Recommended Posts

BTW if Microsoft can get around the system file warning during updates so could a virus.

585958883[/snapback]

Do you know how hotfixes "get around" it? :rolleyes: They install files with higher version numbers that are digitally signed by Microsoft, that is the key. If the file is signed, it will be accepted by Windows File Protection. If it is a higher version number, Windows will allow it to install without asking the user. If it's a lower version, Windows might prompt you about it or might simply refuse the file.

It's not really possible for a virus to create a file signed by Microsoft, so that's not going to happen.

Or it could simply replace the file outright and lock the system up, forcing a reboot. Once a virus has full system control there is not much it cannot do.

585958883[/snapback]

It depends on the type of virus. If it's something like the Slammer virus, which only resides in memory, that it won't survive a reboot. That's already one class of viruses which this protects against. And if the virus is written in a scripting language like HTA viruses are, then it's going to be a lot harder to write all that code to "patch" the connection limit using the file manipulation libraries available in scripting languages. Most scripting languages only allow basic file editing and nothing to interface with WFP. So there's another class of viruses which will be hindered.

How long has Windows XP had Digital Signatures and WFP? Yet systems are still infected? :whistle:

585959589[/snapback]

You misunderstand. What I posted was what a virus would have to go through in order to change the limit imposed by SP2. Digital signatures and Windows File Protection aren't meant stop viruses. Only antivirus software (and a somewhat intelligent user) can prevent/stop viruses.

  • 3 weeks later...

I thought I'd add to this as I have found a good reason for the patch. It seems that when doing vulnerability scanning, using something such as Nessus or Harris STAT, having the patch does slow things up, since the scanners usually do exactly what the patch prevents: Open numerous TCP connections without waiting for reply. I noticed a marked improvement in my scanning times after applying the patch, since the scanner is testing machines that may or may not be there. (Hence all of the open TCP sessions....) I first found this using Harris STAT.

I figured this might be helpful for some of you who are sys admins out there and do vulnerability scanning over a LAN.

I've run this patch on my work machine but no others, I have not seen those event log entries while running bittorrent, etc. I'd have to agree with most everything that has been said in this thread, and as such I only have the patch on my work machine.

What a pointless argueing thread...

I just have 2 things to say :

1. The TCP/IP patch improves your file sharing

2. The TCP/IP patch increases your system vulnerability to worms/viruses

Let the people decide what they want and stop convincing each other with opinions

What a pointless argueing thread...

I just have 2 things to say :

1. The TCP/IP patch improves your file sharing

2. The TCP/IP patch increases your system vulnerability to worms/viruses

Let the people decide what they want and stop convincing each other with opinions

586096369[/snapback]

The thread is obviously not pointless because you still don't understand what the patch does. #2 is completely wrong; you will not be more vulnerable to worms or viruses if you apply the patch. However, and as has already been said many times, your computer will infect more computers faster with a virus that you get.

  • 2 weeks later...

Will this tcpip limitation affect hosting online games? eg. I wanna host a 16 player UT2K4 game, will 6 players just drop off the server?

And how about running a web server like Apache on a WinXP machine? will the number of connections be nerfed so that it can serve only 10 web clients simultaneously?

Is windows 2000 affected too?

Will this tcpip limitation affect hosting online games? eg. I wanna host a 16 player UT2K4 game, will 6 players just drop off the server?

And how about running a web server like Apache on a WinXP machine? will the number of connections be nerfed so that it can serve only 10 web clients simultaneously?

Is windows 2000 affected too?

586165016[/snapback]

No, this feature in XP SP2 limits your computer to only have 10 half-open connections at one time, so you could still have 16 players, or server a few hundred people on a web serve, just cant have half-open connections.

Say, if you have 30 half open connections, it will limit you to 10, but if 5 suddenly become fully open, it will let 5 of the 20 remaining connecitons to be opened, so in the end, all those 30 connections will become open if they can (e.g. the computer is there)

Basically, no need to install this patch, unless for scanning subnets or the like, where you need alot of half-open connections quickly

Yeah, this limit is only there to slow down a flod of half-open connections

webservers dont open tones of half open connection, it opens one connection per client (and they become fully open quickly, thses half-open connections stay half open for a few seconds)

also, apache talks directly to mysql, it wont be affected at all by this limit.

Edit... never mind I figured it out.

The patch really does nothing to help your p2p downloads. I investigated it myself and honestly, this is a lot of fuss for nothing. You can do everything you wanted just fine. At least this is the case for me.

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.