Guido Tschakert wrote:
...
> Hi,
> yes finally you must go outside, this is done with the bridged interface.
> The question is (I don't have the complete answer, but a strange feeling):
> How secure is your windows with a network interface enabled and nothing
> on it configured.
> 
> guido

exactly.
This idea of using VMware (or similar) to host a firewall that
protects the host operating system is something I find somewhere
between amusing (because its silly) and scary (because it indicates
people don't really understand, and think that a "firewall" works
magic, and these people might be protecting our personal data).

By the time a packet has made it to your VMware firewall, you have
gone through the host OS.  You are assuming the host OS's network
support is secure.  You are assuming the VMware virtualization code is
secure.  You are assuming that the VM can't be compromised by an
exploited host OS.

I don't think that's a really good idea.

A year ago, I thought it was a theoretically bad idea.  But leave it
to the wireless people to put theory into practice:
  http://lwn.net/Articles/191100/
Remember that this was a DRIVER vulnerability, not an APPLICATION
vulnerability.  So yes, nothing had to be attached.

A little while after that, Intel was reporting security bugs in
many/most of their 100Mbps and 1Gbps adapter drivers.  Thanks for
demonstrating that it isn't just a wireless thing.

Better than sticking your "All Services On" Windows machine directly
on the 'net?  Probably.  Secure?  Not in my opinion.

Nick.

Reply via email to