordingly) or are non-existent (nothing comes back at all). Gibson calls the latter 'stealth', which is as wrong as could be.

A false sense of security even here. Just for Mr Gibson's records: my FTP port is not stealth - it's just not responding with an ICMP_DESTUNREACH when probed.

I received a clean bill of health from ShieldsUp!. Despite having a computer which is most likely the least secure computer ever tested by those scripts. A day later, I tried the same with the help of a friend's NeXT cube and was swamped with 'you are sooo insecure' messages. Regardless the fact that said friend's NeXT cube is about the safest place to store data I can imagine, it responds to every port probe and connect() attempt with a TCP or UDP stream saying 'go away' in its packet payloads. Gibson tends to exaggerate. His supposedly superior system does not divert in much parts from what is already available out there in hundreds if not thousands of other incarnations. The boldest claim, however, can be spotted on his Ports page.
  • If you have used ShieldsUP! in the past, you may have just noticed that the Port Probe system is much faster than ever before. This is the result of the emerging deployment of our much-anticipated NanoProbe Technology. It is finally becoming real.
There is nothing 'nano' about Gibson's probes. In fact a simple traffic sniffer reveals they are merely ICMP and TCP/UDP based connect and scan attempts.
If you're using a hardware firewall, you're probably safe.

RayG
 
Last edited:
if you're behind a firewall and an external machine pings the ip you appear to come from, they are most likely pinging your hardware firewall, not your actual machine.
 

Back
Top Bottom