Outpost firewall pro is bad?

Discussion in 'other firewalls' started by sir_carew, Dec 6, 2003.

Thread Status:
Not open for further replies.
  1. sir_carew

    sir_carew Registered Member

    Joined:
    Sep 2, 2003
    Posts:
    884
    Location:
    Santiago, Chile
    Hello,
    I installed the 2.0 version of Outpost Firewall PRO on my Win XP system.
    I test it using many test like the Sygate test. In the quick scanner, all appear Stealth :), but when I click in the Stealth scanner, all ports appear closed and NOT Stealth :mad:
    With Za pro and Sygate, the stealth test, all ports appear stealth. I also make rules for svchost, netbios, etc for block the open ports.
    Why happend it?, is outpost a bad firewall?
    Thanks.
     
  2. Morgoth

    Morgoth Guest

    Outpost is FAR from being a bad firewall. I occasionally use it myself & like all recent firewall it is designed to withstand all types of scans, from standard to stealth (SYN).

    However I'm not too familiar with it either. It gobbles a lot of resources (almost as much as ZA), and despite its nice user-interface it is not that user-friendly, however it has an extra feature: flash popup blocking.

    And as for it not blocking the stealth probes, I guess the DEFAULT (out-of-the-box) setup is inadequate - U will need to reconfigure its parameters, that's all ;)
     
  3. mvdu

    mvdu Registered Member

    Joined:
    Oct 14, 2003
    Posts:
    1,166
    Location:
    PA
    I never have a problem being stealthed on Outpost's default settings - try at other scan sites.
     
  4. optigrab

    optigrab Registered Member

    Joined:
    Nov 6, 2002
    Posts:
    624
    Location:
    Brooklyn/NYC USA
    Outpost firewall pro & Sygate Stealth Scan

    Hi Sir_carew

    I had the same problem. Please see these two threads over at the Outpost forum:

    this one and this one

    If your issue is the same as mine, it will be resolved by disabling the default DNS resolving rule and creating one specifically for your ISP's DNS server(s).

    My Outpost configuration passes all Sygate scans now (as well as PCFlank, ShieldsUp!!, etc.). Let me know how it works out.

    Regards,
    Optigrab
     
  5. sir_carew

    sir_carew Registered Member

    Joined:
    Sep 2, 2003
    Posts:
    884
    Location:
    Santiago, Chile
    Hi,
    Thanks for you reply, I disable all the defaults rule that said: Allow... and now in the Sygate site, in the stealth scanner, it show all of my ports stealth, except o_O the port 80 and the port 1304. the problem is fixed in a 90 % with those rules disabled (obviously the rule that said: block... are enabled) the most of my ports are stealth. I try to make many rule blocking port 80 and 1304 (both, local and remote), etc and nothing.
    >creating one specifically for your ISP's DNS server(s)
    I don't understand you, I disabled the allow rule.
    Thanks and please help me.
     
  6. ellison64

    ellison64 Registered Member

    Joined:
    Oct 5, 2003
    Posts:
    2,587
    You can just put your servers Ip address in there.For example this would be the rule for FREESERVE (a U.K ISP)

    where the specified protocol is ....UDP
    where the specified remote host is......195.92.195.95,195.92.195.94
    Where the remote port is.....DNS
    Allow it

    The "remote hosts" are freeserves (yours will be different if you dont use freeserve) IP numbers .To find out your ISP NUMBER/S .Type in winipcfg.exe (W9:cool: or ipconfig ( XP) in start >run...then click "more info" and you will see DNS Servers.Click the little dotted square box next to it and in case you have more than one number.Then you can put your numbers in the rule.If there are more than one Ip address ..seperate them with a comma as above.To put in the above rule click options>system>global apllication and system rules>settings>add a rule (or you can edit the existing "allow dns resolving" to reflect the above rule)
    ellison
     
  7. optigrab

    optigrab Registered Member

    Joined:
    Nov 6, 2002
    Posts:
    624
    Location:
    Brooklyn/NYC USA
    Outpost firewall pro & Sygate Stealth Scan

    Hi sir_carew,

    I don't think you need to disable every default rule that says "Allow..."

    What I had in mind was unchecking these two default rules:
    Allow DNS resolving (TCP)
    Allow DNS resolving (UDP)
    The problem is that you need to allow some sort of DNS resolving. This helps your internet-enabled programs (e.g. browsers, AV's auto update, etc.) find an IP address from a URL / domain name. Typically, your internet connection sends DNS resolving inquiries to the DNS servers of your ISP. The defualt rules above merely allow this.

    In my configuration, I have custom made rules that ONLY allows DNS resolving from my ISP's DNS servers, nowhere else. These rules are restrictive enough to pass the Sygate Stealth scan, which I could not completely do with the default rules. My rules are shown at the bottom of this thread.

    In order to create such a rule, you need to know the IP address of your ISP's DNS servers. I found mine using IPCONFIG/all in the command prompt.

    The Moderators at the Outpost forum recommend a different approach for "maximum security". They recommend writing a DNS resolving rule, like mine above, for each specific application thay you would allow to access the internet. For example, "DNS resolving rule for IE only" and "DNS resolving rule for NOD32 update only", etc. The idea is that no program (or trojan) and possibly "phone home" if it does not have a DNS resolving rule that permits it.

    My concern for you is that you disabled the default DNS resolving rules, but did not replace them with custom rules, yet you are still surfing the net(?). I'm not sure what's happening there. The only way to know is to see all your "global rules" and your application rules.

    If you disabled every default rule that says "Allow...", that means you disabled:
    >Allow loopback (generally a good safe move - I had to write a specific rule to allow Mozilla to loopback).
    >Allow GRE protocol (I still have this enabled, and have seen no recommendation against it on the Outpost forum)
    >Allow PPTP control connection (not sure, but I believe this is needed, and I have seen no recommendation against it on the Outpost forum).
    >Allow Outgoing DHCP (the Mods on the Outpost forum recommend KEEPING the default global rule for best results).

    IMO, you should get these Global Rules set up properly, then please re-examine your specific rules for your applications. Make good use of the search function at the Outpost forum, since they already have answers to just about any questions you might have regarding the default rules and passing the various online security scans.

    I am happy to continue to help, too, but I am certain I am not the most knowledge person you can find. Let us know how you are doing.

    Regards,
    Optigrab
     
  8. CrazyM

    CrazyM Firewall Expert

    Joined:
    Feb 9, 2002
    Posts:
    2,428
    Location:
    BC, Canada
    Re:Outpost firewall pro & Sygate Stealth Scan

    A global loopback rule is usually OK. However, if you use a local proxy program like Proxomitron through which other applications can access the Internet, then you may want to consider modifying localhost (loopback) access.

    These protocols are generally used in VPN connections. If you are not using VPN you could safely disable these rules and activate if and when required.

    If you have a dynamic WAN IP, then you will require this rule in order to obtain your IP from your ISP's DHCP server. Bootpc/Bootps rules can be customized.

    Regards,

    CrazyM
     
  9. sMEaGo

    sMEaGo Registered Member

    Joined:
    Dec 7, 2003
    Posts:
    2
    hello ,

    try this site,if the result is closed,I'm sorry i can't help you

    http://grc.com/x/ne.dll?rh1dkyd2

    or

    http://www.pcflank.com


    OBS: go to the Outpost's support, http://www.agnitum.com/support


    Sorry about my English :oops:
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.