Bug (NIS Version: 20.3.1.22):
You cannot deny in / outbound traffic on 127.0.0.1, allowing local proxies such as Tor to become an attack vector
Details:
To illustrate the above point, set up Firefox to use a proxy (Tor) and then create a firewall rule:
First we'll create a generic "block everything" rule:
- Rule: Block
- Direction: To and From other computers
- Computer: Any
- Protocol: All
Now run firefox and you will see connections made on 127.0.0.1 (some of them listening). Let's change the rule to be specific:
- Rule: Block
- Direction: To and From other computers
- Computer: 127.0.0.1
- Protocol: All
Run Firefox again and you see the same connections and you can also freely access the web.
Now it might seem strange to set up a browser to use Tor and then create deny rules but this is merely for illustration. Any application, virus or worm could circumvent your deny rules if you have a proxy running, which is dangerous.
This also works with applications that have no rules. When NIS alerts you that a program is trying to access the internet and you choose "block once" or "block always", the connection is still allowed if the address is 127.0.0.1
Summary:
When the Firewall ignores specific "block" rules to 127.0.0.1 it opens the host computer to, at a minimum, two potential exploits:
- A proxy running on the host could be used as an inbound attack vector because the Firewall ignores specific
block rules to 127.0.0.1 - A proxy running on the host could be used as an outbound exploit to send private information via a virus / worm
because the Firewall ignores specific block rules to 127.0.0.1