"Shields UP! Leopard Firewall Test"

I have been testing my firewall here. http://www.grc.com/x/ne.dll?rh1dkyd2

These are the results I am experiencing.
Shields Up test results are the same for me on all 3 firewall settings, with stealth enabled.

Allow all incoming connections
Block all incoming connections
Set access for specific services and applications.

On all 3 settings ports 136, 137, 139, and 445 are stealth. Ports 53 and 23 are open, and all others are closed. My computer fails the "solicited TCP Packets" and "Ping reply" tests, and passes the unsolicited packets test. No matter which of the 3 firewall settings I use, the test results are the same.

Can anyone explain to me why all the results are the same regardless of the setting?

20"Intel Imac , 30g ipod video, iphone, Mac OS X (10.5)

Posted on Nov 1, 2007 6:12 PM

Reply
14 replies

Nov 1, 2007 6:36 PM in response to An Inconvenient Carbon Credit

There was a Leopard Server google similar to this. It stated that turning on the firewall did NOT turn off all incoming ports especially NTP and some others that I can not remember at the moment. However, they suggested that you use your own ipfw commands to create a better firewall. Not ideal by any means and much more complicated, but they did say that that was a solution. You might give it a try.

Nov 1, 2007 8:19 PM in response to Bob White

Bob,

they suggested that you use your own ipfw commands to create a better firewall.


What would those ipfw commands be?

This is what Google lists for Leopard Firewall.

ipfw leopard produces equally confusing results.

These searches result in almost exclusively negative comments, with no viable solutions. When I go through the Shields UP! test with Tiger, my system gets a perfect score.

;~)

User uploaded file

Nov 1, 2007 9:32 PM in response to An Inconvenient Carbon Credit

Ferd,

I actually don't know yet. I read the server link from a google ("leopard macosx server firewall"), http://www.heise-security.co.uk/articles/98120. If you want to know the truth, I got out my New Rider's "Linux Firewalls" by Robert Ziegler, second edition, and was starting to read through it. It does give ipfw examples, but admittedly I have not implemented them yet and was only really considering using them for my MacOSX server which I mentioned in my prior post. It is behind a Linksys router. So, it is somewhat secure, but it is my second line of defense. ipfw looks to be a PITA however.

As far as I know, no one has broken into my Mac Book Pro under Tiger with all services off but web-sharing and I have never done a port scan on it. (I use web-sharing for a localhost website that I have restricted to just localhost via apache.)

The article mentioned above looks to be valid and I will be doing port scans on Leopard server when I get it installed to see if any holes exist.

Anyway, that is where my post came from and it was only a suggestion. Hope that helps.


An Inconvenient Carbon Credit,

I would suggest that you submit your findings to http://www.apple.com/feedback/macosx.html so that Apple will know about it and I would specifically state how you preformed the tests. HTH

Message was edited by: Bob White

Nov 1, 2007 11:36 PM in response to Mark T1

Most of the routers (linksys, belkin, etc.) I've used have a provision for blocking a Ping request and almost all of the 65,000 ports are blocked at the router, and you have NAT firewall, and sometimes "Stateful Packet Inspection" in even the cheapest routers.

Wired and Wireless, it makes no difference to the firewall. Sometimes you have to open and forward ports on these routers to use a service at all. The ports for many online games, and services like Bit Torrent are blocked automatically.

The end result is that your hardware firewall blocks most incoming scans or access attempts before your Mac gets bothered.

An exception would be if you turned on the DMZ for one of your LAN ip numbers and put a machine on that ip.

Nov 2, 2007 7:16 AM in response to An Inconvenient Carbon Credit

This morning, I turned off all outside services on Leopard Client machine. I went to a Tiger machine and did a port scan. It showed no ports available. You do port scans using /Applications/Utilities/Network Utility.app. Port 53 is for DNS inquiries/responses and may or may not be serious security breach depending on how buggy the DNS software is. Port 23, however, being open is a serious security breach and one that you need to research since it allows full access to your computer. So, next I tried to telnet into the Leopard machine and the connection was always refused. Thankfully! So, unless you specifically opened up port 23, I doubt that it is actually open and I would doubt that 53 is open either. From the tests that I made, I would question whether Shields UP! is giving you valid results.

But you should run your own tests using another MacOSX machine in a lan either behind a router or not connected to the internet, so you will understand it better.

Also, I fully agree with the comments on using a router. It does offer a great amount of security, is normally cheap and easy to set up these days. I have used one for years and actually have two in place, a Linksys router and behind that MacOSX server with its NAT and firewall turned on.

Last, Ferd was right. I should have done my homework before posting. I tend to like the tech stuff too much. So, sometimes I get a little carried away. Sorry about that.

Message was edited by: Bob White

Nov 10, 2007 2:01 PM in response to Mark T1

Mark T1 wrote:
I read somewhere (don't remember) that if you have a system with 10.4 and the firewall is turned on, you can use the ifpw command in the terminal to get the settings and then apply these to your 10.5 based machine.

- Mark

That would be
sudo ipfw list > some.file.name

Applying them, and setting it up so they get activated each time you reboot, is not so easy. Perhaps those shareware apps such as Brickhouse, FireWalk will have a resurgence.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

"Shields UP! Leopard Firewall Test"

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.