P
PCR
In order to end 17 years of intense study after just 4 or so, I hope for
a quick answer to the following question. Here is my Kerio "Primary DNS
Server" rule, got from some expert & currently modified only in that I
now include the entire NetZero/Juno address range (where earlier I tried
to determine just the ones NetZero seemed to want to use)...
Primary DNS Server rule
Protocol: UDP, both directions
Local Endpoint-- Ports: 1024-5000
-- Application: Any
Remote Endpoint-- Address: Entire NetZero/Juno range
-- Port: 53
ANY app can use it, as currently written. Here are the ones I've
caught...
(a) EXEC.EXE NetZero Internet
(b) IEXPLORE.EXE
(c) no owner << eeek?
(d) AVAST.SETUP
(e) ASHMAISV.EXE avast! e-Mail Scanner Service
(f) PFWADMIN.EXE Kerio Personal Firewall Console
Here's the "no owner". There is only this one, but I haven't been
tracking this rule long...
2,[20/Jul/2007 21:15:04] Rule 'Primary DNS Server': Permitted: In UDP,
64.136.44.74:53->localhost:1055, Owner: no owner
Here is one "AVAST.SETUP". ODD, but I guess legit-- I have no program
actually named AVAST.SETUP, & no .exe at all in the folder mentioned...
2,[17/Jul/2007 22:30:14] Rule 'Avast! UDP': Permitted: Out UDP,
localhost:1045->64.136.44.74:53, Owner: C:\PROGRAM FILES\ALWIL
SOFTWARE\AVAST4\SETUP\AVAST.SETUP
Questions...
(1) Is it legit for IE to be using it?
(2) Should I block PFWADMIN.EXE?
[NOTE: In another rule (probably by yosponge)
PersFW.exe (Kerio Personal Firewall Engine) IS blocked.]
(3) I guess I must get rid of that "no owner",
but could it just be some kind of Kerio glitch?
(4) Am I leaving myself prone to mayhem by letting
ANY app use this rule-- as the "expert" coded it?
But, why hasn't it happened yet-- or has it????
(4) Why is it restricted to using ports 1024-5000 & 53?
--
Thanks or Good Luck,
There may be humor in this post, and,
Naturally, you will not sue,
Should things get worse after this,
PCR
pcrrcp@netzero.net
a quick answer to the following question. Here is my Kerio "Primary DNS
Server" rule, got from some expert & currently modified only in that I
now include the entire NetZero/Juno address range (where earlier I tried
to determine just the ones NetZero seemed to want to use)...
Primary DNS Server rule
Protocol: UDP, both directions
Local Endpoint-- Ports: 1024-5000
-- Application: Any
Remote Endpoint-- Address: Entire NetZero/Juno range
-- Port: 53
ANY app can use it, as currently written. Here are the ones I've
caught...
(a) EXEC.EXE NetZero Internet
(b) IEXPLORE.EXE
(c) no owner << eeek?
(d) AVAST.SETUP
(e) ASHMAISV.EXE avast! e-Mail Scanner Service
(f) PFWADMIN.EXE Kerio Personal Firewall Console
Here's the "no owner". There is only this one, but I haven't been
tracking this rule long...
2,[20/Jul/2007 21:15:04] Rule 'Primary DNS Server': Permitted: In UDP,
64.136.44.74:53->localhost:1055, Owner: no owner
Here is one "AVAST.SETUP". ODD, but I guess legit-- I have no program
actually named AVAST.SETUP, & no .exe at all in the folder mentioned...
2,[17/Jul/2007 22:30:14] Rule 'Avast! UDP': Permitted: Out UDP,
localhost:1045->64.136.44.74:53, Owner: C:\PROGRAM FILES\ALWIL
SOFTWARE\AVAST4\SETUP\AVAST.SETUP
Questions...
(1) Is it legit for IE to be using it?
(2) Should I block PFWADMIN.EXE?
[NOTE: In another rule (probably by yosponge)
PersFW.exe (Kerio Personal Firewall Engine) IS blocked.]
(3) I guess I must get rid of that "no owner",
but could it just be some kind of Kerio glitch?
(4) Am I leaving myself prone to mayhem by letting
ANY app use this rule-- as the "expert" coded it?
But, why hasn't it happened yet-- or has it????
(4) Why is it restricted to using ports 1024-5000 & 53?
--
Thanks or Good Luck,
There may be humor in this post, and,
Naturally, you will not sue,
Should things get worse after this,
PCR
pcrrcp@netzero.net