Bugtraq mailing list archives

RE: PCFriendly DVD Backchannel


From: garberoa () WellsFargo COM
Date: Mon, 4 Mar 2002 17:55:18 -0800

Tiny Personal Firewall will perform, to some extent, as you've described
when set in learning mode, and will remember which apps you've allowed to
send/receive TCP/UDP on which ports. 

To the best of my knowledge, TPF will not perform the following items on
your wish list:

                        Connection options:
                  Just for the next hour
                  Just for today
                  Until XYZ.EXE terminates

                        Action:
                        Refuse the connection*
                Pretend to connect, return no data
                Allow the connection, log first 512 bytes

*TPF sends no RST, so the connection will be refused by omission.

TPF also has rather granular support for ICMP traffic, so that you can
allow/disallow specific message types. 

Best Regards,

Andrew Garberoglio, CISSP
Wells Fargo Services, Internet Technology Services

"Let us prepare to grapple with the ineffable itself, and see if we may not
eff it after all"
-Douglas Adams


-----Original Message-----
From: Olin Sibert [mailto:wos () oxford com]
Sent: Friday, March 01, 2002 9:38 PM
To: cmcurtin () interhack net
Cc: bugtraq () securityfocus com
Subject: Re: PCFriendly DVD Backchannel


  > From: Matt Curtin <cmcurtin () interhack net>
  > Date: Thu, 28 Feb 2002 17:26:58 -0500
  > To: <bugtraq () securityfocus com>
  > Subject: PCFriendly DVD Backchannel
  ...
  >   Numerous DVD titles from major movie producers between 1996 and 2000
  >   come enabled with ``PCFriendly,'' an application developed by
  >   InterActual Technologies that tracks DVD usage.  The system is
  >   designed to identify users persistently, without using an HTTP
  >   cookie, thus bypassing any privacy-enhancing technologies like
  >   cookie management software or browser configurations.  The
  >   identifying token is persistent through product registration and
  >   PCFriendly use.

It's always seemed to me that one good way to deal with this sort of
problem would be a personal firewall that sat around in the background
and popped up with questions like this:

  Greetings.  It may surprise you to learn that the program XYZ.EXE
  which you are running is attempting to connect to port 80 (http) at
  web3.wespyonyouallthetime.com (198.61.143.20).  Do you want to let it
  do that?  Last time I asked (3 days ago), you selected "Today only".
    Pick one of:  Never
                  Not this time
                  Always
                  Just this Once
                  Just for the next hour
                  Just for today
                  Until XYZ.EXE terminates
    Answer is for:  This host only
                    Any host in wespyonyouallthetime.com
    Action:  Refuse the connection
             Time out
             Pretend to connect, return no data
             Allow the connection, log first 512 bytes

Programs like BlackIce get almost all the way there, except they seem to
be only port-based, not address-based.  To avoid each user having to
make all the choices, one might distribute configuration files with
known unresirable locations already listed.  It might also be possible
for the warning to "score" the warning in some way (e.g., if the program
is not a known browser, it's somewhat more suspicious for it to be
talking to a web server).

Have I missed sme great piece of software that does this already (Linux
or Windows), or is this an unmet need?  

Thanks -- Olin Sibert <wos () oxford com>


Current thread: