Windows Firewall Application checksums?

Discussion in 'other firewalls' started by noway, Jun 29, 2022.

  1. noway

    noway Registered Member

    Joined:
    Apr 24, 2005
    Posts:
    461
    Just trying out Windows Firewall on Windows 10 along with Malwarebytes WFC. Is it true that Windows firewall just uses the application name to authenticate an application permitted to connect to the internet?

    I tried renaming leaktest.exe to eraser.exe and put it into the same directory as eraser where I have a permit rule for eraser.exe in WFC. The renamed eraser.exe connected out to GRC without a prompt. I would think that a firewall should check the MD5 or SHA of the executable and prompt me to create a new rule if the checksum has changed, like some other firewalls I've used in the past.

    I've only been using Windows Firewall for a week or so. Am I missing a setting somewhere to force this (I have Smartscreen enabled) or is this just a security hole?
     
    Last edited: Jun 29, 2022
  2. alexandrud

    alexandrud Developer

    Joined:
    Apr 14, 2011
    Posts:
    2,428
    Location:
    Romania
    Windows Firewall rules are applied per path basis not per checksum basis. There is no check for SHA256 of the file. You usually allow programs from Program Files or System32 folders. To replace the files in such folders you need administrative privileges. If there is a rule for a specific file and that file is updated/replaced, the allow rule still works. This is how Windows Firewall works.

    I had in plan a feature for WFC to check the SHA256 of the file and to remove the rule if the SHA256 is different, but Malwarebytes acquired Binisoft in 2018 and I had to slow down WFC development because I work now on too many other projects. It is still in the WFC backlog.
     
  3. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Magnificent that it's seriously considered. WFC is a stellar project IMHO and such an addition would fill a gap.
     
  4. noway

    noway Registered Member

    Joined:
    Apr 24, 2005
    Posts:
    461
    Thanks for the info. Appreciate it.
     
  5. tnodir

    tnodir Registered Member

    Joined:
    Oct 21, 2017
    Posts:
    229
    Location:
    etc
    What about imported DLL-s? And DLL-s loaded via LoadLibrary()?
     
  6. alexandrud

    alexandrud Developer

    Joined:
    Apr 14, 2011
    Posts:
    2,428
    Location:
    Romania
    Too much. WFC was never intended to be a HIPS security software.
     
  7. tnodir

    tnodir Registered Member

    Joined:
    Oct 21, 2017
    Posts:
    229
    Location:
    etc
    Sure, so I'm wondering about your plans for "a feature for WFC to check the SHA256 of the file".
    Does it make sense at all without checking dependent DLL-s?
     
  8. alexandrud

    alexandrud Developer

    Joined:
    Apr 14, 2011
    Posts:
    2,428
    Location:
    Romania
    Checking the loaded dependencies of a specific software is not something that a firewall should check. A software may have tens/hundreds of dependencies. The software itself should check if the loaded dependencies are the expected ones. Anyway, those dependent DLL files are loaded into a process (executable file) which connects to the network. The improvement in WFC can be that if the SHA256 changes, then the rule may be deleted/disabled, in a similar way Secure Rules does it already.
     
  9. pvsurfer

    pvsurfer Registered Member

    Joined:
    Sep 1, 2004
    Posts:
    1,618
    Location:
    USA
    Yes! - that would be a meaningful improvement. :thumb:
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.