[ previous ] [ next ] [ threads ]
 
 From:  Chris Buechler <cbuechler at gmail dot com>
 Cc:  "m0n0wall at lists dot m0n0 dot ch" <m0n0wall at lists dot m0n0 dot ch>
 Subject:  Re: [m0n0wall] Future plans after 1.3?
 Date:  Sun, 13 Dec 2009 18:42:26 -0500
On Sun, Dec 13, 2009 at 6:34 PM, Quark Group - Hilton Travis
<Hilton at quarkgroup dot com dot au> wrote:
>
> So, what happens when some malware gets installed on a PC which is allowed to open ports on the
UPnP device and
> then starts communicating over those?
>

It would have to pick one of your already authorized ports, then have
to open the ports. In your "secure" scenario, those ports would have
always been wide open already, so it would have been even easier.
Sure, you would never use it in a business network, but with many home
networks, your options are either to leave a bunch of ports wide open
all the time, or have a properly restricted upnp service that lets the
apps on your machine open ports when needed. The latter is obviously
preferable.