Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Search titles only
By:
Search titles only
By:
Reply to thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Software
Security Apps
Comodo
Comodo CIS Bug fix policy
Message
<blockquote data-quote="Decopi" data-source="post: 1101268" data-attributes="member: 67091"><p>It's not the protocol.</p><p>It's not the port.</p><p>It's the IP!</p><p></p><p>At Comodo, any "safe"/"trusted" file, sandboxed or not, restricted or not, containerized or not etc... regardless the protocol, and regardless the port... Comodo will always allow that file to have comms to tons of IPs.</p><p></p><p>That problem at Comodo has no solution because "safe"/"trusted" files, for example in the case of svchost, it is impossible to customize by IP (hundreds of files use svchost for comms, with thousands of different IPs).</p><p></p><p>At Comodo, the same problem happens with all the files considered "safe"/"trusted", which includes Windows Services and a long list of other files (not just svchost).</p><p></p><p>Therefore, at Comodo any virus/malware using, for example, svchost, will have comms to tons of IPs, regardless the protocol and the port. At Comodo, a virus/malware using svchost for comms, it can use any protocol and any port, because the virus/malware only cares about the IP... and at Comodo the svchost is free to connect to tons of IPs. Comodo can't stop comms for a virus/malware using svchost (or any other "safe"/"trusted" file).</p><p></p><p>As a simple illustration, when Comodo is used, Firefox is forced to use svchost for comms. Both, Firefox and svchost are whitelisted by Comodo (both are considered "safe"/"trusted"). Therefore Firefox has free comms through svchost to tons of IPs (just limited by protocol/port). Comodo doesn't filter Firefox IP comms (through svchost). Now, instead Firefox, let's place a virus/malware, and the same logic applies, if the virus/malware uses svchost for comms, it'll have access to tons of IPs (really it doesn't matter protocol/port, what matters is just the IP).</p><p></p><p>Always good to remember that svchost using DNS resolver (customized IP) doesn't stop comms to other IPs.</p><p></p><p>This is not a bug. This a design flaw problem, mainly because Comodo never evolved in the last 20 years.</p><p></p><p>Comodo Firewall is a placebo.</p></blockquote><p></p>
[QUOTE="Decopi, post: 1101268, member: 67091"] It's not the protocol. It's not the port. It's the IP! At Comodo, any "safe"/"trusted" file, sandboxed or not, restricted or not, containerized or not etc... regardless the protocol, and regardless the port... Comodo will always allow that file to have comms to tons of IPs. That problem at Comodo has no solution because "safe"/"trusted" files, for example in the case of svchost, it is impossible to customize by IP (hundreds of files use svchost for comms, with thousands of different IPs). At Comodo, the same problem happens with all the files considered "safe"/"trusted", which includes Windows Services and a long list of other files (not just svchost). Therefore, at Comodo any virus/malware using, for example, svchost, will have comms to tons of IPs, regardless the protocol and the port. At Comodo, a virus/malware using svchost for comms, it can use any protocol and any port, because the virus/malware only cares about the IP... and at Comodo the svchost is free to connect to tons of IPs. Comodo can't stop comms for a virus/malware using svchost (or any other "safe"/"trusted" file). As a simple illustration, when Comodo is used, Firefox is forced to use svchost for comms. Both, Firefox and svchost are whitelisted by Comodo (both are considered "safe"/"trusted"). Therefore Firefox has free comms through svchost to tons of IPs (just limited by protocol/port). Comodo doesn't filter Firefox IP comms (through svchost). Now, instead Firefox, let's place a virus/malware, and the same logic applies, if the virus/malware uses svchost for comms, it'll have access to tons of IPs (really it doesn't matter protocol/port, what matters is just the IP). Always good to remember that svchost using DNS resolver (customized IP) doesn't stop comms to other IPs. This is not a bug. This a design flaw problem, mainly because Comodo never evolved in the last 20 years. Comodo Firewall is a placebo. [/QUOTE]
Insert quotes…
Verification
Post reply
Top